[Vpn-help] Multiple network problem

Robert Myhren myhren at gmail.com
Mon Jan 19 17:06:16 CST 2009


On Sun, Jan 18, 2009 at 7:19 PM, Noach Sumner <nss at compu-skill.com> wrote:

> I'm sorry for the delay. I have had bad luck getting 2.1.4 to chock on me
> the past 2 days. In any event I went to good old 2.2 alpha 2 which always
> gives me multiple IP addresses and it indeed continued to give me multiple
> IP addresses. I brought it down to 1 policy and that made no difference. As
> an interesting side not un-installing 2.2 and installing 2.1 did not solve
> the issue if there was no reboot in between. With a reboot in-between it
> went back to working until it gives out on again.
>
>
> On Fri, Jan 16, 2009 at 7:12 AM, Matthew Grooms <mgrooms at shrew.net> wrote:
>
>> Noach Sumner wrote:
>>
>>> Matthew,
>>>
>>> This is great. Robert just helped you isolate my bug which he is now
>>> experiencing. And told us why you can't reproduce.
>>>
>>>
>> I test with multiple networks behind my gateway and have yet to reproduce
>> this issue.
>>
>>  Note his IPs
>>>
>>>   IPv4 Address. . . . . . . . . . . : 192.168.113.46(Preferred)
>>>   Subnet Mask . . . . . . . . . . . : 255.255.255.0
>>>   IPv4 Address. . . . . . . . . . . : 192.168.113.55(Preferred)
>>>   Subnet Mask . . . . . . . . . . . : 255.255.255.0
>>>
>>> remind you of anything (it sure does for me). Only he found what I never
>>> even though to test. I also have multiple address blocks set in my policy! I
>>> am not by my laptop right now but I will try and test tonight. I bet you if
>>> I bring it down to 1 address block it will suddenly work!
>>>
>>>
>> Did you test this after bringing it down to a single remote network?
>>
>>  Do you have time to work on this yet or not really?
>>>
>>>
>> Not really. Its entered into the ticket system and flagged as critical for
>> the 2.1.5 release. I hope to get to it this weekend now that the recent
>> kernel changes have been completed and the holidays are behind us. Sorry for
>> the delay.
>>
>> -Matthew
>>
>
>
Hi!

I decided to see if I could help debugging this, and reinstalled the
program. (Uninstall, then install. Same version).
And whoops, problem with two ip's are gone.

BUT, it still don't work as expected.
I can only access one of the three networks announced by the Cisco IOS.

I see this in the phase 2 all the time.
NO-PROPOSAL-CHOSEN notification

Other than that, I am a bit blank as route and wireshark output looks
normal.

See log output below

ROUTE:
C:\Users\robert>route print
===========================================================================
Interface List
 23 ...aa aa aa aa aa 00 ...... Shrew Soft Virtual Adapter
 15 ...02 00 4e 43 50 49 ...... NCP Secure Client Virtual NDIS6 Adapter
 14 ...00 1e 37 fe 12 34 ...... Bluetooth Device (Personal Area Network)
 12 ...00 1f 3b bf 30 7b ...... Intel(R) Wireless WiFi Link 4965AGN
 10 ...00 1c 23 50 65 38 ...... Broadcom NetXtreme 57xx Gigabit Controller
  1 ........................... Software Loopback Interface 1
 19 ...00 00 00 00 00 00 00 e0
isatap.{B06A9A31-24A5-48F1-A151-1D518CEAD8CB}
 11 ...02 00 54 55 4e 01 ...... Teredo Tunneling Pseudo-Interface
 24 ...00 00 00 00 00 00 00 e0
isatap.{41D6E85F-16C6-40EE-9118-D9D1A97FD69B}
 21 ...00 00 00 00 00 00 00 e0  isatap.bb.online.no
 20 ...00 00 00 00 00 00 00 e0
isatap.{42332BC7-F5B0-4FC1-92B8-7B03051E88D9}
 22 ...00 00 00 00 00 00 00 e0  isatap.bb.online.no
 18 ...00 00 00 00 00 00 00 e0  6TO4 Adapter
 52 ...00 00 00 00 00 00 00 e0  Microsoft ISATAP Adapter #6
===========================================================================

IPv4 Route Table
===========================================================================
Active Routes:
Network Destination        Netmask          Gateway       Interface  Metric
          0.0.0.0          0.0.0.0      192.168.0.1    192.168.0.198     25
       10.220.0.0      255.255.0.0         On-link   192.168.113.159     51
   10.220.255.255  255.255.255.255         On-link   192.168.113.159    306
    91.203.116.34  255.255.255.255         On-link   192.168.113.159     51
        127.0.0.0        255.0.0.0         On-link         127.0.0.1    306
        127.0.0.1  255.255.255.255         On-link         127.0.0.1    306
  127.255.255.255  255.255.255.255         On-link         127.0.0.1    306
      169.254.0.0      255.255.0.0         On-link   192.168.113.159    326
  169.254.255.255  255.255.255.255         On-link   192.168.113.159    306
      192.168.0.0    255.255.255.0         On-link     192.168.0.198    281
    192.168.0.198  255.255.255.255         On-link     192.168.0.198    281
    192.168.0.255  255.255.255.255         On-link     192.168.0.198    281
      192.168.3.0    255.255.255.0         On-link   192.168.113.159     51
    192.168.3.255  255.255.255.255         On-link   192.168.113.159    306
    192.168.113.0    255.255.255.0         On-link   192.168.113.159    306
  192.168.113.159  255.255.255.255         On-link   192.168.113.159    306
  192.168.113.255  255.255.255.255         On-link   192.168.113.159    306
        224.0.0.0        240.0.0.0         On-link         127.0.0.1    306
        224.0.0.0        240.0.0.0         On-link     192.168.0.198    281
        224.0.0.0        240.0.0.0         On-link   192.168.113.159    306
  255.255.255.255  255.255.255.255         On-link         127.0.0.1    306
  255.255.255.255  255.255.255.255         On-link     192.168.0.198    281
  255.255.255.255  255.255.255.255         On-link   192.168.113.159    306
===========================================================================
Persistent Routes:
  None

IPv6 Route Table
===========================================================================
Active Routes:
 If Metric Network Destination      Gateway
  1    306 ::1/128                  On-link
 12    281 fe80::/64                On-link
 23    306 fe80::/64                On-link
 23    306 fe80::5ccf:4bc9:dc82:cc2/128
                                    On-link
 12    281 fe80::f879:5b20:9bcd:8973/128
                                    On-link
  1    306 ff00::/8                 On-link
 12    281 ff00::/8                 On-link
 23    306 ff00::/8                 On-link
===========================================================================
Persistent Routes:
  None

IPCONFIG:
Ethernet adapter Local Area Connection* 17:

   Connection-specific DNS Suffix  . : domain.com
   Link-local IPv6 Address . . . . . : fe80::5ccf:4bc9:dc82:cc2%23
   IPv4 Address. . . . . . . . . . . : 192.168.113.159
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . :

Ethernet adapter Local Area Connection 2:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :

Ethernet adapter Bluetooth Network Connection:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :

Wireless LAN adapter Wireless Network Connection:

