[vpn-help] Updated package and problem reports

Peter Eisch peter at boku.net
Wed Aug 16 15:27:05 CDT 2006



This is all quite odd.  I can do large IMAP folder sync¹s over the session
to servers at-large on the net without incident.  I can even putty  and scp
large files.  Is there anything you do inside the payload?  Because this is
with firefox as well as ie I might wonder if they do something different
with sockets or something.  I can¹t really think it¹s a server issue because
the cisco client zips right along without incident to the same sites.

Here¹s probably something more than what you wanted....

Three sets of logs.  First is the client log with as much info in it as I
could, even the public interface.  Next is Exhibit B which is specifically
copied from the session:
    cow# tcpdump -s1500 -nvv host 10.1.101.26 and not port 22
Where Œcow¹ is the concentrator.  Last is Exhibit C which is the output of
the command:
    cottonmouth# tcpdump -p -nvv -s 1500 -i vlan101 port 80
Where Œcottonmouth¹ is the upstream firewall.


Exhibit A:

## : IPSEC Daemon, Aug 15 2006
## : Copyright 2005 Shrew Soft Inc.
## : This product linked OpenSSL 0.9.8a 11 Oct 2005
ii : opened 'dump-pub.cap'
ii : opened 'dump-prv.cap'
ii : cleaned vnet device 'ROOT\VNET\0000'
ii : rebuilding interface list ...
ii : interface IP=10.1.200.170, MTU=1500 active
ii : 1 adapter(s) active
ii : client ctrl thread begin ...
DB : tunnel added
DB : tunnel dereferenced ( ref count = 0, tunnel count = 1 )
ii : peer config message received
DB : ipsec peer not found
ii : local address selected for peer
ii : 10.1.200.170 ( Realtek RTL8029(AS) PCI Ethernet Adapter - Packet
Scheduler Miniport )
ii : user credentials message received
ii : client keyfile message received
ii : '\Documents and Settings\peisch\Desktop\VPN\ca.crt' loaded
ii : tunnel enable message received
DB : new phase1 sa ( ISAKMP initiator )
DB : exchange type is aggressive
DB : 10.1.200.170:500 <-> 10.1.101.26:500
DB : b36db2b6a2a82240:0000000000000000
DB : phase1 sa added
>> : security association payload
>> : key exchange payload
>> : nonce payload
>> : identification payload
>> : vendor id payload
>> : vendor id payload
>> : vendor id payload
>> : vendor id payload
>> : vendor id payload
-> : send IKE packet to 10.1.101.26:500 ( 344 bytes ) =
0x : b36db2b6 a2a82240 00000000 00000000 01100400 00000000 00000158 04000038
0x : 00000001 00000001 0000002c 01010001 00000024 01010000 80010005 80020002
0x : 80040002 8003fadd 800b0001 000c0004 00015180 0a000084 e0f7fe25 aad896e2
0x : 8841f3e8 f18ccbe2 21b257db 163fefbd 3d4f7420 4e3275d3 2ba73995 388e456f
0x : 626c62a3 07d71ed4 60f8702f 2c17e6f8 34481f44 47c18686 501a4d87 e6c7c804
0x : 678cbdc4 af58ac19 ed7f3b32 cf2303ee 003d2911 53abe765 d5c29e7c 13e8b080
0x : ee64ea44 a56be8d4 f5132ba5 39451407 093d787d 2abf91df 05000018 b4a3e421
0x : d819170e c57bb621 f7e4c073 f44f96ed 0d000008 09000000 0d000014 12f5f28c
0x : 457168a9 702d9fe2 74cc0100 0d00000c 09002689 dfd6b712 0d000014 90cb8091
0x : 3ebb696e 086381b5 ec427b1f 0d000014 4a131c81 07035845 5c5728f2 0e95452f
0x : 00000018 4048b7d5 6ebce885 25e7de7f 00d6c2d3 80000000
DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 )
ii : vnet inf 'C:\Program Files\ShrewSoft\VPN Client\drivers\virtualnet.inf'
<- : recv IKE packet from 10.1.101.26:500 ( 548 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 84100400 00000000 00000224 00000208
0x : 00010100 b36db2b6 a2a82240 785627ed 2ec596e4 01100400 00000000 00000770
0x : 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 80010005
0x : 80020002 80040002 8003fadd 800b0001 000c0004 00015180 0a000084 d18ee4e5
0x : 9b301ff3 c908d7b2 8b478b08 b4f7d4cd db448edd 7e93af84 eb33ceed 55215c2a
0x : 4dfa5a5c 08cb6d2e 8b5c81b8 3198f139 e2188769 273a365f c97169b4 57c24896
0x : 9880a69c 66631919 aa18788b cf998c43 8fe4efa3 897c5d11 996cc185 d362ae10
0x : 2ce8cb4c 88a743f7 37161e70 3f88b863 e3c93d80 6846dfe9 340558a8 05000014
0x : c07ce37c 0ef1a2d1 b7da7e44 d7de5ac7 060000c9 09000000 3081be31 0b300906
0x : 03550406 13025553 31123010 06035504 0813094d 696e6e65 736f7461 31143012
0x : 06035504 07130b4d 696e6e65 61706f6c 6973311a 30180603 55040a13 11566973
0x : 696f6e53 68617265 2c20496e 632e3119 30170603 55040b13 104d616e 61676564
0x : 20536572 76696365 73311f30 1d060355 04031316 636f772e 76697369 6f6e7368
0x : 61726569 6e632e63 6f6d312d 302b0609 2a864886 f70d0109 01161e70 65746572
0x : 2e656973 63684076 6973696f 6e736861 7265696e 632e636f 6d090004 ce043082
0x : 04c53082 03ada003 02010202 0100300d 06092a86 4886f70d 01010405 003081c0
0x : 310b3009 06035504 06130255 53311230 10060355 04081309 4d696e6e 65736f74
0x : 61311430
DB : ipsec peer found
DB : phase1 sa found
<< : fragment payload
ii : ike fragment received, waiting on complete packet
DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 )
DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 )
<- : recv IKE packet from 10.1.101.26:500 ( 548 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 84100400 00000000 00000224 00000208
0x : 00010200 12060355 0407130b 4d696e6e 6561706f 6c697331 1a301806 0355040a
0x : 13115669 73696f6e 53686172 652c2049 6e632e31 19301706 0355040b 13104d61
0x : 6e616765 64205365 72766963 65733121 301f0603 55040313 1876706e 63612e76
0x : 6973696f 6e736861 7265696e 632e636f 6d312d30 2b06092a 864886f7 0d010901
0x : 161e7065 7465722e 65697363 68407669 73696f6e 73686172 65696e63 2e636f6d
0x : 301e170d 30363037 32353134 34343030 5a170d30 38313030 32313434 3430305a
0x : 3081be31 0b300906 03550406 13025553 31123010 06035504 0813094d 696e6e65
0x : 736f7461 31143012 06035504 07130b4d 696e6e65 61706f6c 6973311a 30180603
0x : 55040a13 11566973 696f6e53 68617265 2c20496e 632e3119 30170603 55040b13
0x : 104d616e 61676564 20536572 76696365 73311f30 1d060355 04031316 636f772e
0x : 76697369 6f6e7368 61726569 6e632e63 6f6d312d 302b0609 2a864886 f70d0109
0x : 01161e70 65746572 2e656973 63684076 6973696f 6e736861 7265696e 632e636f
0x : 6d30819f 300d0609 2a864886 f70d0101 01050003 818d0030 81890281 8100b2cc
0x : 8ce039fd d0c2fdb9 78711471 55f74801 136f3132 97a902db d9fe4a9e 6bd962b9
0x : 482e3b61 66a678c0 4c0aeea1 008570ae 22f66d12 d2aadce1 e2897553 5b68d0b2
0x : f526685d 015b1c94 87400e9e 6ac6f3b1 e2206ebd 34491354 ee77be23 cf40cc89
0x : 4c09b9ad
DB : ipsec peer found
DB : phase1 sa found
<< : fragment payload
ii : ike fragment received, waiting on complete packet
DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 )
DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 )
<- : recv IKE packet from 10.1.101.26:500 ( 548 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 84100400 00000000 00000224 00000208
0x : 00010300 12ba2bea 0bdc11c1 5f233d95 2e3cc46c b3486110 d13b8cdf 4f450203
0x : 010001a3 82014c30 82014830 09060355 1d130402 3000302c 06096086 480186f8
0x : 42010d04 1f161d4f 70656e53 534c2047 656e6572 61746564 20436572 74696669
0x : 63617465 301d0603 551d0e04 16041422 a34c4b79 ad1af1ed c0f28a27 acea5378
0x : 56479d30 81ed0603 551d2304 81e53081 e2801485 ce35c882 035a3bef 4712c789
0x : ba3502bc 747f0ba1 81c6a481 c33081c0 310b3009 06035504 06130255 53311230
0x : 10060355 04081309 4d696e6e 65736f74 61311430 12060355 0407130b 4d696e6e
0x : 6561706f 6c697331 1a301806 0355040a 13115669 73696f6e 53686172 652c2049
0x : 6e632e31 19301706 0355040b 13104d61 6e616765 64205365 72766963 65733121
0x : 301f0603 55040313 1876706e 63612e76 6973696f 6e736861 7265696e 632e636f
0x : 6d312d30 2b06092a 864886f7 0d010901 161e7065 7465722e 65697363 68407669
0x : 73696f6e 73686172 65696e63 2e636f6d 82010030 0d06092a 864886f7 0d010104
0x : 05000382 01010031 db0702f8 970004e5 f98858a4 ee09631f e7a6bda0 383e6826
0x : 933019b6 145ba11c c96bf589 144954d9 c6e789b3 9f36f5f2 21a46c2f 9ff25b32
0x : ff41a738 82150233 244f3829 df0d80b7 55e7d145 939c1ca7 ad9b868b 86ddef90
0x : 4372fc5e d7a2b839 780c6e7d 598fb9dc 7998f3f7 b496dbda 871baffe 1884f26b
0x : 25a4ddad
DB : ipsec peer found
DB : phase1 sa found
<< : fragment payload
ii : ike fragment received, waiting on complete packet
DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 )
DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 )
<- : recv IKE packet from 10.1.101.26:500 ( 404 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 84100400 00000000 00000194 00000178
0x : 00010401 703c8486 b3b7e928 24ca02c6 a8b087a5 4d4c64df f195d841 cb49c87b
0x : 448bc4df 9ddbaf95 5ade6728 ac548905 e463979c 23e99a73 3ad3f82a b80287fa
0x : 8318fb7d 8d051037 240a3760 1e746bc7 ea934963 e84c504c a877d650 aeebd24c
0x : 9df54cd2 6c785665 84393014 31dad71c 9a23d786 7646ecdc fbeafd56 c85c893a
0x : e159c30a 11b35d0d 00008420 aff7d1ba 0113511e e55d5595 dd3ec97f de7a4e23
0x : fc16228b cf2088c5 fd061dff 0d76d572 43d95e00 74dc02ae f56c77bd b1d6d421
0x : 36ca77a3 76548b2c 2c136c8c fa7ecb0f 32a3b5bd c41d3e48 36a214fc d80a132e
0x : 66801e66 55fdad7d 814f5246 4bf51e01 1eda5f53 6c1d75e7 04d56bbc 57f10c10
0x : 310aff55 a5cb6fce 40c5da0d 00000c09 002689df d6b71207 00001412 f5f28c45
0x : 7168a970 2d9fe274 cc01000d 00000504 14000014 4a131c81 07035845 5c5728f2
0x : 0e95452f 14000018 fbaffda5 62769f3e 5a7a8b9d 498fd5f2 c6eb319c 00000018
0x : 9e0c1012 3b1651fe 771c9984 a9b79f01 f5c45a60
DB : ipsec peer found
DB : phase1 sa found
<< : fragment payload
ii : ike fragment received, processing complete packet
<< : security association payload
ii : matched phase1 proposal
ii : - protocol = isakmp
ii : - transform = ike
ii : - key length = default
ii : - cipher type = 3des
ii : - hash type = sha1
ii : - dh group = modp-1024
ii : - auth type = hybrid-initiator-rsa
ii : - life seconds = 86400
ii : - life kbytes = 0
<< : key exchange payload
<< : nonce payload
<< : identification payload
<< : certificate payload
<< : signature payload
<< : vendor id payload
ii : peer supports XAUTH
<< : vendor id payload
ii : peer supports UNITY
<< : cert request payload
<< : vendor id payload
ii : peer supports NAT-T RFC
<< : nat discovery payload
<< : nat discovery payload
== : DH shared secret ( 128 bytes ) =
0x : 764186bc addb0aac ffca8f04 99581cfe cce6c834 1d0d6483 97b830b6 3028ca46
0x : b18671fa debb378c 33be8d99 d462f310 08007da5 07512985 19f523cf ba242e3b
0x : 6ab15767 d856c637 975bfd57 29b3329c afd29674 3f18509e 281c67aa 3205d7d1
0x : 1b7be9d5 d24fd26d 3810c9fa 0e488fe1 9bffdae8 bd2c8352 6338c273 bb182827
== : SETKEYID ( 20 bytes ) =
0x : 77932721 1b076bb2 7573294c 3bf40382 c6c46f89
== : SETKEYID_d ( 20 bytes ) =
0x : 21dcad7e e9926375 9ce878bb 594a32dc 2e7d5f36
== : SETKEYID_a ( 20 bytes ) =
0x : 56012cb1 1168c25c a12ed31e 014992d7 d0a22af9
== : SETKEYID_e ( 20 bytes ) =
0x : 353f9c71 df817a68 3fad7dda e690000e 0d329a43
== : cipher key ( 40 bytes ) =
0x : ceeaadfd 942e0800 cfe991a3 17e420de 7ca59efa cae1eb8c 2d86c694 76dd3fa9
0x : edeefd9b 7065a909
== : cipher iv ( 8 bytes ) =
0x : e2537eeb e49bf5d8
== : phase1 hash_i ( computed ) ( 20 bytes ) =
0x : 443786bf e23edc6b 65e08059 8b95af51 815f3cc9
>> : hash payload
>> : nat discovery payload
>> : nat discovery payload
>= : encrypt iv ( 8 bytes ) =
0x : e2537eeb e49bf5d8
=> : encrypt packet ( 100 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08100401 00000000 00000034 00000018
0x : 443786bf e23edc6b 65e08059 8b95af51 815f3cc9 14000018 9e0c1012 3b1651fe
0x : 771c9984 a9b79f01 f5c45a60 00000018 fbaffda5 62769f3e 5a7a8b9d 498fd5f2
0x : c6eb319c
== : stored iv ( 8 bytes ) =
0x : 49da68e0 95dbad22
-> : send IKE packet to 10.1.101.26:500 ( 100 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08100401 00000000 00000064 6cb886b6
0x : 298ae5aa a67cc523 a03e66cc 6a9641b8 a58affa2 224af25d f84dfd4f 2ee189e1
0x : 7c5c49ee 4d55f04c 6137420f bc048de0 5356f6c9 ffd09bee a7f4ad79 49da68e0
0x : 95dbad22
ii : unable to get certificate CRL(3) at depth:0
ii : subject :/C=US/ST=Minnesota/L=Minneapolis/O=VisionShare,
Inc./OU=Managed 
Services/CN=cow.visionshareinc.com/emailAddress=peter.eisch at visionshareinc.c
om
ii : unable to get certificate CRL(3) at depth:1
ii : subject :/C=US/ST=Minnesota/L=Minneapolis/O=VisionShare,
Inc./OU=Managed 
Services/CN=vpnca.visionshareinc.com/emailAddress=peter.eisch at visionshareinc
.com
== : phase1 hash_r ( computed ) ( 20 bytes ) =
0x : 9d2b4b34 d522ce39 deca59e3 77cf4226 046456ae
== : phase1 hash_r ( received ) ( 20 bytes ) =
0x : 9d2b4b34 d522ce39 deca59e3 77cf4226 046456ae
II | phase1 sa established
II | 10.1.200.170:500 <-> 10.1.101.26:500
II | b36db2b6a2a82240:785627ed2ec596e4
>> : hash payload
>> : notification payload
== : new informational hash ( 20 bytes ) =
0x : 572fea67 94625673 d891e2d4 6a96e85f cc8b383f
== : new phase2 iv ( 8 bytes ) =
0x : 84001de6 ccfd2ac6
>= : encrypt iv ( 8 bytes ) =
0x : 84001de6 ccfd2ac6
=> : encrypt packet ( 80 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08100501 84be2329 00000050 0b000018
0x : 572fea67 94625673 d891e2d4 6a96e85f cc8b383f 0000001c 00000001 01106002
0x : b36db2b6 a2a82240 785627ed 2ec596e4
== : stored iv ( 8 bytes ) =
0x : 9d1cbe94 55b0d2ac
-> : send IKE packet to 10.1.101.26:500 ( 84 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08100501 84be2329 00000054 0ef1b236
0x : 08de2a70 9ff6b857 e8b6b8d2 a0def0e0 f268f2a6 61c4c1b8 831c59ff d6715ace
0x : 2f9c5d80 a6377620 a919cd56 9d1cbe94 55b0d2ac
II | sent peer notification, INITIAL-CONTACT
II | 10.1.200.170 -> 10.1.101.26
II | isakmp spi = b36db2b6a2a82240:785627ed2ec596e4
DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 )
DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 )
<- : recv IKE packet from 10.1.101.26:500 ( 76 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08100601 e616e13a 0000004c ab1150a8
0x : bb38a7ab b5576d34 4294b800 ba23759c a1595cf9 40e4fc6c 1b0a1491 d303f038
0x : 4df81d88 1dcfe3c8 4bad4a00
DB : ipsec peer found
DB : phase1 sa found
DB : config not found
DB : config added
== : new phase2 iv ( 8 bytes ) =
0x : c9a6977b 2fcfd4c0
=< : decrypt iv ( 8 bytes ) =
0x : c9a6977b 2fcfd4c0
<= : decrypt packet ( 76 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08100601 e616e13a 0000004c 0e000018
0x : ccbe12a6 02ab31ea 0b04cf19 44492ba9 df9fa8a1 00000014 010008e6 c0880000
0x : 40890000 408a0000 cdfbad03
== : stored iv ( 8 bytes ) =
0x : 1dcfe3c8 4bad4a00
<< : hash payload
<< : attribute payload
ii : received xauth request
>> : hash payload
>> : attribute payload
== : new configure hash ( 20 bytes ) =
0x : f1da3b03 e45d3208 fd347fbe 580995dd da69c376
>= : encrypt iv ( 8 bytes ) =
0x : 1dcfe3c8 4bad4a00
=> : encrypt packet ( 84 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08100601 e616e13a 00000054 0e000018
0x : f1da3b03 e45d3208 fd347fbe 580995dd da69c376 00000020 020008e6 c0880000
0x : 40890005 726f636b 79408a00 07706574 65727077
== : stored iv ( 8 bytes ) =
0x : f1c58e1e e98725e0
-> : send IKE packet to 10.1.101.26:500 ( 84 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08100601 e616e13a 00000054 7c949bb6
0x : d7698ba6 44f74fbf 0847ff0c 54e1590b 10419731 4d990300 e38e67d2 aae07def
0x : 62ba1aba 6486bba5 d9fcc63e f1c58e1e e98725e0
DB : config dereferenced ( ref count = 0, config count = 1 )
ii : sent xauth reply with 'rocky' credentials
DB : config deleted
DB : tunnel dereferenced ( ref count = 2, tunnel count = 1 )
DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 )
DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 )
<- : recv IKE packet from 10.1.101.26:500 ( 68 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08100601 b6419f85 00000044 3bc6f5a2
0x : 9342468b 3bb1559c 39ffbf89 4ead6b9a 0f20c963 2cc68791 313e6c16 f3bb06cb
0x : f5bfe38c
DB : ipsec peer found
DB : phase1 sa found
DB : config not found
DB : config added
== : new phase2 iv ( 8 bytes ) =
0x : 6196a7c9 dddede44
=< : decrypt iv ( 8 bytes ) =
0x : 6196a7c9 dddede44
<= : decrypt packet ( 68 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08100601 b6419f85 00000044 0e000018
0x : 00266515 3b3fe771 4437b667 f6588642 9c9735c5 0000000c 030008e6 c08f0001
0x : ddd2b303
== : stored iv ( 8 bytes ) =
0x : f3bb06cb f5bfe38c
<< : hash payload
<< : attribute payload
ii : received xauth result
ii : user authentication succeeded
>> : hash payload
>> : attribute payload
== : new configure hash ( 20 bytes ) =
0x : 76680737 ed71083c b60dd527 dacb6629 e7d976bf
>= : encrypt iv ( 8 bytes ) =
0x : f3bb06cb f5bfe38c
=> : encrypt packet ( 60 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08100601 b6419f85 0000003c 0e000018
0x : 76680737 ed71083c b60dd527 dacb6629 e7d976bf 00000008 040008e6
== : stored iv ( 8 bytes ) =
0x : 50475d3d d938e89b
-> : send IKE packet to 10.1.101.26:500 ( 60 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08100601 b6419f85 0000003c 0bfa8565
0x : 612eb8fc d969369a 657d2209 2017a662 60583ccb 50475d3d d938e89b
DB : config dereferenced ( ref count = 0, config count = 1 )
DB : config added
== : new phase2 iv ( 8 bytes ) =
0x : 034ce5ca f3e383f0
ii : determining required modecfg attributes
ii : - IP4 Address
ii : - IP4 Netamask
ii : - IP4 DNS Server
ii : - IP4 DNS Suffix
ii : - Split DNS Domains
ii : - IP4 WINS Server
ii : - IP4 Split Network Include List
ii : - IP4 Split Network Exclude List
ii : sending isakmp config request
>> : hash payload
>> : attribute payload
== : new configure hash ( 20 bytes ) =
0x : 6297db3d 619118f2 24b2b153 9fe9708d 0914ec98
>= : encrypt iv ( 8 bytes ) =
0x : 034ce5ca f3e383f0
=> : encrypt packet ( 92 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08100601 aed66ce1 0000005c 0e000018
0x : 6297db3d 619118f2 24b2b153 9fe9708d 0914ec98 00000028 01005290 00010000
0x : 00020000 00030000 70020000 70030000 00040000 70040000 70060000
== : stored iv ( 8 bytes ) =
0x : 7a0c0d13 b0868798
-> : send IKE packet to 10.1.101.26:500 ( 92 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08100601 aed66ce1 0000005c bc79e7d4
0x : d76bba20 6f1ef278 204a7314 57ae7b5b 61860805 f529db86 27903f88 fdc6f6d7
0x : 0258cc0d 461fb36e e79ab35f f947bd92 b1aeddb7 7a0c0d13 b0868798
DB : config dereferenced ( ref count = 0, config count = 2 )
DB : config deleted
DB : tunnel dereferenced ( ref count = 3, tunnel count = 1 )
DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 )
DB : tunnel dereferenced ( ref count = 2, tunnel count = 1 )
<- : recv IKE packet from 10.1.101.26:500 ( 100 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08100601 aed66ce1 00000064 a7e8538f
0x : a847ae5d 2400bd13 08844563 b3f673db 1d588dea 04844a75 6b8718d7 6733a0b9
0x : 90576dcc 7e466f1b 966160e3 a5d23953 1de3a40c b892fba5 97af26f3 9d5c1dbb
0x : fe31041d
DB : ipsec peer found
DB : phase1 sa found
DB : config found
=< : decrypt iv ( 8 bytes ) =
0x : 7a0c0d13 b0868798
<= : decrypt packet ( 100 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08100601 aed66ce1 00000064 0e000018
0x : 03be3d2a 4186d943 000d1da4 285eaa7e cb2236c3 00000028 02005290 00010004
0x : 0a01ca01 00020004 ffffff00 00030004 0a01647e 00040004 0a01647e f3b9bfa2
0x : e8b8ca07
== : stored iv ( 8 bytes ) =
0x : 9d5c1dbb fe31041d
<< : hash payload
<< : attribute payload
ii : received isakmp config reply
ii : - IP4 Address = 10.1.202.1
ii : - IP4 Netmask = 255.255.255.0
ii : - IP4 DNS Server = 10.1.100.126
ii : - IP4 WINS Server = 10.1.100.126
DB : config dereferenced ( ref count = 0, config count = 1 )
DB : config deleted
DB : tunnel dereferenced ( ref count = 2, tunnel count = 1 )
DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 )
DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 )
ii : created vnet device 'ROOT\VNET\0000'
ii : client recv thread begin ...
