Набросок статьи для L2TP/IPSEC клиента под FreeDSB 10

Проблемы установки, настройки и работы Правильной Операционной Системы

Модератор: terminus

Правила форума
Убедительная просьба юзать теги [cоde] при оформлении листингов.
Сообщения не оформленные должным образом имеют все шансы быть незамеченными.
Аватара пользователя
Sindikat88
мл. сержант
Сообщения: 138
Зарегистрирован: 2010-09-02 15:07:54
Контактная информация:

Набросок статьи для L2TP/IPSEC клиента под FreeDSB 10

Непрочитанное сообщение Sindikat88 » 2017-07-24 12:22:57

Приветствую всех, кто столкнулся с проблемой настройки L2TP/IPSEC соединения в FreeBSD.
После долгих изысканий и поисков по западным форумам и азиатским форумам (да да, если нужда припрет, то и азиатские форумы будешь копать), мне наконец таки удалось решить свою проблему.
А теперь вкратце о самой проблеме.
Мои коллеги из дружественной девелоперской компании решили установить у себя шлюз в виде железки Mikrotik с L2TP/IPSEC preshared key VPN сервером на борту.
А т.к. часть этих коллег хотела работать на нашей территории, то нужно было им выделять отдельную изолированную подсеть с возможностью ходить в "домашнюю" сеть компании.
Итак, приступим:
Имеется система с уже настроенным клиентом OpenVPN (это для моей сети) и рабочим IPFW.
Необходимо поднять L2TP/IPSEC клиента.
uname

Код: Выделить всё

FreeBSD 10.3-RELEASE-p11

Обновляем систему

Код: Выделить всё

# freebsd-update fetch
# freebsd-update install
И перезагружаемся Собираем свое собственное ядро с блекджеком и ...
Если каталог /usr/src/ отсутствует в вашей системе (или этот каталог пуст), то это значит, что исходные тексты не были установлены.
Для этого устанавливаем Subversion, что бы синхронизировать исходный код.

Код: Выделить всё

# cd /usr/ports/devel/subversion
# make install clean
Теперь приступаем к скачиванию актуальной версии
# вместо head укажите интересующую вас ветку или тэг
cd /usr/src && svn co http://svn.freebsd.org/base/head/ ./

Код: Выделить всё

cd /usr/src && svn co http://svn.freebsd.org/base/10.3/ ./
Переходим в папку с дефолтным ядром и делаем его копию, но с нужным именем

Код: Выделить всё

# cd /usr/src/sys/conf/amd64
# cp GENERIC GATE
и добавляем в файл GATE следующие параметры (IPFW добавляется по желанию)

Код: Выделить всё

#NAT and IPFW
options IPFIREWALL
options IPDIVERT
options IPFIREWALL_VERBOSE
options IPFIREWALL_VERBOSE_LIMIT=50
options IPFIREWALL_NAT
options LIBALIAS
options ROUTETABLES=5
options DUMMYNET
options HZ="1000"                       # for DUMMYNET
 
# Options for a IPsec enabled kernel
options         IPSEC        #IP security
options         IPSEC_ESP    #IP security (crypto; define w/ IPSEC)
options         IPSEC_FILTERTUNNEL
options         IPSEC_NAT_T
options         IPSEC_FILTERGIF  #filter ipsec packets from a tunnel
device          crypto
device          enc
device          gif
Далее переходим в папку /usr/src

Код: Выделить всё

# cd /usr/src
и собираем ядро

Код: Выделить всё

# make buildkernel KERNCONF=GATE
после того, как ядро будет собрано, устанавливаем его

Код: Выделить всё

# make installkernel KERNCONF=GATE
После этого перезагружаем машину:

Код: Выделить всё

# reboot
И смотрим, что получилось:

Код: Выделить всё

 # uname -a
FreeBSD mout 10.3-RELEASE-p19 FreeBSD 10.3-RELEASE-p19 #1 r318353M: Tue Jun 13 16:26:25 MSK 2017     biliy.sergey@mout:/usr/obj/usr/src/sys/GATE  amd64
Отлично. Теперь мы работаем со своим ядром.
Теперь устанавливаем ipsec-tools для создания шифрованного соединения с сервером VPN

Код: Выделить всё

#cd /usr/ports/security/ipsec-tools
#make install clean
Копируем конфиги из примеров, по умолчанию директория /usr/local/etc/racoon/ пуста

Код: Выделить всё

#cp /usr/local/share/examples/ipsec-tools/psk.txt /usr/local/etc/racoon/
#cp /usr/local/share/examples/ipsec-tools/racoon.conf /usr/local/etc/racoon/
И редактируем:

Код: Выделить всё

# $KAME: racoon.conf.in,v 1.18 2001/08/16 06:33:40 itojun Exp $
 
# "path" affects "include" directives.  "path" must be specified before any
# "include" directive with relative file path.
# you can overwrite "path" directive afterwards, however, doing so may add
# more confusion.
path include "@sysconfdir_x@/racoon";
#include "remote.conf";
 
# the file should contain key ID/key pairs, for pre-shared key authentication.
path pre_shared_key "/usr/local/etc/racoon/psk.txt";
 
# racoon will look for certificate file in the directory,
# if the certificate/certificate request payload is received.
#path certificate "@sysconfdir_x@/cert";
 
# "log" specifies logging level.  It is followed by either "notify", "debug"
# or "debug2".
log debug;
 
# "padding" defines some padding parameters.  You should not touch these.
padding
{
        maximum_length 20;      # maximum padding length.
        randomize off;          # enable randomize length.
        strict_check off;       # enable strict check.
        exclusive_tail off;     # extract last one octet.
}
 
# if no listen directive is specified, racoon will listen on all
# available interface addresses.
listen
{
        isakmp                  My_External_IP [7001];
        isakmp                  My_External_IP [500];
        isakmp_natt             My_External_IP [4500];
        #admin [7002];          # administrative port for racoonctl.
        #strict_address;        # requires that all addresses must be bound.
}
 
# Specify various default timers.
timer
{
        # These value can be changed per remote node.
        counter 5;              # maximum trying count to send.
        interval 20 sec;        # maximum interval to resend.
        persend 1;              # the number of packets per send.
#       natt_keepalive  15 sec;
        # maximum time to wait for completing each phase.
        phase1 30 sec;
        phase2 15 sec;
}
 
remote Server_External_IP
{
        exchange_mode           main,aggressive;
        doi                     ipsec_doi;
        lifetime                time 24 hour;
        situation               identity_only;
        my_identifier           address My_External_IP;
        peers_identifier        address Server_External_IP;
        proposal_check          obey;
        passive                 off;
        generate_policy         off;
#       nat_traversal           off;
 
                                proposal {
        encryption_algorithm aes;
        hash_algorithm sha1;
        authentication_method pre_shared_key;
        dh_group modp2048;
                                }
}
 
 
sainfo anonymous
{
        pfs_group modp2048;
        encryption_algorithm            3des;
        authentication_algorithm        hmac_sha1;
        compression_algorithm           deflate;
}
Меняем права и владельца файла ключей. Владельцем этого файл должен быть пользователь от имени которого запускаеться racoon и права 600.

Код: Выделить всё

#chmod 600 /usr/local/etc/racoon/psk.txt 
#chown root:wheel /usr/local/etc/racoon/psk.txt 
И заполняем его в таком виде:

Код: Выделить всё

# IPv4/v6 addresses
Server_External_IP  Ваш_preshared_key
Создаем файл /etc/ipsec.conf и наполняем его

Код: Выделить всё

flush;
spdflush;
 
spdadd 0.0.0.0/0 0.0.0.0/0[1701] any -P out ipsec esp/transport//require;
spdadd 0.0.0.0/0[1701] 0.0.0.0/0 any -P in ipsec esp/transport//require;

Добавляем в автозапуск

Код: Выделить всё

racoon_enable="YES"
ipsec_enable="YES"
ipsec_program="/usr/local/sbin/setkey"
ipsec_file="/etc/ipsec.conf"
Далее устанавливаем клиента PPP клиента. В его качестве будет выступать MPD5

Код: Выделить всё

# cd /usr/ports/net/mpd5
# make install clean
И рисуем конфиг нашего клиента

Код: Выделить всё

# ee /usr/local/etc/mpd5/mpd.conf

Код: Выделить всё

startup:
      # Set web self 127.0.0.1 5008
      # Set user vpntest vpntest admin
      # Set web open
log +ALL +EVENTS -FRAME -ECHO
default:
      load L2TP_client
 
L2TP_client:
        create bundle static B1
        create link static L1 l2tp
        set link action bundle B1
        set auth authname "user"
        set auth password "password"
        set link max-redial 0
        set link mtu 1460
        set link keep-alive 20 75
 
        set l2tp peer Server_External_IP
        open
Ну и добавляем MPD5 в автозагрузку:

Код: Выделить всё

mpd_enable="YES"
Далее приведу список правил для IPFW. Последние 2 правила потом можно будет убрать

Код: Выделить всё

/sbin/ipfw add allow udp from Server_External_IP to me isakmp
/sbin/ipfw add allow udp from me to Server_External_IP isakmp
/sbin/ipfw add allow esp from Server_External_IP to me
/sbin/ipfw add allow esp from me to Server_External_IP
/sbin/ipfw add allow ipencap from Server_External_IP to me
/sbin/ipfw add allow ipencap from me to Server_External_IP
/sbin/ipfw add allow all from Server_External_IP to me
/sbin/ipfw add allow all from me to Server_External_IP
Отправляем машину в перезагрузку

Код: Выделить всё

# reboot
И смотрим вывод ifconfig. Если есть что то похожее на

Код: Выделить всё

ng0: flags=88d1<UP,POINTOPOINT,RUNNING,NOARP,SIMPLEX,MULTICAST> metric 0 mtu 1460
        inet 192.168.196.4 --> 192.168.196.1 netmask 0xffffffff
        nd6 options=29<PERFORMNUD,IFDISABLED,AUTO_LINKLOCAL>
Значит MPD5 подключился к серверу. Если нет, смотрим логи.

Так же проверяем статус ipsec. Если там присутствуют строки

Код: Выделить всё

setkey -D
My_External_IP Server_External_IP
        esp mode=transport spi=192677682(0x0b7c0732) reqid=0(0x00000000)
        E: 3des-cbc  319b7fca 2fcbd1a4 117a64fc aa4e704d ea17ef52 857cedae
        A: hmac-sha1  ac728111 1870b1e2 32cd723b 2a78b79e da17d280
        seq=0x00000017 replay=4 flags=0x00000000 state=mature
        created: Jul 24 12:18:34 2017   current: Jul 24 12:21:10 2017
        diff: 156(s)    hard: 28800(s)  soft: 23040(s)
        last: Jul 24 12:20:58 2017      hard: 0(s)      soft: 0(s)
        current: 2344(bytes)    hard: 0(bytes)  soft: 0(bytes)
        allocated: 23   hard: 0 soft: 0
        sadb_seq=1 pid=36513 refcnt=2
Server_External_IP My_External_IP
        esp mode=transport spi=266948264(0x0fe94ea8) reqid=0(0x00000000)
        E: 3des-cbc  15e03fe0 b7aa345b 349f0830 3a09237c 4d6a86bd 408ad1ff
        A: hmac-sha1  9a07f590 9add8005 5ed88ff3 7a725e5c 80e8325e
        seq=0x00000018 replay=4 flags=0x00000000 state=mature
        created: Jul 24 12:18:34 2017   current: Jul 24 12:21:10 2017
        diff: 156(s)    hard: 28800(s)  soft: 23040(s)
        last: Jul 24 12:20:58 2017      hard: 0(s)      soft: 0(s)
        current: 1501(bytes)    hard: 0(bytes)  soft: 0(bytes)
        allocated: 24   hard: 0 soft: 0
        sadb_seq=0 pid=36513 refcnt=1
значит все хорошо. Если нет, смотрим логи.


Чукча не писатель, чукча читатель :smile:
Просьба, за ошибки сильно не пинать. А так, критика приветствуется.

Хостинговая компания Host-Food.ru
Хостинг HostFood.ru
 

Услуги хостинговой компании Host-Food.ru

Хостинг HostFood.ru

Тарифы на хостинг в России, от 12 рублей: https://www.host-food.ru/tariffs/hosting/
Тарифы на виртуальные сервера (VPS/VDS/KVM) в РФ, от 189 руб.: https://www.host-food.ru/tariffs/virtualny-server-vps/
Выделенные сервера, Россия, Москва, от 2000 рублей (HP Proliant G5, Intel Xeon E5430 (2.66GHz, Quad-Core, 12Mb), 8Gb RAM, 2x300Gb SAS HDD, P400i, 512Mb, BBU):
https://www.host-food.ru/tariffs/vydelennyi-server-ds/
Недорогие домены в популярных зонах: https://www.host-food.ru/domains/

Аватара пользователя
Alex Keda
стреляли...
Сообщения: 35454
Зарегистрирован: 2004-10-18 14:25:19
Откуда: Made in USSR
Контактная информация:

Набросок статьи для L2TP/IPSEC клиента под FreeDSB 10

Непрочитанное сообщение Alex Keda » 2018-03-26 22:32:33

эх, где ж ты был пару лет назад =((
Убей их всех! Бог потом рассортирует...

Аватара пользователя
Sindikat88
мл. сержант
Сообщения: 138
Зарегистрирован: 2010-09-02 15:07:54
Контактная информация:

Набросок статьи для L2TP/IPSEC клиента под FreeDSB 10

Непрочитанное сообщение Sindikat88 » 2018-03-26 22:54:39

Пару лет назад это не требовалось :)

Аватара пользователя
skeletor
майор
Сообщения: 2548
Зарегистрирован: 2007-11-16 18:22:04

Набросок статьи для L2TP/IPSEC клиента под FreeDSB 10

Непрочитанное сообщение skeletor » 2018-03-28 11:03:50

В целом неплохо, но есть несколько моментов:

1) Отправляем машину в перезагрузку === это лучше не писать, а просто запустить racoon, mpd.
2) Нет нигде оговорки, что машина не за NAT'ом и имеет внешний IP.
3) Далее приведу список правил для IPFW. === непонятно, что за Server_External_IP, а так же то, что эти правила работать не будут, так как это не макросы. Либо замените IP на XX.XX.XX.XX, либо используйте макросы и потом ниже пояснение к ним.
4) Так же, в конфигах уберите комментарии или напишите, какие строки добавили.

Аватара пользователя
Sindikat88
мл. сержант
Сообщения: 138
Зарегистрирован: 2010-09-02 15:07:54
Контактная информация:

Набросок статьи для L2TP/IPSEC клиента под FreeDSB 10

Непрочитанное сообщение Sindikat88 » 2018-03-28 11:23:15

Ок. Поправлю. Спасибо

Аватара пользователя
Alex Keda
стреляли...
Сообщения: 35454
Зарегистрирован: 2004-10-18 14:25:19
Откуда: Made in USSR
Контактная информация:

Набросок статьи для L2TP/IPSEC клиента под FreeDSB 10

Непрочитанное сообщение Alex Keda » 2018-03-28 23:10:31

про ребут - не согласен...
я при настройке не ленюсь перезагружать - нет-нет да вылезет, что в автозагрузку что-то не поставил, в rc.conf ошибся и т.п.

когда оно на выходных, через полгода, ребутнётся (питание отключили или сам ребутнул зачем-то) и не подымется - и придётся сломя голову мчаться на ругой конец города... тогда и вспоминаешь про ребут.

лучше я сразу ребутну, если возможность есть.
как минимум - после всех настроек, разок.
--
а так, да, есть странные машины, которые уже даже перезагружать страшно

Код: Выделить всё

bsd0$ uptime 
23:09  up 2136 days, 10:08, 3 users, load averages: 0,00 0,00 0,00
bsd0$ uname -a
FreeBSD bsd0.moskb.local 8.0-RELEASE FreeBSD 8.0-RELEASE #0: Sat Nov 21 15:02:08 UTC 2009     root@mason.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC  amd64
bsd0$ 
это ночь щас... а днём там LA до 8, при 4 физических процах...
Убей их всех! Бог потом рассортирует...

Аватара пользователя
Sindikat88
мл. сержант
Сообщения: 138
Зарегистрирован: 2010-09-02 15:07:54
Контактная информация:

Набросок статьи для L2TP/IPSEC клиента под FreeDSB 10

Непрочитанное сообщение Sindikat88 » 2018-03-29 11:59:09

Коллеги, а не у кого не было проблем, с переездом с 8.1 на 10.1?
IPFW стал пускать всех подряд из локалки в Интернет.
Может конечно, у меня глаз замылился, но не могу понять причину.

Код: Выделить всё

#!/bin/sh
ipfw -f flush
ipfw -f pipe flush
ipfw -f queue flush

cmd="/sbin/ipfw add"

LanOut="bge1" # Внешняя сетевуха
IpOut="XXX.XXX.XXX.XXX" # Внешний IP

LanIn="bge0" # внутренняя сетевуха
NetIn="192.168.0.0/23" # Внутренняя сеть
openvpn_if="tun0"       #OpenVPN port
IpVPN="192.168.225.0"
VIP="192.168.0.0{140-160}"

#NAT 
ipfw nat 123 config if $LanOut log same_ports reset \ 
redirect_port tcp 192.168.0.8:443 443 \
redirect_port tcp 192.168.0.8:80 80 \
redirect_port tcp 192.168.0.8:993 993 \
redirect_port tcp 192.168.0.7:14000 14000 \
redirect_port tcp 192.168.0.7:13000 13000 \
redirect_port udp 192.168.0.7:15000 15000 \
redirect_port tcp 192.168.0.91:35300 35300

#local
$cmd 105 allow all from any to any via $LanIn
#VPN
$cmd 106 allow all from any to any via tun0
# loopback
$cmd 101 allow all from any to any via lo0

# Считаем трафик
# SMTP
$cmd 020 count tcp from any 25 to any out via $LanOut
$cmd 021 count tcp from any to any 25 in via $LanOut
#PROXY
$cmd 022 count tcp from any to 3128 any out via $LanOut
$cmd 023 count tcp from any to any 3128 in via $LanOut
# Kamera
$cmd 024 count tcp from any to any 554 in via $LanOut
$cmd 025 count tcp from any 554 to any out via $LanOut
#OpenVPN
$cmd 026 count tcp from any 2000 to any out via $LanOut
$cmd 027 count tcp from any to any 2000 in via $LanOut
# ALL
$cmd 029 count ip from any to any out via $LanOut
$cmd 028 count ip from any to any in via $LanOut

#Incoming traffic to NAT
$cmd 130 nat 123 ip from any to any in via $LanOut

# NAT from local to Inet
$cmd 131 nat 123 ip from $NetIn to any out via $LanOut

#Allow DYN rules
$cmd 140 check-state

# DNS resolve
$cmd 172 allow ip from any 53 to any via $LanOut
$cmd 173 allow ip from any to any 53 via $LanOut

# Outgoing server to Internet
$cmd 180 allow ip from me to any out via $LanOut setup keep-state

# ICMP
$cmd 200 allow icmp from any to any out via $LanOut

# OpenVPN
$cmd 201 allow tcp from any to ${IpOut} 2000 in via ${LanOut}
$cmd 202 allow tcp from ${IpOut} 2000 to any out via ${LanOut}
$cmd 203 allow all from any to any in via ${openvpn_if}
$cmd 204 allow all from any to any out via ${openvpn_if}

# Time
$cmd 209 allow udp from any to any 123 out via $LanOut
$cmd 210 allow udp from any 123 to any in via $LanOut

# Postal service
$cmd 211 allow tcp from any to me 25 in via $LanOut
$cmd 212 allow tcp from me 25 to any out via $LanOut

# ATS
$cmd 221 allow ip from any to 192.168.0.91 in via $LanOut
$cmd 222 allow ip from 193.201.230.128/26 to 192.168.0.91 in via $LanOut
$cmd 223 allow ip from me 5060,11024 to any out via $LanOut
$cmd 224 allow ip from 192.168.0.91 to 193.201.230.128/26 out via $LanOut

#NAT for Iphone and etc
$cmd 251 allow ip from '192.168.0.0{140-160}' to any out via $LanOut
$cmd 252 allow ip from any to '192.168.0.0{140-160}' in via $LanOut
$cmd 253 allow ip from '192.168.1.0{247-249}' to any out via $LanOut
$cmd 254 allow ip from any to '192.168.1.0{247-249}' in via $LanOut

# NAT for admin
$cmd 265 allow ip from 192.168.1.25 to any out via $LanOut
$cmd 266 allow ip from any to 192.168.1.25 in via $LanOut

#Откываем доступ wi-fi сетям NAT
$cmd 271 allow ip from 192.168.1.251 to any out via $LanOut
$cmd 272 allow ip from any to 192.168.1.251 in via $LanOut
$cmd 273 allow ip from 192.168.1.253 to any out via $LanOut
$cmd 274 allow ip from any to 192.168.1.253 in via $LanOut

#LinkedIn
$cmd 282 allow ip from any to lkdin.pass.xzvpn.net out via $LanOut
$cmd 281 allow ip from lkdin.pass.xzvpn.net to any in via $LanOut

# mail HTTP
$cmd 321 allow ip from any to 192.168.0.8 443,80,993 in via $LanOut
$cmd 322 allow ip from 192.168.0.8 443,80,993 to any out via $LanOut

# FTP
$cmd 373 allow ip from any to me 20-21,30000-50000 in via $LanOut
$cmd 374 allow ip from me 20-21,30000-50000 to any out via $LanOut

#Разрешаем определенный ICMP-трафик из мира к нам
$cmd 391 allow icmp from any to me in via $LanOut icmptype 3,8,12

#Разрешаем определенный ICMP-трафик от нас в мир
$cmd 392 allow icmp from me to any out via $LanOut icmptype 0,3,4,11,12

#Запрещаем прочий ICMP-трафик
$cmd 429 deny log icmp from any to me in via $LanOut icmptype 5,9,10,13,15,17

# Deny all inbound traffic from non-routable reserved address spaces
$cmd 430 deny all from 192.168.0.0/16 to any in via $LanOut
$cmd 431 deny all from 172.16.0.0/12 to any in via $LanOut
$cmd 432 deny all from 10.0.0.0/8 to any in via $LanOut
$cmd 433 deny all from 127.0.0.0/8 to any in via $LanOut
$cmd 434 deny all from 0.0.0.0/8 to any in via $LanOut
$cmd 435 deny all from 169.254.0.0/16 to any in via $LanOut
$cmd 436 deny all from 192.0.2.0/24 to any in via $LanOut
$cmd 437 deny all from 204.152.64.0/23 to any in via $LanOut
$cmd 438 deny all from 224.0.0.0/3 to any in via $LanOut

# Deny ident
$cmd 439 deny tcp from any to any 113 in via $LanOut

#Netbios
$cmd 440 deny tcp from any to any 137 via $LanOut
$cmd 441 deny tcp from any to any 138 via $LanOut
$cmd 442 deny tcp from any to any 139 via $LanOut
$cmd 443 deny tcp from any to any 81 via $LanOut

# Deny fragments packets
$cmd 444 deny all from any to any frag in via $LanOut

# Deny ACK packets that did not match the dynamic rule table
$cmd 445 deny tcp from any to any established in via $LanOut

# Allow in ssh from Internet
$cmd 500 allow tcp from XXX.XXX.XXX.XXX to me 22 in via $LanOut setup limit src-addr 1

# Reject incomming traffic from Inet
$cmd 600 deny log all from any to any in via $LanOut

# Reject outgoing traffic to Inet
$cmd 610 deny log all from any to any out via $LanOut
$cmd 999 deny log all from any to any

Аватара пользователя
Alex Keda
стреляли...
Сообщения: 35454
Зарегистрирован: 2004-10-18 14:25:19
Откуда: Made in USSR
Контактная информация:

Набросок статьи для L2TP/IPSEC клиента под FreeDSB 10

Непрочитанное сообщение Alex Keda » 2018-03-29 21:12:29

это надо правила смотреть в файрволле живьём, а не в файле
Убей их всех! Бог потом рассортирует...

yurybx
рядовой
Сообщения: 11
Зарегистрирован: 2011-03-17 12:11:20

Набросок статьи для L2TP/IPSEC клиента под FreeDSB 10

Непрочитанное сообщение yurybx » 2019-03-06 19:39:49

Добра Вашей лисьей норе!
Пытаюсь настроить L2TP/IPSec подключение по Вашей инструкции, но соединение не устанавливается: reply timeout in state wait-ctl-reply.
Фаервол отключен, FreeBSD имеет белый IP-адрес (никаких NAT-ов нету). В чём проблема, не пойму.
Все настройки далал по инструкции, за исключением того, что при компиляции ядра пришлось убрать из конфигурации опции IPSEC_ESP, IPSEC_NAT_T и IPSEC_FILTERGIF, т. к. компилятор ругался на них. Также поправил параметр dh_group на modp1024 в разделе "remote", т. к. оборудование на той стороне работает именно с таким алгоритмом (Cisco ASA 5550). Вот, кстати, инструкция от поставщика услуги (под OpenSUSE).
На той стороне точно всё порядке, т. к. из-под Windows соединение устанавливается нормально.
Прошу помощи!