   Connection-specific DNS Suffix  . : bb.online.no
   Link-local IPv6 Address . . . . . : fe80::f879:5b20:9bcd:8973%12
   IPv4 Address. . . . . . . . . . . : 192.168.0.198
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : 192.168.0.1

VPNTRACE:
09/01/19 23:54:48 ## : IKE Daemon, ver 2.1.4
09/01/19 23:54:48 ## : Copyright 2008 Shrew Soft Inc.
09/01/19 23:54:48 ## : This product linked OpenSSL 0.9.8h 28 May 2008
09/01/19 23:54:48 ii : opened 'C:\Program Files\ShrewSoft\VPN
Client\debug\iked.log'
09/01/19 23:54:48 ii : opened 'C:\Program Files\ShrewSoft\VPN
Client/debug/dump-ike-decrypt.cap'
09/01/19 23:54:48 ii : opened 'C:\Program Files\ShrewSoft\VPN
Client/debug/dump-ike-encrypt.cap'
09/01/19 23:54:48 ii : rebuilding vnet device list ...
09/01/19 23:54:48 ii : device ROOT\VNET\0000 disabled
09/01/19 23:54:48 ii : network process thread begin ...
09/01/19 23:54:48 ii : pfkey process thread begin ...
09/01/19 23:54:48 ii : ipc server process thread begin ...
09/01/19 23:54:48 K< : recv pfkey X_SPDDUMP UNSPEC message
09/01/19 23:54:48 DB : policy added ( obj count = 1 )
09/01/19 23:54:48 K< : recv pfkey X_SPDDUMP UNSPEC message
09/01/19 23:54:48 DB : policy added ( obj count = 2 )
09/01/19 23:54:48 K< : recv pfkey X_SPDDUMP UNSPEC message
09/01/19 23:54:48 DB : policy added ( obj count = 3 )
09/01/19 23:54:58 !! : unable to connect to pfkey interface
09/01/19 23:55:18 ii : ipc client process thread begin ...
09/01/19 23:55:18 <A : peer config add message
09/01/19 23:55:18 DB : peer added ( obj count = 1 )
09/01/19 23:55:18 ii : local address 192.168.0.198:500 selected for peer
09/01/19 23:55:19 DB : tunnel added ( obj count = 1 )
09/01/19 23:55:19 <A : proposal config message
09/01/19 23:55:19 <A : proposal config message
09/01/19 23:55:19 <A : client config message
09/01/19 23:55:19 <A : xauth username message
09/01/19 23:55:19 <A : xauth password message
09/01/19 23:55:19 <A : local id 'BC' message
09/01/19 23:55:19 <A : remote id 'BC-R01.basis-consulting.no' message
09/01/19 23:55:19 <A : preshared key message
09/01/19 23:55:19 <A : peer tunnel enable message
09/01/19 23:55:19 DB : new phase1 ( ISAKMP initiator )
09/01/19 23:55:19 DB : exchange type is aggressive
09/01/19 23:55:19 DB : 192.168.0.198:500 <-> 195.159.111.66:500
09/01/19 23:55:19 DB : c67c2ad0f02c1d8e:0000000000000000
09/01/19 23:55:19 DB : phase1 added ( obj count = 1 )
09/01/19 23:55:19 >> : security association payload
09/01/19 23:55:19 >> : - proposal #1 payload
09/01/19 23:55:19 >> : -- transform #1 payload
09/01/19 23:55:19 >> : -- transform #2 payload
09/01/19 23:55:19 >> : -- transform #3 payload
09/01/19 23:55:19 >> : -- transform #4 payload
09/01/19 23:55:19 >> : -- transform #5 payload
09/01/19 23:55:19 >> : -- transform #6 payload
09/01/19 23:55:19 >> : -- transform #7 payload
09/01/19 23:55:19 >> : -- transform #8 payload
09/01/19 23:55:19 >> : -- transform #9 payload
09/01/19 23:55:19 >> : -- transform #10 payload
09/01/19 23:55:19 >> : -- transform #11 payload
09/01/19 23:55:19 >> : -- transform #12 payload
09/01/19 23:55:19 >> : -- transform #13 payload
09/01/19 23:55:19 >> : -- transform #14 payload
09/01/19 23:55:19 >> : -- transform #15 payload
09/01/19 23:55:19 >> : -- transform #16 payload
09/01/19 23:55:19 >> : -- transform #17 payload
09/01/19 23:55:19 >> : -- transform #18 payload
09/01/19 23:55:19 >> : key exchange payload
09/01/19 23:55:19 >> : nonce payload
09/01/19 23:55:19 >> : identification payload
09/01/19 23:55:19 >> : vendor id payload
09/01/19 23:55:19 ii : local supports XAUTH
09/01/19 23:55:19 >> : vendor id payload
09/01/19 23:55:19 ii : local supports nat-t ( draft v00 )
09/01/19 23:55:19 >> : vendor id payload
09/01/19 23:55:19 ii : local supports nat-t ( draft v01 )
09/01/19 23:55:19 >> : vendor id payload
09/01/19 23:55:19 ii : local supports nat-t ( draft v02 )
09/01/19 23:55:19 >> : vendor id payload
09/01/19 23:55:19 ii : local supports nat-t ( draft v03 )
09/01/19 23:55:19 >> : vendor id payload
09/01/19 23:55:19 ii : local supports nat-t ( rfc )
09/01/19 23:55:19 >> : vendor id payload
09/01/19 23:55:19 ii : local supports FRAGMENTATION
09/01/19 23:55:19 >> : vendor id payload
09/01/19 23:55:19 ii : local is SHREW SOFT compatible
09/01/19 23:55:19 >> : vendor id payload
09/01/19 23:55:19 ii : local is NETSCREEN compatible
09/01/19 23:55:19 >> : vendor id payload
09/01/19 23:55:19 ii : local is SIDEWINDER compatible
09/01/19 23:55:19 >> : vendor id payload
09/01/19 23:55:19 ii : local is CISCO UNITY compatible
09/01/19 23:55:19 >= : cookies c67c2ad0f02c1d8e:0000000000000000
09/01/19 23:55:19 >= : message 00000000
09/01/19 23:55:19 -> : send IKE packet 192.168.0.198:500 ->
195.159.111.66:500 ( 1158 bytes )
09/01/19 23:55:19 DB : phase1 resend event scheduled ( ref count = 2 )
09/01/19 23:55:19 <- : recv IKE packet 195.159.111.66:500 ->
192.168.0.198:500 ( 438 bytes )
09/01/19 23:55:19 DB : phase1 found
09/01/19 23:55:19 ii : processing phase1 packet ( 438 bytes )
09/01/19 23:55:19 =< : cookies c67c2ad0f02c1d8e:65da80a149997177
09/01/19 23:55:19 =< : message 00000000
09/01/19 23:55:19 << : security association payload
09/01/19 23:55:19 << : - propsal #1 payload
