## : IPSEC Daemon, ver 1.1.0 ## : Copyright 2006 Shrew Soft Inc. ## : This product linked OpenSSL 0.9.8a 11 Oct 2005 ii : rebuilding vnet device list ... ii : device ROOT\VNET\0000 disabled ii : rebuilding vprot interface list ... ii : interface IP=192.168.17.105, MTU=1500, MAC=00:12:f0:87:b8:61 active ii : skipping interface with null address ii : 1 adapter(s) active ii : client ctrl thread begin ... DB : tunnel added DB : tunnel dereferenced ( ref count = 0, tunnel count = 1 ) ii : peer config message received DB : ipsec peer not found ii : local address selected for peer ii : 192.168.17.105 ( Intel(R) PRO/Wireless 2200BG Network Connection - Packet Scheduler Miniport ) ii : user credentials message received ii : preshared key loaded ii : policy config message received ii : policy config message received ii : tunnel enable message received DB : new phase1 sa ( ISAKMP initiator ) DB : exchange type is aggressive DB : 192.168.17.105:500 <-> 199.203.55.140:500 DB : c0f8a374dc55bd70:0000000000000000 DB : phase1 sa added >> : security association payload >> : key exchange payload >> : nonce payload >> : identification payload >> : vendor id payload >> : vendor id payload >> : vendor id payload >> : vendor id payload >> : vendor id payload -> : send IKE packet to 199.203.55.140:500 ( 356 bytes ) = 0x : c0f8a374 dc55bd70 00000000 00000000 01100400 00000000 00000164 04000038 0x : 00000001 00000001 0000002c 01010001 00000024 01010000 80010005 80020001 0x : 80040002 80030001 800b0001 000c0004 00015180 0a000084 987fccad 3048b2fb 0x : 83929cb0 d0139061 2465e30c b8daf921 74ec0bdc 9e58be6f e3a545fa 935f0034 0x : af3bbac6 069ce14a 98d5dda8 73a1c17a ba7b3a61 9d31e5f6 c1256678 e0734ced 0x : 348af64e d4fbbf4d 6c4b8b3a b63d401b 95f8cfb1 27ea8fc5 aa524aea 5132195b 0x : 96c7bcac 7f2620fb 3fde0deb a476cdf9 de6616c4 ca095bec 05000018 542bd3df 0x : 79c2d72f bcc45577 80d76bce 76f0e2a5 0d00000c 01000000 c7cb378c 0d000014 0x : 12f5f28c 457168a9 702d9fe2 74cc0100 0d000014 90cb8091 3ebb696e 086381b5 0x : ec427b1f 0d000014 4a131c81 07035845 5c5728f2 0e95452f 0d000018 4048b7d5 0x : 6ebce885 25e7de7f 00d6c2d3 80000000 00000014 afcad713 68a1f1c9 6b8696fc 0x : 77570100 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) <- : recv IKE packet from 199.203.55.140:500 ( 348 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 01100400 00000000 0000015c 04000038 0x : 00000001 00000001 0000002c 01010001 00000024 01010000 80010005 80020001 0x : 80040002 80030001 800b0001 000c0004 00015180 0a000084 d8f5c742 edffa090 0x : 7ad9741b faf17ac5 6162e22a 35c4d5d8 a0286e96 654d3596 aaa58f12 4b06a174 0x : acb1056d 650595f1 7737d598 eb773d8c b47fe69b 8d2d971e 19ebb279 a4e34ca3 0x : 4286d627 67b11c18 92dddb64 c6d8dc9c 77b669ff cdd9194c 38f5de4a ab50cf2b 0x : 948fc727 53d33e29 86d51b21 9e843d9c 28ec0f5a af25f59e 05000014 46ef55d2 0x : 467ea3ee 957c376c 5fcd1cc7 0d00000c 01000000 c7cb378c 0d000014 afcad713 0x : 68a1f1c9 6b8696fc 77570100 0d000014 afca0713 68a1f1c9 6b8696fc 77570100 0x : 0d000014 5062b335 bc20db32 c0d54465 a2f70100 08000014 1d6e178f 6c2c0be2 0x : 84985465 450fe9d4 00000014 528493d4 78f75e8a 0e96cd6c 7a693380 DB : ipsec peer found DB : phase1 sa found << : security association payload ii : matched phase1 proposal ii : - protocol = isakmp ii : - transform = ike ii : - key length = default ii : - cipher type = 3des ii : - hash type = md5 ii : - dh group = modp-1024 ii : - auth type = psk ii : - life seconds = 86400 ii : - life kbytes = 0 << : key exchange payload << : nonce payload << : identification payload << : vendor id payload ii : peer supports DPDv1 << : vendor id payload ii : unknown vendor id ( 16 bytes ) = 0x : afca0713 68a1f1c9 6b8696fc 77570100 << : vendor id payload ii : unknown vendor id ( 16 bytes ) = 0x : 5062b335 bc20db32 c0d54465 a2f70100 << : vendor id payload ii : unknown vendor id ( 16 bytes ) = 0x : 1d6e178f 6c2c0be2 84985465 450fe9d4 << : hash payload == : DH shared secret ( 128 bytes ) = 0x : 5b25a264 94b04218 a4dd3772 62e02fc6 396d1345 e37560e0 d990f1a3 e4e2863a 0x : 8f2c37b8 3b85e607 6f895f3e 61e4ac3a f3ddeda8 a01f0f77 eb6a9274 728952ab 0x : 71771978 ddf4bf74 4b3e6772 71ba0d3d fb2565b7 d24fed12 1bc48c00 89a5e261 0x : 2e4d32b1 5cb6da4d ad5036ca 7d93972d 1b767922 327c3ca6 08e21229 a2dbed2b == : SETKEYID ( 16 bytes ) = 0x : 312d4e3d 72f44383 94daeb39 f036e6ef == : SETKEYID_d ( 16 bytes ) = 0x : 5f028aef 10902977 d572a18b d3f34c8b == : SETKEYID_a ( 16 bytes ) = 0x : 24c1cfca e9f8896b 36be5333 7edd5d41 == : SETKEYID_e ( 16 bytes ) = 0x : 49dba507 7722c109 8d9d13c6 ff4e333c == : cipher key ( 32 bytes ) = 0x : c70bcb45 5562c924 d41fd0cf a924d6e7 0cb9a47f 9e7bff59 00c9af9f 50dab62e == : cipher iv ( 8 bytes ) = 0x : 71bad4c2 b83aa347 == : phase1 hash_i ( computed ) ( 16 bytes ) = 0x : 9d668b5b dfbcd589 9b335710 41f286f4 >> : hash payload >= : encrypt iv ( 8 bytes ) = 0x : 71bad4c2 b83aa347 => : encrypt packet ( 48 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100401 00000000 00000030 00000014 0x : 9d668b5b dfbcd589 9b335710 41f286f4 == : stored iv ( 8 bytes ) = 0x : d0440a9d f75c8022 -> : send IKE packet to 199.203.55.140:500 ( 52 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100401 00000000 00000034 19db25d2 0x : 3d56a4c0 35233d13 21181209 d0440a9d f75c8022 == : phase1 hash_r ( computed ) ( 16 bytes ) = 0x : 528493d4 78f75e8a 0e96cd6c 7a693380 == : phase1 hash_r ( received ) ( 16 bytes ) = 0x : 528493d4 78f75e8a 0e96cd6c 7a693380 ii : phase1 sa established ii : 192.168.17.105:500 <-> 199.203.55.140:500 ii : c0f8a374dc55bd70:88c4fec6cb61f25a >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : a1139f37 12f44dad 0e4125d2 9b2b57e1 == : new phase2 iv ( 8 bytes ) = 0x : 1036ab35 abd2e146 >= : encrypt iv ( 8 bytes ) = 0x : 1036ab35 abd2e146 => : encrypt packet ( 76 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 db7e2305 0000004c 0b000014 0x : a1139f37 12f44dad 0e4125d2 9b2b57e1 0000001c 00000001 01106002 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a == : stored iv ( 8 bytes ) = 0x : b641bd47 3afec382 -> : send IKE packet to 199.203.55.140:500 ( 76 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 db7e2305 0000004c 5d058791 0x : e8392158 c8adea00 22778d2c 55fa3e27 fd89adb9 f16d4a71 66c060c1 e667b1d4 0x : d08449a2 b641bd47 3afec382 ii : sent peer notification, INITIAL-CONTACT ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 0 DB : config added == : new phase2 iv ( 8 bytes ) = 0x : d7a8fec7 ff5e3e4d ii : determining required modecfg attributes ii : - IP4 Address ii : - IP4 Netamask ii : - Login Banner ii : - PFS Group ii : sending isakmp config request >> : hash payload >> : attribute payload == : new configure hash ( 16 bytes ) = 0x : b3869d35 7f7b763a 213d4486 62854a30 >= : encrypt iv ( 8 bytes ) = 0x : d7a8fec7 ff5e3e4d => : encrypt packet ( 72 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100601 84e7221a 00000048 0e000014 0x : b3869d35 7f7b763a 213d4486 62854a30 00000018 01000be7 00010000 00020000 0x : 70000000 70070000 == : stored iv ( 8 bytes ) = 0x : 4d50e26b b4faf6aa -> : send IKE packet to 199.203.55.140:500 ( 76 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100601 84e7221a 0000004c 39210087 0x : f153d1af 715a39f5 06bc1c2f 9b85ea05 c4e73eb2 d22d086b fa6c3bff cc215f69 0x : 0b9a7ef3 4d50e26b b4faf6aa DB : config dereferenced ( ref count = 0, config count = 1 ) DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 2, tunnel count = 1 ) <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 c2ec8cbd 00000054 67c23f83 0x : 90dd9f55 710c99b4 174ad833 d4a6b79b 56465c4d 4ef4c917 5895c023 626d0926 0x : cd3351f8 bbba273f 46a1886f 8120e9ac 461bd323 DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : a0d6d896 d0fde139 =< : decrypt iv ( 8 bytes ) = 0x : a0d6d896 d0fde139 <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 c2ec8cbd 00000054 0b000014 0x : f30c00a9 fe3b1436 b28d3048 2afc6830 00000024 00000001 01106000 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a 800b0001 800c7080 == : stored iv ( 8 bytes ) = 0x : 8120e9ac 461bd323 << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : f30c00a9 fe3b1436 b28d3048 2afc6830 == : informational hash_c ( computed ) ( 16 bytes ) = 0x : f30c00a9 fe3b1436 b28d3048 2afc6830 ii : informational hash verified ii : received peer notification, RESPONDER-LIFETIME ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 8 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 2, tunnel count = 1 ) ii : resending ip packet >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : f6ab7979 9b361333 32a034f7 a2663406 == : new phase2 iv ( 8 bytes ) = 0x : eeeb4041 b5988164 >= : encrypt iv ( 8 bytes ) = 0x : eeeb4041 b5988164 => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 2f728e4d 00000050 0b000014 0x : f6ab7979 9b361333 32a034f7 a2663406 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3350 == : stored iv ( 8 bytes ) = 0x : 4da37825 0be8b106 -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 2f728e4d 00000054 79ded788 0x : be9448a2 d016b791 29951865 04fce32b 5cada776 c8d6ff74 9c886761 bfee1808 0x : 304e6898 30fcce55 32a7a0d3 4da37825 0be8b106 ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 3ff33ed1 00000054 f2f4e333 0x : bdad6e17 1dcdf3d3 ff241af5 a6a55eaa 907a7056 f5bada8a 4b9d32d2 644b60dd 0x : 855674e4 7e12671f 06b5bfad 870d2953 d6297278 DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : cde13dc5 1d44f9b3 =< : decrypt iv ( 8 bytes ) = 0x : cde13dc5 1d44f9b3 <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 3ff33ed1 00000054 0b000014 0x : 48b2f420 cda1c73b 37615ce8 208ae46d 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3350 00000000 == : stored iv ( 8 bytes ) = 0x : 870d2953 d6297278 << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : 48b2f420 cda1c73b 37615ce8 208ae46d == : informational hash_c ( computed ) ( 16 bytes ) = 0x : 48b2f420 cda1c73b 37615ce8 208ae46d ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 2, tunnel count = 1 ) ii : resending ip packet >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : b9f27444 4b2c7d2a b47b3d17 78007235 == : new phase2 iv ( 8 bytes ) = 0x : 4cf7df15 564cd22d >= : encrypt iv ( 8 bytes ) = 0x : 4cf7df15 564cd22d => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 b1a58b98 00000050 0b000014 0x : b9f27444 4b2c7d2a b47b3d17 78007235 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3351 == : stored iv ( 8 bytes ) = 0x : 804c8c34 f7e19a48 -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 b1a58b98 00000054 a784c7d4 0x : b529331e 36fa930f 3d338abe 7fa2a2a5 c18a8f54 72b4f28f 988c7507 25054d59 0x : 86b9c965 1cb99470 6b9acf43 804c8c34 f7e19a48 ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 bf4de9b5 00000054 ef4ce9bb 0x : 0e0265f6 0b824724 9f7eeda5 15a9fd40 89333699 e9f8906f 5b16ede4 016b930f 0x : 8dc3e307 22ce6557 00f5e192 9fae49de 6e84054f DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : dd416305 4165fa4b =< : decrypt iv ( 8 bytes ) = 0x : dd416305 4165fa4b <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 bf4de9b5 00000054 0b000014 0x : 4baf1ede b7489a46 4882cf3c 1e3fce78 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3351 00000000 == : stored iv ( 8 bytes ) = 0x : 9fae49de 6e84054f << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : 4baf1ede b7489a46 4882cf3c 1e3fce78 == : informational hash_c ( computed ) ( 16 bytes ) = 0x : 4baf1ede b7489a46 4882cf3c 1e3fce78 ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 2, tunnel count = 1 ) ii : resend timout DB : config deleted DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : 59bdb730 5e3d5a6a 6cde061f 892d95e8 == : new phase2 iv ( 8 bytes ) = 0x : 10b588dd 58fe1b47 >= : encrypt iv ( 8 bytes ) = 0x : 10b588dd 58fe1b47 => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 089c5931 00000050 0b000014 0x : 59bdb730 5e3d5a6a 6cde061f 892d95e8 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3352 == : stored iv ( 8 bytes ) = 0x : 7ed157b9 6e34db1b -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 089c5931 00000054 bd63976e 0x : dd688312 2d2dd312 b9f3b9c8 7248a325 2816b967 823b68d6 e281faa9 dea14195 0x : 50760af4 6d0fd69f 0801985b 7ed157b9 6e34db1b ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 457f56c6 00000054 d50e29e9 0x : 4c06f4ea 8a8be058 9c79144c 3da8c68d df9d87b6 51f33135 53da2cd8 bea9cc6c 0x : f15f70cf 675646cf 0d187b8c 68fb9b40 5f33c3ca DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : dd9b6651 0227a5fc =< : decrypt iv ( 8 bytes ) = 0x : dd9b6651 0227a5fc <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 457f56c6 00000054 0b000014 0x : 8cad3ec6 3f3f6064 94f149b5 b1acf00d 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3352 00000000 == : stored iv ( 8 bytes ) = 0x : 68fb9b40 5f33c3ca << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : 8cad3ec6 3f3f6064 94f149b5 b1acf00d == : informational hash_c ( computed ) ( 16 bytes ) = 0x : 8cad3ec6 3f3f6064 94f149b5 b1acf00d ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : bed7b414 8cafafc7 c5c7f80e 93b5a4ae == : new phase2 iv ( 8 bytes ) = 0x : 7ae88af5 6cb0eb7d >= : encrypt iv ( 8 bytes ) = 0x : 7ae88af5 6cb0eb7d => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 323108e4 00000050 0b000014 0x : bed7b414 8cafafc7 c5c7f80e 93b5a4ae 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3353 == : stored iv ( 8 bytes ) = 0x : 247b322c 2866118c -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 323108e4 00000054 3b5e903a 0x : f293101e 22de2d5c 07e56959 7def1df1 b9ff6b76 723cde8d 9e2e9c7f 3d3a52d6 0x : f118e317 4adb720f 8b7ec300 247b322c 2866118c ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 05f2b32c 00000054 ffe9b222 0x : bdebb537 59c7cbcd fd088859 48c68af9 eaf87d7a 9e9ef798 6a3779fe 71cc4417 0x : 1b877242 e1e31250 f759e137 a497759a b64b2066 DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : 7b6bd2db f35b9665 =< : decrypt iv ( 8 bytes ) = 0x : 7b6bd2db f35b9665 <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 05f2b32c 00000054 0b000014 0x : 06560fe0 6b3e4c8e ec567629 81fa13c0 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3353 00000000 == : stored iv ( 8 bytes ) = 0x : a497759a b64b2066 << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : 06560fe0 6b3e4c8e ec567629 81fa13c0 == : informational hash_c ( computed ) ( 16 bytes ) = 0x : 06560fe0 6b3e4c8e ec567629 81fa13c0 ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : c9345ba4 0221f488 2f05dd8f deb3a65e == : new phase2 iv ( 8 bytes ) = 0x : e298b0f5 4c06f72b >= : encrypt iv ( 8 bytes ) = 0x : e298b0f5 4c06f72b => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 6fa61435 00000050 0b000014 0x : c9345ba4 0221f488 2f05dd8f deb3a65e 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3354 == : stored iv ( 8 bytes ) = 0x : f613147f f74dfe12 -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 6fa61435 00000054 53e9a445 0x : 42bd1ba9 0c54db2a e1a05780 17988d60 fa3bfc78 cb462869 fbf75103 50b2fc58 0x : e742def3 0052d2d0 698e4d8a f613147f f74dfe12 ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 f5e10593 00000054 cb1d0c10 0x : 60cfbfe6 683d5722 b8b04618 4b69d9af f473f99a 4e2723a2 7d4298ff 6619471e 0x : e405efdf 664a43e1 6608cc48 880606cc bd0169cf DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : 5d7acf35 1d8ce832 =< : decrypt iv ( 8 bytes ) = 0x : 5d7acf35 1d8ce832 <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 f5e10593 00000054 0b000014 0x : a0e95687 8f899783 fc023635 746612d7 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3354 00000000 == : stored iv ( 8 bytes ) = 0x : 880606cc bd0169cf << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : a0e95687 8f899783 fc023635 746612d7 == : informational hash_c ( computed ) ( 16 bytes ) = 0x : a0e95687 8f899783 fc023635 746612d7 ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : 205f6f7d 9b624663 6c745c2e 52e41538 == : new phase2 iv ( 8 bytes ) = 0x : 05c86828 9e2120c0 >= : encrypt iv ( 8 bytes ) = 0x : 05c86828 9e2120c0 => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 9c5a3086 00000050 0b000014 0x : 205f6f7d 9b624663 6c745c2e 52e41538 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3355 == : stored iv ( 8 bytes ) = 0x : 446cde50 6c5fc9a4 -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 9c5a3086 00000054 5299aff3 0x : cb255b86 e85175ad 1c9dc972 02fe5031 e4d840bc db676b4a c3cea9f7 c32e73ae 0x : 7cfb35fc 60a13299 87e2fae9 446cde50 6c5fc9a4 ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 3c8b01e0 00000054 6305b3cd 0x : 0f493a8e 75e33ce6 96b64413 d1df2f5f 6ad88039 99d2227a 9af0cfe2 3245d7f6 0x : 6b310d50 d54f2647 f0542604 e9374cec 2764ebdd DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : 9340f003 e73e3292 =< : decrypt iv ( 8 bytes ) = 0x : 9340f003 e73e3292 <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 3c8b01e0 00000054 0b000014 0x : 69e06c8a 1105e92c cfd9fb6c 6cc01f51 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3355 00000000 == : stored iv ( 8 bytes ) = 0x : e9374cec 2764ebdd << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : 69e06c8a 1105e92c cfd9fb6c 6cc01f51 == : informational hash_c ( computed ) ( 16 bytes ) = 0x : 69e06c8a 1105e92c cfd9fb6c 6cc01f51 ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) ii : - identity ........ = 29680 ii : - flags ........... = 33152 ii : - total questions . = 1 ii : - total answers ... = 1 ii : - authoritative ... = 0 ii : - additional ...... = 0 ii : - question #1 ii : - name ........... = shrew.net ii : - type ........... = A ii : - class .......... = INET ii : - answer #1 ii : - name ........... = shrew.net ii : - type ........... = A ii : - class .......... = INET ii : - ttl ............ = 0d:0h:30m:0s ii : - data ........... = 4 ii : recv DNS packet from 192.168.17.1 >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : 26bf3670 05a77a37 5d2fa2c3 18482424 == : new phase2 iv ( 8 bytes ) = 0x : 6966b496 80a8971d >= : encrypt iv ( 8 bytes ) = 0x : 6966b496 80a8971d => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 788d7222 00000050 0b000014 0x : 26bf3670 05a77a37 5d2fa2c3 18482424 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3356 == : stored iv ( 8 bytes ) = 0x : af07a5c5 0f20292d -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 788d7222 00000054 9239fd86 0x : e98e5581 a362f081 e7bc2efa a4eb39eb 75f82fbf 97fb56a1 6c1cbf44 b7aa793d 0x : 171b9c21 24ae66fa 6a0e9553 af07a5c5 0f20292d ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 60ab8153 00000054 d43efbfa 0x : 96b5260f fc86640b 8f65413d 1dd3393d f642ba87 ac48df5d a1cb07b2 a4277b6c 0x : 202b90fd 6c6022ee e813c4d6 286048b8 736e7a8d DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : 757e2c38 2e95a827 =< : decrypt iv ( 8 bytes ) = 0x : 757e2c38 2e95a827 <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 60ab8153 00000054 0b000014 0x : 4e273231 ad7c69e2 c54acba2 f5ac3e12 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3356 00000000 == : stored iv ( 8 bytes ) = 0x : 286048b8 736e7a8d << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : 4e273231 ad7c69e2 c54acba2 f5ac3e12 == : informational hash_c ( computed ) ( 16 bytes ) = 0x : 4e273231 ad7c69e2 c54acba2 f5ac3e12 ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) ii : - identity ........ = 57587 ii : - flags ........... = 33152 ii : - total questions . = 1 ii : - total answers ... = 2 ii : - authoritative ... = 0 ii : - additional ...... = 0 ii : - question #1 ii : - name ........... = www.shrew.net ii : - type ........... = A ii : - class .......... = INET ii : - answer #1 ii : - name ........... = www.shrew.net ii : - type ........... = CNAME ii : - class .......... = INET ii : - ttl ............ = 0d:0h:30m:0s ii : - data ........... = 7 ii : - answer #2 ii : - name ........... = mail.shrew.net ii : - type ........... = A ii : - class .......... = INET ii : - ttl ............ = 0d:0h:30m:0s ii : - data ........... = 4 ii : recv DNS packet from 192.168.17.1 >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : a6ff5f75 41c36e73 a47e4527 0bda79e1 == : new phase2 iv ( 8 bytes ) = 0x : ccf0ec2a 62d30dae >= : encrypt iv ( 8 bytes ) = 0x : ccf0ec2a 62d30dae => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 bf70176b 00000050 0b000014 0x : a6ff5f75 41c36e73 a47e4527 0bda79e1 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3357 == : stored iv ( 8 bytes ) = 0x : 473a0199 5b80e8cc -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 bf70176b 00000054 aa72e860 0x : 579c42d5 104295d8 a326e1a4 61ef34b6 f65dd035 e59314b6 b84d5b10 7c1a7448 0x : 78e8c658 d7e02fe0 4a95e27a 473a0199 5b80e8cc ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 78a61ab8 00000054 c34af42b 0x : 18c841fc 1143ed8e 06642623 a283aa23 6ba9e526 70ca6d7a 61d30d70 cc9d4579 0x : e37f4ce9 b5181c2a 49107c1c d4abae39 e3f43a36 DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : 4183193f e0f53340 =< : decrypt iv ( 8 bytes ) = 0x : 4183193f e0f53340 <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 78a61ab8 00000054 0b000014 0x : b8cd5dbe c12425f8 4aa0a0a5 5e7ace83 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3357 00000000 == : stored iv ( 8 bytes ) = 0x : d4abae39 e3f43a36 << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : b8cd5dbe c12425f8 4aa0a0a5 5e7ace83 == : informational hash_c ( computed ) ( 16 bytes ) = 0x : b8cd5dbe c12425f8 4aa0a0a5 5e7ace83 ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) ii : - identity ........ = 51197 ii : - flags ........... = 33152 ii : - total questions . = 1 ii : - total answers ... = 4 ii : - authoritative ... = 0 ii : - additional ...... = 0 ii : - question #1 ii : - name ........... = www.google.ca ii : - type ........... = A ii : - class .......... = INET ii : - answer #1 ii : - name ........... = www.google.ca ii : - type ........... = CNAME ii : - class .......... = INET ii : - ttl ............ = 0d:0h:8m:0s ii : - data ........... = 16 ii : - answer #2 ii : - name ........... = www.google.com ii : - type ........... = CNAME ii : - class .......... = INET ii : - ttl ............ = 0d:0h:15m:33s ii : - data ........... = 8 ii : - answer #3 ii : - name ........... = www.l.google.com ii : - type ........... = A ii : - class .......... = INET ii : - ttl ............ = 0d:0h:1m:14s ii : - data ........... = 4 ii : - answer #4 ii : - name ........... = www.l.google.com ii : - type ........... = A ii : - class .......... = INET ii : - ttl ............ = 0d:0h:1m:14s ii : - data ........... = 4 ii : recv DNS packet from 192.168.17.1 >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : 91471d01 43fb81c2 49b74690 e5c91e84 == : new phase2 iv ( 8 bytes ) = 0x : 4106c60e 6c1b18b1 >= : encrypt iv ( 8 bytes ) = 0x : 4106c60e 6c1b18b1 => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 20e8fe5f 00000050 0b000014 0x : 91471d01 43fb81c2 49b74690 e5c91e84 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3358 == : stored iv ( 8 bytes ) = 0x : 5ac7f04c 935851b3 -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 20e8fe5f 00000054 ed481b7e 0x : baa1e900 604b7ede 5c13f6e6 4a12b615 4ef05a95 fecf25d0 1fe37301 e07ff740 0x : 05185e69 9d900981 6643b3f0 5ac7f04c 935851b3 ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 844f7ac9 00000054 fb3b8984 0x : 4926ac91 b295ff55 c3c415a3 e1ef327b b5209d2f 339658e2 8a1cb321 409078a8 0x : 6f96c2c1 92d90f5a c34a17e4 9a436fdc 04861322 DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : 181118cc ab648d41 =< : decrypt iv ( 8 bytes ) = 0x : 181118cc ab648d41 <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 844f7ac9 00000054 0b000014 0x : a7dc9093 89c2b2db 6aef78b3 368d5f3f 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3358 00000000 == : stored iv ( 8 bytes ) = 0x : 9a436fdc 04861322 << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : a7dc9093 89c2b2db 6aef78b3 368d5f3f == : informational hash_c ( computed ) ( 16 bytes ) = 0x : a7dc9093 89c2b2db 6aef78b3 368d5f3f ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : fe697109 e49d3221 e66070a3 120a95d8 == : new phase2 iv ( 8 bytes ) = 0x : 9a9093f7 9a6ece88 >= : encrypt iv ( 8 bytes ) = 0x : 9a9093f7 9a6ece88 => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 f19b8989 00000050 0b000014 0x : fe697109 e49d3221 e66070a3 120a95d8 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3359 == : stored iv ( 8 bytes ) = 0x : 6a4fa5b1 0eb95f0c -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 f19b8989 00000054 3f626a51 0x : 8696dee6 9899e8f6 65418164 e285cf91 1523186c 1604468e e5248fc2 8ecc6808 0x : da5ad8f2 d32a127d f71a8d83 6a4fa5b1 0eb95f0c ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 33bf9df9 00000054 ab6b0b28 0x : ca7833a8 a34860d6 b09085bb 2fe94f90 da89353a af2838a4 f6bb9a22 835971c5 0x : 871c8812 4bd64bfa 06865476 9a6b917f a70f81b1 DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : 67beb1de 94b2b05e =< : decrypt iv ( 8 bytes ) = 0x : 67beb1de 94b2b05e <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 33bf9df9 00000054 0b000014 0x : 9817dcee c6b6865b 53ed7a46 0fafadda 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3359 00000000 == : stored iv ( 8 bytes ) = 0x : 9a6b917f a70f81b1 << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : 9817dcee c6b6865b 53ed7a46 0fafadda == : informational hash_c ( computed ) ( 16 bytes ) = 0x : 9817dcee c6b6865b 53ed7a46 0fafadda ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : 82364d72 e7399cc0 be705a4a 8b719bf9 == : new phase2 iv ( 8 bytes ) = 0x : a1311b0a 52dece2d >= : encrypt iv ( 8 bytes ) = 0x : a1311b0a 52dece2d => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 66a9b56a 00000050 0b000014 0x : 82364d72 e7399cc0 be705a4a 8b719bf9 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e335a == : stored iv ( 8 bytes ) = 0x : 91635166 4610dad4 -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 66a9b56a 00000054 33561f04 0x : 46417cbd 926e0f5b c2d9baab 68515386 105a07bf cde525cf 41f47703 8ba2a850 0x : 7b633b81 c8bc42a8 ead7852b 91635166 4610dad4 ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 dd803981 00000054 b1ef2766 0x : 1ba72db3 a1e92627 94486b67 544201bc 3b130095 81cc7adc a19745a1 155dfc30 0x : 09f82ca0 0fb81837 39481fa2 6da510c0 de894d62 DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : 35012314 0b7c05ec =< : decrypt iv ( 8 bytes ) = 0x : 35012314 0b7c05ec <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 dd803981 00000054 0b000014 0x : 74ab12f2 75e51407 e735ace6 b885044e 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e335a 00000000 == : stored iv ( 8 bytes ) = 0x : 6da510c0 de894d62 << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : 74ab12f2 75e51407 e735ace6 b885044e == : informational hash_c ( computed ) ( 