Вывод setkey -D:

Код: Выделить всё

# setkey -D
195.149.70.70 91.142.161.34
        esp mode=transport spi=261540849(0x0f96cbf1) reqid=0(0x00000000)
        seq=0x00000000 replay=0 flags=0x00000000 state=larval
        sadb_seq=0 pid=31765 refcnt=1
Лог MPD5:

Код: Выделить всё

process 30659 started, version 5.8 (root@103amd64-quarterly-job-19 15:21 10-Dec-2017)
EVENT: Registering event EVENT_READ MsgEvent() at msg.c:77
EVENT: Registering event EVENT_READ MsgEvent() done at msg.c:77
[B_uz] Bundle: Interface ng1 created
EVENT: Message 1 to LinkMsg() sent
[L_uz] EVENT: Processing event EVENT_TIMEOUT ConfigRead() done
EVENT: Processing event EVENT_READ MsgEvent()
EVENT: Message 1 to LinkMsg() received
[L_uz] Link: OPEN event
[L_uz] LCP: Open event
[L_uz] LCP: state change Initial --> Starting
[L_uz] LCP: LayerStart
EVENT: Message 1 to PhysMsg() sent
EVENT: Message 1 to LinkMsg() processed
EVENT: Message 1 to PhysMsg() received
[L_uz] device: OPEN event
L2TP: ppp_l2tp_ctrl_create invoked
L2TP: Initiating control connection 0x803439610 0.0.0.0 0 <-> 195.149.70.70 1701
L2TP: Control connection 0x803439610 91.142.161.34 24766 <-> 195.149.70.70 1701 initiated
L2TP: ppp_l2tp_ctrl_initiate invoked
L2TP: XMIT [MESSAGE_TYPE SCCRQ] [HOST_NAME "fw.localdomain"] [VENDOR_NAME "FreeBSD MPD"] [BEARER_CAPABILITIES digital=1 analog=1] [RECEIVE_WINDOW_SIZE 8] [PROTOCOL_VERSION 1.0] [FRAMING_CAPABILITIES sync=1 async=1] [ASSIGNED_TUNNEL_ID 0xc4b8]
EVENT: Message 1 to PhysMsg() processed
EVENT: Processing event EVENT_READ MsgEvent() done
EVENT: Processing event EVENT_READ MsgEvent()
EVENT: Processing event EVENT_READ MsgEvent() done
L2TP: reply timeout in state wait-ctl-reply
L2TP: XMIT [MESSAGE_TYPE StopCCN] [ASSIGNED_TUNNEL_ID 0xc4b8] [RESULT_CODE result=2 error=6 errmsg="expecting reply; none received"]
L2TP: Control connection 0x803439610 terminated: 6 (expecting reply; none received)
[L_uz] device: DOWN event
[L_uz] Link: DOWN event
EVENT: Starting timer "PhysOpen" LinkReopenTimeout() for 2000 ms at link.c:278
EVENT: Registering event EVENT_TIMEOUT TimerExpires() at timer.c:50
EVENT: Registering event EVENT_TIMEOUT TimerExpires() done at timer.c:50
[L_uz] LCP: Down event
[L_uz] Link: reconnection attempt 1 in 2 seconds
EVENT: Processing event EVENT_TIMEOUT TimerExpires()
EVENT: Processing timer "PhysOpen" LinkReopenTimeout()
[L_uz] Link: reconnection attempt 1
EVENT: Message 1 to PhysMsg() sent
EVENT: Processing timer "PhysOpen" LinkReopenTimeout() done
EVENT: Processing event EVENT_TIMEOUT TimerExpires() done
EVENT: Processing event EVENT_READ MsgEvent()
EVENT: Message 1 to PhysMsg() received
[L_uz] device: OPEN event
L2TP: ppp_l2tp_ctrl_create invoked
L2TP: Initiating control connection 0x803439910 0.0.0.0 0 <-> 195.149.70.70 1701
L2TP: Control connection 0x803439910 91.142.161.34 15927 <-> 195.149.70.70 1701 initiated
L2TP: ppp_l2tp_ctrl_initiate invoked
L2TP: XMIT [MESSAGE_TYPE SCCRQ] [HOST_NAME "fw.localdomain"] [VENDOR_NAME "FreeBSD MPD"] [BEARER_CAPABILITIES digital=1 analog=1] [RECEIVE_WINDOW_SIZE 8] [PROTOCOL_VERSION 1.0] [FRAMING_CAPABILITIES sync=1 async=1] [ASSIGNED_TUNNEL_ID 0x68db]
EVENT: Message 1 to PhysMsg() processed
EVENT: Processing event EVENT_READ MsgEvent() done
L2TP: Control connection 0x803439610 destroyed
EVENT: Processing event EVENT_READ SignalHandler()
caught fatal signal INT
[B_uz] IFACE: Close event
[B_uz] IPCP: Close event
EVENT: Starting timer "DeathTimer" (void (*)(void *)) DoExit() for 2000 ms at main.c:526
EVENT: Registering event EVENT_TIMEOUT TimerExpires() at timer.c:50
EVENT: Registering event EVENT_TIMEOUT TimerExpires() done at timer.c:50
EVENT: Processing event EVENT_READ SignalHandler() done
EVENT: Processing event EVENT_TIMEOUT TimerExpires()
EVENT: Processing timer "DeathTimer" (void (*)(void *)) DoExit()
[B_uz] Bundle: Shutdown
[L_uz] Link: Shutdown
PPTP: Total shutdown
L2TP: Total shutdown
L2TP: ppp_l2tp_ctrl_shutdown invoked, ctrl=0x803439910 errmsg="(null)"
L2TP: XMIT [MESSAGE_TYPE StopCCN] [ASSIGNED_TUNNEL_ID 0x68db] [RESULT_CODE result=6 error=0 errmsg=""]
EVENT: Unregistering event EVENT_READ EcpNgDataEvent() at ecp.c:192
EVENT: Unregistering event EVENT_READ EcpNgDataEvent() done at ecp.c:192
EVENT: Unregistering event EVENT_READ CcpNgCtrlEvent() at ccp.c:189
EVENT: Unregistering event EVENT_READ CcpNgCtrlEvent() done at ccp.c:189
EVENT: Unregistering event EVENT_READ CcpNgDataEvent() at ccp.c:192
EVENT: Unregistering event EVENT_READ CcpNgDataEvent() done at ccp.c:192
EVENT: Unregistering event EVENT_READ LinkNgDataEvent() at link.c:182
EVENT: Unregistering event EVENT_READ LinkNgDataEvent() done at link.c:182
Console closed.
Лог Raccon:

Код: Выделить всё

2019-03-06 18:15:11: INFO: @(#)ipsec-tools 0.8.2 (http://ipsec-tools.sourceforge.net)
2019-03-06 18:15:11: INFO: @(#)This product linked OpenSSL 1.0.1s-freebsd  1 Mar 2016 (http://www.openssl.org/)
2019-03-06 18:15:11: INFO: Reading configuration from "/usr/local/etc/racoon/racoon.conf"
2019-03-06 18:15:11: DEBUG: hmac(modp1024)
2019-03-06 18:15:11: DEBUG: no check of compression algorithm; not supported in sadb message.
2019-03-06 18:15:11: DEBUG: getsainfo params: loc='ANONYMOUS' rmt='ANONYMOUS' peer='NULL' client='NULL' id=0
2019-03-06 18:15:11: WARNING: setsockopt(UDP_ENCAP_ESPINUDP): UDP_ENCAP Invalid argument
2019-03-06 18:15:11: INFO: 91.142.161.34[4500] used as isakmp port (fd=5)
2019-03-06 18:15:11: INFO: 91.142.161.34[500] used as isakmp port (fd=6)
2019-03-06 18:15:11: INFO: 91.142.161.34[7001] used as isakmp port (fd=7)
2019-03-06 18:15:11: DEBUG: pk_recv: retry[0] recv()
2019-03-06 18:15:11: DEBUG: got pfkey X_SPDDUMP message
2019-03-06 18:15:11: DEBUG: pk_recv: retry[0] recv()
2019-03-06 18:15:11: DEBUG: got pfkey X_SPDDUMP message
2019-03-06 18:15:11: DEBUG: sub:0x7fffffffe318: 0.0.0.0/0[0] 0.0.0.0/0[1701] proto=any dir=out
2019-03-06 18:15:11: DEBUG: db :0x80205e490: 0.0.0.0/0[1701] 0.0.0.0/0[0] proto=any dir=in
2019-03-06 18:15:18: DEBUG: ===
2019-03-06 18:15:18: DEBUG: 96 bytes message received from 195.149.70.70[500] to 91.142.161.34[500]
2019-03-06 18:15:18: DEBUG:
5c7fc916 7f0edc81 b3d5d042 f888071c 0b100500 00000000 00000060 00000044
00000001 0000000e 0d000038 00000001 00000001 0000002c 01010001 00000024
01010000 800b0001 800c7080 80010007 800e0080 80030001 80020002 8004000e
2019-03-06 18:15:18: [195.149.70.70] ERROR: unknown Informational exchange received.
2019-03-06 18:15:18: DEBUG: ===
2019-03-06 18:15:18: DEBUG: 96 bytes message received from 195.149.70.70[500] to 91.142.161.34[500]
2019-03-06 18:15:18: DEBUG:
f61abb78 2ee87f78 d1e014a8 a4f065bd 0b100500 00000000 00000060 00000044
00000001 0000000e 0d000038 00000001 00000001 0000002c 01010001 00000024
01010000 800b0001 800c7080 80010007 800e0080 80030001 80020002 8004000e
2019-03-06 18:15:18: [195.149.70.70] ERROR: unknown Informational exchange received.
2019-03-06 18:15:23: DEBUG: pk_recv: retry[0] recv()
2019-03-06 18:15:23: DEBUG: got pfkey ACQUIRE message
2019-03-06 18:15:23: DEBUG: suitable outbound SP found: 0.0.0.0/0[0] 0.0.0.0/0[1701] proto=any dir=out.
2019-03-06 18:15:23: DEBUG: sub:0x7fffffffe2e8: 0.0.0.0/0[1701] 0.0.0.0/0[0] proto=any dir=in
2019-03-06 18:15:23: DEBUG: db :0x80205e490: 0.0.0.0/0[1701] 0.0.0.0/0[0] proto=any dir=in
2019-03-06 18:15:23: DEBUG: suitable inbound SP found: 0.0.0.0/0[1701] 0.0.0.0/0[0] proto=any dir=in.
2019-03-06 18:15:23: DEBUG: new acquire 0.0.0.0/0[0] 0.0.0.0/0[1701] proto=any dir=out
2019-03-06 18:15:23: [195.149.70.70] DEBUG: configuration "195.149.70.70[500]" selected.
2019-03-06 18:15:23: DEBUG: getsainfo params: loc='0.0.0.0/0' rmt='0.0.0.0/0' peer='NULL' client='NULL' id=0
2019-03-06 18:15:23: DEBUG: evaluating sainfo: loc='ANONYMOUS', rmt='ANONYMOUS', peer='ANY', id=0
2019-03-06 18:15:23: DEBUG: check and compare ids : values matched (ANONYMOUS)
2019-03-06 18:15:23: DEBUG: check and compare ids : values matched (ANONYMOUS)
2019-03-06 18:15:23: DEBUG: selected sainfo: loc='ANONYMOUS', rmt='ANONYMOUS', peer='ANY', id=0
2019-03-06 18:15:23: DEBUG:  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Transport reqid=0:0)
2019-03-06 18:15:23: DEBUG:   (trns_id=3DES encklen=0 authtype=hmac-sha)
2019-03-06 18:15:23: DEBUG: in post_acquire
2019-03-06 18:15:23: [195.149.70.70] DEBUG: configuration "195.149.70.70[500]" selected.
2019-03-06 18:15:23: INFO: IPsec-SA request for 195.149.70.70 queued due to no phase1 found.
2019-03-06 18:15:23: DEBUG: ===
2019-03-06 18:15:23: INFO: initiate new phase 1 negotiation: 91.142.161.34[500]<=>195.149.70.70[500]
2019-03-06 18:15:23: INFO: begin Identity Protection mode.
2019-03-06 18:15:23: DEBUG: new cookie:
7313b867fd51071a
2019-03-06 18:15:23: DEBUG: add payload of len 52, next type 13
2019-03-06 18:15:23: DEBUG: add payload of len 16, next type 0
2019-03-06 18:15:23: DEBUG: 104 bytes from 91.142.161.34[500] to 195.149.70.70[500]
2019-03-06 18:15:23: DEBUG: sockname 91.142.161.34[500]
2019-03-06 18:15:23: DEBUG: send packet from 91.142.161.34[500]
2019-03-06 18:15:23: DEBUG: send packet to 195.149.70.70[500]
2019-03-06 18:15:23: DEBUG: 1 times of 104 bytes message will be sent to 195.149.70.70[500]
2019-03-06 18:15:23: DEBUG:
7313b867 fd51071a 00000000 00000000 01100200 00000000 00000068 0d000038
00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c7080
80010007 800e0080 80030001 80020002 80040002 00000014 afcad713 68a1f1c9
6b8696fc 77570100
2019-03-06 18:15:23: DEBUG: resend phase1 packet 7313b867fd51071a:0000000000000000
2019-03-06 18:15:23: DEBUG: ===
2019-03-06 18:15:23: DEBUG: 108 bytes message received from 195.149.70.70[500] to 91.142.161.34[500]
2019-03-06 18:15:23: DEBUG:
7313b867 fd51071a 8e9921c9 db706df6 01100200 00000000 0000006c 0d000038
00000001 00000001 0000002c 01010001 00000024 01010000 80010007 800e0080
80020002 80040002 80030001 800b0001 800c7080 00000018 4048b7d5 6ebce885
25e7de7f 00d6c2d3 c0000000
2019-03-06 18:15:23: DEBUG: begin.
2019-03-06 18:15:23: DEBUG: seen nptype=1(sa)
2019-03-06 18:15:23: DEBUG: seen nptype=13(vid)
2019-03-06 18:15:23: DEBUG: succeed.
2019-03-06 18:15:23: INFO: received broken Microsoft ID: FRAGMENTATION
2019-03-06 18:15:23: DEBUG: total SA len=52
2019-03-06 18:15:23: DEBUG:
00000001 00000001 0000002c 01010001 00000024 01010000 80010007 800e0080
80020002 80040002 80030001 800b0001 800c7080
2019-03-06 18:15:23: DEBUG: begin.
2019-03-06 18:15:23: DEBUG: seen nptype=2(prop)
2019-03-06 18:15:23: DEBUG: succeed.
2019-03-06 18:15:23: DEBUG: proposal #1 len=44
2019-03-06 18:15:23: DEBUG: begin.
2019-03-06 18:15:23: DEBUG: seen nptype=3(trns)
2019-03-06 18:15:23: DEBUG: succeed.
2019-03-06 18:15:23: DEBUG: transform #1 len=36
2019-03-06 18:15:23: DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
2019-03-06 18:15:23: DEBUG: encryption(aes)
2019-03-06 18:15:23: DEBUG: type=Key Length, flag=0x8000, lorv=128
2019-03-06 18:15:23: DEBUG: type=Hash Algorithm, flag=0x8000, lorv=SHA
2019-03-06 18:15:23: DEBUG: hash(sha1)
2019-03-06 18:15:23: DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group
2019-03-06 18:15:23: DEBUG: hmac(modp1024)
2019-03-06 18:15:23: DEBUG: type=Authentication Method, flag=0x8000, lorv=pre-shared key
2019-03-06 18:15:23: DEBUG: type=Life Type, flag=0x8000, lorv=seconds
2019-03-06 18:15:23: DEBUG: type=Life Duration, flag=0x8000, lorv=28800
2019-03-06 18:15:23: DEBUG: pair 1:
2019-03-06 18:15:23: DEBUG:  0x802025c00: next=0x0 tnext=0x0
2019-03-06 18:15:23: DEBUG: proposal #1: 1 transform
2019-03-06 18:15:23: DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
2019-03-06 18:15:23: DEBUG: type=Key Length, flag=0x8000, lorv=128
2019-03-06 18:15:23: DEBUG: type=Hash Algorithm, flag=0x8000, lorv=SHA
2019-03-06 18:15:23: DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group
2019-03-06 18:15:23: DEBUG: type=Authentication Method, flag=0x8000, lorv=pre-shared key
2019-03-06 18:15:23: DEBUG: type=Life Type, flag=0x8000, lorv=seconds
2019-03-06 18:15:23: DEBUG: type=Life Duration, flag=0x8000, lorv=28800
2019-03-06 18:15:23: DEBUG: prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1
2019-03-06 18:15:23: DEBUG: trns#=1, trns-id=IKE
2019-03-06 18:15:23: DEBUG:   lifetime = 28800
2019-03-06 18:15:23: DEBUG:   lifebyte = 0
2019-03-06 18:15:23: DEBUG:   enctype = AES-CBC
2019-03-06 18:15:23: DEBUG:   encklen = 128
2019-03-06 18:15:23: DEBUG:   hashtype = SHA
2019-03-06 18:15:23: DEBUG:   authmethod = pre-shared key
2019-03-06 18:15:23: DEBUG:   dh_group = 1024-bit MODP group
2019-03-06 18:15:23: DEBUG: an acceptable proposal found.
2019-03-06 18:15:23: DEBUG: hmac(modp1024)
2019-03-06 18:15:23: DEBUG: agreed on pre-shared key auth.
2019-03-06 18:15:23: DEBUG: ===
2019-03-06 18:15:23: DEBUG: compute DH's private.
2019-03-06 18:15:23: DEBUG:
55b5b672 ba288e0c 2bd50862 e4a735a5 17f9b7e8 b5dd0998 2a30c015 63f75d36
8df0fb93 5ae5c818 bf7c5181 628a40fb 63425159 318e7e69 7e145d28 5bc2f8d2
a4211f47 d1417fda a8f63946 e87b3c6d a0665e5b f2f797e2 a99679d8 0f10b133
08ef63a9 3833e006 8cee53bd e69bdf91 c20aabbd 56d1f1de e108030e 64e4a46d
2019-03-06 18:15:23: DEBUG: compute DH's public.
2019-03-06 18:15:23: DEBUG:
635e9a0c b73b4184 7a6e6dff d4b9e7d3 e5541dab 9599f450 5ca7f994 729e7589
a2d730dc cc2d2560 aaaa86e0 b0294e1d 76af43fa d02d7f3b 4fb049f3 a95a827d
d49c65e6 4fb901d7 6a3aef32 ec54a622 9bae00e2 390fa105 3e40eabf 7cd6b0e3
7bb1c424 325b8c88 e648daf6 22593bf1 2a90b413 26b724b5 d4e4b741 86eff00c
2019-03-06 18:15:23: DEBUG: add payload of len 128, next type 10
2019-03-06 18:15:23: DEBUG: add payload of len 16, next type 0
2019-03-06 18:15:23: DEBUG: 180 bytes from 91.142.161.34[500] to 195.149.70.70[500]
2019-03-06 18:15:23: DEBUG: sockname 91.142.161.34[500]
2019-03-06 18:15:23: DEBUG: send packet from 91.142.161.34[500]
2019-03-06 18:15:23: DEBUG: send packet to 195.149.70.70[500]
2019-03-06 18:15:23: DEBUG: 1 times of 180 bytes message will be sent to 195.149.70.70[500]
2019-03-06 18:15:23: DEBUG:
7313b867 fd51071a 8e9921c9 db706df6 04100200 00000000 000000b4 0a000084
635e9a0c b73b4184 7a6e6dff d4b9e7d3 e5541dab 9599f450 5ca7f994 729e7589
a2d730dc cc2d2560 aaaa86e0 b0294e1d 76af43fa d02d7f3b 4fb049f3 a95a827d
d49c65e6 4fb901d7 6a3aef32 ec54a622 9bae00e2 390fa105 3e40eabf 7cd6b0e3
7bb1c424 325b8c88 e648daf6 22593bf1 2a90b413 26b724b5 d4e4b741 86eff00c
00000014 c4987ce3 73f15763 816f715a e1a98075
2019-03-06 18:15:23: DEBUG: resend phase1 packet 7313b867fd51071a:8e9921c9db706df6
2019-03-06 18:15:23: DEBUG: ===
2019-03-06 18:15:23: DEBUG: 256 bytes message received from 195.149.70.70[500] to 91.142.161.34[500]
2019-03-06 18:15:23: DEBUG:
7313b867 fd51071a 8e9921c9 db706df6 04100200 00000000 00000100 0a000084
12b69d1e 27ae3426 63c85155 4a572249 b65ea260 a7efb0c7 9931a9e1 4c606b88
ddab0353 ef1d6c79 6cf4f84c 2e1e7fbf 465b0079 a91c220d 3f6c5916 417c50f5
970ecfb8 2978305b 67c48014 461a9750 ee53f5db 7eebc045 2144b696 49a1334b
656dc539 8e4b1b61 4b397494 df610c99 17a50df8 1ee49a5b e76173c4 86bcf661
0d000018 3515bc01 6c6086a6 2dffe466 6e042c68 786c7247 0d000014 12f5f28c
457168a9 702d9fe2 74cc0100 0d00000c 09002689 dfd6b712 0d000014 7b5e86d4
db716df6 7e65b400 d6ce6c83 00000014 1f07f70e aa6514d3 b0fa9654 2a500100
2019-03-06 18:15:23: DEBUG: begin.
2019-03-06 18:15:23: DEBUG: seen nptype=4(ke)
2019-03-06 18:15:23: DEBUG: seen nptype=10(nonce)
2019-03-06 18:15:23: DEBUG: seen nptype=13(vid)
2019-03-06 18:15:23: DEBUG: seen nptype=13(vid)
2019-03-06 18:15:23: DEBUG: seen nptype=13(vid)
2019-03-06 18:15:23: DEBUG: seen nptype=13(vid)
2019-03-06 18:15:23: DEBUG: succeed.
2019-03-06 18:15:23: INFO: received Vendor ID: CISCO-UNITY
2019-03-06 18:15:23: INFO: received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt
2019-03-06 18:15:23: DEBUG: received unknown Vendor ID
2019-03-06 18:15:23: DEBUG:
7b5e86d4 db716df6 7e65b400 d6ce6c83
2019-03-06 18:15:23: DEBUG: received unknown Vendor ID
2019-03-06 18:15:23: DEBUG:
1f07f70e aa6514d3 b0fa9654 2a500100
2019-03-06 18:15:23: DEBUG: ===
2019-03-06 18:15:23: DEBUG: compute DH's shared.
2019-03-06 18:15:23: DEBUG:
4b24ec34 d51d07bf bc4c65dc aa54fa41 f40d076c 038fdf04 22c17c0e f5c3acc0
de62ab2d e748b85a 665e3d11 7cf95644 d1ba8800 e75a62b8 b7e14cf2 4d2cbc79
58ed965d 2283aea0 2ed0019d 5817f3cb d938c52f 20f2b39d 4430aa44 35c245eb
a7a9f240 8512b8a4 74907467 b9696171 facc2d35 e2860b58 8f794784 47406421
2019-03-06 18:15:23: DEBUG: the psk found.
2019-03-06 18:15:23: DEBUG: nonce 1: 2019-03-06 18:15:23: DEBUG:
c4987ce3 73f15763 816f715a e1a98075
2019-03-06 18:15:23: DEBUG: nonce 2: 2019-03-06 18:15:23: DEBUG:
3515bc01 6c6086a6 2dffe466 6e042c68 786c7247
2019-03-06 18:15:23: DEBUG: hmac(hmac_sha1)
2019-03-06 18:15:23: DEBUG: SKEYID computed:
2019-03-06 18:15:23: DEBUG:
eb7c7850 5b095fc7 8253f666 19d7635c 5cfa4887
2019-03-06 18:15:23: DEBUG: hmac(hmac_sha1)
2019-03-06 18:15:23: DEBUG: SKEYID_d computed:
2019-03-06 18:15:23: DEBUG:
add08a5d 94c0d038 2076f0e7 68f79687 6a0b4145
2019-03-06 18:15:23: DEBUG: hmac(hmac_sha1)
2019-03-06 18:15:23: DEBUG: SKEYID_a computed:
2019-03-06 18:15:23: DEBUG:
44dc62b2 49d09bb0 0854d108 b3fceb8e 0a359950
2019-03-06 18:15:23: DEBUG: hmac(hmac_sha1)
2019-03-06 18:15:23: DEBUG: SKEYID_e computed:
2019-03-06 18:15:23: DEBUG:
d3caae1b c055ffb5 f33d6820 ad21e1c9 fbb20357
2019-03-06 18:15:23: DEBUG: encryption(aes)
2019-03-06 18:15:23: DEBUG: hash(sha1)
2019-03-06 18:15:23: DEBUG: final encryption key computed:
2019-03-06 18:15:23: DEBUG:
d3caae1b c055ffb5 f33d6820 ad21e1c9
2019-03-06 18:15:23: DEBUG: hash(sha1)
2019-03-06 18:15:23: DEBUG: encryption(aes)
2019-03-06 18:15:23: DEBUG: IV computed:
2019-03-06 18:15:23: DEBUG:
681ea931 ae0d5364 e1cc71d2 d1625943
2019-03-06 18:15:23: DEBUG: use ID type of IPv4_address
2019-03-06 18:15:23: DEBUG: HASH with:
2019-03-06 18:15:23: DEBUG:
635e9a0c b73b4184 7a6e6dff d4b9e7d3 e5541dab 9599f450 5ca7f994 729e7589
a2d730dc cc2d2560 aaaa86e0 b0294e1d 76af43fa d02d7f3b 4fb049f3 a95a827d
d49c65e6 4fb901d7 6a3aef32 ec54a622 9bae00e2 390fa105 3e40eabf 7cd6b0e3
7bb1c424 325b8c88 e648daf6 22593bf1 2a90b413 26b724b5 d4e4b741 86eff00c
12b69d1e 27ae3426 63c85155 4a572249 b65ea260 a7efb0c7 9931a9e1 4c606b88
ddab0353 ef1d6c79 6cf4f84c 2e1e7fbf 465b0079 a91c220d 3f6c5916 417c50f5
970ecfb8 2978305b 67c48014 461a9750 ee53f5db 7eebc045 2144b696 49a1334b
656dc539 8e4b1b61 4b397494 df610c99 17a50df8 1ee49a5b e76173c4 86bcf661
7313b867 fd51071a 8e9921c9 db706df6 00000001 00000001 0000002c 01010001
00000024 01010000 800b0001 800c7080 80010007 800e0080 80030001 80020002
80040002 011101f4 5b8ea122
2019-03-06 18:15:23: DEBUG: hmac(hmac_sha1)
2019-03-06 18:15:23: DEBUG: HASH (init) computed:
2019-03-06 18:15:23: DEBUG:
086c781e 75cfb9c9 2d2e09a5 b4e4b371 8b43c4a9
2019-03-06 18:15:23: DEBUG: add payload of len 8, next type 8
2019-03-06 18:15:23: DEBUG: add payload of len 20, next type 0
2019-03-06 18:15:23: DEBUG: begin encryption.
2019-03-06 18:15:23: DEBUG: encryption(aes)
2019-03-06 18:15:23: DEBUG: pad length = 12
2019-03-06 18:15:23: DEBUG:
0800000c 011101f4 5b8ea122 00000018 086c781e 75cfb9c9 2d2e09a5 b4e4b371
8b43c4a9 00000000 00000000 0000000c
2019-03-06 18:15:23: DEBUG: encryption(aes)
2019-03-06 18:15:23: DEBUG: with key:
2019-03-06 18:15:23: DEBUG:
d3caae1b c055ffb5 f33d6820 ad21e1c9
2019-03-06 18:15:23: DEBUG: encrypted payload by IV:
2019-03-06 18:15:23: DEBUG:
681ea931 ae0d5364 e1cc71d2 d1625943
2019-03-06 18:15:23: DEBUG: save IV for next:
2019-03-06 18:15:23: DEBUG:
94b31aeb afd978f8 b9d89342 1dedd163
2019-03-06 18:15:23: DEBUG: encrypted.
2019-03-06 18:15:23: DEBUG: 76 bytes from 91.142.161.34[500] to 195.149.70.70[500]
2019-03-06 18:15:23: DEBUG: sockname 91.142.161.34[500]
2019-03-06 18:15:23: DEBUG: send packet from 91.142.161.34[500]
2019-03-06 18:15:23: DEBUG: send packet to 195.149.70.70[500]
2019-03-06 18:15:23: DEBUG: 1 times of 76 bytes message will be sent to 195.149.70.70[500]
2019-03-06 18:15:23: DEBUG:
7313b867 fd51071a 8e9921c9 db706df6 05100201 00000000 0000004c 0327b660
e9c0e3df 35a3cd5f d3fc08cd f60b0fce c466f15f 6d7cda8f a72f66e7 94b31aeb
afd978f8 b9d89342 1dedd163
2019-03-06 18:15:23: DEBUG: resend phase1 packet 7313b867fd51071a:8e9921c9db706df6
2019-03-06 18:15:23: DEBUG: ===
2019-03-06 18:15:23: DEBUG: 92 bytes message received from 195.149.70.70[500] to 91.142.161.34[500]
2019-03-06 18:15:23: DEBUG:
7313b867 fd51071a 8e9921c9 db706df6 05100201 00000000 0000005c ea9a6bfb
004867f2 7e81bee6 c2948d13 331f2097 0f277339 5e915cb3 325b489e dfff1263
c8e407cb 2f678a6b 71a44f45 149da16b ca29e854 3430c13b 1f4be936
2019-03-06 18:15:23: DEBUG: begin decryption.
2019-03-06 18:15:23: DEBUG: encryption(aes)
2019-03-06 18:15:23: DEBUG: IV was saved for next processing:
2019-03-06 18:15:23: DEBUG:
149da16b ca29e854 3430c13b 1f4be936
2019-03-06 18:15:23: DEBUG: encryption(aes)
2019-03-06 18:15:23: DEBUG: with key:
2019-03-06 18:15:23: DEBUG:
d3caae1b c055ffb5 f33d6820 ad21e1c9
2019-03-06 18:15:23: DEBUG: decrypted payload by IV:
2019-03-06 18:15:23: DEBUG:
94b31aeb afd978f8 b9d89342 1dedd163
2019-03-06 18:15:23: DEBUG: decrypted payload, but not trimed.
2019-03-06 18:15:23: DEBUG:
0800000c 011101f4 c3954646 0d000018 ea3bd63f cecd96cf 4e285fd2 06ea7e38
43ab5144 00000014 afcad713 68a1f1c9 6b8696fc 77570100 00000000 00000000
2019-03-06 18:15:23: DEBUG: padding len=0
2019-03-06 18:15:23: DEBUG: skip to trim padding.
2019-03-06 18:15:23: DEBUG: decrypted.
2019-03-06 18:15:23: DEBUG:
7313b867 fd51071a 8e9921c9 db706df6 05100201 00000000 0000005c 0800000c
011101f4 c3954646 0d000018 ea3bd63f cecd96cf 4e285fd2 06ea7e38 43ab5144
00000014 afcad713 68a1f1c9 6b8696fc 77570100 00000000 00000000
2019-03-06 18:15:23: DEBUG: begin.
2019-03-06 18:15:23: DEBUG: seen nptype=5(id)
2019-03-06 18:15:23: DEBUG: seen nptype=8(hash)
2019-03-06 18:15:23: DEBUG: seen nptype=13(vid)
2019-03-06 18:15:23: DEBUG: succeed.
2019-03-06 18:15:23: INFO: received Vendor ID: DPD
2019-03-06 18:15:23: DEBUG: remote supports DPD
2019-03-06 18:15:23: DEBUG: HASH received:
2019-03-06 18:15:23: DEBUG:
ea3bd63f cecd96cf 4e285fd2 06ea7e38 43ab5144
2019-03-06 18:15:23: DEBUG: HASH with:
2019-03-06 18:15:23: DEBUG:
12b69d1e 27ae3426 63c85155 4a572249 b65ea260 a7efb0c7 9931a9e1 4c606b88
ddab0353 ef1d6c79 6cf4f84c 2e1e7fbf 465b0079 a91c220d 3f6c5916 417c50f5
970ecfb8 2978305b 67c48014 461a9750 ee53f5db 7eebc045 2144b696 49a1334b
656dc539 8e4b1b61 4b397494 df610c99 17a50df8 1ee49a5b e76173c4 86bcf661
635e9a0c b73b4184 7a6e6dff d4b9e7d3 e5541dab 9599f450 5ca7f994 729e7589
a2d730dc cc2d2560 aaaa86e0 b0294e1d 76af43fa d02d7f3b 4fb049f3 a95a827d
d49c65e6 4fb901d7 6a3aef32 ec54a622 9bae00e2 390fa105 3e40eabf 7cd6b0e3
7bb1c424 325b8c88 e648daf6 22593bf1 2a90b413 26b724b5 d4e4b741 86eff00c
8e9921c9 db706df6 7313b867 fd51071a 00000001 00000001 0000002c 01010001
00000024 01010000 800b0001 800c7080 80010007 800e0080 80030001 80020002
80040002 011101f4 c3954646
2019-03-06 18:15:23: DEBUG: hmac(hmac_sha1)
2019-03-06 18:15:23: DEBUG: HASH (init) computed:
2019-03-06 18:15:23: DEBUG:
ea3bd63f cecd96cf 4e285fd2 06ea7e38 43ab5144
2019-03-06 18:15:23: DEBUG: HASH for PSK validated.
2019-03-06 18:15:23: [195.149.70.70] DEBUG: peer's ID:2019-03-06 18:15:23: DEBUG:
011101f4 c3954646
2019-03-06 18:15:23: DEBUG: ===
2019-03-06 18:15:23: DEBUG: compute IV for phase2
2019-03-06 18:15:23: DEBUG: phase1 last IV:
2019-03-06 18:15:23: DEBUG:
149da16b ca29e854 3430c13b 1f4be936 8eb2540d
2019-03-06 18:15:23: DEBUG: hash(sha1)