09/01/19 23:55:19 << : -- transform #1 payload
09/01/19 23:55:19 ii : unmatched isakmp proposal/transform
09/01/19 23:55:19 ii : cipher type ( 3des != aes )
09/01/19 23:55:19 ii : unmatched isakmp proposal/transform
09/01/19 23:55:19 ii : cipher type ( 3des != aes )
09/01/19 23:55:19 ii : unmatched isakmp proposal/transform
09/01/19 23:55:19 ii : cipher type ( 3des != aes )
09/01/19 23:55:19 ii : unmatched isakmp proposal/transform
09/01/19 23:55:19 ii : cipher type ( 3des != aes )
09/01/19 23:55:19 ii : unmatched isakmp proposal/transform
09/01/19 23:55:19 ii : cipher type ( 3des != aes )
09/01/19 23:55:19 ii : unmatched isakmp proposal/transform
09/01/19 23:55:19 ii : cipher type ( 3des != aes )
09/01/19 23:55:19 ii : unmatched isakmp proposal/transform
09/01/19 23:55:19 ii : cipher type ( 3des != blowfish )
09/01/19 23:55:19 ii : unmatched isakmp proposal/transform
09/01/19 23:55:19 ii : cipher type ( 3des != blowfish )
09/01/19 23:55:19 ii : unmatched isakmp proposal/transform
09/01/19 23:55:19 ii : cipher type ( 3des != blowfish )
09/01/19 23:55:19 ii : unmatched isakmp proposal/transform
09/01/19 23:55:19 ii : cipher type ( 3des != blowfish )
09/01/19 23:55:19 ii : unmatched isakmp proposal/transform
09/01/19 23:55:19 ii : cipher type ( 3des != blowfish )
09/01/19 23:55:19 ii : unmatched isakmp proposal/transform
09/01/19 23:55:19 ii : cipher type ( 3des != blowfish )
09/01/19 23:55:19 ii : unmatched isakmp proposal/transform
09/01/19 23:55:19 ii : hash type ( hmac-sha != hmac-md5 )
09/01/19 23:55:19 !! : peer violates RFC, transform number mismatch ( 1 !=
14 )
09/01/19 23:55:19 ii : matched isakmp proposal #1 transform #1
09/01/19 23:55:19 ii : - transform    = ike
09/01/19 23:55:19 ii : - cipher type  = 3des
09/01/19 23:55:19 ii : - key length   = default
09/01/19 23:55:19 ii : - hash type    = sha1
09/01/19 23:55:19 ii : - dh group     = modp-1024
09/01/19 23:55:19 ii : - auth type    = xauth-initiator-psk
09/01/19 23:55:19 ii : - life seconds = 86400
09/01/19 23:55:19 ii : - life kbytes  = 0
09/01/19 23:55:19 << : vendor id payload
09/01/19 23:55:19 ii : peer is CISCO UNITY compatible
09/01/19 23:55:19 << : vendor id payload
09/01/19 23:55:19 ii : peer supports DPDv1
09/01/19 23:55:19 << : vendor id payload
09/01/19 23:55:19 ii : unknown vendor id ( 16 bytes )
09/01/19 23:55:19 0x : 901d27bc 49987177 f134324b 3fe5693e
09/01/19 23:55:19 << : vendor id payload
09/01/19 23:55:19 ii : peer supports XAUTH
09/01/19 23:55:19 << : vendor id payload
09/01/19 23:55:19 ii : peer supports nat-t ( rfc )
09/01/19 23:55:19 << : key exchange payload
09/01/19 23:55:19 << : identification payload
09/01/19 23:55:19 ii : phase1 id match
09/01/19 23:55:19 ii : received = fqdn BC-R01.basis-consulting.no
09/01/19 23:55:19 << : nonce payload
09/01/19 23:55:19 << : hash payload
09/01/19 23:55:19 << : nat discovery payload
09/01/19 23:55:19 << : nat discovery payload
09/01/19 23:55:19 ii : nat discovery - local address is translated
09/01/19 23:55:19 ii : switching to nat-t udp port 4500
09/01/19 23:55:19 == : DH shared secret ( 128 bytes )
09/01/19 23:55:19 == : SETKEYID ( 20 bytes )
09/01/19 23:55:19 == : SETKEYID_d ( 20 bytes )
09/01/19 23:55:19 == : SETKEYID_a ( 20 bytes )
09/01/19 23:55:19 == : SETKEYID_e ( 20 bytes )
09/01/19 23:55:19 == : cipher key ( 40 bytes )
09/01/19 23:55:19 == : cipher iv ( 8 bytes )
09/01/19 23:55:19 == : phase1 hash_i ( computed ) ( 20 bytes )
09/01/19 23:55:19 >> : hash payload
09/01/19 23:55:19 >> : nat discovery payload
09/01/19 23:55:19 >> : nat discovery payload
09/01/19 23:55:19 >= : cookies c67c2ad0f02c1d8e:65da80a149997177
09/01/19 23:55:19 >= : message 00000000
09/01/19 23:55:19 >= : encrypt iv ( 8 bytes )
09/01/19 23:55:19 == : encrypt packet ( 100 bytes )
09/01/19 23:55:19 == : stored iv ( 8 bytes )
09/01/19 23:55:19 DB : phase1 resend event canceled ( ref count = 1 )
09/01/19 23:55:19 -> : send NAT-T:IKE packet 192.168.0.198:4500 ->
195.159.111.66:4500 ( 132 bytes )
09/01/19 23:55:19 == : phase1 hash_r ( computed ) ( 20 bytes )
09/01/19 23:55:19 == : phase1 hash_r ( received ) ( 20 bytes )
09/01/19 23:55:19 ii : phase1 sa established
09/01/19 23:55:19 ii : 195.159.111.66:4500 <-> 192.168.0.198:4500
09/01/19 23:55:19 ii : c67c2ad0f02c1d8e:65da80a149997177
09/01/19 23:55:19 ii : sending peer INITIAL-CONTACT notification
09/01/19 23:55:19 ii : - 192.168.0.198:4500 -> 195.159.111.66:4500
09/01/19 23:55:19 ii : - isakmp spi = c67c2ad0f02c1d8e:65da80a149997177
09/01/19 23:55:19 ii : - data size 0
09/01/19 23:55:19 >> : hash payload
09/01/19 23:55:19 >> : notification payload
09/01/19 23:55:19 == : new informational hash ( 20 bytes )
09/01/19 23:55:19 == : new informational iv ( 8 bytes )
09/01/19 23:55:19 >= : cookies c67c2ad0f02c1d8e:65da80a149997177
09/01/19 23:55:19 >= : message a04839a3
09/01/19 23:55:19 >= : encrypt iv ( 8 bytes )
09/01/19 23:55:19 == : encrypt packet ( 80 bytes )
09/01/19 23:55:19 == : stored iv ( 8 bytes )
09/01/19 23:55:19 -> : send NAT-T:IKE packet 192.168.0.198:4500 ->
195.159.111.66:4500 ( 116 bytes )
09/01/19 23:55:19 DB : phase2 not found
09/01/19 23:55:19 <- : recv NAT-T:IKE packet 195.159.111.66:4500 ->