DB : phase1 sa found
DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 )
ii : inspecting VNet DHCP packet ...
ii : - xid = 2792831384
ii : - secs = 0
ii : - flags = 0000
ii : - ciaddr = 0.0.0.0
ii : - yiaddr = 0.0.0.0
ii : - siaddr = 0.0.0.0
ii : - giaddr = 0.0.0.0
ii : - chaddr = aa:aa:aa:aa:aa:00
ii : - message type DHCP discover
ii : - unknown option ( 74 )
ii : - clientid, 7 bytes
ii : - hostname 'merom'
ii : - class/vendor id, 8 bytes ( ignored )
ii : - requested options
ii : - subnet mask
ii : - dns suffix
ii : - default router
ii : - dns server
ii : - netbios name server
ii : - netbios node type
ii : - netbios over TCP scope
ii : - perform router discover
ii : - static routes
!! : - unknown option ( f9 )
ii : - vendor specific data
ii : responding to VNet DHCP packet ...
ii : - xid = 2792831384
ii : - secs = 0
ii : - flags = 0000
ii : - ciaddr = 0.0.0.0
ii : - yiaddr = 10.1.202.1
ii : - siaddr = 0.0.0.0
ii : - giaddr = 0.0.0.0
ii : - chaddr = aa:aa:aa:aa:aa:00
ii : - message type DHCP offer
ii : - server address 10.1.101.26
ii : - lease period 600 seconds
ii : - subnet mask 255.255.255.0
ii : - dns server 10.1.100.126
ii : - netbios name server 10.1.100.126
ii : - default route 10.1.202.1
ii : inspecting VNet DHCP packet ...
ii : - xid = 2792831384
ii : - secs = 0
ii : - flags = 0000
ii : - ciaddr = 0.0.0.0
ii : - yiaddr = 0.0.0.0
ii : - siaddr = 0.0.0.0
ii : - giaddr = 0.0.0.0
ii : - chaddr = aa:aa:aa:aa:aa:00
ii : - message type DHCP request
ii : - clientid, 7 bytes
ii : - unknown option ( 32 )
ii : - unknown option ( 36 )
ii : - hostname 'merom'
ii : - unknown option ( 51 )
ii : - class/vendor id, 8 bytes ( ignored )
ii : - requested options
ii : - subnet mask
ii : - dns suffix
ii : - default router
ii : - dns server
ii : - netbios name server
ii : - netbios node type
ii : - netbios over TCP scope
ii : - perform router discover
ii : - static routes
!! : - unknown option ( f9 )
ii : - vendor specific data
ii : responding to VNet DHCP packet ...
ii : - xid = 2792831384
ii : - secs = 0
ii : - flags = 0000
ii : - ciaddr = 0.0.0.0
ii : - yiaddr = 10.1.202.1
ii : - siaddr = 0.0.0.0
ii : - giaddr = 0.0.0.0
ii : - chaddr = aa:aa:aa:aa:aa:00
ii : - message type DHCP acknowledge
ii : - server address 10.1.101.26
ii : - lease period 600 seconds
ii : - subnet mask 255.255.255.0
ii : - dns server 10.1.100.126
ii : - netbios name server 10.1.100.126
ii : - default route 10.1.202.1
ii : added host route for remote peer
ii : added tunnel default route
ii : inspecting VNet ARP request ...
ii : inspecting VNet ARP request ...
ii : inspecting VNet ARP request ...
ii : inspecting VNet ARP request ...
ii : responding to VNet ARP request for 10.1.100.126
DB : phase2 sa not found
DB : phase2 sa not found
DB : phase1 sa found
DB : new phase2 sa ( IPSEC initiator )
DB : phase2 sa added
== : new phase2 iv ( 8 bytes ) =
0x : 84001de6 ccfd2ac6
>> : hash payload
>> : security association payload
>> : nonce payload
>> : key exchange payload
>> : identification payload
>> : identification payload
== : phase2 hash_i ( computed ) ( 20 bytes ) =
0x : 94f613a7 3ef9471a ffbabca4 58c8c040 d7f1e0c7
>= : encrypt iv ( 8 bytes ) =
0x : 84001de6 ccfd2ac6
=> : encrypt packet ( 296 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08102001 84be2329 00000128 01000018
0x : 94f613a7 3ef9471a ffbabca4 58c8c040 d7f1e0c7 0a00003c 00000001 00000001
0x : 00000030 01030401 1c0d5e24 00000024 010c0000 80040001 80060080 80050002
0x : 80030002 80010001 00020004 00000e10 04000018 e16cd6ae 529049f1 f1bbe9eb
0x : b3a6db3c 870c3e99 05000084 a7693a8e e9c9c364 8729c78d 9daa3ce6 838022cf
0x : 812910fe f1ae4e0c aa13205b ff45608b 7b7e2ed0 0c6621ba 87f81fb8 3c80b72b
0x : 3577a1a8 02c0340c 8a9f34b7 52c48672 bf7dfc44 d96a592e ec92d889 556e413f
0x : f18154f2 d1dc5f8c dff78cc2 99628363 2ed536d8 7d70ff82 2ec4787b 7df7899f
0x : 397fe874 1c7d40f7 acefba97 0500000c 01000000 0a01ca01 00000010 04000000
0x : 00000000 00000000
== : stored iv ( 8 bytes ) =
0x : 9d43d5ec 0908bcbc
-> : send IKE packet to 10.1.101.26:500 ( 300 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08102001 84be2329 0000012c 079fca79
0x : 1b2aa7d1 10e0cae1 895b6aaf b537e62b e97e4862 b2e340c4 72e61c98 47ffd59a
0x : 1ce78385 e2101737 05c7d48b c7d997b5 697a2b66 10a37d2e 0bef3524 289bb85a
0x : cd4138bd 10fa301d 6c1cb8b0 08ec90bf cef863d4 5063e927 1a6ca6c0 4c72cfb6
0x : 6e5cecf3 c8c4076d a0116110 4d9c5bb9 02c3903c 992fccc6 478dea8f 31707acc
0x : ef19562d ecfcae0b ec505db8 dc665f0a 70c0b40c 8b3c1527 5d3a2dcf 29df935c
0x : ede2776f 893d3756 1b2058c1 7bb1a5f9 df26a890 8efa6288 314215c0 ad16cba7
0x : eb13eed8 6d4753b6 405b6f09 1a6fed6f ada2307e 3da1e24f d3e7fa04 128056d6
0x : 26c638f7 0084b703 f93c7ecd d9b6d6dd b3fba4e0 33f67978 f342c6ca 2010dea3
0x : eb0aa9ae 9d43d5ec 0908bcbc
ii : rebuilding interface list ...
ii : interface IP=10.1.202.1, MTU=1500 active
ii : interface IP=10.1.200.170, MTU=1500 active
ii : 2 adapter(s) active
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 1 )
DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 )
ii | outbound packet has been queued
ii | no mature sa found for 10.1.200.170 -> 10.1.100.126
ii : inspecting VNet ARP request ...
ii : responding to VNet ARP request for 10.1.100.125
DB : phase2 sa not found
DB : phase2 sa not found
DB : phase1 sa found
DB : new phase2 sa ( IPSEC initiator )
DB : phase2 sa added
== : new phase2 iv ( 8 bytes ) =
0x : f2ff738c 0db9ee90
>> : hash payload
>> : security association payload
>> : nonce payload
>> : key exchange payload
>> : identification payload
>> : identification payload
== : phase2 hash_i ( computed ) ( 20 bytes ) =
0x : be1c480c 01436b3f 72b334c8 caff6ab9 754e1b66
>= : encrypt iv ( 8 bytes ) =
0x : f2ff738c 0db9ee90
=> : encrypt packet ( 296 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08102001 de47b706 00000128 01000018
0x : be1c480c 01436b3f 72b334c8 caff6ab9 754e1b66 0a00003c 00000001 00000001
0x : 00000030 01030401 3b45f596 00000024 010c0000 80040001 80060080 80050002
0x : 80030002 80010001 00020004 00000e10 04000018 b3124dc8 43bb8ba6 1f035a7d
0x : 0938251f 5dd4cbfc 05000084 6fd2f303 aa6c2182 c1561a66 a7c82bfe bc55a70f
0x : e25e60d7 694b39da a1e84a14 ce61e608 b9669bc4 f35a360a 60d55548 46864062
0x : 954f7fb6 96cc3676 76ecd536 bc0e4106 f90ec193 957e39d0 528af256 17594d39
0x : 9ea0e605 500df094 b07d8fce f55aec31 9dff7140 c3ab8b91 d41e60ba 239be2f7
0x : efb67744 640d8b12 0d06f6d6 0500000c 01000000 0a01ca01 00000010 04000000
0x : 00000000 00000000
== : stored iv ( 8 bytes ) =
0x : 29544646 27458ef2
-> : send IKE packet to 10.1.101.26:500 ( 300 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08102001 de47b706 0000012c 35effac3
0x : a15d40ce 59f07f77 1130e89e 0e659d98 46be5f84 f709abfd 2964398a 21b20a9a
0x : a31ee7d4 ef47ad6f aacf583b ee3268cf 2d8481f5 249b9d6b 0f2c8080 41f67a4b
0x : 821ca59a eba70130 136c7e7e f0be7395 4ac453bc 96a59bff ca97db7c f12eb4c4
0x : cbc00f20 51ec3d3b 818b315f dd707692 da1aff8f a12869cd 4ef8a71d 75390101
0x : d7a86807 1a0d8338 efe35e56 f25d78fa 3997cb04 8aa8d096 382399cd dcf72e9d
0x : 532f4f71 7aebbf9e 8cd55df5 58fe007a be0b9243 2d65fd50 fb1421d7 b36806f3
0x : b8ca0587 5208b590 29877e03 d330d85b b5d4b640 f3ff7134 8145f394 ab874357
0x : cfd4d158 804597e6 d9f146eb 71519d15 f4069937 c6056665 a3359943 824e0798
0x : 487d8bfb 29544646 27458ef2
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 2 )
DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 )
ii | outbound packet has been queued
ii | no mature sa found for 10.1.202.1 -> 10.1.100.126
DB : phase2 sa not found
DB : phase2 sa not found
DB : phase1 sa found
DB : new phase2 sa ( IPSEC initiator )
DB : phase2 sa added
== : new phase2 iv ( 8 bytes ) =
0x : 076c7418 db9eedd0
>> : hash payload
>> : security association payload
>> : nonce payload
>> : key exchange payload
>> : identification payload
>> : identification payload
== : phase2 hash_i ( computed ) ( 20 bytes ) =
0x : c42fed6e df69338c 83667f7c 33e8d5d1 2f5a6e07
>= : encrypt iv ( 8 bytes ) =
0x : 076c7418 db9eedd0
=> : encrypt packet ( 296 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08102001 0a890d13 00000128 01000018
0x : c42fed6e df69338c 83667f7c 33e8d5d1 2f5a6e07 0a00003c 00000001 00000001
0x : 00000030 01030401 f2144fad 00000024 010c0000 80040001 80060080 80050002
0x : 80030002 80010001 00020004 00000e10 04000018 1cdbae32 209a50ee 407836fd
0x : 124932f6 9e7d49dc 05000084 bb1c0a28 3e90f1bb 572839a3 53230cce 6e5c9607
0x : bc3a338a 9e173587 21a63c75 7cd24bcf 96e02cc0 91b23af5 8a056bcb 2f653881
0x : 9c6cf285 e5058b44 45253a56 5250b1a4 b21d0b0c 5fa078f0 a3c40701 5f1ab32e
0x : abeb9d00 6055b3af 5ebce7c1 09b52161 f52a0f5e 0f66e798 8008d502 7debefd8
0x : 088d8034 01bdf6d6 51a524f3 0500000c 01000000 0a01ca01 00000010 04000000
0x : 00000000 00000000
== : stored iv ( 8 bytes ) =
0x : 36b4bd9b 289f4cab
-> : send IKE packet to 10.1.101.26:500 ( 300 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08102001 0a890d13 0000012c 15b28067
0x : 667886a9 3649bafe 3be44bf1 5d20a12e dfa5b7a8 71cd9c0d 68e1b90e 10b68aeb
0x : fa7d1a7a 4455ad74 3a0621aa d44bdf55 d537c48b 4780e239 407ac8b0 1b23df44
0x : b3aebfcc 9c06db86 4a6af3f9 870053e8 af57ee1c b4add5e4 86596ea0 80686eb1
0x : 77f25274 3bbde172 fdaa55a6 9193273b c17b681e 91016487 36f4f45a b9499761
0x : cbcf4f2b 49a4be00 0f21b321 a04367a3 85a292fe 9599615e 6950425a 7968b930
0x : aeff8e5f 7601d0d2 cc5d1342 4cdcfa83 210600e2 88881d0a 7eba3b19 8c126975
0x : 64b2b257 002c5cf6 5382a82d 3abe4cf1 4f499ab0 4115ac7f 3331b9a5 2bb6efc9
0x : 627f4ae7 7d69bad0 40532996 bc7d728a 64074edf 6bcf2c73 56af19aa 90492e48
0x : 8b047f47 36b4bd9b 289f4cab
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 3 )
DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 )
ii | outbound packet has been queued
ii | no mature sa found for 10.1.200.170 -> 10.1.100.125
DB : phase2 sa not found
DB : phase2 sa not found
DB : phase1 sa found
DB : new phase2 sa ( IPSEC initiator )
DB : phase2 sa added
== : new phase2 iv ( 8 bytes ) =
0x : cd42b18b 004b849e
>> : hash payload
>> : security association payload
>> : nonce payload
>> : key exchange payload
>> : identification payload
>> : identification payload
== : phase2 hash_i ( computed ) ( 20 bytes ) =
0x : fb89c9b5 a47da64f 9ea5908c 24f6c0f8 35a591e8
>= : encrypt iv ( 8 bytes ) =
0x : cd42b18b 004b849e
=> : encrypt packet ( 296 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08102001 d0664044 00000128 01000018
0x : fb89c9b5 a47da64f 9ea5908c 24f6c0f8 35a591e8 0a00003c 00000001 00000001
0x : 00000030 01030401 499d72b9 00000024 010c0000 80040001 80060080 80050002
0x : 80030002 80010001 00020004 00000e10 04000018 6bc430b7 323ba122 f622919d
0x : e18b1fda b0ca9902 05000084 c1c39f51 1b5f0183 a8fc1878 0f579c53 62aca4f4
0x : b8b1f131 0e4fdaa7 b6e6f162 a60dfbce d07e5d2e 62c44680 d2dd1d63 b28b979c
0x : 97a6a363 d1c3dc77 49772c83 bf89bcfe 11023dbd 94c57b2e 463aacd1 d1c6bffc
0x : 323cd97e f1610e36 8e18dc41 fc9a0c01 4d797a55 960ea08e 94a6bbe5 95d2f05b
0x : e60854ce 93a3ad9b 4ecb3d7e 0500000c 01000000 0a01ca01 00000010 04000000
0x : 00000000 00000000
== : stored iv ( 8 bytes ) =
0x : 58552ad2 3c04acc0
-> : send IKE packet to 10.1.101.26:500 ( 300 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08102001 d0664044 0000012c 4bbeb2d6
0x : 6a2d51d5 258d44e9 1c327c52 3bfa02ba 7da879f2 41162444 efc6a608 78a802e5
0x : fde8c10b 21f72d13 1e3154a8 bbc2cf0c acb60040 8213bc54 d02ae76b 3e2befd4
0x : f3bc4eea b6b642a5 52713764 aee0adb4 0de971fc 588a8bfd 632ddb3c 770f5162
0x : b3f10ada dc7a94fb cbe2bfd0 a117692f 486f41c3 be3f7974 482540fd 87ee30c5
0x : 795db104 145171e8 7a24a65a 62d0d91f 56e7f902 770f2a5b b6533537 65917634
0x : 1f1be6bd 64324d6a 46ea4847 5f22ae4c e1c171c5 c59c28c3 eaaf86a6 e1abc96b
0x : 391dcb4f eda55367 e781cadb 709561b3 1f5f8346 79c3de77 0b14534d 45d3ea09
0x : 3a1d31be 0449cd07 ef03ca2b 9e0212f4 bd129625 d114033b af7aad58 c3e09955
0x : 460de755 58552ad2 3c04acc0
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 4 )
DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 )
ii | outbound packet has been queued
ii | no mature sa found for 10.1.202.1 -> 224.0.0.22
DB : phase2 sa not found
DB : phase2 sa not found
DB : phase1 sa found
DB : new phase2 sa ( IPSEC initiator )
DB : phase2 sa added
== : new phase2 iv ( 8 bytes ) =
0x : 8aa6454b 696c4e7a
>> : hash payload
>> : security association payload
>> : nonce payload
>> : key exchange payload
>> : identification payload
>> : identification payload
== : phase2 hash_i ( computed ) ( 20 bytes ) =
0x : 5a54ef67 076bee69 f3c8b53d 2d5546a4 5a16d670
>= : encrypt iv ( 8 bytes ) =
0x : 8aa6454b 696c4e7a
=> : encrypt packet ( 296 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08102001 c57e802c 00000128 01000018
0x : 5a54ef67 076bee69 f3c8b53d 2d5546a4 5a16d670 0a00003c 00000001 00000001
0x : 00000030 01030401 4957ef83 00000024 010c0000 80040001 80060080 80050002
0x : 80030002 80010001 00020004 00000e10 04000018 99d5e980 b2eac9cc 53bf67d6
0x : bf14d67e 2ddc8e66 05000084 096328af b9295a9a 03be5357 1823c9d7 d47bd339
0x : 5887c340 9c804bcc 806246c7 bb3c2fa8 e08751a9 2021adff 98fddf7f 10570701
0x : de417852 83abfd0a 297735d2 d5bc286d 4c87f69d 2ec7b1db b814381c 45cb859f
0x : 734fac4a 2b85d995 3cb383d2 5a985bff 6e15bd6a a6bf1707 245ccd3b edba6878
0x : 44aa0036 3c67421b 72433b99 0500000c 01000000 0a01ca01 00000010 04000000
0x : 00000000 00000000
== : stored iv ( 8 bytes ) =
0x : 790cabf5 e264d06a
-> : send IKE packet to 10.1.101.26:500 ( 300 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08102001 c57e802c 0000012c 650d55e4
0x : f1a74658 f1d7ef69 d4e22c7f fd6664f0 138fe03b ff6810c4 7b7fa68d 31e97e06
0x : 69e68088 251ec398 c93eba48 635287ab 189e941f d48c8674 cd30261c 680e8c9e
0x : 3b55531b 83a00581 4bdc0472 408608bd 25e21898 d3e75758 c72862a3 89a59874
0x : d7b00b5d 364ecdf9 edb81b4f fc1ad77b cf84e8db f0ca9c33 5ed5ce4e 7d2214d2
0x : 4d258eb3 5832d3dd 3dab9a23 23c40ea6 dabaab77 03e93143 d5c97974 05e846cc
0x : 33920dea f8866f3c 85188b9a 7a7e582d d2f401b3 440b633f 09bd1173 80453b86
0x : 08915539 61418d7c 5033703e 8e0fc795 01a4c5b9 8b016c20 8b1a8be7 0ba69eb4
0x : 9932cb1e 61489de1 e16f4c26 8e90a025 5d485254 7ab79b15 f0d12ee7 8a1b3e1b
0x : 0e46cfa1 790cabf5 e264d06a
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 )
ii | outbound packet has been queued
ii | no mature sa found for 10.1.202.1 -> 10.1.100.126
<- : recv IKE packet from 10.1.101.26:500 ( 300 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08102001 84be2329 0000012c b44bba71
0x : f1084e77 03c5b412 41f59962 84706740 f7705f87 0488fd7d ac90d6cb 5306d71b
0x : 51ac7a44 46de86a1 ba3603ea e34b44ae 6cb7023a 7b2af652 64f2b97c 0f8e5c9e
0x : e354f7b3 efebed2c d52cbe84 5eb9723c 20dff837 79301bfa c167fa9c eadfa145
0x : 0896221b 7dcf8ef1 40fa5fba e8042689 7750023c c2009824 53771e91 e1a77118
0x : 863e12d5 0e1967cf bdbe649f b4321408 af5c0cdf 7447c236 7f52afbd aab0ea2d
0x : 52755632 03578458 e15317e7 d530ed3f 8c708db9 b495046d 573242bb e6ae2bf2
0x : 0f759abd 622ca9ce 44121871 7b84479b 30096382 3da5cb48 746b3b22 7c1c58bf
0x : 0d3e710e c788fbc3 d49a2b09 08aa5198 7dd1a2e7 594792b9 d8c372b9 0509efa3
0x : a258f46f 61dd8b0f 0b6c9133
DB : ipsec peer found
DB : phase1 sa found
DB : phase2 sa found
=< : decrypt iv ( 8 bytes ) =
0x : 9d43d5ec 0908bcbc
<= : decrypt packet ( 300 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08102001 84be2329 0000012c 01000018
0x : e7f44b5b b0e78b88 1a58eaee 07b51451 7ae79f82 0a00003c 00000001 00000001
0x : 00000030 01030401 08a9291e 00000024 010c0000 80040001 80060080 80050002
0x : 80030002 80010001 00020004 00000e10 04000014 eb946de1 3dfda48e 5246a947