2019-03-06 18:15:23: DEBUG: encryption(aes)
2019-03-06 18:15:23: DEBUG: phase2 IV computed:
2019-03-06 18:15:23: DEBUG:
6d9f0eaf 15f195f2 e335bd1b c994ba64
2019-03-06 18:15:23: DEBUG: HASH with:
2019-03-06 18:15:23: DEBUG:
8eb2540d 0000001c 00000001 01106002 7313b867 fd51071a 8e9921c9 db706df6
2019-03-06 18:15:23: DEBUG: hmac(hmac_sha1)
2019-03-06 18:15:23: DEBUG: HASH computed:
2019-03-06 18:15:23: DEBUG:
037f55b7 587e5cf8 3c4c9476 4567fc8b 374ff744
2019-03-06 18:15:23: DEBUG: begin encryption.
2019-03-06 18:15:23: DEBUG: encryption(aes)
2019-03-06 18:15:23: DEBUG: pad length = 12
2019-03-06 18:15:23: DEBUG:
0b000018 037f55b7 587e5cf8 3c4c9476 4567fc8b 374ff744 0000001c 00000001
01106002 7313b867 fd51071a 8e9921c9 db706df6 00000000 00000000 0000000c
2019-03-06 18:15:23: DEBUG: encryption(aes)
2019-03-06 18:15:23: DEBUG: with key:
2019-03-06 18:15:23: DEBUG:
d3caae1b c055ffb5 f33d6820 ad21e1c9
2019-03-06 18:15:23: DEBUG: encrypted payload by IV:
2019-03-06 18:15:23: DEBUG:
6d9f0eaf 15f195f2 e335bd1b c994ba64
2019-03-06 18:15:23: DEBUG: save IV for next:
2019-03-06 18:15:23: DEBUG:
94521ac0 116e0916 d8a67194 dd3f80ec
2019-03-06 18:15:23: DEBUG: encrypted.
2019-03-06 18:15:23: DEBUG: 92 bytes from 91.142.161.34[500] to 195.149.70.70[500]
2019-03-06 18:15:23: DEBUG: sockname 91.142.161.34[500]
2019-03-06 18:15:23: DEBUG: send packet from 91.142.161.34[500]
2019-03-06 18:15:23: DEBUG: send packet to 195.149.70.70[500]
2019-03-06 18:15:23: DEBUG: 1 times of 92 bytes message will be sent to 195.149.70.70[500]
2019-03-06 18:15:23: DEBUG:
7313b867 fd51071a 8e9921c9 db706df6 08100501 8eb2540d 0000005c 83855998
a1bdfc0f 58f15cf3 f62990b7 6b82c4cd d9f87a5d 75141267 3701a2fe 638a42e4
5dc30867 48af2604 7bf1ac68 94521ac0 116e0916 d8a67194 dd3f80ec
2019-03-06 18:15:23: DEBUG: sendto Information notify.
2019-03-06 18:15:23: DEBUG: IV freed
2019-03-06 18:15:23: INFO: ISAKMP-SA established 91.142.161.34[500]-195.149.70.70[500] spi:7313b867fd51071a:8e9921c9db706df6
2019-03-06 18:15:23: DEBUG: ===
2019-03-06 18:15:24: DEBUG: ===
2019-03-06 18:15:24: DEBUG: begin QUICK mode.
2019-03-06 18:15:24: INFO: initiate new phase 2 negotiation: 91.142.161.34[500]<=>195.149.70.70[500]
2019-03-06 18:15:24: DEBUG: compute IV for phase2
2019-03-06 18:15:24: DEBUG: phase1 last IV:
2019-03-06 18:15:24: DEBUG:
149da16b ca29e854 3430c13b 1f4be936 ccb665ff
2019-03-06 18:15:24: DEBUG: hash(sha1)
2019-03-06 18:15:24: DEBUG: encryption(aes)
2019-03-06 18:15:24: DEBUG: phase2 IV computed:
2019-03-06 18:15:24: DEBUG:
fd44b30f abd63c9e d9df8668 ace3af70
2019-03-06 18:15:24: DEBUG: call pfkey_send_getspi
2019-03-06 18:15:24: DEBUG: pfkey GETSPI sent: ESP/Transport 195.149.70.70[0]->91.142.161.34[0]
2019-03-06 18:15:24: DEBUG: pfkey getspi sent.
2019-03-06 18:15:24: DEBUG: pk_recv: retry[0] recv()
2019-03-06 18:15:24: DEBUG: got pfkey GETSPI message
2019-03-06 18:15:24: DEBUG: pfkey GETSPI succeeded: ESP/Transport 195.149.70.70[500]->91.142.161.34[500] spi=86815198(0x52cb1de)
2019-03-06 18:15:24: DEBUG: hmac(modp2048)
2019-03-06 18:15:24: DEBUG: hmac(modp2048)
2019-03-06 18:15:24: DEBUG: hmac(modp2048)
2019-03-06 18:15:24: DEBUG: compute DH's private.
2019-03-06 18:15:24: DEBUG:
7b9403f4 0b645150 7bfca617 acb3139b f9ccfdb1 d5db5eee 2789d822 91f78353
6942f565 26a07c94 019ab5cf 34d6fb3a 30bc1e39 fa5eb0c7 259f3359 df6317fd
156e5d6e cae3a586 8e7e3aa3 2a526b65 1584a797 9ea0b1e5 5883089c 48be2549
ce65de0e 8317bd35 f200556e f6a28595 a56b63dc 8ba6690c 2855c160 50178dbf
278f87c5 c3580cfc 2befba29 a64f8378 6280e1ed 146e4848 23c55c4c afc49160
dad460d5 f88af2d8 2e81109e e40cae20 1a1b25bd bdc3571d 476d9cf2 36d59cea
2ea5dab9 a579663d 19fddef9 3b81fbee 171fdafc 959a6cbd c066cb25 e497151f
2b508208 5e5e64aa 30bd24bd 4973fbbb 9fa24eff 415c93f7 48a26111 76673a67
2019-03-06 18:15:24: DEBUG: compute DH's public.
2019-03-06 18:15:24: DEBUG:
b0f3b3e5 baa04931 ddc58026 a3568ea8 89a98054 b50bb349 50ce7bf1 37f72ddd
0f4a85c4 ae423397 1699e805 dd12ce87 d1a9bab0 c209891c 3283c95d 54884563
ec710e92 55cb7d04 208b8165 a942b6de e79ee812 7ac8cf8b d55c17d0 e8f2636b
24647640 6842e5a3 b5873d41 c9669261 bd67b8e5 f29df2a3 a89a54b8 57676a48
fc0d32e9 e0fc046f 79d459f0 efc309b1 f881c41c aaa9bf88 3a26d741 09a7a692
5b4689d1 734ffc19 55d2ce0f 9f464f90 96e1c3dc 7b4b7729 538ca5ce 9e573d71
a1153e82 5a0fc6d9 1d24df9e 168284c7 4b52a57b 3b7b9389 98cd7786 aa5b99ab
2b363d30 a354877e 3417ed4e df3aa8b7 a55a7192 e134f20c 73977790 fd00d28a
2019-03-06 18:15:24: DEBUG: use local ID type IPv4_address
2019-03-06 18:15:24: DEBUG: use remote ID type IPv4_address
2019-03-06 18:15:24: DEBUG: IDci:
2019-03-06 18:15:24: DEBUG:
01000000 5b8ea122
2019-03-06 18:15:24: DEBUG: IDcr:
2019-03-06 18:15:24: DEBUG:
01000000 c3954646
2019-03-06 18:15:24: DEBUG: add payload of len 48, next type 10
2019-03-06 18:15:24: DEBUG: add payload of len 16, next type 4
2019-03-06 18:15:24: DEBUG: add payload of len 256, next type 5
2019-03-06 18:15:24: DEBUG: add payload of len 8, next type 5
2019-03-06 18:15:24: DEBUG: add payload of len 8, next type 0
2019-03-06 18:15:24: DEBUG: HASH with:
2019-03-06 18:15:24: DEBUG:
ccb665ff 0a000034 00000001 00000001 00000028 01030401 052cb1de 0000001c
01030000 80010001 80027080 80040002 80050002 8003000e 04000014 b4d04d59
2e4c84d2 d116d897 fe47d9bd 05000104 b0f3b3e5 baa04931 ddc58026 a3568ea8
89a98054 b50bb349 50ce7bf1 37f72ddd 0f4a85c4 ae423397 1699e805 dd12ce87
d1a9bab0 c209891c 3283c95d 54884563 ec710e92 55cb7d04 208b8165 a942b6de
e79ee812 7ac8cf8b d55c17d0 e8f2636b 24647640 6842e5a3 b5873d41 c9669261
bd67b8e5 f29df2a3 a89a54b8 57676a48 fc0d32e9 e0fc046f 79d459f0 efc309b1
f881c41c aaa9bf88 3a26d741 09a7a692 5b4689d1 734ffc19 55d2ce0f 9f464f90
96e1c3dc 7b4b7729 538ca5ce 9e573d71 a1153e82 5a0fc6d9 1d24df9e 168284c7
4b52a57b 3b7b9389 98cd7786 aa5b99ab 2b363d30 a354877e 3417ed4e df3aa8b7
a55a7192 e134f20c 73977790 fd00d28a 0500000c 01000000 5b8ea122 0000000c
01000000 c3954646
2019-03-06 18:15:24: DEBUG: hmac(hmac_sha1)
2019-03-06 18:15:24: DEBUG: HASH computed:
2019-03-06 18:15:24: DEBUG:
bbe04e42 b56aa192 f36ae504 fe40a157 39e4759e
2019-03-06 18:15:24: DEBUG: add payload of len 20, next type 1
2019-03-06 18:15:24: DEBUG: begin encryption.
2019-03-06 18:15:24: DEBUG: encryption(aes)
2019-03-06 18:15:24: DEBUG: pad length = 4
2019-03-06 18:15:24: DEBUG:
01000018 bbe04e42 b56aa192 f36ae504 fe40a157 39e4759e 0a000034 00000001
00000001 00000028 01030401 052cb1de 0000001c 01030000 80010001 80027080
80040002 80050002 8003000e 04000014 b4d04d59 2e4c84d2 d116d897 fe47d9bd
05000104 b0f3b3e5 baa04931 ddc58026 a3568ea8 89a98054 b50bb349 50ce7bf1
37f72ddd 0f4a85c4 ae423397 1699e805 dd12ce87 d1a9bab0 c209891c 3283c95d
54884563 ec710e92 55cb7d04 208b8165 a942b6de e79ee812 7ac8cf8b d55c17d0
e8f2636b 24647640 6842e5a3 b5873d41 c9669261 bd67b8e5 f29df2a3 a89a54b8
57676a48 fc0d32e9 e0fc046f 79d459f0 efc309b1 f881c41c aaa9bf88 3a26d741
09a7a692 5b4689d1 734ffc19 55d2ce0f 9f464f90 96e1c3dc 7b4b7729 538ca5ce
9e573d71 a1153e82 5a0fc6d9 1d24df9e 168284c7 4b52a57b 3b7b9389 98cd7786
aa5b99ab 2b363d30 a354877e 3417ed4e df3aa8b7 a55a7192 e134f20c 73977790
fd00d28a 0500000c 01000000 5b8ea122 0000000c 01000000 c3954646 00000004
2019-03-06 18:15:24: DEBUG: encryption(aes)
2019-03-06 18:15:24: DEBUG: with key:
2019-03-06 18:15:24: DEBUG:
d3caae1b c055ffb5 f33d6820 ad21e1c9
2019-03-06 18:15:24: DEBUG: encrypted payload by IV:
2019-03-06 18:15:24: DEBUG:
fd44b30f abd63c9e d9df8668 ace3af70
2019-03-06 18:15:24: DEBUG: save IV for next:
2019-03-06 18:15:24: DEBUG:
83630a48 7d239f83 da1c9ad4 f5ac9560
2019-03-06 18:15:24: DEBUG: encrypted.
2019-03-06 18:15:24: DEBUG: 412 bytes from 91.142.161.34[500] to 195.149.70.70[500]
2019-03-06 18:15:24: DEBUG: sockname 91.142.161.34[500]
2019-03-06 18:15:24: DEBUG: send packet from 91.142.161.34[500]
2019-03-06 18:15:24: DEBUG: send packet to 195.149.70.70[500]
2019-03-06 18:15:24: DEBUG: 1 times of 412 bytes message will be sent to 195.149.70.70[500]
2019-03-06 18:15:24: DEBUG:
7313b867 fd51071a 8e9921c9 db706df6 08102001 ccb665ff 0000019c c50f4ad8
d4c23c5d 94613a59 86e91ccc 32f2d36e 4dadf9d1 6da9fbc3 c32ffd00 a5193fb9
6e5bedc8 0328d653 160c12b8 b4fb45b2 9fc0d73b 26bc67bb b526c29b 56412ee3
60736448 e8b2724d 1f93f975 1330cc20 04871b3b 3f197cfc 7a322d51 1a0c75a5
5895f4df 2f996235 1bf378cd a9188162 76eba2fc f9a17032 11bd7b28 36da83e2
1c86c20d 3c3a164e 9fbb216b 35cc5124 bfcabfe1 08ede6f6 a534da81 5c38f5e4
265d2b3e cfb28320 36de9e65 784a4219 4a736f83 ad1599bf b577f3fa 74b28042
244ea93b 048a6c23 545786f1 c05e8e4f 82810b7b 513d384d 88ae42fa fe726b0e
61a4dfda 0b6c3bf4 c25f6af2 ca78b3e2 7e84328f feab232e 24dfb739 4df439a0
7af2bb45 757729f3 1e257113 c7cebf1d da44b843 a2725a6a 878db25e 5d30c2f4
d6542132 05a30af5 c5500a80 e05827cc 88063624 8590ec43 89e12f53 d16a65b9
33ac378c 84316e9a 480f98ab e88d3db1 3e3940a1 e5da0b18 df73e937 c0b620d2
9ba8ba8c fa3efc68 0d4d19bf 83630a48 7d239f83 da1c9ad4 f5ac9560
2019-03-06 18:15:24: DEBUG: resend phase2 packet 7313b867fd51071a:8e9921c9db706df6:0000ccb6
2019-03-06 18:15:24: DEBUG: ===
2019-03-06 18:15:24: DEBUG: 92 bytes message received from 195.149.70.70[500] to 91.142.161.34[500]
2019-03-06 18:15:24: DEBUG:
7313b867 fd51071a 8e9921c9 db706df6 08100501 5be1b3bd 0000005c b90cd323
ccb6ef0c e3d057f3 5005fd49 640f12fe 3898a25a 5ddf23d7 39645f3a 46fd7e92
3c9467cd c7f647ea 5917c3eb ebbffa20 38fdb964 d68358d3 427cb9ea
2019-03-06 18:15:24: DEBUG: receive Information.
2019-03-06 18:15:24: DEBUG: compute IV for phase2
2019-03-06 18:15:24: DEBUG: phase1 last IV:
2019-03-06 18:15:24: DEBUG:
149da16b ca29e854 3430c13b 1f4be936 5be1b3bd
2019-03-06 18:15:24: DEBUG: hash(sha1)
2019-03-06 18:15:24: DEBUG: encryption(aes)
2019-03-06 18:15:24: DEBUG: phase2 IV computed:
2019-03-06 18:15:24: DEBUG:
c589ee5e 02283536 cae23446 6a2a968a
2019-03-06 18:15:24: DEBUG: begin decryption.
2019-03-06 18:15:24: DEBUG: encryption(aes)
2019-03-06 18:15:24: DEBUG: IV was saved for next processing:
2019-03-06 18:15:24: DEBUG:
ebbffa20 38fdb964 d68358d3 427cb9ea
2019-03-06 18:15:24: DEBUG: encryption(aes)
2019-03-06 18:15:24: DEBUG: with key:
2019-03-06 18:15:24: DEBUG:
d3caae1b c055ffb5 f33d6820 ad21e1c9
2019-03-06 18:15:24: DEBUG: decrypted payload by IV:
2019-03-06 18:15:24: DEBUG:
c589ee5e 02283536 cae23446 6a2a968a
2019-03-06 18:15:24: DEBUG: decrypted payload, but not trimed.
2019-03-06 18:15:24: DEBUG:
0c000018 b3351b6a e4d1f4c4 ff7c24c1 b8bce7d5 4f4413d3 0000001c 00000001
01100001 7313b867 fd51071a 8e9921c9 db706df6 00000000 00000000 00000000
2019-03-06 18:15:24: DEBUG: padding len=0
2019-03-06 18:15:24: DEBUG: skip to trim padding.
2019-03-06 18:15:24: DEBUG: decrypted.
2019-03-06 18:15:24: DEBUG:
7313b867 fd51071a 8e9921c9 db706df6 08100501 5be1b3bd 0000005c 0c000018
b3351b6a e4d1f4c4 ff7c24c1 b8bce7d5 4f4413d3 0000001c 00000001 01100001
7313b867 fd51071a 8e9921c9 db706df6 00000000 00000000 00000000
2019-03-06 18:15:24: DEBUG: IV freed
2019-03-06 18:15:24: DEBUG: HASH with:
2019-03-06 18:15:24: DEBUG:
5be1b3bd 0000001c 00000001 01100001 7313b867 fd51071a 8e9921c9 db706df6
2019-03-06 18:15:24: DEBUG: hmac(hmac_sha1)
2019-03-06 18:15:24: DEBUG: HASH computed:
2019-03-06 18:15:24: DEBUG:
b3351b6a e4d1f4c4 ff7c24c1 b8bce7d5 4f4413d3
2019-03-06 18:15:24: DEBUG: hash validated.
2019-03-06 18:15:24: DEBUG: begin.
2019-03-06 18:15:24: DEBUG: seen nptype=8(hash)
2019-03-06 18:15:24: DEBUG: seen nptype=12(delete)
2019-03-06 18:15:24: DEBUG: succeed.
2019-03-06 18:15:24: [195.149.70.70] DEBUG: delete payload for protocol ISAKMP
2019-03-06 18:15:24: INFO: ISAKMP-SA expired 91.142.161.34[500]-195.149.70.70[500] spi:7313b867fd51071a:8e9921c9db706df6
2019-03-06 18:15:24: DEBUG: IV freed
2019-03-06 18:15:24: INFO: ISAKMP-SA deleted 91.142.161.34[500]-195.149.70.70[500] spi:7313b867fd51071a:8e9921c9db706df6
2019-03-06 18:15:24: DEBUG: IV freed
2019-03-06 18:15:24: DEBUG: purged SAs.
2019-03-06 18:15:48: DEBUG: pk_recv: retry[0] recv()
2019-03-06 18:15:48: DEBUG: got pfkey ACQUIRE message
2019-03-06 18:15:48: DEBUG: suitable outbound SP found: 0.0.0.0/0[0] 0.0.0.0/0[1701] proto=any dir=out.
2019-03-06 18:15:48: DEBUG: sub:0x7fffffffe2e8: 0.0.0.0/0[1701] 0.0.0.0/0[0] proto=any dir=in
2019-03-06 18:15:48: DEBUG: db :0x80205e490: 0.0.0.0/0[1701] 0.0.0.0/0[0] proto=any dir=in
2019-03-06 18:15:48: DEBUG: suitable inbound SP found: 0.0.0.0/0[1701] 0.0.0.0/0[0] proto=any dir=in.
2019-03-06 18:15:48: DEBUG: new acquire 0.0.0.0/0[0] 0.0.0.0/0[1701] proto=any dir=out
2019-03-06 18:15:48: [195.149.70.70] DEBUG: configuration "195.149.70.70[500]" selected.
2019-03-06 18:15:48: DEBUG: getsainfo params: loc='0.0.0.0/0' rmt='0.0.0.0/0' peer='NULL' client='NULL' id=0
2019-03-06 18:15:48: DEBUG: evaluating sainfo: loc='ANONYMOUS', rmt='ANONYMOUS', peer='ANY', id=0
2019-03-06 18:15:48: DEBUG: check and compare ids : values matched (ANONYMOUS)
2019-03-06 18:15:48: DEBUG: check and compare ids : values matched (ANONYMOUS)
2019-03-06 18:15:48: DEBUG: selected sainfo: loc='ANONYMOUS', rmt='ANONYMOUS', peer='ANY', id=0
2019-03-06 18:15:48: DEBUG:  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Transport reqid=0:0)
2019-03-06 18:15:48: DEBUG:   (trns_id=3DES encklen=0 authtype=hmac-sha)
2019-03-06 18:15:48: DEBUG: in post_acquire
2019-03-06 18:15:48: [195.149.70.70] DEBUG: configuration "195.149.70.70[500]" selected.
2019-03-06 18:15:48: INFO: IPsec-SA request for 195.149.70.70 queued due to no phase1 found.
2019-03-06 18:15:48: DEBUG: ===
2019-03-06 18:15:48: INFO: initiate new phase 1 negotiation: 91.142.161.34[500]<=>195.149.70.70[500]
2019-03-06 18:15:48: INFO: begin Identity Protection mode.
2019-03-06 18:15:48: DEBUG: new cookie:
f22aff0406ae4408
2019-03-06 18:15:48: DEBUG: add payload of len 52, next type 13
2019-03-06 18:15:48: DEBUG: add payload of len 16, next type 0
2019-03-06 18:15:48: DEBUG: 104 bytes from 91.142.161.34[500] to 195.149.70.70[500]
2019-03-06 18:15:48: DEBUG: sockname 91.142.161.34[500]
2019-03-06 18:15:48: DEBUG: send packet from 91.142.161.34[500]
2019-03-06 18:15:48: DEBUG: send packet to 195.149.70.70[500]
2019-03-06 18:15:48: DEBUG: 1 times of 104 bytes message will be sent to 195.149.70.70[500]
2019-03-06 18:15:48: DEBUG:
f22aff04 06ae4408 00000000 00000000 01100200 00000000 00000068 0d000038
00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c7080
80010007 800e0080 80030001 80020002 80040002 00000014 afcad713 68a1f1c9
6b8696fc 77570100
2019-03-06 18:15:48: DEBUG: resend phase1 packet f22aff0406ae4408:0000000000000000
2019-03-06 18:15:48: DEBUG: ===
2019-03-06 18:15:48: DEBUG: 108 bytes message received from 195.149.70.70[500] to 91.142.161.34[500]
2019-03-06 18:15:48: DEBUG:
f22aff04 06ae4408 ce2a00a7 1b4c57e9 01100200 00000000 0000006c 0d000038
00000001 00000001 0000002c 01010001 00000024 01010000 80010007 800e0080
80020002 80040002 80030001 800b0001 800c7080 00000018 4048b7d5 6ebce885
25e7de7f 00d6c2d3 c0000000
2019-03-06 18:15:48: DEBUG: begin.
2019-03-06 18:15:48: DEBUG: seen nptype=1(sa)
2019-03-06 18:15:48: DEBUG: seen nptype=13(vid)
2019-03-06 18:15:48: DEBUG: succeed.
2019-03-06 18:15:48: INFO: received broken Microsoft ID: FRAGMENTATION
2019-03-06 18:15:48: DEBUG: total SA len=52
2019-03-06 18:15:48: DEBUG:
00000001 00000001 0000002c 01010001 00000024 01010000 80010007 800e0080
80020002 80040002 80030001 800b0001 800c7080
2019-03-06 18:15:48: DEBUG: begin.
2019-03-06 18:15:48: DEBUG: seen nptype=2(prop)
2019-03-06 18:15:48: DEBUG: succeed.
2019-03-06 18:15:48: DEBUG: proposal #1 len=44
2019-03-06 18:15:48: DEBUG: begin.
2019-03-06 18:15:48: DEBUG: seen nptype=3(trns)
2019-03-06 18:15:48: DEBUG: succeed.
2019-03-06 18:15:48: DEBUG: transform #1 len=36
2019-03-06 18:15:48: DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
2019-03-06 18:15:48: DEBUG: encryption(aes)
2019-03-06 18:15:48: DEBUG: type=Key Length, flag=0x8000, lorv=128
2019-03-06 18:15:48: DEBUG: type=Hash Algorithm, flag=0x8000, lorv=SHA
2019-03-06 18:15:48: DEBUG: hash(sha1)
2019-03-06 18:15:48: DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group
2019-03-06 18:15:48: DEBUG: hmac(modp1024)
2019-03-06 18:15:48: DEBUG: type=Authentication Method, flag=0x8000, lorv=pre-shared key
2019-03-06 18:15:48: DEBUG: type=Life Type, flag=0x8000, lorv=seconds
2019-03-06 18:15:48: DEBUG: type=Life Duration, flag=0x8000, lorv=28800
2019-03-06 18:15:48: DEBUG: pair 1:
2019-03-06 18:15:48: DEBUG:  0x802025c00: next=0x0 tnext=0x0
2019-03-06 18:15:48: DEBUG: proposal #1: 1 transform
2019-03-06 18:15:48: DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
2019-03-06 18:15:48: DEBUG: type=Key Length, flag=0x8000, lorv=128
2019-03-06 18:15:48: DEBUG: type=Hash Algorithm, flag=0x8000, lorv=SHA
2019-03-06 18:15:48: DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group
2019-03-06 18:15:48: DEBUG: type=Authentication Method, flag=0x8000, lorv=pre-shared key
2019-03-06 18:15:48: DEBUG: type=Life Type, flag=0x8000, lorv=seconds
2019-03-06 18:15:48: DEBUG: type=Life Duration, flag=0x8000, lorv=28800
2019-03-06 18:15:48: DEBUG: prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1
2019-03-06 18:15:48: DEBUG: trns#=1, trns-id=IKE
2019-03-06 18:15:48: DEBUG:   lifetime = 28800
2019-03-06 18:15:48: DEBUG:   lifebyte = 0
2019-03-06 18:15:48: DEBUG:   enctype = AES-CBC
2019-03-06 18:15:48: DEBUG:   encklen = 128
2019-03-06 18:15:48: DEBUG:   hashtype = SHA
2019-03-06 18:15:48: DEBUG:   authmethod = pre-shared key
2019-03-06 18:15:48: DEBUG:   dh_group = 1024-bit MODP group
2019-03-06 18:15:48: DEBUG: an acceptable proposal found.
2019-03-06 18:15:48: DEBUG: hmac(modp1024)
2019-03-06 18:15:48: DEBUG: agreed on pre-shared key auth.
2019-03-06 18:15:48: DEBUG: ===
2019-03-06 18:15:48: DEBUG: compute DH's private.
2019-03-06 18:15:48: DEBUG:
676b467c 08cbed95 5ef7c7d0 488e0b00 e72a7669 d18bfe8c ef2bc5ef 060a97a3
f5c5ad57 62a9ed6d 0c2e69c0 403dafb2 39902801 6aec7a6b 5ee40ad4 d2966cb6
9f22e288 498ed14c 74182f32 098c57dd 4a9535dd a40e0af6 990070a2 a5dd663e
dc4af5fd fecd67f7 113fdd4d 1a2e7daa 39b9c75f d8d95c01 3513a470 e7d2e8c2
2019-03-06 18:15:48: DEBUG: compute DH's public.
2019-03-06 18:15:48: DEBUG:
5a407cf3 49d7dd9a 3ce5d324 57335ca2 712cf519 ab8372da eb90fc69 69d83f41
0a9edf81 27ac53a9 c1261651 6df745c3 94117ab2 865f3c13 f412677b 00aab5f5
6fcee677 742e7073 de41d225 732bd745 ae43385d 2230edd6 d2e2ab36 dbd688e9
09ff4d01 0fe6252d 0f0d2af1 ab7df955 fd8b16fd b3c429b1 dd7e674d ad31a44d
2019-03-06 18:15:48: DEBUG: add payload of len 128, next type 10
2019-03-06 18:15:48: DEBUG: add payload of len 16, next type 0
2019-03-06 18:15:48: DEBUG: 180 bytes from 91.142.161.34[500] to 195.149.70.70[500]
2019-03-06 18:15:48: DEBUG: sockname 91.142.161.34[500]
2019-03-06 18:15:48: DEBUG: send packet from 91.142.161.34[500]
