10/01/05 09:11:41 ## : IKE Daemon, ver 2.1.5 10/01/05 09:11:41 ## : Copyright 2009 Shrew Soft Inc. 10/01/05 09:11:41 ## : This product linked OpenSSL 0.9.8h 28 May 2008 10/01/05 09:11:41 ii : opened 'C:\Program Files\ShrewSoft\VPN Client\debug\iked.log' 10/01/05 09:11:41 ii : opened 'C:\Program Files\ShrewSoft\VPN Client/debug/dump-ike-decrypt.cap' 10/01/05 09:11:41 ii : rebuilding vnet device list ... 10/01/05 09:11:41 ii : device ROOT\VNET\0000 disabled 10/01/05 09:11:41 ii : pfkey process thread begin ... 10/01/05 09:11:41 !! : unable to connect to pfkey interface 10/01/05 09:11:41 ii : network process thread begin ... 10/01/05 09:11:41 ii : ipc server process thread begin ... 10/01/05 11:11:55 ii : ipc client process thread begin ... 10/01/05 11:11:55 168.88.66.2:500 10/01/05 11:11:55 DB : 4dc13049361c19d4:0000000000000000 10/01/05 11:11:55 DB : phase1 added ( obj count = 1 ) 10/01/05 11:11:55 >> : security association payload 10/01/05 11:11:55 >> : - proposal #1 payload 10/01/05 11:11:55 >> : -- transform #1 payload 10/01/05 11:11:55 >> : -- transform #2 payload 10/01/05 11:11:55 >> : -- transform #3 payload 10/01/05 11:11:55 >> : -- transform #4 payload 10/01/05 11:11:55 >> : -- transform #5 payload 10/01/05 11:11:55 >> : -- transform #6 payload 10/01/05 11:11:55 >> : -- transform #7 payload 10/01/05 11:11:55 >> : -- transform #8 payload 10/01/05 11:11:55 >> : -- transform #9 payload 10/01/05 11:11:55 >> : -- transform #10 payload 10/01/05 11:11:55 >> : -- transform #11 payload 10/01/05 11:11:55 >> : -- transform #12 payload 10/01/05 11:11:55 >> : -- transform #13 payload 10/01/05 11:11:55 >> : -- transform #14 payload 10/01/05 11:11:55 >> : -- transform #15 payload 10/01/05 11:11:55 >> : -- transform #16 payload 10/01/05 11:11:55 >> : -- transform #17 payload 10/01/05 11:11:55 >> : -- transform #18 payload 10/01/05 11:11:55 >> : key exchange payload 10/01/05 11:11:55 >> : nonce payload 10/01/05 11:11:55 >> : identification payload 10/01/05 11:11:55 >> : vendor id payload 10/01/05 11:11:55 ii : local supports XAUTH 10/01/05 11:11:55 >> : vendor id payload 10/01/05 11:11:55 ii : local supports nat-t ( draft v00 ) 10/01/05 11:11:55 >> : vendor id payload 10/01/05 11:11:55 ii : local supports nat-t ( draft v01 ) 10/01/05 11:11:55 >> : vendor id payload 10/01/05 11:11:55 ii : local supports nat-t ( draft v02 ) 10/01/05 11:11:55 >> : vendor id payload 10/01/05 11:11:55 ii : local supports nat-t ( draft v03 ) 10/01/05 11:11:55 >> : vendor id payload 10/01/05 11:11:55 ii : local supports nat-t ( rfc ) 10/01/05 11:11:55 >> : vendor id payload 10/01/05 11:11:55 ii : local supports DPDv1 10/01/05 11:11:55 >> : vendor id payload 10/01/05 11:11:55 ii : local is SHREW SOFT compatible 10/01/05 11:11:55 >> : vendor id payload 10/01/05 11:11:55 ii : local is NETSCREEN compatible 10/01/05 11:11:55 >> : vendor id payload 10/01/05 11:11:55 ii : local is SIDEWINDER compatible 10/01/05 11:11:55 >> : vendor id payload 10/01/05 11:11:55 ii : local is CISCO UNITY compatible 10/01/05 11:11:55 >= : cookies 4dc13049361c19d4:0000000000000000 10/01/05 11:11:55 >= : message 00000000 10/01/05 11:11:55 -> : send IKE packet 10.1.10.65:500 -> 168.88.66.2:500 ( 1166 bytes ) 10/01/05 11:11:55 DB : phase1 resend event scheduled ( ref count = 2 ) 10/01/05 11:11:55 <- : recv IKE packet 168.88.66.2:500 -> 10.1.10.65:500 ( 448 bytes ) 10/01/05 11:11:55 DB : phase1 found 10/01/05 11:11:55 ii : processing phase1 packet ( 448 bytes ) 10/01/05 11:11:55 =< : cookies 4dc13049361c19d4:2dff011ae5895b9c 10/01/05 11:11:55 =< : message 00000000 10/01/05 11:11:55 << : security association payload 10/01/05 11:11:55 << : - propsal #1 payload 10/01/05 11:11:55 << : -- transform #13 payload 10/01/05 11:11:55 ii : unmatched isakmp proposal/transform 10/01/05 11:11:55 ii : cipher type ( 3des != aes ) 10/01/05 11:11:55 ii : unmatched isakmp proposal/transform 10/01/05 11:11:55 ii : cipher type ( 3des != aes ) 10/01/05 11:11:55 ii : unmatched isakmp proposal/transform 10/01/05 11:11:55 ii : cipher type ( 3des != aes ) 10/01/05 11:11:55 ii : unmatched isakmp proposal/transform 10/01/05 11:11:55 ii : cipher type ( 3des != aes ) 10/01/05 11:11:55 ii : unmatched isakmp proposal/transform 10/01/05 11:11:55 ii : cipher type ( 3des != aes ) 10/01/05 11:11:55 ii : unmatched isakmp proposal/transform 10/01/05 11:11:55 ii : cipher type ( 3des != aes ) 10/01/05 11:11:55 ii : unmatched isakmp proposal/transform 10/01/05 11:11:55 ii : cipher type ( 3des != blowfish ) 10/01/05 11:11:55 ii : unmatched isakmp proposal/transform 10/01/05 11:11:55 ii : cipher type ( 3des != blowfish ) 10/01/05 11:11:55 ii : unmatched isakmp proposal/transform 10/01/05 11:11:55 ii : cipher type ( 3des != blowfish ) 10/01/05 11:11:55 ii : unmatched isakmp proposal/transform 10/01/05 11:11:55 ii : cipher type ( 3des != blowfish ) 10/01/05 11:11:55 ii : unmatched isakmp proposal/transform 10/01/05 11:11:55 ii : cipher type ( 3des != blowfish ) 10/01/05 11:11:55 ii : unmatched isakmp proposal/transform 10/01/05 11:11:55 ii : cipher type ( 3des != blowfish ) 10/01/05 11:11:55 ii : matched isakmp proposal #1 transform #13 10/01/05 11:11:55 ii : - transform = ike 10/01/05 11:11:55 ii : - cipher type = 3des 10/01/05 11:11:55 ii : - key length = default 10/01/05 11:11:55 ii : - hash type = md5 10/01/05 11:11:55 ii : - dh group = modp-1024 10/01/05 11:11:55 ii : - auth type = xauth-initiator-psk 10/01/05 11:11:55 ii : - life seconds = 86400 10/01/05 11:11:55 ii : - life kbytes = 0 10/01/05 11:11:55 << : key exchange payload 10/01/05 11:11:55 << : nonce payload 10/01/05 11:11:55 << : identification payload 10/01/05 11:11:55 ii : phase1 id target is any 10/01/05 11:11:55 ii : phase1 id match 10/01/05 11:11:55 ii : received = ipv4-host 168.88.66.2 10/01/05 11:11:55 << : hash payload 10/01/05 11:11:55 << : vendor id payload 10/01/05 11:11:55 ii : peer is CISCO UNITY compatible 10/01/05 11:11:55 << : vendor id payload 10/01/05 11:11:55 ii : peer supports XAUTH 10/01/05 11:11:55 << : vendor id payload 10/01/05 11:11:55 ii : peer supports DPDv1 10/01/05 11:11:55 << : vendor id