0x : 0ce1d558 05000084 921ada7e e4bc0ea3 f8b16bee 6f3028bf 4904140e 7d938a52
0x : 0a7821fd 95dd8a2a 970d2018 709ac53f bcfd5e5a cf35b064 24b99744 c02b8758
0x : ee442166 89402914 cfb53cf5 68386775 7bc86322 e874043b 58155b97 1aef42d6
0x : a0e83be2 e0e0c2ce 1ba804a4 763d84b9 5442690b 697e26e8 40c141ca 9111d9fe
0x : 9a6ed7c2 ac95217f 0500000c 01000000 0a01ca01 00000010 04000000 00000000
0x : 00000000 f594f1a9 b3a49407
== : stored iv ( 8 bytes ) =
0x : 61dd8b0f 0b6c9133
<< : hash payload
<< : security association payload
ii : matched phase2 proposal
ii : - protocol = ipsec-esp
ii : - encap mode = tunnel
ii : - transform = esp-aes
ii : - key length = 128 bits
ii : - auth type = hmac-sha
ii : - pfs dh group = modp-1024
ii : - life seconds = 3600
ii : - life kbytes = 0
<< : nonce payload
<< : key exchange payload
<< : identification payload
<< : identification payload
== : phase2 hash_r ( computed ) ( 20 bytes ) =
0x : e7f44b5b b0e78b88 1a58eaee 07b51451 7ae79f82
== : phase2 hash_r ( received ) ( 20 bytes ) =
0x : e7f44b5b b0e78b88 1a58eaee 07b51451 7ae79f82
II | phase2 sa established
II | 10.1.200.170:500 <-> 10.1.101.26:500
II | outbound spi = 0x08a9291e
II | inbound spi = 0x1c0d5e24
== : pfs dh shared secret ( 128 bytes ) =
0x : 7b61bcbd 9e43fe04 176d17ae 42e824ce 16197da0 5876b180 2dbaf7d2 a28a24ae
0x : 747552a6 29140d02 dac708da 3689643a e16e8471 f7a1c95d 6f5d26c9 a607fcf5
0x : 24838bee 227f0889 d49a6ea1 4745fa33 829049c2 b0e9bd7b a423b06b 2b69a547
0x : b6c0ed86 cce5ba14 50d66f0e 7e8aa22a 9390829e 4dd737c1 bab3e329 74b7d094
== : inbound spi key data ( 40 bytes ) =
0x : 9fb68f40 d3a9c3c9 8e53a7a5 3146e052 7c0b1c3f 420254ea 4cfacbcb 95ceef00
0x : 6e0424d4 1463e10b
== : outbound spi key data ( 40 bytes ) =
0x : d94a51fa 6e54899e cef097fe 7f09d401 0f492356 cac62711 1beec0fa 5d1496da
0x : cc593334 423f0424
ii | outbound packet has been de-queued
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 676954c7 92cd2a13 0cb1a3d3
-> : send ESP packet to 10.1.101.26 ( 148 bytes ) =
0x : 08a9291e 00000001 49f1f1bb e9ebb3a6 db3c870c 3e99245e 50340eef cd3c8fb8
0x : 47d9a9cc 299ccc85 a22a41d9 ba47bf0a 4a231191 8a4d34d6 8be6596f 91a8571b
0x : efea471c 833f239f bcb4ee9d 31d41298 1f385a86 42e8b3a6 0e7a0174 2f620495
0x : e0fba618 18a8a686 efa64e6b 8f4cde19 2b81d9e4 47163c2b c1bd6935 106975cf
0x : 8595f611 ab293e07 676954c7 92cd2a13 0cb1a3d3
== : phase2 hash_p ( computed ) ( 20 bytes ) =
0x : e5dee531 9c95d7f6 492a44c5 d4ac27a0 f1102663
>> : hash payload
>= : encrypt iv ( 8 bytes ) =
0x : 61dd8b0f 0b6c9133
=> : encrypt packet ( 52 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08102001 84be2329 00000034 00000018
0x : e5dee531 9c95d7f6 492a44c5 d4ac27a0 f1102663
== : stored iv ( 8 bytes ) =
0x : ac19329b 16df9548
-> : send IKE packet to 10.1.101.26:500 ( 52 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08102001 84be2329 00000034 4ffc85e0
0x : 0099f06c c3438286 4e28f59c ac19329b 16df9548
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 )
DB : tunnel dereferenced ( ref count = 6, tunnel count = 1 )
<- : recv IKE packet from 10.1.101.26:500 ( 300 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08102001 de47b706 0000012c 4e8853d7
0x : 870511a7 ce86c682 7aa59b24 a845e6f2 d5f11aa8 ec0b6384 a22d12d2 bb553774
0x : 47aa998b 6d2acca4 398c2e98 8afdf882 c2355596 a5c576b2 bf079a23 dc56cdb7
0x : d7cf88a2 dbb761c5 1e650575 cf4a15f0 a3bd5af4 6d6bc2c2 8248295b 20da31bb
0x : d8a051ba dc9def5f 28866272 3d0d9557 357a78da f54ebc13 049d966e cc4aedf8
0x : ed90bc90 04ae218a ccecf9c7 6becc315 5463d157 127f564c 2d9395c8 bb707d3b
0x : 8b73923e d22b9a0f f1068b0a 629cd5b1 b06f7838 d25f0ded dc427f28 45c01b6c
0x : 6a31741a 26c8220e 36669bd2 0c9222fa 570b9dba 453497a9 d85c5146 da3aa62b
0x : 8ef5ae1a afa3ce30 15afda15 aaef6fdd 3ee0673b 8790d3af 670d7b18 ade28f29
0x : ea62ac1d 40351ee2 54138b07
DB : ipsec peer found
DB : phase1 sa found
DB : phase2 sa found
=< : decrypt iv ( 8 bytes ) =
0x : 29544646 27458ef2
<= : decrypt packet ( 300 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08102001 de47b706 0000012c 01000018
0x : 9c4982ca c69c96a8 acf46dbf a03d5566 67b467c0 0a00003c 00000001 00000001
0x : 00000030 01030401 06a39c40 00000024 010c0000 80040001 80060080 80050002
0x : 80030002 80010001 00020004 00000e10 04000014 eadb4306 c6360de7 020e5d71
0x : ab7bcd33 05000084 bf44f14d 5d0cc63d affb2269 2b11b189 17a82c39 ff667c51
0x : b23ed28f de09363a 3bef2b52 51273f84 21e00692 809827ac 97c2a8e2 77a3d841
0x : d7184e71 655a7919 c9514037 9d56d65e c763607e f0d376fd ca4231c2 0f83d3a9
0x : befc4a73 5aa3a711 6c3b66c9 c1969dbd 29439aeb 6ca43b08 64715977 b1387c67
0x : 62003949 49b6209d 0500000c 01000000 0a01ca01 00000010 04000000 00000000
0x : 00000000 b488dde5 c0e8d907
== : stored iv ( 8 bytes ) =
0x : 40351ee2 54138b07
<< : hash payload
<< : security association payload
ii : matched phase2 proposal
ii : - protocol = ipsec-esp
ii : - encap mode = tunnel
ii : - transform = esp-aes
ii : - key length = 128 bits
ii : - auth type = hmac-sha
ii : - pfs dh group = modp-1024
ii : - life seconds = 3600
ii : - life kbytes = 0
<< : nonce payload
<< : key exchange payload
<< : identification payload
<< : identification payload
== : phase2 hash_r ( computed ) ( 20 bytes ) =
0x : 9c4982ca c69c96a8 acf46dbf a03d5566 67b467c0
== : phase2 hash_r ( received ) ( 20 bytes ) =
0x : 9c4982ca c69c96a8 acf46dbf a03d5566 67b467c0
II | phase2 sa established
II | 10.1.200.170:500 <-> 10.1.101.26:500
II | outbound spi = 0x06a39c40
II | inbound spi = 0x3b45f596
== : pfs dh shared secret ( 128 bytes ) =
0x : 7091ebf5 a9a047c9 5c81a713 52a616a0 b155f7f0 93bbb711 094da9da 596b4c5f
0x : 74f00f12 afa9090c 90a99b75 f88d4bc2 3dd961b2 ee2ddc13 c8e757ae 72a4aaa5
0x : 0325af92 114c18b8 398acab9 bad9b42a 90c7efa9 d64f4a9b 21687e0f 137b28dd
0x : 16d24d03 dcf60d19 cea4946b 20292807 d1e4c0b5 e0d99b3d 18542f86 06260dd2
== : inbound spi key data ( 40 bytes ) =
0x : 0653e175 813c8a20 332bf5d3 2f8aa9be d0dfd651 18b456db 36b9ce5f b0560678
0x : e878548a d3a23a68
== : outbound spi key data ( 40 bytes ) =
0x : 2906e18f ddefd065 d18dd7e1 113621aa bbc635c1 8d2ce2ac 25d7f5cb 9a9b0d92
0x : 801abfc0 4abe7baf
ii | outbound packet has been de-queued
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 583f282d 0e6bd89f 101d06ca
-> : send ESP packet to 10.1.101.26 ( 100 bytes ) =
0x : 06a39c40 00000001 0d1c06b7 47deb312 4dc843bb 8ba61f03 d9b6007b 1da8d4b4
0x : 3a9ae77d 370091dc 74ff395b a2bf4ed3 5b43fe55 0aa6c1c5 4d5b4f02 efd39424
0x : 0d32bd1b 7d4e88e0 32c38a69 8afb45b1 7ac28d8b 064af3b7 583f282d 0e6bd89f
0x : 101d06ca
== : phase2 hash_p ( computed ) ( 20 bytes ) =
0x : 4a56b571 ed41473f bdc4ff69 da9622e3 36b08b56
>> : hash payload
>= : encrypt iv ( 8 bytes ) =
0x : 40351ee2 54138b07
=> : encrypt packet ( 52 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08102001 de47b706 00000034 00000018
0x : 4a56b571 ed41473f bdc4ff69 da9622e3 36b08b56
== : stored iv ( 8 bytes ) =
0x : a0923516 b5cb7193
-> : send IKE packet to 10.1.101.26:500 ( 52 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08102001 de47b706 00000034 14cda214
0x : e0b47654 09e6312d 4650c62c a0923516 b5cb7193
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 )
DB : tunnel dereferenced ( ref count = 6, tunnel count = 1 )
<- : recv IKE packet from 10.1.101.26:500 ( 300 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08102001 0a890d13 0000012c afca9e5e
0x : f5000c98 f17f4bc6 b06e4b01 42ca8f0f 4327bd02 b810e01f 45dcd399 b1a99821
0x : 47f47c91 b9ee9e0b 97be139d 048ffb1d 1ee0d362 04143e9c 6c059f24 7891e131
0x : c0b9b584 5f40aba5 2d229ae8 6ec04fef fb2be3eb 60d07d9f b13d3f6b 9100d1d5
0x : cb6c9180 bf21bca5 7f912fad 7f9de5aa 009f6ba2 7f575c5d 637557f4 c1f0ebad
0x : a35e88fa ca64b47e 5d726b47 d7105529 4363b414 77da167e d3663660 7f3f8441
0x : aacc7eee f125e88c d2f35bc0 2ba4a320 5ebda1fc 94d52264 bd705e11 68ed622d
0x : 307dec49 bc3cb222 d66abb7e e0296a0e 6b76813a 7e6c77a1 b4dcefbf 67aa936c
0x : 7828c0c5 b20c0f1d bd36b75f 8251e4f8 4da87a6c 2c9d89c1 3cfab868 b59caa37
0x : 906b79a8 5d123f56 1b7c67fc
DB : ipsec peer found
DB : phase1 sa found
DB : phase2 sa found
=< : decrypt iv ( 8 bytes ) =
0x : 36b4bd9b 289f4cab
<= : decrypt packet ( 300 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08102001 0a890d13 0000012c 01000018
0x : a99d0e2e 4378ca72 a0fc1475 8eff81c9 c0b4385f 0a00003c 00000001 00000001
0x : 00000030 01030401 0364c18a 00000024 010c0000 80040001 80060080 80050002
0x : 80030002 80010001 00020004 00000e10 04000014 a9b5aed6 bf84f387 6c3214e4
0x : e30e855e 05000084 b931bfaa afce0062 520f0fd9 780b1090 2892a639 a37a40de
0x : ff7d379a 0211e15b 7bf8da45 6fad8a88 5c640f51 0a267546 37230384 f2638047
0x : 66629511 62024869 e7ac9b06 e2268d6a 5e9ad7a1 80c8a65f e1e59b2d 51192ce1
0x : 2ee07ebc c9ee2180 8f05349b dbdc9046 523b084b c4e66b06 bb9365d9 cab24bc7
0x : 3d9ac8a8 4967e396 0500000c 01000000 0a01ca01 00000010 04000000 00000000
0x : 00000000 fbbea9ab d58ea207
== : stored iv ( 8 bytes ) =
0x : 5d123f56 1b7c67fc
<< : hash payload
<< : security association payload
ii : matched phase2 proposal
ii : - protocol = ipsec-esp
ii : - encap mode = tunnel
ii : - transform = esp-aes
ii : - key length = 128 bits
ii : - auth type = hmac-sha
ii : - pfs dh group = modp-1024
ii : - life seconds = 3600
ii : - life kbytes = 0
<< : nonce payload
<< : key exchange payload
<< : identification payload
<< : identification payload
== : phase2 hash_r ( computed ) ( 20 bytes ) =
0x : a99d0e2e 4378ca72 a0fc1475 8eff81c9 c0b4385f
== : phase2 hash_r ( received ) ( 20 bytes ) =
0x : a99d0e2e 4378ca72 a0fc1475 8eff81c9 c0b4385f
II | phase2 sa established
II | 10.1.200.170:500 <-> 10.1.101.26:500
II | outbound spi = 0x0364c18a
II | inbound spi = 0xf2144fad
== : pfs dh shared secret ( 128 bytes ) =
0x : 5e387690 7738c3f4 30e471ff 2fcafb97 f2ba9256 9702e1d3 6bcc0cab 96e3f50d
0x : 07f01f50 7c826dde 9fd22e04 8eb315e8 e8033c79 01b51d64 3cc91cf3 d414fe35
0x : ea1fc530 d50f2fb3 2bb7f651 5711eac2 b7a956f9 c554076f 4c6d088d 3d5ceeb0
0x : 6f3585a5 b2d934f6 a8c269e7 f4bc50a9 55ef54c9 a1b10b5f e7c610f8 c5862197
== : inbound spi key data ( 40 bytes ) =
0x : 5544a29b c021c2fc 3fd96dd3 9f3dc7b4 f203a18a 62fe0913 c75803d3 c9f07c97
0x : 39f059ed ae230458
== : outbound spi key data ( 40 bytes ) =
0x : e5137d16 adf0e589 4c0c1f6d 962e8075 068251d4 010abe05 4a095f4b 29d20f86
0x : aceb7ac5 25d789a2
ii | outbound packet has been de-queued
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 8eec17b1 27c204d5 2713747e
-> : send ESP packet to 10.1.101.26 ( 148 bytes ) =
0x : 0364c18a 00000001 5a7d0938 251f5dd4 cbfc96f5 453b130d 8640389c 0320001e
0x : 958561b3 223ee622 1786f016 bc7aedef 768f61a7 9754e5c4 545219ff 1a06d76e
0x : 0d8d04ea a1b37e04 1afa20af 451a45f1 9cb2e40f 0052221b b6c1f46d 356b755f
0x : c8841862 6dc36e02 169908f9 47ecd954 9816ef37 ad9b8215 59894435 52a332dc
0x : 12e358fa 594e82bb 8eec17b1 27c204d5 2713747e
== : phase2 hash_p ( computed ) ( 20 bytes ) =
0x : 2c83a7d8 c09aac36 07e4aa40 6bd60edb cbaebeed
>> : hash payload
>= : encrypt iv ( 8 bytes ) =
0x : 5d123f56 1b7c67fc
=> : encrypt packet ( 52 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08102001 0a890d13 00000034 00000018
0x : 2c83a7d8 c09aac36 07e4aa40 6bd60edb cbaebeed
== : stored iv ( 8 bytes ) =
0x : 033db5ec 54bb99ee
-> : send IKE packet to 10.1.101.26:500 ( 52 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08102001 0a890d13 00000034 9ef1d360
0x : 0d3aee5e eb68ba64 4c104217 033db5ec 54bb99ee
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 )
DB : tunnel dereferenced ( ref count = 6, tunnel count = 1 )
<- : recv IKE packet from 10.1.101.26:500 ( 300 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08102001 d0664044 0000012c 7a662daa
0x : b8be40cc fb1a9bfd d80d807d 2f5da0df c9754cec 20de83a3 a2295d29 7f0c8fa9
0x : dd35b281 13f2f5d8 6b844425 cb85a408 25dd5aab 34db7a0e fa18feec 82c8277e
0x : b5bc7666 5d69e7f8 afed59ac 17fd48df 924f66d8 e7fbc198 42fbecdc 4236529d
0x : 3303e281 7c04f156 2813dd1f 37fc750d 8430b291 55d3e635 be4a2694 fd8de606
0x : 9b467d1d 96519665 e47f3f55 f0d755b4 cf0fed54 1bc2cba1 750403e3 eafaf0bc
0x : ad049632 86f5e1f7 acbf6a94 e8a676a6 5b8b998a 3b548a92 9e33f10d 85bd1baa
0x : 64691bb1 bf2dcacc 432312a0 1b57ac6e 0942a14e 8ebf9436 e31a84ee 90bb0e13
0x : 61619791 60a66507 d4b7bba1 105f3114 040158b1 07fb6c64 d1c420ab e8cd520a
0x : 00f5013d 20eb3079 45f1fb30
DB : ipsec peer found
DB : phase1 sa found
DB : phase2 sa found
=< : decrypt iv ( 8 bytes ) =
0x : 58552ad2 3c04acc0
<= : decrypt packet ( 300 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08102001 d0664044 0000012c 01000018
0x : 98da9388 8e8764a1 3707f52a f490bcf2 677c1a41 0a00003c 00000001 00000001
0x : 00000030 01030401 0252eca6 00000024 010c0000 80040001 80060080 80050002
0x : 80030002 80010001 00020004 00000e10 04000014 b4e883b7 8ae4db38 bd83098e
0x : d8d08e5e 05000084 48c54914 38decb60 263d38ea 6eff8e36 9978d57e c81276a7
0x : f121d639 a6a39eb3 45c463e3 f4a45bb3 e81ccc40 93777eb8 2cd1f1d7 88e7c7ae
0x : 06ffcdb0 2a6be2a8 64b4c6c9 81df6514 4c4a016a 90b9fc8a bc9435c2 fd292046
0x : 3c70b04b 659ad74a 08307bf2 5b48deab d153ae91 57612dc6 55de8ad3 82a83a24
0x : 17f9a634 e47233b0 0500000c 01000000 0a01ca01 00000010 04000000 00000000
0x : 00000000 f1f0f3da ddb59907
== : stored iv ( 8 bytes ) =
0x : 20eb3079 45f1fb30
<< : hash payload
<< : security association payload
ii : matched phase2 proposal
ii : - protocol = ipsec-esp
ii : - encap mode = tunnel
ii : - transform = esp-aes
ii : - key length = 128 bits
ii : - auth type = hmac-sha
ii : - pfs dh group = modp-1024
ii : - life seconds = 3600
ii : - life kbytes = 0
<< : nonce payload
<< : key exchange payload
<< : identification payload
<< : identification payload
== : phase2 hash_r ( computed ) ( 20 bytes ) =
0x : 98da9388 8e8764a1 3707f52a f490bcf2 677c1a41
== : phase2 hash_r ( received ) ( 20 bytes ) =
0x : 98da9388 8e8764a1 3707f52a f490bcf2 677c1a41
II | phase2 sa established
II | 10.1.200.170:500 <-> 10.1.101.26:500
II | outbound spi = 0x0252eca6
II | inbound spi = 0x499d72b9
== : pfs dh shared secret ( 128 bytes ) =
0x : dbb8272d ff1557e8 1ec5654c 27319598 4e90094c 3fa5794e 8fc7e99e 7e017ce7
0x : 49799362 f6009250 37d1a98e 9f0752ed 9161cb1d 1ff848fd 3f62452d a71bfe63
0x : 6343cba5 5d519f65 044d5430 6e714593 e6bdcaf2 034c024e 65f89ca0 fa96518b
0x : c3d7733e d7e09071 50b82f8b 19e829b9 c1587199 790e0cdc 0e39ca88 7dc9c1f8
== : inbound spi key data ( 40 bytes ) =
0x : e7a3aa09 6a74df19 2d944a1b b643d8e1 74d9888b ff30db6b 3a5d6857 0f1ad1e7
0x : 613e0b66 6f784804
== : outbound spi key data ( 40 bytes ) =
0x : 49958ec6 39a4ae75 68bc6a81 90e1022d 3b65dbad 66a6d089 60661eea a7b6f581
0x : bd67a49c 5d4d1481
ii | outbound packet has been de-queued
== : esp hmac ( computed ) ( 12 bytes ) =
0x : a701c624 3d6309c8 7b04dffe
-> : send ESP packet to 10.1.101.26 ( 84 bytes ) =
0x : 0252eca6 00000001 890a1cdb ae32209a 50ee4078 36fd1249 79468f87 e25dedba
0x : 67c3642e ac2f4ec3 c05736ab 74a45f1a 6139504f 7478552a 48db4bb5 529eea84
0x : 70ff6a18 f12fec59 a701c624 3d6309c8 7b04dffe
== : phase2 hash_p ( computed ) ( 20 bytes ) =
0x : 2aba6240 332474ff 08a1724a 2f0a381d 9162bdc3
>> : hash payload
>= : encrypt iv ( 8 bytes ) =
0x : 20eb3079 45f1fb30
=> : encrypt packet ( 52 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08102001 d0664044 00000034 00000018
0x : 2aba6240 332474ff 08a1724a 2f0a381d 9162bdc3
== : stored iv ( 8 bytes ) =
0x : 4ed69990 7442537a
-> : send IKE packet to 10.1.101.26:500 ( 52 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08102001 d0664044 00000034 576f1b62
0x : d7a71a19 14b4c5cc 121eca1d 4ed69990 7442537a