2019-03-06 18:15:48: DEBUG: send packet to 195.149.70.70[500]
2019-03-06 18:15:48: DEBUG: 1 times of 180 bytes message will be sent to 195.149.70.70[500]
2019-03-06 18:15:48: DEBUG:
f22aff04 06ae4408 ce2a00a7 1b4c57e9 04100200 00000000 000000b4 0a000084
5a407cf3 49d7dd9a 3ce5d324 57335ca2 712cf519 ab8372da eb90fc69 69d83f41
0a9edf81 27ac53a9 c1261651 6df745c3 94117ab2 865f3c13 f412677b 00aab5f5
6fcee677 742e7073 de41d225 732bd745 ae43385d 2230edd6 d2e2ab36 dbd688e9
09ff4d01 0fe6252d 0f0d2af1 ab7df955 fd8b16fd b3c429b1 dd7e674d ad31a44d
00000014 dc5c8e1a 9afb46ee 828f818c 58835fef
2019-03-06 18:15:48: DEBUG: resend phase1 packet f22aff0406ae4408:ce2a00a71b4c57e9
2019-03-06 18:15:48: DEBUG: ===
2019-03-06 18:15:48: DEBUG: 256 bytes message received from 195.149.70.70[500] to 91.142.161.34[500]
2019-03-06 18:15:48: DEBUG:
f22aff04 06ae4408 ce2a00a7 1b4c57e9 04100200 00000000 00000100 0a000084
c9a72e21 98300db9 89901cfa 28caeb86 181dbd35 79f780e8 f28aaec6 69ab64e3
462cf08d b6118521 9b7fa229 d50294bb d347fe8d 34fd5edc 4325dff0 b4cbffab
af52876d baf701b3 04552b1e 1634396b 861691e0 d1b78326 5977d7bd bb76e5da
2bd73736 66132957 a36b6dda b0d49833 a94ee3a3 1282342d 0c1df2e7 17608a39
0d000018 6573eaaf 61ac4f37 3b22e4d5 573fb12f 882a1dbf 0d000014 12f5f28c
457168a9 702d9fe2 74cc0100 0d00000c 09002689 dfd6b712 0d000014 3beda7ba
1b4d57e9 e8a9ea04 d3ac41b2 00000014 1f07f70e aa6514d3 b0fa9654 2a500100
2019-03-06 18:15:48: DEBUG: begin.
2019-03-06 18:15:48: DEBUG: seen nptype=4(ke)
2019-03-06 18:15:48: DEBUG: seen nptype=10(nonce)
2019-03-06 18:15:48: DEBUG: seen nptype=13(vid)
2019-03-06 18:15:48: DEBUG: seen nptype=13(vid)
2019-03-06 18:15:48: DEBUG: seen nptype=13(vid)
2019-03-06 18:15:48: DEBUG: seen nptype=13(vid)
2019-03-06 18:15:48: DEBUG: succeed.
2019-03-06 18:15:48: INFO: received Vendor ID: CISCO-UNITY
2019-03-06 18:15:48: INFO: received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt
2019-03-06 18:15:48: DEBUG: received unknown Vendor ID
2019-03-06 18:15:48: DEBUG:
3beda7ba 1b4d57e9 e8a9ea04 d3ac41b2
2019-03-06 18:15:48: DEBUG: received unknown Vendor ID
2019-03-06 18:15:48: DEBUG:
1f07f70e aa6514d3 b0fa9654 2a500100
2019-03-06 18:15:48: DEBUG: ===
2019-03-06 18:15:48: DEBUG: compute DH's shared.
2019-03-06 18:15:48: DEBUG:
29168a44 01f752d4 b58e8701 534dfa83 596e0fc9 2a613e98 899bcb6d ca82d689
03267664 be921847 5b1408aa c3e1c49e 0c0d46ec 9a7e5255 f26af5c3 12d4e6ac
0f297f3c 9856eb70 e70be703 3253dbec 0f056ffa fe8e17b2 b18fb3bf fa014a45
babe5ebb 6170c8c3 49c5b1c1 1e9b37e0 2d14d38d f6672a44 c5b5ce70 d815732a
2019-03-06 18:15:48: DEBUG: the psk found.
2019-03-06 18:15:48: DEBUG: nonce 1: 2019-03-06 18:15:48: DEBUG:
dc5c8e1a 9afb46ee 828f818c 58835fef
2019-03-06 18:15:48: DEBUG: nonce 2: 2019-03-06 18:15:48: DEBUG:
6573eaaf 61ac4f37 3b22e4d5 573fb12f 882a1dbf
2019-03-06 18:15:48: DEBUG: hmac(hmac_sha1)
2019-03-06 18:15:48: DEBUG: SKEYID computed:
2019-03-06 18:15:48: DEBUG:
651fbd7d e293bd4e fe87ae7a 061a9a3a 9fe47fcc
2019-03-06 18:15:48: DEBUG: hmac(hmac_sha1)
2019-03-06 18:15:48: DEBUG: SKEYID_d computed:
2019-03-06 18:15:48: DEBUG:
d7b13581 4141ce3c e6f41e2f f932a8ca d5eb3c5e
2019-03-06 18:15:48: DEBUG: hmac(hmac_sha1)
2019-03-06 18:15:48: DEBUG: SKEYID_a computed:
2019-03-06 18:15:48: DEBUG:
e1da123f b4a383c3 e943b784 504d29f3 50a784cf
2019-03-06 18:15:48: DEBUG: hmac(hmac_sha1)
2019-03-06 18:15:48: DEBUG: SKEYID_e computed:
2019-03-06 18:15:48: DEBUG:
b3f533fd 7c635199 bb9d27cd 7da02927 7017ebba
2019-03-06 18:15:48: DEBUG: encryption(aes)
2019-03-06 18:15:48: DEBUG: hash(sha1)
2019-03-06 18:15:48: DEBUG: final encryption key computed:
2019-03-06 18:15:48: DEBUG:
b3f533fd 7c635199 bb9d27cd 7da02927
2019-03-06 18:15:48: DEBUG: hash(sha1)
2019-03-06 18:15:48: DEBUG: encryption(aes)
2019-03-06 18:15:48: DEBUG: IV computed:
2019-03-06 18:15:48: DEBUG:
9d3385c6 61b5cbe2 86a27fb8 df39725a
2019-03-06 18:15:48: DEBUG: use ID type of IPv4_address
2019-03-06 18:15:48: DEBUG: HASH with:
2019-03-06 18:15:48: DEBUG:
5a407cf3 49d7dd9a 3ce5d324 57335ca2 712cf519 ab8372da eb90fc69 69d83f41
0a9edf81 27ac53a9 c1261651 6df745c3 94117ab2 865f3c13 f412677b 00aab5f5
6fcee677 742e7073 de41d225 732bd745 ae43385d 2230edd6 d2e2ab36 dbd688e9
09ff4d01 0fe6252d 0f0d2af1 ab7df955 fd8b16fd b3c429b1 dd7e674d ad31a44d
c9a72e21 98300db9 89901cfa 28caeb86 181dbd35 79f780e8 f28aaec6 69ab64e3
462cf08d b6118521 9b7fa229 d50294bb d347fe8d 34fd5edc 4325dff0 b4cbffab
af52876d baf701b3 04552b1e 1634396b 861691e0 d1b78326 5977d7bd bb76e5da
2bd73736 66132957 a36b6dda b0d49833 a94ee3a3 1282342d 0c1df2e7 17608a39
f22aff04 06ae4408 ce2a00a7 1b4c57e9 00000001 00000001 0000002c 01010001
00000024 01010000 800b0001 800c7080 80010007 800e0080 80030001 80020002
80040002 011101f4 5b8ea122
2019-03-06 18:15:48: DEBUG: hmac(hmac_sha1)
2019-03-06 18:15:48: DEBUG: HASH (init) computed:
2019-03-06 18:15:48: DEBUG:
c8c80531 25047c9d 9ad636f1 43787ede a2b0c779
2019-03-06 18:15:48: DEBUG: add payload of len 8, next type 8
2019-03-06 18:15:48: DEBUG: add payload of len 20, next type 0
2019-03-06 18:15:48: DEBUG: begin encryption.
2019-03-06 18:15:48: DEBUG: encryption(aes)
2019-03-06 18:15:48: DEBUG: pad length = 12
2019-03-06 18:15:48: DEBUG:
0800000c 011101f4 5b8ea122 00000018 c8c80531 25047c9d 9ad636f1 43787ede
a2b0c779 00000000 00000000 0000000c
2019-03-06 18:15:48: DEBUG: encryption(aes)
2019-03-06 18:15:48: DEBUG: with key:
2019-03-06 18:15:48: DEBUG:
b3f533fd 7c635199 bb9d27cd 7da02927
2019-03-06 18:15:48: DEBUG: encrypted payload by IV:
2019-03-06 18:15:48: DEBUG:
9d3385c6 61b5cbe2 86a27fb8 df39725a
2019-03-06 18:15:48: DEBUG: save IV for next:
2019-03-06 18:15:48: DEBUG:
8861feb6 b094c9ed 347b1ef8 cc064c3a
2019-03-06 18:15:48: DEBUG: encrypted.
2019-03-06 18:15:48: DEBUG: 76 bytes from 91.142.161.34[500] to 195.149.70.70[500]
2019-03-06 18:15:48: DEBUG: sockname 91.142.161.34[500]
2019-03-06 18:15:48: DEBUG: send packet from 91.142.161.34[500]
2019-03-06 18:15:48: DEBUG: send packet to 195.149.70.70[500]
2019-03-06 18:15:48: DEBUG: 1 times of 76 bytes message will be sent to 195.149.70.70[500]
2019-03-06 18:15:48: DEBUG:
f22aff04 06ae4408 ce2a00a7 1b4c57e9 05100201 00000000 0000004c 7e99c758
f396108f b770f293 19e2ddb9 91a2c66f bdb03302 6e0bf751 66b42de1 8861feb6
b094c9ed 347b1ef8 cc064c3a
2019-03-06 18:15:48: DEBUG: resend phase1 packet f22aff0406ae4408:ce2a00a71b4c57e9
2019-03-06 18:15:48: DEBUG: ===
2019-03-06 18:15:48: DEBUG: 92 bytes message received from 195.149.70.70[500] to 91.142.161.34[500]
2019-03-06 18:15:48: DEBUG:
f22aff04 06ae4408 ce2a00a7 1b4c57e9 05100201 00000000 0000005c d5969b51
d222eee6 1ddaf302 fa6e86fe c9b59266 c923968e 6fe141e0 bb1f917c 4021b043
e261ab53 9b3717d3 f9b35f45 dbbf2f7f bcc3f62b 29233b39 dcdeb43d
2019-03-06 18:15:48: DEBUG: begin decryption.
2019-03-06 18:15:48: DEBUG: encryption(aes)
2019-03-06 18:15:48: DEBUG: IV was saved for next processing:
2019-03-06 18:15:48: DEBUG:
dbbf2f7f bcc3f62b 29233b39 dcdeb43d
2019-03-06 18:15:48: DEBUG: encryption(aes)
2019-03-06 18:15:48: DEBUG: with key:
2019-03-06 18:15:48: DEBUG:
b3f533fd 7c635199 bb9d27cd 7da02927
2019-03-06 18:15:48: DEBUG: decrypted payload by IV:
2019-03-06 18:15:48: DEBUG:
8861feb6 b094c9ed 347b1ef8 cc064c3a
2019-03-06 18:15:48: DEBUG: decrypted payload, but not trimed.
2019-03-06 18:15:48: DEBUG:
0800000c 011101f4 c3954646 0d000018 612b3b8c 8e679637 7935bfb5 d053548c
89e228c3 00000014 afcad713 68a1f1c9 6b8696fc 77570100 00000000 00000000
2019-03-06 18:15:48: DEBUG: padding len=0
2019-03-06 18:15:48: DEBUG: skip to trim padding.
2019-03-06 18:15:48: DEBUG: decrypted.
2019-03-06 18:15:48: DEBUG:
f22aff04 06ae4408 ce2a00a7 1b4c57e9 05100201 00000000 0000005c 0800000c
011101f4 c3954646 0d000018 612b3b8c 8e679637 7935bfb5 d053548c 89e228c3
00000014 afcad713 68a1f1c9 6b8696fc 77570100 00000000 00000000
2019-03-06 18:15:48: DEBUG: begin.
2019-03-06 18:15:48: DEBUG: seen nptype=5(id)
2019-03-06 18:15:48: DEBUG: seen nptype=8(hash)
2019-03-06 18:15:48: DEBUG: seen nptype=13(vid)
2019-03-06 18:15:48: DEBUG: succeed.
2019-03-06 18:15:48: INFO: received Vendor ID: DPD
2019-03-06 18:15:48: DEBUG: remote supports DPD
2019-03-06 18:15:48: DEBUG: HASH received:
2019-03-06 18:15:48: DEBUG:
612b3b8c 8e679637 7935bfb5 d053548c 89e228c3
2019-03-06 18:15:48: DEBUG: HASH with:
2019-03-06 18:15:48: DEBUG:
c9a72e21 98300db9 89901cfa 28caeb86 181dbd35 79f780e8 f28aaec6 69ab64e3
462cf08d b6118521 9b7fa229 d50294bb d347fe8d 34fd5edc 4325dff0 b4cbffab
af52876d baf701b3 04552b1e 1634396b 861691e0 d1b78326 5977d7bd bb76e5da
2bd73736 66132957 a36b6dda b0d49833 a94ee3a3 1282342d 0c1df2e7 17608a39
5a407cf3 49d7dd9a 3ce5d324 57335ca2 712cf519 ab8372da eb90fc69 69d83f41
0a9edf81 27ac53a9 c1261651 6df745c3 94117ab2 865f3c13 f412677b 00aab5f5
6fcee677 742e7073 de41d225 732bd745 ae43385d 2230edd6 d2e2ab36 dbd688e9
09ff4d01 0fe6252d 0f0d2af1 ab7df955 fd8b16fd b3c429b1 dd7e674d ad31a44d
ce2a00a7 1b4c57e9 f22aff04 06ae4408 00000001 00000001 0000002c 01010001
00000024 01010000 800b0001 800c7080 80010007 800e0080 80030001 80020002
80040002 011101f4 c3954646
2019-03-06 18:15:48: DEBUG: hmac(hmac_sha1)
2019-03-06 18:15:48: DEBUG: HASH (init) computed:
2019-03-06 18:15:48: DEBUG:
612b3b8c 8e679637 7935bfb5 d053548c 89e228c3
2019-03-06 18:15:48: DEBUG: HASH for PSK validated.
2019-03-06 18:15:48: [195.149.70.70] DEBUG: peer's ID:2019-03-06 18:15:48: DEBUG:
011101f4 c3954646
2019-03-06 18:15:48: DEBUG: ===
2019-03-06 18:15:48: INFO: ISAKMP-SA established 91.142.161.34[500]-195.149.70.70[500] spi:f22aff0406ae4408:ce2a00a71b4c57e9
2019-03-06 18:15:48: DEBUG: ===
2019-03-06 18:15:49: DEBUG: ===
2019-03-06 18:15:49: DEBUG: begin QUICK mode.
2019-03-06 18:15:49: INFO: initiate new phase 2 negotiation: 91.142.161.34[500]<=>195.149.70.70[500]
2019-03-06 18:15:49: DEBUG: compute IV for phase2
2019-03-06 18:15:49: DEBUG: phase1 last IV:
2019-03-06 18:15:49: DEBUG:
dbbf2f7f bcc3f62b 29233b39 dcdeb43d f43977e0
2019-03-06 18:15:49: DEBUG: hash(sha1)
2019-03-06 18:15:49: DEBUG: encryption(aes)
2019-03-06 18:15:49: DEBUG: phase2 IV computed:
2019-03-06 18:15:49: DEBUG:
3b7a879e 3c71be96 da8d3239 387cdfd4
2019-03-06 18:15:49: DEBUG: call pfkey_send_getspi
2019-03-06 18:15:49: DEBUG: pfkey GETSPI sent: ESP/Transport 195.149.70.70[0]->91.142.161.34[0]
2019-03-06 18:15:49: DEBUG: pfkey getspi sent.
2019-03-06 18:15:49: DEBUG: pk_recv: retry[0] recv()
2019-03-06 18:15:49: DEBUG: got pfkey GETSPI message
2019-03-06 18:15:49: DEBUG: pfkey GETSPI succeeded: ESP/Transport 195.149.70.70[500]->91.142.161.34[500] spi=253818442(0xf20f64a)
2019-03-06 18:15:49: DEBUG: hmac(modp2048)
2019-03-06 18:15:49: DEBUG: hmac(modp2048)
2019-03-06 18:15:49: DEBUG: hmac(modp2048)
2019-03-06 18:15:49: DEBUG: compute DH's private.
2019-03-06 18:15:49: DEBUG:
721a0049 f30db4b1 063845cd 2e289e05 1752f710 54918310 cf2ecbff 605cbab5
19770031 99bbe391 22e86214 44a45370 f08b6550 f68ba079 787a00f7 3c9bc373
029ac97b 3eae8d08 8987a8c8 53658671 7f3ffe84 ee0859e8 bec81f25 d68da0ee
88e08b3e c07d8432 a2a72e44 f77a5115 106265b5 b3eecd03 37ef26a4 49f56b39
5334cbb8 ba7cacd5 806e38ec a5e4d3b3 ee58e039 4315c5ce 131983fa 4e43a042
e596b23b 791e34d0 7ad4bdbf cbf4d3af a7cf070a 5ae75d32 8f10a3ee 410bc132
0651e1ba 0c1c548e bdc3136a 09db9aa7 6b57c9ea 1d2a18c8 14c965af 5ec3fd89
cef11e39 0dd5317c 4b1f9f52 d4f91d10 df00ad3f 501411dc 60de1e27 91f89b1b
2019-03-06 18:15:49: DEBUG: compute DH's public.
2019-03-06 18:15:49: DEBUG:
ae5d1fd8 95ac0379 c2c918db f5a60969 e350b9f8 788ff3f3 7d829f38 12802a58
dfcf58bc 0f7561b2 2fabe32e 8e1f426c 2ba78a1a ad70ff22 780e2948 2ef9118c
2c56491a 3bd9fc3f abef79ec ef89be56 492a63b9 b53580d8 4e289292 acc1cc16
56d24242 4bafc687 528f3457 7f52acfe fe5ae280 44204c20 374ef3a5 154ae5da
554f1cda 39b4244d 038fd216 4c183f6c 4e2365ac 295527b3 bf94b4a4 00a26405
e5bd1b40 d07bcaeb 2a459f49 0d90cb02 76b866c9 079a6df6 2c627c4b 2a0f9967
447fe0cf b9c26615 2c35cef1 3eae9c83 f81109ed 5fa01e74 d3f38947 69efc194
781e0151 1cab0b34 90ec8e4b 60323220 d5c0015b ae358c58 e386e012 d4b3af0b
2019-03-06 18:15:49: DEBUG: use local ID type IPv4_address
2019-03-06 18:15:49: DEBUG: use remote ID type IPv4_address
2019-03-06 18:15:49: DEBUG: IDci:
2019-03-06 18:15:49: DEBUG:
01000000 5b8ea122
2019-03-06 18:15:49: DEBUG: IDcr:
2019-03-06 18:15:49: DEBUG:
01000000 c3954646
2019-03-06 18:15:49: DEBUG: add payload of len 48, next type 10
2019-03-06 18:15:49: DEBUG: add payload of len 16, next type 4
2019-03-06 18:15:49: DEBUG: add payload of len 256, next type 5
2019-03-06 18:15:49: DEBUG: add payload of len 8, next type 5
2019-03-06 18:15:49: DEBUG: add payload of len 8, next type 0
2019-03-06 18:15:49: DEBUG: HASH with:
2019-03-06 18:15:49: DEBUG:
f43977e0 0a000034 00000001 00000001 00000028 01030401 0f20f64a 0000001c
01030000 80010001 80027080 80040002 80050002 8003000e 04000014 bbc215fc
e1df686d b4a514a9 1194a4b2 05000104 ae5d1fd8 95ac0379 c2c918db f5a60969
e350b9f8 788ff3f3 7d829f38 12802a58 dfcf58bc 0f7561b2 2fabe32e 8e1f426c
2ba78a1a ad70ff22 780e2948 2ef9118c 2c56491a 3bd9fc3f abef79ec ef89be56
492a63b9 b53580d8 4e289292 acc1cc16 56d24242 4bafc687 528f3457 7f52acfe
fe5ae280 44204c20 374ef3a5 154ae5da 554f1cda 39b4244d 038fd216 4c183f6c
4e2365ac 295527b3 bf94b4a4 00a26405 e5bd1b40 d07bcaeb 2a459f49 0d90cb02
76b866c9 079a6df6 2c627c4b 2a0f9967 447fe0cf b9c26615 2c35cef1 3eae9c83
f81109ed 5fa01e74 d3f38947 69efc194 781e0151 1cab0b34 90ec8e4b 60323220
d5c0015b ae358c58 e386e012 d4b3af0b 0500000c 01000000 5b8ea122 0000000c
01000000 c3954646
2019-03-06 18:15:49: DEBUG: hmac(hmac_sha1)
2019-03-06 18:15:49: DEBUG: HASH computed:
2019-03-06 18:15:49: DEBUG:
28d41739 722f9b5b 83eaa320 235a5322 e6c2b791
2019-03-06 18:15:49: DEBUG: add payload of len 20, next type 1
2019-03-06 18:15:49: DEBUG: begin encryption.
2019-03-06 18:15:49: DEBUG: encryption(aes)
2019-03-06 18:15:49: DEBUG: pad length = 4
2019-03-06 18:15:49: DEBUG:
01000018 28d41739 722f9b5b 83eaa320 235a5322 e6c2b791 0a000034 00000001
00000001 00000028 01030401 0f20f64a 0000001c 01030000 80010001 80027080
80040002 80050002 8003000e 04000014 bbc215fc e1df686d b4a514a9 1194a4b2
05000104 ae5d1fd8 95ac0379 c2c918db f5a60969 e350b9f8 788ff3f3 7d829f38
12802a58 dfcf58bc 0f7561b2 2fabe32e 8e1f426c 2ba78a1a ad70ff22 780e2948
2ef9118c 2c56491a 3bd9fc3f abef79ec ef89be56 492a63b9 b53580d8 4e289292
acc1cc16 56d24242 4bafc687 528f3457 7f52acfe fe5ae280 44204c20 374ef3a5
154ae5da 554f1cda 39b4244d 038fd216 4c183f6c 4e2365ac 295527b3 bf94b4a4
00a26405 e5bd1b40 d07bcaeb 2a459f49 0d90cb02 76b866c9 079a6df6 2c627c4b
2a0f9967 447fe0cf b9c26615 2c35cef1 3eae9c83 f81109ed 5fa01e74 d3f38947
69efc194 781e0151 1cab0b34 90ec8e4b 60323220 d5c0015b ae358c58 e386e012
d4b3af0b 0500000c 01000000 5b8ea122 0000000c 01000000 c3954646 00000004
2019-03-06 18:15:49: DEBUG: encryption(aes)
2019-03-06 18:15:49: DEBUG: with key:
2019-03-06 18:15:49: DEBUG:
b3f533fd 7c635199 bb9d27cd 7da02927
2019-03-06 18:15:49: DEBUG: encrypted payload by IV:
2019-03-06 18:15:49: DEBUG:
3b7a879e 3c71be96 da8d3239 387cdfd4
2019-03-06 18:15:49: DEBUG: save IV for next:
2019-03-06 18:15:49: DEBUG:
abc167ba 7de7d443 73505dd4 a4ff039a
2019-03-06 18:15:49: DEBUG: encrypted.
2019-03-06 18:15:49: DEBUG: 412 bytes from 91.142.161.34[500] to 195.149.70.70[500]
2019-03-06 18:15:49: DEBUG: sockname 91.142.161.34[500]
2019-03-06 18:15:49: DEBUG: send packet from 91.142.161.34[500]
2019-03-06 18:15:49: DEBUG: send packet to 195.149.70.70[500]
2019-03-06 18:15:49: DEBUG: 1 times of 412 bytes message will be sent to 195.149.70.70[500]
2019-03-06 18:15:49: DEBUG:
f22aff04 06ae4408 ce2a00a7 1b4c57e9 08102001 f43977e0 0000019c 8e599ec2
a2691362 8ac6b8bf c03ad71b 2f4271f3 1cfb5dcc c64d96bd d2787325 3462c6f7
ae072ffa 9c1c5ccb 0ce8f3e1 f098b348 ac3998f4 47b18145 3d8fd376 e09ed09c
0c7d62ce 4f07472d 87ba6244 b3158137 87fc7018 1d9154f7 5e1d6bf8 e9ef215b
0333d002 3493e5c2 d39673fe f585ce41 aeefccb8 b8f4b68e a79202de 644bfa00
6afcff1a 575edcd7 395f6e1b 0165ef0c 334b83a5 7d495767 95bd5ca9 9a19c12c
dc743ff0 d70646ac 2623d067 cb5b3197 89416196 d919ba04 8a9163b3 dd6466e3
e6c9eebd a70231df 3127f558 9cf9ddf9 76adf085 52423214 52e9aa7e 46a74446
46e41c7a 23b3998c 7a0518c6 9834118b 3dabf4b9 4a3c359c cd28061a 3fa0df28
67363bb3 6e1ff61a 4477a388 79861b76 30745409 1fe8d5a8 763dd45e d703ca22
d3c2b772 aeea7f8f 445071a3 acd1b761 a9c037bb 3374d951 c066c866 85dc4f28
f72748d7 5c9dce4a 4886d413 df2187da 32a1491f 88064bb7 e46fb0e4 954a72d2
b957e85f de18f497 670dd618 abc167ba 7de7d443 73505dd4 a4ff039a
2019-03-06 18:15:49: DEBUG: resend phase2 packet f22aff0406ae4408:ce2a00a71b4c57e9:0000f439
2019-03-06 18:15:49: DEBUG: ===
2019-03-06 18:15:49: DEBUG: 92 bytes message received from 195.149.70.70[500] to 91.142.161.34[500]
2019-03-06 18:15:49: DEBUG:
f22aff04 06ae4408 ce2a00a7 1b4c57e9 08100501 a17a5ee4 0000005c 50272711
368af5c6 7a54a079 6689a26e 012aa79c 393d923f 4e14ab05 02e03e74 d3367441
42a15aa0 631a8dc8 08043c56 07c4e602 0c2f99d5 397cffe8 51345336
2019-03-06 18:15:49: DEBUG: receive Information.
2019-03-06 18:15:49: DEBUG: compute IV for phase2
2019-03-06 18:15:49: DEBUG: phase1 last IV:
2019-03-06 18:15:49: DEBUG:
dbbf2f7f bcc3f62b 29233b39 dcdeb43d a17a5ee4
2019-03-06 18:15:49: DEBUG: hash(sha1)
2019-03-06 18:15:49: DEBUG: encryption(aes)
2019-03-06 18:15:49: DEBUG: phase2 IV computed:
2019-03-06 18:15:49: DEBUG:
372a9ef8 91a17e08 87d155ba a572c30c
2019-03-06 18:15:49: DEBUG: begin decryption.
2019-03-06 18:15:49: DEBUG: encryption(aes)
2019-03-06 18:15:49: DEBUG: IV was saved for next processing:
2019-03-06 18:15:49: DEBUG:
07c4e602 0c2f99d5 397cffe8 51345336
2019-03-06 18:15:49: DEBUG: encryption(aes)
2019-03-06 18:15:49: DEBUG: with key:
2019-03-06 18:15:49: DEBUG:
b3f533fd 7c635199 bb9d27cd 7da02927
2019-03-06 18:15:49: DEBUG: decrypted payload by IV:
2019-03-06 18:15:49: DEBUG:
372a9ef8 91a17e08 87d155ba a572c30c
2019-03-06 18:15:49: DEBUG: decrypted payload, but not trimed.
2019-03-06 18:15:49: DEBUG:
0c000018 7ce6a504 b1c7e963 c628e4fe 45c3fa49 604edfbe 0000001c 00000001
01100001 f22aff04 06ae4408 ce2a00a7 1b4c57e9 00000000 00000000 00000000
2019-03-06 18:15:49: DEBUG: padding len=0
2019-03-06 18:15:49: DEBUG: skip to trim padding.
2019-03-06 18:15:49: DEBUG: decrypted.
2019-03-06 18:15:49: DEBUG:
f22aff04 06ae4408 ce2a00a7 1b4c57e9 08100501 a17a5ee4 0000005c 0c000018
7ce6a504 b1c7e963 c628e4fe 45c3fa49 604edfbe 0000001c 00000001 01100001
f22aff04 06ae4408 ce2a00a7 1b4c57e9 00000000 00000000 00000000
2019-03-06 18:15:49: DEBUG: IV freed
2019-03-06 18:15:49: DEBUG: HASH with:
2019-03-06 18:15:49: DEBUG:
a17a5ee4 0000001c 00000001 01100001 f22aff04 06ae4408 ce2a00a7 1b4c57e9
2019-03-06 18:15:49: DEBUG: hmac(hmac_sha1)
2019-03-06 18:15:49: DEBUG: HASH computed:
