VPN Tunnel down - Troubleshoot

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

VPN Tunnel down - Troubleshoot

L4 Transporter

Hi Admins,

I need some help to troubleshoot our problem with the VPN Tunnels. We installed a Cisco to PaloAlto VPN tunnel. The PA in passive mode. But constantly the tunnels go down.

Here are some log outputs:

4-23-2014 9-27-32 AM.png

less mp-log ikemgr.log

2014-04-23 09:21:54 [DEBUG]: sockmisc.c:335:sendfromto(): sockname 122.152.XX.XX[500]

2014-04-23 09:21:54 [DEBUG]: sockmisc.c:337:sendfromto(): send packet from 122.152.XX.XX[500]

2014-04-23 09:21:54 [DEBUG]: sockmisc.c:339:sendfromto(): send packet to 195.243.XX.XX[500]

2014-04-23 09:21:54 [DEBUG]: sockmisc.c:524:sendfromto(): 1 times of 200 bytes message will be sent to 195.243.XX.XX[500]

2014-04-23 09:21:54 [DEBUG]: sockmisc.c:528:sendfromto():

12f2e961 943f0451 d4bfae00 36686dc1 84100400 00000000 000000c8 000000ac

00010201 2ab0d308 1a8e3074 18626886 1234948e 17dc58a4 57f2de84 1578afda

102d83be 0d000044 5b623b9b 2c433c3f 179fdd48 904deb9c 6858a3cc 08a3ddfe

246b2fa2 ea51bbfe 48febd37 f445bbc7 194dd9f2 eee1b306 6b1a70b1 c9a4ca81

ab580dbf 8454f5c4 0d000018 4048b7d5 6ebce885 25e7de7f 00d6c2d3 80000000

0d000014 afcad713 68a1f1c9 6b8696fc 77570100 00000014 a9b9b103 4f7e50a2

513b47b1 00bb85a9

2014-04-23 09:21:54 [DEBUG]: ikev1.c:1672:isakmp_ph1resend(): resend phase1 packet 12f2e961943f0451:d4bfae0036686dc1

2014-04-23 09:21:54 [DEBUG]: isakmp_agg.c:1354:agg_r1send(): PH1 state changed:  2 to  3 [PHASE1ST_MSG1SENT]     @agg_r1send

2014-04-23 09:21:55 [INFO]: ikev1.c:2488:log_ph1expired(): ====> PHASE-1 SA LIFETIME EXPIRED <====

====> Expired SA: 122.152.XX.XX[4500]-195.243.XX.XX[4500] cookie:12f2e9616ef13673:62cd35e2eea8ebe9 <====

2014-04-23 09:21:55 [DEBUG]: ikev1.c:1778:isakmp_ph1expire(): PH1 state changed: 14 to 14 [PHASE1ST_EXPIRED]     @isakmp_ph1expire

2014-04-23 09:21:55 [INFO]: ikev1.c:2471:log_ph1deleted(): ====> PHASE-1 SA DELETED <====

====> Deleted SA: 122.152.XX.XX[4500]-195.243.XX.XX[4500] cookie:12f2e9616ef13673:62cd35e2eea8ebe9 <====

2014-04-23 09:21:55 [DEBUG]: oakley.c:3088:oakley_delivm(): IV freed

Apr 23 09:21:55 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:21:55 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:21:55 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

Apr 23 09:21:55 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

2014-04-23 09:21:55 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:21:55 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:21:55 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:21:55 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:21:55 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:21:55 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

2014-04-23 09:21:56 [DEBUG]: ikev1.c:2978:isakmp_send(): 676 bytes from 122.152.XX.XX[500] to 195.243.XX.XX[500]

2014-04-23 09:21:56 [DEBUG]: ikev1.c:2978:isakmp_send(): 548 bytes from 122.152.XX.XX[500] to 195.243.XX.XX[500]

2014-04-23 09:21:56 [DEBUG]: sockmisc.c:335:sendfromto(): sockname 122.152.XX.XX[500]

2014-04-23 09:21:56 [DEBUG]: sockmisc.c:337:sendfromto(): send packet from 122.152.XX.XX[500]

2014-04-23 09:21:56 [DEBUG]: sockmisc.c:339:sendfromto(): send packet to 195.243.XX.XX[500]

