[vpn-help] Tunnel established but no access to internal network

Christian Holzmann mail at innovations.at
Sun Feb 24 17:53:26 CST 2013


Hello there!

I hope you can help me :-)
After reinstalling Windows 7 with Shrewsoft 2.1.7, I imported my
VPN Site COnfig - i can connect and establish the tunnel, but i
cannot access the netzwork behind the vpn (intranet page)...

I thought it would be an DNS Problem - so i entered the IP
Adress to my hosts files - but still cannot access to the intranet-page

I tried to downgrade to 2.1.5 - no success...

I tried to set Policy Generation Level to unique...
I tried to reduce MTU (both Lan Connection and VPN Site Config)

Maybe you can help me?
The logs are attached

I found following errors:
ipsec log says:
inspecting ARP request ...
13/02/25 00:38:27 DB : policy not found
13/02/25 00:38:27 ii : ignoring ARP request for 192.168.25.1, no policy 
found
and
13/02/25 00:38:27 K< : recv GET UNSPEC pfkey message


Thank you!

Regards,
Chris



-------------- next part --------------
13/02/25 00:37:37 ## : IKE Daemon, ver 2.1.7
13/02/25 00:37:37 ## : Copyright 2010 Shrew Soft Inc.
13/02/25 00:37:37 ## : This product linked OpenSSL 0.9.8h 28 May 2008
13/02/25 00:37:37 ii : opened 'D:\ProgrammeSSDInstallation\shrewsoft\debug\iked.log'
13/02/25 00:37:37 ii : opened 'D:\ProgrammeSSDInstallation\shrewsoft/debug/dump-ike-decrypt.cap'
13/02/25 00:37:37 ii : opened 'D:\ProgrammeSSDInstallation\shrewsoft/debug/dump-ike-encrypt.cap'
13/02/25 00:37:37 ii : rebuilding vnet device list ...
13/02/25 00:37:37 ii : device ROOT\VNET\0000 disabled
13/02/25 00:37:37 ii : network process thread begin ...
13/02/25 00:37:37 ii : pfkey process thread begin ...
13/02/25 00:37:37 ii : ipc server process thread begin ...
13/02/25 00:37:42 ii : ipc client process thread begin ...
13/02/25 00:37:42 <A : peer config add message
13/02/25 00:37:42 DB : peer added ( obj count = 1 )
13/02/25 00:37:42 ii : local address 192.168.25.2 selected for peer
13/02/25 00:37:42 DB : tunnel added ( obj count = 1 )
13/02/25 00:37:42 <A : proposal config message
13/02/25 00:37:42 <A : proposal config message
13/02/25 00:37:42 <A : client config message
13/02/25 00:37:42 <A : xauth username message
13/02/25 00:37:42 <A : xauth password message
13/02/25 00:37:42 <A : local id 'MUMOK' message
13/02/25 00:37:42 <A : preshared key message
13/02/25 00:37:42 <A : remote resource message
13/02/25 00:37:42 <A : peer tunnel enable message
13/02/25 00:37:42 DB : new phase1 ( ISAKMP initiator )
13/02/25 00:37:42 DB : exchange type is aggressive
13/02/25 00:37:42 DB : 192.168.25.2:500 <-> 80.109.17.203:500
13/02/25 00:37:42 DB : 23afa9033bba27d2:0000000000000000
13/02/25 00:37:42 DB : phase1 added ( obj count = 1 )
13/02/25 00:37:42 >> : security association payload
13/02/25 00:37:42 >> : - proposal #1 payload 
13/02/25 00:37:42 >> : -- transform #1 payload 
13/02/25 00:37:42 >> : -- transform #2 payload 
13/02/25 00:37:42 >> : -- transform #3 payload 
13/02/25 00:37:42 >> : -- transform #4 payload 
13/02/25 00:37:42 >> : -- transform #5 payload 
13/02/25 00:37:42 >> : -- transform #6 payload 
13/02/25 00:37:42 >> : -- transform #7 payload 
13/02/25 00:37:42 >> : -- transform #8 payload 
13/02/25 00:37:42 >> : -- transform #9 payload 
13/02/25 00:37:42 >> : -- transform #10 payload 
13/02/25 00:37:42 >> : -- transform #11 payload 
13/02/25 00:37:42 >> : -- transform #12 payload 
13/02/25 00:37:42 >> : -- transform #13 payload 
13/02/25 00:37:42 >> : -- transform #14 payload 
13/02/25 00:37:42 >> : -- transform #15 payload 
13/02/25 00:37:42 >> : -- transform #16 payload 
13/02/25 00:37:42 >> : -- transform #17 payload 
13/02/25 00:37:42 >> : -- transform #18 payload 
13/02/25 00:37:42 >> : key exchange payload
13/02/25 00:37:42 >> : nonce payload
13/02/25 00:37:42 >> : identification payload
13/02/25 00:37:42 >> : vendor id payload
13/02/25 00:37:42 ii : local supports XAUTH
13/02/25 00:37:42 >> : vendor id payload
13/02/25 00:37:42 ii : local supports nat-t ( draft v02 )
13/02/25 00:37:42 >> : vendor id payload
13/02/25 00:37:42 ii : local supports nat-t ( draft v03 )
13/02/25 00:37:42 >> : vendor id payload
13/02/25 00:37:42 ii : local supports nat-t ( rfc )
13/02/25 00:37:42 >> : vendor id payload
13/02/25 00:37:42 ii : local supports FRAGMENTATION
13/02/25 00:37:42 >> : vendor id payload
13/02/25 00:37:42 ii : local supports DPDv1
13/02/25 00:37:42 >> : vendor id payload
13/02/25 00:37:42 ii : local is SHREW SOFT compatible
13/02/25 00:37:42 >> : vendor id payload
13/02/25 00:37:42 ii : local is NETSCREEN compatible
13/02/25 00:37:42 >> : vendor id payload
13/02/25 00:37:42 ii : local is SIDEWINDER compatible
13/02/25 00:37:42 >> : vendor id payload
13/02/25 00:37:42 ii : local is CISCO UNITY compatible
13/02/25 00:37:42 >= : cookies 23afa9033bba27d2:0000000000000000
13/02/25 00:37:42 >= : message 00000000
13/02/25 00:37:42 -> : send IKE packet 192.168.25.2:500 -> 80.109.17.203:500 ( 1141 bytes )
13/02/25 00:37:42 DB : phase1 resend event scheduled ( ref count = 2 )
13/02/25 00:37:42 <- : recv IKE packet 80.109.17.203:500 -> 192.168.25.2:500 ( 444 bytes )
13/02/25 00:37:42 DB : phase1 found
13/02/25 00:37:42 ii : processing phase1 packet ( 444 bytes )
13/02/25 00:37:42 =< : cookies 23afa9033bba27d2:78607be0fef57070
13/02/25 00:37:42 =< : message 00000000
13/02/25 00:37:42 << : security association payload
13/02/25 00:37:42 << : - propsal #1 payload 
13/02/25 00:37:42 << : -- transform #2 payload 
13/02/25 00:37:42 ii : unmatched isakmp proposal/transform
13/02/25 00:37:42 ii : hash type ( hmac-sha != hmac-md5 )
13/02/25 00:37:42 ii : matched isakmp proposal #1 transform #2
13/02/25 00:37:42 ii : - transform    = ike
13/02/25 00:37:42 ii : - cipher type  = aes
13/02/25 00:37:42 ii : - key length   = 256 bits
13/02/25 00:37:42 ii : - hash type    = sha1
13/02/25 00:37:42 ii : - dh group     = modp-1024
13/02/25 00:37:42 ii : - auth type    = xauth-initiator-psk
13/02/25 00:37:42 ii : - life seconds = 86400