2019-03-06 18:15:49: DEBUG:
7ce6a504 b1c7e963 c628e4fe 45c3fa49 604edfbe
2019-03-06 18:15:49: DEBUG: hash validated.
2019-03-06 18:15:49: DEBUG: begin.
2019-03-06 18:15:49: DEBUG: seen nptype=8(hash)
2019-03-06 18:15:49: DEBUG: seen nptype=12(delete)
2019-03-06 18:15:49: DEBUG: succeed.
2019-03-06 18:15:49: [195.149.70.70] DEBUG: delete payload for protocol ISAKMP
2019-03-06 18:15:49: INFO: ISAKMP-SA expired 91.142.161.34[500]-195.149.70.70[500] spi:f22aff0406ae4408:ce2a00a71b4c57e9
2019-03-06 18:15:49: DEBUG: IV freed
2019-03-06 18:15:49: INFO: ISAKMP-SA deleted 91.142.161.34[500]-195.149.70.70[500] spi:f22aff0406ae4408:ce2a00a71b4c57e9
2019-03-06 18:15:49: DEBUG: IV freed
2019-03-06 18:15:49: DEBUG: purged SAs.
2019-03-06 18:16:18: DEBUG: pk_recv: retry[0] recv()
2019-03-06 18:16:18: DEBUG: got pfkey ACQUIRE message
2019-03-06 18:16:18: DEBUG: suitable outbound SP found: 0.0.0.0/0[0] 0.0.0.0/0[1701] proto=any dir=out.
2019-03-06 18:16:18: DEBUG: sub:0x7fffffffe2e8: 0.0.0.0/0[1701] 0.0.0.0/0[0] proto=any dir=in
2019-03-06 18:16:18: DEBUG: db :0x80205e490: 0.0.0.0/0[1701] 0.0.0.0/0[0] proto=any dir=in
2019-03-06 18:16:18: DEBUG: suitable inbound SP found: 0.0.0.0/0[1701] 0.0.0.0/0[0] proto=any dir=in.
2019-03-06 18:16:18: DEBUG: new acquire 0.0.0.0/0[0] 0.0.0.0/0[1701] proto=any dir=out
2019-03-06 18:16:18: [195.149.70.70] DEBUG: configuration "195.149.70.70[500]" selected.
2019-03-06 18:16:18: DEBUG: getsainfo params: loc='0.0.0.0/0' rmt='0.0.0.0/0' peer='NULL' client='NULL' id=0
2019-03-06 18:16:18: DEBUG: evaluating sainfo: loc='ANONYMOUS', rmt='ANONYMOUS', peer='ANY', id=0
2019-03-06 18:16:18: DEBUG: check and compare ids : values matched (ANONYMOUS)
2019-03-06 18:16:18: DEBUG: check and compare ids : values matched (ANONYMOUS)
2019-03-06 18:16:18: DEBUG: selected sainfo: loc='ANONYMOUS', rmt='ANONYMOUS', peer='ANY', id=0
2019-03-06 18:16:18: DEBUG:  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Transport reqid=0:0)
2019-03-06 18:16:18: DEBUG:   (trns_id=3DES encklen=0 authtype=hmac-sha)
2019-03-06 18:16:18: DEBUG: in post_acquire
2019-03-06 18:16:18: [195.149.70.70] DEBUG: configuration "195.149.70.70[500]" selected.
2019-03-06 18:16:18: INFO: IPsec-SA request for 195.149.70.70 queued due to no phase1 found.
2019-03-06 18:16:18: DEBUG: ===
2019-03-06 18:16:18: INFO: initiate new phase 1 negotiation: 91.142.161.34[500]<=>195.149.70.70[500]
2019-03-06 18:16:18: INFO: begin Identity Protection mode.
2019-03-06 18:16:18: DEBUG: new cookie:
4ddbeb055a9b41c9
2019-03-06 18:16:18: DEBUG: add payload of len 52, next type 13
2019-03-06 18:16:18: DEBUG: add payload of len 16, next type 0
2019-03-06 18:16:18: DEBUG: 104 bytes from 91.142.161.34[500] to 195.149.70.70[500]
2019-03-06 18:16:18: DEBUG: sockname 91.142.161.34[500]
2019-03-06 18:16:18: DEBUG: send packet from 91.142.161.34[500]
2019-03-06 18:16:18: DEBUG: send packet to 195.149.70.70[500]
2019-03-06 18:16:18: DEBUG: 1 times of 104 bytes message will be sent to 195.149.70.70[500]
2019-03-06 18:16:18: DEBUG:
4ddbeb05 5a9b41c9 00000000 00000000 01100200 00000000 00000068 0d000038
00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c7080
80010007 800e0080 80030001 80020002 80040002 00000014 afcad713 68a1f1c9
6b8696fc 77570100
2019-03-06 18:16:18: DEBUG: resend phase1 packet 4ddbeb055a9b41c9:0000000000000000
2019-03-06 18:16:18: DEBUG: ===
2019-03-06 18:16:18: DEBUG: 96 bytes message received from 195.149.70.70[500] to 91.142.161.34[500]
2019-03-06 18:16:18: DEBUG:
25f6a80a f8a159d2 c17b2022 0072aff8 0b100500 00000000 00000060 00000044
00000001 0000000e 0d000038 00000001 00000001 0000002c 01010001 00000024
01010000 800b0001 800c7080 80010007 800e0080 80030001 80020002 8004000e
2019-03-06 18:16:18: [195.149.70.70] ERROR: unknown Informational exchange received.
2019-03-06 18:16:18: DEBUG: ===
2019-03-06 18:16:18: DEBUG: 108 bytes message received from 195.149.70.70[500] to 91.142.161.34[500]
2019-03-06 18:16:18: DEBUG:
4ddbeb05 5a9b41c9 6d414808 a96f4dad 01100200 00000000 0000006c 0d000038
00000001 00000001 0000002c 01010001 00000024 01010000 80010007 800e0080
80020002 80040002 80030001 800b0001 800c7080 00000018 4048b7d5 6ebce885
25e7de7f 00d6c2d3 c0000000
2019-03-06 18:16:18: DEBUG: begin.
2019-03-06 18:16:18: DEBUG: seen nptype=1(sa)
2019-03-06 18:16:18: DEBUG: seen nptype=13(vid)
2019-03-06 18:16:18: DEBUG: succeed.
2019-03-06 18:16:18: INFO: received broken Microsoft ID: FRAGMENTATION
2019-03-06 18:16:18: DEBUG: total SA len=52
2019-03-06 18:16:18: DEBUG:
00000001 00000001 0000002c 01010001 00000024 01010000 80010007 800e0080
80020002 80040002 80030001 800b0001 800c7080
2019-03-06 18:16:18: DEBUG: begin.
2019-03-06 18:16:18: DEBUG: seen nptype=2(prop)
2019-03-06 18:16:18: DEBUG: succeed.
2019-03-06 18:16:18: DEBUG: proposal #1 len=44
2019-03-06 18:16:18: DEBUG: begin.
2019-03-06 18:16:18: DEBUG: seen nptype=3(trns)
2019-03-06 18:16:18: DEBUG: succeed.
2019-03-06 18:16:18: DEBUG: transform #1 len=36
2019-03-06 18:16:18: DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
2019-03-06 18:16:18: DEBUG: encryption(aes)
2019-03-06 18:16:18: DEBUG: type=Key Length, flag=0x8000, lorv=128
2019-03-06 18:16:18: DEBUG: type=Hash Algorithm, flag=0x8000, lorv=SHA
2019-03-06 18:16:18: DEBUG: hash(sha1)
2019-03-06 18:16:18: DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group
2019-03-06 18:16:18: DEBUG: hmac(modp1024)
2019-03-06 18:16:18: DEBUG: type=Authentication Method, flag=0x8000, lorv=pre-shared key
2019-03-06 18:16:18: DEBUG: type=Life Type, flag=0x8000, lorv=seconds
2019-03-06 18:16:18: DEBUG: type=Life Duration, flag=0x8000, lorv=28800
2019-03-06 18:16:18: DEBUG: pair 1:
2019-03-06 18:16:18: DEBUG:  0x802025c00: next=0x0 tnext=0x0
2019-03-06 18:16:18: DEBUG: proposal #1: 1 transform
2019-03-06 18:16:18: DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
2019-03-06 18:16:18: DEBUG: type=Key Length, flag=0x8000, lorv=128
2019-03-06 18:16:18: DEBUG: type=Hash Algorithm, flag=0x8000, lorv=SHA
2019-03-06 18:16:18: DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group
2019-03-06 18:16:18: DEBUG: type=Authentication Method, flag=0x8000, lorv=pre-shared key
2019-03-06 18:16:18: DEBUG: type=Life Type, flag=0x8000, lorv=seconds
2019-03-06 18:16:18: DEBUG: type=Life Duration, flag=0x8000, lorv=28800
2019-03-06 18:16:18: DEBUG: prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1
2019-03-06 18:16:18: DEBUG: trns#=1, trns-id=IKE
2019-03-06 18:16:18: DEBUG:   lifetime = 28800
2019-03-06 18:16:18: DEBUG:   lifebyte = 0
2019-03-06 18:16:18: DEBUG:   enctype = AES-CBC
2019-03-06 18:16:18: DEBUG:   encklen = 128
2019-03-06 18:16:18: DEBUG:   hashtype = SHA
2019-03-06 18:16:18: DEBUG:   authmethod = pre-shared key
2019-03-06 18:16:18: DEBUG:   dh_group = 1024-bit MODP group
2019-03-06 18:16:18: DEBUG: an acceptable proposal found.
2019-03-06 18:16:18: DEBUG: hmac(modp1024)
2019-03-06 18:16:18: DEBUG: agreed on pre-shared key auth.
2019-03-06 18:16:18: DEBUG: ===
2019-03-06 18:16:18: DEBUG: compute DH's private.
2019-03-06 18:16:18: DEBUG:
4b1ce6a0 353ff94a 7455e1c7 86774b1e 9aa1e65e 3af72833 f8e17cbc 5eefabde
0b061354 933b9e4f 9529072a a5526c70 c3716a5e be098835 e5d8debe c9a14999
f056c882 8ab4a945 e7505a29 0e3174ae 5a9ef81d 8ba56552 3b4a13da 7d7ab713
9a7c4111 24a7e1cc fa20256e 13c6642e 6a181469 9bcad378 6d386db6 285a7ae8
2019-03-06 18:16:18: DEBUG: compute DH's public.
2019-03-06 18:16:18: DEBUG:
5afe4b45 7456c4d2 ff69c3af 7ea5809a d9fb51f9 8e7e94c0 b1867869 54a71c3f
82db7c82 da3aeae7 3a95f9fd 33633d08 c7b1394a 88dddf66 d8e8adaf c03a0fad
75d087b2 5fd279fd 5a563ffd c8b65efe e21b877b 05c5b671 883e7bda 38abdcc3
cc17adcf 0ce6f0b3 fdd115d5 1243f38f c8b9cd1a 7970a01b 0792ea5c 5223e011
2019-03-06 18:16:18: DEBUG: add payload of len 128, next type 10
2019-03-06 18:16:18: DEBUG: add payload of len 16, next type 0
2019-03-06 18:16:18: DEBUG: 180 bytes from 91.142.161.34[500] to 195.149.70.70[500]
2019-03-06 18:16:18: DEBUG: sockname 91.142.161.34[500]
2019-03-06 18:16:18: DEBUG: send packet from 91.142.161.34[500]
2019-03-06 18:16:18: DEBUG: send packet to 195.149.70.70[500]
2019-03-06 18:16:18: DEBUG: 1 times of 180 bytes message will be sent to 195.149.70.70[500]
2019-03-06 18:16:18: DEBUG:
4ddbeb05 5a9b41c9 6d414808 a96f4dad 04100200 00000000 000000b4 0a000084
5afe4b45 7456c4d2 ff69c3af 7ea5809a d9fb51f9 8e7e94c0 b1867869 54a71c3f
82db7c82 da3aeae7 3a95f9fd 33633d08 c7b1394a 88dddf66 d8e8adaf c03a0fad
75d087b2 5fd279fd 5a563ffd c8b65efe e21b877b 05c5b671 883e7bda 38abdcc3
cc17adcf 0ce6f0b3 fdd115d5 1243f38f c8b9cd1a 7970a01b 0792ea5c 5223e011
00000014 b6522ced d7c9eced 3b245891 cb95b781
2019-03-06 18:16:18: DEBUG: resend phase1 packet 4ddbeb055a9b41c9:6d414808a96f4dad
2019-03-06 18:16:18: DEBUG: ===
2019-03-06 18:16:18: DEBUG: 96 bytes message received from 195.149.70.70[500] to 91.142.161.34[500]
2019-03-06 18:16:18: DEBUG:
c48ea7cf a1a8128f 0dad2176 ac11d2ff 0b100500 00000000 00000060 00000044
00000001 0000000e 0d000038 00000001 00000001 0000002c 01010001 00000024
01010000 800b0001 800c7080 80010007 800e0080 80030001 80020002 8004000e
2019-03-06 18:16:18: [195.149.70.70] ERROR: unknown Informational exchange received.
2019-03-06 18:16:18: DEBUG: ===
2019-03-06 18:16:18: DEBUG: 256 bytes message received from 195.149.70.70[500] to 91.142.161.34[500]
2019-03-06 18:16:18: DEBUG:
4ddbeb05 5a9b41c9 6d414808 a96f4dad 04100200 00000000 00000100 0a000084
065d8ae2 b7e5eb92 b26559e3 6829fb0f b5b4da0f 8abe7e43 fe737228 bce0c695
f6678996 98bfc1a5 12b6fe82 177e412a 3c2eca3c e549b073 2449c8f1 b8d25a28
c01086f8 c64f235c b16f7afa 1fc869e4 d22075c9 f30ed294 36c7ff62 1021f332
200330e1 06bdf6b1 b2c94aaa e7c34b0f 9fcd93b2 12c93628 aec32e86 fe5355b3
0d000018 bd8b78fb 3d967d06 983f3e77 c0bc87e3 7c05b371 0d000014 12f5f28c
457168a9 702d9fe2 74cc0100 0d00000c 09002689 dfd6b712 0d000014 9886ef15
a96e4dad 200b3bb4 51646e70 00000014 1f07f70e aa6514d3 b0fa9654 2a500100
2019-03-06 18:16:18: DEBUG: begin.
2019-03-06 18:16:18: DEBUG: seen nptype=4(ke)
2019-03-06 18:16:18: DEBUG: seen nptype=10(nonce)
2019-03-06 18:16:18: DEBUG: seen nptype=13(vid)
2019-03-06 18:16:18: DEBUG: seen nptype=13(vid)
2019-03-06 18:16:18: DEBUG: seen nptype=13(vid)
2019-03-06 18:16:18: DEBUG: seen nptype=13(vid)
2019-03-06 18:16:18: DEBUG: succeed.
2019-03-06 18:16:18: INFO: received Vendor ID: CISCO-UNITY
2019-03-06 18:16:18: INFO: received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt
2019-03-06 18:16:18: DEBUG: received unknown Vendor ID
2019-03-06 18:16:18: DEBUG:
9886ef15 a96e4dad 200b3bb4 51646e70
2019-03-06 18:16:18: DEBUG: received unknown Vendor ID
2019-03-06 18:16:18: DEBUG:
1f07f70e aa6514d3 b0fa9654 2a500100
2019-03-06 18:16:18: DEBUG: ===
2019-03-06 18:16:18: DEBUG: compute DH's shared.
2019-03-06 18:16:18: DEBUG:
afec264f d2317b29 74e4b7c9 09f8d2fb 22ab4219 89dc0687 04060dc5 45fea14c
e2aac957 2c69b381 2e694000 2a14a391 37f9a62a 7e88c8b2 08cd759d 20ad4ea4
63f21ce0 8843dd9a b999ed0e 35631d63 14f3f215 403a11a4 afddebe9 d5c258ab
f2134858 e9e4896a cb8fe7bc 7d2fbc6c b8097d52 1997cced fdb975ed c380eaf1
2019-03-06 18:16:18: DEBUG: the psk found.
2019-03-06 18:16:18: DEBUG: nonce 1: 2019-03-06 18:16:18: DEBUG:
b6522ced d7c9eced 3b245891 cb95b781
2019-03-06 18:16:18: DEBUG: nonce 2: 2019-03-06 18:16:18: DEBUG:
bd8b78fb 3d967d06 983f3e77 c0bc87e3 7c05b371
2019-03-06 18:16:18: DEBUG: hmac(hmac_sha1)
2019-03-06 18:16:18: DEBUG: SKEYID computed:
2019-03-06 18:16:18: DEBUG:
7281d9aa 8788dcbc 78bdea9c a2962db6 6a53209a
2019-03-06 18:16:18: DEBUG: hmac(hmac_sha1)
2019-03-06 18:16:18: DEBUG: SKEYID_d computed:
2019-03-06 18:16:18: DEBUG:
fe56fe7a 64cc02f5 1d071614 218da984 968b704e
2019-03-06 18:16:18: DEBUG: hmac(hmac_sha1)
2019-03-06 18:16:18: DEBUG: SKEYID_a computed:
2019-03-06 18:16:18: DEBUG:
8dd31a9a 814716ac 17b06524 8f2733c8 15cb5fcb
2019-03-06 18:16:18: DEBUG: hmac(hmac_sha1)
2019-03-06 18:16:18: DEBUG: SKEYID_e computed:
2019-03-06 18:16:18: DEBUG:
e0505746 29b9384f 19928efc 38213b34 4338b2ef
2019-03-06 18:16:18: DEBUG: encryption(aes)
2019-03-06 18:16:18: DEBUG: hash(sha1)
2019-03-06 18:16:18: DEBUG: final encryption key computed:
2019-03-06 18:16:18: DEBUG:
e0505746 29b9384f 19928efc 38213b34
2019-03-06 18:16:18: DEBUG: hash(sha1)
2019-03-06 18:16:18: DEBUG: encryption(aes)
2019-03-06 18:16:18: DEBUG: IV computed:
2019-03-06 18:16:18: DEBUG:
fba71673 dd62441e 5b8b1e64 7f1a9cf2
2019-03-06 18:16:18: DEBUG: use ID type of IPv4_address
2019-03-06 18:16:18: DEBUG: HASH with:
2019-03-06 18:16:18: DEBUG:
5afe4b45 7456c4d2 ff69c3af 7ea5809a d9fb51f9 8e7e94c0 b1867869 54a71c3f
82db7c82 da3aeae7 3a95f9fd 33633d08 c7b1394a 88dddf66 d8e8adaf c03a0fad
75d087b2 5fd279fd 5a563ffd c8b65efe e21b877b 05c5b671 883e7bda 38abdcc3
cc17adcf 0ce6f0b3 fdd115d5 1243f38f c8b9cd1a 7970a01b 0792ea5c 5223e011
065d8ae2 b7e5eb92 b26559e3 6829fb0f b5b4da0f 8abe7e43 fe737228 bce0c695
f6678996 98bfc1a5 12b6fe82 177e412a 3c2eca3c e549b073 2449c8f1 b8d25a28
c01086f8 c64f235c b16f7afa 1fc869e4 d22075c9 f30ed294 36c7ff62 1021f332
200330e1 06bdf6b1 b2c94aaa e7c34b0f 9fcd93b2 12c93628 aec32e86 fe5355b3
4ddbeb05 5a9b41c9 6d414808 a96f4dad 00000001 00000001 0000002c 01010001
00000024 01010000 800b0001 800c7080 80010007 800e0080 80030001 80020002
80040002 011101f4 5b8ea122
2019-03-06 18:16:18: DEBUG: hmac(hmac_sha1)
2019-03-06 18:16:18: DEBUG: HASH (init) computed:
2019-03-06 18:16:18: DEBUG:
af4bb439 c88733bb 56a588a4 b862862e 650043bb
2019-03-06 18:16:18: DEBUG: add payload of len 8, next type 8
2019-03-06 18:16:18: DEBUG: add payload of len 20, next type 0
2019-03-06 18:16:18: DEBUG: begin encryption.
2019-03-06 18:16:18: DEBUG: encryption(aes)
2019-03-06 18:16:18: DEBUG: pad length = 12
2019-03-06 18:16:18: DEBUG:
0800000c 011101f4 5b8ea122 00000018 af4bb439 c88733bb 56a588a4 b862862e
650043bb 00000000 00000000 0000000c
2019-03-06 18:16:18: DEBUG: encryption(aes)
2019-03-06 18:16:18: DEBUG: with key:
2019-03-06 18:16:18: DEBUG:
e0505746 29b9384f 19928efc 38213b34
2019-03-06 18:16:18: DEBUG: encrypted payload by IV:
2019-03-06 18:16:18: DEBUG:
fba71673 dd62441e 5b8b1e64 7f1a9cf2
2019-03-06 18:16:18: DEBUG: save IV for next:
2019-03-06 18:16:18: DEBUG:
93c28af3 12160623 fab54775 8bbc1a9c
2019-03-06 18:16:18: DEBUG: encrypted.
2019-03-06 18:16:18: DEBUG: 76 bytes from 91.142.161.34[500] to 195.149.70.70[500]
2019-03-06 18:16:18: DEBUG: sockname 91.142.161.34[500]
2019-03-06 18:16:18: DEBUG: send packet from 91.142.161.34[500]
2019-03-06 18:16:18: DEBUG: send packet to 195.149.70.70[500]
2019-03-06 18:16:18: DEBUG: 1 times of 76 bytes message will be sent to 195.149.70.70[500]
2019-03-06 18:16:18: DEBUG:
4ddbeb05 5a9b41c9 6d414808 a96f4dad 05100201 00000000 0000004c 70b21bf0
539498dd 9ed08bea 837a4d37 35e7db60 e02f07ce 8d579a2f ecb82270 93c28af3
12160623 fab54775 8bbc1a9c
2019-03-06 18:16:18: DEBUG: resend phase1 packet 4ddbeb055a9b41c9:6d414808a96f4dad
2019-03-06 18:16:18: DEBUG: ===
2019-03-06 18:16:18: DEBUG: 92 bytes message received from 195.149.70.70[500] to 91.142.161.34[500]
2019-03-06 18:16:18: DEBUG:
4ddbeb05 5a9b41c9 6d414808 a96f4dad 05100201 00000000 0000005c 8789b116
eb3d54bb be4d2930 8d5f80db f8f34d39 9e0159f8 fc752f18 fc49ca77 fb694e08
6b6e8a44 7cc50853 8ca4847c f95c7476 c5ff6e0a 6ca59c93 00ee9ffb
2019-03-06 18:16:18: DEBUG: begin decryption.
2019-03-06 18:16:18: DEBUG: encryption(aes)
2019-03-06 18:16:18: DEBUG: IV was saved for next processing:
2019-03-06 18:16:18: DEBUG:
f95c7476 c5ff6e0a 6ca59c93 00ee9ffb
2019-03-06 18:16:18: DEBUG: encryption(aes)
2019-03-06 18:16:18: DEBUG: with key:
2019-03-06 18:16:18: DEBUG:
e0505746 29b9384f 19928efc 38213b34
2019-03-06 18:16:18: DEBUG: decrypted payload by IV:
2019-03-06 18:16:18: DEBUG:
93c28af3 12160623 fab54775 8bbc1a9c
2019-03-06 18:16:18: DEBUG: decrypted payload, but not trimed.
2019-03-06 18:16:18: DEBUG:
0800000c 011101f4 c3954646 0d000018 1d568b6f 2eb683f9 a9ab7453 7e790b92
704bfbe7 00000014 afcad713 68a1f1c9 6b8696fc 77570100 00000000 00000000
2019-03-06 18:16:18: DEBUG: padding len=0
2019-03-06 18:16:18: DEBUG: skip to trim padding.
2019-03-06 18:16:18: DEBUG: decrypted.
2019-03-06 18:16:18: DEBUG:
4ddbeb05 5a9b41c9 6d414808 a96f4dad 05100201 00000000 0000005c 0800000c
011101f4 c3954646 0d000018 1d568b6f 2eb683f9 a9ab7453 7e790b92 704bfbe7
00000014 afcad713 68a1f1c9 6b8696fc 77570100 00000000 00000000
2019-03-06 18:16:18: DEBUG: begin.
2019-03-06 18:16:18: DEBUG: seen nptype=5(id)
2019-03-06 18:16:18: DEBUG: seen nptype=8(hash)
2019-03-06 18:16:18: DEBUG: seen nptype=13(vid)
2019-03-06 18:16:18: DEBUG: succeed.
2019-03-06 18:16:18: INFO: received Vendor ID: DPD
2019-03-06 18:16:18: DEBUG: remote supports DPD
2019-03-06 18:16:18: DEBUG: HASH received:
2019-03-06 18:16:18: DEBUG:
1d568b6f 2eb683f9 a9ab7453 7e790b92 704bfbe7
2019-03-06 18:16:18: DEBUG: HASH with:
2019-03-06 18:16:18: DEBUG:
065d8ae2 b7e5eb92 b26559e3 6829fb0f b5b4da0f 8abe7e43 fe737228 bce0c695
f6678996 98bfc1a5 12b6fe82 177e412a 3c2eca3c e549b073 2449c8f1 b8d25a28
c01086f8 c64f235c b16f7afa 1fc869e4 d22075c9 f30ed294 36c7ff62 1021f332
200330e1 06bdf6b1 b2c94aaa e7c34b0f 9fcd93b2 12c93628 aec32e86 fe5355b3
5afe4b45 7456c4d2 ff69c3af 7ea5809a d9fb51f9 8e7e94c0 b1867869 54a71c3f
82db7c82 da3aeae7 3a95f9fd 33633d08 c7b1394a 88dddf66 d8e8adaf c03a0fad
75d087b2 5fd279fd 5a563ffd c8b65efe e21b877b 05c5b671 883e7bda 38abdcc3
cc17adcf 0ce6f0b3 fdd115d5 1243f38f c8b9cd1a 7970a01b 0792ea5c 5223e011
6d414808 a96f4dad 4ddbeb05 5a9b41c9 00000001 00000001 0000002c 01010001
00000024 01010000 800b0001 800c7080 80010007 800e0080 80030001 80020002
80040002 011101f4 c3954646
2019-03-06 18:16:18: DEBUG: hmac(hmac_sha1)
2019-03-06 18:16:18: DEBUG: HASH (init) computed:
2019-03-06 18:16:18: DEBUG:
1d568b6f 2eb683f9 a9ab7453 7e790b92 704bfbe7
2019-03-06 18:16:18: DEBUG: HASH for PSK validated.
2019-03-06 18:16:18: [195.149.70.70] DEBUG: peer's ID:2019-03-06 18:16:18: DEBUG:
011101f4 c3954646
2019-03-06 18:16:18: DEBUG: ===
2019-03-06 18:16:18: INFO: ISAKMP-SA established 91.142.161.34[500]-195.149.70.70[500] spi:4ddbeb055a9b41c9:6d414808a96f4dad
2019-03-06 18:16:18: DEBUG: ===
2019-03-06 18:16:19: DEBUG: ===
2019-03-06 18:16:19: DEBUG: begin QUICK mode.
2019-03-06 18:16:19: INFO: initiate new phase 2 negotiation: 91.142.161.34[500]<=>195.149.70.70[500]
2019-03-06 18:16:19: DEBUG: compute IV for phase2
2019-03-06 18:16:19: DEBUG: phase1 last IV:
2019-03-06 18:16:19: DEBUG:
f95c7476 c5ff6e0a 6ca59c93 00ee9ffb 833ff085
2019-03-06 18:16:19: DEBUG: hash(sha1)
2019-03-06 18:16:19: DEBUG: encryption(aes)
2019-03-06 18:16:19: DEBUG: phase2 IV computed:
2019-03-06 18:16:19: DEBUG:
c360eec2 b2b2a6f0 36c4d7fd 94df89ea
2019-03-06 18:16:19: DEBUG: call pfkey_send_getspi