192.168.0.198:4500 ( 76 bytes )
09/01/19 23:55:19 DB : phase1 found
09/01/19 23:55:19 ii : processing config packet ( 76 bytes )
09/01/19 23:55:19 DB : config not found
09/01/19 23:55:19 DB : config added ( obj count = 1 )
09/01/19 23:55:19 == : new config iv ( 8 bytes )
09/01/19 23:55:19 =< : cookies c67c2ad0f02c1d8e:65da80a149997177
09/01/19 23:55:19 =< : message 4db9b66f
09/01/19 23:55:19 =< : decrypt iv ( 8 bytes )
09/01/19 23:55:19 == : decrypt packet ( 76 bytes )
09/01/19 23:55:19 <= : trimmed packet padding ( 8 bytes )
09/01/19 23:55:19 <= : stored iv ( 8 bytes )
09/01/19 23:55:19 << : hash payload
09/01/19 23:55:19 << : attribute payload
09/01/19 23:55:19 == : configure hash_i ( computed ) ( 20 bytes )
09/01/19 23:55:19 == : configure hash_c ( computed ) ( 20 bytes )
09/01/19 23:55:19 ii : configure hash verified
09/01/19 23:55:19 !! : warning, missing required xauth type attribute
09/01/19 23:55:19 ii : received xauth request -
09/01/19 23:55:19 ii : added standard xauth username attribute
09/01/19 23:55:19 ii : added standard xauth password attribute
09/01/19 23:55:19 ii : sending xauth response for robert
09/01/19 23:55:19 >> : hash payload
09/01/19 23:55:19 >> : attribute payload
09/01/19 23:55:19 == : new configure hash ( 20 bytes )
09/01/19 23:55:19 >= : cookies c67c2ad0f02c1d8e:65da80a149997177
09/01/19 23:55:19 >= : message 4db9b66f
09/01/19 23:55:19 >= : encrypt iv ( 8 bytes )
09/01/19 23:55:19 == : encrypt packet ( 86 bytes )
09/01/19 23:55:19 == : stored iv ( 8 bytes )
09/01/19 23:55:19 -> : send NAT-T:IKE packet 192.168.0.198:4500 ->
195.159.111.66:4500 ( 124 bytes )
09/01/19 23:55:19 DB : config resend event scheduled ( ref count = 2 )
09/01/19 23:55:19 <- : recv NAT-T:IKE packet 195.159.111.66:4500 ->
192.168.0.198:4500 ( 68 bytes )
09/01/19 23:55:19 DB : phase1 found
09/01/19 23:55:19 ii : processing config packet ( 68 bytes )
09/01/19 23:55:19 DB : config found
09/01/19 23:55:19 == : new config iv ( 8 bytes )
09/01/19 23:55:19 =< : cookies c67c2ad0f02c1d8e:65da80a149997177
09/01/19 23:55:19 =< : message 4786f601
09/01/19 23:55:19 =< : decrypt iv ( 8 bytes )
09/01/19 23:55:19 == : decrypt packet ( 68 bytes )
09/01/19 23:55:19 <= : trimmed packet padding ( 4 bytes )
09/01/19 23:55:19 <= : stored iv ( 8 bytes )
09/01/19 23:55:19 << : hash payload
09/01/19 23:55:19 << : attribute payload
09/01/19 23:55:19 == : configure hash_i ( computed ) ( 20 bytes )
09/01/19 23:55:19 == : configure hash_c ( computed ) ( 20 bytes )
09/01/19 23:55:19 ii : configure hash verified
09/01/19 23:55:19 ii : received xauth result -
09/01/19 23:55:19 ii : user robert authentication succeeded
09/01/19 23:55:19 ii : sending xauth acknowledge
09/01/19 23:55:19 >> : hash payload
09/01/19 23:55:19 >> : attribute payload
09/01/19 23:55:19 == : new configure hash ( 20 bytes )
09/01/19 23:55:19 >= : cookies c67c2ad0f02c1d8e:65da80a149997177
09/01/19 23:55:19 >= : message 4786f601
09/01/19 23:55:19 >= : encrypt iv ( 8 bytes )
09/01/19 23:55:19 == : encrypt packet ( 60 bytes )
09/01/19 23:55:19 == : stored iv ( 8 bytes )
09/01/19 23:55:19 DB : config resend event canceled ( ref count = 1 )
09/01/19 23:55:19 -> : send NAT-T:IKE packet 192.168.0.198:4500 ->
195.159.111.66:4500 ( 92 bytes )
09/01/19 23:55:19 DB : config resend event scheduled ( ref count = 2 )
09/01/19 23:55:19 ii : building config attribute list
09/01/19 23:55:19 ii : - IP4 Address
09/01/19 23:55:19 ii : - Address Expiry
09/01/19 23:55:19 ii : - IP4 Netamask
09/01/19 23:55:19 ii : - IP4 DNS Server
09/01/19 23:55:19 ii : - IP4 WINS Server
09/01/19 23:55:19 ii : - DNS Suffix
09/01/19 23:55:19 ii : - Split DNS Domain
09/01/19 23:55:19 ii : - IP4 Split Network Include
09/01/19 23:55:19 ii : - IP4 Split Network Exclude
09/01/19 23:55:19 ii : - PFS Group
09/01/19 23:55:19 ii : - Save Password
09/01/19 23:55:19 == : new config iv ( 8 bytes )
09/01/19 23:55:19 ii : sending config pull request
09/01/19 23:55:19 >> : hash payload
09/01/19 23:55:19 >> : attribute payload
09/01/19 23:55:19 == : new configure hash ( 20 bytes )
09/01/19 23:55:19 >= : cookies c67c2ad0f02c1d8e:65da80a149997177
09/01/19 23:55:19 >= : message 849971e8
09/01/19 23:55:19 >= : encrypt iv ( 8 bytes )
09/01/19 23:55:19 == : encrypt packet ( 104 bytes )
09/01/19 23:55:19 == : stored iv ( 8 bytes )
09/01/19 23:55:19 DB : config resend event canceled ( ref count = 1 )
09/01/19 23:55:19 -> : send NAT-T:IKE packet 192.168.0.198:4500 ->
195.159.111.66:4500 ( 140 bytes )
09/01/19 23:55:19 DB : config resend event scheduled ( ref count = 2 )
09/01/19 23:55:19 <- : recv NAT-T:IKE packet 195.159.111.66:4500 ->
192.168.0.198:4500 ( 180 bytes )
09/01/19 23:55:19 DB : phase1 found
09/01/19 23:55:19 ii : processing config packet ( 180 bytes )
09/01/19 23:55:19 DB : config found
09/01/19 23:55:19 =< : cookies c67c2ad0f02c1d8e:65da80a149997177
09/01/19 23:55:19 =< : message 849971e8
09/01/19 23:55:19 =< : decrypt iv ( 8 bytes )
09/01/19 23:55:19 == : decrypt packet ( 180 bytes )
09/01/19 23:55:19 <= : trimmed packet padding ( 3 bytes )
09/01/19 23:55:19 <= : stored iv ( 8 bytes )
09/01/19 23:55:19 << : hash payload
09/01/19 23:55:19 << : attribute payload