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 )
DB : tunnel dereferenced ( ref count = 6, tunnel count = 1 )
<- : recv IKE packet from 10.1.101.26:500 ( 300 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08102001 c57e802c 0000012c 09e4bed3
0x : 03ef04b6 c90f6f16 18fe9f6c 0b96381e 9ca334bd f615ef9a 335bda41 7db46218
0x : ebff7a76 4592e4b8 1e26fd86 b3160e7b aabb3e0b dd0cf738 781017b4 5084312f
0x : 5f9079d1 d32202c7 df2c9e35 3d6dde47 3666c38b c3486194 e079a065 f9af2e26
0x : c4fde13d f100df94 0627490e 35ae8942 cf0d3cad ea83c260 54467864 587bc83f
0x : 4246205e 26474b66 0a3afc8b 50bbcf43 5d600e11 f0449a47 fb4a74d1 74b5d609
0x : dace4d8e 02866503 54abd9e4 df8a060c c1d2991d c550789b 9fc51255 cb52447f
0x : 8856ee29 31d723e6 f58f8928 82d26f9d 970fe849 a587c913 f76249e4 93bf6c9e
0x : c80431c4 6089c3b2 839794e9 784fac5e b8a2b77c f3403e21 c3432fcc 01a9a786
0x : f935df72 3b8b0ba5 61227862
DB : ipsec peer found
DB : phase1 sa found
DB : phase2 sa found
=< : decrypt iv ( 8 bytes ) =
0x : 790cabf5 e264d06a
<= : decrypt packet ( 300 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08102001 c57e802c 0000012c 01000018
0x : d27ac067 fe5e1040 72f8c72c 42f18e96 2b954b18 0a00003c 00000001 00000001
0x : 00000030 01030401 0f82464e 00000024 010c0000 80040001 80060080 80050002
0x : 80030002 80010001 00020004 00000e10 04000014 b6d18157 da5663bf 92e5f4d6
0x : 31b4fe4d 05000084 031999d3 1c538b8a 97be3858 a83c59e9 326765c7 de8d9672
0x : 7c481981 06afe714 1d75cd2a 9df7f4ad a8f19d05 b7ade9aa 5d69c784 9fdaacea
0x : 408adb75 dd9e2623 c55ea028 e70f6417 f34addba c5eb3549 b75a9e5b 11105127
0x : 82055a2e 136905b9 ccb28937 a8aa06ac aed545ca 7b92a470 b0f57688 2e57a0fc
0x : accbb939 e17288c5 0500000c 01000000 0a01ca01 00000010 04000000 00000000
0x : 00000000 c9dbe198 9296fa07
== : stored iv ( 8 bytes ) =
0x : 3b8b0ba5 61227862
<< : hash payload
<< : security association payload
ii : matched phase2 proposal
ii : - protocol = ipsec-esp
ii : - encap mode = tunnel
ii : - transform = esp-aes
ii : - key length = 128 bits
ii : - auth type = hmac-sha
ii : - pfs dh group = modp-1024
ii : - life seconds = 3600
ii : - life kbytes = 0
<< : nonce payload
<< : key exchange payload
<< : identification payload
<< : identification payload
== : phase2 hash_r ( computed ) ( 20 bytes ) =
0x : d27ac067 fe5e1040 72f8c72c 42f18e96 2b954b18
== : phase2 hash_r ( received ) ( 20 bytes ) =
0x : d27ac067 fe5e1040 72f8c72c 42f18e96 2b954b18
II | phase2 sa established
II | 10.1.200.170:500 <-> 10.1.101.26:500
II | outbound spi = 0x0f82464e
II | inbound spi = 0x4957ef83
== : pfs dh shared secret ( 128 bytes ) =
0x : cfbdb796 bb612e1d 85821c47 c0494410 415463a0 eb060ee5 acca9d4e 2ab98d86
0x : 8eadf475 d49c74fb 1c062815 b9507a20 0693347b 73b9d1b4 1d307b4c 3a6b79bc
0x : da6a1ad4 b89d2b2b a3c6224f 24d03702 a04a0499 a2913bc5 d625ce31 c4bce3fa
0x : 17ef863c 4ec94146 9177ade2 bba224c0 a032f532 3c0d1b02 c25c0acc cefb997c
== : inbound spi key data ( 40 bytes ) =
0x : e6111e0a 1c5d9a58 0b12f707 7ebb509b de8eedac 1efc28fe 7dc69c1f 1796413d
0x : f3c98d76 aa75c5db
== : outbound spi key data ( 40 bytes ) =
0x : 70521c4c e08d741e 7350f04d 64ff49dd 494b4a21 9c07b3f4 b0f54c1a fe3111a2
0x : a124d4c3 0ad68b2b
ii : - address 224.0.0.22 to network 0.0.0.0/0.0.0.0, match
DB : phase2 sa found
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 37979d37 ad99f8dd 0858b966
-> : send ESP packet to 10.1.101.26 ( 84 bytes ) =
0x : 08a9291e 00000002 61ff698f 61cdd11e 9d9c1672 72e61df0 5ed33b96 037fcdf7
0x : e831ee39 4f4131f5 77714258 3c05a0f7 beb39a3f 4d34eb8f f5134e3b 50c77132
0x : c9cf82f8 522c1f81 37979d37 ad99f8dd 0858b966
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
ii : - address 10.1.100.126 to network 0.0.0.0/0.0.0.0, match
DB : phase2 sa found
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 5994f44e d880f118 4cdbbfd3
-> : send ESP packet to 10.1.101.26 ( 100 bytes ) =
0x : 08a9291e 00000003 844f4a77 02d7e839 2c53cbc9 121e3374 00ce4c49 89fbd754
0x : 2e2e2728 44ddb049 f00affc1 8d0b51c1 ad184543 fb56da04 18a0de01 22654e6b
0x : e37796a2 63f8e6d4 fe78edc7 0b8607e8 7592e72d 5741ab7a 5994f44e d880f118
0x : 4cdbbfd3
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
ii | outbound packet has been de-queued
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 85872a55 e512991d d47d7910
-> : send ESP packet to 10.1.101.26 ( 148 bytes ) =
0x : 0f82464e 00000001 32f69e7d 49dcad4f 14f24440 66d06bc4 b5b70e5c a32f5888
0x : 096256de 487a2fbe 73fbe316 eba8d620 6fae1f1b 7fe0910e 74eaace6 c5345b38
0x : 16b9372b 73aa4d77 e5f87b68 2f5c736c 27c88c03 6937f9ec 1d45a357 871c0534
0x : 0bef9385 3cab98a7 c9bf46fb 80de3ecd dfee8ee1 810220a0 fc0ca28c fcbe2daf
0x : 2aa43ef2 a34c2a7e 85872a55 e512991d d47d7910
== : phase2 hash_p ( computed ) ( 20 bytes ) =
0x : 8a582e45 b56874db bbcc8bb0 5a62ef67 34ef6dbc
>> : hash payload
>= : encrypt iv ( 8 bytes ) =
0x : 3b8b0ba5 61227862
=> : encrypt packet ( 52 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08102001 c57e802c 00000034 00000018
0x : 8a582e45 b56874db bbcc8bb0 5a62ef67 34ef6dbc
== : stored iv ( 8 bytes ) =
0x : 2981fe4b 2596ae80
-> : send IKE packet to 10.1.101.26:500 ( 52 bytes ) =
0x : b36db2b6 a2a82240 785627ed 2ec596e4 08102001 c57e802c 00000034 85833ea4
0x : 14514073 10fadc3b e78d4187 2981fe4b 2596ae80
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 )
DB : tunnel dereferenced ( ref count = 6, tunnel count = 1 )
<- : recv ESP packet from 10.1.101.26 ( 164 bytes ) =
0x : 499d72b9 00000001 a5a2aee6 4b0a060e 0c378145 4baa542c f59ac250 04c37df4
0x : 1e6ac9c1 7cdac8a9 246b8f47 5e020603 576fd90f 0cecdfdf ed90c781 2442a76b
0x : 1443410e 370c57dc f95b5960 def13171 6254e993 e9eb27ba d72f46fe d2d4343e
0x : bd9d9cb1 87150932 4a852a73 802ddf6b e26025a8 48bcc333 3f212033 e79a8661
0x : 82609628 e7f4e56c 40731fe7 1ca47a9f d1ce88b2 ca8d15eb ea2c4630 15e67308
0x : b9263f30
DB : ipsec peer found
DB : phase2 sa found
== : esp hmac ( received ) ( 12 bytes ) =
0x : ea2c4630 15e67308 b9263f30
== : esp hmac ( computed ) ( 12 bytes ) =
0x : ea2c4630 15e67308 b9263f30
<= : decrypt esp packet ( 128 bytes ) =
0x : 4500007a 41b10000 7e11b840 0a01647e 0a01ca01 00350520 0066b66d 0ab28583
0x : 00010000 00010001 056d6572 6f6d0356 53490000 06000103 76736900 00060001
0x : 00000e10 00240674 68616d65 73c01b05 61646d69 6e000000 010b0000 03840000
0x : 02580001 51800000 0e10c02a 00010001 00000e10 00040a01 647e0102 03040404
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
DB : tunnel dereferenced ( ref count = 6, tunnel count = 1 )
ii : - address 10.1.100.126 to network 0.0.0.0/0.0.0.0, match
DB : phase2 sa found
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 14b8c64e a8de6728 01677244
-> : send ESP packet to 10.1.101.26 ( 148 bytes ) =
0x : 08a9291e 00000004 9e0cf4d5 d49fd4a4 597e35cf 3222f4cc a21b16dd f3a190b5
0x : 29ac122a 8bfae2f9 a3ce76a1 47da17d5 395ed10d c3dfce3f 80b3c3f2 dc2e9925
0x : e4a8c932 bf42907b b255e73e 09221608 8759f0fd efe920fc b286ba03 8389a8a1
0x : d6b1a4b8 c4051b69 06b6445f 126ea4f6 11309011 2ecac652 f9e8e44c a4edb726
0x : c9a03347 6c368eb2 14b8c64e a8de6728 01677244
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
ii : - address 10.1.100.126 to network 0.0.0.0/0.0.0.0, match
DB : phase2 sa found
== : esp hmac ( computed ) ( 12 bytes ) =
0x : fbdae12b 217d9fd5 1082eff4
-> : send ESP packet to 10.1.101.26 ( 148 bytes ) =
0x : 08a9291e 00000005 cfd3902d 48d38f75 e6d91d2a e5c0f72b efee4b5d feb826f3
0x : 73327a0c d528fe0b 169078fc 1eff5ca3 ae55cd8e 0816742e c5787c41 847da0e6
0x : 37ea9689 e3101097 5153ec69 c76dca31 c61fc404 cdf02799 bb99e38c 79f75af6
0x : 9b517c61 d6490de4 04fcaaf9 bb42c53d ceeea1a2 0e6a3be9 f0bca8b6 19caabe1
0x : 8cd34c55 959c9e0f fbdae12b 217d9fd5 1082eff4
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
ii : - address 10.1.100.126 to network 0.0.0.0/0.0.0.0, match
DB : phase2 sa found
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 48b6e6cf adcfba3c 81431001
-> : send ESP packet to 10.1.101.26 ( 148 bytes ) =
0x : 08a9291e 00000006 78818744 0e5f5000 d4618dbe 7b051507 974688c0 ec42e29a
0x : 9e4f3c3f 396b72c4 84819fc2 d85e4e08 d234817c 73ad07f7 4de37d04 6d3dfc4f
0x : 5ab51224 105d2179 5ffff542 a0212261 900f0d6b 7a6c1588 97140169 8d2e2373
0x : aa0c0b52 bd622368 47e61d8b e3bfb7c7 6e086876 1ee5da3f d8234408 56799bbb
0x : bef8dadb 854b2f61 48b6e6cf adcfba3c 81431001
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
ii : - address 10.1.100.126 to network 0.0.0.0/0.0.0.0, match
DB : phase2 sa found
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 31766755 39900063 b66042b0
-> : send ESP packet to 10.1.101.26 ( 148 bytes ) =
0x : 08a9291e 00000007 3b33821f 187092da 6454ceb1 853e6915 ff22922a 90bca723
0x : 3a944a5f fa6f90eb a2c98093 43ad4024 628b5b76 74b9516d a35947d4 2baf9a39
0x : 53926427 c1d1da00 8f5a85ba e200bf56 dc8f2a4a c33542ca c14477fb 9ec5f77f
0x : b1634e74 f73c9990 0f5da43b 45d544a8 f3ba8574 c4cb9460 b45e5671 bd126a4f
0x : 108480e6 37f9ccdf 31766755 39900063 b66042b0
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
<- : recv ESP packet from 10.1.101.26 ( 132 bytes ) =
0x : 499d72b9 00000002 2b0476fb 278ac720 cc88c55f 9ec8ac91 3e7f8541 1b4f2c80
0x : c59410fa dbb7a0ac f4b0e4f6 e239697a afc5f007 8876e5d9 a3ff381b cd178978
0x : e4abd698 7db0398f 7a1fadd0 27491316 913c1aaa 49ca96ca 1df1e046 2a739206
0x : db4b3f04 ad762d2f 82752b8e ed80a189 6cdd148a d07ec9a6 47f95ca8 6a293e82
0x : f1eb492d
DB : ipsec peer found
DB : phase2 sa found
== : esp hmac ( received ) ( 12 bytes ) =
0x : 47f95ca8 6a293e82 f1eb492d
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 47f95ca8 6a293e82 f1eb492d
<= : decrypt esp packet ( 96 bytes ) =
0x : 4500005a 41b60000 7e11b85b 0a01647e 0a01ca01 00890089 00460c21 80bcad80
0x : 00000001 00000000 20454e45 46464345 50454e43 41434143 41434143 41434143
0x : 41434143 41434141 41000020 00010007 e9000006 60000a01 ca010102 03040404
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
DB : tunnel dereferenced ( ref count = 6, tunnel count = 1 )
ii : - address 10.1.100.126 to network 0.0.0.0/0.0.0.0, match
DB : phase2 sa found
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 593eda0e 3349b919 c72f22d4
-> : send ESP packet to 10.1.101.26 ( 148 bytes ) =
0x : 08a9291e 00000008 f8466a04 96730ed9 162f6768 d4f74a4a 7156eaa1 30f82017
0x : 1dc777d0 2b89755a 7334cae5 0aa876ed 751746b5 da10245a f18fa88b 420662fb
0x : 9c4f4953 39c6fdcf 692574d7 2db059e6 52cc3fe2 6f8f06c7 ef20d42a 37334e25
0x : 7c80cc6a a488182e 66bdf1a4 3bd83809 692394b8 ec85ad64 a2f66205 b623829a
0x : d0a3aa68 5dcd0aff 593eda0e 3349b919 c72f22d4
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
<- : recv ESP packet from 10.1.101.26 ( 132 bytes ) =
0x : 499d72b9 00000003 96e526a5 04b4d68d 91904bf8 79562cae 53f709b2 996569a9
0x : 41d5dd09 f796f727 c6c8cc59 9de61d8f 8b4e5cb7 c686a153 bd84d6c0 3b03b8eb
0x : e7a9ad99 e94bb06b 94b3e8e1 fb8855c6 33c063b0 1a5672ba aebb5b51 dd9f9835
0x : c14564ff ba5bbd5d d4c5a6fd 54e02e43 cf27ef39 55737047 0a551cae 2ba9536d
0x : 8f2f37c4
DB : ipsec peer found
DB : phase2 sa found
== : esp hmac ( received ) ( 12 bytes ) =
0x : 0a551cae 2ba9536d 8f2f37c4
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 0a551cae 2ba9536d 8f2f37c4
<= : decrypt esp packet ( 96 bytes ) =
0x : 4500005a 41b70000 7e11b85a 0a01647e 0a01ca01 00890089 0046aa21 80bead80
0x : 00000001 00000000 20464746 44454a43 41434143 41434143 41434143 41434143
0x : 41434143 41434141 41000020 00010007 e9000006 e0000a01 ca010102 03040404
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
DB : tunnel dereferenced ( ref count = 6, tunnel count = 1 )
ii : - address 10.1.100.126 to network 0.0.0.0/0.0.0.0, match
DB : phase2 sa found
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 38bca10b 7861f83d fa9cc850
-> : send ESP packet to 10.1.101.26 ( 148 bytes ) =
0x : 08a9291e 00000009 d0576876 fa16bb11 adae2488 79fe52db 93afbe1e b116ad7b
0x : d0b49d9d 4ab39822 f222c891 20929d95 5fe6d8ba 8448ab56 1f9bc72f eeed7fae
0x : 7bab28a2 e5f64c13 3ba01f05 981915c9 252251a3 26b5b37e 0942c57d 54712672
0x : 461af61a 30aeadaa 5c0ec4d8 28a96dc7 4e113f93 38a9398c 372d6ae4 5d288d73
0x : 38fd30dc 507259ca 38bca10b 7861f83d fa9cc850
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
ii : - address 10.1.100.126 to network 0.0.0.0/0.0.0.0, match
DB : phase2 sa found
== : esp hmac ( computed ) ( 12 bytes ) =
0x : e6697728 a14991a3 6b0c1853
-> : send ESP packet to 10.1.101.26 ( 148 bytes ) =
0x : 08a9291e 0000000a 2543e53c f445d3d8 28ce0bf5 c560593d 6620c717 858bcfde
0x : 5882718f 94814ec5 b8d7b17d 2f2b6db5 db101454 6518e7e8 2bd77344 6c44fe81
0x : 57e899ad 1b6eb243 10501a73 db01dfe4 489874ed 75d14ad3 13579aa8 dab349f4
0x : f11ff584 5f109c6e 4324f12f dc32ebce be58b786 3f55c5e7 d07a7861 699df902
0x : d6229915 39c47e55 e6697728 a14991a3 6b0c1853
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
<- : recv ESP packet from 10.1.101.26 ( 132 bytes ) =
0x : 499d72b9 00000004 45dc0686 031f3727 84bf4ec2 b32c9752 84e479bf bc731f8d
0x : 64de4bf2 c26f68a1 b725de8a 132fc48c 5a07b708 f44af354 f09db50e 40d509dc
0x : 7f6174c0 8e549d0a da0c5944 98c2961f 1b00c2b3 2d438e40 6c997e1d d56c937c
0x : a6653da4 a3040b61 754d9856 571a608b 673e0b59 73a2b891 86b9fe45 c8586d8b
0x : 7ed3f6b5
DB : ipsec peer found
DB : phase2 sa found
== : esp hmac ( received ) ( 12 bytes ) =
0x : 86b9fe45 c8586d8b 7ed3f6b5
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 86b9fe45 c8586d8b 7ed3f6b5
<= : decrypt esp packet ( 96 bytes ) =
0x : 4500005a 41ba0000 7e11b857 0a01647e 0a01ca01 00890089 00460c1c 80bfad80
0x : 00000001 00000000 20454e45 46464345 50454e43 41434143 41434143 41434143
0x : 41434143 41434143 41000020 00010007 e9000006 60000a01 ca010102 03040404
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
DB : tunnel dereferenced ( ref count = 6, tunnel count = 1 )
ii : - address 10.1.100.126 to network 0.0.0.0/0.0.0.0, match
DB : phase2 sa found
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 54485ed0 335d00b1 d8116cb7
-> : send ESP packet to 10.1.101.26 ( 116 bytes ) =
0x : 08a9291e 0000000b 97278a59 762dd0c2 c9cd68d4 496a7925 7442bfec 8c153e1f
0x : 35d3af5c 6cb4b3eb a27a10ca 53d509af 849e5aa0 60406e3d 90476597 d9d7e805
0x : 4cf0172f 7646c8ac 2fd6c38a e5fadde2 db7ea92d 31908af6 d7d1c5e1 f90a0500
0x : 264954d4 84c50fd8 54485ed0 335d00b1 d8116cb7
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
<- : recv ESP packet from 10.1.101.26 ( 180 bytes ) =
0x : 499d72b9 00000005 1d0c22f4 e0e1d69a fdf2563c f340087e fdc8cfdf ab79a197
0x : b3c0cb77 d30c5dc4 8ce899b9 f7ddfacb 2a62fc10 0590c214 48f60feb be16a74b
0x : 168b72ef 335a5c49 7d395d0b 5bba3a1d 5c75f45e ebec9c3b fd5a4453 c6c70247
0x : 4cb8c45d 68ea9dc9 2f2ff5ce 1cc7c48a 3e5e39db 7229a14d 43a66f5c f21f1aba
0x : 30f002a8 4534fd61 a041e962 67400b42 bd967c00 b2b6bbab 45a2a4cf f67e7931
0x : 90640200 93f1c378 1557d142 27259e88 5ecf4928
DB : ipsec peer found
DB : phase2 sa found
== : esp hmac ( received ) ( 12 bytes ) =
0x : 1557d142 27259e88 5ecf4928
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 1557d142 27259e88 5ecf4928
<= : decrypt esp packet ( 144 bytes ) =
0x : 45000088 49880000 7e11b05b 0a01647e 0a01ca01 00350401 00740d02 f0b58180
0x : 00010002 00000000 0d77696e 646f7773 75706461 7465096d 6963726f 736f6674
0x : 03636f6d 00000100 01c00c00 05000100 00048200 230d7769 6e646f77 73757064
0x : 61746509 6d696372 6f736f66 74056e73 61746303 6e657400 c0390001 00010000
0x : 02580004 cf2ee1dd 01020304 05060604
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
DB : tunnel dereferenced ( ref count = 6, tunnel count = 1 )
ii : inspecting VNet ARP request ...