16 bytes ) = 0x : 74ab12f2 75e51407 e735ace6 b885044e ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : 95527765 c657c02c c80fc4b8 65ae7d8d == : new phase2 iv ( 8 bytes ) = 0x : 2b3e39fa e4599bf0 >= : encrypt iv ( 8 bytes ) = 0x : 2b3e39fa e4599bf0 => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 1a19ab20 00000050 0b000014 0x : 95527765 c657c02c c80fc4b8 65ae7d8d 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e335b == : stored iv ( 8 bytes ) = 0x : 77c0261e 42149414 -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 1a19ab20 00000054 92f53129 0x : c19b035a ac6dfb46 25e51fdf e6c5cedb a3d3c7b1 48d58a41 1be9339f 9510d46f 0x : a5d3bafd 359318ea 5dd8de97 77c0261e 42149414 ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 2d2f9da0 00000054 14c8217a 0x : 13b04cd3 ee3b281b dbf5648e ed8a42ad 489268e9 15be48d2 4ac0e03f 04d6262e 0x : 1ece24f5 5271d330 fd9ee30d f64736a9 9266344a DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : 2c766bba c249b9b7 =< : decrypt iv ( 8 bytes ) = 0x : 2c766bba c249b9b7 <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 2d2f9da0 00000054 0b000014 0x : 428c199e 271b1ca5 8ed7718e 042b49a8 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e335b 00000000 == : stored iv ( 8 bytes ) = 0x : f64736a9 9266344a << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : 428c199e 271b1ca5 8ed7718e 042b49a8 == : informational hash_c ( computed ) ( 16 bytes ) = 0x : 428c199e 271b1ca5 8ed7718e 042b49a8 ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : 1e8373fb b1c185db a468b5b0 135a6fdc == : new phase2 iv ( 8 bytes ) = 0x : 7c286661 dc7c6938 >= : encrypt iv ( 8 bytes ) = 0x : 7c286661 dc7c6938 => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 6738c993 00000050 0b000014 0x : 1e8373fb b1c185db a468b5b0 135a6fdc 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e335c == : stored iv ( 8 bytes ) = 0x : 200ad1a5 58a8ba54 -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 6738c993 00000054 1d7b4f31 0x : 4cdb9979 ce376398 feabc360 e443ba66 db0ed940 4817e98f 06384112 815b203b 0x : 2a8d256e 43cee84a 56cb3f57 200ad1a5 58a8ba54 ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 0812e196 00000054 465c749e 0x : fbb2c2d6 c8970f23 75af4a41 c0b8c47d 5dc51f4b c037ae11 a44154f3 e60b0f40 0x : 7fd8ec3f 419851e6 935d0ed9 eaab4415 167fe817 DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : 07a1d6f5 97cafcbe =< : decrypt iv ( 8 bytes ) = 0x : 07a1d6f5 97cafcbe <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 0812e196 00000054 0b000014 0x : 2e51001e 560ff320 443d5079 3e3e77cf 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e335c 00000000 == : stored iv ( 8 bytes ) = 0x : eaab4415 167fe817 << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : 2e51001e 560ff320 443d5079 3e3e77cf == : informational hash_c ( computed ) ( 16 bytes ) = 0x : 2e51001e 560ff320 443d5079 3e3e77cf ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) ii : - identity ........ = 18429 ii : - flags ........... = 33152 ii : - total questions . = 1 ii : - total answers ... = 3 ii : - authoritative ... = 0 ii : - additional ...... = 0 ii : - question #1 ii : - name ........... = browsersync.google.com ii : - type ........... = A ii : - class .......... = INET ii : - answer #1 ii : - name ........... = browsersync.google.com ii : - type ........... = CNAME ii : - class .......... = INET ii : - ttl ............ = 0d:0h:1m:53s ii : - data ........... = 16 ii : - answer #2 ii : - name ........... = browsersync.l.google.com ii : - type ........... = A ii : - class .......... = INET ii : - ttl ............ = 0d:0h:5m:0s ii : - data ........... = 4 ii : - answer #3 ii : - name ........... = browsersync.l.google.com ii : - type ........... = A ii : - class .......... = INET ii : - ttl ............ = 0d:0h:5m:0s ii : - data ........... = 4 ii : recv DNS packet from 192.168.17.1 >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : bcff8e9f 9574f103 e648ed9d 341e83cb == : new phase2 iv ( 8 bytes ) = 0x : 760c06a0 45c4aa7d >= : encrypt iv ( 8 bytes ) = 0x : 760c06a0 45c4aa7d => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 2cea688d 00000050 0b000014 0x : bcff8e9f 9574f103 e648ed9d 341e83cb 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e335d == : stored iv ( 8 bytes ) = 0x : 1dfcf3d8 9984d982 -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 2cea688d 00000054 c6b9b2b0 0x : a58afd48 c6802ea4 b69529f3 0b11ce21 ad19a1cc f44829e4 01ae42ca f489db20 0x : 96e6237c ab9e68f0 be8dca92 1dfcf3d8 9984d982 ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 cbd225c8 00000054 6c4bb49b 0x : 4c0a95e1 a1e36e93 d2665f1f d5e27139 296771c2 86a4cec6 65efe8b8 f9e5d855 0x : 7805d788 b1c60027 7f3677ed 2427dbac 541725d8 DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : 755b468b 0f641645 =< : decrypt iv ( 8 bytes ) = 0x : 755b468b 0f641645 <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 cbd225c8 00000054 0b000014 0x : f49fa71c d18d4416 294ee7f0 cedc55d9 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e335d 00000000 == : stored iv ( 8 bytes ) = 0x : 2427dbac 541725d8 << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : f49fa71c d18d4416 294ee7f0 cedc55d9 == : informational hash_c ( computed ) ( 16 bytes ) = 0x : f49fa71c d18d4416 294ee7f0 cedc55d9 ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) ii : - identity ........ = 30972 ii : - flags ........... = 33152 ii : - total questions . = 1 ii : - total answers ... = 2 ii : - authoritative ... = 0 ii : - additional ...... = 0 ii : - question #1 ii : - name ........... = www.dslreports.com ii : - type ........... = A ii : - class .......... = INET ii : - answer #1 ii : - name ........... = www.dslreports.com ii : - type ........... = CNAME ii : - class .......... = INET ii : - ttl ............ = 0d:0h:30m:0s ii : - data ........... = 2 ii : - answer #2 ii : - name ........... = dslreports.com ii : - type ........... = A ii : - class .......... = INET ii : - ttl ............ = 0d:0h:30m:0s ii : - data ........... = 4 ii : recv DNS packet from 192.168.17.1 >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : 1596e8a3 3920e4de b5c5b33f fe385189 == : new phase2 iv ( 8 bytes ) = 0x : 3ebdc9b8 877fb28c >= : encrypt iv ( 8 bytes ) = 0x : 3ebdc9b8 877fb28c => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 d3d41391 00000050 0b000014 0x : 1596e8a3 3920e4de b5c5b33f fe385189 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e335e == : stored iv ( 8 bytes ) = 0x : 5acf4946 4168086a -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 d3d41391 00000054 8bdb043b 0x : b35341ff 3155c125 1733f3e9 04c5332a 13e03299 59b87fe9 eebf03c1 7ab07b27 0x : aa073ab9 f54c3679 29c3e7dd 5acf4946 4168086a ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 10b677c9 00000054 79c4b628 0x : 0bb590d2 bcadab54 1d77cc95 113589a2 dfb7d68a c95fd2bf 05640963 2c1e06fa 0x : 40260fcb 23ad0ca5 abd95dc8 3bfbfdfc 5856abda DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : d7862ec4 abdc6efd =< : decrypt iv ( 8 bytes ) = 0x : d7862ec4 abdc6efd <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 10b677c9 00000054 0b000014 0x : 5cf795e0 b572d5df edb0f1b6 57a21b9d 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e335e 00000000 == : stored iv ( 8 bytes ) = 0x : 3bfbfdfc 5856abda << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : 5cf795e0 b572d5df edb0f1b6 57a21b9d == : informational hash_c ( computed ) ( 16 bytes ) = 0x : 5cf795e0 b572d5df edb0f1b6 57a21b9d ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) ii : - identity ........ = 20223 ii : - flags ........... = 33152 ii : - total questions . = 1 ii : - total answers ... = 2 ii : - authoritative ... = 0 ii : - additional ...... = 0 ii : - question #1 ii : - name ........... = i.dslr.net ii : - type ........... = A ii : - class .......... = INET ii : - answer #1 ii : - name ........... = i.dslr.net ii : - type ........... = A ii : - class .......... = INET ii : - ttl ............ = 0d:0h:20m:0s ii : - data ........... = 4 ii : - answer #2 ii : - name ........... = i.dslr.net ii : - type ........... = A ii : - class .......... = INET ii : - ttl ............ = 0d:0h:20m:0s ii : - data ........... = 4 ii : recv DNS packet from 192.168.17.1 ii : - identity ........ = 35321 ii : - flags ........... = 33152 ii : - total questions . = 1 ii : - total answers ... = 3 ii : - authoritative ... = 0 ii : - additional ...... = 0 ii : - question #1 ii : - name ........... = www.google.com ii : - type ........... = A ii : - class .......... = INET ii : - answer #1 ii : - name ........... = www.google.com ii : - type ........... = CNAME ii : - class .......... = INET ii : - ttl ............ = 0d:0h:14m:18s ii : - data ........... = 8 ii : - answer #2 ii : - name ........... = www.l.google.com ii : - type ........... = A ii : - class .......... = INET ii : - ttl ............ = 0d:0h:4m:59s ii : - data ........... = 4 ii : - answer #3 ii : - name ........... = www.l.google.com ii : - type ........... = A ii : - class .......... = INET ii : - ttl ............ = 0d:0h:4m:59s ii : - data ........... = 4 ii : recv DNS packet from 192.168.17.1 >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : 4011757e 5be99887 a4dc6987 581d85ae == : new phase2 iv ( 8 bytes ) = 0x : 4b39ca40 24cdfc7b >= : encrypt iv ( 8 bytes ) = 0x : 4b39ca40 24cdfc7b => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 6f0ef277 00000050 0b000014 0x : 4011757e 5be99887 a4dc6987 581d85ae 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e335f == : stored iv ( 8 bytes ) = 0x : 6cb6aa09 f9a70a82 -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 6f0ef277 00000054 291f40c5 0x : 7b36d914 601029e5 3e13023f 390bb565 986f629d 726ec541 5c41e9a5 be3f9abc 0x : a2bf7ee0 ea14bdee 33f7ca11 6cb6aa09 f9a70a82 ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 412e5b1a 00000054 e7a757e0 0x : a366dc78 d9784023 30ed98c4 1d384d9c 98ea6785 1b5275c9 197ac9be 2428ccbf 0x : aea6bdb0 0a7b27f0 4ea09709 5754acca a8417c28 DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : bcd99bff 830bc71f =< : decrypt iv ( 8 bytes ) = 0x : bcd99bff 830bc71f <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 412e5b1a 00000054 0b000014 0x : 5ad98942 9b3d7b61 260a61ff 880fd5b0 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e335f 00000000 == : stored iv ( 8 bytes ) = 0x : 5754acca a8417c28 << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : 5ad98942 9b3d7b61 260a61ff 880fd5b0 == : informational hash_c ( computed ) ( 16 bytes ) = 0x : 5ad98942 9b3d7b61 260a61ff 880fd5b0 ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : eb1a2e0e f8740c97 086b356a 535ad31d == : new phase2 iv ( 8 bytes ) = 0x : 5f548d08 f932a82f >= : encrypt iv ( 8 bytes ) = 0x : 5f548d08 f932a82f => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 d30ce9ed 00000050 0b000014 0x : eb1a2e0e f8740c97 086b356a 535ad31d 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3360 == : stored iv ( 8 bytes ) = 0x : 52b1f317 98d81ca2 -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 d30ce9ed 00000054 b4ef6b3f 0x : 79ea2037 814d6f44 5fc4337e 99308b44 2073e221 7bb349ef eca2b583 29982eae 0x : 36ba06b6 eebea636 42a5f018 52b1f317 98d81ca2 ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 3eb44804 00000054 5c8cf349 0x : 2ed5b7a9 e2b3e3d4 bcc28f36 f212c17a 6f4519e0 74056a8d 57628c2e 708640a6 0x : 1d8066e5 1e4cd5d4 93a68d28 0ebdd172 a7028e0d DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : ff965c29 cf965593 =< : decrypt iv ( 8 bytes ) = 0x : ff965c29 cf965593 <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 3eb44804 00000054 0b000014 0x : 8b1f6e01 1abee3a6 24345940 e4bbd06c 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3360 00000000 == : stored iv ( 8 bytes ) = 0x : 0ebdd172 a7028e0d << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : 8b1f6e01 1abee3a6 24345940 e4bbd06c == : informational hash_c ( computed ) ( 16 bytes ) = 0x : 8b1f6e01 1abee3a6 24345940 e4bbd06c ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) ii : - identity ........ = 13817 ii : - flags ........... = 33152 ii : - total questions . = 1 ii : - total answers ... = 1 ii : - authoritative ... = 0 ii : - additional ...... = 0 ii : - question #1 ii : - name ........... = forums.speedguide.net ii : - type ........... = A ii : - class .......... = INET ii : - answer #1 ii : - name ........... = forums.speedguide.net ii : - type ........... = A ii : - class .......... = INET ii : - ttl ............ = 0d:0h:30m:0s ii : - data ........... = 4 ii : recv DNS packet from 192.168.17.1 >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : d0487f9b aee8de86 22fd3c0f 99b82057 == : new phase2 iv ( 8 bytes ) = 0x : 51b84fcf f210b500 >= : encrypt iv ( 8 bytes ) = 0x : 51b84fcf f210b500 => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 d81fe1ab 00000050 0b000014 0x : d0487f9b aee8de86 22fd3c0f 99b82057 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3361 == : stored iv ( 8 bytes ) = 0x : a0d7e72c 5e484e04 -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 d81fe1ab 00000054 36593bad 0x : 83bb83ff b050b10a 63ece9dd 8f905d38 ced58be0 3984e555 0556b727 ae613fcb 0x : 63bd6348 6e49dbd8 f52d4619 a0d7e72c 5e484e04 ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 2f744ae6 00000054 15e4a73c 0x : 348911d3 1d52693b f755965f 6de247f0 18a6d21e 8fef0590 4bfe5e8d d0d7f6a8 0x : 51c9e3bf 7435c688 6859166b c6b15f12 bcf54fb1 DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : a700dd12 35d48be0 =< : decrypt iv ( 8 bytes ) = 0x : a700dd12 35d48be0 <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 2f744ae6 00000054 0b000014 0x : e8c2fda0 fddc6f52 87d9cb2c 2b0286ff 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3361 00000000 == : stored iv ( 8 bytes ) = 0x : c6b15f12 bcf54fb1 << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : e8c2fda0 fddc6f52 87d9cb2c 2b0286ff == : informational hash_c ( computed ) ( 16 bytes ) = 0x : e8c2fda0 fddc6f52 87d9cb2c 2b0286ff ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) ii : - identity ........ = 52984 ii : - flags ........... = 33152 ii : - total questions . = 1 ii : - total answers ... = 2 ii : - authoritative ... = 0 ii : - additional ...... = 0 ii : - question #1 ii : - name ........... = www.speedguide.net ii : - type ........... = A ii : - class .......... = INET ii : - answer #1 ii : - name ........... = www.speedguide.net ii : - type ........... = CNAME ii : - class .......... = INET ii : - ttl ............ = 0d:0h:30m:0s ii : - data ........... = 2 ii : - answer #2 ii : - name ........... = speedguide.net ii : - type ........... = A ii : - class .......... = INET ii : - ttl ............ = 0d:0h:30m:0s ii : - data ........... = 4 ii : recv DNS packet from 192.168.17.1 >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : d8879e59 7c0d7868 47c9e050 1ba2d5de == : new phase2 iv ( 8 bytes ) = 0x : afda5dc6 08c0fae8 >= : encrypt iv ( 8 bytes ) = 0x : afda5dc6 08c0fae8 => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 400b6b14 00000050 0b000014 0x : d8879e59 7c0d7868 47c9e050 1ba2d5de 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3362 == : stored iv ( 8 bytes ) = 0x : 3d64cb07 4ca0e879 -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 400b6b14 00000054 e4df1d19 0x : 6496f842 7021b07d f1557b49 1c294004 7141cb4e 8bd64c9c f968834e a35f43b7 0x : 5298f62b 935c3588 79a9b734 3d64cb07 4ca0e879 ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 622ee956 00000054 2527a89b 0x : d89c3996 40363560 0d0a0248 4cb9ef46 f02541bf 23f80216 0b19e201 744ac5b5 0x : f371fe09 3b2ac555 e16e102e 49371af9 7d24ef13 DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : 9d0140f4 df352d71 =< : decrypt iv ( 8 bytes ) = 0x : 9d0140f4 df352d71 <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 622ee956 00000054 0b000014 0x : 0b3fd6c5 308074b8 f8714705 e8a63b7b 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3362 00000000 == : stored iv ( 8 bytes ) = 0x : 49371af9 7d24ef13 << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : 0b3fd6c5 308074b8 f8714705 e8a63b7b == : informational hash_c ( computed ) ( 16 bytes ) = 0x : 0b3fd6c5 308074b8 f8714705 e8a63b7b ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) ii : - identity ........ = 51192 ii : - flags ........... = 33152 ii : - total questions . = 1 ii : - total answers ... = 1 ii : - authoritative ... = 0 ii : - additional ...... = 0 ii : - question #1 ii : - name ........... = addons.mozilla.org ii : - type ........... = A ii : - class .......... = INET ii : - answer #1 ii : - name ........... = addons.mozilla.org ii : - type ........... = A ii : - class .......... = INET ii : - ttl ............ = 0d:0h:0m:10s ii : - data ........... = 4 ii : recv DNS packet from 192.168.17.1 >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : a06c57f0 59f8e128 e8bb5713 ab6555c6 == : new phase2 iv ( 8 bytes ) = 0x : 1a26fa4a fbb66972 >= : encrypt iv ( 8 bytes ) = 0x : 1a26fa4a fbb66972 => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 557586f8 00000050 0b000014 0x : a06c57f0 59f8e128 e8bb5713 ab6555c6 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3363 == : stored iv ( 8 bytes ) = 0x : 4f023441 afcb96e5 -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 557586f8 00000054 39a4b9a2 0x : d15507a4 2860d056 39a65ace 321ea9c4 a3b81f65 8f7bc48e 7d0e79f9 bc387215 0x : 574da60c 40cb3092 74081a68 4f023441 afcb96e5 ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 971d7650 00000054 c51c9c27 0x : 867db53a 376d2d0f 9f5636d4 60fc9200 67fb9875 b545f1d7 5eb32169 2bb2f490 0x : 893a6f38 82f5c6b8 0436d5e7 bd8f5556 0a2fd0e5 DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : b07cf770 76092f7e =< : decrypt iv ( 8 bytes ) = 0x : b07cf770 76092f7e <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 971d7650 00000054 0b000014 0x : 19ab0f79 8dc8bf54 3d785bf3 5aaf4987 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3363 00000000 == : stored iv ( 8 bytes ) = 0x : bd8f5556 0a2fd0e5 << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : 19ab0f79 8dc8bf54 3d785bf3 5aaf4987 == : informational hash_c ( computed ) ( 16 bytes ) = 0x : 19ab0f79 8dc8bf54 3d785bf3 5aaf4987 ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : b64db3d3 8193d17f c74017da 88859070 == : new phase2 iv ( 8 bytes ) = 0x : 9a5abe4d 90017e4e >= : encrypt iv ( 8 bytes ) = 0x : 9a5abe4d 90017e4e => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 74628868 00000050 0b000014 0x : b64db3d3 8193d17f c74017da 88859070 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3364 == : stored iv ( 8 bytes ) = 0x : f168d925 e3c95ead -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 74628868 00000054 f2216634 0x : 53a841bc fd24b918 d1801941 8d52be0e f98293ca 0dfe2709 11e40c9c ccb0fa8a 0x : d799f6e6 3d15b2ad 31fd31fa f168d925 e3c95ead ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 bc20d8d3 00000054 faee5abb 0x : 048e9aae e7ec2158 fe167ce7 660e4939 9b33ecc9 7e886e63 aeda4112 2a2a1ec4 0x : e612b4ef 5ff1007f 722aed0a 020f014b 98551c93 DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : 2207beda edc46858 =< : decrypt iv ( 8 bytes ) = 0x : 2207beda edc46858 <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 bc20d8d3 00000054 0b000014 0x : 7d719fe5 2c923b08 7085ae9e 4b231fae 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3364 00000000 == : stored iv ( 8 bytes ) = 0x : 020f014b 98551c93 << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : 7d719fe5 2c923b08 7085ae9e 4b231fae == : informational hash_c ( computed ) ( 16 bytes ) = 0x : 7d719fe5 2c923b08 7085ae9e 4b231fae ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : 5d55f6a3 fd091af3 c088b4c9 822ea2ae == : new phase2 iv ( 8 bytes ) = 0x : b56dab1b 02f91cbf >= : encrypt iv ( 8 bytes ) = 0x : b56dab1b 02f91cbf => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 821e0cb8 00000050 0b000014 0x : 5d55f6a3 fd091af3 c088b4c9 822ea2ae 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3365 == : stored iv ( 8 bytes ) = 0x : ea8ccc4a 5cd0d4fd -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 821e0cb8 00000054 903872d3 0x : fb412db3 66c23e8b d6c7e0c6 01eca6a8 8ca7ddaa 02adc832 9b1732c7 dbeecf1b 0x : 6b993cca d41ef277 4c8e181d ea8ccc4a 5cd0d4fd ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 cea4e14c 00000054 cb8a5d9c 0x : e230f2cb 6ad544a6 784cc5ca 32246ade 14816a51 8c7b86d9 bd08fd0b 51f72061 0x : bfcc389e eb10f4bb 7242c915 21d6e227 a6226a45 DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : a4e29aa6 280896c1 =< : decrypt iv ( 8 bytes ) = 0x : a4e29aa6 280896c1 <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 cea4e14c 00000054 0b000014 0x : f8f5e2a0 8b76bfec 98179416 96c19375 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3365 00000000 == : stored iv ( 8 bytes ) = 0x : 21d6e227 a6226a45 << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : f8f5e2a0 8b76bfec 98179416 96c19375 == : informational hash_c ( computed ) ( 16 bytes ) = 0x : f8f5e2a0 8b76bfec 98179416 96c19375 ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : 3c2b1fc9 fc3784e0 d252c690 8e83110b == : new phase2 iv ( 8 bytes ) = 0x : efb9e5ae c90f5043 >= : encrypt iv ( 8 bytes ) = 0x : efb9e5ae c90f5043 => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 d7981e64 00000050 0b000014 0x : 3c2b1fc9 fc3784e0 d252c690 8e83110b 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3366 == : stored iv ( 8 bytes ) = 0x : 1c246fe0 7d92df95 -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 d7981e64 00000054 c4143ced 0x : 45653133 6143c20c 7c565f9a 95963c64 33c5466e 9a2359c7 25af8c0f 7d0bbf3c 0x : eb10e533 0fe737c1 5e465b11 1c246fe0 7d92df95 ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 91e06747 00000054 0dbaa71b 0x : d36cc0e6 dcb43aaa a63113d9 f0db6c0a 2214f701 98f0b517 66d65de9 f47d0b77 0x : 311ac1a9 9d05dbc0 43c52d1a 4b1396b3 1b3a7854 DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : a35e1598 eeb7ade0 =< : decrypt iv ( 8 bytes ) = 0x : a35e1598 eeb7ade0 <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 91e06747 00000054 0b000014 0x : 1353284f 6f14ac74 cb909667 bf0272b0 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3366 00000000 == : stored iv ( 8 bytes ) = 0x : 4b1396b3 1b3a7854 << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : 1353284f 6f14ac74 cb909667 bf0272b0 == : informational hash_c ( computed ) ( 16 bytes ) = 0x : 1353284f 6f14ac74 cb909667 bf0272b0 ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : 82e90f16 676e0ecd 7a283361 a73e5ac1 == : new phase2 iv ( 8 bytes ) = 0x : 96399ed5 05ded51d >= : encrypt iv ( 8 bytes ) = 0x : 96399ed5 05ded51d => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 4e093f9f 00000050 0b000014 0x : 82e90f16 676e0ecd 7a283361 a73e5ac1 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3367 == : stored iv ( 8 bytes ) = 0x : affac2a9 dffb6e3b -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 4e093f9f 00000054 da991d62 0x : 6e201737 25dbdbc9 c8a0d65a d0fa06fc 85aa24e8 cc816bb0 45c41e50 df51c1e6 0x : 5dbccfb7 5faba00b 5df971d0 affac2a9 dffb6e3b ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 ii : - identity ........ = 57339 ii : - flags ........... = 33152 ii : - total questions . = 1 ii : - total answers ... = 2 ii : - authoritative ... = 0 ii : - additional ...... = 0 ii : - question #1 ii : - name ........... = forecastfox.accuweather.com ii : - type ........... = A ii : - class .......... = INET ii : - answer #1 ii : - name ........... = forecastfox.accuweather.com ii : - type ........... = CNAME ii : - class .......... = INET ii : - ttl ............ = 0d:0h:2m:1s ii : - data ........... = 42 ii : - answer #2 ii : - name ........... = forecastfox.accuweather.com.att-idns.net ii : - type ........... = A ii : - class .......... = INET ii : - ttl ............ = 0d:0h:1m:44s ii : - data ........... = 4 ii : recv DNS packet from 192.168.17.1 ii : - identity ........ = 27128 ii : - flags ........... = 33152 ii : - total questions . = 1 ii : - total answers ... = 3 ii : - authoritative ... = 0 ii : - additional ...... = 0 ii : - question #1 ii : - name ........... = browsersync.google.com ii : - type ........... = A ii : - class .......... = INET ii : - answer #1 ii : - name ........... = browsersync.google.com ii : - type ........... = CNAME ii : - class .......... = INET ii : - ttl ............ = 0d:0h:30m:0s ii : - data ........... = 16 ii : - answer #2 ii : - name ........... = browsersync.l.google.com ii : - type ........... = A ii : - class .......... = INET ii : - ttl ............ = 0d:0h:3m:6s ii : - data ........... = 4 ii : - answer #3 ii : - name ........... = browsersync.l.google.com ii : - type ........... = A ii : - class .......... = INET ii : - ttl ............ = 0d:0h:3m:6s ii : - data ........... = 4 ii : recv DNS packet from 192.168.17.1 ii : - identity ........ = 63738 ii : - flags ........... = 33152 ii : - total questions . = 1 ii : - total answers ... = 2 ii : - authoritative ... = 0 ii : - additional ...... = 0 ii : - question #1 ii : - name ........... = sirocco.accuweather.com ii : - type ........... = A ii : - class .......... = INET ii : - answer #1 ii : - name ........... = sirocco.accuweather.com ii : - type ........... = CNAME ii : - class .......... = INET ii : - ttl ............ = 0d:0h:0m:55s ii : - data ........... = 38 ii : - answer #2 ii : - name ........... = sirocco.accuweather.com.att-idns.net ii : - type ........... = A ii : - class .......... = INET ii : - ttl ............ = 0d:0h:1m:45s ii : - data ........... = 4 ii : recv DNS packet from 192.168.17.1 ii : - identity ........ = 45050 ii : - flags ........... = 33152 ii : - total questions . = 1 ii : - total answers ... = 1 ii : - authoritative ... = 0 ii : - additional ...... = 0 ii : - question #1 ii : - name ........... = cvstrac.pfsense.com ii : - type ........... = A ii : - class .......... = INET ii : - answer #1 ii : - name ........... = cvstrac.pfsense.com ii : - type ........... = A ii : - class .......... = INET ii : - ttl ............ = 0d:0h:30m:0s ii : - data ........... = 4 ii : recv DNS packet from 192.168.17.1 ii : - identity ........ = 56965 ii : - flags ........... = 33152 ii : - total questions . = 1 ii : - total answers ... = 2 ii : - authoritative ... = 0 ii : - additional ...... = 0 ii : - question #1 ii : - name ........... = www.pfsense.com ii : - type ........... = A ii : - class .......... = INET ii : - answer #1 ii : - name ........... = www.pfsense.com ii : - type ........... = CNAME ii : - class .......... = INET ii : - ttl ............ = 0d:0h:30m:0s ii : - data ........... = 2 ii : - answer #2 ii : - name ........... = pfsense.com ii : - type ........... = A ii : - class .......... = INET ii : - ttl ............ = 0d:0h:30m:0s ii : - data ........... = 4 ii : recv DNS packet from 192.168.17.1 >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : 1bbf9bfc 2f2ed0b5 f3b9e995 cd82c34c == : new phase2 iv ( 8 bytes ) = 0x : 7ec28db1 d7f15b8d >= : encrypt iv ( 8 bytes ) = 0x : 7ec28db1 d7f15b8d => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 82640a9f 00000050 0b000014 0x : 1bbf9bfc 2f2ed0b5 f3b9e995 cd82c34c 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3367 == : stored iv ( 8 bytes ) = 0x : 3975d906 674326f1 -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 82640a9f 00000054 df5d7404 0x : 9551cdec d76461d0 0d3a1c48 6e0a69bc 5c721c15 27b4b379 deff1052 cdeb6143 0x : 57d60cd8 1c95fa2b 01639e67 3975d906 674326f1 ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 cd9eb1da 00000054 568b0b7a 0x : 7a4734e7 29b499b5 0c2172e3 196ef2ef a03d21d6 8c2c5988 1f08a6c4 9eb394e6 0x : 8d7cbe1f 4ba21ff8 95959418 06356675 6d9f6dcb DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : 241adf97 a44d076d =< : decrypt iv ( 8 bytes ) = 0x : 241adf97 a44d076d <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 cd9eb1da 00000054 0b000014 0x : c4b7a710 4c6a944a 3d2441e5 87d33450 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3367 00000000 == : stored iv ( 8 bytes ) = 0x : 06356675 6d9f6dcb << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : c4b7a710 4c6a944a 3d2441e5 87d33450 == : informational hash_c ( computed ) ( 16 bytes ) = 0x : c4b7a710 4c6a944a 3d2441e5 87d33450 ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : 9e0dd6b0 96f89390 611861fa d74cb741 == : new phase2 iv ( 8 bytes ) = 0x : 9ed40682 81daa113 >= : encrypt iv ( 8 bytes ) = 0x : 9ed40682 81daa113 => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 29546fc3 00000050 0b000014 0x : 9e0dd6b0 96f89390 611861fa d74cb741 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3368 == : stored iv ( 8 bytes ) = 0x : 0b2016f1 ac850b4a -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 29546fc3 00000054 8a8b4694 0x : d5213753 b007080a 66940a77 a33ebb85 24aee2cf 0ea878a3 4711ab90 59b40918 0x : 3ef7783d 25016a6a 3a4ab98e 0b2016f1 ac850b4a ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 8de76c0d 00000054 49ffd5d1 0x : 0fe728ab 703e9cb5 63ab63be 763293fa 3487e59c b59a926f 6408a151 76b32b65 0x : 9e9068d4 429a8e80 1d4478a8 c934759b 43f35cf8 DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : cf1cf8c0 2dff81d6 =< : decrypt iv ( 8 bytes ) = 0x : cf1cf8c0 2dff81d6 <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 8de76c0d 00000054 0b000014 0x : 40d3c3ac 34395d5d 06469312 9d245b9e 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3368 00000000 == : stored iv ( 8 bytes ) = 0x : c934759b 43f35cf8 << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : 40d3c3ac 34395d5d 06469312 9d245b9e == : informational hash_c ( computed ) ( 16 bytes ) = 0x : 40d3c3ac 34395d5d 06469312 9d245b9e ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : 7c207ee5 44eee809 a6726fcd 4b5d1e15 == : new phase2 iv ( 8 bytes ) = 0x : 249a7971 554f7834 >= : encrypt iv ( 8 bytes ) = 0x : 249a7971 554f7834 => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 213a0078 00000050 0b000014 0x : 7c207ee5 44eee809 a6726fcd 4b5d1e15 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3369 == : stored iv ( 8 bytes ) = 0x : e35f48dc 9489a3da -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 213a0078 00000054 3e8a1f9c 0x : 6d4d0105 165a37de 041ce775 c6180615 a01fbb3f 26256c5b afa6d912 cfb37500 0x : ada5116d 39acc793 483c4313 e35f48dc 9489a3da ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 e9b3abe2 00000054 7b2df439 0x : eed22a1d f9f324c5 e2a9a522 be2955fd 0447b625 cfb7d808 b4adec35 65464046 0x : 3801ca68 4e161cd7 de293647 56269457 71d54f02 DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : 6c0a0a3c dcf8ed7b =< : decrypt iv ( 8 bytes ) = 0x : 6c0a0a3c dcf8ed7b <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 e9b3abe2 00000054 0b000014 0x : 53825cb1 79a19c73 9c950287 aeeaa38e 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3369 00000000 == : stored iv ( 8 bytes ) = 0x : 56269457 71d54f02 << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : 53825cb1 79a19c73 9c950287 aeeaa38e == : informational hash_c ( computed ) ( 16 bytes ) = 0x : 53825cb1 79a19c73 9c950287 aeeaa38e ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : d9686fd3 c6715166 f1f39d79 c22f4057 == : new phase2 iv ( 8 bytes ) = 0x : cd2aa93b 5603027d >= : encrypt iv ( 8 bytes ) = 0x : cd2aa93b 5603027d => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 2a19263e 00000050 0b000014 0x : d9686fd3 c6715166 f1f39d79 c22f4057 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e336a == : stored iv ( 8 bytes ) = 0x : e364ad13 843082ec -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 2a19263e 00000054 b270a28e 0x : 47bf5e6a 5652cf77 b7f211c8 adf4fe5e 3aa30dc6 b453f3d1 138d19e6 04350205 0x : a828a60f 2e529c81 37017a47 e364ad13 843082ec ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 7c36803c 00000054 54e811b3 0x : b59ed770 a9589d1b 5353acb7 15553caa 9d489794 93bd1278 ed6b60f6 986a37ad 0x : 7ea99b66 2dd691ad c17c2f2f 06fc84d6 de1fb10b DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : 950b1d7f 26920a8e =< : decrypt iv ( 8 bytes ) = 0x : 950b1d7f 26920a8e <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 7c36803c 00000054 0b000014 0x : dd7581e1 bda6169e 0d34ff01 3dadcb96 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e336a 00000000 == : stored iv ( 8 bytes ) = 0x : 06fc84d6 de1fb10b << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : dd7581e1 bda6169e 0d34ff01 3dadcb96 == : informational hash_c ( computed ) ( 16 bytes ) = 0x : dd7581e1 bda6169e 0d34ff01 3dadcb96 ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : bda1dc14 05077381 6b612615 089b953f == : new phase2 iv ( 8 bytes ) = 0x : 76801c77 4ee0977c >= : encrypt iv ( 8 bytes ) = 0x : 76801c77 4ee0977c => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 207dabfa 00000050 0b000014 0x : bda1dc14 05077381 6b612615 089b953f 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e336b == : stored iv ( 8 bytes ) = 0x : 92227e22 43672504 -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 207dabfa 00000054 bc5a1498 0x : 29fb744d 126baf62 a836da73 31dfb5b0 eed3ab99 3cd789a4 698e13ea 18835c7d 0x : 4de28349 5f80ce79 c645bd65 92227e22 43672504 ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 a4c19502 00000054 e64a49c6 0x : 0037065b d83e014b 8be1aa86 348424a5 058b4ab4 0232128d 5484d700 0e4bb61b 0x : d7a65d65 0182b2e0 f062e6fe 39eb0285 20796ffe DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : aa7382c9 b686a5e0 =< : decrypt iv ( 8 bytes ) = 0x : aa7382c9 b686a5e0 <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 a4c19502 00000054 0b000014 0x : 6f90ddb8 958e607a 859738ce 48f70c44 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e336b 00000000 == : stored iv ( 8 bytes ) = 0x : 39eb0285 20796ffe << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : 6f90ddb8 958e607a 859738ce 48f70c44 == : informational hash_c ( computed ) ( 16 bytes ) = 0x : 6f90ddb8 958e607a 859738ce 48f70c44 ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : 96407150 7223bccb c5c62422 8e0c2c63 == : new phase2 iv ( 8 bytes ) = 0x : c2db95e8 dfab584e >= : encrypt iv ( 8 bytes ) = 0x : c2db95e8 dfab584e => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 1e0804f5 00000050 0b000014 0x : 96407150 7223bccb c5c62422 8e0c2c63 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e336c == : stored iv ( 8 bytes ) = 0x : 035ab806 7912932c -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 1e0804f5 00000054 cd3231a1 0x : af3d79b5 1994f2f6 9a4b9312 1a35be32 3330ed10 8b4f7f49 18c544dd 88dedda8 0x : e2e7cef7 40d4c1fe 7ee988f8 035ab806 7912932c ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 0a699204 00000054 8258ef3d 0x : ae9b071c 1cd8e05b eb276b94 7671b770 2813f849 10d8c181 ed376d85 f890f482 0x : 0c50fde2 a413c7eb 57a2c454 32e0b2c9 d349d232 DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : 1112fc91 46406436 =< : decrypt iv ( 8 bytes ) = 0x : 1112fc91 46406436 <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 0a699204 00000054 0b000014 0x : 3cfb165e 0a058966 34d0fcb9 054346d6 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e336c 00000000 == : stored iv ( 8 bytes ) = 0x : 32e0b2c9 d349d232 << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : 3cfb165e 0a058966 34d0fcb9 054346d6 == : informational hash_c ( computed ) ( 16 bytes ) = 0x : 3cfb165e 0a058966 34d0fcb9 054346d6 ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : f79b5320 cebda3b5 7b1e64a1 32029335 == : new phase2 iv ( 8 bytes ) = 0x : 785526ad 39fb7132 >= : encrypt iv ( 8 bytes ) = 0x : 785526ad 39fb7132 => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 26b96d0a 00000050 