2014-04-23 09:21:56 [DEBUG]: sockmisc.c:524:sendfromto(): 1 times of 548 bytes message will be sent to 195.243.XX.XX[500]

2014-04-23 09:21:56 [DEBUG]: sockmisc.c:528:sendfromto():

12f2e961 943f0451 d4bfae00 36686dc1 84100400 00000000 00000224 00000208

00010100 12f2e961 943f0451 d4bfae00 36686dc1 01100400 00000000 000002a4

04000038 00000001 00000001 0000002c 01010001 00000024 01010000 80010007

800e0100 80020006 8004000e 80030001 800b0001 800c0708 0a000104 56939011

c3d52772 6e02adab c4c0d526 db830833 d8dce02f 44c3bed9 97c8bb8a 314fb461

7ac98c13 321ee2ff 6494bed1 5f770831 bd307330 4a0b312e aae14037 2e7858c3

15032d22 4ae547c1 cfafbcf3 0a529a4c 010d34d7 91559795 57a1b4f8 e8e8be28

674538d5 ecac7b67 7f9b1adf 54d342c1 c60a17bb d68ed488 58e99359 0a3a22f9

c0407827 146adc07 08df768c ba6edc47 fd2d571a 1456b0b0 296cbe46 857fbf4c

8329884f 32b683a6 899617d2 4c10331c 5ea538bb edf73f4b e3b7007b 1690c7ef

3f4ea8b1 099cc8c0 b5f7c6dd 5b8e4d6a d4b67916 638f2daa fcc93d4f 404fc47d

ac0036f0 e58da5fa e4ed00de df3d02fa 20deaa25 bce3d9c2 337c35e2 05000014

fc3831ea 28df553b 1409e4fa 55fdcc28 0800000c 01000000 7a98911d 0d000044

75c0339f fddf9c29 17ee2f57 52014-04-23 09:21:56 [DEBUG]: ikev1.c:2978:isakmp_send(): 200 bytes from 122.152.XX.XX[500] to 195.243.XX.XX[500]

2014-04-23 09:21:56 [DEBUG]: sockmisc.c:335:sendfromto(): sockname 122.152.XX.XX[500]

2014-04-23 09:21:56 [DEBUG]: sockmisc.c:337:sendfromto(): send packet from 122.152.XX.XX[500]

2014-04-23 09:21:56 [DEBUG]: sockmisc.c:339:sendfromto(): send packet to 195.243.XX.XX[500]

2014-04-23 09:21:56 [DEBUG]: sockmisc.c:524:sendfromto(): 1 times of 200 bytes message will be sent to 195.243.XX.XX[500]

2014-04-23 09:21:56 [DEBUG]: sockmisc.c:528:sendfromto():

12f2e961 943f0451 d4bfae00 36686dc1 84100400 00000000 000000c8 000000ac

00010201 2ab0d308 1a8e3074 18626886 1234948e 17dc58a4 57f2de84 1578afda

102d83be 0d000044 5b623b9b 2c433c3f 179fdd48 904deb9c 6858a3cc 08a3ddfe

246b2fa2 ea51bbfe 48febd37 f445bbc7 194dd9f2 eee1b306 6b1a70b1 c9a4ca81

ab580dbf 8454f5c4 0d000018 4048b7d5 6ebce885 25e7de7f 00d6c2d3 80000000

0d000014 afcad713 68a1f1c9 6b8696fc 77570100 00000014 a9b9b103 4f7e50a2

513b47b1 00bb85a9

2014-04-23 09:21:56 [DEBUG]: ikev1.c:1672:isakmp_ph1resend(): resend phase1 packet 12f2e961943f0451:d4bfae0036686dc1

Apr 23 09:21:59 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:21:59 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:21:59 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:21:59 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:21:59 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

2014-04-23 09:21:59 [DEBUG]: ikev1.c:2978:isakmp_send(): 676 bytes from 122.152.XX.XX[500] to 195.243.XX.XX[500]

2014-04-23 09:21:59 [DEBUG]: ikev1.c:2978:isakmp_send(): 548 bytes from 122.152.XX.XX[500] to 195.243.XX.XX[500]

