## : IPSEC Daemon, ver 2.0.0 ## : Copyright 2006 Shrew Soft Inc. ## : This product linked OpenSSL 0.9.8a 11 Oct 2005 ## : This product linked zlib v1.2.3 ii : opened 'dump-frg.cap' ii : opened 'dump-prv.cap' ii : rebuilding vnet device list ... ii : device ROOT\VNET\0000 disabled ii : opened vflt device ii : client ctrl thread begin ... DB : tunnel added DB : tunnel dereferenced ( ref count = 0, tunnel count = 1 ) 207.250.166.10:500 DB : 8e9658a4333e61d9:0000000000000000 DB : phase1 sa added >> : security association payload >> : - proposal #1 payload >> : -- transform #1 payload >> : -- transform #2 payload >> : key exchange payload >> : nonce payload >> : identification payload >> : vendor id payload >> : vendor id payload >> : vendor id payload >> : vendor id payload >> : vendor id payload >> : vendor id payload -> : send IKE packet to 207.250.166.10:500 ( 404 bytes ) DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) <- : recv IKE packet 207.250.166.10:500 -> 206.197.64.198:500 ( 548 bytes ) DB : ipsec peer found DB : phase1 sa found << : fragment payload ii : ike fragment received, waiting on complete packet DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) <- : recv IKE packet 207.250.166.10:500 -> 206.197.64.198:500 ( 548 bytes ) DB : ipsec peer found DB : phase1 sa found << : fragment payload ii : ike fragment received, waiting on complete packet DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) <- : recv IKE packet 207.250.166.10:500 -> 206.197.64.198:500 ( 548 bytes ) DB : ipsec peer found DB : phase1 sa found << : fragment payload ii : ike fragment received, waiting on complete packet DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) <- : recv IKE packet 207.250.166.10:500 -> 206.197.64.198:500 ( 420 bytes ) DB : ipsec peer found DB : phase1 sa found << : fragment payload ii : ike fragment received, processing complete packet << : security association payload << : key exchange payload << : nonce payload << : identification payload << : certificate payload << : signature payload << : vendor id payload ii : peer supports XAUTH << : vendor id payload ii : peer supports UNITY << : cert request payload << : vendor id payload ii : peer supports NAT-T RFC << : nat discovery payload !! : invalid natd hash size !! : unprocessed phase1 payload data ii : matched isakmp proposal #1 transform #1 ii : - transform = ike ii : - cipher type = 3des ii : - key length = default ii : - hash type = md5 ii : - dh group = modp-1024 ii : - auth type = hybrid-initiator-rsa ii : - life seconds = 86400 ii : - life kbytes = 0 ii : peerid match ( cert check only ) ii : src = /C=US/ST=Minnesota/L=Minneapolis/O=VisionShare, Inc./OU=Managed Services/CN=morfy.visionshareinc.com/emailAddress=peter.eisch@visionshareinc.com DB : phase1 sa dereferenced ( ref count = 0, phase1 count = 1 ) DB : tunnel dereferenced ( ref count = 1, tunnel count = 1 ) DB : phase1 sa deleted after expire time DB : tunnel dereferenced ( ref count = 0, tunnel count = 1 ) DB : removing all tunnel refrences DB : tunnel deleted ( tunnel count = 0 ) ii : client ctrl thread exit ...