IPSEC: Connections break after 60K when using racoon

fbsdq.20.drkshadow at spamgourmet.com fbsdq.20.drkshadow at spamgourmet.com
Mon Jul 28 01:24:15 UTC 2008


I'm having problems trying to set up a VPN. I've followed the 
instructions in the handbook as exactly as possible many times now, and 
have determined that racoon is causing connections to die after around 
60KB of data has been sent. I base this claim on the fact that I have 
sent sustained, encrypted traffic with IPSEC using just 
setkey/ipsec.conf -- that is, everything used up to but excluding racoon.

Has anyone encountered the problem? I'm using FreeBSD 7, racoon 0.7, and 
  two VIA C7 boards (1.6GHz) -- tested with and without padlock, though 
I had the same problem on two intel boxes doing software encryption. 
Connection by crossover cable or internet has no effect. With the latest 
testing, both machines had exactly the same hardware and configuration, 
but again.. I've tried a variety.

Aside from the netstat output indicating "xxx outbound packets with no 
SA available", I don't see anything resembling an error.. and for the 
output, I can't find any documentation on it, and it all seems to be 
configured correctly.

Help please?

Firewall: pf.conf
pass in all
pass out all

ipsec.conf:
spdadd 69.146.32.251/32 w.x.y.z/32 ipencap -P out ipsec 
esp/tunnel/69.146.32.251-w.x.y.z/require;
spdadd w.x.y.z/32 69.146.32.251/32 ipencap -P in ipsec 
esp/tunnel/w.x.y.z-69.146.32.251/require;

w.x.y.z is our T1 static IP. 69... is a dynamic IP I was using for 
testing. Both machines have the same configuration, with IP addresses 
reversed for the other endpoint.

Host A:
Internal: 192.168.111.1
External: w.x.y.z
---
Host B:
External: 69.146.32.251
Internal: 192.168.0.1

Host A: ifconfig
gif0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> metric 0 mtu 1280
         tunnel inet w.x.y.z --> 69.146.32.251
         inet 192.168.111.1 --> 192.168.0.1 netmask 0xffffff00
Host B: ifconfig
gif0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> metric 0 mtu 1280
         tunnel inet 69.146.32.251 --> w.x.y.z
         inet 192.168.0.1 --> 192.168.111.1 netmask 0xffffff00
<Note that netmask=0xffffffff, as shown in the handbook, has the same 
results. I'm testing gateway <--> gateway, anyway>

racoon.conf:
path pre_shared_key "/usr/local/etc/racoon/psk.txt" ;
remote anonymous
{
         #exchange_mode main,aggressive,base;
         exchange_mode main,base;

         #my_identifier fqdn "server.kame.net";
         #certificate_type x509 "foo at kame.net.cert" "foo at kame.net.priv" ;
         lifetime time 24 hour ;
         #initial_contact off ;
         #passive on ;
         proposal {
                 encryption_algorithm 3des;
                 hash_algorithm sha1;
                 authentication_method pre_shared_key ;
                 dh_group 2 ;
         }

         proposal_check strict;
}

sainfo anonymous
{
         pfs_group 2;
         lifetime time 12 hour ;
         encryption_algorithm 3des, cast128, blowfish 448, des, rijndael ;
         authentication_algorithm hmac_sha1, hmac_md5 ;
         compression_algorithm deflate ;
}

psk.txt
a.b.c.d	myprivky
w.x.y.z	myprivky

Test method:
================================
Host A
# ping 192.168.0.1
64 bytes from 192.168.0.1: icmp_seq=2 ttl=64 time=74.516 ms
<one ping went through and I killed it -- just to establish a connection>

# setkey -D
w.x.y.z 69.146.32.251
         esp mode=tunnel spi=36840128(0x023222c0) reqid=0(0x00000000)
         E: 3des-cbc  95afdcdf 8ec36c90 c91388b5 5937999e d6a2db7c 27e5a321
         A: hmac-sha1  359d9f19 737936c1 30e211e5 abc887b3 aed79067
         seq=0x00000001 replay=4 flags=0x00000000 state=mature
         created: Jul 28 05:58:02 2008   current: Jul 28 05:58:05 2008
         diff: 3(s)      hard: 43200(s)  soft: 34560(s)
         last: Jul 28 05:58:02 2008      hard: 0(s)      soft: 0(s)
         current: 160(bytes)     hard: 0(bytes)  soft: 0(bytes)
         allocated: 1    hard: 0 soft: 0
         sadb_seq=1 pid=3337 refcnt=2
69.146.32.251 w.x.y.z
         esp mode=tunnel spi=3887055(0x003b4fcf) reqid=0(0x00000000)
         E: 3des-cbc  a732002b 4d9e7dca eacf14b1 9175529f 0157d675 dd9eaa2b
         A: hmac-sha1  ecdb2d07 ecb1e803 d532d76c be11429f 33c5a5ed
         seq=0x00000001 replay=4 flags=0x00000000 state=mature
         created: Jul 28 05:58:02 2008   current: Jul 28 05:58:05 2008
         diff: 3(s)      hard: 43200(s)  soft: 34560(s)
         last: Jul 28 05:58:02 2008      hard: 0(s)      soft: 0(s)
         current: 124(bytes)     hard: 0(bytes)  soft: 0(bytes)
         allocated: 1    hard: 0 soft: 0
         sadb_seq=0 pid=3337 refcnt=1

Host B
69.146.32.251 w.x.y.z
         esp mode=tunnel spi=3887055(0x003b4fcf) reqid=0(0x00000000)
         E: 3des-cbc  a732002b 4d9e7dca eacf14b1 9175529f 0157d675 dd9eaa2b
         A: hmac-sha1  ecdb2d07 ecb1e803 d532d76c be11429f 33c5a5ed
         seq=0x00000001 replay=4 flags=0x00000000 state=mature
         created: Jul 28 05:58:54 2008   current: Jul 28 05:59:28 2008
         diff: 34(s)     hard: 43200(s)  soft: 34560(s)
         last: Jul 28 05:58:54 2008      hard: 0(s)      soft: 0(s)
         current: 160(bytes)     hard: 0(bytes)  soft: 0(bytes)
         allocated: 1    hard: 0 soft: 0
         sadb_seq=1 pid=11831 refcnt=2
w.x.y.z 69.146.32.251
         esp mode=tunnel spi=36840128(0x023222c0) reqid=0(0x00000000)
         E: 3des-cbc  95afdcdf 8ec36c90 c91388b5 5937999e d6a2db7c 27e5a321
         A: hmac-sha1  359d9f19 737936c1 30e211e5 abc887b3 aed79067
         seq=0x00000001 replay=4 flags=0x00000000 state=mature
         created: Jul 28 05:58:54 2008   current: Jul 28 05:59:28 2008
         diff: 34(s)     hard: 43200(s)  soft: 34560(s)
         last: Jul 28 05:58:54 2008      hard: 0(s)      soft: 0(s)
         current: 124(bytes)     hard: 0(bytes)  soft: 0(bytes)
         allocated: 1    hard: 0 soft: 0
         sadb_seq=0 pid=11831 refcnt=1

==========
Host A
# dd if=/dev/zero bs=512 count=300 | nc 192.168.0.1 8000
<exits status=141 after about 3 seconds>
Host B
<ctrl-c, after some wait>
66048 bytes transferred in 50.040368 secs (1320 bytes/sec)
========
# setkey -D
<NOTE: DIFFERENCES are shown below from the values above>
Host A
w.x.y.z 69.146.32.251
         seq=0x0000003a  diff: 177(s)    hard: 43200(s)  soft: 34560(s)
         last: Jul 28 06:00:32 2008
         current: 73360(bytes)   allocated: 58
69.146.32.251 w.x.y.z
         seq=0x0000002c  diff: 177(s)    hard: 43200(s)  soft: 34560(s)
         last: Jul 28 06:00:57 2008
         current: 4088(bytes)    allocated: 44
Host B
69.146.32.251 w.x.y.z
         seq=0x0000002c  diff: 189(s)    hard: 43200(s)  soft: 34560(s)
         last: Jul 28 06:01:49 2008
         current: 5672(bytes)    allocated: 44
w.x.y.z 69.146.32.251
         seq=0x0000003a
         diff: 189(s)    hard: 43200(s)  soft: 34560(s)
         current: 71484(bytes)   allocated: 58

======
# netstat -p ipsec -s
<All values zero except:>
Host A:
         134 outbound packets with no SA available

Host B:
# netstat -p ipsec -s
         19 outbound packets with no SA available
         224 mbufs inserted during makespace

Racoon debug log: attached, from host B. I've logged on host A in the 
past and it's approximately the same -- no clear errors.