09/01/19 23:55:19 == : configure hash_i ( computed ) ( 20 bytes )
09/01/19 23:55:19 == : configure hash_c ( computed ) ( 20 bytes )
09/01/19 23:55:19 ii : configure hash verified
09/01/19 23:55:19 ii : received config pull response
09/01/19 23:55:19 ii : - IP4 Address = 192.168.113.220
09/01/19 23:55:19 ii : - Address Expiry = 2136015104
09/01/19 23:55:19 ii : - IP4 Netmask = 255.255.255.0
09/01/19 23:55:19 ii : - IP4 DNS Server = 10.220.205.100
09/01/19 23:55:19 ii : - DNS Suffix = pillar.as
09/01/19 23:55:19 ii : - Split Domain
09/01/19 23:55:19 ii : - IP4 Split Network Include = ANY:192.168.3.0/24:*
09/01/19 23:55:19 ii : - IP4 Split Network Include = ANY:10.220.0.0/16:*
09/01/19 23:55:19 ii : - IP4 Split Network Include = ANY:91.203.116.34/32:*
09/01/19 23:55:19 ii : - IP4 Split Network Exclude = ANY:0.0.0.0/32:* (
invalid subnet ignored )
09/01/19 23:55:19 ii : - Save Password = 0
09/01/19 23:55:19 DB : config resend event canceled ( ref count = 1 )
09/01/19 23:55:21 ii : VNET adapter MTU is 1500
09/01/19 23:55:21 ii : enabled adapter ROOT\VNET\0000
09/01/19 23:55:21 ii : creating IPSEC INBOUND policy ANY:192.168.3.0/24:* ->
ANY:192.168.113.220:*
09/01/19 23:55:21 DB : policy added ( obj count = 4 )
09/01/19 23:55:21 K> : send pfkey X_SPDADD UNSPEC message
09/01/19 23:55:21 ii : creating IPSEC OUTBOUND policy ANY:192.168.113.220:*
-> ANY:192.168.3.0/24:*
09/01/19 23:55:21 K< : recv pfkey X_SPDADD UNSPEC message
09/01/19 23:55:21 DB : policy found
09/01/19 23:55:21 ii : created IPSEC policy route for 192.168.3.0/24
09/01/19 23:55:21 DB : policy added ( obj count = 5 )
09/01/19 23:55:21 K> : send pfkey X_SPDADD UNSPEC message
09/01/19 23:55:21 ii : creating IPSEC INBOUND policy ANY:10.220.0.0/16:* ->
ANY:192.168.113.220:*
09/01/19 23:55:21 DB : policy added ( obj count = 6 )
09/01/19 23:55:21 K> : send pfkey X_SPDADD UNSPEC message
09/01/19 23:55:21 ii : creating IPSEC OUTBOUND policy ANY:192.168.113.220:*
-> ANY:10.220.0.0/16:*
09/01/19 23:55:21 ii : created IPSEC policy route for 10.220.0.0/16
09/01/19 23:55:21 DB : policy added ( obj count = 7 )
09/01/19 23:55:21 K> : send pfkey X_SPDADD UNSPEC message
09/01/19 23:55:21 ii : creating IPSEC INBOUND policy
ANY:91.203.116.34/32:*-> ANY:192.168.113.220:
*
09/01/19 23:55:21 DB : policy added ( obj count = 8 )
09/01/19 23:55:21 K> : send pfkey X_SPDADD UNSPEC message
09/01/19 23:55:21 ii : creating IPSEC OUTBOUND policy ANY:192.168.113.220:*
-> ANY:91.203.116.34/32:*
09/01/19 23:55:21 ii : created IPSEC policy route for 91.203.116.34/32
09/01/19 23:55:21 DB : policy added ( obj count = 9 )
09/01/19 23:55:21 K> : send pfkey X_SPDADD UNSPEC message
09/01/19 23:55:21 ii : split DNS bypassed ( no split domains defined )
09/01/19 23:55:21 K< : recv pfkey X_SPDADD UNSPEC message
09/01/19 23:55:21 DB : policy found
09/01/19 23:55:21 ii : calling init phase2 for initial policy
09/01/19 23:55:21 DB : policy found
09/01/19 23:55:21 DB : policy found
09/01/19 23:55:21 DB : tunnel found
09/01/19 23:55:21 DB : new phase2 ( IPSEC initiator )
09/01/19 23:55:21 DB : phase2 added ( obj count = 1 )
09/01/19 23:55:21 K> : send pfkey GETSPI ESP message
09/01/19 23:55:21 K< : recv pfkey X_SPDADD UNSPEC message
09/01/19 23:55:21 DB : policy found
09/01/19 23:55:21 K< : recv pfkey X_SPDADD UNSPEC message
09/01/19 23:55:21 DB : policy found
09/01/19 23:55:21 K< : recv pfkey X_SPDADD UNSPEC message
09/01/19 23:55:21 DB : policy found
09/01/19 23:55:21 K< : recv pfkey X_SPDADD UNSPEC message
09/01/19 23:55:21 DB : policy found
09/01/19 23:55:21 K< : recv pfkey GETSPI ESP message
09/01/19 23:55:21 DB : phase2 found
09/01/19 23:55:21 ii : updated spi for 1 ipsec-esp proposal
09/01/19 23:55:21 DB : phase1 found
09/01/19 23:55:21 >> : hash payload
09/01/19 23:55:21 >> : security association payload
09/01/19 23:55:21 >> : - proposal #1 payload
09/01/19 23:55:21 >> : -- transform #1 payload
09/01/19 23:55:21 >> : -- transform #2 payload
09/01/19 23:55:21 >> : -- transform #3 payload
09/01/19 23:55:21 >> : -- transform #4 payload
09/01/19 23:55:21 >> : -- transform #5 payload
09/01/19 23:55:21 >> : -- transform #6 payload
09/01/19 23:55:21 >> : -- transform #7 payload
09/01/19 23:55:21 >> : -- transform #8 payload
09/01/19 23:55:21 >> : -- transform #9 payload
09/01/19 23:55:21 >> : -- transform #10 payload
09/01/19 23:55:21 >> : -- transform #11 payload
09/01/19 23:55:21 >> : -- transform #12 payload
09/01/19 23:55:21 >> : -- transform #13 payload
09/01/19 23:55:21 >> : -- transform #14 payload
09/01/19 23:55:21 >> : -- transform #15 payload
09/01/19 23:55:21 >> : -- transform #16 payload
09/01/19 23:55:21 >> : -- transform #17 payload
09/01/19 23:55:21 >> : -- transform #18 payload
09/01/19 23:55:21 >> : nonce payload
09/01/19 23:55:21 >> : identification payload
09/01/19 23:55:21 >> : identification payload
09/01/19 23:55:21 == : phase2 hash_i ( input ) ( 632 bytes )
09/01/19 23:55:21 == : phase2 hash_i ( computed ) ( 20 bytes )
09/01/19 23:55:21 == : new phase2 iv ( 8 bytes )
09/01/19 23:55:21 >= : cookies c67c2ad0f02c1d8e:65da80a149997177
09/01/19 23:55:21 >= : message 208b32e8
09/01/19 23:55:21 >= : encrypt iv ( 8 bytes )