payload 10/01/05 11:11:55 ii : peer supports nat-t ( draft v02 ) 10/01/05 11:11:55 << : nat discovery payload 10/01/05 11:11:55 << : nat discovery payload 10/01/05 11:11:55 << : vendor id payload 10/01/05 11:11:55 ii : unknown vendor id ( 20 bytes ) 10/01/05 11:11:55 0x : 4048b7d5 6ebce885 25e7de7f 00d6c2d3 c0000000 10/01/05 11:11:55 << : vendor id payload 10/01/05 11:11:55 ii : unknown vendor id ( 16 bytes ) 10/01/05 11:11:55 0x : d838a607 e5885b9c 6782d120 e9bcadd8 10/01/05 11:11:55 << : vendor id payload 10/01/05 11:11:55 ii : unknown vendor id ( 16 bytes ) 10/01/05 11:11:55 0x : 1f07f70e aa6514d3 b0fa9654 2a500407 10/01/05 11:11:55 ii : nat discovery - local address is translated 10/01/05 11:11:55 ii : switching to src nat-t udp port 4500 10/01/05 11:11:55 ii : switching to dst nat-t udp port 4500 10/01/05 11:11:55 == : DH shared secret ( 128 bytes ) 10/01/05 11:11:55 == : SETKEYID ( 16 bytes ) 10/01/05 11:11:55 == : SETKEYID_d ( 16 bytes ) 10/01/05 11:11:55 == : SETKEYID_a ( 16 bytes ) 10/01/05 11:11:55 == : SETKEYID_e ( 16 bytes ) 10/01/05 11:11:55 == : cipher key ( 32 bytes ) 10/01/05 11:11:55 == : cipher iv ( 8 bytes ) 10/01/05 11:11:55 == : phase1 hash_i ( computed ) ( 16 bytes ) 10/01/05 11:11:55 >> : hash payload 10/01/05 11:11:55 >> : nat discovery payload 10/01/05 11:11:55 >> : nat discovery payload 10/01/05 11:11:55 >= : cookies 4dc13049361c19d4:2dff011ae5895b9c 10/01/05 11:11:55 >= : message 00000000 10/01/05 11:11:55 >= : encrypt iv ( 8 bytes ) 10/01/05 11:11:55 == : encrypt packet ( 88 bytes ) 10/01/05 11:11:55 == : stored iv ( 8 bytes ) 10/01/05 11:11:55 DB : phase1 resend event canceled ( ref count = 1 ) 10/01/05 11:11:55 -> : send NAT-T:IKE packet 10.1.10.65:4500 -> 168.88.66.2:4500 ( 124 bytes ) 10/01/05 11:11:55 == : phase1 hash_r ( computed ) ( 16 bytes ) 10/01/05 11:11:55 == : phase1 hash_r ( received ) ( 16 bytes ) 10/01/05 11:11:55 ii : phase1 sa established 10/01/05 11:11:55 ii : 168.88.66.2:4500 <-> 10.1.10.65:4500 10/01/05 11:11:55 ii : 4dc13049361c19d4:2dff011ae5895b9c 10/01/05 11:11:55 ii : sending peer INITIAL-CONTACT notification 10/01/05 11:11:55 ii : - 10.1.10.65:4500 -> 168.88.66.2:4500 10/01/05 11:11:55 ii : - isakmp spi = 4dc13049361c19d4:2dff011ae5895b9c 10/01/05 11:11:55 ii : - data size 0 10/01/05 11:11:55 >> : hash payload 10/01/05 11:11:55 >> : notification payload 10/01/05 11:11:55 == : new informational hash ( 16 bytes ) 10/01/05 11:11:55 == : new informational iv ( 8 bytes ) 10/01/05 11:11:55 >= : cookies 4dc13049361c19d4:2dff011ae5895b9c 10/01/05 11:11:55 >= : message ae4a76c9 10/01/05 11:11:55 >= : encrypt iv ( 8 bytes ) 10/01/05 11:11:55 == : encrypt packet ( 76 bytes ) 10/01/05 11:11:55 == : stored iv ( 8 bytes ) 10/01/05 11:11:55 -> : send NAT-T:IKE packet 10.1.10.65:4500 -> 168.88.66.2:4500 ( 108 bytes ) 10/01/05 11:11:55 DB : phase2 not found 10/01/05 11:11:55 <- : recv NAT-T:IKE packet 168.88.66.2:4500 -> 10.1.10.65:4500 ( 116 bytes ) 10/01/05 11:11:55 DB : phase1 found 10/01/05 11:11:55 ii : processing config packet ( 116 bytes ) 10/01/05 11:11:55 DB : config not found 10/01/05 11:11:55 DB : config added ( obj count = 1 ) 10/01/05 11:11:55 == : new config iv ( 8 bytes ) 10/01/05 11:11:55 =< : cookies 4dc13049361c19d4:2dff011ae5895b9c 10/01/05 11:11:55 =< : message 1aa14db6 10/01/05 11:11:55 =< : decrypt iv ( 8 bytes ) 10/01/05 11:11:55 == : decrypt packet ( 116 bytes ) 10/01/05 11:11:55 <= : trimmed packet padding ( 4 bytes ) 10/01/05 11:11:55 <= : stored iv ( 8 bytes ) 10/01/05 11:11:55 << : hash payload 10/01/05 11:11:55 << : attribute payload 10/01/05 11:11:55 == : configure hash_i ( computed ) ( 16 bytes ) 10/01/05 11:11:55 == : configure hash_c ( computed ) ( 16 bytes ) 10/01/05 11:11:55 ii : configure hash verified 10/01/05 11:11:55 ii : - xauth authentication type 10/01/05 11:11:55 ii : - xauth username 10/01/05 11:11:55 !! : warning, unhandled xauth attribute 16526 10/01/05 11:11:55 ii : - xauth password 10/01/05 11:11:55 ii : received basic xauth request - Enter Username, Password and Domain. 10/01/05 11:11:55 ii : - standard xauth username 10/01/05 11:11:55 ii : - standard xauth password 10/01/05 11:11:55 ii : sending xauth response for byarss 10/01/05 11:11:55 >> : hash payload 10/01/05 11:11:55 >> : attribute payload 10/01/05 11:11:55 == : new configure hash ( 16 bytes ) 10/01/05 11:11:55 >= : cookies 4dc13049361c19d4:2dff011ae5895b9c 10/01/05 11:11:55 >= : message 1aa14db6 10/01/05 11:11:55 >= : encrypt iv ( 8 bytes ) 10/01/05 11:11:55 == : encrypt packet ( 84 bytes ) 10/01/05 11:11:55 == : stored iv ( 8 bytes ) 10/01/05 11:11:55 -> : send NAT-T:IKE packet 10.1.10.65:4500 -> 168.88.66.2:4500 ( 116 bytes ) 10/01/05 11:11:55 DB : config resend event scheduled ( ref count = 2 ) 10/01/05 11:11:56 <- : recv NAT-T:IKE packet 168.88.66.2:4500 -> 10.1.10.65:4500 ( 60 bytes ) 10/01/05 11:11:56 DB : phase1 found 10/01/05 11:11:56 ii : processing config packet ( 60 bytes ) 10/01/05 11:11:56 DB : config found 10/01/05 11:11:56 == : new config iv ( 8 bytes ) 10/01/05 11:11:56 =< : cookies 4dc13049361c19d4:2dff011ae5895b9c 10/01/05 11:11:56 =< : message 3f4f03f6 10/01/05 11:11:56 =< : decrypt iv ( 8 bytes ) 10/01/05 11:11:56 == : decrypt packet ( 60 bytes ) 10/01/05 11:11:56 <= : stored iv ( 8 bytes ) 10/01/05 11:11:56 << : hash payload 10/01/05 11:11:56 << : attribute payload 10/01/05 11:11:56 == : configure hash_i ( computed ) ( 16 bytes ) 10/01/05 11:11:56 == : configure hash_c ( computed ) ( 16 bytes ) 10/01/05 11:11:56 ii : configure hash verified 10/01/05 11:11:56 ii : received xauth result - 10/01/05 11:11:56 ii : user byarss authentication succeeded 10/01/05 11:11:56 ii : sending xauth acknowledge 10/01/05 11:11:56 >> : hash payload 10/01/05 11:11:56 >> : attribute payload 10/01/05 11:11:56 == : new configure hash ( 16 bytes ) 10/01/05 11:11:56 >= : cookies 4dc13049361c19d4:2dff011ae5895b9c 10/01/05 11:11:56 >= : message 3f4f03f6 10/01/05 11:11:56 >= : encrypt iv ( 8 bytes ) 10/01/05 11:11:56 == : encrypt packet ( 56 bytes ) 10/01/05 11:11:56 == : stored iv ( 8 bytes ) 10/01/05 11:11:56 DB : config resend event