Any help would be appreciated.
-------------- next part --------------
Foreground mode.
2008-07-28 05:58:46: INFO: @(#)ipsec-tools 0.7 (http://ipsec-tools.sourceforge.net)
2008-07-28 05:58:46: INFO: @(#)This product linked OpenSSL 0.9.8e 23 Feb 2007 (http://www.openssl.org/)
2008-07-28 05:58:46: INFO: Reading configuration from "/usr/local/etc/racoon/racoon.conf"
2008-07-28 05:58:46: DEBUG: call pfkey_send_register for AH
2008-07-28 05:58:46: DEBUG: call pfkey_send_register for ESP
2008-07-28 05:58:46: DEBUG: call pfkey_send_register for IPCOMP
2008-07-28 05:58:46: DEBUG: reading config file /usr/local/etc/racoon/racoon.conf
2008-07-28 05:58:46: DEBUG2: lifetime = 86400
2008-07-28 05:58:46: DEBUG2: lifebyte = 0
2008-07-28 05:58:46: DEBUG2: encklen=0
2008-07-28 05:58:46: DEBUG2: p:1 t:1
2008-07-28 05:58:46: DEBUG2: 3DES-CBC(5)
2008-07-28 05:58:46: DEBUG2: SHA(2)
2008-07-28 05:58:46: DEBUG2: 1024-bit MODP group(2)
2008-07-28 05:58:46: DEBUG2: pre-shared key(1)
2008-07-28 05:58:46: DEBUG2: 
2008-07-28 05:58:46: DEBUG: compression algorithm can not be checked because sadb message doesn't support it.
2008-07-28 05:58:46: DEBUG: getsainfo params: loc='ANONYMOUS', rmt='ANONYMOUS', peer='NULL', id=0
2008-07-28 05:58:46: DEBUG: getsainfo pass #2
2008-07-28 05:58:46: DEBUG2: parse successed.
2008-07-28 05:58:46: DEBUG: my interface: 69.146.32.251 (re1)
2008-07-28 05:58:46: DEBUG: my interface: fe80::1%lo0 (lo0)
2008-07-28 05:58:46: DEBUG: my interface: ::1 (lo0)
2008-07-28 05:58:46: DEBUG: my interface: 127.0.0.1 (lo0)
2008-07-28 05:58:46: DEBUG: my interface: 192.168.0.1 (bridge0)
2008-07-28 05:58:46: DEBUG: my interface: 192.168.0.1 (gif0)
2008-07-28 05:58:46: DEBUG: configuring default isakmp port.
2008-07-28 05:58:46: DEBUG: 6 addrs are configured successfully
2008-07-28 05:58:46: INFO: 192.168.0.1[500] used as isakmp port (fd=6)
2008-07-28 05:58:46: ERROR: failed to bind to address 192.168.0.1[500] (Address already in use).
2008-07-28 05:58:46: INFO: 127.0.0.1[500] used as isakmp port (fd=7)
2008-07-28 05:58:46: INFO: ::1[500] used as isakmp port (fd=8)
2008-07-28 05:58:46: INFO: fe80::1%lo0[500] used as isakmp port (fd=9)
2008-07-28 05:58:46: INFO: 69.146.32.251[500] used as isakmp port (fd=10)
2008-07-28 05:58:46: DEBUG: pk_recv: retry[0] recv() 
2008-07-28 05:58:46: DEBUG: get pfkey X_SPDDUMP message
2008-07-28 05:58:46: DEBUG2: 
02120000 0f000100 01000000 332e0000 03000500 04200000 10020000 ce51cc7a
00000000 00000000 03000600 04200000 10020000 459220fb 00000000 00000000
07001200 02000100 02000000 00000000 28003200 02020000 10020000 ce51cc7a
00000000 00000000 10020000 459220fb 00000000 00000000
2008-07-28 05:58:46: DEBUG: pk_recv: retry[0] recv() 
2008-07-28 05:58:46: DEBUG: get pfkey X_SPDDUMP message
2008-07-28 05:58:46: DEBUG2: 
02120000 0f000100 00000000 332e0000 03000500 04200000 10020000 459220fb
00000000 00000000 03000600 04200000 10020000 ce51cc7a 00000000 00000000
07001200 02000200 01000000 00000000 28003200 02020000 10020000 459220fb
00000000 00000000 10020000 ce51cc7a 00000000 00000000
2008-07-28 05:58:46: DEBUG: sub:0xbfbfe584: 69.146.32.251/32[0] w.x.y.z/32[0] proto=4 dir=out
2008-07-28 05:58:46: DEBUG: db :0x2843e078: w.x.y.z/32[0] 69.146.32.251/32[0] proto=4 dir=in
2008-07-28 05:58:52: DEBUG: ===
2008-07-28 05:58:52: DEBUG: 104 bytes message received from w.x.y.z[500] to 69.146.32.251[500]
2008-07-28 05:58:52: DEBUG: 
48a656d5 6e438a6c 00000000 00000000 01100200 00000000 00000068 0d000038
00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 000c0004
00015180 80010005 80030001 80020002 80040002 00000014 afcad713 68a1f1c9
6b8696fc 77570100
2008-07-28 05:58:52: DEBUG: anonymous configuration selected for w.x.y.z[500].
2008-07-28 05:58:52: DEBUG: ===
2008-07-28 05:58:52: INFO: respond new phase 1 negotiation: 69.146.32.251[500]<=>w.x.y.z[500]
2008-07-28 05:58:52: INFO: begin Identity Protection mode.
2008-07-28 05:58:52: DEBUG: begin.
2008-07-28 05:58:52: DEBUG: seen nptype=1(sa)
2008-07-28 05:58:52: DEBUG: seen nptype=13(vid)
2008-07-28 05:58:52: DEBUG: succeed.
2008-07-28 05:58:52: INFO: received Vendor ID: DPD
2008-07-28 05:58:52: DEBUG: total SA len=52
2008-07-28 05:58:52: DEBUG: 
00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 000c0004
00015180 80010005 80030001 80020002 80040002
2008-07-28 05:58:52: DEBUG: begin.
2008-07-28 05:58:52: DEBUG: seen nptype=2(prop)
2008-07-28 05:58:52: DEBUG: succeed.
2008-07-28 05:58:52: DEBUG: proposal #1 len=44
2008-07-28 05:58:52: DEBUG: begin.
2008-07-28 05:58:52: DEBUG: seen nptype=3(trns)
2008-07-28 05:58:52: DEBUG: succeed.
2008-07-28 05:58:52: DEBUG: transform #1 len=36
2008-07-28 05:58:52: DEBUG: type=Life Type, flag=0x8000, lorv=seconds
2008-07-28 05:58:52: DEBUG: type=Life Duration, flag=0x0000, lorv=4
2008-07-28 05:58:52: DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
2008-07-28 05:58:52: DEBUG: encryption(3des)
2008-07-28 05:58:52: DEBUG: type=Authentication Method, flag=0x8000, lorv=pre-shared key
2008-07-28 05:58:52: DEBUG: type=Hash Algorithm, flag=0x8000, lorv=SHA
2008-07-28 05:58:52: DEBUG: hash(sha1)
2008-07-28 05:58:52: DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group
2008-07-28 05:58:52: DEBUG: hmac(modp1024)
2008-07-28 05:58:52: DEBUG: pair 1:
2008-07-28 05:58:52: DEBUG:  0x28439250: next=0x0 tnext=0x0
2008-07-28 05:58:52: DEBUG: proposal #1: 1 transform
2008-07-28 05:58:52: DEBUG: prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1
2008-07-28 05:58:52: DEBUG: trns#=1, trns-id=IKE
2008-07-28 05:58:52: DEBUG: type=Life Type, flag=0x8000, lorv=seconds
2008-07-28 05:58:52: DEBUG: type=Life Duration, flag=0x0000, lorv=4
2008-07-28 05:58:52: DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
2008-07-28 05:58:52: DEBUG: type=Authentication Method, flag=0x8000, lorv=pre-shared key
2008-07-28 05:58:52: DEBUG: type=Hash Algorithm, flag=0x8000, lorv=SHA
2008-07-28 05:58:52: DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group
2008-07-28 05:58:52: DEBUG: Compared: DB:Peer
2008-07-28 05:58:52: DEBUG: (lifetime = 86400:86400)
2008-07-28 05:58:52: DEBUG: (lifebyte = 0:0)
2008-07-28 05:58:52: DEBUG: enctype = 3DES-CBC:3DES-CBC
2008-07-28 05:58:52: DEBUG: (encklen = 0:0)
2008-07-28 05:58:52: DEBUG: hashtype = SHA:SHA
2008-07-28 05:58:52: DEBUG: authmethod = pre-shared key:pre-shared key
2008-07-28 05:58:52: DEBUG: dh_group = 1024-bit MODP group:1024-bit MODP group
2008-07-28 05:58:52: DEBUG: an acceptable proposal found.
2008-07-28 05:58:52: DEBUG: hmac(modp1024)
2008-07-28 05:58:52: DEBUG: agreed on pre-shared key auth.
2008-07-28 05:58:52: DEBUG: ===
2008-07-28 05:58:52: DEBUG: new cookie:
835e2082f4c50164 
2008-07-28 05:58:52: DEBUG: add payload of len 52, next type 13
2008-07-28 05:58:52: DEBUG: add payload of len 16, next type 0
2008-07-28 05:58:52: DEBUG: 104 bytes from 69.146.32.251[500] to w.x.y.z[500]
2008-07-28 05:58:52: DEBUG: sockname 69.146.32.251[500]
2008-07-28 05:58:52: DEBUG: send packet from 69.146.32.251[500]
2008-07-28 05:58:52: DEBUG: send packet to w.x.y.z[500]
2008-07-28 05:58:52: DEBUG: 1 times of 104 bytes message will be sent to w.x.y.z[500]
2008-07-28 05:58:52: DEBUG: 
48a656d5 6e438a6c 835e2082 f4c50164 01100200 00000000 00000068 0d000038
00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 000c0004
00015180 80010005 80030001 80020002 80040002 00000014 afcad713 68a1f1c9
6b8696fc 77570100
2008-07-28 05:58:52: DEBUG: resend phase1 packet 48a656d56e438a6c:835e2082f4c50164
2008-07-28 05:58:52: DEBUG: ===
2008-07-28 05:58:52: DEBUG: 180 bytes message received from w.x.y.z[500] to 69.146.32.251[500]
2008-07-28 05:58:52: DEBUG: 
48a656d5 6e438a6c 835e2082 f4c50164 04100200 00000000 000000b4 0a000084
860cc11e 3396b59e bdc7d95e 4e8dc787 9f64d04b 833bc9a1 04fa39c2 07b766a9
6c2a11ab 1056dc46 8649f49a bba1b703 1365d3c5 9400dbc3 644d6fea c03ab75a
dfe13d83 419bae91 6c26272b 51ae2c77 70220a0c c5a73019 682b238f 09f6d741
a7868ed1 935b016b d5cdb435 814d052e fdd25b7a 02c0c9c4 7b4b1791 ea7ca5b0
00000014 ecf1de20 b7694a17 2f111e8c 2fd72b05
2008-07-28 05:58:52: DEBUG: begin.
2008-07-28 05:58:52: DEBUG: seen nptype=4(ke)
2008-07-28 05:58:52: DEBUG: seen nptype=10(nonce)
2008-07-28 05:58:52: DEBUG: succeed.
2008-07-28 05:58:52: DEBUG: ===
2008-07-28 05:58:52: DEBUG: compute DH's private.
2008-07-28 05:58:52: DEBUG: 
54c75c82 5136519f f877aeec ebb7c4ab 5f29b2cb 43e28eb2 a5bcd9b2 890fff4a
0f65f836 2cb652f2 72d5ea99 f9991742 942b8bff 0b7ec1e6 2c6b52e4 5c5995ca
47c105d9 b7d27c3c 92d6fd00 952a441f 70f4c0f5 3c0d1d3c 48ce6ddd 4e714f17
05b6dbbe 8ed7f521 cd79e172 188513a5 e60343b0 d2723dbb 5226ecae d49c0306
2008-07-28 05:58:52: DEBUG: compute DH's public.