09/01/19 23:55:21 == : encrypt packet ( 680 bytes )
09/01/19 23:55:21 == : stored iv ( 8 bytes )
09/01/19 23:55:21 -> : send NAT-T:IKE packet 192.168.0.198:4500 ->
195.159.111.66:4500 ( 716 bytes )
09/01/19 23:55:21 DB : phase2 resend event scheduled ( ref count = 2 )
09/01/19 23:55:21 <- : recv NAT-T:IKE packet 195.159.111.66:4500 ->
192.168.0.198:4500 ( 188 bytes )
09/01/19 23:55:21 DB : phase1 found
09/01/19 23:55:21 ii : processing phase2 packet ( 188 bytes )
09/01/19 23:55:21 DB : phase2 found
09/01/19 23:55:21 =< : cookies c67c2ad0f02c1d8e:65da80a149997177
09/01/19 23:55:21 =< : message 208b32e8
09/01/19 23:55:21 =< : decrypt iv ( 8 bytes )
09/01/19 23:55:21 == : decrypt packet ( 188 bytes )
09/01/19 23:55:21 <= : trimmed packet padding ( 4 bytes )
09/01/19 23:55:21 <= : stored iv ( 8 bytes )
09/01/19 23:55:21 << : hash payload
09/01/19 23:55:21 << : security association payload
09/01/19 23:55:21 << : - propsal #1 payload
09/01/19 23:55:21 << : -- transform #1 payload
09/01/19 23:55:21 << : nonce payload
09/01/19 23:55:21 << : identification payload
09/01/19 23:55:21 << : identification payload
09/01/19 23:55:21 << : notification payload
09/01/19 23:55:21 == : phase2 hash_r ( input ) ( 156 bytes )
09/01/19 23:55:21 == : phase2 hash_r ( computed ) ( 20 bytes )
09/01/19 23:55:21 == : phase2 hash_r ( received ) ( 20 bytes )
09/01/19 23:55:21 ii : unmatched ipsec-esp proposal/transform
09/01/19 23:55:21 ii : msg auth ( hmac-sha != hmac-md5 )
09/01/19 23:55:21 !! : peer violates RFC, transform number mismatch ( 1 != 2
)
09/01/19 23:55:21 ii : matched ipsec-esp proposal #1 transform #2
09/01/19 23:55:21 ii : - transform    = esp-aes
09/01/19 23:55:21 ii : - key length   = 256 bits
09/01/19 23:55:21 ii : - encap mode   = udp-tunnel ( rfc )
09/01/19 23:55:21 ii : - msg auth     = hmac-sha
09/01/19 23:55:21 ii : - pfs dh group = none
09/01/19 23:55:21 ii : - life seconds = 3600
09/01/19 23:55:21 ii : - life kbytes  = 0
09/01/19 23:55:21 DB : policy found
09/01/19 23:55:21 ii : received peer RESPONDER-LIFETIME notification
09/01/19 23:55:21 ii : - 195.159.111.66:4500 -> 192.168.0.198:4500
09/01/19 23:55:21 ii : - ipsec-esp spi = 0x3e8e9ebd
09/01/19 23:55:21 ii : - data size 12
09/01/19 23:55:21 K> : send pfkey GETSPI ESP message
09/01/19 23:55:21 ii : phase2 ids accepted
09/01/19 23:55:21 ii : - loc ANY:192.168.113.220:* -> ANY:192.168.3.0/24:*
09/01/19 23:55:21 ii : - rmt ANY:192.168.3.0/24:* -> ANY:192.168.113.220:*
09/01/19 23:55:21 ii : phase2 sa established
09/01/19 23:55:21 ii : 192.168.0.198:4500 <-> 195.159.111.66:4500
09/01/19 23:55:21 == : phase2 hash_p ( input ) ( 45 bytes )
09/01/19 23:55:21 == : phase2 hash_p ( computed ) ( 20 bytes )
09/01/19 23:55:21 >> : hash payload
09/01/19 23:55:21 >= : cookies c67c2ad0f02c1d8e:65da80a149997177
09/01/19 23:55:21 >= : message 208b32e8
09/01/19 23:55:21 >= : encrypt iv ( 8 bytes )
09/01/19 23:55:21 == : encrypt packet ( 52 bytes )
09/01/19 23:55:21 == : stored iv ( 8 bytes )
09/01/19 23:55:21 DB : phase2 resend event canceled ( ref count = 1 )
09/01/19 23:55:21 -> : send NAT-T:IKE packet 192.168.0.198:4500 ->
195.159.111.66:4500 ( 84 bytes )
09/01/19 23:55:21 == : spi cipher key data ( 32 bytes )
09/01/19 23:55:21 == : spi hmac key data ( 20 bytes )
09/01/19 23:55:21 K> : send pfkey UPDATE ESP message
09/01/19 23:55:21 == : spi cipher key data ( 32 bytes )
09/01/19 23:55:21 == : spi hmac key data ( 20 bytes )
09/01/19 23:55:21 K> : send pfkey UPDATE ESP message
09/01/19 23:55:21 K< : recv pfkey GETSPI ESP message
09/01/19 23:55:21 DB : phase2 found
09/01/19 23:55:21 K< : recv pfkey UPDATE ESP message
09/01/19 23:55:21 K< : recv pfkey UPDATE ESP message
09/01/19 23:55:26 K< : recv pfkey ACQUIRE UNSPEC message
09/01/19 23:55:26 DB : policy found
09/01/19 23:55:26 DB : policy found
09/01/19 23:55:26 DB : tunnel found
09/01/19 23:55:26 DB : new phase2 ( IPSEC initiator )
09/01/19 23:55:26 DB : phase2 added ( obj count = 2 )
09/01/19 23:55:26 K> : send pfkey GETSPI ESP message
09/01/19 23:55:26 K< : recv pfkey GETSPI ESP message
09/01/19 23:55:26 DB : phase2 found
09/01/19 23:55:26 ii : updated spi for 1 ipsec-esp proposal
09/01/19 23:55:26 DB : phase1 found
09/01/19 23:55:26 >> : hash payload
09/01/19 23:55:26 >> : security association payload
09/01/19 23:55:26 >> : - proposal #1 payload
09/01/19 23:55:26 >> : -- transform #1 payload
09/01/19 23:55:26 >> : -- transform #2 payload
09/01/19 23:55:26 >> : -- transform #3 payload
09/01/19 23:55:26 >> : -- transform #4 payload
09/01/19 23:55:26 >> : -- transform #5 payload
09/01/19 23:55:26 >> : -- transform #6 payload
09/01/19 23:55:26 >> : -- transform #7 payload
09/01/19 23:55:26 >> : -- transform #8 payload
09/01/19 23:55:26 >> : -- transform #9 payload
09/01/19 23:55:26 >> : -- transform #10 payload
09/01/19 23:55:26 >> : -- transform #11 payload
09/01/19 23:55:26 >> : -- transform #12 payload
09/01/19 23:55:26 >> : -- transform #13 payload
09/01/19 23:55:26 >> : -- transform #14 payload
09/01/19 23:55:26 >> : -- transform #15 payload
09/01/19 23:55:26 >> : -- transform #16 payload
09/01/19 23:55:26 >> : -- transform #17 payload
09/01/19 23:55:26 >> : -- transform #18 payload