2019-03-06 18:16:19: DEBUG: pfkey GETSPI sent: ESP/Transport 195.149.70.70[0]->91.142.161.34[0]
2019-03-06 18:16:19: DEBUG: pfkey getspi sent.
2019-03-06 18:16:19: DEBUG: pk_recv: retry[0] recv()
2019-03-06 18:16:19: DEBUG: got pfkey GETSPI message
2019-03-06 18:16:19: DEBUG: pfkey GETSPI succeeded: ESP/Transport 195.149.70.70[500]->91.142.161.34[500] spi=39212779(0x25656eb)
2019-03-06 18:16:19: DEBUG: hmac(modp2048)
2019-03-06 18:16:19: DEBUG: hmac(modp2048)
2019-03-06 18:16:19: DEBUG: hmac(modp2048)
2019-03-06 18:16:19: DEBUG: compute DH's private.
2019-03-06 18:16:19: DEBUG:
47abdb28 0e92f66f ac17d5a7 2ddc9b5e f34c1c45 993b9742 8d745662 9c2e47e9
fae69626 495e1f84 3f2ce312 3b398948 1b384024 8bd904a0 502f6d54 b37ba8a9
8161280c 7808a88d d0a4f33c 73a3b769 ec7b445b ade7e1c8 269135cd 4e1ac0a9
7bc5678d 2c586877 a7a989cf a9b2008b a35dec2a 91b5b20e efc65121 7c6abd5e
1802b1f1 3bb4d876 8cfa3086 f186c3a9 586e134f 6247aacc a75876f4 308cd2bc
60785905 022ea984 906927fe b92ed1eb 4bd42b0a 22be7fd5 46355cd5 027179b4
97aa5957 d70f2663 d01436b3 65c3ded0 9a825cf3 1b449e39 0f334c46 d80b7dd8
b81c0874 d7d3d7f4 30e9673f c360a668 e30a2b70 36420f53 07ea4980 2cfeef20
2019-03-06 18:16:19: DEBUG: compute DH's public.
2019-03-06 18:16:19: DEBUG:
fbe93678 877457d3 7501faa4 d47a3d21 48f1bd19 fc23d690 0a36d7b8 2b489e2c
12c64b1b b9aee213 fda8639b 9540e92b c13c75b7 6d2399a5 7a5c7ac6 05284382
b0d8525f b3d823bc aa84ddd4 3a435ea0 a405c473 f192d380 50b43ffe 5e6b3d84
fc03bbae 15d38bb9 581eb2fd 6af5a3d3 31eac6fa e29983f8 d3378e4e 8657c82b
32e5d70a 5a6add6e 7d9ad4ed f5970079 bf9604c0 49ee0078 5819718e d197a1f2
6448e40f bc0f145e 4546a653 5655dcf7 7ca283d6 093b7850 4c8c97f4 de9e033b
0ae42b1e c0313339 42ffe38e 95d778f2 42bfa351 511067cc 20360b38 dd88299e
47eac176 ba5a1a22 81b6299d 825f611f 54f2062e 58332efd 3c9ee4c2 c95ca875
2019-03-06 18:16:19: DEBUG: use local ID type IPv4_address
2019-03-06 18:16:19: DEBUG: use remote ID type IPv4_address
2019-03-06 18:16:19: DEBUG: IDci:
2019-03-06 18:16:19: DEBUG:
01000000 5b8ea122
2019-03-06 18:16:19: DEBUG: IDcr:
2019-03-06 18:16:19: DEBUG:
01000000 c3954646
2019-03-06 18:16:19: DEBUG: add payload of len 48, next type 10
2019-03-06 18:16:19: DEBUG: add payload of len 16, next type 4
2019-03-06 18:16:19: DEBUG: add payload of len 256, next type 5
2019-03-06 18:16:19: DEBUG: add payload of len 8, next type 5
2019-03-06 18:16:19: DEBUG: add payload of len 8, next type 0
2019-03-06 18:16:19: DEBUG: HASH with:
2019-03-06 18:16:19: DEBUG:
833ff085 0a000034 00000001 00000001 00000028 01030401 025656eb 0000001c
01030000 80010001 80027080 80040002 80050002 8003000e 04000014 c6e20142
214c5edb 556cb554 28c8a3bb 05000104 fbe93678 877457d3 7501faa4 d47a3d21
48f1bd19 fc23d690 0a36d7b8 2b489e2c 12c64b1b b9aee213 fda8639b 9540e92b
c13c75b7 6d2399a5 7a5c7ac6 05284382 b0d8525f b3d823bc aa84ddd4 3a435ea0
a405c473 f192d380 50b43ffe 5e6b3d84 fc03bbae 15d38bb9 581eb2fd 6af5a3d3
31eac6fa e29983f8 d3378e4e 8657c82b 32e5d70a 5a6add6e 7d9ad4ed f5970079
bf9604c0 49ee0078 5819718e d197a1f2 6448e40f bc0f145e 4546a653 5655dcf7
7ca283d6 093b7850 4c8c97f4 de9e033b 0ae42b1e c0313339 42ffe38e 95d778f2
42bfa351 511067cc 20360b38 dd88299e 47eac176 ba5a1a22 81b6299d 825f611f
54f2062e 58332efd 3c9ee4c2 c95ca875 0500000c 01000000 5b8ea122 0000000c
01000000 c3954646
2019-03-06 18:16:19: DEBUG: hmac(hmac_sha1)
2019-03-06 18:16:19: DEBUG: HASH computed:
2019-03-06 18:16:19: DEBUG:
5cbd68c4 6c702296 cc1808df 4d7cbbff d3b25b32
2019-03-06 18:16:19: DEBUG: add payload of len 20, next type 1
2019-03-06 18:16:19: DEBUG: begin encryption.
2019-03-06 18:16:19: DEBUG: encryption(aes)
2019-03-06 18:16:19: DEBUG: pad length = 4
2019-03-06 18:16:19: DEBUG:
01000018 5cbd68c4 6c702296 cc1808df 4d7cbbff d3b25b32 0a000034 00000001
00000001 00000028 01030401 025656eb 0000001c 01030000 80010001 80027080
80040002 80050002 8003000e 04000014 c6e20142 214c5edb 556cb554 28c8a3bb
05000104 fbe93678 877457d3 7501faa4 d47a3d21 48f1bd19 fc23d690 0a36d7b8
2b489e2c 12c64b1b b9aee213 fda8639b 9540e92b c13c75b7 6d2399a5 7a5c7ac6
05284382 b0d8525f b3d823bc aa84ddd4 3a435ea0 a405c473 f192d380 50b43ffe
5e6b3d84 fc03bbae 15d38bb9 581eb2fd 6af5a3d3 31eac6fa e29983f8 d3378e4e
8657c82b 32e5d70a 5a6add6e 7d9ad4ed f5970079 bf9604c0 49ee0078 5819718e
d197a1f2 6448e40f bc0f145e 4546a653 5655dcf7 7ca283d6 093b7850 4c8c97f4
de9e033b 0ae42b1e c0313339 42ffe38e 95d778f2 42bfa351 511067cc 20360b38
dd88299e 47eac176 ba5a1a22 81b6299d 825f611f 54f2062e 58332efd 3c9ee4c2
c95ca875 0500000c 01000000 5b8ea122 0000000c 01000000 c3954646 00000004
2019-03-06 18:16:19: DEBUG: encryption(aes)
2019-03-06 18:16:19: DEBUG: with key:
2019-03-06 18:16:19: DEBUG:
e0505746 29b9384f 19928efc 38213b34
2019-03-06 18:16:19: DEBUG: encrypted payload by IV:
2019-03-06 18:16:19: DEBUG:
c360eec2 b2b2a6f0 36c4d7fd 94df89ea
2019-03-06 18:16:19: DEBUG: save IV for next:
2019-03-06 18:16:19: DEBUG:
09eafa2f 601c4acb 578e6f6c b6779ea9
2019-03-06 18:16:19: DEBUG: encrypted.
2019-03-06 18:16:19: DEBUG: 412 bytes from 91.142.161.34[500] to 195.149.70.70[500]
2019-03-06 18:16:19: DEBUG: sockname 91.142.161.34[500]
2019-03-06 18:16:19: DEBUG: send packet from 91.142.161.34[500]
2019-03-06 18:16:19: DEBUG: send packet to 195.149.70.70[500]
2019-03-06 18:16:19: DEBUG: 1 times of 412 bytes message will be sent to 195.149.70.70[500]
2019-03-06 18:16:19: DEBUG:
4ddbeb05 5a9b41c9 6d414808 a96f4dad 08102001 833ff085 0000019c f8cbbd48
7cabd6b2 94f56798 b6d6373b 8155943e d975b451 ed5db479 11c76c0e 3c99b92d
968b0801 5c5c8e60 24a3a64a beaed18d 9222cae1 06c3e911 f7322730 e325a3a2
5f9bfc40 2402cb81 e18e33b9 8844909c 57d6b254 17abc57e fb80585c ba3f7f96
d85b3883 bcb54ca6 ca426248 e9fba91f b674caf6 62254a70 8cf1bee6 8e683450
01007214 c81a33c3 22865d13 ee6d206c 1cca5c63 94770aad 9c66f0d3 ad1cafc9
cfd68ef6 dadbe845 dd0777ab 192c526a a5a84367 ea8ee9a6 50629011 ccc47ce0
9544b786 87b48d59 599b1c93 14c45231 4b9c5200 3b8faa27 fdca4ca0 7ea96594
26f15610 6048666d b93abdf9 d8f1cf8c 9425bf6c 54f25d1a 1e7602d1 b68cc92a
0d7fa29d 86bf668c 9d1b76cd 211b02a5 0cd3c082 30ceb515 67a08fed fee9c0e9
c50cb69f 112eda1e cf7dc914 53b9386b cf7a0be7 2f6ffbe8 b044a72f 0eccef2b
97a5747c 9271ad8c b9158f6d 9174132c 139a4b16 030f18db a07389ef a0fb2ab0
cadc1b15 54e07a5c bf1567db 09eafa2f 601c4acb 578e6f6c b6779ea9
2019-03-06 18:16:19: DEBUG: resend phase2 packet 4ddbeb055a9b41c9:6d414808a96f4dad:0000833f
2019-03-06 18:16:19: DEBUG: ===
2019-03-06 18:16:19: DEBUG: 92 bytes message received from 195.149.70.70[500] to 91.142.161.34[500]
2019-03-06 18:16:19: DEBUG:
4ddbeb05 5a9b41c9 6d414808 a96f4dad 08100501 038477b9 0000005c ca2f1d3f
b28e5979 281f797e 9af664a9 47733572 7eb5b99f 25bcfc66 ee5d903d 212fb25c
8cad7910 c2868b05 f7e31fdd 0d250c8b c46801c9 54d67136 57ad7872
2019-03-06 18:16:19: DEBUG: receive Information.
2019-03-06 18:16:19: DEBUG: compute IV for phase2
2019-03-06 18:16:19: DEBUG: phase1 last IV:
2019-03-06 18:16:19: DEBUG:
f95c7476 c5ff6e0a 6ca59c93 00ee9ffb 038477b9
2019-03-06 18:16:19: DEBUG: hash(sha1)
2019-03-06 18:16:19: DEBUG: encryption(aes)
2019-03-06 18:16:19: DEBUG: phase2 IV computed:
2019-03-06 18:16:19: DEBUG:
2606d94c c9a37415 e05ec831 bbebee3f
2019-03-06 18:16:19: DEBUG: begin decryption.
2019-03-06 18:16:19: DEBUG: encryption(aes)
2019-03-06 18:16:19: DEBUG: IV was saved for next processing:
2019-03-06 18:16:19: DEBUG:
0d250c8b c46801c9 54d67136 57ad7872
2019-03-06 18:16:19: DEBUG: encryption(aes)
2019-03-06 18:16:19: DEBUG: with key:
2019-03-06 18:16:19: DEBUG:
e0505746 29b9384f 19928efc 38213b34
2019-03-06 18:16:19: DEBUG: decrypted payload by IV:
2019-03-06 18:16:19: DEBUG:
2606d94c c9a37415 e05ec831 bbebee3f
2019-03-06 18:16:19: DEBUG: decrypted payload, but not trimed.
2019-03-06 18:16:19: DEBUG:
0c000018 5c398a4e 8fb5c72f 6c779d85 ca34db0e 511eccc1 0000001c 00000001
01100001 4ddbeb05 5a9b41c9 6d414808 a96f4dad 00000000 00000000 00000000
2019-03-06 18:16:19: DEBUG: padding len=0
2019-03-06 18:16:19: DEBUG: skip to trim padding.
2019-03-06 18:16:19: DEBUG: decrypted.
2019-03-06 18:16:19: DEBUG:
4ddbeb05 5a9b41c9 6d414808 a96f4dad 08100501 038477b9 0000005c 0c000018
5c398a4e 8fb5c72f 6c779d85 ca34db0e 511eccc1 0000001c 00000001 01100001
4ddbeb05 5a9b41c9 6d414808 a96f4dad 00000000 00000000 00000000
2019-03-06 18:16:19: DEBUG: IV freed
2019-03-06 18:16:19: DEBUG: HASH with:
2019-03-06 18:16:19: DEBUG:
038477b9 0000001c 00000001 01100001 4ddbeb05 5a9b41c9 6d414808 a96f4dad
2019-03-06 18:16:19: DEBUG: hmac(hmac_sha1)
2019-03-06 18:16:19: DEBUG: HASH computed:
2019-03-06 18:16:19: DEBUG:
5c398a4e 8fb5c72f 6c779d85 ca34db0e 511eccc1
2019-03-06 18:16:19: DEBUG: hash validated.
2019-03-06 18:16:19: DEBUG: begin.
2019-03-06 18:16:19: DEBUG: seen nptype=8(hash)
2019-03-06 18:16:19: DEBUG: seen nptype=12(delete)
2019-03-06 18:16:19: DEBUG: succeed.
2019-03-06 18:16:19: [195.149.70.70] DEBUG: delete payload for protocol ISAKMP
2019-03-06 18:16:19: INFO: ISAKMP-SA expired 91.142.161.34[500]-195.149.70.70[500] spi:4ddbeb055a9b41c9:6d414808a96f4dad
2019-03-06 18:16:19: DEBUG: IV freed
2019-03-06 18:16:19: INFO: ISAKMP-SA deleted 91.142.161.34[500]-195.149.70.70[500] spi:4ddbeb055a9b41c9:6d414808a96f4dad
2019-03-06 18:16:19: DEBUG: IV freed
2019-03-06 18:16:19: DEBUG: purged SAs.
2019-03-06 18:16:38: DEBUG: ===
2019-03-06 18:16:38: DEBUG: 96 bytes message received from 195.149.70.70[500] to 91.142.161.34[500]
2019-03-06 18:16:38: DEBUG:
c48ea7cf a1a8128f b3b5d483 c330c1c5 0b100500 00000000 00000060 00000044
00000001 0000000e 0d000038 00000001 00000001 0000002c 01010001 00000024
01010000 800b0001 800c7080 80010007 800e0080 80030001 80020002 8004000e
2019-03-06 18:16:38: [195.149.70.70] ERROR: unknown Informational exchange received.
2019-03-06 18:16:38: DEBUG: ===
2019-03-06 18:16:38: DEBUG: 96 bytes message received from 195.149.70.70[500] to 91.142.161.34[500]
2019-03-06 18:16:38: DEBUG:
25f6a80a f8a159d2 624c3121 173fc99a 0b100500 00000000 00000060 00000044
00000001 0000000e 0d000038 00000001 00000001 0000002c 01010001 00000024
01010000 800b0001 800c7080 80010007 800e0080 80030001 80020002 8004000e
2019-03-06 18:16:38: [195.149.70.70] ERROR: unknown Informational exchange received.
2019-03-06 18:16:50: DEBUG: pk_recv: retry[0] recv()
2019-03-06 18:16:50: DEBUG: got pfkey ACQUIRE message
2019-03-06 18:16:50: DEBUG: suitable outbound SP found: 0.0.0.0/0[0] 0.0.0.0/0[1701] proto=any dir=out.
2019-03-06 18:16:50: DEBUG: sub:0x7fffffffe2e8: 0.0.0.0/0[1701] 0.0.0.0/0[0] proto=any dir=in
2019-03-06 18:16:50: DEBUG: db :0x80205e490: 0.0.0.0/0[1701] 0.0.0.0/0[0] proto=any dir=in
2019-03-06 18:16:50: DEBUG: suitable inbound SP found: 0.0.0.0/0[1701] 0.0.0.0/0[0] proto=any dir=in.
2019-03-06 18:16:50: DEBUG: new acquire 0.0.0.0/0[0] 0.0.0.0/0[1701] proto=any dir=out
2019-03-06 18:16:50: [195.149.70.70] DEBUG: configuration "195.149.70.70[500]" selected.
2019-03-06 18:16:50: DEBUG: getsainfo params: loc='0.0.0.0/0' rmt='0.0.0.0/0' peer='NULL' client='NULL' id=0
2019-03-06 18:16:50: DEBUG: evaluating sainfo: loc='ANONYMOUS', rmt='ANONYMOUS', peer='ANY', id=0
2019-03-06 18:16:50: DEBUG: check and compare ids : values matched (ANONYMOUS)
2019-03-06 18:16:50: DEBUG: check and compare ids : values matched (ANONYMOUS)
2019-03-06 18:16:50: DEBUG: selected sainfo: loc='ANONYMOUS', rmt='ANONYMOUS', peer='ANY', id=0
2019-03-06 18:16:50: DEBUG:  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Transport reqid=0:0)
2019-03-06 18:16:50: DEBUG:   (trns_id=3DES encklen=0 authtype=hmac-sha)
2019-03-06 18:16:50: DEBUG: in post_acquire
2019-03-06 18:16:50: [195.149.70.70] DEBUG: configuration "195.149.70.70[500]" selected.
2019-03-06 18:16:50: INFO: IPsec-SA request for 195.149.70.70 queued due to no phase1 found.
2019-03-06 18:16:50: DEBUG: ===
2019-03-06 18:16:50: INFO: initiate new phase 1 negotiation: 91.142.161.34[500]<=>195.149.70.70[500]
2019-03-06 18:16:50: INFO: begin Identity Protection mode.
2019-03-06 18:16:50: DEBUG: new cookie:
434232afc0702ef4
2019-03-06 18:16:50: DEBUG: add payload of len 52, next type 13
2019-03-06 18:16:50: DEBUG: add payload of len 16, next type 0
2019-03-06 18:16:50: DEBUG: 104 bytes from 91.142.161.34[500] to 195.149.70.70[500]
2019-03-06 18:16:50: DEBUG: sockname 91.142.161.34[500]
2019-03-06 18:16:50: DEBUG: send packet from 91.142.161.34[500]
2019-03-06 18:16:50: DEBUG: send packet to 195.149.70.70[500]
2019-03-06 18:16:50: DEBUG: 1 times of 104 bytes message will be sent to 195.149.70.70[500]
2019-03-06 18:16:50: DEBUG:
434232af c0702ef4 00000000 00000000 01100200 00000000 00000068 0d000038
00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c7080
80010007 800e0080 80030001 80020002 80040002 00000014 afcad713 68a1f1c9
6b8696fc 77570100
2019-03-06 18:16:50: DEBUG: resend phase1 packet 434232afc0702ef4:0000000000000000
2019-03-06 18:16:50: DEBUG: ===
2019-03-06 18:16:50: DEBUG: 108 bytes message received from 195.149.70.70[500] to 91.142.161.34[500]
2019-03-06 18:16:50: DEBUG:
434232af c0702ef4 af72c8ad 45c86f17 01100200 00000000 0000006c 0d000038
00000001 00000001 0000002c 01010001 00000024 01010000 80010007 800e0080
80020002 80040002 80030001 800b0001 800c7080 00000018 4048b7d5 6ebce885
25e7de7f 00d6c2d3 c0000000
2019-03-06 18:16:50: DEBUG: begin.
2019-03-06 18:16:50: DEBUG: seen nptype=1(sa)
2019-03-06 18:16:50: DEBUG: seen nptype=13(vid)
2019-03-06 18:16:50: DEBUG: succeed.
2019-03-06 18:16:50: INFO: received broken Microsoft ID: FRAGMENTATION
2019-03-06 18:16:50: DEBUG: total SA len=52
2019-03-06 18:16:50: DEBUG:
00000001 00000001 0000002c 01010001 00000024 01010000 80010007 800e0080
80020002 80040002 80030001 800b0001 800c7080
2019-03-06 18:16:50: DEBUG: begin.
2019-03-06 18:16:50: DEBUG: seen nptype=2(prop)
2019-03-06 18:16:50: DEBUG: succeed.
2019-03-06 18:16:50: DEBUG: proposal #1 len=44
2019-03-06 18:16:50: DEBUG: begin.
2019-03-06 18:16:50: DEBUG: seen nptype=3(trns)
2019-03-06 18:16:50: DEBUG: succeed.
2019-03-06 18:16:50: DEBUG: transform #1 len=36
2019-03-06 18:16:50: DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
2019-03-06 18:16:50: DEBUG: encryption(aes)
2019-03-06 18:16:50: DEBUG: type=Key Length, flag=0x8000, lorv=128
2019-03-06 18:16:50: DEBUG: type=Hash Algorithm, flag=0x8000, lorv=SHA
2019-03-06 18:16:50: DEBUG: hash(sha1)
2019-03-06 18:16:50: DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group
2019-03-06 18:16:50: DEBUG: hmac(modp1024)
2019-03-06 18:16:50: DEBUG: type=Authentication Method, flag=0x8000, lorv=pre-shared key
2019-03-06 18:16:50: DEBUG: type=Life Type, flag=0x8000, lorv=seconds
2019-03-06 18:16:50: DEBUG: type=Life Duration, flag=0x8000, lorv=28800
2019-03-06 18:16:50: DEBUG: pair 1:
2019-03-06 18:16:50: DEBUG:  0x802025c00: next=0x0 tnext=0x0
2019-03-06 18:16:50: DEBUG: proposal #1: 1 transform
2019-03-06 18:16:50: DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
2019-03-06 18:16:50: DEBUG: type=Key Length, flag=0x8000, lorv=128
2019-03-06 18:16:50: DEBUG: type=Hash Algorithm, flag=0x8000, lorv=SHA
2019-03-06 18:16:50: DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group
2019-03-06 18:16:50: DEBUG: type=Authentication Method, flag=0x8000, lorv=pre-shared key
2019-03-06 18:16:50: DEBUG: type=Life Type, flag=0x8000, lorv=seconds
2019-03-06 18:16:50: DEBUG: type=Life Duration, flag=0x8000, lorv=28800
2019-03-06 18:16:50: DEBUG: prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1
2019-03-06 18:16:50: DEBUG: trns#=1, trns-id=IKE
2019-03-06 18:16:50: DEBUG:   lifetime = 28800
2019-03-06 18:16:50: DEBUG:   lifebyte = 0
2019-03-06 18:16:50: DEBUG:   enctype = AES-CBC
2019-03-06 18:16:50: DEBUG:   encklen = 128
2019-03-06 18:16:50: DEBUG:   hashtype = SHA
2019-03-06 18:16:50: DEBUG:   authmethod = pre-shared key
2019-03-06 18:16:50: DEBUG:   dh_group = 1024-bit MODP group
2019-03-06 18:16:50: DEBUG: an acceptable proposal found.
2019-03-06 18:16:50: DEBUG: hmac(modp1024)
2019-03-06 18:16:50: DEBUG: agreed on pre-shared key auth.
2019-03-06 18:16:50: DEBUG: ===
2019-03-06 18:16:50: DEBUG: compute DH's private.
2019-03-06 18:16:50: DEBUG:
45e17a9d eaba2aaa d6c8b3e1 9efee125 228366c6 5ab71241 c213291f f34249f4
fad0d5fc fc963b19 839537aa bcba597c 49d59de2 9ca3ead3 a68c382d a8d069e1
c998ac5f 13b75616 2e7a289e 36955a9e 27ed6b2d 9fb31d0e 93ad168c 4cacc4bf
aaf74f47 0d41e4fb cce912b3 b886e481 7d49a031 7878d6b9 54dfd202 a2ee2e47
2019-03-06 18:16:50: DEBUG: compute DH's public.
2019-03-06 18:16:50: DEBUG:
c7fec8a6 e0fef433 4f6d5223 34fe6c47 41ae88b1 addf9981 f6364653 5fafd742
5dd4b099 4dfdd0ff a6d01e04 e77045f0 16aedaf4 f871822a eb2620f6 aa0028e7
e95ff71e 5812664b 2303658f 60773bfb 43ca86c1 b2476774 2e4c369f db948d86
585f0439 98fb3b8b 81b356a1 0038e937 1ad2ad58 042d7f0f 6426ebff e7a18601
2019-03-06 18:16:50: DEBUG: add payload of len 128, next type 10
2019-03-06 18:16:50: DEBUG: add payload of len 16, next type 0
2019-03-06 18:16:50: DEBUG: 180 bytes from 91.142.161.34[500] to 195.149.70.70[500]
2019-03-06 18:16:50: DEBUG: sockname 91.142.161.34[500]
2019-03-06 18:16:50: DEBUG: send packet from 91.142.161.34[500]
2019-03-06 18:16:50: DEBUG: send packet to 195.149.70.70[500]
2019-03-06 18:16:50: DEBUG: 1 times of 180 bytes message will be sent to 195.149.70.70[500]
2019-03-06 18:16:50: DEBUG:
434232af c0702ef4 af72c8ad 45c86f17 04100200 00000000 000000b4 0a000084
c7fec8a6 e0fef433 4f6d5223 34fe6c47 41ae88b1 addf9981 f6364653 5fafd742
5dd4b099 4dfdd0ff a6d01e04 e77045f0 16aedaf4 f871822a eb2620f6 aa0028e7
e95ff71e 5812664b 2303658f 60773bfb 43ca86c1 b2476774 2e4c369f db948d86
585f0439 98fb3b8b 81b356a1 0038e937 1ad2ad58 042d7f0f 6426ebff e7a18601
00000014 e68cebc8 c2be3093 00fe87b8 d6d37263
2019-03-06 18:16:50: DEBUG: resend phase1 packet 434232afc0702ef4:af72c8ad45c86f17
2019-03-06 18:16:50: DEBUG: ===
2019-03-06 18:16:50: DEBUG: 256 bytes message received from 195.149.70.70[500] to 91.142.161.34[500]
2019-03-06 18:16:50: DEBUG:
434232af c0702ef4 af72c8ad 45c86f17 04100200 00000000 00000100 0a000084
ff104b39 6c15f495 d333fd95 a2d6270f a2a87d52 f83595f1 d243fe07 de3859f4
1c610aff 853d2536 5db022b2 7b5b818d 22171760 3a7c5203 0fa13e7d 7e63e36a
80bf2eec a5d4b2b6 c1d64e03 60ec235a ecd1a681 d99a7df5 589541ed 54f3f091
a6642594 f8186001 83313a2b 9c14777a abcfe1ab a12455db b821bf24 91d81670
0d000018 8f392dc9 02190f76 802f079e 804db025 88be1429 0d000014 12f5f28c
457168a9 702d9fe2 74cc0100 0d00000c 09002689 dfd6b712 0d000014 5ab56fb0
45c96f17 7a27685d 389ba250 00000014 1f07f70e aa6514d3 b0fa9654 2a500100
2019-03-06 18:16:50: DEBUG: begin.
2019-03-06 18:16:50: DEBUG: seen nptype=4(ke)
2019-03-06 18:16:50: DEBUG: seen nptype=10(nonce)
2019-03-06 18:16:50: DEBUG: seen nptype=13(vid)
2019-03-06 18:16:50: DEBUG: seen nptype=13(vid)