2008-07-28 05:58:52: DEBUG: 
a32e23d9 334afdbc 70eed448 3a61f250 d5d0d695 6f198b96 c953f9ad 6650f67f
175047eb cde00bb7 1946e215 b4d1cc9e ecca0fcf 3c8af1d4 a3ee855a 81065b57
17511179 3c9d912f 2e3cef94 e8da7690 12297c18 cd3a19fb 7b282782 49cce2d2
4e864e80 34d4f02f 8e1d8adc 48ae9546 f6ef395b f51eb8f5 f07c50ff 40cceaf4
2008-07-28 05:58:52: DEBUG: add payload of len 128, next type 10
2008-07-28 05:58:52: DEBUG: add payload of len 16, next type 0
2008-07-28 05:58:52: DEBUG: 180 bytes from 69.146.32.251[500] to w.x.y.z[500]
2008-07-28 05:58:52: DEBUG: sockname 69.146.32.251[500]
2008-07-28 05:58:52: DEBUG: send packet from 69.146.32.251[500]
2008-07-28 05:58:52: DEBUG: send packet to w.x.y.z[500]
2008-07-28 05:58:52: DEBUG: 1 times of 180 bytes message will be sent to w.x.y.z[500]
2008-07-28 05:58:52: DEBUG: 
48a656d5 6e438a6c 835e2082 f4c50164 04100200 00000000 000000b4 0a000084
a32e23d9 334afdbc 70eed448 3a61f250 d5d0d695 6f198b96 c953f9ad 6650f67f
175047eb cde00bb7 1946e215 b4d1cc9e ecca0fcf 3c8af1d4 a3ee855a 81065b57
17511179 3c9d912f 2e3cef94 e8da7690 12297c18 cd3a19fb 7b282782 49cce2d2
4e864e80 34d4f02f 8e1d8adc 48ae9546 f6ef395b f51eb8f5 f07c50ff 40cceaf4
00000014 b9f44059 1a7b59be c98244f3 c5c28b01
2008-07-28 05:58:52: DEBUG: resend phase1 packet 48a656d56e438a6c:835e2082f4c50164
2008-07-28 05:58:52: DEBUG: compute DH's shared.
2008-07-28 05:58:52: DEBUG: 
b3733178 54b3e2a5 fd94e055 40082381 4883ba2f 3ed448af bd17d2ed e6fac2a1
4303de72 eac71402 4bd15a32 298717c6 8bd0d2ab 6fbd6b1b a452e007 ad737428
b7830511 85b3229f 94e6cd0a a11360d5 78cccb77 a9383e41 9d97eeea f1d2711b
6600a36a ee1eb94b 79e6ba38 827d8d99 69d9b5b6 dd4a5255 4bd863dd c334c995
2008-07-28 05:58:52: DEBUG: the psk found.
2008-07-28 05:58:52: DEBUG2: psk: 2008-07-28 05:58:52: DEBUG2: 
57654172 6556504e
2008-07-28 05:58:52: DEBUG: nonce 1: 2008-07-28 05:58:52: DEBUG: 
ecf1de20 b7694a17 2f111e8c 2fd72b05
2008-07-28 05:58:52: DEBUG: nonce 2: 2008-07-28 05:58:52: DEBUG: 
b9f44059 1a7b59be c98244f3 c5c28b01
2008-07-28 05:58:52: DEBUG: hmac(hmac_sha1)
2008-07-28 05:58:52: DEBUG: SKEYID computed:
2008-07-28 05:58:52: DEBUG: 
c968ee2a 423d0906 7aad37a3 ad8cd133 74165e67
2008-07-28 05:58:52: DEBUG: hmac(hmac_sha1)
2008-07-28 05:58:52: DEBUG: SKEYID_d computed:
2008-07-28 05:58:52: DEBUG: 
e02b177e d824ef2b 2a12dfd2 7d294998 2307907d
2008-07-28 05:58:52: DEBUG: hmac(hmac_sha1)
2008-07-28 05:58:52: DEBUG: SKEYID_a computed:
2008-07-28 05:58:52: DEBUG: 
6a9fb4e1 d21e4532 77840eab cc168404 d34ac8de
2008-07-28 05:58:52: DEBUG: hmac(hmac_sha1)
2008-07-28 05:58:52: DEBUG: SKEYID_e computed:
2008-07-28 05:58:52: DEBUG: 
64170adb d30f0338 9872f25f 29ca89a2 db18052b
2008-07-28 05:58:52: DEBUG: encryption(3des)
2008-07-28 05:58:52: DEBUG: hash(sha1)
2008-07-28 05:58:52: DEBUG: len(SKEYID_e) < len(Ka) (20 < 24), generating long key (Ka = K1 | K2 | ...)
2008-07-28 05:58:52: DEBUG: hmac(hmac_sha1)
2008-07-28 05:58:52: DEBUG: compute intermediate encryption key K1
2008-07-28 05:58:52: DEBUG: 
00
2008-07-28 05:58:52: DEBUG: 
6d64b34e b5017daa 32825cfd 29128ca0 c47e1cb3
2008-07-28 05:58:52: DEBUG: hmac(hmac_sha1)
2008-07-28 05:58:52: DEBUG: compute intermediate encryption key K2
2008-07-28 05:58:52: DEBUG: 
6d64b34e b5017daa 32825cfd 29128ca0 c47e1cb3
2008-07-28 05:58:52: DEBUG: 
22321fe2 49601e19 c116a048 066fb0ed f194fc29
2008-07-28 05:58:52: DEBUG: final encryption key computed:
2008-07-28 05:58:52: DEBUG: 
6d64b34e b5017daa 32825cfd 29128ca0 c47e1cb3 22321fe2
2008-07-28 05:58:52: DEBUG: hash(sha1)
2008-07-28 05:58:52: DEBUG: encryption(3des)
2008-07-28 05:58:52: DEBUG: IV computed:
2008-07-28 05:58:52: DEBUG: 
75d611fc 2b7a9477
2008-07-28 05:58:52: DEBUG: ===
2008-07-28 05:58:52: DEBUG: 68 bytes message received from w.x.y.z[500] to 69.146.32.251[500]
2008-07-28 05:58:52: DEBUG: 
48a656d5 6e438a6c 835e2082 f4c50164 05100201 00000000 00000044 3949ccbe
b6702aa8 0e81b968 7c0db561 482aa93c d8b2b7f1 d724632f 6b377f83 b56e89e3
36fcdaf2
2008-07-28 05:58:52: DEBUG: begin decryption.
2008-07-28 05:58:52: DEBUG: encryption(3des)
2008-07-28 05:58:52: DEBUG: IV was saved for next processing:
2008-07-28 05:58:52: DEBUG: 
b56e89e3 36fcdaf2
2008-07-28 05:58:52: DEBUG: encryption(3des)
2008-07-28 05:58:52: DEBUG: with key:
2008-07-28 05:58:52: DEBUG: 
6d64b34e b5017daa 32825cfd 29128ca0 c47e1cb3 22321fe2
2008-07-28 05:58:52: DEBUG: decrypted payload by IV:
2008-07-28 05:58:52: DEBUG: 
75d611fc 2b7a9477
2008-07-28 05:58:52: DEBUG: decrypted payload, but not trimed.
2008-07-28 05:58:52: DEBUG: 
0800000c 011101f4 ce51cc7a 00000018 68131787 dc799fc2 9de084af 51dbb9a7
81ec8548 ac89c903
2008-07-28 05:58:52: DEBUG: padding len=4
2008-07-28 05:58:52: DEBUG: skip to trim padding.
2008-07-28 05:58:52: DEBUG: decrypted.
2008-07-28 05:58:52: DEBUG: 
48a656d5 6e438a6c 835e2082 f4c50164 05100201 00000000 00000044 0800000c
011101f4 ce51cc7a 00000018 68131787 dc799fc2 9de084af 51dbb9a7 81ec8548
ac89c903
2008-07-28 05:58:52: DEBUG: begin.
2008-07-28 05:58:52: DEBUG: seen nptype=5(id)
2008-07-28 05:58:52: DEBUG: seen nptype=8(hash)
2008-07-28 05:58:52: DEBUG: succeed.
2008-07-28 05:58:52: DEBUG: HASH received:
2008-07-28 05:58:52: DEBUG: 
68131787 dc799fc2 9de084af 51dbb9a7 81ec8548
2008-07-28 05:58:52: DEBUG: HASH with:
2008-07-28 05:58:52: DEBUG: 
860cc11e 3396b59e bdc7d95e 4e8dc787 9f64d04b 833bc9a1 04fa39c2 07b766a9
6c2a11ab 1056dc46 8649f49a bba1b703 1365d3c5 9400dbc3 644d6fea c03ab75a
dfe13d83 419bae91 6c26272b 51ae2c77 70220a0c c5a73019 682b238f 09f6d741
a7868ed1 935b016b d5cdb435 814d052e fdd25b7a 02c0c9c4 7b4b1791 ea7ca5b0
a32e23d9 334afdbc 70eed448 3a61f250 d5d0d695 6f198b96 c953f9ad 6650f67f
175047eb cde00bb7 1946e215 b4d1cc9e ecca0fcf 3c8af1d4 a3ee855a 81065b57
17511179 3c9d912f 2e3cef94 e8da7690 12297c18 cd3a19fb 7b282782 49cce2d2
4e864e80 34d4f02f 8e1d8adc 48ae9546 f6ef395b f51eb8f5 f07c50ff 40cceaf4
48a656d5 6e438a6c 835e2082 f4c50164 00000001 00000001 0000002c 01010001
00000024 01010000 800b0001 000c0004 00015180 80010005 80030001 80020002
80040002 011101f4 ce51cc7a
2008-07-28 05:58:52: DEBUG: hmac(hmac_sha1)
2008-07-28 05:58:52: DEBUG: HASH (resp) computed:
2008-07-28 05:58:52: DEBUG: 
68131787 dc799fc2 9de084af 51dbb9a7 81ec8548
2008-07-28 05:58:52: DEBUG: HASH for PSK validated.
2008-07-28 05:58:52: DEBUG: peer's ID
2008-07-28 05:58:52: DEBUG: 
011101f4 ce51cc7a
2008-07-28 05:58:52: DEBUG: ===
2008-07-28 05:58:52: DEBUG: use ID type of IPv4_address
2008-07-28 05:58:52: DEBUG: generate HASH_R
2008-07-28 05:58:52: DEBUG: HASH with:
2008-07-28 05:58:52: DEBUG: 
a32e23d9 334afdbc 70eed448 3a61f250 d5d0d695 6f198b96 c953f9ad 6650f67f
175047eb cde00bb7 1946e215 b4d1cc9e ecca0fcf 3c8af1d4 a3ee855a 81065b57
17511179 3c9d912f 2e3cef94 e8da7690 12297c18 cd3a19fb 7b282782 49cce2d2
4e864e80 34d4f02f 8e1d8adc 48ae9546 f6ef395b f51eb8f5 f07c50ff 40cceaf4
860cc11e 3396b59e bdc7d95e 4e8dc787 9f64d04b 833bc9a1 04fa39c2 07b766a9
6c2a11ab 1056dc46 8649f49a bba1b703 1365d3c5 9400dbc3 644d6fea c03ab75a
dfe13d83 419bae91 6c26272b 51ae2c77 70220a0c c5a73019 682b238f 09f6d741
a7868ed1 935b016b d5cdb435 814d052e fdd25b7a 02c0c9c4 7b4b1791 ea7ca5b0
835e2082 f4c50164 48a656d5 6e438a6c 00000001 00000001 0000002c 01010001
00000024 01010000 800b0001 000c0004 00015180 80010005 80030001 80020002
80040002 011101f4 459220fb
2008-07-28 05:58:52: DEBUG: hmac(hmac_sha1)
2008-07-28 05:58:52: DEBUG: HASH (resp) computed:
2008-07-28 05:58:52: DEBUG: 
b89239ea d6e714bc b554cec7 07ea030e a3a5eb9b
2008-07-28 05:58:52: DEBUG: add payload of len 8, next type 8
2008-07-28 05:58:52: DEBUG: add payload of len 20, next type 0
2008-07-28 05:58:52: DEBUG: begin encryption.
2008-07-28 05:58:52: DEBUG: encryption(3des)
2008-07-28 05:58:52: DEBUG: pad length = 4
2008-07-28 05:58:52: DEBUG: 
0800000c 011101f4 459220fb 00000018 b89239ea d6e714bc b554cec7 07ea030e
a3a5eb9b a6d19903
2008-07-28 05:58:52: DEBUG: encryption(3des)
2008-07-28 05:58:52: DEBUG: with key:
2008-07-28 05:58:52: DEBUG: 
6d64b34e b5017daa 32825cfd 29128ca0 c47e1cb3 22321fe2
2008-07-28 05:58:52: DEBUG: encrypted payload by IV:
2008-07-28 05:58:52: DEBUG: 
b56e89e3 36fcdaf2
2008-07-28 05:58:52: DEBUG: save IV for next:
2008-07-28 05:58:52: DEBUG: 
76737915 8b38ae42
2008-07-28 05:58:52: DEBUG: encrypted.
2008-07-28 05:58:52: DEBUG: 68 bytes from 69.146.32.251[500] to w.x.y.z[500]
2008-07-28 05:58:52: DEBUG: sockname 69.146.32.251[500]
2008-07-28 05:58:52: DEBUG: send packet from 69.146.32.251[500]
2008-07-28 05:58:52: DEBUG: send packet to w.x.y.z[500]
2008-07-28 05:58:52: DEBUG: 1 times of 68 bytes message will be sent to w.x.y.z[500]
2008-07-28 05:58:52: DEBUG: 