09/01/19 23:55:26 >> : nonce payload
09/01/19 23:55:26 >> : identification payload
09/01/19 23:55:26 >> : identification payload
09/01/19 23:55:26 == : phase2 hash_i ( input ) ( 632 bytes )
09/01/19 23:55:26 == : phase2 hash_i ( computed ) ( 20 bytes )
09/01/19 23:55:26 == : new phase2 iv ( 8 bytes )
09/01/19 23:55:26 >= : cookies c67c2ad0f02c1d8e:65da80a149997177
09/01/19 23:55:26 >= : message 59ac7e0f
09/01/19 23:55:26 >= : encrypt iv ( 8 bytes )
09/01/19 23:55:26 == : encrypt packet ( 680 bytes )
09/01/19 23:55:26 == : stored iv ( 8 bytes )
09/01/19 23:55:26 -> : send NAT-T:IKE packet 192.168.0.198:4500 ->
195.159.111.66:4500 ( 716 bytes )
09/01/19 23:55:26 DB : phase2 resend event scheduled ( ref count = 2 )
09/01/19 23:55:26 <- : recv NAT-T:IKE packet 195.159.111.66:4500 ->
192.168.0.198:4500 ( 84 bytes )
09/01/19 23:55:26 DB : phase1 found
09/01/19 23:55:26 ii : processing informational packet ( 84 bytes )
09/01/19 23:55:26 == : new informational iv ( 8 bytes )
09/01/19 23:55:26 =< : cookies c67c2ad0f02c1d8e:65da80a149997177
09/01/19 23:55:26 =< : message 94a2c033
09/01/19 23:55:26 =< : decrypt iv ( 8 bytes )
09/01/19 23:55:26 == : decrypt packet ( 84 bytes )
09/01/19 23:55:26 <= : trimmed packet padding ( 4 bytes )
09/01/19 23:55:26 <= : stored iv ( 8 bytes )
09/01/19 23:55:26 << : hash payload
09/01/19 23:55:26 << : notification payload
09/01/19 23:55:26 == : informational hash_i ( computed ) ( 20 bytes )
09/01/19 23:55:26 == : informational hash_c ( received ) ( 20 bytes )
09/01/19 23:55:26 ii : informational hash verified
09/01/19 23:55:26 ii : received peer NO-PROPOSAL-CHOSEN notification
09/01/19 23:55:26 ii : - 195.159.111.66:4500 -> 192.168.0.198:4500
09/01/19 23:55:26 ii : - ipsec-esp spi = 0x45d226fc
09/01/19 23:55:26 ii : - data size 12
09/01/19 23:55:31 ii : resend limit exceeded for phase2 exchange
09/01/19 23:55:31 ii : phase2 removal before expire time
09/01/19 23:55:31 DB : phase2 deleted ( obj count = 1 )
09/01/19 23:55:34 DB : phase1 found
09/01/19 23:55:34 -> : send NAT-T:KEEP-ALIVE packet 192.168.0.198:4500 ->
195.159.111.66:4500
09/01/19 23:55:49 DB : phase1 found
09/01/19 23:55:49 -> : send NAT-T:KEEP-ALIVE packet 192.168.0.198:4500 ->
195.159.111.66:4500
09/01/19 23:55:59 K< : recv pfkey ACQUIRE UNSPEC message
09/01/19 23:55:59 DB : policy found
09/01/19 23:55:59 DB : policy found
09/01/19 23:55:59 DB : tunnel found
09/01/19 23:55:59 DB : new phase2 ( IPSEC initiator )
09/01/19 23:55:59 DB : phase2 added ( obj count = 2 )
09/01/19 23:55:59 K> : send pfkey GETSPI ESP message
09/01/19 23:55:59 K< : recv pfkey GETSPI ESP message
09/01/19 23:55:59 DB : phase2 found
09/01/19 23:55:59 ii : updated spi for 1 ipsec-esp proposal
09/01/19 23:55:59 DB : phase1 found
09/01/19 23:55:59 >> : hash payload
09/01/19 23:55:59 >> : security association payload
09/01/19 23:55:59 >> : - proposal #1 payload
09/01/19 23:55:59 >> : -- transform #1 payload
09/01/19 23:55:59 >> : -- transform #2 payload
09/01/19 23:55:59 >> : -- transform #3 payload
09/01/19 23:55:59 >> : -- transform #4 payload
09/01/19 23:55:59 >> : -- transform #5 payload
09/01/19 23:55:59 >> : -- transform #6 payload
09/01/19 23:55:59 >> : -- transform #7 payload
09/01/19 23:55:59 >> : -- transform #8 payload
09/01/19 23:55:59 >> : -- transform #9 payload
09/01/19 23:55:59 >> : -- transform #10 payload
09/01/19 23:55:59 >> : -- transform #11 payload
09/01/19 23:55:59 >> : -- transform #12 payload
09/01/19 23:55:59 >> : -- transform #13 payload
09/01/19 23:55:59 >> : -- transform #14 payload
09/01/19 23:55:59 >> : -- transform #15 payload
09/01/19 23:55:59 >> : -- transform #16 payload
09/01/19 23:55:59 >> : -- transform #17 payload
09/01/19 23:55:59 >> : -- transform #18 payload
09/01/19 23:55:59 >> : nonce payload
09/01/19 23:55:59 >> : identification payload
09/01/19 23:55:59 >> : identification payload
09/01/19 23:55:59 == : phase2 hash_i ( input ) ( 632 bytes )
09/01/19 23:55:59 == : phase2 hash_i ( computed ) ( 20 bytes )
09/01/19 23:55:59 == : new phase2 iv ( 8 bytes )
09/01/19 23:55:59 >= : cookies c67c2ad0f02c1d8e:65da80a149997177
09/01/19 23:55:59 >= : message d66db4ce
09/01/19 23:55:59 >= : encrypt iv ( 8 bytes )
09/01/19 23:55:59 == : encrypt packet ( 680 bytes )
09/01/19 23:55:59 == : stored iv ( 8 bytes )
09/01/19 23:55:59 -> : send NAT-T:IKE packet 192.168.0.198:4500 ->
195.159.111.66:4500 ( 716 bytes )
09/01/19 23:55:59 DB : phase2 resend event scheduled ( ref count = 2 )
09/01/19 23:55:59 <- : recv NAT-T:IKE packet 195.159.111.66:4500 ->
192.168.0.198:4500 ( 84 bytes )
09/01/19 23:55:59 DB : phase1 found
09/01/19 23:55:59 ii : processing informational packet ( 84 bytes )
09/01/19 23:55:59 == : new informational iv ( 8 bytes )
09/01/19 23:55:59 =< : cookies c67c2ad0f02c1d8e:65da80a149997177
09/01/19 23:55:59 =< : message f83e5293
09/01/19 23:55:59 =< : decrypt iv ( 8 bytes )
09/01/19 23:55:59 == : decrypt packet ( 84 bytes )
09/01/19 23:55:59 <= : trimmed packet padding ( 4 bytes )
09/01/19 23:55:59 <= : stored iv ( 8 bytes )
09/01/19 23:55:59 << : hash payload
09/01/19 23:55:59 << : notification payload
09/01/19 23:55:59 == : informational hash_i ( computed ) ( 20 bytes )