canceled ( ref count = 1 ) 10/01/05 11:11:56 -> : send NAT-T:IKE packet 10.1.10.65:4500 -> 168.88.66.2:4500 ( 92 bytes ) 10/01/05 11:11:56 DB : config resend event scheduled ( ref count = 2 ) 10/01/05 11:11:56 ii : building config attribute list 10/01/05 11:11:56 ii : - IP4 Address 10/01/05 11:11:56 ii : - Address Expiry 10/01/05 11:11:56 ii : - IP4 Netamask 10/01/05 11:11:56 ii : - IP4 DNS Server 10/01/05 11:11:56 ii : - IP4 WINS Server 10/01/05 11:11:56 ii : - DNS Suffix 10/01/05 11:11:56 ii : - Split DNS Domain 10/01/05 11:11:56 ii : - IP4 Split Network Include 10/01/05 11:11:56 ii : - IP4 Split Network Exclude 10/01/05 11:11:56 ii : - Login Banner 10/01/05 11:11:56 ii : - PFS Group 10/01/05 11:11:56 ii : - Save Password 10/01/05 11:11:56 == : new config iv ( 8 bytes ) 10/01/05 11:11:56 ii : sending config pull request 10/01/05 11:11:56 >> : hash payload 10/01/05 11:11:56 >> : attribute payload 10/01/05 11:11:56 == : new configure hash ( 16 bytes ) 10/01/05 11:11:56 >= : cookies 4dc13049361c19d4:2dff011ae5895b9c 10/01/05 11:11:56 >= : message b0513316 10/01/05 11:11:56 >= : encrypt iv ( 8 bytes ) 10/01/05 11:11:56 == : encrypt packet ( 104 bytes ) 10/01/05 11:11:56 == : stored iv ( 8 bytes ) 10/01/05 11:11:56 DB : config resend event canceled ( ref count = 1 ) 10/01/05 11:11:56 -> : send NAT-T:IKE packet 10.1.10.65:4500 -> 168.88.66.2:4500 ( 140 bytes ) 10/01/05 11:11:56 DB : config resend event scheduled ( ref count = 2 ) 10/01/05 11:11:57 <- : recv NAT-T:IKE packet 168.88.66.2:4500 -> 10.1.10.65:4500 ( 876 bytes ) 10/01/05 11:11:57 DB : phase1 found 10/01/05 11:11:57 ii : processing config packet ( 876 bytes ) 10/01/05 11:11:57 DB : config found 10/01/05 11:11:57 =< : cookies 4dc13049361c19d4:2dff011ae5895b9c 10/01/05 11:11:57 =< : message b0513316 10/01/05 11:11:57 =< : decrypt iv ( 8 bytes ) 10/01/05 11:11:57 == : decrypt packet ( 876 bytes ) 10/01/05 11:11:57 <= : trimmed packet padding ( 6 bytes ) 10/01/05 11:11:57 <= : stored iv ( 8 bytes ) 10/01/05 11:11:57 << : hash payload 10/01/05 11:11:57 << : attribute payload 10/01/05 11:11:57 == : configure hash_i ( computed ) ( 16 bytes ) 10/01/05 11:11:57 == : configure hash_c ( computed ) ( 16 bytes ) 10/01/05 11:11:57 ii : configure hash verified 10/01/05 11:11:57 ii : received config pull response 10/01/05 11:11:57 ii : - IP4 Address = 172.20.0.135 10/01/05 11:11:57 ii : - IP4 Netmask = 255.255.255.0 10/01/05 11:11:57 ii : - IP4 DNS Server = 10.0.130.34 10/01/05 11:11:57 ii : - IP4 DNS Server = 10.0.128.33 10/01/05 11:11:57 ii : - IP4 WINS Server = 10.0.130.34 10/01/05 11:11:57 ii : - IP4 WINS Server = 10.0.128.33 10/01/05 11:11:57 ii : - Login Banner = * UNAUTHORIZED ... 10/01/05 11:11:57 ii : - Save Password = 0 10/01/05 11:11:57 ii : - IP4 Split Network Include = ANY:10.0.0.0/8:* 10/01/05 11:11:57 ii : - IP4 Split Network Include = ANY:168.88.0.0/16:* 10/01/05 11:11:57 ii : - IP4 Split Network Include = ANY:172.20.0.0/16:* 10/01/05 11:11:57 ii : - IP4 Split Network Include = ANY:172.21.0.0/16:* 10/01/05 11:11:57 ii : - IP4 Split Network Include = ANY:172.23.0.0/16:* 10/01/05 11:11:57 ii : - IP4 Split Network Include = ANY:172.25.0.0/16:* 10/01/05 11:11:57 ii : - IP4 Split Network Include = ANY:172.29.0.0/16:* 10/01/05 11:11:57 ii : - IP4 Split Network Include = ANY:131.184.154.0/24:* 10/01/05 11:11:57 ii : - IP4 Split Network Include = ANY:148.154.0.0/16:* 10/01/05 11:11:57 ii : - IP4 Split Network Include = ANY:172.27.0.0/16:* 10/01/05 11:11:57 ii : - IP4 Split Network Include = ANY:192.168.200.0/24:* 10/01/05 11:11:57 ii : - IP4 Split Network Include = ANY:172.16.0.0/16:* 10/01/05 11:11:57 ii : - IP4 Split Network Include = ANY:192.168.82.0/24:* 10/01/05 11:11:57 ii : - IP4 Split Network Include = ANY:172.18.0.0/16:* 10/01/05 11:11:57 ii : - IP4 Split Network Include = ANY:192.168.45.0/24:* 10/01/05 11:11:57 ii : - IP4 Split Network Include = ANY:172.30.0.0/16:* 10/01/05 11:11:57 ii : - DNS Suffix = jacobs.com 10/01/05 11:11:57 ii : - Split Domain = jacobs.com 10/01/05 11:11:57 ii : - Split Domain = sverdrup.com 10/01/05 11:11:57 ii : - PFS Group = 0 10/01/05 11:11:57 DB : config resend event canceled ( ref count = 1 ) 10/01/05 11:12:01 ii : VNET adapter MTU is 1500 10/01/05 11:12:01 ii : enabled adapter ROOT\VNET\0000 10/01/05 11:12:01 ii : creating IPSEC INBOUND policy ANY:10.0.0.0/8:* -> ANY:172.20.0.135:* 10/01/05 11:12:01 DB : policy added ( obj count = 1 ) 10/01/05 11:12:01 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:01 ii : creating IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:10.0.0.0/8:* 10/01/05 11:12:01 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:01 DB : policy found 10/01/05 11:12:05 <- : recv NAT-T:IKE packet 168.88.66.2:4500 -> 10.1.10.65:4500 ( 876 bytes ) 10/01/05 11:12:05 DB : phase1 found 10/01/05 11:12:05 ii : processing config packet ( 876 bytes ) 10/01/05 11:12:05 DB : config found 10/01/05 11:12:05 !! : config packet ignored, ( config already mature ) 10/01/05 11:12:05 ii : created IPSEC policy route for 10.0.0.0/8 10/01/05 11:12:05 DB : policy added ( obj count = 2 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : creating IPSEC INBOUND policy ANY:168.88.0.0/16:* -> ANY:172.20.0.135:* 10/01/05 11:12:05 DB : policy added ( obj count = 3 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : creating IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:168.88.0.0/16:* 10/01/05 11:12:05 ii : created IPSEC policy route for 168.88.0.0/16 10/01/05 11:12:05 DB : policy added ( obj count = 4 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : creating IPSEC INBOUND policy ANY:172.20.0.0/16:* -> ANY:172.20.0.135:* 10/01/05 11:12:05 DB : policy added ( obj count = 5 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : creating IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:172.20.0.0/16:* 10/01/05 11:12:05 ii : created IPSEC policy route for 172.20.0.0/16 10/01/05 11:12:05 DB : policy added ( obj count = 6 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : creating IPSEC INBOUND policy ANY:172.21.0.0/16:* -> ANY:172.20.0.135:* 10/01/05 11:12:05 