48a656d5 6e438a6c 835e2082 f4c50164 05100201 00000000 00000044 d85b53f6
88714dc6 1d87da51 fa37e765 c3dd8001 01b9f56f 1774c162 e4a7864e 76737915
8b38ae42
2008-07-28 05:58:52: DEBUG: compute IV for phase2
2008-07-28 05:58:52: DEBUG: phase1 last IV:
2008-07-28 05:58:52: DEBUG: 
76737915 8b38ae42 8e4d7ed3
2008-07-28 05:58:52: DEBUG: hash(sha1)
2008-07-28 05:58:52: DEBUG: encryption(3des)
2008-07-28 05:58:52: DEBUG: phase2 IV computed:
2008-07-28 05:58:52: DEBUG: 
7e7b50f3 051b6b7b
2008-07-28 05:58:52: DEBUG: HASH with:
2008-07-28 05:58:52: DEBUG: 
8e4d7ed3 0000001c 00000001 01106002 48a656d5 6e438a6c 835e2082 f4c50164
2008-07-28 05:58:52: DEBUG: hmac(hmac_sha1)
2008-07-28 05:58:52: DEBUG: HASH computed:
2008-07-28 05:58:52: DEBUG: 
b7972a50 7bbce940 b5da9e09 23b05b78 1d5cac19
2008-07-28 05:58:52: DEBUG: begin encryption.
2008-07-28 05:58:52: DEBUG: encryption(3des)
2008-07-28 05:58:52: DEBUG: pad length = 4
2008-07-28 05:58:52: DEBUG: 
0b000018 b7972a50 7bbce940 b5da9e09 23b05b78 1d5cac19 0000001c 00000001
01106002 48a656d5 6e438a6c 835e2082 f4c50164 b2c7e403
2008-07-28 05:58:52: DEBUG: encryption(3des)
2008-07-28 05:58:52: DEBUG: with key:
2008-07-28 05:58:52: DEBUG: 
6d64b34e b5017daa 32825cfd 29128ca0 c47e1cb3 22321fe2
2008-07-28 05:58:52: DEBUG: encrypted payload by IV:
2008-07-28 05:58:52: DEBUG: 
7e7b50f3 051b6b7b
2008-07-28 05:58:52: DEBUG: save IV for next:
2008-07-28 05:58:52: DEBUG: 
d6cba77b 5ac2a34e
2008-07-28 05:58:52: DEBUG: encrypted.
2008-07-28 05:58:52: DEBUG: 84 bytes from 69.146.32.251[500] to w.x.y.z[500]
2008-07-28 05:58:52: DEBUG: sockname 69.146.32.251[500]
2008-07-28 05:58:52: DEBUG: send packet from 69.146.32.251[500]
2008-07-28 05:58:52: DEBUG: send packet to w.x.y.z[500]
2008-07-28 05:58:52: DEBUG: 1 times of 84 bytes message will be sent to w.x.y.z[500]
2008-07-28 05:58:52: DEBUG: 
48a656d5 6e438a6c 835e2082 f4c50164 08100501 8e4d7ed3 00000054 be1b0d21
cb9eecf9 a7a14926 02b0b9be 27d4dc34 2feae4cd c4652a64 f5496085 179491d6
1deb5146 3490ba75 02f534e3 d6cba77b 5ac2a34e
2008-07-28 05:58:52: DEBUG: sendto Information notify.
2008-07-28 05:58:52: DEBUG: IV freed
2008-07-28 05:58:52: INFO: ISAKMP-SA established 69.146.32.251[500]-w.x.y.z[500] spi:48a656d56e438a6c:835e2082f4c50164
2008-07-28 05:58:52: DEBUG: ===
2008-07-28 05:58:53: DEBUG: ===
2008-07-28 05:58:53: DEBUG: 564 bytes message received from w.x.y.z[500] to 69.146.32.251[500]
2008-07-28 05:58:53: DEBUG: 
48a656d5 6e438a6c 835e2082 f4c50164 08102001 c383cb43 00000234 84550bd5
6e47b2bd d37509e7 ed9224a8 341c41cf 0b4045a1 a4cf202e 81719170 2d79e609
ad956fa9 29b097a3 8ec88b07 67d1ae0b 15b20b1c 5d270bb3 896b3f08 fab86b48
a4462c9e d9048908 e616d7bb 85003694 f420d4d3 4a36613f 2f5a3891 efaeac09
92e98197 49429313 ea4bf456 359749aa a454743d 21fda7fa f3ca4019 f40c31b1
98c2f3a6 3db19efd 4e4b803e 8538e60d 23fdb9ec 3b7093c7 3355a215 81c5e992
a151f376 83b78832 5c76454c a4808747 01dd9ced c0f07cdc 634bac7e 395b9d36
876f5f12 a0b76f60 da12ea24 85fa0333 c40c0e4a e77cd847 12fac3bc 4c4afe6f
93042920 d736eae4 81bdb711 4cfcf0ff fed79678 ae99c248 390de523 712a31dd
5a614bdf e6adeecb 04da3375 3cb202f7 e50b5bf7 2210ba3e 75b9a7b2 af4dd2d3
95a1189a ce78906d da13387b c256fbe0 429d640b 7eb235d0 9ce6373a ff502590
33867363 66a7fdeb 6fb9acb3 eba69bb9 bf857584 bf913af2 5710400e 93f9c8e1
5a554937 19776b23 449fe66b 4b588b13 6084e8a5 e0f651e5 f306d1ad 1bce5736
0cc3eda5 2d1a2012 10fbb2d3 afe3bf2d 75748f66 08592abb 762d8b7b 8a15d9dd
ab88f30b 5f5abb86 253d7890 a8f4ca3d 3e61cd30 382f9234 e3ede772 ec2fae87
0bd2192b a08274a9 8fae6d51 44792842 c7cf0973 b699912b dcd85fe9 1bd14ef7
012883da ae02f627 aac7d171 a330eef5 4f86824a d490302d 6b3c398c 72ebe41d
39f7e986 52943cd8 a29b9ad3 12e14984 71aa67fb
2008-07-28 05:58:53: DEBUG: compute IV for phase2
2008-07-28 05:58:53: DEBUG: phase1 last IV:
2008-07-28 05:58:53: DEBUG: 
76737915 8b38ae42 c383cb43
2008-07-28 05:58:53: DEBUG: hash(sha1)
2008-07-28 05:58:53: DEBUG: encryption(3des)
2008-07-28 05:58:53: DEBUG: phase2 IV computed:
2008-07-28 05:58:53: DEBUG: 
1050d01c 76f25c67
2008-07-28 05:58:53: DEBUG: ===
2008-07-28 05:58:53: INFO: respond new phase 2 negotiation: 69.146.32.251[0]<=>w.x.y.z[0]
2008-07-28 05:58:53: DEBUG: begin decryption.
2008-07-28 05:58:53: DEBUG: encryption(3des)
2008-07-28 05:58:53: DEBUG: IV was saved for next processing:
2008-07-28 05:58:53: DEBUG: 
12e14984 71aa67fb
2008-07-28 05:58:53: DEBUG: encryption(3des)
2008-07-28 05:58:53: DEBUG: with key:
2008-07-28 05:58:53: DEBUG: 
6d64b34e b5017daa 32825cfd 29128ca0 c47e1cb3 22321fe2
2008-07-28 05:58:53: DEBUG: decrypted payload by IV:
2008-07-28 05:58:53: DEBUG: 
1050d01c 76f25c67
2008-07-28 05:58:53: DEBUG: decrypted payload, but not trimed.
2008-07-28 05:58:53: DEBUG: 
01000018 c6ba0618 c2feac6d ff6a262e e6136d47 f59c5c2a 0a000148 00000001
00000001 0000013c 0103040a 003b4fcf 0300001c 01030000 80010001 8002a8c0
80040001 80050002 80030002 0300001c 02030000 80010001 8002a8c0 80040001
80050001 80030002 03000020 03060000 80010001 8002a8c0 80040001 80060080
80050002 80030002 03000020 04060000 80010001 8002a8c0 80040001 80060080
80050001 80030002 03000020 05070000 80010001 8002a8c0 80040001 800601c0
80050002 80030002 03000020 06070000 80010001 8002a8c0 80040001 800601c0
80050001 80030002 0300001c 07020000 80010001 8002a8c0 80040001 80050002
80030002 0300001c 08020000 80010001 8002a8c0 80040001 80050001 80030002
03000020 090c0000 80010001 8002a8c0 80040001 80060080 80050002 80030002
00000020 0a0c0000 80010001 8002a8c0 80040001 80060080 80050001 80030002
04000014 a4898266 1b522452 f9401bbf db67f809 05000084 b1aff46d 35278f9f
ccf1fd10 c6ce81c5 17feb23d 3d371d6f c8627f19 b2090f6f db4f13ce 6ad2ecd6
cead6274 ea656754 27d61b38 1af4c0d5 45adcfb9 0e3a6ab0 f39c1c59 b4603f6f
2bee85f7 2148ef51 d6d6c55d caab505d 1b22cc81 7b5db7f8 fc6b7194 04fe901e
b6e3b97e 1d65eef2 3297c7a0 51a18155 2027933e bffdbf3c 0500000c 01040000
ce51cc7a 0000000c 01040000 459220fb efeaa690 f59cb307
2008-07-28 05:58:53: DEBUG: padding len=8
2008-07-28 05:58:53: DEBUG: skip to trim padding.
2008-07-28 05:58:53: DEBUG: decrypted.
2008-07-28 05:58:53: DEBUG: 
48a656d5 6e438a6c 835e2082 f4c50164 08102001 c383cb43 00000234 01000018
c6ba0618 c2feac6d ff6a262e e6136d47 f59c5c2a 0a000148 00000001 00000001
0000013c 0103040a 003b4fcf 0300001c 01030000 80010001 8002a8c0 80040001
80050002 80030002 0300001c 02030000 80010001 8002a8c0 80040001 80050001
80030002 03000020 03060000 80010001 8002a8c0 80040001 80060080 80050002
80030002 03000020 04060000 80010001 8002a8c0 80040001 80060080 80050001
80030002 03000020 05070000 80010001 8002a8c0 80040001 800601c0 80050002
80030002 03000020 06070000 80010001 8002a8c0 80040001 800601c0 80050001
80030002 0300001c 07020000 80010001 8002a8c0 80040001 80050002 80030002
0300001c 08020000 80010001 8002a8c0 80040001 80050001 80030002 03000020
090c0000 80010001 8002a8c0 80040001 80060080 80050002 80030002 00000020
0a0c0000 80010001 8002a8c0 80040001 80060080 80050001 80030002 04000014
a4898266 1b522452 f9401bbf db67f809 05000084 b1aff46d 35278f9f ccf1fd10
c6ce81c5 17feb23d 3d371d6f c8627f19 b2090f6f db4f13ce 6ad2ecd6 cead6274
ea656754 27d61b38 1af4c0d5 45adcfb9 0e3a6ab0 f39c1c59 b4603f6f 2bee85f7
2148ef51 d6d6c55d caab505d 1b22cc81 7b5db7f8 fc6b7194 04fe901e b6e3b97e
1d65eef2 3297c7a0 51a18155 2027933e bffdbf3c 0500000c 01040000 ce51cc7a
0000000c 01040000 459220fb efeaa690 f59cb307
2008-07-28 05:58:53: DEBUG: begin.
2008-07-28 05:58:53: DEBUG: seen nptype=8(hash)
2008-07-28 05:58:53: DEBUG: seen nptype=1(sa)
2008-07-28 05:58:53: DEBUG: seen nptype=10(nonce)
2008-07-28 05:58:53: DEBUG: seen nptype=4(ke)
2008-07-28 05:58:53: DEBUG: seen nptype=5(id)
2008-07-28 05:58:53: DEBUG: seen nptype=5(id)
2008-07-28 05:58:53: DEBUG: succeed.
2008-07-28 05:58:53: DEBUG: received IDci2:2008-07-28 05:58:53: DEBUG: 
01040000 ce51cc7a
2008-07-28 05:58:53: DEBUG: received IDcr2:2008-07-28 05:58:53: DEBUG: 
01040000 459220fb
2008-07-28 05:58:53: DEBUG: HASH(1) validate:2008-07-28 05:58:53: DEBUG: 
c6ba0618 c2feac6d ff6a262e e6136d47 f59c5c2a
2008-07-28 05:58:53: DEBUG: HASH with:
2008-07-28 05:58:53: DEBUG: 
c383cb43 0a000148 00000001 00000001 0000013c 0103040a 003b4fcf 0300001c
01030000 80010001 8002a8c0 80040001 80050002 80030002 0300001c 02030000
80010001 8002a8c0 80040001 80050001 80030002 03000020 03060000 80010001
8002a8c0 80040001 80060080 80050002 80030002 03000020 04060000 80010001
8002a8c0 80040001 80060080 80050001 80030002 03000020 05070000 80010001
8002a8c0 80040001 800601c0 80050002 80030002 03000020 06070000 80010001
8002a8c0 80040001 800601c0 80050001 80030002 0300001c 07020000 80010001