13/02/25 00:37:42 ii : - life kbytes  = 0
13/02/25 00:37:42 << : key exchange payload
13/02/25 00:37:42 << : nonce payload
13/02/25 00:37:42 << : identification payload
13/02/25 00:37:42 ii : phase1 id target is any
13/02/25 00:37:42 ii : phase1 id match 
13/02/25 00:37:42 ii : received = ipv4-host 80.109.17.203
13/02/25 00:37:42 << : hash payload
13/02/25 00:37:42 << : vendor id payload
13/02/25 00:37:42 ii : peer is CISCO UNITY compatible
13/02/25 00:37:42 << : vendor id payload
13/02/25 00:37:42 ii : peer supports XAUTH
13/02/25 00:37:42 << : vendor id payload
13/02/25 00:37:42 ii : peer supports DPDv1
13/02/25 00:37:42 << : vendor id payload
13/02/25 00:37:42 ii : peer supports nat-t ( draft v02 )
13/02/25 00:37:42 << : nat discovery payload
13/02/25 00:37:42 << : nat discovery payload
13/02/25 00:37:42 << : vendor id payload
13/02/25 00:37:42 ii : unknown vendor id ( 20 bytes )
13/02/25 00:37:42 0x : 4048b7d5 6ebce885 25e7de7f 00d6c2d3 c0000000
13/02/25 00:37:42 << : vendor id payload
13/02/25 00:37:42 ii : unknown vendor id ( 16 bytes )
13/02/25 00:37:42 0x : 1f07f70e aa6514d3 b0fa9654 2a500100
13/02/25 00:37:42 ii : forcing nat-t to enabled ( rfc )
13/02/25 00:37:42 ii : switching to src nat-t udp port 4500
13/02/25 00:37:42 ii : switching to dst nat-t udp port 4500
13/02/25 00:37:42 == : DH shared secret ( 128 bytes )
13/02/25 00:37:42 == : SETKEYID ( 20 bytes )
13/02/25 00:37:42 == : SETKEYID_d ( 20 bytes )
13/02/25 00:37:42 == : SETKEYID_a ( 20 bytes )
13/02/25 00:37:42 == : SETKEYID_e ( 20 bytes )
13/02/25 00:37:42 == : cipher key ( 32 bytes )
13/02/25 00:37:42 == : cipher iv ( 16 bytes )
13/02/25 00:37:42 == : phase1 hash_i ( computed ) ( 20 bytes )
13/02/25 00:37:42 >> : hash payload
13/02/25 00:37:42 >> : nat discovery payload
13/02/25 00:37:42 >> : nat discovery payload
13/02/25 00:37:42 >= : cookies 23afa9033bba27d2:78607be0fef57070
13/02/25 00:37:42 >= : message 00000000
13/02/25 00:37:42 >= : encrypt iv ( 16 bytes )
13/02/25 00:37:42 == : encrypt packet ( 100 bytes )
13/02/25 00:37:42 == : stored iv ( 16 bytes )
13/02/25 00:37:42 DB : phase1 resend event canceled ( ref count = 1 )
13/02/25 00:37:42 -> : send NAT-T:IKE packet 192.168.25.2:4500 -> 80.109.17.203:4500 ( 140 bytes )
13/02/25 00:37:42 == : phase1 hash_r ( computed ) ( 20 bytes )
13/02/25 00:37:42 == : phase1 hash_r ( received ) ( 20 bytes )
13/02/25 00:37:42 ii : phase1 sa established
13/02/25 00:37:42 ii : 80.109.17.203:4500 <-> 192.168.25.2:4500
13/02/25 00:37:42 ii : 23afa9033bba27d2:78607be0fef57070
13/02/25 00:37:42 ii : sending peer INITIAL-CONTACT notification
13/02/25 00:37:42 ii : - 192.168.25.2:4500 -> 80.109.17.203:4500
13/02/25 00:37:42 ii : - isakmp spi = 23afa9033bba27d2:78607be0fef57070
13/02/25 00:37:42 ii : - data size 0
13/02/25 00:37:42 >> : hash payload
13/02/25 00:37:42 >> : notification payload
13/02/25 00:37:42 == : new informational hash ( 20 bytes )
13/02/25 00:37:42 == : new informational iv ( 16 bytes )
13/02/25 00:37:42 >= : cookies 23afa9033bba27d2:78607be0fef57070
13/02/25 00:37:42 >= : message 516c1fb2
13/02/25 00:37:42 >= : encrypt iv ( 16 bytes )
13/02/25 00:37:42 == : encrypt packet ( 80 bytes )
13/02/25 00:37:42 == : stored iv ( 16 bytes )
13/02/25 00:37:42 -> : send NAT-T:IKE packet 192.168.25.2:4500 -> 80.109.17.203:4500 ( 124 bytes )
13/02/25 00:37:42 DB : phase2 not found
13/02/25 00:37:42 <- : recv NAT-T:IKE packet 80.109.17.203:4500 -> 192.168.25.2:4500 ( 76 bytes )
13/02/25 00:37:42 DB : phase1 found
13/02/25 00:37:42 ii : processing config packet ( 76 bytes )
13/02/25 00:37:42 DB : config not found
13/02/25 00:37:42 DB : config added ( obj count = 1 )
13/02/25 00:37:42 == : new config iv ( 16 bytes )
13/02/25 00:37:42 =< : cookies 23afa9033bba27d2:78607be0fef57070
13/02/25 00:37:42 =< : message dddc3731
13/02/25 00:37:42 =< : decrypt iv ( 16 bytes )
13/02/25 00:37:42 == : decrypt packet ( 76 bytes )
13/02/25 00:37:42 <= : trimmed packet padding ( 4 bytes )
13/02/25 00:37:42 <= : stored iv ( 16 bytes )
13/02/25 00:37:42 << : hash payload
13/02/25 00:37:42 << : attribute payload
13/02/25 00:37:42 == : configure hash_i ( computed ) ( 20 bytes )
13/02/25 00:37:42 == : configure hash_c ( computed ) ( 20 bytes )
13/02/25 00:37:42 ii : configure hash verified
13/02/25 00:37:42 ii : - xauth authentication type
13/02/25 00:37:42 ii : - xauth username
13/02/25 00:37:42 ii : - xauth password
13/02/25 00:37:42 ii : received basic xauth request - 
13/02/25 00:37:42 ii : - standard xauth username
13/02/25 00:37:42 ii : - standard xauth password
13/02/25 00:37:42 ii : sending xauth response for intraweb
13/02/25 00:37:42 >> : hash payload
13/02/25 00:37:42 >> : attribute payload
13/02/25 00:37:42 == : new configure hash ( 20 bytes )
13/02/25 00:37:42 >= : cookies 23afa9033bba27d2:78607be0fef57070
13/02/25 00:37:42 >= : message dddc3731
13/02/25 00:37:42 >= : encrypt iv ( 16 bytes )
13/02/25 00:37:42 == : encrypt packet ( 90 bytes )
13/02/25 00:37:42 == : stored iv ( 16 bytes )
13/02/25 00:37:42 -> : send NAT-T:IKE packet 192.168.25.2:4500 -> 80.109.17.203:4500 ( 124 bytes )
13/02/25 00:37:42 DB : config resend event scheduled ( ref count = 2 )
13/02/25 00:37:42 <- : recv NAT-T:IKE packet 80.109.17.203:4500 -> 192.168.25.2:4500 ( 76 bytes )
13/02/25 00:37:42 DB : phase1 found
13/02/25 00:37:42 ii : processing config packet ( 76 bytes )
13/02/25 00:37:42 DB : config found
13/02/25 00:37:42 == : new config iv ( 16 bytes )
13/02/25 00:37:42 =< : cookies 23afa9033bba27d2:78607be0fef57070
13/02/25 00:37:42 =< : message aebd3ba4
13/02/25 00:37:42 =< : decrypt iv ( 16 bytes )
13/02/25 00:37:42 == : decrypt packet ( 76 bytes )
13/02/25 00:37:42 <= : trimmed packet padding ( 12 bytes )
13/02/25 00:37:42 <= : stored iv ( 16 bytes )
13/02/25 00:37:42 << : hash payload
13/02/25 00:37:42 << : attribute payload
13/02/25 00:37:42 == : configure hash_i ( computed ) ( 20 bytes )
13/02/25 00:37:42 == : configure hash_c ( computed ) ( 20 bytes )
13/02/25 00:37:42 ii : configure hash verified
13/02/25 00:37:42 ii : received xauth result - 