DB : policy added ( obj count = 7 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : creating IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:172.21.0.0/16:* 10/01/05 11:12:05 ii : created IPSEC policy route for 172.21.0.0/16 10/01/05 11:12:05 DB : policy added ( obj count = 8 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : creating IPSEC INBOUND policy ANY:172.23.0.0/16:* -> ANY:172.20.0.135:* 10/01/05 11:12:05 DB : policy added ( obj count = 9 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : creating IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:172.23.0.0/16:* 10/01/05 11:12:05 ii : created IPSEC policy route for 172.23.0.0/16 10/01/05 11:12:05 DB : policy added ( obj count = 10 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : creating IPSEC INBOUND policy ANY:172.25.0.0/16:* -> ANY:172.20.0.135:* 10/01/05 11:12:05 DB : policy added ( obj count = 11 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : creating IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:172.25.0.0/16:* 10/01/05 11:12:05 ii : created IPSEC policy route for 172.25.0.0/16 10/01/05 11:12:05 DB : policy added ( obj count = 12 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : creating IPSEC INBOUND policy ANY:172.29.0.0/16:* -> ANY:172.20.0.135:* 10/01/05 11:12:05 DB : policy added ( obj count = 13 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : creating IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:172.29.0.0/16:* 10/01/05 11:12:05 ii : created IPSEC policy route for 172.29.0.0/16 10/01/05 11:12:05 DB : policy added ( obj count = 14 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : creating IPSEC INBOUND policy ANY:131.184.154.0/24:* -> ANY:172.20.0.135:* 10/01/05 11:12:05 DB : policy added ( obj count = 15 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : creating IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:131.184.154.0/24:* 10/01/05 11:12:05 ii : created IPSEC policy route for 131.184.154.0/24 10/01/05 11:12:05 DB : policy added ( obj count = 16 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : creating IPSEC INBOUND policy ANY:148.154.0.0/16:* -> ANY:172.20.0.135:* 10/01/05 11:12:05 DB : policy added ( obj count = 17 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : creating IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:148.154.0.0/16:* 10/01/05 11:12:05 ii : created IPSEC policy route for 148.154.0.0/16 10/01/05 11:12:05 DB : policy added ( obj count = 18 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : creating IPSEC INBOUND policy ANY:172.27.0.0/16:* -> ANY:172.20.0.135:* 10/01/05 11:12:05 DB : policy added ( obj count = 19 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : creating IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:172.27.0.0/16:* 10/01/05 11:12:05 ii : created IPSEC policy route for 172.27.0.0/16 10/01/05 11:12:05 DB : policy added ( obj count = 20 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : creating IPSEC INBOUND policy ANY:192.168.200.0/24:* -> ANY:172.20.0.135:* 10/01/05 11:12:05 DB : policy added ( obj count = 21 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : creating IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:192.168.200.0/24:* 10/01/05 11:12:05 ii : created IPSEC policy route for 192.168.200.0/24 10/01/05 11:12:05 DB : policy added ( obj count = 22 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : creating IPSEC INBOUND policy ANY:172.16.0.0/16:* -> ANY:172.20.0.135:* 10/01/05 11:12:05 DB : policy added ( obj count = 23 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : creating IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:172.16.0.0/16:* 10/01/05 11:12:05 ii : created IPSEC policy route for 172.16.0.0/16 10/01/05 11:12:05 DB : policy added ( obj count = 24 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : creating IPSEC INBOUND policy ANY:192.168.82.0/24:* -> ANY:172.20.0.135:* 10/01/05 11:12:05 DB : policy added ( obj count = 25 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : creating IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:192.168.82.0/24:* 10/01/05 11:12:05 ii : created IPSEC policy route for 192.168.82.0/24 10/01/05 11:12:05 DB : policy added ( obj count = 26 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : creating IPSEC INBOUND policy ANY:172.18.0.0/16:* -> ANY:172.20.0.135:* 10/01/05 11:12:05 DB : policy added ( obj count = 27 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : creating IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:172.18.0.0/16:* 10/01/05 11:12:05 ii : created IPSEC policy route for 172.18.0.0/16 10/01/05 11:12:05 DB : policy added ( obj count = 28 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : creating IPSEC INBOUND policy ANY:192.168.45.0/24:* -> ANY:172.20.0.135:* 10/01/05 11:12:05 DB : policy added ( obj count = 29 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : creating IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:192.168.45.0/24:* 10/01/05 11:12:05 ii : created IPSEC policy route for 192.168.45.0/24 10/01/05 11:12:05 DB : policy added ( obj count = 30 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : creating IPSEC INBOUND policy ANY:172.30.0.0/16:* -> ANY:172.20.0.135:* 10/01/05 11:12:05 DB : policy added ( obj count = 31 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : creating IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:172.30.0.0/16:* 10/01/05 11:12:05 ii : created IPSEC policy route for 172.30.0.0/16 10/01/05 11:12:05 DB : policy added ( obj count = 32 ) 10/01/05 11:12:05 K> : send pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 ii : split DNS is enabled 10/01/05 11:12:05 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 DB : policy found 10/01/05 11:12:05 ii : calling init phase2 for initial policy 10/01/05 11:12:05 DB : policy found 10/01/05 11:12:05 DB : policy found 10/01/05 11:12:05 DB : tunnel found 10/01/05 11:12:05 DB : new phase2 ( IPSEC initiator ) 10/01/05 11:12:05 DB : phase2 added ( obj count = 1 ) 10/01/05 11:12:05 K> : send pfkey GETSPI ESP message 