ii : responding to VNet ARP request for 207.46.225.221
ii : - address 207.46.225.221 to network 0.0.0.0/0.0.0.0, match
DB : phase2 sa found
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 7fcea752 8ca6f588 4c4a424a
-> : send ESP packet to 10.1.101.26 ( 100 bytes ) =
0x : 08a9291e 0000000c 08614014 b13b6aa5 1128c18c d6a90b87 ae934341 5d014733
0x : 5226eac7 71fc6d2d 22ef4b0a d21e0ff4 856edab7 de194312 878ceac4 1177bbff
0x : ac9a84ed 4f35e90f c4055610 8b09db7b c7b7066e 93e53d0a 7fcea752 8ca6f588
0x : 4c4a424a
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
<- : recv ESP packet from 10.1.101.26 ( 100 bytes ) =
0x : 499d72b9 00000006 b2985979 376db7c1 91752061 139e5ec3 eeb2c533 689bcffc
0x : 47f3cf2d c7baf7ad 1be417c1 8962366f 8ac39a07 927ddfc9 536ebfc4 32b8205b
0x : 8d285154 e91e7db3 0cd204ba 443b2557 e07b39c8 19dda972 283d82a9 36db4c88
0x : 8e926781
DB : ipsec peer found
DB : phase2 sa found
== : esp hmac ( received ) ( 12 bytes ) =
0x : 283d82a9 36db4c88 8e926781
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 283d82a9 36db4c88 8e926781
<= : decrypt esp packet ( 64 bytes ) =
0x : 45000030 00ba0000 7506bfff cf2ee1dd 0a01ca01 00500524 cdae5d9d 5c05d30f
0x : 70124000 61b70000 02040228 01010402 01020304 05060708 090a0b0c 0d0e0e04
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
DB : tunnel dereferenced ( ref count = 6, tunnel count = 1 )
ii : - address 207.46.225.221 to network 0.0.0.0/0.0.0.0, match
DB : phase2 sa found
== : esp hmac ( computed ) ( 12 bytes ) =
0x : fe60521f 473a3fce d6366d60
-> : send ESP packet to 10.1.101.26 ( 84 bytes ) =
0x : 08a9291e 0000000d 978c2ff1 151d9a95 c19be1c0 7ee9a89a 1815ea26 0aa87be9
0x : ea0ac7e3 ce54ee92 21894ae8 22eea3df 6273e7f8 3a84d4aa 55ce4a28 94fcb546
0x : 9087b8ce 8d26ac96 fe60521f 473a3fce d6366d60
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
ii : - address 207.46.225.221 to network 0.0.0.0/0.0.0.0, match
DB : phase2 sa found
== : esp hmac ( computed ) ( 12 bytes ) =
0x : c447c503 1f10bf15 f4846413
-> : send ESP packet to 10.1.101.26 ( 484 bytes ) =
0x : 08a9291e 0000000e a786c2b5 54bf9ae7 d923d155 903828d1 0a4645e0 ba4c1777
0x : 45482f62 a7d20a13 7a1b5f07 8b39e499 ecc19d3f d0bdfc28 9ee88ee8 e52d7fb1
0x : cbcf42c3 5ec24658 8d837537 65263568 4f7dc705 5696c63c 5a7b968e 47762bba
0x : 4cc26c3a 6d589c5d a7cf8aa7 191c5d2f 02bc2c4b 8fa919bc c1b56c26 02429fa8
0x : fe85c689 b9e3da96 7f1d6a2b 327cd9d1 03f9b374 735418fa a4acecb8 a0e2cb7b
0x : 8a024988 b1603a23 9fd3f513 f78a1a76 1929a224 609123d1 1171bc78 6eb13509
0x : 3155d2e1 fd46ccf6 1ff26037 ceb54806 b6c088ac 65cc652a 4cd66315 2d53bcab
0x : f6828031 e9970109 befea8be 7de61757 0646de11 748bdc56 0dad39a3 5958de9d
0x : abbea809 cf2710ea 6ae99d93 a3cc2ee5 ac36a419 4fcfc28e e7b28f7e 57898163
0x : 832f1896 7b677daa 5eed7ebc 3c92e063 50785de8 1cdfac5c 99a9141e 393ba028
0x : d3e18274 5f40ef22 efeb35ed 22025fe0 cdda5ccd dc04764f 1eedde10 6172fac8
0x : 219887d8 62348ac8 ea16b7c8 6f805831 73fa709f 3111a8b9 9616dd0a e6fa9b64
0x : ebc5882c 2963054e d5910e7c d9402916 4c356123 43408b4e 6035b5d5 952ca635
0x : e151d3f0 76ac6849 3c8fe5a0 97b66a94 6a0dc96d bb156175 be6c23ee 33934a5f
0x : f1c466eb e36f8179 76a34199 4de76cdf 0d44ec0d 44f60c38 c447c503 1f10bf15
0x : f4846413
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
<- : recv ESP packet from 10.1.101.26 ( 452 bytes ) =
0x : 499d72b9 00000007 4fc8e68a 0db64b5c 7e54728d 16b01557 f1db1dad ce9bccf4
0x : 63dbef88 b5b4bc3b 1068a268 62718e51 4b017d82 4f452cbc 69e3a74d 6fcfec2a
0x : 8e398994 30b9651e 208fca0f e3f7afce 1e823b2f c356f380 45958ff3 b8704324
0x : a2ee9385 3afac6c0 ba157f8e 71e4e755 859af7b7 b256a82a 1cbed6e8 0b01dfe4
0x : bbd4dcdf 11ca51ff a9d7cd2e bb6f4230 d4f929c5 d9b0aca7 d23bcc09 1a8e11f9
0x : a1aa7005 1c91ab89 8d73adbf f358c9c0 260660b4 68a01363 f91a9d63 457e04a6
0x : f49797ef bca64111 d384d0fd 112fadb8 60bdbb7e d975b381 92f0295f 65878cfc
0x : f9cb85c9 836f5c49 1ecc16c4 8b67c090 3be4e757 655e5a6c 7dfabb83 a383220c
0x : 24c1c458 62d5543f 82ac97db 582e07ac 7df32101 9e98bdd9 326545f2 8f5f49b2
0x : 79b2dd99 14a262e9 262e089d a3495e88 d00790da 930f6605 070ce298 64995aa7
0x : 2d2bfd39 b986b890 4d28a023 33ed350c f45cc21a 8ea74d17 a46d0306 fedb8027
0x : f09b28fd 6dd138ab ad6769f6 826fea3a f23da787 04a2c6dc 8bd148ae 28ffde77
0x : f3789d84 5f4d2e29 2d708918 24eb9dda 83d70636 3e117f14 f7f3d937 cc2317de
0x : 1251e847 84e45a9b 995d8298 8bc871e1 2888ccab caef254a 107db6d8 d35a3706
0x : ef386961
DB : ipsec peer found
DB : phase2 sa found
== : esp hmac ( received ) ( 12 bytes ) =
0x : 107db6d8 d35a3706 ef386961
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 107db6d8 d35a3706 ef386961
<= : decrypt esp packet ( 416 bytes ) =
0x : 45000199 012e4000 75067e22 cf2ee1dd 0a01ca01 00500524 cdae5d9e 5c05d496
0x : 5018fe78 01320000 48545450 2f312e31 20333034 204e6f74 204d6f64 69666965
0x : 640d0a43 61636865 2d436f6e 74726f6c 3a206d61 782d6167 653d3930 300d0a43
0x : 6f6e7465 6e742d4c 6f636174 696f6e3a 20687474 703a2f2f 77696e64 6f777375
0x : 70646174 652e6d69 63726f73 6f66742e 636f6d2f 44656661 756c742e 68746d0d
0x : 0a457870 69726573 3a205765 642c2030 31204a61 6e203139 39372031 323a3030
0x : 3a303020 474d540d 0a4c6173 742d4d6f 64696669 65643a20 4672692c 20303720
0x : 4e6f7620 32303033 2032323a 32303a34 3020474d 540d0a41 63636570 742d5261
0x : 6e676573 3a206279 7465730d 0a455461 673a2022 30616333 33363037 64613563
0x : 33313a35 3439220d 0a566172 793a2041 63636570 742d456e 636f6469 6e670d0a
0x : 53657276 65723a20 4d696372 6f736f66 742d4949 532f362e 300d0a58 2d506f77
0x : 65726564 2d42793a 20415350 2e4e4554 0d0a4461 74653a20 5765642c 20313620
0x : 41756720 32303036 2031393a 35383a35 3320474d 540d0a0d 0a010203 04050504
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
DB : tunnel dereferenced ( ref count = 6, tunnel count = 1 )
ii : - address 207.46.225.221 to network 0.0.0.0/0.0.0.0, match
DB : phase2 sa found
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 924f4c80 a3622716 149a40bf
-> : send ESP packet to 10.1.101.26 ( 84 bytes ) =
0x : 08a9291e 0000000f d96ca166 5e4ee130 9cfed971 9fe2a5e2 b04978b3 d27787b7
0x : 454338dd ceb7d70b 65ab73c8 c9ab11bd d3db1fe7 fd24d868 b26261a3 d26f1a48
0x : a3db09cc 2857ab28 924f4c80 a3622716 149a40bf
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
ii : - address 207.46.225.221 to network 0.0.0.0/0.0.0.0, match
DB : phase2 sa found
FF : fragmenting offset = 0, fragsize = 470
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 6d4c8719 7a831645 a0322625
-> : send ESP packet to 10.1.101.26 ( 484 bytes ) =
0x : 08a9291e 00000010 0c9bb447 65382a46 89a98279 7a7678c2 452c8c0a b6c5dc88
0x : aa7d51df fda96a56 23553256 d01ad870 37a6d19d db6dbf41 8d37a0ff ad3c3df9
0x : 8f92495c f9ed3c07 db150810 04737c5c b5ac8d11 75ae0ca3 c422d6f0 dae590ae
0x : 1800556a cc127935 0781c622 5f42b9c3 2bacef2f 5c63a94c 5bedc338 c8b1eb53
0x : bebd055e d20c3993 13281bc9 644f477f 3f91e32a 5964e1d1 574c91ad b776669c
0x : 69bfb391 412bea34 297bb1ac 4b6d5bad fa92b1d7 8268d60d cee8ee31 1511ff3e
0x : d4a9eeaa 0ed44fe0 185b8c57 b304e9db 25c127a7 a4940925 0eb7210d 418ef9d4
0x : 7153a502 3d7e9221 5fe77666 be4fcb3e 8102d350 8738cda8 de0d8db3 1b73550c
0x : 4d00f695 04d82e03 7cd8759d 190ce76a 5925605f 6248fe65 a058d058 6d22eeb1
0x : c9ee940b 3bb8e94f da0c0868 fedf79a4 2471d69c c8be3203 3168afc8 b156d4e4
0x : 31dfb73b 3c4ed17a e7cbe0b5 e0c939bf 5e0365b6 c2567914 0c86f383 520d3c80
0x : abd0498f cc65c971 454cc320 7c8b3d1b 091c472a fae6ecca 565d0317 eb72c558
0x : a3cb7efc be66aaf7 06877333 9d293019 e26b4296 b6821335 0aa0cbd4 d88de212
0x : b8fb82c7 509912f0 6f39d730 3af28fb2 fe9ee0f6 63f1a9dc efec46c6 9ca580de
0x : 73491b15 b4692703 ef4ff7bb f0549057 3ff57e81 081de185 6d4c8719 7a831645
0x : a0322625
FF : fragmenting offset = 416, fragsize = 470
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 23d123a8 c8aa90fd bc82643b
-> : send ESP packet to 10.1.101.26 ( 116 bytes ) =
0x : 08a9291e 00000011 63b126df da296d3e 62e09612 34bf39a6 714162a1 18f9e810
0x : 5baf0072 1ab695dd db9f644c eb9334d9 774e35d2 78fe19e2 5db6da8c ff3c925b
0x : 0a591b50 3b7535fa e24c477d e4366bb5 827f7b30 2250820d 6ff7525d ebd4110e
0x : 6e36611e aa251f5a 23d123a8 c8aa90fd bc82643b
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
ii : - address 207.46.225.221 to network 0.0.0.0/0.0.0.0, match
DB : phase2 sa found
FF : fragmenting offset = 0, fragsize = 470
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 74c923ce 899a84cf 3a3c032e
-> : send ESP packet to 10.1.101.26 ( 484 bytes ) =
0x : 08a9291e 00000012 3f895ef1 6d0ee36c 28a11e20 1dcbc203 e48e3659 a61b667a
0x : 83e0beeb b3732a85 3c49f792 da29ab6e 7ba9ac1e 9dc60f67 d6aeaa17 27ce3e06
0x : 3a723a0c c68e9322 53fb4254 4e46dcd4 5c95ac84 142903b9 51e3ca2b 05389cd0
0x : d85a1005 7ad5a302 0da7fc6e 85eae5e4 f0e03b5a 069b6628 355130ed c0662af1
0x : 4964c968 7f7dfaec 18c1990b 97c4fa55 f0438425 2039a5d6 ae883649 73ff88eb
0x : a40db6da c0122b4b c3144f6b 079bb742 505bb816 fe35286f bfb67e55 de392c52
0x : 64ecb3f2 f15e349a bf7e65fb 064f5e05 c790d9d3 bcf6d54f 774d8ea3 61c18365
0x : 19ba8224 fe609ff2 d2824c7a f1198e6f 7ce3f878 a3438fec 3ca61a12 b44c7a95
0x : 77101307 e83dfdc7 ae1036f5 4f1d67dc 5c21157e dd9c38ec 01d96697 b5b1e356
0x : 107bcb57 512f418b b35946f6 ac4c2048 d3cf8cdc bf4a2610 55030814 39c1fc40
0x : 619c2b85 a0d609d1 a5b31e14 df25dda4 fe92a807 5c856279 87d3b039 562a5ddd
0x : cf13aedb d7ae7b39 0bad5f2e b0d6ce2a 2c660da8 bd66925d 1e324835 0a0f32b9
0x : 9117ce4d 19cadbbb 7349076c 3bdf6e61 f1dd843c cf603a5d a44f7ed4 62994e4e
0x : cf2cfafa 3e3fc22d 02c425c1 f95ea51f c7ca4913 ab31c017 2ce13439 0fec3994
0x : 8428575d 508a57d8 dcb064aa 3423301a 6cfa7a42 4e41a43f 74c923ce 899a84cf
0x : 3a3c032e
FF : fragmenting offset = 416, fragsize = 470
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 32559c0d 7e54761d e25315e1
-> : send ESP packet to 10.1.101.26 ( 116 bytes ) =
0x : 08a9291e 00000013 3f410784 0f140565 1b2861c9 c5e72c8e b742e909 61de0c26
0x : 9e316929 e0b574a7 a5cb81bf 099390de 8688c90d 557e0411 953e1622 e427c4ca
0x : 88d87e07 f59832f6 53500667 1d759b06 fb66dde8 15864d82 dec2480f 3018fd58
0x : 9e1392b2 30cddbdb 32559c0d 7e54761d e25315e1
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
ii : - address 207.46.225.221 to network 0.0.0.0/0.0.0.0, match
DB : phase2 sa found
FF : fragmenting offset = 0, fragsize = 470
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 3f5c49ed 2954dab3 5690a061
-> : send ESP packet to 10.1.101.26 ( 484 bytes ) =
0x : 08a9291e 00000014 463608dc f3a88dfe bef2eb71 ffa0d03b c4b68fe9 edb64241
0x : 1209f642 a0109b09 62b92e53 3788cc4f 15ce92ec 035e78ca a70f5775 a8fd64c1
0x : bfa97312 4633221d 81058a2a 3f86aa4a c543cfec 94301871 258b3d4b ffb77958
0x : a7ba43fb f6e04ca5 50883c17 b578980f 2db4aaab aea6e813 185e267f d18edc52
0x : 0ba001bd 4fec7dd7 8e8511e5 8e2ed292 9a936598 b9f4dd12 47bf1aca 2838b9d6
0x : be6fc93e 05cce30a 2cf15613 cd8044e7 544e4e30 338fb101 d11dbebb 0a03392c
0x : ae4b26ec 3909b984 07227638 99466a0b de1f9231 dda911ba b51c559e 7ae5cfd9
0x : 17c15c0d 0abfe635 05a2dc90 b68da9c7 db7787c5 6f18bc5c a637ee09 5f8a6f4f
0x : 2496b3e2 7f6923db 45fb8712 fba3a0f4 5b34c518 9fd43cb1 8d6d25cd e1c93a31
0x : ddb7e4ed 5d986de5 36681f59 e9f7f543 ac474b1d 2bac9e36 505e3cdb fa7e8408
0x : 2c958e15 defa35e9 69be9186 ca067377 df779b6e 729197ee da63ce0e d0c6887e
0x : 87abe313 19be963c 48d89912 36280604 d7c38e1e ab5bd7ac e76026fe 659fe89a
0x : a2aa501b b00e5b62 21236409 fccf6a4c 447c5430 d34bd5c2 e9612772 09a6d165
0x : f87cd058 e70c2065 e0c4091b 65b7ffbe 44875d64 fcd37212 0d695d97 d32f6d16
0x : 4fa3c04e 9602a3b0 133c63e1 6aeb60d1 dbfc2064 da87f517 3f5c49ed 2954dab3
0x : 5690a061
FF : fragmenting offset = 416, fragsize = 470
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 11827ad3 f13778a9 dba82018
-> : send ESP packet to 10.1.101.26 ( 116 bytes ) =
0x : 08a9291e 00000015 75068c7e 8778734d d0be82be dbc24641 c69848fd c8980e4a
0x : fe027820 e015ba9a b8b29b82 85f75d5f 119edee9 8c4cab6d e2530e13 b63074a3
0x : b9e40f97 11526272 824ae5bc 41119483 8371a001 b452e6c2 eee33f8b 5917f441
0x : d79a04f6 72da2a75 11827ad3 f13778a9 dba82018
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
ii : - address 207.46.225.221 to network 0.0.0.0/0.0.0.0, match
DB : phase2 sa found
FF : fragmenting offset = 0, fragsize = 470
== : esp hmac ( computed ) ( 12 bytes ) =