13/02/25 00:37:42 ii : user intraweb authentication succeeded
13/02/25 00:37:42 ii : sending xauth acknowledge
13/02/25 00:37:42 >> : hash payload
13/02/25 00:37:42 >> : attribute payload
13/02/25 00:37:42 == : new configure hash ( 20 bytes )
13/02/25 00:37:42 >= : cookies 23afa9033bba27d2:78607be0fef57070
13/02/25 00:37:42 >= : message aebd3ba4
13/02/25 00:37:42 >= : encrypt iv ( 16 bytes )
13/02/25 00:37:42 == : encrypt packet ( 60 bytes )
13/02/25 00:37:42 == : stored iv ( 16 bytes )
13/02/25 00:37:42 DB : config resend event canceled ( ref count = 1 )
13/02/25 00:37:42 -> : send NAT-T:IKE packet 192.168.25.2:4500 -> 80.109.17.203:4500 ( 92 bytes )
13/02/25 00:37:42 DB : config resend event scheduled ( ref count = 2 )
13/02/25 00:37:42 ii : building config attribute list
13/02/25 00:37:42 ii : - IP4 Address
13/02/25 00:37:42 ii : - Address Expiry
13/02/25 00:37:42 ii : - IP4 Netamask
13/02/25 00:37:42 ii : - PFS Group
13/02/25 00:37:42 ii : - Save Password
13/02/25 00:37:42 ii : - Application Version = Cisco Systems VPN Client 4.8.01.0300:WinNT
13/02/25 00:37:42 ii : - Firewall Type = CISCO-UNKNOWN
13/02/25 00:37:42 == : new config iv ( 16 bytes )
13/02/25 00:37:42 ii : sending config pull request
13/02/25 00:37:42 >> : hash payload
13/02/25 00:37:42 >> : attribute payload
13/02/25 00:37:42 == : new configure hash ( 20 bytes )
13/02/25 00:37:42 >= : cookies 23afa9033bba27d2:78607be0fef57070
13/02/25 00:37:42 >= : message ba7988fc
13/02/25 00:37:42 >= : encrypt iv ( 16 bytes )
13/02/25 00:37:42 == : encrypt packet ( 142 bytes )
13/02/25 00:37:42 == : stored iv ( 16 bytes )
13/02/25 00:37:42 DB : config resend event canceled ( ref count = 1 )
13/02/25 00:37:42 -> : send NAT-T:IKE packet 192.168.25.2:4500 -> 80.109.17.203:4500 ( 188 bytes )
13/02/25 00:37:42 DB : config resend event scheduled ( ref count = 2 )
13/02/25 00:37:42 <- : recv NAT-T:IKE packet 80.109.17.203:4500 -> 192.168.25.2:4500 ( 172 bytes )
13/02/25 00:37:42 DB : phase1 found
13/02/25 00:37:42 ii : processing config packet ( 172 bytes )
13/02/25 00:37:42 DB : config found
13/02/25 00:37:42 =< : cookies 23afa9033bba27d2:78607be0fef57070
13/02/25 00:37:42 =< : message ba7988fc
13/02/25 00:37:42 =< : decrypt iv ( 16 bytes )
13/02/25 00:37:42 == : decrypt packet ( 172 bytes )
13/02/25 00:37:42 <= : trimmed packet padding ( 10 bytes )
13/02/25 00:37:42 <= : stored iv ( 16 bytes )
13/02/25 00:37:42 << : hash payload
13/02/25 00:37:42 << : attribute payload
13/02/25 00:37:42 == : configure hash_i ( computed ) ( 20 bytes )
13/02/25 00:37:42 == : configure hash_c ( computed ) ( 20 bytes )
13/02/25 00:37:42 ii : configure hash verified
13/02/25 00:37:42 ii : received config pull response
13/02/25 00:37:42 ii : - IP4 Address = 192.168.201.107
13/02/25 00:37:42 ii : - Save Password = 1
13/02/25 00:37:42 ii : - PFS Group = 0
13/02/25 00:37:42 ii : - Application Version = Cisco Systems, Inc ASA5510 Version 8.4(1) built by builders on Mon 31-Jan-11 02:11
13/02/25 00:37:42 DB : config resend event canceled ( ref count = 1 )
13/02/25 00:37:42 !! : invalid private netmask, defaulting to class c
13/02/25 00:37:42 ii : enabled adapter ROOT\VNET\0000 
13/02/25 00:37:42 ii : apapter ROOT\VNET\0000 MTU is 1500
13/02/25 00:37:42 ii : generating IPSEC security policies at UNIQUE level
13/02/25 00:37:42 ii : creating NONE INBOUND policy ANY:80.109.17.203:* -> ANY:192.168.25.2:*
13/02/25 00:37:42 DB : policy added ( obj count = 1 )
13/02/25 00:37:42 K> : send pfkey X_SPDADD UNSPEC message
13/02/25 00:37:42 ii : creating NONE OUTBOUND policy ANY:192.168.25.2:* -> ANY:80.109.17.203:*
13/02/25 00:37:42 K< : recv pfkey X_SPDADD UNSPEC message
13/02/25 00:37:42 DB : policy found
13/02/25 00:37:42 ii : created NONE policy route for 80.109.17.203/32
13/02/25 00:37:42 DB : policy added ( obj count = 2 )
13/02/25 00:37:42 K> : send pfkey X_SPDADD UNSPEC message
13/02/25 00:37:42 K< : recv pfkey X_SPDADD UNSPEC message
13/02/25 00:37:42 DB : policy found
13/02/25 00:37:42 ii : creating NONE INBOUND policy ANY:192.168.25.1:* -> ANY:192.168.201.107:*
13/02/25 00:37:42 DB : policy added ( obj count = 3 )
13/02/25 00:37:42 K> : send pfkey X_SPDADD UNSPEC message
13/02/25 00:37:42 ii : creating NONE OUTBOUND policy ANY:192.168.201.107:* -> ANY:192.168.25.1:*
13/02/25 00:37:42 K< : recv pfkey X_SPDADD UNSPEC message
13/02/25 00:37:42 DB : policy found
13/02/25 00:37:42 ii : created NONE policy route for 192.168.25.1/32
13/02/25 00:37:42 DB : policy added ( obj count = 4 )
13/02/25 00:37:42 K> : send pfkey X_SPDADD UNSPEC message
13/02/25 00:37:42 ii : creating IPSEC INBOUND policy ANY:192.168.101.0/25:* -> ANY:192.168.201.107:*
13/02/25 00:37:42 DB : policy added ( obj count = 5 )
13/02/25 00:37:42 K> : send pfkey X_SPDADD UNSPEC message
13/02/25 00:37:42 ii : creating IPSEC OUTBOUND policy ANY:192.168.201.107:* -> ANY:192.168.101.0/25:*
13/02/25 00:37:42 K< : recv pfkey X_SPDADD UNSPEC message
13/02/25 00:37:42 DB : policy found
13/02/25 00:37:42 K< : recv pfkey X_SPDADD UNSPEC message
13/02/25 00:37:42 DB : policy found
13/02/25 00:37:42 ii : created IPSEC policy route for 192.168.101.0/25
13/02/25 00:37:42 DB : policy added ( obj count = 6 )
13/02/25 00:37:42 K> : send pfkey X_SPDADD UNSPEC message
13/02/25 00:37:42 ii : split DNS is disabled
13/02/25 00:37:42 K< : recv pfkey X_SPDADD UNSPEC message
13/02/25 00:37:42 DB : policy found
13/02/25 00:37:42 ii : calling init phase2 for initial policy
13/02/25 00:37:42 DB : policy found
13/02/25 00:37:42 DB : policy found
13/02/25 00:37:42 DB : tunnel found
13/02/25 00:37:42 DB : new phase2 ( IPSEC initiator )
13/02/25 00:37:42 DB : phase2 added ( obj count = 1 )
13/02/25 00:37:42 K> : send pfkey GETSPI ESP message
13/02/25 00:37:42 K< : recv pfkey GETSPI ESP message
13/02/25 00:37:42 DB : phase2 found
13/02/25 00:37:42 ii : updated spi for 1 ipsec-esp proposal
13/02/25 00:37:42 DB : phase1 found
13/02/25 00:37:42 >> : hash payload
13/02/25 00:37:42 >> : security association payload