10/01/05 11:12:05 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:05 DB : policy found 10/01/05 11:12:06 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:06 DB : policy found 10/01/05 11:12:06 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:06 DB : policy found 10/01/05 11:12:06 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:06 DB : policy found 10/01/05 11:12:06 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:06 DB : policy found 10/01/05 11:12:06 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:06 DB : policy found 10/01/05 11:12:06 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:06 DB : policy found 10/01/05 11:12:06 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:06 DB : policy found 10/01/05 11:12:06 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:06 DB : policy found 10/01/05 11:12:06 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:06 DB : policy found 10/01/05 11:12:06 K< : recv pfkey ACQUIRE UNSPEC message 10/01/05 11:12:06 DB : policy found 10/01/05 11:12:06 DB : policy found 10/01/05 11:12:06 DB : tunnel found 10/01/05 11:12:06 DB : new phase2 ( IPSEC initiator ) 10/01/05 11:12:06 DB : phase2 added ( obj count = 2 ) 10/01/05 11:12:06 K> : send pfkey GETSPI ESP message 10/01/05 11:12:06 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:06 DB : policy found 10/01/05 11:12:06 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:06 DB : policy found 10/01/05 11:12:06 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:06 DB : policy found 10/01/05 11:12:07 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:07 DB : policy found 10/01/05 11:12:07 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:07 DB : policy found 10/01/05 11:12:07 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:07 DB : policy found 10/01/05 11:12:07 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:07 DB : policy found 10/01/05 11:12:07 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:07 DB : policy found 10/01/05 11:12:07 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:07 DB : policy found 10/01/05 11:12:07 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:07 DB : policy found 10/01/05 11:12:07 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:07 DB : policy found 10/01/05 11:12:07 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:07 DB : policy found 10/01/05 11:12:07 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:07 DB : policy found 10/01/05 11:12:07 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:07 DB : policy found 10/01/05 11:12:07 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:07 DB : policy found 10/01/05 11:12:08 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:08 DB : policy found 10/01/05 11:12:08 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:08 DB : policy found 10/01/05 11:12:08 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:08 DB : policy found 10/01/05 11:12:08 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:08 DB : policy found 10/01/05 11:12:08 K< : recv pfkey X_SPDADD UNSPEC message 10/01/05 11:12:08 DB : policy found 10/01/05 11:12:08 K< : recv pfkey GETSPI ESP message 10/01/05 11:12:08 DB : phase2 found 10/01/05 11:12:08 ii : updated spi for 1 ipsec-esp proposal 10/01/05 11:12:08 DB : phase1 found 10/01/05 11:12:08 >> : hash payload 10/01/05 11:12:08 >> : security association payload 10/01/05 11:12:08 >> : - proposal #1 payload 10/01/05 11:12:08 >> : -- transform #1 payload 10/01/05 11:12:08 >> : -- transform #2 payload 10/01/05 11:12:08 >> : -- transform #3 payload 10/01/05 11:12:08 >> : -- transform #4 payload 10/01/05 11:12:08 >> : -- transform #5 payload 10/01/05 11:12:08 >> : -- transform #6 payload 10/01/05 11:12:08 >> : -- transform #7 payload 10/01/05 11:12:08 >> : -- transform #8 payload 10/01/05 11:12:08 >> : -- transform #9 payload 10/01/05 11:12:08 >> : -- transform #10 payload 10/01/05 11:12:08 >> : -- transform #11 payload 10/01/05 11:12:08 >> : -- transform #12 payload 10/01/05 11:12:08 >> : -- transform #13 payload 10/01/05 11:12:08 >> : -- transform #14 payload 10/01/05 11:12:08 >> : -- transform #15 payload 10/01/05 11:12:08 >> : -- transform #16 payload 10/01/05 11:12:08 >> : -- transform #17 payload 10/01/05 11:12:08 >> : -- transform #18 payload 10/01/05 11:12:08 >> : nonce payload 10/01/05 11:12:08 >> : identification payload 10/01/05 11:12:08 >> : identification payload 10/01/05 11:12:08 == : phase2 hash_i ( input ) ( 632 bytes ) 10/01/05 11:12:08 == : phase2 hash_i ( computed ) ( 16 bytes ) 10/01/05 11:12:08 == : new phase2 iv ( 8 bytes ) 10/01/05 11:12:08 >= : cookies 4dc13049361c19d4:2dff011ae5895b9c 10/01/05 11:12:08 >= : message 458beea8 10/01/05 11:12:08 >= : encrypt iv ( 8 bytes ) 10/01/05 11:12:08 == : encrypt packet ( 676 bytes ) 10/01/05 11:12:08 == : stored iv ( 8 bytes ) 10/01/05 11:12:08 -> : send NAT-T:IKE packet 10.1.10.65:4500 -> 168.88.66.2:4500 ( 708 bytes ) 10/01/05 11:12:08 DB : phase2 resend event scheduled ( ref count = 2 ) 10/01/05 11:12:08 K< : recv pfkey GETSPI ESP message 10/01/05 11:12:08 DB : phase2 found 10/01/05 11:12:08 ii : updated spi for 1 ipsec-esp proposal 10/01/05 11:12:08 DB : phase1 found 10/01/05 11:12:08 >> : hash payload 10/01/05 11:12:08 >> : security association payload 10/01/05 11:12:08 >> : - proposal #1 payload 10/01/05 11:12:08 >> : -- transform #1 payload 10/01/05 11:12:08 >> : -- transform #2 payload 10/01/05 11:12:08 >> : -- transform #3 payload 10/01/05 11:12:08 >> : -- transform #4 payload 10/01/05 11:12:08 >> : -- transform #5 payload 10/01/05 11:12:08 >> : -- transform #6 payload 10/01/05 11:12:08 >> : -- transform #7 payload 10/01/05 11:12:08 >> : -- transform #8 payload 10/01/05 11:12:08 >> : -- transform #9 payload 10/01/05 11:12:08 >> : -- transform #10 payload 10/01/05 11:12:08 >> : -- transform #11 payload 10/01/05 11:12:08 >> : -- transform #12 payload 10/01/05 11:12:08 >> : -- transform #13 payload 10/01/05 11:12:08 >> : -- transform #14 payload 10/01/05 11:12:08 >> : -- transform #15 payload 10/01/05 11:12:08 >> : -- transform #16 payload 