2014-04-23 09:21:59 [DEBUG]: sockmisc.c:335:sendfromto(): sockname 122.152.XX.XX[500]

2014-04-23 09:21:59 [DEBUG]: sockmisc.c:337:sendfromto(): send packet from 122.152.XX.XX[500]

2014-04-23 09:21:59 [DEBUG]: sockmisc.c:339:sendfromto(): send packet to 195.243.XX.XX[500]

2014-04-23 09:21:59 [DEBUG]: sockmisc.c:524:sendfromto(): 1 times of 548 bytes message will be sent to 195.243.XX.XX[500]

2014-04-23 09:21:59 [DEBUG]: sockmisc.c:528:sendfromto():

12f2e961 943f0451 d4bfae00 36686dc1 84100400 00000000 00000224 00000208

00010100 12f2e961 943f0451 d4bfae00 36686dc1 01100400 00000000 000002a4

04000038 00000001 00000001 0000002c 01010001 00000024 01010000 80010007

800e0100 80020006 8004000e 80030001 800b0001 800c0708 0a000104 56939011

c3d52772 6e02adab c4c0d526 db830833 d8dce02f 44c3bed9 97c8bb8a 314fb461

7ac98c13 321ee2ff 6494bed1 5f770831 bd307330 4a0b312e aae14037 2e7858c3

15032d22 4ae547c1 cfafbcf3 0a529a4c 010d34d7 91559795 57a1b4f8 e8e8be28

674538d5 ecac7b67 7f9b1adf 54d342c1 c60a17bb d68ed488 58e99359 0a3a22f9

c0407827 146adc07 08df768c ba6edc47 fd2d571a 1456b0b0 296cbe46 857fbf4c

8329884f 32b683a6 899617d2 4c10331c 5ea538bb edf73f4b e3b7007b 1690c7ef

3f4ea8b1 099cc8c0 b5f7c6dd 5b8e4d6a d4b67916 638f2daa fcc93d4f 404fc47d

ac0036f0 e58da5fa e4ed00de df3d02fa 20deaa25 bce3d9c2 337c35e2 05000014

fc3831ea 28df553b 1409e4fa 55fdcc28 0800000c 01000000 7a98911d 0d000044

75c0339f fddf9c29 17ee2f57 52014-04-23 09:21:59 [DEBUG]: ikev1.c:2978:isakmp_send(): 200 bytes from 122.152.XX.XX[500] to 195.243.XX.XX[500]

2014-04-23 09:21:59 [DEBUG]: sockmisc.c:335:sendfromto(): sockname 122.152.XX.XX[500]

2014-04-23 09:21:59 [DEBUG]: sockmisc.c:337:sendfromto(): send packet from 122.152.XX.XX[500]

2014-04-23 09:21:59 [DEBUG]: sockmisc.c:339:sendfromto(): send packet to 195.243.XX.XX[500]

2014-04-23 09:21:59 [DEBUG]: sockmisc.c:524:sendfromto(): 1 times of 200 bytes message will be sent to 195.243.XX.XX[500]

2014-04-23 09:21:59 [DEBUG]: sockmisc.c:528:sendfromto():

12f2e961 943f0451 d4bfae00 36686dc1 84100400 00000000 000000c8 000000ac

00010201 2ab0d308 1a8e3074 18626886 1234948e 17dc58a4 57f2de84 1578afda

102d83be 0d000044 5b623b9b 2c433c3f 179fdd48 904deb9c 6858a3cc 08a3ddfe

246b2fa2 ea51bbfe 48febd37 f445bbc7 194dd9f2 eee1b306 6b1a70b1 c9a4ca81

ab580dbf 8454f5c4 0d000018 4048b7d5 6ebce885 25e7de7f 00d6c2d3 80000000

0d000014 afcad713 68a1f1c9 6b8696fc 77570100 00000014 a9b9b103 4f7e50a2

513b47b1 00bb85a9

2014-04-23 09:21:59 [DEBUG]: ikev1.c:1672:isakmp_ph1resend(): resend phase1 packet 12f2e961943f0451:d4bfae0036686dc1

Apr 23 09:21:59 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:21:59 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:21:59 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:21:59 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:21:59 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