13/02/25 00:37:42 >> : - proposal #1 payload 
13/02/25 00:37:42 >> : -- transform #1 payload 
13/02/25 00:37:42 >> : -- transform #2 payload 
13/02/25 00:37:42 >> : -- transform #3 payload 
13/02/25 00:37:42 >> : -- transform #4 payload 
13/02/25 00:37:42 >> : -- transform #5 payload 
13/02/25 00:37:42 >> : -- transform #6 payload 
13/02/25 00:37:42 >> : -- transform #7 payload 
13/02/25 00:37:42 >> : -- transform #8 payload 
13/02/25 00:37:42 >> : -- transform #9 payload 
13/02/25 00:37:42 >> : -- transform #10 payload 
13/02/25 00:37:42 >> : -- transform #11 payload 
13/02/25 00:37:42 >> : -- transform #12 payload 
13/02/25 00:37:42 >> : -- transform #13 payload 
13/02/25 00:37:42 >> : -- transform #14 payload 
13/02/25 00:37:42 >> : -- transform #15 payload 
13/02/25 00:37:42 >> : -- transform #16 payload 
13/02/25 00:37:42 >> : -- transform #17 payload 
13/02/25 00:37:42 >> : -- transform #18 payload 
13/02/25 00:37:42 >> : nonce payload
13/02/25 00:37:42 >> : identification payload
13/02/25 00:37:42 >> : identification payload
13/02/25 00:37:42 == : phase2 hash_i ( input ) ( 632 bytes )
13/02/25 00:37:42 == : phase2 hash_i ( computed ) ( 20 bytes )
13/02/25 00:37:42 == : new phase2 iv ( 16 bytes )
13/02/25 00:37:42 >= : cookies 23afa9033bba27d2:78607be0fef57070
13/02/25 00:37:42 >= : message 20c20596
13/02/25 00:37:42 >= : encrypt iv ( 16 bytes )
13/02/25 00:37:42 == : encrypt packet ( 680 bytes )
13/02/25 00:37:42 == : stored iv ( 16 bytes )
13/02/25 00:37:42 -> : send NAT-T:IKE packet 192.168.25.2:4500 -> 80.109.17.203:4500 ( 716 bytes )
13/02/25 00:37:42 DB : phase2 resend event scheduled ( ref count = 2 )
13/02/25 00:37:43 <- : recv NAT-T:IKE packet 80.109.17.203:4500 -> 192.168.25.2:4500 ( 156 bytes )
13/02/25 00:37:43 DB : phase1 found
13/02/25 00:37:43 ii : processing phase2 packet ( 156 bytes )
13/02/25 00:37:43 DB : phase2 found
13/02/25 00:37:43 =< : cookies 23afa9033bba27d2:78607be0fef57070
13/02/25 00:37:43 =< : message 20c20596
13/02/25 00:37:43 =< : decrypt iv ( 16 bytes )
13/02/25 00:37:43 == : decrypt packet ( 156 bytes )
13/02/25 00:37:43 <= : stored iv ( 16 bytes )
13/02/25 00:37:43 << : hash payload
13/02/25 00:37:43 << : security association payload
13/02/25 00:37:43 << : - propsal #1 payload 
13/02/25 00:37:43 << : -- transform #1 payload 
13/02/25 00:37:43 << : nonce payload
13/02/25 00:37:43 << : identification payload
13/02/25 00:37:43 << : identification payload
13/02/25 00:37:43 == : phase2 hash_r ( input ) ( 128 bytes )
13/02/25 00:37:43 == : phase2 hash_r ( computed ) ( 20 bytes )
13/02/25 00:37:43 == : phase2 hash_r ( received ) ( 20 bytes )
13/02/25 00:37:43 ii : unmatched ipsec-esp proposal/transform
13/02/25 00:37:43 ii : key length ( 128 != 256 )
13/02/25 00:37:43 ii : unmatched ipsec-esp proposal/transform
13/02/25 00:37:43 ii : key length ( 128 != 256 )
13/02/25 00:37:43 ii : unmatched ipsec-esp proposal/transform
13/02/25 00:37:43 ii : key length ( 128 != 192 )
13/02/25 00:37:43 ii : unmatched ipsec-esp proposal/transform
13/02/25 00:37:43 ii : key length ( 128 != 192 )
13/02/25 00:37:43 ii : unmatched ipsec-esp proposal/transform
13/02/25 00:37:43 ii : msg auth ( hmac-sha != hmac-md5 )
13/02/25 00:37:43 !! : peer violates RFC, transform number mismatch ( 1 != 6 )
13/02/25 00:37:43 ii : matched ipsec-esp proposal #1 transform #6
13/02/25 00:37:43 ii : - transform    = esp-aes
13/02/25 00:37:43 ii : - key length   = 128 bits
13/02/25 00:37:43 ii : - encap mode   = udp-tunnel ( draft )
13/02/25 00:37:43 ii : - msg auth     = hmac-sha
13/02/25 00:37:43 ii : - pfs dh group = none
13/02/25 00:37:43 ii : - life seconds = 3600
13/02/25 00:37:43 ii : - life kbytes  = 0
13/02/25 00:37:43 DB : policy found
13/02/25 00:37:43 K> : send pfkey GETSPI ESP message
13/02/25 00:37:43 ii : phase2 ids accepted
13/02/25 00:37:43 ii : - loc ANY:192.168.201.107:* -> ANY:192.168.101.0/25:*
13/02/25 00:37:43 ii : - rmt ANY:192.168.101.0/25:* -> ANY:192.168.201.107:*
13/02/25 00:37:43 ii : phase2 sa established
13/02/25 00:37:43 ii : 192.168.25.2:4500 <-> 80.109.17.203:4500
13/02/25 00:37:43 == : phase2 hash_p ( input ) ( 45 bytes )
13/02/25 00:37:43 == : phase2 hash_p ( computed ) ( 20 bytes )
13/02/25 00:37:43 >> : hash payload
13/02/25 00:37:43 >= : cookies 23afa9033bba27d2:78607be0fef57070
13/02/25 00:37:43 >= : message 20c20596
13/02/25 00:37:43 >= : encrypt iv ( 16 bytes )
13/02/25 00:37:43 == : encrypt packet ( 52 bytes )
13/02/25 00:37:43 == : stored iv ( 16 bytes )
13/02/25 00:37:43 DB : phase2 resend event canceled ( ref count = 1 )
13/02/25 00:37:43 -> : send NAT-T:IKE packet 192.168.25.2:4500 -> 80.109.17.203:4500 ( 92 bytes )
13/02/25 00:37:43 == : spi cipher key data ( 16 bytes )
13/02/25 00:37:43 == : spi hmac key data ( 20 bytes )
13/02/25 00:37:43 K> : send pfkey UPDATE ESP message
13/02/25 00:37:43 == : spi cipher key data ( 16 bytes )
13/02/25 00:37:43 == : spi hmac key data ( 20 bytes )
13/02/25 00:37:43 K> : send pfkey UPDATE ESP message
13/02/25 00:37:43 K< : recv pfkey GETSPI ESP message
13/02/25 00:37:43 DB : phase2 found
13/02/25 00:37:43 K< : recv pfkey UPDATE ESP message
13/02/25 00:37:43 K< : recv pfkey UPDATE ESP message
13/02/25 00:37:57 DB : phase1 found
13/02/25 00:37:57 ii : sending peer DPDV1-R-U-THERE notification
13/02/25 00:37:57 ii : - 192.168.25.2:4500 -> 80.109.17.203:4500
13/02/25 00:37:57 ii : - isakmp spi = 23afa9033bba27d2:78607be0fef57070
13/02/25 00:37:57 ii : - data size 4
13/02/25 00:37:57 >> : hash payload
13/02/25 00:37:57 >> : notification payload
13/02/25 00:37:57 == : new informational hash ( 20 bytes )
13/02/25 00:37:57 == : new informational iv ( 16 bytes )
13/02/25 00:37:57 >= : cookies 23afa9033bba27d2:78607be0fef57070
13/02/25 00:37:57 >= : message 4df74e55
13/02/25 00:37:57 >= : encrypt iv ( 16 bytes )
13/02/25 00:37:57 == : encrypt packet ( 84 bytes )
13/02/25 00:37:57 == : stored iv ( 16 bytes )
13/02/25 00:37:57 -> : send NAT-T:IKE packet 192.168.25.2:4500 -> 80.109.17.203:4500 ( 124 bytes )
13/02/25 00:37:57 ii : DPD ARE-YOU-THERE sequence 1e64dc27 requested