2019-03-06 18:16:50: DEBUG: seen nptype=13(vid)
2019-03-06 18:16:50: DEBUG: seen nptype=13(vid)
2019-03-06 18:16:50: DEBUG: succeed.
2019-03-06 18:16:50: INFO: received Vendor ID: CISCO-UNITY
2019-03-06 18:16:50: INFO: received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt
2019-03-06 18:16:50: DEBUG: received unknown Vendor ID
2019-03-06 18:16:50: DEBUG:
5ab56fb0 45c96f17 7a27685d 389ba250
2019-03-06 18:16:50: DEBUG: received unknown Vendor ID
2019-03-06 18:16:50: DEBUG:
1f07f70e aa6514d3 b0fa9654 2a500100
2019-03-06 18:16:50: DEBUG: ===
2019-03-06 18:16:50: DEBUG: compute DH's shared.
2019-03-06 18:16:50: DEBUG:
9f696d7b aeb7bb59 afbc89d7 f3f028f4 1c778634 07329b3f 53d81019 cb6b57f3
d61136a9 d9a179b6 fc96d0a3 70de1528 b3949b45 8862c4b3 79d15ab8 3a2ac53f
a97e6fd6 e8f1e8ec cba58c9a 2ba5580c 435cfb80 b226c6be 43f5156d d03791b2
bfdc44be 43b461ec a3c0444b baf8962d 950daf1c 112e674b 3ac0e6f7 948c2f55
2019-03-06 18:16:50: DEBUG: the psk found.
2019-03-06 18:16:50: DEBUG: nonce 1: 2019-03-06 18:16:50: DEBUG:
e68cebc8 c2be3093 00fe87b8 d6d37263
2019-03-06 18:16:50: DEBUG: nonce 2: 2019-03-06 18:16:50: DEBUG:
8f392dc9 02190f76 802f079e 804db025 88be1429
2019-03-06 18:16:50: DEBUG: hmac(hmac_sha1)
2019-03-06 18:16:50: DEBUG: SKEYID computed:
2019-03-06 18:16:50: DEBUG:
7d6ee06c 6642d2ee baf58dc6 afcd402f f67c0d8c
2019-03-06 18:16:50: DEBUG: hmac(hmac_sha1)
2019-03-06 18:16:50: DEBUG: SKEYID_d computed:
2019-03-06 18:16:50: DEBUG:
beb5fd75 ac1238b4 c2ab9ec9 1f3e78e9 c1df0f74
2019-03-06 18:16:50: DEBUG: hmac(hmac_sha1)
2019-03-06 18:16:50: DEBUG: SKEYID_a computed:
2019-03-06 18:16:50: DEBUG:
b766cc88 593fd835 6a2aa111 2a5f25da 09afb85a
2019-03-06 18:16:50: DEBUG: hmac(hmac_sha1)
2019-03-06 18:16:50: DEBUG: SKEYID_e computed:
2019-03-06 18:16:50: DEBUG:
be1a9ac2 be715119 99568033 250a0906 765f2453
2019-03-06 18:16:50: DEBUG: encryption(aes)
2019-03-06 18:16:50: DEBUG: hash(sha1)
2019-03-06 18:16:50: DEBUG: final encryption key computed:
2019-03-06 18:16:50: DEBUG:
be1a9ac2 be715119 99568033 250a0906
2019-03-06 18:16:50: DEBUG: hash(sha1)
2019-03-06 18:16:50: DEBUG: encryption(aes)
2019-03-06 18:16:50: DEBUG: IV computed:
2019-03-06 18:16:50: DEBUG:
b6652cbf 9c9ca906 c2112030 8a09ddbf
2019-03-06 18:16:50: DEBUG: use ID type of IPv4_address
2019-03-06 18:16:50: DEBUG: HASH with:
2019-03-06 18:16:50: DEBUG:
c7fec8a6 e0fef433 4f6d5223 34fe6c47 41ae88b1 addf9981 f6364653 5fafd742
5dd4b099 4dfdd0ff a6d01e04 e77045f0 16aedaf4 f871822a eb2620f6 aa0028e7
e95ff71e 5812664b 2303658f 60773bfb 43ca86c1 b2476774 2e4c369f db948d86
585f0439 98fb3b8b 81b356a1 0038e937 1ad2ad58 042d7f0f 6426ebff e7a18601
ff104b39 6c15f495 d333fd95 a2d6270f a2a87d52 f83595f1 d243fe07 de3859f4
1c610aff 853d2536 5db022b2 7b5b818d 22171760 3a7c5203 0fa13e7d 7e63e36a
80bf2eec a5d4b2b6 c1d64e03 60ec235a ecd1a681 d99a7df5 589541ed 54f3f091
a6642594 f8186001 83313a2b 9c14777a abcfe1ab a12455db b821bf24 91d81670
434232af c0702ef4 af72c8ad 45c86f17 00000001 00000001 0000002c 01010001
00000024 01010000 800b0001 800c7080 80010007 800e0080 80030001 80020002
80040002 011101f4 5b8ea122
2019-03-06 18:16:50: DEBUG: hmac(hmac_sha1)
2019-03-06 18:16:50: DEBUG: HASH (init) computed:
2019-03-06 18:16:50: DEBUG:
b20866b0 853da347 2aba5758 8bbdd169 936d36f3
2019-03-06 18:16:50: DEBUG: add payload of len 8, next type 8
2019-03-06 18:16:50: DEBUG: add payload of len 20, next type 0
2019-03-06 18:16:50: DEBUG: begin encryption.
2019-03-06 18:16:50: DEBUG: encryption(aes)
2019-03-06 18:16:50: DEBUG: pad length = 12
2019-03-06 18:16:50: DEBUG:
0800000c 011101f4 5b8ea122 00000018 b20866b0 853da347 2aba5758 8bbdd169
936d36f3 00000000 00000000 0000000c
2019-03-06 18:16:50: DEBUG: encryption(aes)
2019-03-06 18:16:50: DEBUG: with key:
2019-03-06 18:16:50: DEBUG:
be1a9ac2 be715119 99568033 250a0906
2019-03-06 18:16:50: DEBUG: encrypted payload by IV:
2019-03-06 18:16:50: DEBUG:
b6652cbf 9c9ca906 c2112030 8a09ddbf
2019-03-06 18:16:50: DEBUG: save IV for next:
2019-03-06 18:16:50: DEBUG:
62e96ebc 78525244 1aafc40b 299cb61a
2019-03-06 18:16:50: DEBUG: encrypted.
2019-03-06 18:16:50: DEBUG: 76 bytes from 91.142.161.34[500] to 195.149.70.70[500]
2019-03-06 18:16:50: DEBUG: sockname 91.142.161.34[500]
2019-03-06 18:16:50: DEBUG: send packet from 91.142.161.34[500]
2019-03-06 18:16:50: DEBUG: send packet to 195.149.70.70[500]
2019-03-06 18:16:50: DEBUG: 1 times of 76 bytes message will be sent to 195.149.70.70[500]
2019-03-06 18:16:50: DEBUG:
434232af c0702ef4 af72c8ad 45c86f17 05100201 00000000 0000004c c7e3a04b
150899c3 d883d192 2faa044b af3ac4a7 fd79ea8a 50b784d7 d19c2721 62e96ebc
78525244 1aafc40b 299cb61a
2019-03-06 18:16:50: DEBUG: resend phase1 packet 434232afc0702ef4:af72c8ad45c86f17
2019-03-06 18:16:50: DEBUG: ===
2019-03-06 18:16:50: DEBUG: 92 bytes message received from 195.149.70.70[500] to 91.142.161.34[500]
2019-03-06 18:16:50: DEBUG:
434232af c0702ef4 af72c8ad 45c86f17 05100201 00000000 0000005c 2fa52a18
daca768f dfd711be 35655a08 b2a655db 02cbc91a 817ceb49 700d0bb9 86ad9a3a
9f2b14c3 b633eba1 bf8d6b4c e6cc8e4a 6965efb2 b3fcced8 ac83bed4
2019-03-06 18:16:50: DEBUG: begin decryption.
2019-03-06 18:16:50: DEBUG: encryption(aes)
2019-03-06 18:16:50: DEBUG: IV was saved for next processing:
2019-03-06 18:16:50: DEBUG:
e6cc8e4a 6965efb2 b3fcced8 ac83bed4
2019-03-06 18:16:50: DEBUG: encryption(aes)
2019-03-06 18:16:50: DEBUG: with key:
2019-03-06 18:16:50: DEBUG:
be1a9ac2 be715119 99568033 250a0906
2019-03-06 18:16:50: DEBUG: decrypted payload by IV:
2019-03-06 18:16:50: DEBUG:
62e96ebc 78525244 1aafc40b 299cb61a
2019-03-06 18:16:50: DEBUG: decrypted payload, but not trimed.
2019-03-06 18:16:50: DEBUG:
0800000c 011101f4 c3954646 0d000018 9918770f e913c6b8 9f750935 f13e10fb
52795dd5 00000014 afcad713 68a1f1c9 6b8696fc 77570100 00000000 00000000
2019-03-06 18:16:50: DEBUG: padding len=0
2019-03-06 18:16:50: DEBUG: skip to trim padding.
2019-03-06 18:16:50: DEBUG: decrypted.
2019-03-06 18:16:50: DEBUG:
434232af c0702ef4 af72c8ad 45c86f17 05100201 00000000 0000005c 0800000c
011101f4 c3954646 0d000018 9918770f e913c6b8 9f750935 f13e10fb 52795dd5
00000014 afcad713 68a1f1c9 6b8696fc 77570100 00000000 00000000
2019-03-06 18:16:50: DEBUG: begin.
2019-03-06 18:16:50: DEBUG: seen nptype=5(id)
2019-03-06 18:16:50: DEBUG: seen nptype=8(hash)
2019-03-06 18:16:50: DEBUG: seen nptype=13(vid)
2019-03-06 18:16:50: DEBUG: succeed.
2019-03-06 18:16:50: INFO: received Vendor ID: DPD
2019-03-06 18:16:50: DEBUG: remote supports DPD
2019-03-06 18:16:50: DEBUG: HASH received:
2019-03-06 18:16:50: DEBUG:
9918770f e913c6b8 9f750935 f13e10fb 52795dd5
2019-03-06 18:16:50: DEBUG: HASH with:
2019-03-06 18:16:50: DEBUG:
ff104b39 6c15f495 d333fd95 a2d6270f a2a87d52 f83595f1 d243fe07 de3859f4
1c610aff 853d2536 5db022b2 7b5b818d 22171760 3a7c5203 0fa13e7d 7e63e36a
80bf2eec a5d4b2b6 c1d64e03 60ec235a ecd1a681 d99a7df5 589541ed 54f3f091
a6642594 f8186001 83313a2b 9c14777a abcfe1ab a12455db b821bf24 91d81670
c7fec8a6 e0fef433 4f6d5223 34fe6c47 41ae88b1 addf9981 f6364653 5fafd742
5dd4b099 4dfdd0ff a6d01e04 e77045f0 16aedaf4 f871822a eb2620f6 aa0028e7
e95ff71e 5812664b 2303658f 60773bfb 43ca86c1 b2476774 2e4c369f db948d86
585f0439 98fb3b8b 81b356a1 0038e937 1ad2ad58 042d7f0f 6426ebff e7a18601
af72c8ad 45c86f17 434232af c0702ef4 00000001 00000001 0000002c 01010001
00000024 01010000 800b0001 800c7080 80010007 800e0080 80030001 80020002
80040002 011101f4 c3954646
2019-03-06 18:16:50: DEBUG: hmac(hmac_sha1)
2019-03-06 18:16:50: DEBUG: HASH (init) computed:
2019-03-06 18:16:50: DEBUG:
9918770f e913c6b8 9f750935 f13e10fb 52795dd5
2019-03-06 18:16:50: DEBUG: HASH for PSK validated.
2019-03-06 18:16:50: [195.149.70.70] DEBUG: peer's ID:2019-03-06 18:16:50: DEBUG:
011101f4 c3954646
2019-03-06 18:16:50: DEBUG: ===
2019-03-06 18:16:50: INFO: ISAKMP-SA established 91.142.161.34[500]-195.149.70.70[500] spi:434232afc0702ef4:af72c8ad45c86f17
2019-03-06 18:16:50: DEBUG: ===
2019-03-06 18:16:51: DEBUG: ===
2019-03-06 18:16:51: DEBUG: begin QUICK mode.
2019-03-06 18:16:51: INFO: initiate new phase 2 negotiation: 91.142.161.34[500]<=>195.149.70.70[500]
2019-03-06 18:16:51: DEBUG: compute IV for phase2
2019-03-06 18:16:51: DEBUG: phase1 last IV:
2019-03-06 18:16:51: DEBUG:
e6cc8e4a 6965efb2 b3fcced8 ac83bed4 ff7860c4
2019-03-06 18:16:51: DEBUG: hash(sha1)
2019-03-06 18:16:51: DEBUG: encryption(aes)
2019-03-06 18:16:51: DEBUG: phase2 IV computed:
2019-03-06 18:16:51: DEBUG:
cc800739 bc2b7bde 821378ca b4bf0021
2019-03-06 18:16:51: DEBUG: call pfkey_send_getspi
2019-03-06 18:16:51: DEBUG: pfkey GETSPI sent: ESP/Transport 195.149.70.70[0]->91.142.161.34[0]
2019-03-06 18:16:51: DEBUG: pfkey getspi sent.
2019-03-06 18:16:51: DEBUG: pk_recv: retry[0] recv()
2019-03-06 18:16:51: DEBUG: got pfkey GETSPI message
2019-03-06 18:16:51: DEBUG: pfkey GETSPI succeeded: ESP/Transport 195.149.70.70[500]->91.142.161.34[500] spi=266474142(0xfe2129e)
2019-03-06 18:16:51: DEBUG: hmac(modp2048)
2019-03-06 18:16:51: DEBUG: hmac(modp2048)
2019-03-06 18:16:51: DEBUG: hmac(modp2048)
2019-03-06 18:16:51: DEBUG: compute DH's private.
2019-03-06 18:16:51: DEBUG:
448fa040 1a2a7b00 314d854d b07fc3fd ba0e1cda 4a229cd0 c5be252f 21577f33
cab8c3c0 5c936629 b6db0449 9b66a460 f8d0568f 74aacfd3 176f3a5b f0b846cb
78fda8db 40a408b9 bab743cf a75014ea 7099b32b 1bca3564 caf95c65 b1594836
b627a2b1 56c7d021 5fe6d011 8d608c20 67d90004 9c2a40aa c3c56d6f ffaed5d9
6bd02e28 332b4320 447a7e6f 51182394 7b399d6f ecbe5d90 9d45d643 6a2ad95b
eb343230 6b394f10 26a114d7 e0a126ac 16d36456 02e2d086 beaa9d74 6ec6c283
4ef5d485 a52334af 6db424cc 7621c22e 13b42c67 36c27089 f4f04094 094fd953
3ade5a08 8bc19ce5 602ee488 03ace3e5 48e119cc 598b7951 cc305f8d 974502ce
2019-03-06 18:16:51: DEBUG: compute DH's public.
2019-03-06 18:16:51: DEBUG:
28e3a39f 3e1e1e1f abe1fdc1 9bf99fbb d4d277c8 3cebca8b f637450f 5f721457
1f80121b be3b0760 46e65d66 4d305115 e310e2c7 ca932681 a4cedf73 10a0d38d
7d6ec09c 54e769f2 7d2f0810 b879bf37 18017ec1 13ff210d d17e524e 2aa26093
c19a6441 3d0b77ab 0c6d5665 b21de2c6 4b14ae2f be986fe6 f61e8434 b0438fae
d0e229fe 7ee541e7 6fd5112a 5927e367 a5e18799 3314d43a 47405045 5c050eea
0848395b 0cd3af88 520350f8 9d99fa97 77463fb3 3737c1d2 9b42eaf4 ae08f2fe
8dc8ea8c e70e54f2 2bfd5b04 0cbecd46 3eeb2458 f8522aa4 a6843cd8 efed63d7
d0bc76c8 c650a427 b22eebb0 1338974c cb1db055 958e7ae3 4098d753 5963f107
2019-03-06 18:16:51: DEBUG: use local ID type IPv4_address
2019-03-06 18:16:51: DEBUG: use remote ID type IPv4_address
2019-03-06 18:16:51: DEBUG: IDci:
2019-03-06 18:16:51: DEBUG:
01000000 5b8ea122
2019-03-06 18:16:51: DEBUG: IDcr:
2019-03-06 18:16:51: DEBUG:
01000000 c3954646
2019-03-06 18:16:51: DEBUG: add payload of len 48, next type 10
2019-03-06 18:16:51: DEBUG: add payload of len 16, next type 4
2019-03-06 18:16:51: DEBUG: add payload of len 256, next type 5
2019-03-06 18:16:51: DEBUG: add payload of len 8, next type 5
2019-03-06 18:16:51: DEBUG: add payload of len 8, next type 0
2019-03-06 18:16:51: DEBUG: HASH with:
2019-03-06 18:16:51: DEBUG:
ff7860c4 0a000034 00000001 00000001 00000028 01030401 0fe2129e 0000001c
01030000 80010001 80027080 80040002 80050002 8003000e 04000014 f1c958eb
79195b52 d5b1a669 35572f28 05000104 28e3a39f 3e1e1e1f abe1fdc1 9bf99fbb
d4d277c8 3cebca8b f637450f 5f721457 1f80121b be3b0760 46e65d66 4d305115
e310e2c7 ca932681 a4cedf73 10a0d38d 7d6ec09c 54e769f2 7d2f0810 b879bf37
18017ec1 13ff210d d17e524e 2aa26093 c19a6441 3d0b77ab 0c6d5665 b21de2c6
4b14ae2f be986fe6 f61e8434 b0438fae d0e229fe 7ee541e7 6fd5112a 5927e367
a5e18799 3314d43a 47405045 5c050eea 0848395b 0cd3af88 520350f8 9d99fa97
77463fb3 3737c1d2 9b42eaf4 ae08f2fe 8dc8ea8c e70e54f2 2bfd5b04 0cbecd46
3eeb2458 f8522aa4 a6843cd8 efed63d7 d0bc76c8 c650a427 b22eebb0 1338974c
cb1db055 958e7ae3 4098d753 5963f107 0500000c 01000000 5b8ea122 0000000c
01000000 c3954646
2019-03-06 18:16:51: DEBUG: hmac(hmac_sha1)
2019-03-06 18:16:51: DEBUG: HASH computed:
2019-03-06 18:16:51: DEBUG:
9b697351 29d8aa4e 6ee311a5 c8e9a9ac 6f98cb6e
2019-03-06 18:16:51: DEBUG: add payload of len 20, next type 1
2019-03-06 18:16:51: DEBUG: begin encryption.
2019-03-06 18:16:51: DEBUG: encryption(aes)
2019-03-06 18:16:51: DEBUG: pad length = 4
2019-03-06 18:16:51: DEBUG:
01000018 9b697351 29d8aa4e 6ee311a5 c8e9a9ac 6f98cb6e 0a000034 00000001
00000001 00000028 01030401 0fe2129e 0000001c 01030000 80010001 80027080
80040002 80050002 8003000e 04000014 f1c958eb 79195b52 d5b1a669 35572f28
05000104 28e3a39f 3e1e1e1f abe1fdc1 9bf99fbb d4d277c8 3cebca8b f637450f
5f721457 1f80121b be3b0760 46e65d66 4d305115 e310e2c7 ca932681 a4cedf73
10a0d38d 7d6ec09c 54e769f2 7d2f0810 b879bf37 18017ec1 13ff210d d17e524e
2aa26093 c19a6441 3d0b77ab 0c6d5665 b21de2c6 4b14ae2f be986fe6 f61e8434
b0438fae d0e229fe 7ee541e7 6fd5112a 5927e367 a5e18799 3314d43a 47405045
5c050eea 0848395b 0cd3af88 520350f8 9d99fa97 77463fb3 3737c1d2 9b42eaf4
ae08f2fe 8dc8ea8c e70e54f2 2bfd5b04 0cbecd46 3eeb2458 f8522aa4 a6843cd8
efed63d7 d0bc76c8 c650a427 b22eebb0 1338974c cb1db055 958e7ae3 4098d753
5963f107 0500000c 01000000 5b8ea122 0000000c 01000000 c3954646 00000004
2019-03-06 18:16:51: DEBUG: encryption(aes)
2019-03-06 18:16:51: DEBUG: with key:
2019-03-06 18:16:51: DEBUG:
be1a9ac2 be715119 99568033 250a0906
2019-03-06 18:16:51: DEBUG: encrypted payload by IV:
2019-03-06 18:16:51: DEBUG:
cc800739 bc2b7bde 821378ca b4bf0021
2019-03-06 18:16:51: DEBUG: save IV for next:
2019-03-06 18:16:51: DEBUG:
c0579e9c 97f23d2a d8ca2d8b e376a715
2019-03-06 18:16:51: DEBUG: encrypted.
2019-03-06 18:16:51: DEBUG: 412 bytes from 91.142.161.34[500] to 195.149.70.70[500]
2019-03-06 18:16:51: DEBUG: sockname 91.142.161.34[500]
2019-03-06 18:16:51: DEBUG: send packet from 91.142.161.34[500]
2019-03-06 18:16:51: DEBUG: send packet to 195.149.70.70[500]
2019-03-06 18:16:51: DEBUG: 1 times of 412 bytes message will be sent to 195.149.70.70[500]
2019-03-06 18:16:51: DEBUG:
434232af c0702ef4 af72c8ad 45c86f17 08102001 ff7860c4 0000019c 7c3ee2f9
c6fbb090 c85a18eb 565052a9 f5495d52 e83c5f4e 1d8c663f 345c4ca0 d1f9ac14
bedeb203 da3cea19 b095d3e9 d6c46a07 b92e3398 e07cde30 e9b34c52 89eb86b8
f7750c9d 4696295e 5457f7c6 a7a06f9b ffa5910a f73d4457 1562c9e5 22300c69
5a731265 81abd228 e3010192 edac78ab 59bb8a0d 26f43c6d 4ee31d06 7b3d4aa2
36ed4634 b9844cd9 099ee539 6b89f733 39325bec f3684004 e661881c 5c46a19a
fdcf5a9b 276a1ef6 19523947 e48091d0 db1b30b6 3b09317c fdf6defb a8e68ba2
35f73aa9 a17972a7 e4cc4b21 5a8fbdbd c6160d97 b36a11b8 1a1b9aae 6fa3e139
5ec63c17 393c2b08 e006de40 ebab41fb 17fe193e 78e8e8b5 ba8f2240 191e3c89
078c3048 00e04aac dbe227cb 237c9795 098919bc 790588b8 eb4f6caa ba877e40
a24ce196 fda3b515 bf87a907 17b871c6 20518f82 8774e1fe d28ab278 6177113d
d7e6e48e a3042bd2 975f7fa1 a1870845 c3ae0e57 4b89709c b7b3b33a 5dc89a44
5e1e2ac5 07905be3 ed486b87 c0579e9c 97f23d2a d8ca2d8b e376a715
2019-03-06 18:16:51: DEBUG: resend phase2 packet 434232afc0702ef4:af72c8ad45c86f17:0000ff78
2019-03-06 18:16:51: DEBUG: ===
2019-03-06 18:16:51: DEBUG: 92 bytes message received from 195.149.70.70[500] to 91.142.161.34[500]
2019-03-06 18:16:51: DEBUG:
434232af c0702ef4 af72c8ad 45c86f17 08100501 c135b17a 0000005c eb766c9d
3f636cc0 47471ee2 35f47100 98286168 27ab2f62 af93ffbe 9faa3e5f 6b1c665b
8ecee891 3a2441ce 9893d78a e8198841 93f7b09a 0d61cf6c fde8e53f
2019-03-06 18:16:51: DEBUG: receive Information.
2019-03-06 18:16:51: DEBUG: compute IV for phase2
2019-03-06 18:16:51: DEBUG: phase1 last IV:
2019-03-06 18:16:51: DEBUG:
e6cc8e4a 6965efb2 b3fcced8 ac83bed4 c135b17a
2019-03-06 18:16:51: DEBUG: hash(sha1)
2019-03-06 18:16:51: DEBUG: encryption(aes)
2019-03-06 18:16:51: DEBUG: phase2 IV computed:
2019-03-06 18:16:51: DEBUG:
48b0a400 3ee2ba62 47d449a8 b7af0e7b
2019-03-06 18:16:51: DEBUG: begin decryption.
2019-03-06 18:16:51: DEBUG: encryption(aes)
2019-03-06 18:16:51: DEBUG: IV was saved for next processing:
2019-03-06 18:16:51: DEBUG:
e8198841 93f7b09a 0d61cf6c fde8e53f
2019-03-06 18:16:51: DEBUG: encryption(aes)
2019-03-06 18:16:51: DEBUG: with key:
2019-03-06 18:16:51: DEBUG:
be1a9ac2 be715119 99568033 250a0906
2019-03-06 18:16:51: DEBUG: decrypted payload by IV:
2019-03-06 18:16:51: DEBUG:
48b0a400 3ee2ba62 47d449a8 b7af0e7b
2019-03-06 18:16:51: DEBUG: decrypted payload, but not trimed.
2019-03-06 18:16:51: DEBUG:
0c000018 97b6a1a3 35dfb2f5 7ace3c20 5da9da93 4c6b21fd 0000001c 00000001
01100001 434232af c0702ef4 af72c8ad 45c86f17 00000000 00000000 00000000
2019-03-06 18:16:51: DEBUG: padding len=0
2019-03-06 18:16:51: DEBUG: skip to trim padding.
2019-03-06 18:16:51: DEBUG: decrypted.
2019-03-06 18:16:51: DEBUG:
434232af c0702ef4 af72c8ad 45c86f17 08100501 c135b17a 0000005c 0c000018
97b6a1a3 35dfb2f5 7ace3c20 5da9da93 4c6b21fd 0000001c 00000001 01100001
434232af c0702ef4 af72c8ad 45c86f17 00000000 00000000 00000000
2019-03-06 18:16:51: DEBUG: IV freed
2019-03-06 18:16:51: DEBUG: HASH with:
2019-03-06 18:16:51: DEBUG:
c135b17a 0000001c 00000001 01100001 434232af c0702ef4 af72c8ad 45c86f17
2019-03-06 18:16:51: DEBUG: hmac(hmac_sha1)
2019-03-06 18:16:51: DEBUG: HASH computed:
2019-03-06 18:16:51: DEBUG:
97b6a1a3 35dfb2f5 7ace3c20 5da9da93 4c6b21fd
2019-03-06 18:16:51: DEBUG: hash validated.
2019-03-06 18:16:51: DEBUG: begin.
2019-03-06 18:16:51: DEBUG: seen nptype=8(hash)
2019-03-06 18:16:51: DEBUG: seen nptype=12(delete)
2019-03-06 18:16:51: DEBUG: succeed.
2019-03-06 18:16:51: [195.149.70.70] DEBUG: delete payload for protocol ISAKMP
2019-03-06 18:16:51: INFO: ISAKMP-SA expired 91.142.161.34[500]-195.149.70.70[500] spi:434232afc0702ef4:af72c8ad45c86f17
2019-03-06 18:16:51: DEBUG: IV freed
2019-03-06 18:16:51: INFO: ISAKMP-SA deleted 91.142.161.34[500]-195.149.70.70[500] spi:434232afc0702ef4:af72c8ad45c86f17
2019-03-06 18:16:51: DEBUG: IV freed
2019-03-06 18:16:51: DEBUG: purged SAs.
2019-03-06 18:16:58: DEBUG: ===
2019-03-06 18:16:58: DEBUG: 96 bytes message received from 195.149.70.70[500] to 91.142.161.34[500]
2019-03-06 18:16:58: DEBUG:
c48ea7cf a1a8128f 80c65acd d493c6d5 0b100500 00000000 00000060 00000044
00000001 0000000e 0d000038 00000001 00000001 0000002c 01010001 00000024
01010000 800b0001 800c7080 80010007 800e0080 80030001 80020002 8004000e
2019-03-06 18:16:58: [195.149.70.70] ERROR: unknown Informational exchange received.
2019-03-06 18:16:58: DEBUG: ===
2019-03-06 18:16:58: DEBUG: 96 bytes message received from 195.149.70.70[500] to 91.142.161.34[500]
2019-03-06 18:16:58: DEBUG:
25f6a80a f8a159d2 b77f0f2c 1ab79011 0b100500 00000000 00000060 00000044
00000001 0000000e 0d000038 00000001 00000001 0000002c 01010001 00000024
01010000 800b0001 800c7080 80010007 800e0080 80030001 80020002 8004000e
2019-03-06 18:16:58: [195.149.70.70] ERROR: unknown Informational exchange received.