0x : ae9378de 7186abcf 757dfc26
-> : send ESP packet to 10.1.101.26 ( 484 bytes ) =
0x : 08a9291e 00000016 2b8cfa30 7f70f0a7 54863295 aa5b6813 a04637fd 646058c8
0x : 9a323085 56802097 2d3205e3 a4575516 525dd4fb 8116658a efdf1bc2 5ac4fb5d
0x : b3c9d98f ccaa7836 76d08aac 3c9af0f7 f4ebd3af 7316a6c2 e3b8842c 07c3cd64
0x : 288a2f55 94e2552d 1d40e3f7 ca9cb4c9 a3e39df1 3298ca59 ca6ad458 25ffcc48
0x : e6ffbb5f eb1e8069 4de32fcd acf0ac1e 3d03feb0 af647c8f ef88d38a 24244bbf
0x : 9278b13d 5276347e 6be433ad 957a9ee7 2e61f228 f8dfdf08 202192a9 de612159
0x : f5ee0270 de164cf9 15472df6 c8cc1809 f2f8ee95 7d5fa8c2 38b5e6be 85f45811
0x : 9f53f7b5 d4b7c4cf cc80eebc eba5d683 7a8a8f13 9f4af51c 91a290a4 e98aef14
0x : 4abe943d 0cd41d06 97aa5cd1 6b218454 f10b347f 7ecb1400 bafde72a 59aec402
0x : 5edabcec c2756bf8 f6a0fd3a 9eaabc66 e5508b04 b37d0202 7d1a0495 54d22008
0x : 864e64ef 54f1e28b e8cf65f0 c4332ff2 6dc989b8 8f361cf9 cf6b94ea 54e756fd
0x : 68ac2cb6 5953c4e8 31307503 4699a902 9f63b983 272703be 84d26fbb 5b49430e
0x : 2837ef5e af53decc 8da63bcf ec6886e1 709cd744 2dc86e78 389b99ed b20e2036
0x : 1f4e999d 5cb2ccda 935b2941 1de25c67 5e10e320 054c51dd ba8e692f 603de476
0x : d8a61084 0d6d5ff2 5a8c8a09 754aabeb f72c1021 d18bfadb ae9378de 7186abcf
0x : 757dfc26
FF : fragmenting offset = 416, fragsize = 470
== : esp hmac ( computed ) ( 12 bytes ) =
0x : d5953b66 8e864228 6322d7f2
-> : send ESP packet to 10.1.101.26 ( 116 bytes ) =
0x : 08a9291e 00000017 0be6fcf5 cabe7d9f 898a411b fdb84f68 40e737a2 835386a0
0x : 4975931f 4594acde 4965e810 ccaadc13 d0b06af7 853a4f59 ed395fe2 fee6fb73
0x : 32318f73 c746cc2c 31bee3bc 9e4250e2 55d822d6 c1d662f1 e6d496ae 89bf6f51
0x : 753f132b 15891d3c d5953b66 8e864228 6322d7f2
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
ii : - address 207.46.225.221 to network 0.0.0.0/0.0.0.0, match
DB : phase2 sa found
FF : fragmenting offset = 0, fragsize = 470
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 35318b6a 43872489 9ebe1118
-> : send ESP packet to 10.1.101.26 ( 484 bytes ) =
0x : 08a9291e 00000018 f6727b14 99cdd30d f0443ab4 a6665333 143670bf 6fab3ce3
0x : 7bd21e7f e5146153 bf0c6bb8 e520dbc7 d29e0b13 75853907 8f88f7ef e8aad24b
0x : 342c3dcf d7d13b86 98e359cd f8599500 edbe1209 9fae0cfd 6e87adcc d07407a2
0x : 4284dd77 eb459ef3 730e5408 74a8ba4f 8e3f5c55 5272164a 64f744fd 2dbf198d
0x : 3ea7c918 6de5370e 0e6bd845 4d223116 a65d6035 753da9e6 ed1e90ec 28ed8403
0x : bc3223aa 2575ac11 5b36ce0e d64e3d96 3ff0f7eb 1c455e74 791b2468 9a07994f
0x : 9966df97 c1fadb90 91e9e495 0196faa3 2659fa30 6d2a2918 26e046a9 400b1a16
0x : e5477a5d e14c29a4 2403bb60 90741096 1976c896 cbf5a9a7 e30ddcef a4cc6488
0x : e400b5be 4334bc4c 1227d24e 76dc35a7 8e2f7291 314fb91e ad997ecd 08158d07
0x : 2786ed28 62916fbe c255baa0 2b9b4f43 1e018cd9 0ce7bbc4 078149f2 1b6c3b70
0x : 52f1c092 a96eedaa d1492ee1 19082de9 130aeea2 26d5b549 139eda27 98140a7a
0x : 279c0b82 7c1b33df 8292f8d4 240c6564 c9a26cff 6b949861 2c8256d9 c43ceb3e
0x : 735a3028 51d26104 2c5a48ff 5ea8fbc0 df85c9a9 9942159f e7f66529 c5750d71
0x : 33e9741a e4e19d07 52212999 9bb5d41f 675cf966 ce30d4df 714fcc48 e3877568
0x : c0f993cc 0233f2b3 c1d36e94 275e15e8 1cddc479 5e8a33e6 35318b6a 43872489
0x : 9ebe1118
FF : fragmenting offset = 416, fragsize = 470
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 114ae174 f87741f7 a3975bd0
-> : send ESP packet to 10.1.101.26 ( 116 bytes ) =
0x : 08a9291e 00000019 0bcba110 5e4cec03 4c73e605 b4310eaa e5ccb708 c639f5c5
0x : df2a7c8a d8e66e15 df593cbb 0b4ec5ef 947bdf60 b2155979 c85f7ece 325a0908
0x : f61d9228 c9d4b447 b938f40a e6c9a4f2 26f798f8 d3ff2920 3e53830d fa7d84fe
0x : df37bd36 c128e455 114ae174 f87741f7 a3975bd0
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
<- : recv ESP packet from 10.1.101.26 ( 100 bytes ) =
0x : 499d72b9 00000008 36255ae8 acab262d dec52473 2592c645 17140c76 59b07480
0x : b1bf878e 94f6227c 4d4252c9 1f300e78 651d6c76 eaac3548 1f5d7b43 9da95c78
0x : 3574554d 2d0dcaeb cc61bc20 b23feaa9 72c260af f5af659b 2a0c3262 c74399d7
0x : eeaa1c8a
DB : ipsec peer found
DB : phase2 sa found
== : esp hmac ( received ) ( 12 bytes ) =
0x : 2a0c3262 c74399d7 eeaa1c8a
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 2a0c3262 c74399d7 eeaa1c8a
<= : decrypt esp packet ( 64 bytes ) =
0x : 45000038 aac20000 750115f4 cf2ee1dd 0a01ca01 0b01beed 00000000 450001b4
0x : 49e12000 34069654 0a01ca01 cf2ee1dd 05240050 5c05d496 01020304 05060604
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
DB : tunnel dereferenced ( ref count = 6, tunnel count = 1 )
<- : recv ESP packet from 10.1.101.26 ( 100 bytes ) =
0x : 499d72b9 00000009 467ab2c5 159ae0b2 52b02470 57261c51 90d51ab6 02fc1e7a
0x : d5f1626d 1d28a6aa 5c113707 783c929f 133b40ff a0623313 4f47d043 ddf73f4c
0x : 770020e1 7a432100 0fca2387 8bf4a697 f4493f22 be357c1e 6de36513 11fdd2a3
0x : b1de53b0
DB : ipsec peer found
DB : phase2 sa found
== : esp hmac ( received ) ( 12 bytes ) =
0x : 6de36513 11fdd2a3 b1de53b0
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 6de36513 11fdd2a3 b1de53b0
<= : decrypt esp packet ( 64 bytes ) =
0x : 45000038 b02f0000 75011087 cf2ee1dd 0a01ca01 0b01beed 00000000 450001b4
0x : 49e32000 34069652 0a01ca01 cf2ee1dd 05240050 5c05d496 01020304 05060604
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
DB : tunnel dereferenced ( ref count = 6, tunnel count = 1 )
<- : recv ESP packet from 10.1.101.26 ( 100 bytes ) =
0x : 499d72b9 0000000a 686a2809 c08772f6 fb916869 71ae6104 e1ce1f54 d6053ddd
0x : 2d5122c8 3f42f3c2 e2894a18 79e5d4f6 9e85fb87 98eda0af 0465aa7e a3c01390
0x : 0496445b b0356826 2522c3b1 9bb4753d 3070802e 82e73333 de0b5ac2 92727059
0x : 47d68b27
DB : ipsec peer found
DB : phase2 sa found
== : esp hmac ( received ) ( 12 bytes ) =
0x : de0b5ac2 92727059 47d68b27
== : esp hmac ( computed ) ( 12 bytes ) =
0x : de0b5ac2 92727059 47d68b27
<= : decrypt esp packet ( 64 bytes ) =
0x : 45000038 bdfe0000 750102b8 cf2ee1dd 0a01ca01 0b01beed 00000000 450001b4
0x : 49e42000 34069651 0a01ca01 cf2ee1dd 05240050 5c05d496 01020304 05060604
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
DB : tunnel dereferenced ( ref count = 6, tunnel count = 1 )
<- : recv ESP packet from 10.1.101.26 ( 84 bytes ) =
0x : 499d72b9 0000000b 1ac9dd0b aa63db88 6eabb3b8 7a19a8dd a861477f 37c4c3af
0x : 0a5c9c05 12bf103e f2bf0487 7269c533 7e8b42b4 a3ee0b7b 29940f3e b09d9fe5
0x : d2f22d41 cfb63d4d 8498733c 90317c13 74a3097e
DB : ipsec peer found
DB : phase2 sa found
== : esp hmac ( received ) ( 12 bytes ) =
0x : 8498733c 90317c13 74a3097e
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 8498733c 90317c13 74a3097e
<= : decrypt esp packet ( 48 bytes ) =
0x : 45000028 c7194000 7506b9a7 cf2ee1dd 0a01ca01 00500524 cdae5f0f 5c05d496
0x : 50140000 c7f30000 01020304 05060604
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
DB : tunnel dereferenced ( ref count = 6, tunnel count = 1 )
ii : - address 207.46.225.221 to network 0.0.0.0/0.0.0.0, match
DB : phase2 sa found
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 179b07b1 ee41753f de579587
-> : send ESP packet to 10.1.101.26 ( 100 bytes ) =
0x : 08a9291e 0000001a adcfd5b0 ca27ffd8 9d144df4 79275942 71c06c56 2ee1b0f7
0x : ac60f997 4265ff1c 187f0671 1d3bf18e 31e5de20 d9926c7b 5eb3dbbb d0575b8f
0x : 4b75ccd5 321bfbed ed7c997c abdbb8bd d57e9529 db0e9941 179b07b1 ee41753f
0x : de579587
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
<- : recv ESP packet from 10.1.101.26 ( 100 bytes ) =
0x : 499d72b9 0000000c 09bd3b40 0257df7f 0200aab3 9f28cfe7 2aa2b8e9 71b5c1a8
0x : 9fd4fe99 f255331b 3a5c337c a98dc267 687091c6 9c75751c ec4b644a f7011971
0x : db566aa4 5d7decca 0896388a 54cc9d91 9bf0b6e4 0f2adf43 112902d3 bb20e1cf
0x : 0e69a42f
DB : ipsec peer found
DB : phase2 sa found
== : esp hmac ( received ) ( 12 bytes ) =
0x : 112902d3 bb20e1cf 0e69a42f
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 112902d3 bb20e1cf 0e69a42f
<= : decrypt esp packet ( 64 bytes ) =
0x : 45000030 25980000 75069b21 cf2ee1dd 0a01ca01 00500525 cbfb3a3a aba13f51
0x : 70124000 caee0000 02040228 01010402 01020304 05060708 090a0b0c 0d0e0e04
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
ii : - address 207.46.225.221 to network 0.0.0.0/0.0.0.0, match
DB : phase2 sa found
== : esp hmac ( computed ) ( 12 bytes ) =
0x : d6df27ad fa661ecf a55ca4e4
-> : send ESP packet to 10.1.101.26 ( 84 bytes ) =
0x : 08a9291e 0000001b 7c9cc1f8 cd8c8720 2364b8a6 87954cb0 9cfa7652 bd58b95a
0x : f37bfe61 cd942bec 7fe4043d cdcfe88f 936d13a8 f7db2c96 9ee12ec9 17327827
0x : 6e3c6728 5fb405ce d6df27ad fa661ecf a55ca4e4
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
DB : tunnel dereferenced ( ref count = 6, tunnel count = 1 )
ii : - address 207.46.225.221 to network 0.0.0.0/0.0.0.0, match
DB : phase2 sa found
FF : fragmenting offset = 0, fragsize = 470
== : esp hmac ( computed ) ( 12 bytes ) =
0x : a929880e f9d01140 7faab77f
-> : send ESP packet to 10.1.101.26 ( 484 bytes ) =
0x : 08a9291e 0000001c 5a8d4e2d 99e73db1 60deb180 ad0841e9 17ec7ab7 bf8c38fa
0x : c0199ff8 42e7846e c1f7fffc 73d2059c ecf39ac4 f52b0b52 f12dad9d cb8c2c1a
0x : 9b2871c4 c8936e87 a21ba6b7 0a5c29b7 675b40fb a4a10f38 37f47858 61207ad5
0x : 5aa3c3a5 944ab96b 29e8b33d a914a1eb 6bb61f58 7a8e83a6 5ac6bda1 ed3b811d
0x : 371c8ecd a6b77fe4 19904dc5 987a4def ffef358b 26d1ecd6 002b9dd6 7cfa7163
0x : bd9c7f26 0c99109e f0888656 0469e885 ca9fc6ec 19030e38 387b4a59 e8a9f8c0
0x : 48594a47 bebd5e46 119228d2 e1d3db60 a64536fa edf8388e cb2f2350 3b40bbbb
0x : f9d7b849 82957ef6 1dddb6d2 65addc33 38a3448d c234525c a05f9bd6 4caa6132
0x : 2193e1d4 2daac0fe d62b9563 6e1a73be 921bc073 d95bb467 623cf297 80b34870
0x : eee365d1 f8ba4246 dbbaf326 e456b43f f190ed82 336197c0 e297d015 c5e0a0e0
0x : 52509fdb 6fb415ea 664aab9e f47bd63e 01a2d9ac cb05e4ab 8043e5a8 ec2d4789
0x : e6426a87 b2cacbf2 b2faf33e 078c733d 62e9747c 8949d159 7cc01082 62abe3a1
0x : de1cd128 4df84952 b8fff14d 8919d763 ce0493e0 5fc8c372 842d2769 d9a9ea31
0x : 63abdc04 9a017726 23138f17 b88fe023 c16d4998 9f89e092 34f36713 2988bf46
0x : 2e6a0e1b 15731cdc 4ac07ce2 158406a0 165544b9 cdda8128 a929880e f9d01140
0x : 7faab77f
FF : fragmenting offset = 416, fragsize = 470
== : esp hmac ( computed ) ( 12 bytes ) =
0x : a535f312 9a156da6 292b5a15
-> : send ESP packet to 10.1.101.26 ( 116 bytes ) =
0x : 08a9291e 0000001d 6741a5d5 9fe4189f 15420026 fe4cd121 c2a140e8 6ab00fc9
0x : 310dc635 bcdb3f28 a7ba586e 13e12f07 117c1578 6db41060 1227039e 56803bf7
0x : bfb862fa f81569ed 2643193a d6299485 d692d5fe 4e73da59 26c16a28 dd739f9d
0x : 0975503d 0d83e604 a535f312 9a156da6 292b5a15
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
ii : - address 207.46.225.221 to network 0.0.0.0/0.0.0.0, match
DB : phase2 sa found
FF : fragmenting offset = 0, fragsize = 470
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 5c120b79 25bf1130 9ca20755
-> : send ESP packet to 10.1.101.26 ( 484 bytes ) =
0x : 08a9291e 0000001e 04932fb3 8f735340 438aaf7e ca6fd5cf 4dc46d37 e7ec003a
0x : 98ab4df0 0657639e a09d53a8 3ceb12c8 11b99e62 0fffe4cf db14a3fc 7ea5657f
0x : b8a6c75a 7d394e60 19b9aa36 2dcd2ab9 4d1b2bc7 89d62a92 9d4f4421 a95e7643
0x : 2cf41d2f 71e06965 d98f66eb adf1cf4b 660de287 be76c47d 863699d6 16e65588
0x : d27cca71 3a827bd7 a8510587 068c3884 3280712f 9fa61a9a 99732136 1c6985b2
0x : 6f7aeaa1 786027d9 4b741aa4 93798658 42d96201 6a021484 c415cf34 d03e917a
0x : 2de28d83 7029012b 333e9339 843366b2 7185dabf 4188346a b2317356 53324ec3
0x : a4fec506 f2d82360 c271ce93 3ca87da9 50def4ce 75537880 3cc3ea24 9a107f7e
0x : af7aa582 bf66cc55 57ccec90 fd3450f9 651c007a 5cfb25f0 87e4c217 331b1940
0x : c4bbb983 48223349 13859b2c 36b0eae8 25da360e 0078f315 6b739508 7ef2f9d3
0x : 3245b21f be1ef7f7 8b417fe1 3bc86d81 10b6bdd8 173b9fca 9e5680b0 e18d24ea
0x : 69d50dba 510b858f 5e7d4fbc 7fd68ab2 ec080ab9 2ad1dbe0 c361fdf6 8cc2ce00
0x : 1e751922 88fb0005 8e43c185 428e4282 a8cfecd0 7f322fe7 a77b042e 23bc01b9
0x : bff8e3b8 1834b92a 47ab3541 c81423db 1c0e6048 bd8b5df2 95f11754 8157c2cb
0x : c0cf6cb3 53769411 9dc52c2b 5827e002 fce9055c 6cd817b4 5c120b79 25bf1130
0x : 9ca20755
FF : fragmenting offset = 416, fragsize = 470
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 93d31262 cb8fe5d1 4a008886
-> : send ESP packet to 10.1.101.26 ( 116 bytes ) =
0x : 08a9291e 0000001f d3a195ce 5abe6527 2af607ad a1be65a6 a7da4864 b0b7ed5c