13/02/25 00:37:57 DB : phase1 found
13/02/25 00:37:57 -> : send NAT-T:KEEP-ALIVE packet 192.168.25.2:4500 -> 80.109.17.203:4500
13/02/25 00:37:57 <- : recv NAT-T:IKE packet 80.109.17.203:4500 -> 192.168.25.2:4500 ( 92 bytes )
13/02/25 00:37:57 DB : phase1 found
13/02/25 00:37:57 ii : processing informational packet ( 92 bytes )
13/02/25 00:37:57 == : new informational iv ( 16 bytes )
13/02/25 00:37:57 =< : cookies 23afa9033bba27d2:78607be0fef57070
13/02/25 00:37:57 =< : message 22dbd3c5
13/02/25 00:37:57 =< : decrypt iv ( 16 bytes )
13/02/25 00:37:57 == : decrypt packet ( 92 bytes )
13/02/25 00:37:57 <= : trimmed packet padding ( 8 bytes )
13/02/25 00:37:57 <= : stored iv ( 16 bytes )
13/02/25 00:37:57 << : hash payload
13/02/25 00:37:57 << : notification payload
13/02/25 00:37:57 == : informational hash_i ( computed ) ( 20 bytes )
13/02/25 00:37:57 == : informational hash_c ( received ) ( 20 bytes )
13/02/25 00:37:57 ii : informational hash verified
13/02/25 00:37:57 ii : received peer DPDV1-R-U-THERE-ACK notification
13/02/25 00:37:57 ii : - 80.109.17.203:4500 -> 192.168.25.2:4500
13/02/25 00:37:57 ii : - isakmp spi = 23afa9033bba27d2:78607be0fef57070
13/02/25 00:37:57 ii : - data size 4
13/02/25 00:37:57 ii : DPD ARE-YOU-THERE-ACK sequence 1e64dc27 accepted
13/02/25 00:37:57 ii : next tunnel DPD request in 15 secs for peer 80.109.17.203:4500
13/02/25 00:38:12 DB : phase1 found
13/02/25 00:38:12 -> : send NAT-T:KEEP-ALIVE packet 192.168.25.2:4500 -> 80.109.17.203:4500
13/02/25 00:38:12 DB : phase1 found
13/02/25 00:38:12 ii : sending peer DPDV1-R-U-THERE notification
13/02/25 00:38:12 ii : - 192.168.25.2:4500 -> 80.109.17.203:4500
13/02/25 00:38:12 ii : - isakmp spi = 23afa9033bba27d2:78607be0fef57070
13/02/25 00:38:12 ii : - data size 4
13/02/25 00:38:12 >> : hash payload
13/02/25 00:38:12 >> : notification payload
13/02/25 00:38:12 == : new informational hash ( 20 bytes )
13/02/25 00:38:12 == : new informational iv ( 16 bytes )
13/02/25 00:38:12 >= : cookies 23afa9033bba27d2:78607be0fef57070
13/02/25 00:38:12 >= : message 51da9e45
13/02/25 00:38:12 >= : encrypt iv ( 16 bytes )
13/02/25 00:38:12 == : encrypt packet ( 84 bytes )
13/02/25 00:38:12 == : stored iv ( 16 bytes )
13/02/25 00:38:12 -> : send NAT-T:IKE packet 192.168.25.2:4500 -> 80.109.17.203:4500 ( 124 bytes )
13/02/25 00:38:12 ii : DPD ARE-YOU-THERE sequence 1e64dc28 requested
13/02/25 00:38:12 <- : recv NAT-T:IKE packet 80.109.17.203:4500 -> 192.168.25.2:4500 ( 92 bytes )
13/02/25 00:38:12 DB : phase1 found
13/02/25 00:38:12 ii : processing informational packet ( 92 bytes )
13/02/25 00:38:12 == : new informational iv ( 16 bytes )
13/02/25 00:38:12 =< : cookies 23afa9033bba27d2:78607be0fef57070
13/02/25 00:38:12 =< : message c3bf7bac
13/02/25 00:38:12 =< : decrypt iv ( 16 bytes )
13/02/25 00:38:12 == : decrypt packet ( 92 bytes )
13/02/25 00:38:12 <= : trimmed packet padding ( 8 bytes )
13/02/25 00:38:12 <= : stored iv ( 16 bytes )
13/02/25 00:38:12 << : hash payload
13/02/25 00:38:12 << : notification payload
13/02/25 00:38:12 == : informational hash_i ( computed ) ( 20 bytes )
13/02/25 00:38:12 == : informational hash_c ( received ) ( 20 bytes )
13/02/25 00:38:12 ii : informational hash verified
13/02/25 00:38:12 ii : received peer DPDV1-R-U-THERE-ACK notification
13/02/25 00:38:12 ii : - 80.109.17.203:4500 -> 192.168.25.2:4500
13/02/25 00:38:12 ii : - isakmp spi = 23afa9033bba27d2:78607be0fef57070
13/02/25 00:38:12 ii : - data size 4
13/02/25 00:38:12 ii : DPD ARE-YOU-THERE-ACK sequence 1e64dc28 accepted
13/02/25 00:38:12 ii : next tunnel DPD request in 15 secs for peer 80.109.17.203:4500
13/02/25 00:38:27 DB : phase1 found
13/02/25 00:38:27 -> : send NAT-T:KEEP-ALIVE packet 192.168.25.2:4500 -> 80.109.17.203:4500
13/02/25 00:38:27 DB : phase1 found
13/02/25 00:38:27 ii : sending peer DPDV1-R-U-THERE notification
13/02/25 00:38:27 ii : - 192.168.25.2:4500 -> 80.109.17.203:4500
13/02/25 00:38:27 ii : - isakmp spi = 23afa9033bba27d2:78607be0fef57070
13/02/25 00:38:27 ii : - data size 4
13/02/25 00:38:27 >> : hash payload
13/02/25 00:38:27 >> : notification payload
13/02/25 00:38:27 == : new informational hash ( 20 bytes )
13/02/25 00:38:27 == : new informational iv ( 16 bytes )
13/02/25 00:38:27 >= : cookies 23afa9033bba27d2:78607be0fef57070
13/02/25 00:38:27 >= : message b16353bb
13/02/25 00:38:27 >= : encrypt iv ( 16 bytes )
13/02/25 00:38:27 == : encrypt packet ( 84 bytes )
13/02/25 00:38:27 == : stored iv ( 16 bytes )
13/02/25 00:38:27 -> : send NAT-T:IKE packet 192.168.25.2:4500 -> 80.109.17.203:4500 ( 124 bytes )
13/02/25 00:38:27 ii : DPD ARE-YOU-THERE sequence 1e64dc29 requested
13/02/25 00:38:27 <- : recv NAT-T:IKE packet 80.109.17.203:4500 -> 192.168.25.2:4500 ( 92 bytes )
13/02/25 00:38:27 DB : phase1 found
13/02/25 00:38:27 ii : processing informational packet ( 92 bytes )
13/02/25 00:38:27 == : new informational iv ( 16 bytes )
13/02/25 00:38:27 =< : cookies 23afa9033bba27d2:78607be0fef57070
13/02/25 00:38:27 =< : message 1ec0ef30
13/02/25 00:38:27 =< : decrypt iv ( 16 bytes )
13/02/25 00:38:27 == : decrypt packet ( 92 bytes )
13/02/25 00:38:27 <= : trimmed packet padding ( 8 bytes )
13/02/25 00:38:27 <= : stored iv ( 16 bytes )
13/02/25 00:38:27 << : hash payload
13/02/25 00:38:27 << : notification payload
13/02/25 00:38:27 == : informational hash_i ( computed ) ( 20 bytes )
13/02/25 00:38:27 == : informational hash_c ( received ) ( 20 bytes )
13/02/25 00:38:27 ii : informational hash verified
13/02/25 00:38:27 ii : received peer DPDV1-R-U-THERE-ACK notification
13/02/25 00:38:27 ii : - 80.109.17.203:4500 -> 192.168.25.2:4500
13/02/25 00:38:27 ii : - isakmp spi = 23afa9033bba27d2:78607be0fef57070
13/02/25 00:38:27 ii : - data size 4
13/02/25 00:38:27 ii : DPD ARE-YOU-THERE-ACK sequence 1e64dc29 accepted
13/02/25 00:38:27 ii : next tunnel DPD request in 15 secs for peer 80.109.17.203:4500
13/02/25 00:38:29 !! : unable to connect to pfkey interface
13/02/25 00:38:30 !! : unable to connect to pfkey interface