8002a8c0 80040001 80050002 80030002 0300001c 08020000 80010001 8002a8c0
80040001 80050001 80030002 03000020 090c0000 80010001 8002a8c0 80040001
80060080 80050002 80030002 00000020 0a0c0000 80010001 8002a8c0 80040001
80060080 80050001 80030002 04000014 a4898266 1b522452 f9401bbf db67f809
05000084 b1aff46d 35278f9f ccf1fd10 c6ce81c5 17feb23d 3d371d6f c8627f19
b2090f6f db4f13ce 6ad2ecd6 cead6274 ea656754 27d61b38 1af4c0d5 45adcfb9
0e3a6ab0 f39c1c59 b4603f6f 2bee85f7 2148ef51 d6d6c55d caab505d 1b22cc81
7b5db7f8 fc6b7194 04fe901e b6e3b97e 1d65eef2 3297c7a0 51a18155 2027933e
bffdbf3c 0500000c 01040000 ce51cc7a 0000000c 01040000 459220fb
2008-07-28 05:58:53: DEBUG: hmac(hmac_sha1)
2008-07-28 05:58:53: DEBUG: HASH computed:
2008-07-28 05:58:53: DEBUG: 
c6ba0618 c2feac6d ff6a262e e6136d47 f59c5c2a
2008-07-28 05:58:53: DEBUG: anonymous configuration selected for w.x.y.z.
2008-07-28 05:58:53: DEBUG: getsainfo params: loc='69.146.32.251', rmt='w.x.y.z', peer='w.x.y.z', id=0
2008-07-28 05:58:53: DEBUG: getsainfo pass #1
2008-07-28 05:58:53: DEBUG: evaluating sainfo: loc='ANONYMOUS', rmt='ANONYMOUS', peer='ANY', id=0
2008-07-28 05:58:53: DEBUG: getsainfo pass #2
2008-07-28 05:58:53: DEBUG: evaluating sainfo: loc='ANONYMOUS', rmt='ANONYMOUS', peer='ANY', id=0
2008-07-28 05:58:53: DEBUG: selected sainfo: loc='ANONYMOUS', rmt='ANONYMOUS', peer='ANY', id=0
2008-07-28 05:58:53: DEBUG: get a src address from ID payload w.x.y.z[0] prefixlen=32 ul_proto=4
2008-07-28 05:58:53: DEBUG: get dst address from ID payload 69.146.32.251[0] prefixlen=32 ul_proto=4
2008-07-28 05:58:53: DEBUG: sub:0xbfbfe308: w.x.y.z/32[0] 69.146.32.251/32[0] proto=4 dir=in
2008-07-28 05:58:53: DEBUG: db: 0x2843e078: w.x.y.z/32[0] 69.146.32.251/32[0] proto=4 dir=in
2008-07-28 05:58:53: DEBUG: 0xbfbfe308 masked with /32: w.x.y.z[0]
2008-07-28 05:58:53: DEBUG: 0x2843e078 masked with /32: w.x.y.z[0]
2008-07-28 05:58:53: DEBUG: 0xbfbfe308 masked with /32: 69.146.32.251[0]
2008-07-28 05:58:53: DEBUG: 0x2843e078 masked with /32: 69.146.32.251[0]
2008-07-28 05:58:53: DEBUG: sub:0xbfbfe308: 69.146.32.251/32[0] w.x.y.z/32[0] proto=4 dir=out
2008-07-28 05:58:53: DEBUG: db: 0x2843e078: w.x.y.z/32[0] 69.146.32.251/32[0] proto=4 dir=in
2008-07-28 05:58:53: DEBUG: sub:0xbfbfe308: 69.146.32.251/32[0] w.x.y.z/32[0] proto=4 dir=out
2008-07-28 05:58:53: DEBUG: db: 0x2843e1a8: 69.146.32.251/32[0] w.x.y.z/32[0] proto=4 dir=out
2008-07-28 05:58:53: DEBUG: 0xbfbfe308 masked with /32: 69.146.32.251[0]
2008-07-28 05:58:53: DEBUG: 0x2843e1a8 masked with /32: 69.146.32.251[0]
2008-07-28 05:58:53: DEBUG: 0xbfbfe308 masked with /32: w.x.y.z[0]
2008-07-28 05:58:53: DEBUG: 0x2843e1a8 masked with /32: w.x.y.z[0]
2008-07-28 05:58:53: DEBUG: suitable SP found:69.146.32.251/32[0] w.x.y.z/32[0] proto=4 dir=out
2008-07-28 05:58:53: DEBUG:  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=0:0)
2008-07-28 05:58:53: DEBUG:   (trns_id=3DES encklen=0 authtype=hmac-sha)
2008-07-28 05:58:53: DEBUG:   (trns_id=3DES encklen=0 authtype=hmac-md5)
2008-07-28 05:58:53: DEBUG:   (trns_id=CAST encklen=128 authtype=hmac-sha)
2008-07-28 05:58:53: DEBUG:   (trns_id=CAST encklen=128 authtype=hmac-md5)
2008-07-28 05:58:53: DEBUG:   (trns_id=BLOWFISH encklen=448 authtype=hmac-sha)
2008-07-28 05:58:53: DEBUG:   (trns_id=BLOWFISH encklen=448 authtype=hmac-md5)
2008-07-28 05:58:53: DEBUG:   (trns_id=DES encklen=0 authtype=hmac-sha)
2008-07-28 05:58:53: DEBUG:   (trns_id=DES encklen=0 authtype=hmac-md5)
2008-07-28 05:58:53: DEBUG:   (trns_id=AES encklen=128 authtype=hmac-sha)
2008-07-28 05:58:53: DEBUG:   (trns_id=AES encklen=128 authtype=hmac-md5)
2008-07-28 05:58:53: DEBUG: total SA len=324
2008-07-28 05:58:53: DEBUG: 
00000001 00000001 0000013c 0103040a 003b4fcf 0300001c 01030000 80010001
8002a8c0 80040001 80050002 80030002 0300001c 02030000 80010001 8002a8c0
80040001 80050001 80030002 03000020 03060000 80010001 8002a8c0 80040001
80060080 80050002 80030002 03000020 04060000 80010001 8002a8c0 80040001
80060080 80050001 80030002 03000020 05070000 80010001 8002a8c0 80040001
800601c0 80050002 80030002 03000020 06070000 80010001 8002a8c0 80040001
800601c0 80050001 80030002 0300001c 07020000 80010001 8002a8c0 80040001
80050002 80030002 0300001c 08020000 80010001 8002a8c0 80040001 80050001
80030002 03000020 090c0000 80010001 8002a8c0 80040001 80060080 80050002
80030002 00000020 0a0c0000 80010001 8002a8c0 80040001 80060080 80050001
80030002
2008-07-28 05:58:53: DEBUG: begin.
2008-07-28 05:58:53: DEBUG: seen nptype=2(prop)
2008-07-28 05:58:53: DEBUG: succeed.
2008-07-28 05:58:53: DEBUG: proposal #1 len=316
2008-07-28 05:58:53: DEBUG: begin.
2008-07-28 05:58:53: DEBUG: seen nptype=3(trns)
2008-07-28 05:58:53: DEBUG: seen nptype=3(trns)
2008-07-28 05:58:53: DEBUG: seen nptype=3(trns)
2008-07-28 05:58:53: DEBUG: seen nptype=3(trns)
2008-07-28 05:58:53: DEBUG: seen nptype=3(trns)
2008-07-28 05:58:53: DEBUG: seen nptype=3(trns)
2008-07-28 05:58:53: DEBUG: seen nptype=3(trns)
2008-07-28 05:58:53: DEBUG: seen nptype=3(trns)
2008-07-28 05:58:53: DEBUG: seen nptype=3(trns)
2008-07-28 05:58:53: DEBUG: seen nptype=3(trns)
2008-07-28 05:58:53: DEBUG: succeed.
2008-07-28 05:58:53: DEBUG: transform #1 len=28
2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds
2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200
2008-07-28 05:58:53: DEBUG: life duration was in TLV.
2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel
2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha
2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2
2008-07-28 05:58:53: DEBUG: hmac(modp1024)
2008-07-28 05:58:53: DEBUG: transform #2 len=28
2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds
2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200
2008-07-28 05:58:53: DEBUG: life duration was in TLV.
2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel
2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5
2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2
2008-07-28 05:58:53: DEBUG: hmac(modp1024)
2008-07-28 05:58:53: DEBUG: transform #3 len=32
2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds
2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200
2008-07-28 05:58:53: DEBUG: life duration was in TLV.
2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel
2008-07-28 05:58:53: DEBUG: type=Key Length, flag=0x8000, lorv=128
2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha
2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2
2008-07-28 05:58:53: DEBUG: hmac(modp1024)
2008-07-28 05:58:53: DEBUG: transform #4 len=32
2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds
2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200
2008-07-28 05:58:53: DEBUG: life duration was in TLV.
2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel
2008-07-28 05:58:53: DEBUG: type=Key Length, flag=0x8000, lorv=128
2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5
2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2
2008-07-28 05:58:53: DEBUG: hmac(modp1024)
2008-07-28 05:58:53: DEBUG: transform #5 len=32
2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds
2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200
2008-07-28 05:58:53: DEBUG: life duration was in TLV.
2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel
2008-07-28 05:58:53: DEBUG: type=Key Length, flag=0x8000, lorv=448
2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha
2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2
2008-07-28 05:58:53: DEBUG: hmac(modp1024)
2008-07-28 05:58:53: DEBUG: transform #6 len=32
2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds
2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200
2008-07-28 05:58:53: DEBUG: life duration was in TLV.
2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel
2008-07-28 05:58:53: DEBUG: type=Key Length, flag=0x8000, lorv=448
2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5
2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2
2008-07-28 05:58:53: DEBUG: hmac(modp1024)
2008-07-28 05:58:53: DEBUG: transform #7 len=28
2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds
2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200
2008-07-28 05:58:53: DEBUG: life duration was in TLV.
2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel
2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha
2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2
2008-07-28 05:58:53: DEBUG: hmac(modp1024)
2008-07-28 05:58:53: DEBUG: transform #8 len=28
2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds
2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200
2008-07-28 05:58:53: DEBUG: life duration was in TLV.