10/01/05 11:12:08 >> : -- transform #17 payload 10/01/05 11:12:08 >> : -- transform #18 payload 10/01/05 11:12:08 >> : nonce payload 10/01/05 11:12:08 >> : identification payload 10/01/05 11:12:08 >> : identification payload 10/01/05 11:12:08 == : phase2 hash_i ( input ) ( 632 bytes ) 10/01/05 11:12:08 == : phase2 hash_i ( computed ) ( 16 bytes ) 10/01/05 11:12:08 == : new phase2 iv ( 8 bytes ) 10/01/05 11:12:08 >= : cookies 4dc13049361c19d4:2dff011ae5895b9c 10/01/05 11:12:08 >= : message d2b64ae5 10/01/05 11:12:08 >= : encrypt iv ( 8 bytes ) 10/01/05 11:12:08 == : encrypt packet ( 676 bytes ) 10/01/05 11:12:08 == : stored iv ( 8 bytes ) 10/01/05 11:12:08 -> : send NAT-T:IKE packet 10.1.10.65:4500 -> 168.88.66.2:4500 ( 708 bytes ) 10/01/05 11:12:08 DB : phase2 resend event scheduled ( ref count = 2 ) 10/01/05 11:12:10 DB : phase1 found 10/01/05 11:12:10 ii : sending peer DPDV1-R-U-THERE notification 10/01/05 11:12:10 ii : - 10.1.10.65:4500 -> 168.88.66.2:4500 10/01/05 11:12:10 ii : - isakmp spi = 4dc13049361c19d4:2dff011ae5895b9c 10/01/05 11:12:10 ii : - data size 4 10/01/05 11:12:10 >> : hash payload 10/01/05 11:12:10 >> : notification payload 10/01/05 11:12:10 == : new informational hash ( 16 bytes ) 10/01/05 11:12:10 == : new informational iv ( 8 bytes ) 10/01/05 11:12:10 >= : cookies 4dc13049361c19d4:2dff011ae5895b9c 10/01/05 11:12:10 >= : message b4551a37 10/01/05 11:12:10 >= : encrypt iv ( 8 bytes ) 10/01/05 11:12:10 == : encrypt packet ( 80 bytes ) 10/01/05 11:12:10 == : stored iv ( 8 bytes ) 10/01/05 11:12:10 -> : send NAT-T:IKE packet 10.1.10.65:4500 -> 168.88.66.2:4500 ( 116 bytes ) 10/01/05 11:12:10 ii : DPD ARE-YOU-THERE sequence 101c6cad requested 10/01/05 11:12:10 DB : phase1 found 10/01/05 11:12:10 -> : send NAT-T:KEEP-ALIVE packet 10.1.10.65:4500 -> 168.88.66.2:4500 10/01/05 11:12:13 <- : recv NAT-T:IKE packet 168.88.66.2:4500 -> 10.1.10.65:4500 ( 876 bytes ) 10/01/05 11:12:13 DB : phase1 found 10/01/05 11:12:13 ii : processing config packet ( 876 bytes ) 10/01/05 11:12:13 DB : config found 10/01/05 11:12:13 !! : config packet ignored, ( config already mature ) 10/01/05 11:12:13 -> : resend 1 phase2 packet(s) 10.1.10.65:4500 -> 168.88.66.2:4500 10/01/05 11:12:13 -> : resend 1 phase2 packet(s) 10.1.10.65:4500 -> 168.88.66.2:4500 10/01/05 11:12:18 -> : resend 1 phase2 packet(s) 10.1.10.65:4500 -> 168.88.66.2:4500 10/01/05 11:12:18 -> : resend 1 phase2 packet(s) 10.1.10.65:4500 -> 168.88.66.2:4500 10/01/05 11:12:21 <- : recv NAT-T:IKE packet 168.88.66.2:4500 -> 10.1.10.65:4500 ( 876 bytes ) 10/01/05 11:12:21 DB : phase1 found 10/01/05 11:12:21 ii : processing config packet ( 876 bytes ) 10/01/05 11:12:21 DB : config found 10/01/05 11:12:21 !! : config packet ignored, ( config already mature ) 10/01/05 11:12:23 -> : resend 1 phase2 packet(s) 10.1.10.65:4500 -> 168.88.66.2:4500 10/01/05 11:12:23 -> : resend 1 phase2 packet(s) 10.1.10.65:4500 -> 168.88.66.2:4500 10/01/05 11:12:23 K< : recv pfkey ACQUIRE UNSPEC message 10/01/05 11:12:23 DB : policy found 10/01/05 11:12:23 DB : policy found 10/01/05 11:12:23 DB : tunnel found 10/01/05 11:12:23 DB : new phase2 ( IPSEC initiator ) 10/01/05 11:12:23 DB : phase2 added ( obj count = 3 ) 10/01/05 11:12:23 K> : send pfkey GETSPI ESP message 10/01/05 11:12:23 K< : recv pfkey GETSPI ESP message 10/01/05 11:12:23 DB : phase2 found 10/01/05 11:12:23 ii : updated spi for 1 ipsec-esp proposal 10/01/05 11:12:23 DB : phase1 found 10/01/05 11:12:23 >> : hash payload 10/01/05 11:12:23 >> : security association payload 10/01/05 11:12:23 >> : - proposal #1 payload 10/01/05 11:12:23 >> : -- transform #1 payload 10/01/05 11:12:23 >> : -- transform #2 payload 10/01/05 11:12:23 >> : -- transform #3 payload 10/01/05 11:12:23 >> : -- transform #4 payload 10/01/05 11:12:23 >> : -- transform #5 payload 10/01/05 11:12:23 >> : -- transform #6 payload 10/01/05 11:12:23 >> : -- transform #7 payload 10/01/05 11:12:23 >> : -- transform #8 payload 10/01/05 11:12:23 >> : -- transform #9 payload 10/01/05 11:12:23 >> : -- transform #10 payload 10/01/05 11:12:23 >> : -- transform #11 payload 10/01/05 11:12:23 >> : -- transform #12 payload 10/01/05 11:12:23 >> : -- transform #13 payload 10/01/05 11:12:23 >> : -- transform #14 payload 10/01/05 11:12:23 >> : -- transform #15 payload 10/01/05 11:12:23 >> : -- transform #16 payload 10/01/05 11:12:23 >> : -- transform #17 payload 10/01/05 11:12:23 >> : -- transform #18 payload 10/01/05 11:12:23 >> : nonce payload 10/01/05 11:12:23 >> : identification payload 10/01/05 11:12:23 >> : identification payload 10/01/05 11:12:23 == : phase2 hash_i ( input ) ( 632 bytes ) 10/01/05 11:12:23 == : phase2 hash_i ( computed ) ( 16 bytes ) 10/01/05 11:12:23 == : new phase2 iv ( 8 bytes ) 10/01/05 11:12:23 >= : cookies 4dc13049361c19d4:2dff011ae5895b9c 10/01/05 11:12:23 >= : message d33e759d 10/01/05 11:12:23 >= : encrypt iv ( 8 bytes ) 10/01/05 11:12:23 == : encrypt packet ( 676 bytes ) 10/01/05 11:12:23 == : stored iv ( 8 bytes ) 10/01/05 11:12:23 -> : send NAT-T:IKE packet 10.1.10.65:4500 -> 168.88.66.2:4500 ( 708 bytes ) 10/01/05 11:12:23 DB : phase2 resend event scheduled ( ref count = 2 ) 10/01/05 11:12:25 DB : phase1 found 10/01/05 11:12:25 -> : send NAT-T:KEEP-ALIVE packet 10.1.10.65:4500 -> 168.88.66.2:4500 10/01/05 11:12:25 DB : phase1 found 10/01/05 11:12:25 ii : next tunnel DPD retry in 4 secs for peer 168.88.66.2:4500 10/01/05 11:12:25 ii : sending peer DPDV1-R-U-THERE notification 10/01/05 11:12:25 ii : - 10.1.10.65:4500 -> 168.88.66.2:4500 10/01/05 11:12:25 ii : - isakmp spi = 4dc13049361c19d4:2dff011ae5895b9c 10/01/05 11:12:25 ii : - data size 4 10/01/05 11:12:25 >> : hash payload 10/01/05 11:12:25 >> : notification payload 10/01/05 11:12:25 == : new informational hash ( 16 bytes ) 10/01/05 11:12:25 == : new informational iv ( 8 bytes ) 10/01/05 11:12:25 >= : cookies 4dc13049361c19d4:2dff011ae5895b9c 10/01/05 11:12:25 >= : message 451eb90f 10/01/05 11:12:25 >= : encrypt iv ( 8 bytes ) 10/01/05 11:12:25 == : encrypt packet ( 80 bytes ) 10/01/05 11:12:25 == : stored iv ( 8 bytes ) 10/01/05 11:12:25 -> : send