13/02/25 00:38:31 !! : unable to connect to pfkey interface
13/02/25 00:38:32 ii : halt signal received, shutting down
13/02/25 00:38:32 DB : removing all peer tunnel refrences
13/02/25 00:38:32 DB : tunnel dpd event canceled ( ref count = 7 )
13/02/25 00:38:32 DB : tunnel natt event canceled ( ref count = 6 )
13/02/25 00:38:32 DB : tunnel stats event canceled ( ref count = 5 )
13/02/25 00:38:32 DB : removing tunnel config references
13/02/25 00:38:32 DB : config deleted ( obj count = 0 )
13/02/25 00:38:32 DB : removing tunnel phase2 references
13/02/25 00:38:32 DB : phase2 soft event canceled ( ref count = 2 )
13/02/25 00:38:32 DB : phase2 hard event canceled ( ref count = 1 )
13/02/25 00:38:32 DB : phase1 found
13/02/25 00:38:32 ii : sending peer DELETE message
13/02/25 00:38:32 ii : - 192.168.25.2:4500 -> 80.109.17.203:4500
13/02/25 00:38:32 ii : - ipsec-esp spi = 0x12f9d468
13/02/25 00:38:32 ii : - data size 0
13/02/25 00:38:32 >> : hash payload
13/02/25 00:38:32 >> : delete payload
13/02/25 00:38:32 == : new informational hash ( 20 bytes )
13/02/25 00:38:32 == : new informational iv ( 16 bytes )
13/02/25 00:38:32 >= : cookies 23afa9033bba27d2:78607be0fef57070
13/02/25 00:38:32 >= : message fbe162a5
13/02/25 00:38:32 >= : encrypt iv ( 16 bytes )
13/02/25 00:38:32 == : encrypt packet ( 68 bytes )
13/02/25 00:38:32 == : stored iv ( 16 bytes )
13/02/25 00:38:32 -> : send NAT-T:IKE packet 192.168.25.2:4500 -> 80.109.17.203:4500 ( 108 bytes )
13/02/25 00:38:32 K> : send pfkey DELETE ESP message
13/02/25 00:38:32 K> : send pfkey DELETE ESP message
13/02/25 00:38:32 ii : phase2 removal before expire time
13/02/25 00:38:32 DB : phase2 deleted ( obj count = 0 )
13/02/25 00:38:32 DB : removing tunnel phase1 references
13/02/25 00:38:32 DB : phase1 soft event canceled ( ref count = 3 )
13/02/25 00:38:32 DB : phase1 hard event canceled ( ref count = 2 )
13/02/25 00:38:32 DB : phase1 dead event canceled ( ref count = 1 )
13/02/25 00:38:32 ii : sending peer DELETE message
13/02/25 00:38:32 ii : - 192.168.25.2:4500 -> 80.109.17.203:4500
13/02/25 00:38:32 ii : - isakmp spi = 23afa9033bba27d2:78607be0fef57070
13/02/25 00:38:32 ii : - data size 0
13/02/25 00:38:32 >> : hash payload
13/02/25 00:38:32 >> : delete payload
13/02/25 00:38:32 == : new informational hash ( 20 bytes )
13/02/25 00:38:32 == : new informational iv ( 16 bytes )
13/02/25 00:38:32 >= : cookies 23afa9033bba27d2:78607be0fef57070
13/02/25 00:38:32 >= : message 5095818b
13/02/25 00:38:32 >= : encrypt iv ( 16 bytes )
13/02/25 00:38:32 == : encrypt packet ( 80 bytes )
13/02/25 00:38:32 == : stored iv ( 16 bytes )
13/02/25 00:38:32 -> : send NAT-T:IKE packet 192.168.25.2:4500 -> 80.109.17.203:4500 ( 124 bytes )
13/02/25 00:38:32 ii : phase1 removal before expire time
13/02/25 00:38:32 DB : phase1 deleted ( obj count = 0 )
13/02/25 00:38:32 DB : policy found
13/02/25 00:38:32 ii : removing IPSEC INBOUND policy ANY:192.168.101.0/25:* -> ANY:192.168.201.107:*
13/02/25 00:38:32 K> : send pfkey X_SPDDELETE2 UNSPEC message
13/02/25 00:38:32 DB : policy found
13/02/25 00:38:32 ii : removing IPSEC OUTBOUND policy ANY:192.168.201.107:* -> ANY:192.168.101.0/25:*
13/02/25 00:38:32 K> : send pfkey X_SPDDELETE2 UNSPEC message
13/02/25 00:38:32 ii : removed IPSEC policy route for ANY:192.168.101.0/25:*
13/02/25 00:38:32 DB : policy found
13/02/25 00:38:32 ii : removing NONE INBOUND policy ANY:80.109.17.203:* -> ANY:192.168.25.2:*
13/02/25 00:38:32 K> : send pfkey X_SPDDELETE2 UNSPEC message
13/02/25 00:38:32 DB : policy found
13/02/25 00:38:32 ii : removing NONE OUTBOUND policy ANY:192.168.25.2:* -> ANY:80.109.17.203:*
13/02/25 00:38:32 K> : send pfkey X_SPDDELETE2 UNSPEC message
13/02/25 00:38:32 ii : removed NONE policy route for ANY:80.109.17.203:*
13/02/25 00:38:32 DB : policy found
13/02/25 00:38:32 ii : removing NONE INBOUND policy ANY:192.168.25.1:* -> ANY:192.168.201.107:*
13/02/25 00:38:32 K> : send pfkey X_SPDDELETE2 UNSPEC message
13/02/25 00:38:32 DB : policy found
13/02/25 00:38:32 ii : removing NONE OUTBOUND policy ANY:192.168.201.107:* -> ANY:192.168.25.1:*
13/02/25 00:38:32 K> : send pfkey X_SPDDELETE2 UNSPEC message
13/02/25 00:38:32 ii : removed NONE policy route for ANY:192.168.25.1:*
13/02/25 00:38:32 <- : recv NAT-T:IKE packet 80.109.17.203:4500 -> 192.168.25.2:4500 ( 92 bytes )
13/02/25 00:38:32 DB : phase1 not found
13/02/25 00:38:32 ww : ike packet from 80.109.17.203 ignored, unknown phase1 sa for peer
13/02/25 00:38:32 ww : 23afa9033bba27d2:78607be0fef57070
13/02/25 00:38:32 ii : disable adapter ROOT\VNET\0000
13/02/25 00:38:32 DB : tunnel deleted ( obj count = 0 )
13/02/25 00:38:32 DB : peer deleted ( obj count = 0 )
13/02/25 00:38:32 ii : ipc client process thread exit ...
13/02/25 00:38:32 ii : ipc server process thread exit ...
13/02/25 00:38:32 ii : pfkey process thread exit ...
13/02/25 00:38:33 ii : network process thread exit ...
-------------- next part --------------
13/02/25 00:37:34 ## : IPSEC Daemon, ver 2.1.7
13/02/25 00:37:34 ## : Copyright 2010 Shrew Soft Inc.
13/02/25 00:37:34 ## : This product linked OpenSSL 0.9.8h 28 May 2008
13/02/25 00:37:34 ## : This product linked zlib v1.2.3
13/02/25 00:37:34 ii : network send process thread begin ...
13/02/25 00:37:34 ii : vflt send device attached
13/02/25 00:37:34 ii : network recv process thread begin ...
13/02/25 00:37:34 ii : pfkey server process thread begin ...
13/02/25 00:37:34 ii : vflt recv device attached
13/02/25 00:37:34 ii : pfkey client process thread begin ...
13/02/25 00:37:34 K< : recv DUMP UNSPEC message
13/02/25 00:37:34 K< : recv X_SPDDUMP UNSPEC message
13/02/25 00:37:35 ii : pfkey client process thread begin ...
13/02/25 00:37:35 K< : message REGISTER AH received
13/02/25 00:37:35 K< : message REGISTER ESP received
13/02/25 00:37:35 K< : message REGISTER IPCOMP received
13/02/25 00:37:35 K< : recv X_SPDDUMP UNSPEC message
13/02/25 00:37:37 ii : pfkey client process thread exit ...
13/02/25 00:37:37 ii : pfkey client process thread begin ...