0x : 129aa2f7 21baa764 5756655b 89357054 0c5ae856 ef737149 a55705ed 903cadfe
0x : 6cabe0c1 926a4de9 8000478f 1647da74 4437b56b 9059637f 230ca0ff 326d257f
0x : b7bf7fb0 8d27d6d8 93d31262 cb8fe5d1 4a008886
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
<- : recv ESP packet from 10.1.101.26 ( 100 bytes ) =
0x : 499d72b9 0000000d ea7391bd 76c6109c 93bf6051 e4651c20 5ff222ba 21ede066
0x : 0f885cf1 ea4adc39 c6fa7096 6b25aff6 2b749c0c 23997304 21e5e8a1 c7fde6f8
0x : 38a75184 3bef1e4e e2144637 0a18401f e96a9d73 d60d4d00 34c27f47 e14d264a
0x : 3365668b
DB : ipsec peer found
DB : phase2 sa found
== : esp hmac ( received ) ( 12 bytes ) =
0x : 34c27f47 e14d264a 3365668b
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 34c27f47 e14d264a 3365668b
<= : decrypt esp packet ( 64 bytes ) =
0x : 45000038 dac30000 7501e5f2 cf2ee1dd 0a01ca01 0b01beed 00000000 450001b4
0x : 49e52000 34069650 0a01ca01 cf2ee1dd 05240050 5c05d496 01020304 05060604
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
DB : tunnel dereferenced ( ref count = 6, tunnel count = 1 )
ii : - address 207.46.225.221 to network 0.0.0.0/0.0.0.0, match
DB : phase2 sa found
FF : fragmenting offset = 0, fragsize = 470
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 8d8920f8 3e02ee06 430457a6
-> : send ESP packet to 10.1.101.26 ( 484 bytes ) =
0x : 08a9291e 00000020 b4c9c069 3234092c 4d018f17 56c6db9d 0fd11146 9a13deae
0x : 43a479bb 381e84c4 a042ced8 ca95338c 4f8b40cc 388c959d 990616a4 a30f3695
0x : 29db3524 58cd6359 708b75b9 0e977bfb 6855ba1c a3818e4e 9b1bb649 d86b90b8
0x : 2e746504 0c62de83 43b2151b 6e54245d 4d935114 2b56086b c1bf72cf 90a9bbd4
0x : db87716c b130b18d 5339855c a3367bd3 99ed9730 17d0fe94 5e2cfc7e 7c9df341
0x : 00f48c09 df32cbeb 7b854536 e352fafe ddaceb2b 0fe45ed3 b98da67f 05a34f09
0x : fdc54d0b 8c679ae3 d65fb444 1f8d3033 4d32a090 2042f751 f15bbd9b d1f734ad
0x : 209047bb 676368d6 05754413 9b1a1896 963f8b49 dc959b88 c8904341 9c611663
0x : dfc246e6 af8ac671 b18f80d8 fb8c9e19 99c3e101 dc1b8a3f daa0ecbc e39d9ef6
0x : ee792bec 9762319f e3138d15 0320d048 b05b83fb 5b35baa7 5f48688e 5f9a0e1e
0x : e02abbd9 c67568a1 1b158fa7 0833a79a aefa00d4 ef474386 d08393fd f13f5e7c
0x : 4b0e4f57 ff2060a2 af447062 e5d12431 07a32a76 827b57cb 832a7efe dc650ed8
0x : ff26c3af 10b5962e 3fd6b609 34137569 fa5fd8a3 fa55129d af41320c 7d7823fb
0x : 0b0544c4 9b3e2c39 8980170b 79de78f5 ad0618cf 0e09bc40 60b19cb7 53b0e900
0x : ebe28dda dc55e38e 2b6ae198 6575d8bf 389947e7 93a987ac 8d8920f8 3e02ee06
0x : 430457a6
FF : fragmenting offset = 416, fragsize = 470
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 3cfa8356 0c77f430 2bd48032
-> : send ESP packet to 10.1.101.26 ( 116 bytes ) =
0x : 08a9291e 00000021 c8a6d80b 88813861 6b681262 f954d0e7 a013afe4 bed5a0bd
0x : 64356556 4dd9674f b9c31007 f4432122 69e602e1 6c264532 5353e1d5 c0c4d7fb
0x : c0d22b9d 12827589 6bb692c9 6c242218 02029326 d9b0c325 06f9d374 04d0f881
0x : c7a757fd 1b7d09ab 3cfa8356 0c77f430 2bd48032
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
ii : - address 10.1.100.126 to network 0.0.0.0/0.0.0.0, match
DB : phase2 sa found
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 9d018a62 9969f533 b43411b3
-> : send ESP packet to 10.1.101.26 ( 148 bytes ) =
0x : 08a9291e 00000022 71174878 0d92291d 86299972 db741cfa d0095cba b01baaa2
0x : 30c447d0 4f23f8df a4c204b0 e20b4507 fb21b731 70fe1c2e 838474db 9909dd01
0x : 697eb849 42af54ac 4432f24e 54bbfe76 5c5dfbc1 7a082210 bc78a0ba 687adb8b
0x : 88cbc585 df89c523 7834b46a 32f0274f 5323ac54 ab5f1e45 224ff451 19c6e613
0x : 12f899e7 71a2d8d6 9d018a62 9969f533 b43411b3
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
ii : - address 207.46.225.221 to network 0.0.0.0/0.0.0.0, match
DB : phase2 sa found
FF : fragmenting offset = 0, fragsize = 470
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 33973b13 c3b61365 724866d0
-> : send ESP packet to 10.1.101.26 ( 484 bytes ) =
0x : 08a9291e 00000023 4f37b8b5 b09557f5 df806c6d 8d74d98b 3ada0446 45c046c9
0x : 3bf1fd0f 7c083920 4d6802ac bc066755 5ee435d5 4accc0c0 26bb2550 0c64b411
0x : 37903806 1e4c65f4 0ba01b69 359bfac0 4ed11df8 2e244254 f8831f77 913fbb7e
0x : 6ce515d9 64da13de 76fe74b1 4d3ca51c f00dbc40 b2b1503b 75525730 8e373b98
0x : c2640f7c 064cf03f 3a25f4ba 8294c7f6 6c5299ba 26ef63e4 52c02e41 91c837f5
0x : 6cbd04ab 57b5e56a 1eb8c8a5 82611e7e 8a621d96 13560561 65e2a41c a35adaf3
0x : 8947546f a599a18b de676c7d 9f1450f5 156669f5 1307aeae d6d1623f 13d8cd59
0x : 745999fc e13ecac8 a6fef50c 3e151bf2 14d27c7f b34edf95 d6c0007c a2423588
0x : 0f5f5096 3c1d79d2 721eac89 dbaf2d6d 4c631c0c 7e897bf7 67933dac 2e87d462
0x : ad8f9054 9938b18e 71628bf8 ea453292 9234e93f 61c9514e f69dfb03 515bbd6e
0x : 20ce41e0 2a782f6c bffd4b93 63b41535 b839a409 448c1c7b dfaf9acb f9bb4576
0x : dfd1e2e2 f2f7a1bf 747ff3d0 06631127 f706f14d 27b0b6b5 9406a462 d4c8504b
0x : 5199345e c9fb69ef 3d68eb4f 51130703 ac114e77 7bc473ef 5e9e188b f6ef4a21
0x : d8d2e0e7 f3415428 10f31651 6de25864 42a42585 b79d9b89 28b242b7 ca4262fd
0x : a6f1a6c4 8ed659fe aae2f3b1 f36cd0fe c983ea9d c3e58afc 33973b13 c3b61365
0x : 724866d0
FF : fragmenting offset = 416, fragsize = 470
== : esp hmac ( computed ) ( 12 bytes ) =
0x : af2d5d55 5b5b7432 34b76df5
-> : send ESP packet to 10.1.101.26 ( 116 bytes ) =
0x : 08a9291e 00000024 43651108 a5f679bd f7eb15b8 e0e1608f c5b33a1d 431ad6c5
0x : 10c7694f bd70bed2 bb8f8b38 3d0cd8c8 d27adf2b b0c8f53d 2398c954 a3c2e012
0x : e7434074 1d059774 fa3153a4 01bb1320 13c34e85 13940f42 3b5fd9d9 5d784d0c
0x : 2e7be61d f73a1056 af2d5d55 5b5b7432 34b76df5
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
<- : recv ESP packet from 10.1.101.26 ( 100 bytes ) =
0x : 499d72b9 0000000e a918f086 23e92354 ddf9653d 1f4ac4e3 72a3e021 71cce852
0x : fc6eeb06 5b7cdb25 5a4c68a8 b40aedcd e69fe388 b240aea6 342b5798 bde5f88e
0x : 2259c17d 11763865 5a076138 db3d9b92 428deba6 44116c88 280a6c63 73727ecf
0x : 510cbd73
DB : ipsec peer found
DB : phase2 sa found
== : esp hmac ( received ) ( 12 bytes ) =
0x : 280a6c63 73727ecf 510cbd73
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 280a6c63 73727ecf 510cbd73
<= : decrypt esp packet ( 64 bytes ) =
0x : 45000038 10fc0000 7501afba cf2ee1dd 0a01ca01 0b01beed 00000000 450001b4
0x : 49e62000 3406964f 0a01ca01 cf2ee1dd 05240050 5c05d496 01020304 05060604
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
DB : tunnel dereferenced ( ref count = 6, tunnel count = 1 )
ii : - address 207.46.225.221 to network 0.0.0.0/0.0.0.0, match
DB : phase2 sa found
FF : fragmenting offset = 0, fragsize = 470
== : esp hmac ( computed ) ( 12 bytes ) =
0x : f461360d e21fe8a8 99622085
-> : send ESP packet to 10.1.101.26 ( 484 bytes ) =
0x : 08a9291e 00000025 6e3c7bf4 5b628a8a 8f275cf7 e5874a3b 0203a6d5 5d3e4db5
0x : 9fa83075 e3797cb6 2d8f62b7 d3fa6d06 587be507 588e5da6 a00d36ac bc34c9a5
0x : 23268e85 fa6123d0 97e3e0a9 4d0ee7c0 6969ce3f 6d090472 981dbecf 302dd81e
0x : 5854f3bc ba67b926 e7346bc8 13c2ae79 b0eb47ec f68c01b7 f1b3c37a 5ac22ea4
0x : 6f8b2a5b 6598110a b9afc902 44a5f1fd e3286e90 bb8e89cf d01cba6d d1d7211f
0x : bbafade3 5053f767 0139e02f 4ceb9464 d2f011a2 c85b2a3c 6f6f8184 0669e8eb
0x : b09c6c45 3b16b6ca d4e94c93 d2c8dd05 9f975f9c d738c0d3 f1a851ff b2c238d5
0x : cd07e31e 7a6bd523 3b3bc024 4e30f130 59598259 daf9a4ba cacf33c4 f32be9bb
0x : 70dc3785 2e6966dd 140144dc cf463f28 f0219714 2d788859 2dbacf1c 31c06826
0x : c44c5844 dff43a13 65c22edf 9906104f fe63d491 0b407416 4cee028f 880c5257
0x : 4107b54c 3bd8534c 68ec3544 78ea5687 cd9a41cb 80bf0d7c 604f9adc 413c8138
0x : 6cb3808d 50b631cd 246323d8 9aa0bfa8 959c97d9 46a37185 84c11bca 0144e8af
0x : 84f17d8a 9b5f332c e988e4e6 fa4ee40b 505f3c07 eec340e5 7f43296e 5657ed36
0x : 3215e3d6 e27ad782 23d89bc4 20c03c75 1974abac 76fb9235 6a6b3a98 6e5fff47
0x : 029fe082 91a9d2eb a570d36f 55430710 bb66371a b2860823 f461360d e21fe8a8
0x : 99622085
FF : fragmenting offset = 416, fragsize = 470
== : esp hmac ( computed ) ( 12 bytes ) =
0x : bd50280b fcf6f944 77b57a16
-> : send ESP packet to 10.1.101.26 ( 116 bytes ) =
0x : 08a9291e 00000026 329b6140 84c6c3b1 a7304a10 ee756f03 ca5981e4 d949bcb8
0x : d856eee0 fa54e6a8 abf41ce2 37c3131c 30b3d33b 57bbb840 ecf0e18e 20d7912d
0x : 7c69f356 78ac4276 12a488d6 f82d5656 b74c4faa 8e75a939 210ea45f 7ca42a2b
0x : b613fc0d 1f7c31a3 bd50280b fcf6f944 77b57a16
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
<- : recv ESP packet from 10.1.101.26 ( 100 bytes ) =
0x : 499d72b9 0000000f fbf63e53 cfd3f42e 1ae6d8be 9162b7f5 c9350eb7 4c3b0d86
0x : 9e2b5fb3 81d670dc d318d7f7 6ea226ef 6007885e 95da40d7 e0f35557 5640cafa
0x : 2ae100eb 8c868462 848e7e00 8142a051 8a5f02bc 30a9c1d9 b092c2a3 104df47a
0x : 41f4fd37
DB : ipsec peer found
DB : phase2 sa found
== : esp hmac ( received ) ( 12 bytes ) =
0x : b092c2a3 104df47a 41f4fd37
== : esp hmac ( computed ) ( 12 bytes ) =
0x : b092c2a3 104df47a 41f4fd37
<= : decrypt esp packet ( 64 bytes ) =
0x : 45000038 e2010000 7501deb4 cf2ee1dd 0a01ca01 0b010496 00000000 450001b4
0x : 49ef2000 34069646 0a01ca01 cf2ee1dd 05250050 aba13f51 01020304 05060604
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
DB : tunnel dereferenced ( ref count = 6, tunnel count = 1 )
<- : recv ESP packet from 10.1.101.26 ( 100 bytes ) =
0x : 499d72b9 00000010 75a6d1d2 12382df8 37697078 885671de 7a419812 ab8a85f2
0x : f87e6758 2990dd92 5fab89e2 e62991e1 935c55c8 cefcf19e 8843e4f1 811dc337
0x : bc2a6715 4f3469e5 299e1fbc dfcc8ca3 95fe8fe3 97be609a 7e8f8f3a 6a3cca65
0x : 302b75cf
DB : ipsec peer found
DB : phase2 sa found
== : esp hmac ( received ) ( 12 bytes ) =
0x : 7e8f8f3a 6a3cca65 302b75cf
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 7e8f8f3a 6a3cca65 302b75cf
<= : decrypt esp packet ( 64 bytes ) =
0x : 45000038 eac90000 7501d5ec cf2ee1dd 0a01ca01 0b010496 00000000 450001b4
0x : 49f12000 34069644 0a01ca01 cf2ee1dd 05250050 aba13f51 01020304 05060604
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
DB : tunnel dereferenced ( ref count = 6, tunnel count = 1 )
<- : recv ESP packet from 10.1.101.26 ( 84 bytes ) =
0x : 499d72b9 00000011 df2370bb 22818a14 738afaf4 d508c745 68d21c86 2c87dfc5
0x : 629ab3f6 7d3a1161 979c7d00 b7f91732 73aefe51 8663b039 183d66d7 61f5f946
0x : ba8bdef5 54427be9 9da67ba7 194f84cf e54eca38
DB : ipsec peer found
DB : phase2 sa found
== : esp hmac ( received ) ( 12 bytes ) =
0x : 9da67ba7 194f84cf e54eca38
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 9da67ba7 194f84cf e54eca38
<= : decrypt esp packet ( 48 bytes ) =
0x : 45000028 f8584000 75068868 cf2ee1dd 0a01ca01 00500525 cbfb3a3b aba13f51
0x : 50140000 34230000 01020304 05060604
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
DB : tunnel dereferenced ( ref count = 6, tunnel count = 1 )
<- : recv ESP packet from 10.1.101.26 ( 100 bytes ) =
0x : 499d72b9 00000012 08d3d365 b52f1265 271c35cf 67237ed4 1c8bc299 400c7dbf
0x : 2665144d f99ad3a4 231c3fa7 9a2b6918 42eea65f 0c89cb6c d72e3058 0328fe26
0x : 57d70a03 0b96c962 bcd4e4ca 2ed0f800 300917aa 893f07ff 6e931fc6 af10df0e
0x : 636b6307
DB : ipsec peer found
DB : phase2 sa found
== : esp hmac ( received ) ( 12 bytes ) =
0x : 6e931fc6 af10df0e 636b6307
== : esp hmac ( computed ) ( 12 bytes ) =
0x : 6e931fc6 af10df0e 636b6307
<= : decrypt esp packet ( 64 bytes ) =
0x : 45000038 fb9d0000 7501c518 cf2ee1dd 0a01ca01 0b010496 00000000 450001b4
0x : 49f32000 34069642 0a01ca01 cf2ee1dd 05250050 aba13f51 01020304 05060604
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
DB : tunnel dereferenced ( ref count = 6, tunnel count = 1 )
<- : recv ESP packet from 10.1.101.26 ( 100 bytes ) =
0x : 499d72b9 00000013 ff60bfa7 eb36895e d0da4c5a 8174b600 ebc42753 be4b1f4a
0x : 4100dfcd 46424822 eea7da69 5dbd10c3 07fff28c b21152c5 4c0d26d5 7c2bb140
0x : 5dbbdfc7 5b577d81 1e1764b8 5a1f4e5f fa4716a7 c9c49305 f7d4faa8 8f7937bb
0x : 60d1ab21
DB : ipsec peer found
DB : phase2 sa found
== : esp hmac ( received ) ( 12 bytes ) =
0x : f7d4faa8 8f7937bb 60d1ab21
== : esp hmac ( computed ) ( 12 bytes ) =
0x : f7d4faa8 8f7937bb 60d1ab21
<= : decrypt esp packet ( 64 bytes ) =
0x : 45000038 1feb0000 7501a0cb cf2ee1dd 0a01ca01 0b010496 00000000 450001b4
0x : 49f52000 34069640 0a01ca01 cf2ee1dd 05250050 aba13f51 01020304 05060604
DB : phase2 sa dereferenced ( ref count = 0, phase2 count = 5 )
DB : tunnel dereferenced ( ref count = 6, tunnel count = 1 )
 

 

 Exhibit B.