NAT-T:IKE packet 10.1.10.65:4500 -> 168.88.66.2:4500 ( 116 bytes ) 10/01/05 11:12:25 ii : DPD ARE-YOU-THERE sequence 101c6cae requested 10/01/05 11:12:28 ii : resend limit exceeded for phase2 exchange 10/01/05 11:12:28 ii : phase2 removal before expire time 10/01/05 11:12:28 DB : phase2 deleted ( obj count = 2 ) 10/01/05 11:12:28 ii : resend limit exceeded for phase2 exchange 10/01/05 11:12:28 ii : phase2 removal before expire time 10/01/05 11:12:28 DB : phase2 deleted ( obj count = 1 ) 10/01/05 11:12:28 -> : resend 1 phase2 packet(s) 10.1.10.65:4500 -> 168.88.66.2:4500 10/01/05 11:12:29 <- : recv NAT-T:IKE packet 168.88.66.2:4500 -> 10.1.10.65:4500 ( 76 bytes ) 10/01/05 11:12:29 DB : phase1 found 10/01/05 11:12:29 ii : processing informational packet ( 76 bytes ) 10/01/05 11:12:29 == : new informational iv ( 8 bytes ) 10/01/05 11:12:29 =< : cookies 4dc13049361c19d4:2dff011ae5895b9c 10/01/05 11:12:29 =< : message ff73df6c 10/01/05 11:12:29 =< : decrypt iv ( 8 bytes ) 10/01/05 11:12:29 == : decrypt packet ( 76 bytes ) 10/01/05 11:12:29 <= : stored iv ( 8 bytes ) 10/01/05 11:12:29 << : hash payload 10/01/05 11:12:29 << : delete payload 10/01/05 11:12:29 == : informational hash_i ( computed ) ( 16 bytes ) 10/01/05 11:12:29 == : informational hash_c ( received ) ( 16 bytes ) 10/01/05 11:12:29 ii : informational hash verified 10/01/05 11:12:29 ii : received peer DELETE message 10/01/05 11:12:29 ii : - 168.88.66.2:4500 -> 10.1.10.65:4500 10/01/05 11:12:29 ii : - isakmp spi = 4dc13049361c19d4:2dff011ae5895b9c 10/01/05 11:12:29 DB : phase1 found 10/01/05 11:12:29 ii : cleanup, marked phase1 4dc13049361c19d4:2dff011ae5895b9c for removal 10/01/05 11:12:29 DB : phase1 soft event canceled ( ref count = 4 ) 10/01/05 11:12:29 DB : phase1 hard event canceled ( ref count = 3 ) 10/01/05 11:12:29 DB : phase1 dead event canceled ( ref count = 2 ) 10/01/05 11:12:29 DB : config deleted ( obj count = 0 ) 10/01/05 11:12:29 ii : phase1 removal before expire time 10/01/05 11:12:29 DB : phase1 not found 10/01/05 11:12:29 DB : phase1 deleted ( obj count = 0 ) 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC INBOUND policy ANY:10.0.0.0/8:* -> ANY:172.20.0.135:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:10.0.0.0/8:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 ii : removed IPSEC policy route for ANY:10.0.0.0/8:* 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC INBOUND policy ANY:168.88.0.0/16:* -> ANY:172.20.0.135:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:168.88.0.0/16:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 ii : removed IPSEC policy route for ANY:168.88.0.0/16:* 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC INBOUND policy ANY:172.20.0.0/16:* -> ANY:172.20.0.135:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:172.20.0.0/16:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 ii : removed IPSEC policy route for ANY:172.20.0.0/16:* 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC INBOUND policy ANY:172.21.0.0/16:* -> ANY:172.20.0.135:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:172.21.0.0/16:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 ii : removed IPSEC policy route for ANY:172.21.0.0/16:* 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC INBOUND policy ANY:172.23.0.0/16:* -> ANY:172.20.0.135:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:172.23.0.0/16:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 ii : removed IPSEC policy route for ANY:172.23.0.0/16:* 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC INBOUND policy ANY:172.25.0.0/16:* -> ANY:172.20.0.135:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:172.25.0.0/16:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 ii : removed IPSEC policy route for ANY:172.25.0.0/16:* 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC INBOUND policy ANY:172.29.0.0/16:* -> ANY:172.20.0.135:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:172.29.0.0/16:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 ii : removed IPSEC policy route for ANY:172.29.0.0/16:* 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC INBOUND policy ANY:131.184.154.0/24:* -> ANY:172.20.0.135:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:131.184.154.0/24:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 ii : removed IPSEC policy route for ANY:131.184.154.0/24:* 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC INBOUND policy ANY:148.154.0.0/16:* -> ANY:172.20.0.135:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:148.154.0.0/16:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 ii : removed IPSEC policy route for ANY:148.154.0.0/16:* 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC INBOUND policy ANY:172.27.0.0/16:* -> ANY:172.20.0.135:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:172.27.0.0/16:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 ii : removed IPSEC policy route for ANY:172.27.0.0/16:* 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC INBOUND policy ANY:192.168.200.0/24:* -> ANY:172.20.0.135:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:192.168.200.0/24:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 ii : removed IPSEC policy route for ANY:192.168.200.0/24:* 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC INBOUND policy ANY:172.16.0.0/16:* -> ANY:172.20.0.135:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:172.16.0.0/16:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 ii : removed IPSEC policy route for ANY:172.16.0.0/16:* 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC INBOUND policy ANY:192.168.82.0/24:* -> ANY:172.20.0.135:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:192.168.82.0/24:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 ii : removed IPSEC policy route for ANY:192.168.82.0/24:* 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC INBOUND policy ANY:172.18.0.0/16:* -> ANY:172.20.0.135:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:172.18.0.0/16:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 ii : removed IPSEC policy