13/02/25 00:37:37 K< : message REGISTER AH received
13/02/25 00:37:37 K< : message REGISTER ESP received
13/02/25 00:37:37 K< : message REGISTER IPCOMP received
13/02/25 00:37:37 K< : recv X_SPDDUMP UNSPEC message
13/02/25 00:37:42 K< : recv X_SPDADD UNSPEC pfkey message
13/02/25 00:37:42 ii : - id   = 0
13/02/25 00:37:42 ii : - type = NONE
13/02/25 00:37:42 ii : - dir  = INBOUND
13/02/25 00:37:42 DB : policy ref increment ( ref count = 1, policy count = 0 )
13/02/25 00:37:42 DB : policy added
13/02/25 00:37:42 DB : policy ref decrement ( ref count = 0, policy count = 1 )
13/02/25 00:37:42 K< : recv X_SPDADD UNSPEC pfkey message
13/02/25 00:37:42 ii : - id   = 0
13/02/25 00:37:42 ii : - type = NONE
13/02/25 00:37:42 ii : - dir  = OUTBOUND
13/02/25 00:37:42 DB : policy ref increment ( ref count = 1, policy count = 1 )
13/02/25 00:37:42 DB : policy added
13/02/25 00:37:42 ii : installed accept rule for 80.109.17.203/255.255.255.255
13/02/25 00:37:42 DB : policy ref decrement ( ref count = 0, policy count = 2 )
13/02/25 00:37:42 K< : recv X_SPDADD UNSPEC pfkey message
13/02/25 00:37:42 ii : - id   = 0
13/02/25 00:37:42 ii : - type = NONE
13/02/25 00:37:42 ii : - dir  = INBOUND
13/02/25 00:37:42 DB : policy ref increment ( ref count = 1, policy count = 2 )
13/02/25 00:37:42 DB : policy added
13/02/25 00:37:42 DB : policy ref decrement ( ref count = 0, policy count = 3 )
13/02/25 00:37:42 K< : recv X_SPDADD UNSPEC pfkey message
13/02/25 00:37:42 ii : - id   = 0
13/02/25 00:37:42 ii : - type = NONE
13/02/25 00:37:42 ii : - dir  = OUTBOUND
13/02/25 00:37:42 DB : policy ref increment ( ref count = 1, policy count = 3 )
13/02/25 00:37:42 DB : policy added
13/02/25 00:37:42 ii : installed accept rule for 192.168.25.1/255.255.255.255
13/02/25 00:37:42 DB : policy ref decrement ( ref count = 0, policy count = 4 )
13/02/25 00:37:42 K< : recv X_SPDADD UNSPEC pfkey message
13/02/25 00:37:42 ii : - id   = 0
13/02/25 00:37:42 ii : - type = IPSEC
13/02/25 00:37:42 ii : - dir  = INBOUND
13/02/25 00:37:42 ii : - transform #0
13/02/25 00:37:42 ii : -- proto = 50
13/02/25 00:37:42 ii : -- level = UNIQUE
13/02/25 00:37:42 ii : -- mode  = TUNNEL
13/02/25 00:37:42 ii : -- reqid = 1
13/02/25 00:37:42 ii : -- tsrc  = 80.109.17.203:0
13/02/25 00:37:42 ii : -- tdst  = 192.168.25.2:0
13/02/25 00:37:42 DB : policy ref increment ( ref count = 1, policy count = 4 )
13/02/25 00:37:42 DB : policy added
13/02/25 00:37:42 DB : policy ref decrement ( ref count = 0, policy count = 5 )
13/02/25 00:37:42 K< : recv X_SPDADD UNSPEC pfkey message
13/02/25 00:37:42 ii : - id   = 0
13/02/25 00:37:42 ii : - type = IPSEC
13/02/25 00:37:42 ii : - dir  = OUTBOUND
13/02/25 00:37:42 ii : - transform #0
13/02/25 00:37:42 ii : -- proto = 50
13/02/25 00:37:42 ii : -- level = UNIQUE
13/02/25 00:37:42 ii : -- mode  = TUNNEL
13/02/25 00:37:42 ii : -- reqid = 2
13/02/25 00:37:42 ii : -- tsrc  = 192.168.25.2:0
13/02/25 00:37:42 ii : -- tdst  = 80.109.17.203:0
13/02/25 00:37:42 DB : policy ref increment ( ref count = 1, policy count = 5 )
13/02/25 00:37:42 DB : policy added
13/02/25 00:37:42 ii : installed divert rule for 192.168.101.0/255.255.255.128
13/02/25 00:37:42 DB : policy ref decrement ( ref count = 0, policy count = 6 )
13/02/25 00:37:42 K< : recv GETSPI ESP pfkey message
13/02/25 00:37:42 ii : allocated spi for ESP sa
13/02/25 00:37:42 ii : - spi  = 0x12f9d468
13/02/25 00:37:42 ii : - src  = 80.109.17.203:4500
13/02/25 00:37:42 ii : - dst  = 192.168.25.2:4500
13/02/25 00:37:42 DB : sa ref increment ( ref count = 1, sa count = 0 )
13/02/25 00:37:42 DB : sa added
13/02/25 00:37:42 DB : sa ref increment ( ref count = 2, sa count = 1 )
13/02/25 00:37:42 DB : sa ref decrement ( ref count = 1, sa count = 1 )
13/02/25 00:37:42 K> : sent GETSPI ESP pfkey message
13/02/25 00:37:42 K> : sent GETSPI ESP pfkey message
13/02/25 00:37:43 K< : recv GETSPI ESP pfkey message
13/02/25 00:37:43 ii : allocated spi for ESP sa
13/02/25 00:37:43 ii : - spi  = 0x4a2163f4
13/02/25 00:37:43 ii : - src  = 192.168.25.2:4500
13/02/25 00:37:43 ii : - dst  = 80.109.17.203:4500
13/02/25 00:37:43 DB : sa ref increment ( ref count = 1, sa count = 1 )
13/02/25 00:37:43 DB : sa added
13/02/25 00:37:43 DB : sa ref increment ( ref count = 2, sa count = 2 )
13/02/25 00:37:43 DB : sa ref decrement ( ref count = 1, sa count = 2 )
13/02/25 00:37:43 K> : sent GETSPI ESP pfkey message
13/02/25 00:37:43 K> : sent GETSPI ESP pfkey message
13/02/25 00:37:43 K< : recv UPDATE ESP pfkey message
13/02/25 00:37:43 DB : sa found
13/02/25 00:37:43 DB : sa ref increment ( ref count = 2, sa count = 2 )
13/02/25 00:37:43 DB : sa ref increment ( ref count = 2, sa count = 2 )
13/02/25 00:37:43 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:43 ii : added sa divert rule for 80.109.17.203->192.168.25.2
13/02/25 00:37:43 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:43 ii : updated sa for protocol ESP
13/02/25 00:37:43 ii : - spi  = 0x12f9d468
13/02/25 00:37:43 ii : - src  = 80.109.17.203:4500
13/02/25 00:37:43 ii : - dst  = 192.168.25.2:4500
13/02/25 00:37:43 ii : - encr = AES-CBC
13/02/25 00:37:43 ii : - ekey = 128 bits
13/02/25 00:37:43 ii : - auth = HMAC-SHA1
13/02/25 00:37:43 ii : - akey = 160 bits
13/02/25 00:37:43 ii : - hard = 3600
13/02/25 00:37:43 ii : - soft = 2880
13/02/25 00:37:43 ii : - natt = ESPINUDP
13/02/25 00:37:43 K< : recv UPDATE ESP pfkey message
13/02/25 00:37:43 DB : sa found
13/02/25 00:37:43 DB : sa ref increment ( ref count = 2, sa count = 2 )
13/02/25 00:37:43 DB : sa ref increment ( ref count = 2, sa count = 2 )
13/02/25 00:37:43 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:43 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:43 ii : updated sa for protocol ESP
13/02/25 00:37:43 ii : - spi  = 0x4a2163f4
13/02/25 00:37:43 ii : - src  = 192.168.25.2:4500
13/02/25 00:37:43 ii : - dst  = 80.109.17.203:4500
13/02/25 00:37:43 ii : - encr = AES-CBC
13/02/25 00:37:43 ii : - ekey = 128 bits
13/02/25 00:37:43 ii : - auth = HMAC-SHA1
13/02/25 00:37:43 ii : - akey = 160 bits
13/02/25 00:37:43 ii : - hard = 3600
13/02/25 00:37:43 ii : - soft = 2880
13/02/25 00:37:43 ii : - natt = ESPINUDP
13/02/25 00:37:43 ii : removed arp mirror rule ( policycount 6 )
13/02/25 00:37:43 ii : inspecting ARP request ...
13/02/25 00:37:43 DB : policy not found
13/02/25 00:37:43 ii : ignoring ARP request for 192.168.25.1, no policy found
13/02/25 00:37:43 ii : inspecting ARP request ...
13/02/25 00:37:43 DB : policy not found
13/02/25 00:37:43 ii : ignoring ARP request for 192.168.25.1, no policy found
13/02/25 00:37:43 ii : inspecting ARP request ...
13/02/25 00:37:43 DB : policy not found
13/02/25 00:37:43 ii : ignoring ARP request for 192.168.25.1, no policy found
13/02/25 00:37:43 ii : inspecting ARP request ...
13/02/25 00:37:43 DB : policy not found
13/02/25 00:37:43 ii : ignoring ARP request for 192.168.25.1, no policy found
13/02/25 00:37:43 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:43 DB : sa found
13/02/25 00:37:43 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:43 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:43 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:43 DB : sa found
13/02/25 00:37:43 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:43 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:44 ii : inspecting ARP request ...
13/02/25 00:37:44 DB : policy not found
13/02/25 00:37:44 ii : ignoring ARP request for 192.168.25.1, no policy found
13/02/25 00:37:44 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:44 DB : sa found
13/02/25 00:37:44 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:44 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:44 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:44 DB : sa found
13/02/25 00:37:44 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:44 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:45 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:45 DB : sa found
13/02/25 00:37:45 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:45 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:45 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:45 DB : sa found
13/02/25 00:37:45 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:45 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:46 ii : inspecting ARP request ...
13/02/25 00:37:46 DB : policy not found
13/02/25 00:37:46 ii : ignoring ARP request for 192.168.25.1, no policy found
13/02/25 00:37:46 ii : inspecting ARP request ...