2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel
2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5
2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2
2008-07-28 05:58:53: DEBUG: hmac(modp1024)
2008-07-28 05:58:53: DEBUG: transform #9 len=32
2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds
2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200
2008-07-28 05:58:53: DEBUG: life duration was in TLV.
2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel
2008-07-28 05:58:53: DEBUG: type=Key Length, flag=0x8000, lorv=128
2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha
2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2
2008-07-28 05:58:53: DEBUG: hmac(modp1024)
2008-07-28 05:58:53: DEBUG: transform #10 len=32
2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds
2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200
2008-07-28 05:58:53: DEBUG: life duration was in TLV.
2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel
2008-07-28 05:58:53: DEBUG: type=Key Length, flag=0x8000, lorv=128
2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5
2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2
2008-07-28 05:58:53: DEBUG: hmac(modp1024)
2008-07-28 05:58:53: DEBUG: pair 1:
2008-07-28 05:58:53: DEBUG:  0x284393a0: next=0x0 tnext=0x284393b0
2008-07-28 05:58:53: DEBUG:   0x284393b0: next=0x0 tnext=0x284393c0
2008-07-28 05:58:53: DEBUG:    0x284393c0: next=0x0 tnext=0x284393d0
2008-07-28 05:58:53: DEBUG:     0x284393d0: next=0x0 tnext=0x284393e0
2008-07-28 05:58:53: DEBUG:      0x284393e0: next=0x0 tnext=0x284393f0
2008-07-28 05:58:53: DEBUG:       0x284393f0: next=0x0 tnext=0x28439400
2008-07-28 05:58:53: DEBUG:        0x28439400: next=0x0 tnext=0x28439410
2008-07-28 05:58:53: DEBUG:         0x28439410: next=0x0 tnext=0x28439420
2008-07-28 05:58:53: DEBUG:          0x28439420: next=0x0 tnext=0x28439430
2008-07-28 05:58:53: DEBUG:           0x28439430: next=0x0 tnext=0x0
2008-07-28 05:58:53: DEBUG: proposal #1: 10 transform
2008-07-28 05:58:53: DEBUG: begin compare proposals.
2008-07-28 05:58:53: DEBUG: pair[1]: 0x284393a0
2008-07-28 05:58:53: DEBUG:  0x284393a0: next=0x0 tnext=0x284393b0
2008-07-28 05:58:53: DEBUG:   0x284393b0: next=0x0 tnext=0x284393c0
2008-07-28 05:58:53: DEBUG:    0x284393c0: next=0x0 tnext=0x284393d0
2008-07-28 05:58:53: DEBUG:     0x284393d0: next=0x0 tnext=0x284393e0
2008-07-28 05:58:53: DEBUG:      0x284393e0: next=0x0 tnext=0x284393f0
2008-07-28 05:58:53: DEBUG:       0x284393f0: next=0x0 tnext=0x28439400
2008-07-28 05:58:53: DEBUG:        0x28439400: next=0x0 tnext=0x28439410
2008-07-28 05:58:53: DEBUG:         0x28439410: next=0x0 tnext=0x28439420
2008-07-28 05:58:53: DEBUG:          0x28439420: next=0x0 tnext=0x28439430
2008-07-28 05:58:53: DEBUG:           0x28439430: next=0x0 tnext=0x0
2008-07-28 05:58:53: DEBUG: prop#=1 prot-id=ESP spi-size=4 #trns=10 trns#=1 trns-id=3DES
2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds
2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200
2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel
2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha
2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2
2008-07-28 05:58:53: DEBUG: prop#=1 prot-id=ESP spi-size=4 #trns=10 trns#=2 trns-id=3DES
2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds
2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200
2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel
2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5
2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2
2008-07-28 05:58:53: DEBUG: prop#=1 prot-id=ESP spi-size=4 #trns=10 trns#=3 trns-id=CAST
2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds
2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200
2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel
2008-07-28 05:58:53: DEBUG: type=Key Length, flag=0x8000, lorv=128
2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha
2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2
2008-07-28 05:58:53: DEBUG: prop#=1 prot-id=ESP spi-size=4 #trns=10 trns#=4 trns-id=CAST
2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds
2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200
2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel
2008-07-28 05:58:53: DEBUG: type=Key Length, flag=0x8000, lorv=128
2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5
2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2
2008-07-28 05:58:53: DEBUG: prop#=1 prot-id=ESP spi-size=4 #trns=10 trns#=5 trns-id=BLOWFISH
2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds
2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200
2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel
2008-07-28 05:58:53: DEBUG: type=Key Length, flag=0x8000, lorv=448
2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha
2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2
2008-07-28 05:58:53: DEBUG: prop#=1 prot-id=ESP spi-size=4 #trns=10 trns#=6 trns-id=BLOWFISH
2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds
2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200
2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel
2008-07-28 05:58:53: DEBUG: type=Key Length, flag=0x8000, lorv=448
2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5
2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2
2008-07-28 05:58:53: DEBUG: prop#=1 prot-id=ESP spi-size=4 #trns=10 trns#=7 trns-id=DES
2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds
2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200
2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel
2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha
2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2
2008-07-28 05:58:53: DEBUG: prop#=1 prot-id=ESP spi-size=4 #trns=10 trns#=8 trns-id=DES
2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds
2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200
2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel
2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5
2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2
2008-07-28 05:58:53: DEBUG: prop#=1 prot-id=ESP spi-size=4 #trns=10 trns#=9 trns-id=AES
2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds
2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200
2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel
2008-07-28 05:58:53: DEBUG: type=Key Length, flag=0x8000, lorv=128
2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha
2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2
2008-07-28 05:58:53: DEBUG: prop#=1 prot-id=ESP spi-size=4 #trns=10 trns#=10 trns-id=AES
2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds
2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200
2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel
2008-07-28 05:58:53: DEBUG: type=Key Length, flag=0x8000, lorv=128
2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5
2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2
2008-07-28 05:58:53: DEBUG: peer's single bundle:
2008-07-28 05:58:53: DEBUG:  (proto_id=ESP spisize=4 spi=003b4fcf spi_p=00000000 encmode=Tunnel reqid=0:0)
2008-07-28 05:58:53: DEBUG:   (trns_id=3DES encklen=0 authtype=hmac-sha)
2008-07-28 05:58:53: DEBUG:   (trns_id=3DES encklen=0 authtype=hmac-md5)
2008-07-28 05:58:53: DEBUG:   (trns_id=CAST encklen=128 authtype=hmac-sha)
2008-07-28 05:58:53: DEBUG:   (trns_id=CAST encklen=128 authtype=hmac-md5)
2008-07-28 05:58:53: DEBUG:   (trns_id=BLOWFISH encklen=448 authtype=hmac-sha)
2008-07-28 05:58:53: DEBUG:   (trns_id=BLOWFISH encklen=448 authtype=hmac-md5)
2008-07-28 05:58:53: DEBUG:   (trns_id=DES encklen=0 authtype=hmac-sha)
2008-07-28 05:58:53: DEBUG:   (trns_id=DES encklen=0 authtype=hmac-md5)
2008-07-28 05:58:53: DEBUG:   (trns_id=AES encklen=128 authtype=hmac-sha)
2008-07-28 05:58:53: DEBUG:   (trns_id=AES encklen=128 authtype=hmac-md5)
2008-07-28 05:58:53: DEBUG: my single bundle:
2008-07-28 05:58:53: DEBUG:  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=0:0)
2008-07-28 05:58:53: DEBUG:   (trns_id=3DES encklen=0 authtype=hmac-sha)
2008-07-28 05:58:53: DEBUG:   (trns_id=3DES encklen=0 authtype=hmac-md5)
2008-07-28 05:58:53: DEBUG:   (trns_id=CAST encklen=128 authtype=hmac-sha)
2008-07-28 05:58:53: DEBUG:   (trns_id=CAST encklen=128 authtype=hmac-md5)
2008-07-28 05:58:53: DEBUG:   (trns_id=BLOWFISH encklen=448 authtype=hmac-sha)
2008-07-28 05:58:53: DEBUG:   (trns_id=BLOWFISH encklen=448 authtype=hmac-md5)
2008-07-28 05:58:53: DEBUG:   (trns_id=DES encklen=0 authtype=hmac-sha)
2008-07-28 05:58:53: DEBUG:   (trns_id=DES encklen=0 authtype=hmac-md5)