route for ANY:172.18.0.0/16:* 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC INBOUND policy ANY:192.168.45.0/24:* -> ANY:172.20.0.135:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:192.168.45.0/24:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 ii : removed IPSEC policy route for ANY:192.168.45.0/24:* 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC INBOUND policy ANY:172.30.0.0/16:* -> ANY:172.20.0.135:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 ii : removing IPSEC OUTBOUND policy ANY:172.20.0.135:* -> ANY:172.30.0.0/16:* 10/01/05 11:12:29 K> : send pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 ii : removed IPSEC policy route for ANY:172.30.0.0/16:* 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 DB : policy deleted ( obj count = 31 ) 10/01/05 11:12:29 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 DB : policy deleted ( obj count = 30 ) 10/01/05 11:12:29 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 DB : policy deleted ( obj count = 29 ) 10/01/05 11:12:29 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 DB : policy deleted ( obj count = 28 ) 10/01/05 11:12:29 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 DB : policy deleted ( obj count = 27 ) 10/01/05 11:12:29 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 DB : policy deleted ( obj count = 26 ) 10/01/05 11:12:29 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:29 DB : policy found 10/01/05 11:12:29 DB : policy deleted ( obj count = 25 ) 10/01/05 11:12:29 ii : disabled adapter ROOT\VNET\0000 10/01/05 11:12:29 DB : tunnel dpd event canceled ( ref count = 4 ) 10/01/05 11:12:29 DB : tunnel natt event canceled ( ref count = 3 ) 10/01/05 11:12:29 DB : tunnel stats event canceled ( ref count = 2 ) 10/01/05 11:12:29 DB : removing tunnel config references 10/01/05 11:12:29 DB : removing tunnel phase2 references 10/01/05 11:12:29 DB : phase2 resend event canceled ( ref count = 1 ) 10/01/05 11:12:29 ii : phase2 removal before expire time 10/01/05 11:12:29 DB : phase2 deleted ( obj count = 0 ) 10/01/05 11:12:29 DB : removing tunnel phase1 references 10/01/05 11:12:29 DB : tunnel deleted ( obj count = 0 ) 10/01/05 11:12:30 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:30 DB : policy found 10/01/05 11:12:30 DB : policy deleted ( obj count = 24 ) 10/01/05 11:12:30 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:30 DB : policy found 10/01/05 11:12:30 DB : policy deleted ( obj count = 23 ) 10/01/05 11:12:30 DB : removing all peer tunnel refrences 10/01/05 11:12:30 DB : peer deleted ( obj count = 0 ) 10/01/05 11:12:30 ii : ipc client process thread exit ... 10/01/05 11:12:30 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:30 DB : policy found 10/01/05 11:12:30 DB : policy deleted ( obj count = 22 ) 10/01/05 11:12:30 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:30 DB : policy found 10/01/05 11:12:30 DB : policy deleted ( obj count = 21 ) 10/01/05 11:12:30 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:30 DB : policy found 10/01/05 11:12:30 DB : policy deleted ( obj count = 20 ) 10/01/05 11:12:30 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:30 DB : policy found 10/01/05 11:12:30 DB : policy deleted ( obj count = 19 ) 10/01/05 11:12:30 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:30 DB : policy found 10/01/05 11:12:30 DB : policy deleted ( obj count = 18 ) 10/01/05 11:12:30 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:30 DB : policy found 10/01/05 11:12:30 DB : policy deleted ( obj count = 17 ) 10/01/05 11:12:31 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:31 DB : policy found 10/01/05 11:12:31 DB : policy deleted ( obj count = 16 ) 10/01/05 11:12:31 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:31 DB : policy found 10/01/05 11:12:31 DB : policy deleted ( obj count = 15 ) 10/01/05 11:12:31 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:31 DB : policy found 10/01/05 11:12:31 DB : policy deleted ( obj count = 14 ) 10/01/05 11:12:31 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:31 DB : policy found 10/01/05 11:12:31 DB : policy deleted ( obj count = 13 ) 10/01/05 11:12:31 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:31 DB : policy found 10/01/05 11:12:31 DB : policy deleted ( obj count = 12 ) 10/01/05 11:12:31 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:31 DB : policy found 10/01/05 11:12:31 DB : policy deleted ( obj count = 11 ) 10/01/05 11:12:31 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:31 DB : policy found 10/01/05 11:12:31 DB : policy deleted ( obj count = 10 ) 10/01/05 11:12:31 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:31 DB : policy found 10/01/05 11:12:31 DB : policy deleted ( obj count = 9 ) 10/01/05 11:12:32 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:32 DB : policy found 10/01/05 11:12:32 DB : policy deleted ( obj count = 8 ) 10/01/05 11:12:32 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:32 DB : policy found 10/01/05 11:12:32 DB : policy deleted ( obj count = 7 ) 10/01/05 11:12:32 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:32 DB : policy found 10/01/05 11:12:32 DB : policy deleted ( obj count = 6 ) 10/01/05 11:12:32 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:32 DB : policy found 10/01/05 11:12:32 DB : policy deleted ( obj count = 5 ) 10/01/05 11:12:32 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:32 DB : policy found 10/01/05 11:12:32 DB : policy deleted ( obj count = 4 ) 10/01/05 11:12:32 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:32 DB : policy found 10/01/05 11:12:32 DB : policy deleted ( obj count = 3 ) 10/01/05 11:12:32 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:32 DB : policy found 10/01/05 11:12:32 DB : policy deleted ( obj count = 2 ) 10/01/05 11:12:32 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:32 DB : policy found 10/01/05 11:12:32 DB : policy deleted ( obj count = 1 ) 10/01/05 11:12:32 K< : recv pfkey X_SPDDELETE2 UNSPEC message 10/01/05 11:12:32 DB : policy found 10/01/05 11:12:32 DB : policy deleted ( obj count = 0 )