13/02/25 00:37:46 DB : policy not found
13/02/25 00:37:46 ii : ignoring ARP request for 192.168.25.1, no policy found
13/02/25 00:37:46 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:46 DB : sa found
13/02/25 00:37:46 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:46 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:46 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:46 DB : sa found
13/02/25 00:37:46 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:46 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:47 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:47 DB : sa found
13/02/25 00:37:47 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:47 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:47 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:47 DB : sa found
13/02/25 00:37:47 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:47 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:48 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:48 DB : sa found
13/02/25 00:37:48 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:48 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:48 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:48 DB : sa found
13/02/25 00:37:48 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:48 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:49 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:49 DB : sa found
13/02/25 00:37:49 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:49 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:49 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:49 DB : sa found
13/02/25 00:37:49 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:49 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:50 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:50 DB : sa found
13/02/25 00:37:50 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:50 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:50 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:50 DB : sa found
13/02/25 00:37:50 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:50 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:51 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:51 DB : sa found
13/02/25 00:37:51 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:51 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:51 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:51 DB : sa found
13/02/25 00:37:51 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:51 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:52 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:52 DB : sa found
13/02/25 00:37:52 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:52 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:52 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:52 DB : sa found
13/02/25 00:37:52 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:52 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:53 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:53 DB : sa found
13/02/25 00:37:53 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:53 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:53 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:53 DB : sa found
13/02/25 00:37:53 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:53 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:54 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:54 DB : sa found
13/02/25 00:37:54 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:54 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:54 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:54 DB : sa found
13/02/25 00:37:54 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:54 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:55 ii : inspecting ARP request ...
13/02/25 00:37:55 DB : policy not found
13/02/25 00:37:55 ii : ignoring ARP request for 192.168.25.1, no policy found
13/02/25 00:37:55 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:55 DB : sa found
13/02/25 00:37:55 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:55 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:55 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:55 DB : sa found
13/02/25 00:37:55 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:55 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:56 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:56 DB : sa found
13/02/25 00:37:56 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:56 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:56 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:56 DB : sa found
13/02/25 00:37:56 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:56 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:57 ii : inspecting ARP request ...
13/02/25 00:37:57 DB : policy not found
13/02/25 00:37:57 ii : ignoring ARP request for 192.168.25.1, no policy found
13/02/25 00:37:57 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:57 DB : sa found
13/02/25 00:37:57 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:57 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:57 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:57 DB : sa found
13/02/25 00:37:57 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:57 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:58 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:58 DB : sa found
13/02/25 00:37:58 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:58 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:58 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:58 DB : sa found
13/02/25 00:37:58 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:58 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:59 ii : inspecting ARP request ...
13/02/25 00:37:59 DB : policy not found
13/02/25 00:37:59 ii : ignoring ARP request for 192.168.25.100, no policy found
13/02/25 00:37:59 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:59 DB : sa found
13/02/25 00:37:59 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:59 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:37:59 K< : recv GET UNSPEC pfkey message
13/02/25 00:37:59 DB : sa found
13/02/25 00:37:59 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:37:59 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:00 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:00 DB : sa found
13/02/25 00:38:00 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:00 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:00 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:00 DB : sa found
13/02/25 00:38:00 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:00 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:01 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:01 DB : sa found
13/02/25 00:38:01 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:01 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:01 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:01 DB : sa found
13/02/25 00:38:01 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:01 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:02 ii : inspecting ARP request ...
13/02/25 00:38:02 !! : ARP packet has invalid header
13/02/25 00:38:02 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:02 DB : sa found
13/02/25 00:38:02 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:02 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:02 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:02 DB : sa found
13/02/25 00:38:02 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:02 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:03 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:03 DB : sa found
13/02/25 00:38:03 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:03 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:03 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:03 DB : sa found
13/02/25 00:38:03 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:03 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:04 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:04 DB : sa found
13/02/25 00:38:04 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:04 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:04 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:04 DB : sa found
13/02/25 00:38:04 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:04 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:05 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:05 DB : sa found
13/02/25 00:38:05 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:05 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:05 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:05 DB : sa found
13/02/25 00:38:05 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:05 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:06 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:06 DB : sa found
13/02/25 00:38:06 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:06 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:06 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:06 DB : sa found
13/02/25 00:38:06 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:06 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:07 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:07 DB : sa found
13/02/25 00:38:07 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:07 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:07 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:07 DB : sa found
13/02/25 00:38:07 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:07 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:08 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:08 DB : sa found
13/02/25 00:38:08 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:08 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:08 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:08 DB : sa found
13/02/25 00:38:08 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:08 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:09 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:09 DB : sa found
13/02/25 00:38:09 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:09 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:09 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:09 DB : sa found
13/02/25 00:38:09 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:09 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:10 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:10 DB : sa found
13/02/25 00:38:10 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:10 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:10 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:10 DB : sa found
13/02/25 00:38:10 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:10 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:11 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:11 DB : sa found
13/02/25 00:38:11 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:11 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:11 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:11 DB : sa found
13/02/25 00:38:11 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:11 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:12 ii : inspecting ARP request ...
13/02/25 00:38:12 DB : policy not found
13/02/25 00:38:12 ii : ignoring ARP request for 192.168.25.1, no policy found
13/02/25 00:38:12 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:12 DB : sa found
13/02/25 00:38:12 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:12 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:12 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:12 DB : sa found
13/02/25 00:38:12 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:12 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:13 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:13 DB : sa found
13/02/25 00:38:13 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:13 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:13 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:13 DB : sa found
13/02/25 00:38:13 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:13 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:14 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:14 DB : sa found
13/02/25 00:38:14 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:14 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:14 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:14 DB : sa found
13/02/25 00:38:14 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:14 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:15 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:15 DB : sa found
13/02/25 00:38:15 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:15 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:15 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:15 DB : sa found
13/02/25 00:38:15 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:15 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:16 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:16 DB : sa found
13/02/25 00:38:16 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:16 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:16 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:16 DB : sa found
13/02/25 00:38:16 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:16 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:17 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:17 DB : sa found
13/02/25 00:38:17 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:17 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:17 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:17 DB : sa found
13/02/25 00:38:17 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:17 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:18 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:18 DB : sa found
13/02/25 00:38:18 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:18 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:18 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:18 DB : sa found
13/02/25 00:38:18 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:18 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:19 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:19 DB : sa found
13/02/25 00:38:19 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:19 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:19 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:19 DB : sa found
13/02/25 00:38:19 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:19 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:20 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:20 DB : sa found
13/02/25 00:38:20 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:20 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:20 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:20 DB : sa found
13/02/25 00:38:20 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:20 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:21 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:21 DB : sa found
13/02/25 00:38:21 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:21 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:21 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:21 DB : sa found
13/02/25 00:38:21 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:21 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:22 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:22 DB : sa found
13/02/25 00:38:22 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:22 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:22 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:22 DB : sa found
13/02/25 00:38:22 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:22 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:23 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:23 DB : sa found
13/02/25 00:38:23 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:23 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:23 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:23 DB : sa found
13/02/25 00:38:23 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:23 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:24 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:24 DB : sa found
13/02/25 00:38:24 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:24 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:24 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:24 DB : sa found
13/02/25 00:38:24 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:24 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:25 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:25 DB : sa found
13/02/25 00:38:25 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:25 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:25 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:25 DB : sa found
13/02/25 00:38:25 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:25 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:26 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:26 DB : sa found
13/02/25 00:38:26 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:26 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:26 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:26 DB : sa found
13/02/25 00:38:26 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:26 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:27 ii : inspecting ARP request ...
13/02/25 00:38:27 DB : policy not found
13/02/25 00:38:27 ii : ignoring ARP request for 192.168.25.1, no policy found
13/02/25 00:38:27 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:27 DB : sa found
13/02/25 00:38:27 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:27 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:27 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:27 DB : sa found
13/02/25 00:38:27 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:27 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:28 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:28 DB : sa found
13/02/25 00:38:28 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:28 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:28 K< : recv GET UNSPEC pfkey message
13/02/25 00:38:28 DB : sa found
13/02/25 00:38:28 DB : sa ref increment ( ref count = 3, sa count = 2 )
13/02/25 00:38:28 DB : sa ref decrement ( ref count = 2, sa count = 2 )
13/02/25 00:38:29 ii : pfkey server process thread exit ...
13/02/25 00:38:29 ii : pfkey client process thread exit ...
13/02/25 00:38:29 ii : pfkey client process thread exit ...
13/02/25 00:38:29 ii : network send process thread exit ...
13/02/25 00:38:30 ii : network recv process thread exit ...


More information about the vpn-help mailing list