 14:58:07.469484 IP (tos 0x0, ttl  63, id 48664, offset 0, flags [none],
length: 372) 10.1.200.170.500 > 10.1.101.26.500: [udp sum ok] isakmp 1.0
msgid  cookie ->: phase 1 I agg:
    (sa: doi=ipsec situation=identity
        (p: #1 protoid=isakmp transform=1
            (t: #1 id=ike (type=enc value=3des)(type=hash
value=sha1)(type=group desc value=modp1024)(type=auth
value=fadd)(type=lifetype value=sec)(type=lifeduration len=4
value=00015180))))
    (ke: key len=128)
    (nonce: n len=20)
    (id: idtype=ASN1 DN protoid=0 port=0)
    (vid: len=16)
    (vid: len=8)
    (vid: len=16)
    (vid: len=16)
    (vid: len=20)
14:58:07.534940 IP (tos 0x0, ttl  64, id 8061, offset 0, flags [none],
length: 576) 10.1.101.26.500 > 10.1.200.170.500: [udp sum ok] isakmp 1.0
msgid  cookie ->: phase 1 R agg:
    (#132)
14:58:07.535823 IP (tos 0x0, ttl  64, id 8062, offset 0, flags [none],
length: 576) 10.1.101.26.500 > 10.1.200.170.500: [udp sum ok] isakmp 1.0
msgid  cookie ->: phase 1 R agg:
    (#132)
14:58:07.536683 IP (tos 0x0, ttl  64, id 8063, offset 0, flags [none],
length: 576) 10.1.101.26.500 > 10.1.200.170.500: [udp sum ok] isakmp 1.0
msgid  cookie ->: phase 1 R agg:
    (#132)
14:58:07.537548 IP (tos 0x0, ttl  64, id 8064, offset 0, flags [none],
length: 432) 10.1.101.26.500 > 10.1.200.170.500: [udp sum ok] isakmp 1.0
msgid  cookie ->: phase 1 R agg:
    (#132)
14:58:07.605697 IP (tos 0x0, ttl  63, id 48920, offset 0, flags [none],
length: 128) 10.1.200.170.500 > 10.1.101.26.500: [udp sum ok] isakmp 1.0
msgid  cookie ->: phase 1 I agg[E]: [encrypted hash]
14:58:07.610044 IP (tos 0x0, ttl  64, id 8065, offset 0, flags [none],
length: 104) 10.1.101.26.500 > 10.1.200.170.500: [udp sum ok] isakmp 1.0
msgid  cookie ->: phase 2/others R #6[E]: [encrypted hash]
14:58:07.692690 IP (tos 0x0, ttl  63, id 49176, offset 0, flags [none],
length: 112) 10.1.200.170.500 > 10.1.101.26.500: [udp sum ok] isakmp 1.0
msgid  cookie ->: phase 2/others I inf[E]: [encrypted hash]
14:58:07.810106 IP (tos 0x0, ttl  63, id 49432, offset 0, flags [none],
length: 112) 10.1.200.170.500 > 10.1.101.26.500: [udp sum ok] isakmp 1.0
msgid  cookie ->: phase 2/others I #6[E]: [encrypted hash]
14:58:07.815682 IP (tos 0x0, ttl  64, id 8066, offset 0, flags [none],
length: 96) 10.1.101.26.500 > 10.1.200.170.500: [udp sum ok] isakmp 1.0
msgid  cookie ->: phase 2/others R #6[E]: [encrypted hash]
14:58:07.865240 IP (tos 0x0, ttl  63, id 49688, offset 0, flags [none],
length: 88) 10.1.200.170.500 > 10.1.101.26.500: [udp sum ok] isakmp 1.0
msgid  cookie ->: phase 2/others I #6[E]: [encrypted hash]
14:58:07.867817 IP (tos 0x0, ttl  63, id 49944, offset 0, flags [none],
length: 120) 10.1.200.170.500 > 10.1.101.26.500: [udp sum ok] isakmp 1.0
msgid  cookie ->: phase 2/others I #6[E]: [encrypted hash]
14:58:07.872972 IP (tos 0x0, ttl  64, id 8067, offset 0, flags [none],
length: 128) 10.1.101.26.500 > 10.1.200.170.500: [udp sum ok] isakmp 1.0
msgid  cookie ->: phase 2/others R #6[E]: [encrypted hash]
14:58:20.072679 IP (tos 0x0, ttl  63, id 50712, offset 0, flags [none],
length: 328) 10.1.200.170.500 > 10.1.101.26.500: [udp sum ok] isakmp 1.0
msgid  cookie ->: phase 2/others I oakley-quick[E]: [encrypted hash]
14:58:20.078377 IP (tos 0x0, ttl  63, id 50968, offset 0, flags [none],
length: 328) 10.1.200.170.500 > 10.1.101.26.500: [udp sum ok] isakmp 1.0
msgid  cookie ->: phase 2/others I oakley-quick[E]: [encrypted hash]
14:58:20.082095 IP (tos 0x0, ttl  63, id 51224, offset 0, flags [none],
length: 328) 10.1.200.170.500 > 10.1.101.26.500: [udp sum ok] isakmp 1.0
msgid  cookie ->: phase 2/others I oakley-quick[E]: [encrypted hash]
14:58:20.086659 IP (tos 0x0, ttl  63, id 51480, offset 0, flags [none],
length: 328) 10.1.200.170.500 > 10.1.101.26.500: [udp sum ok] isakmp 1.0
msgid  cookie ->: phase 2/others I oakley-quick[E]: [encrypted hash]
14:58:20.095224 IP (tos 0x0, ttl  63, id 51736, offset 0, flags [none],
length: 328) 10.1.200.170.500 > 10.1.101.26.500: [udp sum ok] isakmp 1.0
msgid  cookie ->: phase 2/others I oakley-quick[E]: [encrypted hash]
14:58:20.113232 IP (tos 0x0, ttl  64, id 8096, offset 0, flags [none],
length: 328) 10.1.101.26.500 > 10.1.200.170.500: [udp sum ok] isakmp 1.0
msgid  cookie ->: phase 2/others R oakley-quick[E]: [encrypted hash]
14:58:20.144787 IP (tos 0x0, ttl  64, id 8097, offset 0, flags [none],
length: 328) 10.1.101.26.500 > 10.1.200.170.500: [udp sum ok] isakmp 1.0
msgid  cookie ->: phase 2/others R oakley-quick[E]: [encrypted hash]
14:58:20.176357 IP (tos 0x0, ttl  64, id 8098, offset 0, flags [none],
length: 328) 10.1.101.26.500 > 10.1.200.170.500: [udp sum ok] isakmp 1.0
msgid  cookie ->: phase 2/others R oakley-quick[E]: [encrypted hash]
14:58:20.208003 IP (tos 0x0, ttl  64, id 8099, offset 0, flags [none],
length: 328) 10.1.101.26.500 > 10.1.200.170.500: [udp sum ok] isakmp 1.0
msgid  cookie ->: phase 2/others R oakley-quick[E]: [encrypted hash]
14:58:20.230753 IP (tos 0x0, ttl  64, id 8100, offset 0, flags [none],
length: 328) 10.1.101.26.500 > 10.1.200.170.500: [udp sum ok] isakmp 1.0
msgid  cookie ->: phase 2/others R oakley-quick[E]: [encrypted hash]
14:58:20.332039 IP (tos 0x0, ttl  63, id 51992, offset 0, flags [none],
length: 168) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x1)
14:58:20.332719 IP (tos 0x0, ttl  63, id 52248, offset 0, flags [none],
length: 80) 10.1.200.170.500 > 10.1.101.26.500: [udp sum ok] isakmp 1.0
msgid  cookie ->: phase 2/others I oakley-quick[E]: [encrypted hash]
14:58:20.532024 IP (tos 0x0, ttl  63, id 52504, offset 0, flags [none],
length: 120) 10.1.200.170 > 10.1.101.26: ESP(spi=0x06a39c40,seq=0x1)
14:58:20.532703 IP (tos 0x0, ttl  63, id 52760, offset 0, flags [none],
length: 80) 10.1.200.170.500 > 10.1.101.26.500: [udp sum ok] isakmp 1.0
msgid  cookie ->: phase 2/others I oakley-quick[E]: [encrypted hash]
14:58:20.732005 IP (tos 0x0, ttl  63, id 53016, offset 0, flags [none],
length: 168) 10.1.200.170 > 10.1.101.26: ESP(spi=0x0364c18a,seq=0x1)
14:58:20.732017 IP (tos 0x0, ttl  63, id 53272, offset 0, flags [none],
length: 80) 10.1.200.170.500 > 10.1.101.26.500: [udp sum ok] isakmp 1.0
msgid  cookie ->: phase 2/others I oakley-quick[E]: [encrypted hash]
14:58:20.929531 IP (tos 0x0, ttl  63, id 53528, offset 0, flags [none],
length: 104) 10.1.200.170 > 10.1.101.26: ESP(spi=0x0252eca6,seq=0x1)
14:58:20.929804 IP (tos 0x0, ttl  63, id 53784, offset 0, flags [none],
length: 80) 10.1.200.170.500 > 10.1.101.26.500: [udp sum ok] isakmp 1.0
msgid  cookie ->: phase 2/others I oakley-quick[E]: [encrypted hash]
14:58:21.013954 IP (tos 0x0, ttl  63, id 54040, offset 0, flags [none],
length: 104) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x2)
14:58:21.064799 IP (tos 0x0, ttl  63, id 54296, offset 0, flags [none],
length: 120) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x3)
14:58:21.065740 IP (tos 0x0, ttl  64, id 8117, offset 0, flags [none],
length: 184) 10.1.101.26 > 10.1.200.170: ESP(spi=0x499d72b9,seq=0x1)
14:58:21.143232 IP (tos 0x0, ttl  63, id 54552, offset 0, flags [none],
length: 168) 10.1.200.170 > 10.1.101.26: ESP(spi=0x0f82464e,seq=0x1)
14:58:21.143248 IP (tos 0x0, ttl  63, id 54808, offset 0, flags [none],
length: 80) 10.1.200.170.500 > 10.1.101.26.500: [udp sum ok] isakmp 1.0
msgid  cookie ->: phase 2/others I oakley-quick[E]: [encrypted hash]
14:58:21.509226 IP (tos 0x0, ttl  63, id 55064, offset 0, flags [none],
length: 168) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x4)
14:58:21.513080 IP (tos 0x0, ttl  63, id 55320, offset 0, flags [none],
length: 168) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x5)
14:58:21.595623 IP (tos 0x0, ttl  63, id 55576, offset 0, flags [none],
length: 168) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x6)
14:58:21.598809 IP (tos 0x0, ttl  63, id 55832, offset 0, flags [none],
length: 168) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x7)
14:58:21.600414 IP (tos 0x0, ttl  64, id 8119, offset 0, flags [none],
length: 152) 10.1.101.26 > 10.1.200.170: ESP(spi=0x499d72b9,seq=0x2)
14:58:21.602476 IP (tos 0x0, ttl  63, id 56088, offset 0, flags [none],
length: 168) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x8)
14:58:21.603795 IP (tos 0x0, ttl  64, id 8120, offset 0, flags [none],
length: 152) 10.1.101.26 > 10.1.200.170: ESP(spi=0x499d72b9,seq=0x3)
14:58:21.615618 IP (tos 0x0, ttl  63, id 56344, offset 0, flags [none],
length: 168) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x9)
14:58:21.634329 IP (tos 0x0, ttl  63, id 56600, offset 0, flags [none],
length: 168) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0xa)
14:58:21.635563 IP (tos 0x0, ttl  64, id 8122, offset 0, flags [none],
length: 152) 10.1.101.26 > 10.1.200.170: ESP(spi=0x499d72b9,seq=0x4)
14:58:24.805249 IP (tos 0x10, ttl  64, id 8140, offset 0, flags [none],
length: 76) 10.1.101.26.123 > 129.6.15.29.123: [udp sum ok] NTPv4 client,
strat 2, poll 8, prec -20 dist 0.043609, disp 0.085433, ref
129.6.15.28 at 3364746884.916601002 orig 3364746975.802917003 rec +0.074343994
xmt +129.002288993
14:58:24.881587 IP (tos 0x10, ttl  46, id 49905, offset 0, flags [none],
length: 76) 129.6.15.29.123 > 10.1.101.26.123: [udp sum ok] NTPv4 server,
strat 1, poll 8, prec -30 dist 0.000000, disp 0.000000, ref
ACTS at 3364747071.260376065 orig 3364747104.805206000 rec -0.007551036 xmt
-0.007530922


14:58:46.741946 IP (tos 0x0, ttl  64, id 8155, offset 0, flags [none],
length: 55) 10.1.101.26.65468 > 10.1.100.254.53: [udp sum ok]  52490+ A?
localhost. (27)
14:58:46.743294 IP (tos 0x0, ttl  64, id 16232, offset 0, flags [none],
length: 130) 10.1.100.254.53 > 10.1.101.26.65468: [udp sum ok]  52490
NXDomain q: A? localhost. 0/1/0 ns: . SOA A.ROOT-SERVERS.NET.
NSTLD.VERISIGN-GRS.COM. 2006081600 1800 900 604800 86400 (102)
14:58:53.640352 IP (tos 0x0, ttl  63, id 56856, offset 0, flags [none],
length: 136) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0xb)
14:58:53.732785 IP (tos 0x0, ttl  64, id 8158, offset 0, flags [none],
length: 200) 10.1.101.26 > 10.1.200.170: ESP(spi=0x499d72b9,seq=0x5)
14:58:53.738583 IP (tos 0x0, ttl  63, id 57112, offset 0, flags [none],
length: 120) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0xc)
14:58:53.836332 IP (tos 0x0, ttl  64, id 8159, offset 0, flags [none],
length: 120) 10.1.101.26 > 10.1.200.170: ESP(spi=0x499d72b9,seq=0x6)
14:58:53.839998 IP (tos 0x0, ttl  63, id 57368, offset 0, flags [none],
length: 104) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0xd)
14:58:53.840818 IP (tos 0x0, ttl  63, id 57624, offset 0, flags [none],
length: 504) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0xe)
14:58:53.939827 IP (tos 0x0, ttl  64, id 8166, offset 0, flags [none],
length: 472) 10.1.101.26 > 10.1.200.170: ESP(spi=0x499d72b9,seq=0x7)
14:58:54.086838 IP (tos 0x0, ttl  63, id 57880, offset 0, flags [none],
length: 104) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0xf)
14:58:54.244207 IP (tos 0x0, ttl  63, id 58136, offset 0, flags [none],
length: 504) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x10)
14:58:54.254264 IP (tos 0x0, ttl  63, id 58392, offset 0, flags [none],
length: 136) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x11)
14:58:56.692438 IP (tos 0x0, ttl  63, id 58648, offset 0, flags [none],
length: 504) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x12)
14:58:56.692447 IP (tos 0x0, ttl  63, id 58904, offset 0, flags [none],
length: 136) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x13)
14:59:00.807183 IP (tos 0x10, ttl  64, id 8173, offset 0, flags [none],
length: 76) 10.1.101.26.123 > 129.6.15.28.123: [udp sum ok] NTPv4 client,
strat 2, poll 8, prec -20 dist 0.043609, disp 0.085968, ref
129.6.15.28 at 3364746884.916601002 orig 3364747011.805619835 rec +0.055436164
xmt +129.001481163
14:59:00.930752 IP (tos 0x10, ttl  46, id 53429, offset 0, flags [none],
length: 76) 129.6.15.28.123 > 10.1.101.26.123: [udp sum ok] NTPv4 server,
strat 1, poll 8, prec -30 dist 0.000000, disp 0.000000, ref
ACTS at 3364747102.287585347 orig 3364747140.807101011 rec -0.001605974 xmt
-0.001590888
14:59:01.703170 IP (tos 0x0, ttl  63, id 59160, offset 0, flags [none],
length: 504) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x14)
14:59:01.703493 IP (tos 0x0, ttl  63, id 59416, offset 0, flags [none],
length: 136) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x15)
14:59:11.711486 IP (tos 0x0, ttl  63, id 59672, offset 0, flags [none],
length: 504) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x16)
14:59:11.711664 IP (tos 0x0, ttl  63, id 59928, offset 0, flags [none],
length: 136) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x17)
14:59:31.640302 IP (tos 0x0, ttl  63, id 60184, offset 0, flags [none],
length: 504) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x18)
14:59:31.640462 IP (tos 0x0, ttl  63, id 60440, offset 0, flags [none],
length: 136) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x19)
14:59:54.148965 IP (tos 0x0, ttl  64, id 8182, offset 0, flags [none],
length: 120) 10.1.101.26 > 10.1.200.170: ESP(spi=0x499d72b9,seq=0x8)
14:59:56.148564 IP (tos 0x0, ttl  64, id 8184, offset 0, flags [none],
length: 120) 10.1.101.26 > 10.1.200.170: ESP(spi=0x499d72b9,seq=0x9)
15:00:01.149320 IP (tos 0x0, ttl  64, id 8186, offset 0, flags [none],
length: 120) 10.1.101.26 > 10.1.200.170: ESP(spi=0x499d72b9,seq=0xa)
15:00:04.400402 IP (tos 0x0, ttl  64, id 8188, offset 0, flags [none],
length: 104) 10.1.101.26 > 10.1.200.170: ESP(spi=0x499d72b9,seq=0xb)
15:00:04.406423 IP (tos 0x0, ttl  63, id 60696, offset 0, flags [none],
length: 120) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x1a)
15:00:04.486117 IP (tos 0x0, ttl  64, id 8189, offset 0, flags [none],
length: 120) 10.1.101.26 > 10.1.200.170: ESP(spi=0x499d72b9,seq=0xc)
15:00:04.488558 IP (tos 0x0, ttl  63, id 60952, offset 0, flags [none],
length: 104) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x1b)
15:00:04.489509 IP (tos 0x0, ttl  63, id 61208, offset 0, flags [none],
length: 504) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x1c)
15:00:04.489522 IP (tos 0x0, ttl  63, id 61464, offset 0, flags [none],
length: 136) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x1d)
15:00:07.489721 IP (tos 0x0, ttl  63, id 61720, offset 0, flags [none],
length: 504) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x1e)
15:00:07.489736 IP (tos 0x0, ttl  63, id 61976, offset 0, flags [none],
length: 136) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x1f)
15:00:11.148394 IP (tos 0x0, ttl  64, id 8198, offset 0, flags [none],
length: 120) 10.1.101.26 > 10.1.200.170: ESP(spi=0x499d72b9,seq=0xd)
15:00:13.503240 IP (tos 0x0, ttl  63, id 62232, offset 0, flags [none],
length: 504) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x20)
15:00:13.503426 IP (tos 0x0, ttl  63, id 62488, offset 0, flags [none],
length: 136) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x21)
15:00:20.007375 IP (tos 0x0, ttl  63, id 62744, offset 0, flags [none],
length: 168) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x22)
15:00:25.416033 IP (tos 0x0, ttl  63, id 63000, offset 0, flags [none],
length: 504) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x23)
15:00:25.416047 IP (tos 0x0, ttl  63, id 63256, offset 0, flags [none],
length: 136) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x24)
15:00:31.147971 IP (tos 0x0, ttl  64, id 8205, offset 0, flags [none],
length: 120) 10.1.101.26 > 10.1.200.170: ESP(spi=0x499d72b9,seq=0xe)
15:00:46.808787 IP (tos 0x0, ttl  64, id 8217, offset 0, flags [none],
length: 55) 10.1.101.26.65467 > 10.1.100.254.53: [udp sum ok]  58351+ A?
localhost. (27)
15:00:46.810039 IP (tos 0x0, ttl  64, id 16530, offset 0, flags [none],
length: 130) 10.1.100.254.53 > 10.1.101.26.65467: [udp sum ok]  58351
NXDomain q: A? localhost. 0/1/0 ns: . SOA A.ROOT-SERVERS.NET.
NSTLD.VERISIGN-GRS.COM. 2006081600 1800 900 604800 86400 (102)
15:00:49.446075 IP (tos 0x0, ttl  63, id 63512, offset 0, flags [none],
length: 504) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x25)
15:00:49.446825 IP (tos 0x0, ttl  63, id 63768, offset 0, flags [none],
length: 136) 10.1.200.170 > 10.1.101.26: ESP(spi=0x08a9291e,seq=0x26)
15:01:04.348996 IP (tos 0x0, ttl  64, id 8222, offset 0, flags [none],
length: 120) 10.1.101.26 > 10.1.200.170: ESP(spi=0x499d72b9,seq=0xf)
15:01:07.348894 IP (tos 0x0, ttl  64, id 8224, offset 0, flags [none],
length: 120) 10.1.101.26 > 10.1.200.170: ESP(spi=0x499d72b9,seq=0x10)
15:01:12.271565 IP (tos 0x0, ttl  64, id 8226, offset 0, flags [none],
length: 104) 10.1.101.26 > 10.1.200.170: ESP(spi=0x499d72b9,seq=0x11)
15:01:13.348853 IP (tos 0x0, ttl  64, id 8228, offset 0, flags [none],
length: 120) 10.1.101.26 > 10.1.200.170: ESP(spi=0x499d72b9,seq=0x12)




Exhibit C:

14:58:53.718011 IP (tos 0x0, ttl 127, id 18905, offset 0, flags [DF],
length: 48) 10.1.101.27.10030 > 207.46.225.221.80: S [tcp sum ok]
1543885582:1543885582(0) win 64512 <mss 552,nop,nop,sackOK>
14:58:53.815299 IP (tos 0x0, ttl 118, id 186, offset 0, flags [none],
length: 48) 207.46.225.221.80 > 10.1.101.27.10030: S [tcp sum ok]
3450756509:3450756509(0) ack 1543885583 win 16384 <mss 1460,nop,nop,sackOK>
14:58:53.819449 IP (tos 0x0, ttl 127, id 18908, offset 0, flags [DF],
length: 40) 10.1.101.27.10030 > 207.46.225.221.80: . [tcp sum ok] 1:1(0) ack
1 win 64584
14:58:53.820290 IP (tos 0x0, ttl 127, id 18909, offset 0, flags [DF],
length: 431) 10.1.101.27.10030 > 207.46.225.221.80: P [tcp sum ok]
1:392(391) ack 1 win 64584
14:58:53.918820 IP (tos 0x0, ttl 118, id 302, offset 0, flags [DF], length:
409) 207.46.225.221.80 > 10.1.101.27.10030: P [tcp sum ok] 1:370(369) ack
392 win 65144
14:58:54.066276 IP (tos 0x0, ttl 127, id 18912, offset 0, flags [DF],
length: 40) 10.1.101.27.10030 > 207.46.225.221.80: . [tcp sum ok] 392:392(0)
ack 370 win 64215
14:58:54.223697 IP (tos 0x0, ttl  63, id 18913, offset 0, flags [+], length:
436) 10.1.101.27.10030 > 207.46.225.221.80: P [bad tcp cksum 78c6 (->bc44)!]
392:788(396) ack 370 win 64215
14:58:56.672132 IP (tos 0x0, ttl  63, id 18915, offset 0, flags [+], length:
436) 10.1.101.27.10030 > 207.46.225.221.80: P [bad tcp cksum 78c6 (->bc44)!]
392:788(396) ack 370 win 64215
14:59:01.682946 IP (tos 0x0, ttl  63, id 18916, offset 0, flags [+], length:
436) 10.1.101.27.10030 > 207.46.225.221.80: P [bad tcp cksum 78c6 (->bc44)!]
392:788(396) ack 370 win 64215
14:59:11.691331 IP (tos 0x0, ttl  63, id 18917, offset 0, flags [+], length:
436) 10.1.101.27.10030 > 207.46.225.221.80: P [bad tcp cksum 78c6 (->bc44)!]
392:788(396) ack 370 win 64215
14:59:31.620754 IP (tos 0x0, ttl  63, id 18918, offset 0, flags [+], length:
436) 10.1.101.27.10030 > 207.46.225.221.80: P [bad tcp cksum 78c6 (->bc44)!]
392:788(396) ack 370 win 64215
15:00:04.380859 IP (tos 0x0, ttl 118, id 50969, offset 0, flags [DF],
length: 40) 207.46.225.221.80 > 10.1.101.27.10030: R [tcp sum ok] 370:370(0)
ack 392 win 0
15:00:04.387253 IP (tos 0x0, ttl 127, id 18923, offset 0, flags [DF],
length: 48) 10.1.101.27.10031 > 207.46.225.221.80: S [tcp sum ok]
2879471440:2879471440(0) win 64512 <mss 552,nop,nop,sackOK>
15:00:04.466484 IP (tos 0x0, ttl 118, id 9624, offset 0, flags [none],
length: 48) 207.46.225.221.80 > 10.1.101.27.10031: S [tcp sum ok]
3422239290:3422239290(0) ack 2879471441 win 16384 <mss 1460,nop,nop,sackOK>
15:00:04.469390 IP (tos 0x0, ttl 127, id 18926, offset 0, flags [DF],
length: 40) 10.1.101.27.10031 > 207.46.225.221.80: . [tcp sum ok] 1:1(0) ack
1 win 64584
15:00:04.470390 IP (tos 0x0, ttl  63, id 18927, offset 0, flags [+], length:
436) 10.1.101.27.10031 > 207.46.225.221.80: P [bad tcp cksum e384 (->2703)!]
1:397(396) ack 1 win 64584
15:00:07.470784 IP (tos 0x0, ttl  63, id 18929, offset 0, flags [+], length:
436) 10.1.101.27.10031 > 207.46.225.221.80: P [bad tcp cksum e384 (->2703)!]
1:397(396) ack 1 win 64584
15:00:13.484415 IP (tos 0x0, ttl  63, id 18931, offset 0, flags [+], length:
436) 10.1.101.27.10031 > 207.46.225.221.80: P [bad tcp cksum e384 (->2703)!]
1:397(396) ack 1 win 64584
15:00:25.397394 IP (tos 0x0, ttl  63, id 18933, offset 0, flags [+], length:
436) 10.1.101.27.10031 > 207.46.225.221.80: P [bad tcp cksum e384 (->2703)!]
1:397(396) ack 1 win 64584
15:00:49.427776 IP (tos 0x0, ttl  63, id 18935, offset 0, flags [+], length:
436) 10.1.101.27.10031 > 207.46.225.221.80: P [bad tcp cksum e384 (->2703)!]
1:397(396) ack 1 win 64584
15:01:12.253058 IP (tos 0x0, ttl 118, id 63576, offset 0, flags [DF],
length: 40) 207.46.225.221.80 > 10.1.101.27.10031: R [tcp sum ok] 1:1(0) ack
1 win 0



 
peter
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.shrew.net/pipermail/vpn-help/attachments/20060816/5de2e317/attachment-0002.html>


More information about the vpn-help mailing list