09/01/19 23:55:59 == : informational hash_c ( received ) ( 20 bytes )
09/01/19 23:55:59 ii : informational hash verified
09/01/19 23:55:59 ii : received peer NO-PROPOSAL-CHOSEN notification
09/01/19 23:55:59 ii : - 195.159.111.66:4500 -> 192.168.0.198:4500
09/01/19 23:55:59 ii : - ipsec-esp spi = 0x06286536
09/01/19 23:55:59 ii : - data size 12
09/01/19 23:56:04 -> : resend 1 phase2 packet(s) 192.168.0.198:4500 ->
195.159.111.66:4500
09/01/19 23:56:04 DB : phase1 found
09/01/19 23:56:04 -> : send NAT-T:KEEP-ALIVE packet 192.168.0.198:4500 ->
195.159.111.66:4500
09/01/19 23:56:09 -> : resend 1 phase2 packet(s) 192.168.0.198:4500 ->
195.159.111.66:4500
09/01/19 23:56:14 -> : resend 1 phase2 packet(s) 192.168.0.198:4500 ->
195.159.111.66:4500
09/01/19 23:56:19 K< : recv pfkey ACQUIRE UNSPEC message
09/01/19 23:56:19 DB : policy found
09/01/19 23:56:19 DB : policy found
09/01/19 23:56:19 DB : tunnel found
09/01/19 23:56:19 DB : new phase2 ( IPSEC initiator )
09/01/19 23:56:19 DB : phase2 added ( obj count = 3 )
09/01/19 23:56:19 K> : send pfkey GETSPI ESP message
09/01/19 23:56:19 K< : recv pfkey GETSPI ESP message
09/01/19 23:56:19 DB : phase2 found
09/01/19 23:56:19 ii : updated spi for 1 ipsec-esp proposal
09/01/19 23:56:19 DB : phase1 found
09/01/19 23:56:19 >> : hash payload
09/01/19 23:56:19 >> : security association payload
09/01/19 23:56:19 >> : - proposal #1 payload
09/01/19 23:56:19 >> : -- transform #1 payload
09/01/19 23:56:19 >> : -- transform #2 payload
09/01/19 23:56:19 >> : -- transform #3 payload
09/01/19 23:56:19 >> : -- transform #4 payload
09/01/19 23:56:19 >> : -- transform #5 payload
09/01/19 23:56:19 >> : -- transform #6 payload
09/01/19 23:56:19 >> : -- transform #7 payload
09/01/19 23:56:19 >> : -- transform #8 payload
09/01/19 23:56:19 >> : -- transform #9 payload
09/01/19 23:56:19 >> : -- transform #10 payload
09/01/19 23:56:19 >> : -- transform #11 payload
09/01/19 23:56:19 >> : -- transform #12 payload
09/01/19 23:56:19 >> : -- transform #13 payload
09/01/19 23:56:19 >> : -- transform #14 payload
09/01/19 23:56:19 >> : -- transform #15 payload
09/01/19 23:56:19 >> : -- transform #16 payload
09/01/19 23:56:19 >> : -- transform #17 payload
09/01/19 23:56:19 >> : -- transform #18 payload
09/01/19 23:56:19 >> : nonce payload
09/01/19 23:56:19 >> : identification payload
09/01/19 23:56:19 >> : identification payload
09/01/19 23:56:19 == : phase2 hash_i ( input ) ( 632 bytes )
09/01/19 23:56:19 == : phase2 hash_i ( computed ) ( 20 bytes )
09/01/19 23:56:19 == : new phase2 iv ( 8 bytes )
09/01/19 23:56:19 >= : cookies c67c2ad0f02c1d8e:65da80a149997177
09/01/19 23:56:19 >= : message c54a4e5f
09/01/19 23:56:19 >= : encrypt iv ( 8 bytes )
09/01/19 23:56:19 == : encrypt packet ( 680 bytes )
09/01/19 23:56:19 == : stored iv ( 8 bytes )
09/01/19 23:56:19 -> : send NAT-T:IKE packet 192.168.0.198:4500 ->
195.159.111.66:4500 ( 716 bytes )
09/01/19 23:56:19 DB : phase2 resend event scheduled ( ref count = 2 )
09/01/19 23:56:19 ii : resend limit exceeded for phase2 exchange
09/01/19 23:56:19 ii : phase2 removal before expire time
09/01/19 23:56:19 DB : phase2 deleted ( obj count = 2 )
09/01/19 23:56:19 <- : recv NAT-T:IKE packet 195.159.111.66:4500 ->
192.168.0.198:4500 ( 84 bytes )
09/01/19 23:56:19 DB : phase1 found
09/01/19 23:56:19 ii : processing informational packet ( 84 bytes )
09/01/19 23:56:19 == : new informational iv ( 8 bytes )
09/01/19 23:56:19 =< : cookies c67c2ad0f02c1d8e:65da80a149997177
09/01/19 23:56:19 =< : message 23448ff9
09/01/19 23:56:19 =< : decrypt iv ( 8 bytes )
09/01/19 23:56:19 == : decrypt packet ( 84 bytes )
09/01/19 23:56:19 <= : trimmed packet padding ( 4 bytes )
09/01/19 23:56:19 <= : stored iv ( 8 bytes )
09/01/19 23:56:19 << : hash payload
09/01/19 23:56:19 << : notification payload
09/01/19 23:56:19 == : informational hash_i ( computed ) ( 20 bytes )
09/01/19 23:56:19 == : informational hash_c ( received ) ( 20 bytes )
09/01/19 23:56:19 ii : informational hash verified
09/01/19 23:56:19 ii : received peer NO-PROPOSAL-CHOSEN notification
09/01/19 23:56:19 ii : - 195.159.111.66:4500 -> 192.168.0.198:4500
09/01/19 23:56:19 ii : - ipsec-esp spi = 0x0ccb4fcd
09/01/19 23:56:19 ii : - data size 12
09/01/19 23:56:19 DB : phase1 found
09/01/19 23:56:19 -> : send NAT-T:KEEP-ALIVE packet 192.168.0.198:4500 ->
195.159.111.66:4500
09/01/19 23:56:24 -> : resend 1 phase2 packet(s) 192.168.0.198:4500 ->
195.159.111.66:4500
09/01/19 23:56:29 -> : resend 1 phase2 packet(s) 192.168.0.198:4500 ->
195.159.111.66:4500
09/01/19 23:56:34 -> : resend 1 phase2 packet(s) 192.168.0.198:4500 ->
195.159.111.66:4500
09/01/19 23:56:34 DB : phase1 found
09/01/19 23:56:34 -> : send NAT-T:KEEP-ALIVE packet 192.168.0.198:4500 ->
195.159.111.66:4500
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.shrew.net/pipermail/vpn-help/attachments/20090120/9a622778/attachment-0002.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: tcpdump_tun.pcap
Type: application/octet-stream
Size: 1816 bytes
Desc: not available
URL: <https://lists.shrew.net/pipermail/vpn-help/attachments/20090120/9a622778/attachment-0002.obj>


More information about the vpn-help mailing list