2008-07-28 05:58:53: DEBUG:   (trns_id=AES encklen=128 authtype=hmac-sha)
2008-07-28 05:58:53: DEBUG:   (trns_id=AES encklen=128 authtype=hmac-md5)
2008-07-28 05:58:53: DEBUG: matched
2008-07-28 05:58:53: DEBUG: ===
2008-07-28 05:58:53: DEBUG: call pfkey_send_getspi
2008-07-28 05:58:53: DEBUG: pfkey GETSPI sent: ESP/Tunnel w.x.y.z[0]->69.146.32.251[0] 
2008-07-28 05:58:53: DEBUG: pfkey getspi sent.
2008-07-28 05:58:53: DEBUG: pk_recv: retry[0] recv() 
2008-07-28 05:58:53: DEBUG: get pfkey GETSPI message
2008-07-28 05:58:53: DEBUG2: 
02010003 0a000000 c3913ee6 332e0000 02000100 023222c0 40067315 c0a80001
03000500 ff200000 10020000 ce51cc7a 00000000 00000000 03000600 ff200000
10020000 459220fb 00000000 00000000
2008-07-28 05:58:53: DEBUG: pfkey GETSPI succeeded: ESP/Tunnel w.x.y.z[0]->69.146.32.251[0] spi=36840128(0x23222c0)
2008-07-28 05:58:53: DEBUG: total SA len=48
2008-07-28 05:58:53: DEBUG: 
00000001 00000001 00000028 01030401 00000000 0000001c 01030000 80010001
8002a8c0 80040001 80050002 80030002
2008-07-28 05:58:53: DEBUG: begin.
2008-07-28 05:58:53: DEBUG: seen nptype=2(prop)
2008-07-28 05:58:53: DEBUG: succeed.
2008-07-28 05:58:53: DEBUG: proposal #1 len=40
2008-07-28 05:58:53: DEBUG: begin.
2008-07-28 05:58:53: DEBUG: seen nptype=3(trns)
2008-07-28 05:58:53: DEBUG: succeed.
2008-07-28 05:58:53: DEBUG: transform #1 len=28
2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds
2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200
2008-07-28 05:58:53: DEBUG: life duration was in TLV.
2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel
2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha
2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2
2008-07-28 05:58:53: DEBUG: hmac(modp1024)
2008-07-28 05:58:53: DEBUG: pair 1:
2008-07-28 05:58:53: DEBUG:  0x284393a0: next=0x0 tnext=0x0
2008-07-28 05:58:53: DEBUG: proposal #1: 1 transform
2008-07-28 05:58:53: DEBUG: hmac(modp1024)
2008-07-28 05:58:54: DEBUG: compute DH's private.
2008-07-28 05:58:54: DEBUG: 
4676c5a1 12a93911 096c04fa ec462c85 5fc07b77 98405ea6 d8dee1c1 fb110b7d
d96122c6 6d96aa69 2eb96fda 2f22c65d 01a233d0 84695c8f ebcd43cc ebda8265
fb5f02eb 0d94b4cf e24b753c 2a56c27a cb38fdcf 0da08d32 01eeca90 493526a4
5cc85f56 f03595f1 b6b51e0b 860348ac 1e384cc6 c33e458a fa3479b2 38efc600
2008-07-28 05:58:54: DEBUG: compute DH's public.
2008-07-28 05:58:54: DEBUG: 
b00d6211 ccef6e59 c6e4c673 fca33d40 9a9df177 6f33bc17 e8168ce1 56f8733c
1c5fe2ce 98262923 677d8daa 2b6f33f0 bd5c1b88 ea3a19a6 c629dbd2 a774bbe9
e3a21a47 d313eede 49d0a10d 15ce8d7a d4348347 832ed778 53d0b3ed 7dab2ec9
d06864f4 ffa76ea7 700733b4 fa369b94 805440c2 b33aea30 c728a2e9 318f69c2
2008-07-28 05:58:54: DEBUG: add payload of len 48, next type 10
2008-07-28 05:58:54: DEBUG: add payload of len 16, next type 4
2008-07-28 05:58:54: DEBUG: add payload of len 128, next type 5
2008-07-28 05:58:54: DEBUG: add payload of len 8, next type 5
2008-07-28 05:58:54: DEBUG: add payload of len 8, next type 0
2008-07-28 05:58:54: DEBUG: HASH with:
2008-07-28 05:58:54: DEBUG: 
c383cb43 a4898266 1b522452 f9401bbf db67f809 0a000034 00000001 00000001
00000028 01030401 023222c0 0000001c 01030000 80010001 8002a8c0 80040001
80050002 80030002 04000014 b79a9537 6a31fce4 88abce34 cfc9b7d2 05000084
b00d6211 ccef6e59 c6e4c673 fca33d40 9a9df177 6f33bc17 e8168ce1 56f8733c
1c5fe2ce 98262923 677d8daa 2b6f33f0 bd5c1b88 ea3a19a6 c629dbd2 a774bbe9
e3a21a47 d313eede 49d0a10d 15ce8d7a d4348347 832ed778 53d0b3ed 7dab2ec9
d06864f4 ffa76ea7 700733b4 fa369b94 805440c2 b33aea30 c728a2e9 318f69c2
0500000c 01040000 ce51cc7a 0000000c 01040000 459220fb
2008-07-28 05:58:54: DEBUG: hmac(hmac_sha1)
2008-07-28 05:58:54: DEBUG: HASH computed:
2008-07-28 05:58:54: DEBUG: 
2bebb3b6 0d0581b9 b059c787 db5d1d24 ea0cf3cb
2008-07-28 05:58:54: DEBUG: add payload of len 20, next type 1
2008-07-28 05:58:54: DEBUG: begin encryption.
2008-07-28 05:58:54: DEBUG: encryption(3des)
2008-07-28 05:58:54: DEBUG: pad length = 4
2008-07-28 05:58:54: DEBUG: 
01000018 2bebb3b6 0d0581b9 b059c787 db5d1d24 ea0cf3cb 0a000034 00000001
00000001 00000028 01030401 023222c0 0000001c 01030000 80010001 8002a8c0
80040001 80050002 80030002 04000014 b79a9537 6a31fce4 88abce34 cfc9b7d2
05000084 b00d6211 ccef6e59 c6e4c673 fca33d40 9a9df177 6f33bc17 e8168ce1
56f8733c 1c5fe2ce 98262923 677d8daa 2b6f33f0 bd5c1b88 ea3a19a6 c629dbd2
a774bbe9 e3a21a47 d313eede 49d0a10d 15ce8d7a d4348347 832ed778 53d0b3ed
7dab2ec9 d06864f4 ffa76ea7 700733b4 fa369b94 805440c2 b33aea30 c728a2e9
318f69c2 0500000c 01040000 ce51cc7a 0000000c 01040000 459220fb 87f8af03
2008-07-28 05:58:54: DEBUG: encryption(3des)
2008-07-28 05:58:54: DEBUG: with key:
2008-07-28 05:58:54: DEBUG: 
6d64b34e b5017daa 32825cfd 29128ca0 c47e1cb3 22321fe2
2008-07-28 05:58:54: DEBUG: encrypted payload by IV:
2008-07-28 05:58:54: DEBUG: 
12e14984 71aa67fb
2008-07-28 05:58:54: DEBUG: save IV for next:
2008-07-28 05:58:54: DEBUG: 
277dad90 b84f707a
2008-07-28 05:58:54: DEBUG: encrypted.
2008-07-28 05:58:54: DEBUG: 284 bytes from 69.146.32.251[500] to w.x.y.z[500]
2008-07-28 05:58:54: DEBUG: sockname 69.146.32.251[500]
2008-07-28 05:58:54: DEBUG: send packet from 69.146.32.251[500]
2008-07-28 05:58:54: DEBUG: send packet to w.x.y.z[500]
2008-07-28 05:58:54: DEBUG: 1 times of 284 bytes message will be sent to w.x.y.z[500]
2008-07-28 05:58:54: DEBUG: 
48a656d5 6e438a6c 835e2082 f4c50164 08102001 c383cb43 0000011c e5bfa25a
2fb8fd22 303a89da 59925f11 ec4ce857 76171050 d60f39dd cfa7a5ea 73e92dba
555c04d3 e1381802 45e915e3 c017b224 2cb913af 4bf8ad04 d958a3a6 8ab6aad4
2c77c030 c30faafc d58d1c05 f9a5502d 49843125 896ab293 5538a697 4a3103c3
14c3e795 4377ee3f ab750c11 178b33be 6c288bbc e2a16b48 bc2e7981 3465e8fb
5faee773 577b28f1 933b2e79 c5814e25 0e0e61ae a57e6aae 3ad47ca3 77ce247a
619b469c a19e15f1 3a7d2ab3 49bd1590 c26ee888 5199b270 f02fdbe4 1b041d71
3f863c17 e99cea33 73fd01ef d1bbb572 29cc73db 34fea434 fa16ee12 7efd29ac
36c9b6e8 c03bde3a 47527452 3e7b55b6 22566570 277dad90 b84f707a
2008-07-28 05:58:54: DEBUG: resend phase2 packet 48a656d56e438a6c:835e2082f4c50164:0000c383
2008-07-28 05:58:54: DEBUG: ===
2008-07-28 05:58:54: DEBUG: 60 bytes message received from w.x.y.z[500] to 69.146.32.251[500]
2008-07-28 05:58:54: DEBUG: 
48a656d5 6e438a6c 835e2082 f4c50164 08102001 c383cb43 0000003c 82baf406
4740bf27 add3f3dd cbfb902c e482b2f1 67d86d6d 57bd1701 87a52bca
2008-07-28 05:58:54: DEBUG: begin decryption.
2008-07-28 05:58:54: DEBUG: encryption(3des)
2008-07-28 05:58:54: DEBUG: IV was saved for next processing:
2008-07-28 05:58:54: DEBUG: 
57bd1701 87a52bca
2008-07-28 05:58:54: DEBUG: encryption(3des)
2008-07-28 05:58:54: DEBUG: with key:
2008-07-28 05:58:54: DEBUG: 
6d64b34e b5017daa 32825cfd 29128ca0 c47e1cb3 22321fe2
2008-07-28 05:58:54: DEBUG: decrypted payload by IV:
2008-07-28 05:58:54: DEBUG: 
277dad90 b84f707a
2008-07-28 05:58:54: DEBUG: decrypted payload, but not trimed.
2008-07-28 05:58:54: DEBUG: 
00000018 858586cc 041b5a81 4bfdef57 d6e918a0 03f5e94b 81b881f4 aca3aa07
2008-07-28 05:58:54: DEBUG: padding len=8
2008-07-28 05:58:54: DEBUG: skip to trim padding.
2008-07-28 05:58:54: DEBUG: decrypted.
2008-07-28 05:58:54: DEBUG: 
48a656d5 6e438a6c 835e2082 f4c50164 08102001 c383cb43 0000003c 00000018
858586cc 041b5a81 4bfdef57 d6e918a0 03f5e94b 81b881f4 aca3aa07
2008-07-28 05:58:54: DEBUG: begin.
2008-07-28 05:58:54: DEBUG: seen nptype=8(hash)
2008-07-28 05:58:54: DEBUG: succeed.
2008-07-28 05:58:54: DEBUG: HASH(3) validate:2008-07-28 05:58:54: DEBUG: 
858586cc 041b5a81 4bfdef57 d6e918a0 03f5e94b
2008-07-28 05:58:54: DEBUG: HASH with: 
2008-07-28 05:58:54: DEBUG: 
00c383cb 43a48982 661b5224 52f9401b bfdb67f8 09b79a95 376a31fc e488abce
34cfc9b7 d2
2008-07-28 05:58:54: DEBUG: hmac(hmac_sha1)
2008-07-28 05:58:54: DEBUG: HASH computed:
2008-07-28 05:58:54: DEBUG: 
858586cc 041b5a81 4bfdef57 d6e918a0 03f5e94b
2008-07-28 05:58:54: DEBUG: ===
2008-07-28 05:58:54: DEBUG: compute DH's shared.
2008-07-28 05:58:54: DEBUG: 
4d72478f e939d367 b558837a f8d10b41 e1aa4af4 285e2ade d1b1f081 3d9fbadd
0934df43 e837ad68 e481eefb b4a00188 676bc4da a7b57312 d2f867a3 a41fbe03
8fd73a5b 11a502a7 7160937f a394fe21 22991e5d 31de0734 512bca88 65562f93
1cd5e9ca 47ae0a35 29483d54 a808a6d3 581494a7 46474e34 26025af3 58a0a6db
2008-07-28 05:58:54: DEBUG: KEYMAT compute with
2008-07-28 05:58:54: DEBUG: 
4d72478f e939d367 b558837a f8d10b41 e1aa4af4 285e2ade d1b1f081 3d9fbadd
0934df43 e837ad68 e481eefb b4a00188 676bc4da a7b57312 d2f867a3 a41fbe03
8fd73a5b 11a502a7 7160937f a394fe21 22991e5d 31de0734 512bca88 65562f93
1cd5e9ca 47ae0a35 29483d54 a808a6d3 581494a7 46474e34 26025af3 58a0a6db