0b000014 0x : f79b5320 cebda3b5 7b1e64a1 32029335 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e336d == : stored iv ( 8 bytes ) = 0x : e3cb392d 42cbdbe7 -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 26b96d0a 00000054 4e9a7f6f 0x : 339d7e12 32da3c66 60bd3e9a 3776cb85 a5982d94 778dd993 ba2fcbb8 89381316 0x : e083c0f0 7f12e93f e01992a1 e3cb392d 42cbdbe7 ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 77aa8467 00000054 431faf30 0x : 0841765a 14d41879 0a652c63 dfd41f34 d0e2d77b 24369715 8ac6fefd 41272f91 0x : 37c9fe8e fb1122fa 9b960031 195129aa 16883f5e DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : 3253df68 65961eff =< : decrypt iv ( 8 bytes ) = 0x : 3253df68 65961eff <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 77aa8467 00000054 0b000014 0x : 4a7ef997 eb71ee5f 9c993749 11d7699a 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e336d 00000000 == : stored iv ( 8 bytes ) = 0x : 195129aa 16883f5e << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : 4a7ef997 eb71ee5f 9c993749 11d7699a == : informational hash_c ( computed ) ( 16 bytes ) = 0x : 4a7ef997 eb71ee5f 9c993749 11d7699a ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : b5be0843 ffcecdf8 2f7e405d c7970a08 == : new phase2 iv ( 8 bytes ) = 0x : 38db2681 a754b77d >= : encrypt iv ( 8 bytes ) = 0x : 38db2681 a754b77d => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 96e6d638 00000050 0b000014 0x : b5be0843 ffcecdf8 2f7e405d c7970a08 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e336e == : stored iv ( 8 bytes ) = 0x : 82f10905 8c51a6ce -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 96e6d638 00000054 6fd710a8 0x : ea218bf1 7b29e7c9 9f561855 f5bf3fc2 508e94c9 6ee80877 4f9b002c 870b16ed 0x : 3cca0831 17d8178c 468dd188 82f10905 8c51a6ce ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 ab1d5a9b 00000054 3d133b1b 0x : 6286aba2 268ab250 de93506b e44e6efc 86aac92a 8f2af9f0 fe52c354 640a5f73 0x : 23421a57 404f4633 b3d8b762 5aa7a532 467bf9bf DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : 2e4918e6 9b9b7d02 =< : decrypt iv ( 8 bytes ) = 0x : 2e4918e6 9b9b7d02 <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 ab1d5a9b 00000054 0b000014 0x : cc6f1285 24bccb6a 277f6d34 0d6ade2c 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e336e 00000000 == : stored iv ( 8 bytes ) = 0x : 5aa7a532 467bf9bf << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : cc6f1285 24bccb6a 277f6d34 0d6ade2c == : informational hash_c ( computed ) ( 16 bytes ) = 0x : cc6f1285 24bccb6a 277f6d34 0d6ade2c ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : 360649f0 eb89ff61 f98f6d09 594f8024 == : new phase2 iv ( 8 bytes ) = 0x : a4018b58 6ac989cc >= : encrypt iv ( 8 bytes ) = 0x : a4018b58 6ac989cc => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 4edebd3a 00000050 0b000014 0x : 360649f0 eb89ff61 f98f6d09 594f8024 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e336f == : stored iv ( 8 bytes ) = 0x : df6b84bb fe2cc7ae -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 4edebd3a 00000054 b04520cf 0x : 559fc89c 014b277b 555f98d4 f56ac254 c736cfb4 6e128076 5da4f7a7 9b047401 0x : 1e2e0007 6d9dec5d 9ac978df df6b84bb fe2cc7ae ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 e78912d3 00000054 cb70f73c 0x : 15b4c3e1 f3024cb2 ef802936 7d490ff3 830fa75d 8f4a4bcb c17c17f1 4a13418e 0x : 6800131f 4ff327fb 5206caa0 bf25b4dc 171015e0 DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : 522609b8 e5d24e4c =< : decrypt iv ( 8 bytes ) = 0x : 522609b8 e5d24e4c <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 e78912d3 00000054 0b000014 0x : a1b149ee a4fdb430 2bf633d4 1f9ab7da 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e336f 00000000 == : stored iv ( 8 bytes ) = 0x : bf25b4dc 171015e0 << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : a1b149ee a4fdb430 2bf633d4 1f9ab7da == : informational hash_c ( computed ) ( 16 bytes ) = 0x : a1b149ee a4fdb430 2bf633d4 1f9ab7da ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : 010c694f 071ed138 1916bab8 c65935cc == : new phase2 iv ( 8 bytes ) = 0x : 39d3f4f9 6d90ad54 >= : encrypt iv ( 8 bytes ) = 0x : 39d3f4f9 6d90ad54 => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 8d2c82b4 00000050 0b000014 0x : 010c694f 071ed138 1916bab8 c65935cc 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3370 == : stored iv ( 8 bytes ) = 0x : 0753b5e7 88f70ba9 -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 8d2c82b4 00000054 f0d03fff 0x : d1eba870 8fd51078 4d7916a7 fa8856d0 d1600366 ca213776 819f5bb7 827077eb 0x : 60cb6385 040ad497 437d1e4a 0753b5e7 88f70ba9 ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 4069ca5f 00000054 ead41d31 0x : 77216663 97bb7534 26de40fc 5a8f812e 6446dc5d e1972d6a 069d0466 5bcfa3c4 0x : 109c12ca 6c47f09b efe9b0b0 1f92e81a 9ed51177 DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : afe70d71 60812ec2 =< : decrypt iv ( 8 bytes ) = 0x : afe70d71 60812ec2 <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 4069ca5f 00000054 0b000014 0x : 6d8f1c9e e3548951 26d83bab 50e014b0 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3370 00000000 == : stored iv ( 8 bytes ) = 0x : 1f92e81a 9ed51177 << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : 6d8f1c9e e3548951 26d83bab 50e014b0 == : informational hash_c ( computed ) ( 16 bytes ) = 0x : 6d8f1c9e e3548951 26d83bab 50e014b0 ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : 4ee388d5 1e99d60b 75f3cdf3 0967f809 == : new phase2 iv ( 8 bytes ) = 0x : 4581ad33 4689c09c >= : encrypt iv ( 8 bytes ) = 0x : 4581ad33 4689c09c => : encrypt packet ( 80 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 cc47b078 00000050 0b000014 0x : 4ee388d5 1e99d60b 75f3cdf3 0967f809 00000020 00000001 01108d28 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3371 == : stored iv ( 8 bytes ) = 0x : 646d2a53 2086a697 -> : send IKE packet to 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 cc47b078 00000054 d68586c9 0x : 724207f8 f6d41b87 af7e9719 9c8f1d0a ec0cb61e 76882f62 cc4ec109 f0df5c29 0x : 9ed31670 118fbf00 1d527cfe 646d2a53 2086a697 ii : sent peer notification, DPDV1-R-U-THERE ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 <- : recv IKE packet from 199.203.55.140:500 ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 7fb754dc 00000054 f56e8272 0x : 6fd54adb 750ac4a0 6fbfe178 cbaa9fa8 9c989855 b2ad4e2e fdf450fd e143bc39 0x : cb94cc5e 5ee45445 803cd444 24000957 c1f806e0 DB : ipsec peer found DB : phase1 sa found == : new phase2 iv ( 8 bytes ) = 0x : 3993804a 9f3c28e3 =< : decrypt iv ( 8 bytes ) = 0x : 3993804a 9f3c28e3 <= : decrypt packet ( 84 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 7fb754dc 00000054 0b000014 0x : bed7b6ff 6f80d66b 238964b7 701f9821 00000020 00000000 01108d29 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a c74e3371 00000000 == : stored iv ( 8 bytes ) = 0x : 24000957 c1f806e0 << : hash payload << : notification payload == : informational hash_i ( computed ) ( 16 bytes ) = 0x : bed7b6ff 6f80d66b 238964b7 701f9821 == : informational hash_c ( computed ) ( 16 bytes ) = 0x : bed7b6ff 6f80d66b 238964b7 701f9821 ii : informational hash verified ii : received peer notification, DPDV1-R-U-THERE-ACK ii : 199.203.55.140 -> 192.168.17.105 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a ii : data size 4 DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) ii : tunnel enable message received ii : bringing down tunnel ... DB : removing all tunnel refrences DB : tunnel dereferenced ( ref count = 0, tunnel count = 1 ) ii : client ctrl thread exit ... >> : hash payload >> : notification payload == : new informational hash ( 16 bytes ) = 0x : f931ffce 1cc12b27 778b2d4d ed43ae4a == : new phase2 iv ( 8 bytes ) = 0x : 83ea011f 48f9c04b >= : encrypt iv ( 8 bytes ) = 0x : 83ea011f 48f9c04b => : encrypt packet ( 76 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 b391ec67 0000004c 0c000014 0x : f931ffce 1cc12b27 778b2d4d ed43ae4a 0000001c 00000001 01100001 c0f8a374 0x : dc55bd70 88c4fec6 cb61f25a == : stored iv ( 8 bytes ) = 0x : 9c145fbf 91f25471 -> : send IKE packet to 199.203.55.140:500 ( 76 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 b391ec67 0000004c 569169db 0x : 93746603 284c1959 29103c87 5008bf58 d6da0831 47dab0fa cb40664a fa9cf62d 0x : f1426502 9c145fbf 91f25471 ii : sent peer SA DELETE message ii : 192.168.17.105 -> 199.203.55.140 ii : isakmp spi = c0f8a374dc55bd70:88c4fec6cb61f25a DB : phase1 sa deleted before expire time DB : tunnel deleted ( tunnel count = 0 ) <- : recv IKE packet from 199.203.55.140:500 ( 76 bytes ) = 0x : c0f8a374 dc55bd70 88c4fec6 cb61f25a 08100501 7929d975 0000004c cdb5f7d0 0x : 5758cc4f 6ec8998f 48bb49eb e41f59b0 110f66c4 54acab8d a16b476e 47ae21c8 0x : 5a039948 403c2876 75e977cf DB : ipsec peer not found XX | ike packet from 199.203.55.140 ignored XX | no tunnel defined for peer