03023222 c0a48982 661b5224 52f9401b bfdb67f8 09b79a95 376a31fc e488abce
34cfc9b7 d2
2008-07-28 05:58:54: DEBUG: hmac(hmac_sha1)
2008-07-28 05:58:54: DEBUG: encryption(3des)
2008-07-28 05:58:54: DEBUG: hmac(sha1)
2008-07-28 05:58:54: DEBUG: encklen=192 authklen=160
2008-07-28 05:58:54: DEBUG: generating 640 bits of key (dupkeymat=4)
2008-07-28 05:58:54: DEBUG: generating K1...K4 for KEYMAT.
2008-07-28 05:58:54: DEBUG: hmac(hmac_sha1)
2008-07-28 05:58:54: DEBUG: hmac(hmac_sha1)
2008-07-28 05:58:54: DEBUG: hmac(hmac_sha1)
2008-07-28 05:58:54: DEBUG: 
95afdcdf 8ec36c90 c91388b5 5937999e d6a2db7c 27e5a321 359d9f19 737936c1
30e211e5 abc887b3 aed79067 0cc54e82 b895c524 0c9787b2 684b9d03 75609ab4
b36d9454 fda5d5d2 d967822a 0e00aaa2
2008-07-28 05:58:54: DEBUG: KEYMAT compute with
2008-07-28 05:58:54: DEBUG: 
4d72478f e939d367 b558837a f8d10b41 e1aa4af4 285e2ade d1b1f081 3d9fbadd
0934df43 e837ad68 e481eefb b4a00188 676bc4da a7b57312 d2f867a3 a41fbe03
8fd73a5b 11a502a7 7160937f a394fe21 22991e5d 31de0734 512bca88 65562f93
1cd5e9ca 47ae0a35 29483d54 a808a6d3 581494a7 46474e34 26025af3 58a0a6db
03003b4f cfa48982 661b5224 52f9401b bfdb67f8 09b79a95 376a31fc e488abce
34cfc9b7 d2
2008-07-28 05:58:54: DEBUG: hmac(hmac_sha1)
2008-07-28 05:58:54: DEBUG: encryption(3des)
2008-07-28 05:58:54: DEBUG: hmac(sha1)
2008-07-28 05:58:54: DEBUG: encklen=192 authklen=160
2008-07-28 05:58:54: DEBUG: generating 640 bits of key (dupkeymat=4)
2008-07-28 05:58:54: DEBUG: generating K1...K4 for KEYMAT.
2008-07-28 05:58:54: DEBUG: hmac(hmac_sha1)
2008-07-28 05:58:54: DEBUG: hmac(hmac_sha1)
2008-07-28 05:58:54: DEBUG: hmac(hmac_sha1)
2008-07-28 05:58:54: DEBUG: 
a732002b 4d9e7dca eacf14b1 9175529f 0157d675 dd9eaa2b ecdb2d07 ecb1e803
d532d76c be11429f 33c5a5ed 49c41ccd 45cecd09 7692c101 d544c30e 92caff2c
9a6f1c94 de09b805 9a7b074a 6158f719
2008-07-28 05:58:54: DEBUG: KEYMAT computed.
2008-07-28 05:58:54: DEBUG: call pk_sendupdate
2008-07-28 05:58:54: DEBUG: encryption(3des)
2008-07-28 05:58:54: DEBUG: hmac(sha1)
2008-07-28 05:58:54: DEBUG: call pfkey_send_update2
2008-07-28 05:58:54: DEBUG: pfkey update sent.
2008-07-28 05:58:54: DEBUG: encryption(3des)
2008-07-28 05:58:54: DEBUG: hmac(sha1)
2008-07-28 05:58:54: DEBUG: call pfkey_send_add2
2008-07-28 05:58:54: DEBUG: pfkey add sent.
2008-07-28 05:58:54: DEBUG: pk_recv: retry[0] recv() 
2008-07-28 05:58:54: DEBUG: get pfkey UPDATE message
2008-07-28 05:58:54: DEBUG2: 
02020003 14000000 c3913ee6 332e0000 02000100 023222c0 04000303 00000000
02001300 02000000 00000000 00000000 03000500 ff200000 10020000 ce51cc7a
00000000 00000000 03000600 ff200000 10020000 459220fb 00000000 00000000
04000300 00000000 00000000 00000000 c0a80000 00000000 00000000 00000000
04000400 00000000 00000000 00000000 00870000 00000000 00000000 00000000
2008-07-28 05:58:54: DEBUG: pfkey UPDATE succeeded: ESP/Tunnel w.x.y.z[0]->69.146.32.251[0] spi=36840128(0x23222c0)
2008-07-28 05:58:54: INFO: IPsec-SA established: ESP/Tunnel w.x.y.z[0]->69.146.32.251[0] spi=36840128(0x23222c0)
2008-07-28 05:58:54: DEBUG: ===
2008-07-28 05:58:54: DEBUG: pk_recv: retry[0] recv() 
2008-07-28 05:58:54: DEBUG: get pfkey ADD message
2008-07-28 05:58:54: DEBUG2: 
02030003 14000000 c3913ee6 332e0000 02000100 003b4fcf 04000303 00000000
02001300 02000000 00000000 00000000 03000500 ff200000 10020000 459220fb
00000000 00000000 03000600 ff200000 10020000 ce51cc7a 00000000 00000000
04000300 00000000 00000000 00000000 c0a80000 00000000 00000000 00000000
04000400 00000000 00000000 00000000 00870000 00000000 00000000 00000000
2008-07-28 05:58:54: INFO: IPsec-SA established: ESP/Tunnel 69.146.32.251[0]->w.x.y.z[0] spi=3887055(0x3b4fcf)
2008-07-28 05:58:54: DEBUG: ===
2008-07-28 06:02:20: INFO: caught signal 2
2008-07-28 06:02:20: DEBUG: pk_recv: retry[0] recv() 
2008-07-28 06:02:20: DEBUG: get pfkey FLUSH message
2008-07-28 06:02:20: DEBUG2: 
02090000 02000000 00000000 332e0000
2008-07-28 06:02:20: DEBUG2: flushing all ph2 handlers...
2008-07-28 06:02:20: DEBUG2: got a ph2 handler to flush...
2008-07-28 06:02:20: DEBUG2: getph1byaddr: start
2008-07-28 06:02:20: DEBUG2: local: 69.146.32.251[0]
2008-07-28 06:02:20: DEBUG2: remote: w.x.y.z[0]
2008-07-28 06:02:20: DEBUG2: p->local: 69.146.32.251[500]
2008-07-28 06:02:20: DEBUG2: p->remote: w.x.y.z[500]
2008-07-28 06:02:20: DEBUG2: matched
2008-07-28 06:02:20: DEBUG: compute IV for phase2
2008-07-28 06:02:20: DEBUG: phase1 last IV:
2008-07-28 06:02:20: DEBUG: 
76737915 8b38ae42 89d11331
2008-07-28 06:02:20: DEBUG: hash(sha1)
2008-07-28 06:02:20: DEBUG: encryption(3des)
2008-07-28 06:02:20: DEBUG: phase2 IV computed:
2008-07-28 06:02:20: DEBUG: 
90ee1522 a354b8d1
2008-07-28 06:02:20: DEBUG: HASH with:
2008-07-28 06:02:20: DEBUG: 
89d11331 00000010 00000001 03040001 023222c0
2008-07-28 06:02:20: DEBUG: hmac(hmac_sha1)
2008-07-28 06:02:20: DEBUG: HASH computed:
2008-07-28 06:02:20: DEBUG: 
fd5a241e 337d9c1f 458952f3 53a8b4be ca4160c0
2008-07-28 06:02:20: DEBUG: begin encryption.
2008-07-28 06:02:20: DEBUG: encryption(3des)
2008-07-28 06:02:20: DEBUG: pad length = 8
2008-07-28 06:02:20: DEBUG: 
0c000018 fd5a241e 337d9c1f 458952f3 53a8b4be ca4160c0 00000010 00000001
03040001 023222c0 ddcbc0c5 a5aed007
2008-07-28 06:02:20: DEBUG: encryption(3des)
2008-07-28 06:02:20: DEBUG: with key:
2008-07-28 06:02:20: DEBUG: 
6d64b34e b5017daa 32825cfd 29128ca0 c47e1cb3 22321fe2
2008-07-28 06:02:20: DEBUG: encrypted payload by IV:
2008-07-28 06:02:20: DEBUG: 
90ee1522 a354b8d1
2008-07-28 06:02:20: DEBUG: save IV for next:
2008-07-28 06:02:20: DEBUG: 
f597d839 4f2382f9
2008-07-28 06:02:20: DEBUG: encrypted.
2008-07-28 06:02:20: DEBUG: 76 bytes from 69.146.32.251[500] to w.x.y.z[500]
2008-07-28 06:02:20: DEBUG: sockname 69.146.32.251[500]
2008-07-28 06:02:20: DEBUG: send packet from 69.146.32.251[500]
2008-07-28 06:02:20: DEBUG: send packet to w.x.y.z[500]
2008-07-28 06:02:20: DEBUG: 1 times of 76 bytes message will be sent to w.x.y.z[500]
2008-07-28 06:02:20: DEBUG: 
48a656d5 6e438a6c 835e2082 f4c50164 08100501 89d11331 0000004c 93510f21
583e31a4 c132490d bff9ac9c c118ba5c 91127bfc 6a95eb5e d84f70e9 d8c815cd
4b948da3 f597d839 4f2382f9
2008-07-28 06:02:20: DEBUG: sendto Information delete.
2008-07-28 06:02:20: DEBUG: IV freed
2008-07-28 06:02:20: DEBUG: an undead schedule has been deleted.
2008-07-28 06:02:20: DEBUG: IV freed
2008-07-28 06:02:21: DEBUG: call pfkey_send_dump
2008-07-28 06:02:21: DEBUG: pk_recv: retry[0] recv() 
2008-07-28 06:02:21: DEBUG: compute IV for phase2
2008-07-28 06:02:21: DEBUG: phase1 last IV:
2008-07-28 06:02:21: DEBUG: 
76737915 8b38ae42 bffafaa1
2008-07-28 06:02:21: DEBUG: hash(sha1)
2008-07-28 06:02:21: DEBUG: encryption(3des)
2008-07-28 06:02:21: DEBUG: phase2 IV computed:
2008-07-28 06:02:21: DEBUG: 
ddcd366e 7ee272fc
2008-07-28 06:02:21: DEBUG: HASH with:
2008-07-28 06:02:21: DEBUG: 
bffafaa1 0000001c 00000001 01100001 48a656d5 6e438a6c 835e2082 f4c50164
2008-07-28 06:02:21: DEBUG: hmac(hmac_sha1)
2008-07-28 06:02:21: DEBUG: HASH computed:
2008-07-28 06:02:21: DEBUG: 
bcc8943f f5f065e0 2d407673 a927c731 d95da7a0
2008-07-28 06:02:21: DEBUG: begin encryption.
2008-07-28 06:02:21: DEBUG: encryption(3des)
2008-07-28 06:02:21: DEBUG: pad length = 4
2008-07-28 06:02:21: DEBUG: 
0c000018 bcc8943f f5f065e0 2d407673 a927c731 d95da7a0 0000001c 00000001
01100001 48a656d5 6e438a6c 835e2082 f4c50164 cde59303
2008-07-28 06:02:21: DEBUG: encryption(3des)
2008-07-28 06:02:21: DEBUG: with key:
2008-07-28 06:02:21: DEBUG: 
6d64b34e b5017daa 32825cfd 29128ca0 c47e1cb3 22321fe2
2008-07-28 06:02:21: DEBUG: encrypted payload by IV:
2008-07-28 06:02:21: DEBUG: 
ddcd366e 7ee272fc
2008-07-28 06:02:21: DEBUG: save IV for next:
2008-07-28 06:02:21: DEBUG: 
16a7ea82 126ed5d8
2008-07-28 06:02:21: DEBUG: encrypted.
2008-07-28 06:02:21: DEBUG: 84 bytes from 69.146.32.251[500] to w.x.y.z[500]
2008-07-28 06:02:21: DEBUG: sockname 69.146.32.251[500]
2008-07-28 06:02:21: DEBUG: send packet from 69.146.32.251[500]
2008-07-28 06:02:21: DEBUG: send packet to w.x.y.z[500]
2008-07-28 06:02:21: DEBUG: 1 times of 84 bytes message will be sent to w.x.y.z[500]
2008-07-28 06:02:21: DEBUG: 
48a656d5 6e438a6c 835e2082 f4c50164 08100501 bffafaa1 00000054 54474457
93d42ae6 d17f783c bae3331e 69589ea0 170bba8e 65f391c6 dc4c146e 33b46f96
e6afa965 72c54ee8 7ca56698 16a7ea82 126ed5d8
2008-07-28 06:02:21: DEBUG: sendto Information delete.
2008-07-28 06:02:21: DEBUG: IV freed
2008-07-28 06:02:21: DEBUG: an undead schedule has been deleted.
2008-07-28 06:02:21: DEBUG: IV freed
2008-07-28 06:02:21: INFO: racoon shutdown



More information about the freebsd-questions mailing list