2014-04-23 09:22:00 [DEBUG]: ikev1_natt.c:348:natt_keepalive_send(): KA: 122.152.XX.XX[4500]->195.243.XX.XX[4500]

2014-04-23 09:22:00 [DEBUG]: sockmisc.c:335:sendfromto(): sockname 122.152.XX.XX[4500]

2014-04-23 09:22:00 [DEBUG]: sockmisc.c:337:sendfromto(): send packet from 122.152.XX.XX[4500]

2014-04-23 09:22:00 [DEBUG]: sockmisc.c:339:sendfromto(): send packet to 195.243.XX.XX[4500]

2014-04-23 09:22:00 [DEBUG]: sockmisc.c:524:sendfromto(): 1 times of 1 bytes message will be sent to 195.243.XX.XX[4500]

2014-04-23 09:22:00 [DEBUG]: sockmisc.c:528:sendfromto():

ff

2014-04-23 09:22:04 [DEBUG]: isakmp.c:944:isakmp_handler(): ===

2014-04-23 09:22:04 [DEBUG]: isakmp.c:945:isakmp_handler(): 548 bytes message received from 195.243.XX.XX[500]

2014-04-23 09:22:04 [DEBUG]: isakmp.c:948:isakmp_handler():

12f2e961 943f0451 00000000 00000000 01100400 00000000 00000224 0d000038

00000001 00000001 0000002c 01010001 00000024 01010000 80010007 800e0100

80020006 8004000e 80030001 800b0001 800c0708 0d000014 4a131c81 07035845

5c5728f2 0e95452f 0d000014 439b59f8 ba676c4c 7737ae22 eab8f582 0d000014

7d9419a6 5310ca6f 2c179d92 15529d56 04000014 90cb8091 3ebb696e 086381b5

ec427b1f 0a000104 7273d78a efa09af6 a945fe1a 1b38a728 f2f7af2b 991697fc

68754405 d5461382 87282931 2c813c92 87894734 c0db0b03 907cf85c 8a39e128

45c7d89e 2c2fa9d7 19a27248 4c9d6fb3 f0a58fc6 d7179729 0c20a685 cc870a13

1f14734e 58a7c512 6af79365 e02d43b1 b6302371 4a4c312a bc5e0df3 f4f247ac

3883ed09 ee1be047 a7f55741 bdb7818b c32e8113 a9432a8c 6ae25ca0 21390e6c

e9c1728c 7f33102f c8865034 48752c8e 290c51db 75724b72 61743046 20bf7370

4970e1df 5a8507ed 0a6a4154 0ccfda99 8660b6ed 610ba01a c1e232c1 00ce0c6a

b4744f6a 4ae7b048 650f52a0 a2ec5441 6cef8788 4416ac8b 3bc806cd 4cae5d20

7c6fb1a0 05e7905c 050000182014-04-23 09:22:04 [DEBUG]: sockmisc.c:335:sendfromto(): sockname 122.152.XX.XX[500]

2014-04-23 09:22:04 [DEBUG]: sockmisc.c:337:sendfromto(): send packet from 122.152.XX.XX[500]

2014-04-23 09:22:04 [DEBUG]: sockmisc.c:339:sendfromto(): send packet to 195.243.XX.XX[500]

2014-04-23 09:22:04 [DEBUG]: sockmisc.c:524:sendfromto(): 1 times of 676 bytes message will be sent to 195.243.XX.XX[500]

2014-04-23 09:22:04 [DEBUG]: sockmisc.c:528:sendfromto():

12f2e961 943f0451 d4bfae00 36686dc1 01100400 00000000 000002a4 04000038

00000001 00000001 0000002c 01010001 00000024 01010000 80010007 800e0100

80020006 8004000e 80030001 800b0001 800c0708 0a000104 56939011 c3d52772

6e02adab c4c0d526 db830833 d8dce02f 44c3bed9 97c8bb8a 314fb461 7ac98c13

321ee2ff 6494bed1 5f770831 bd307330 4a0b312e aae14037 2e7858c3 15032d22

4ae547c1 cfafbcf3 0a529a4c 010d34d7 91559795 57a1b4f8 e8e8be28 674538d5

ecac7b67 7f9b1adf 54d342c1 c60a17bb d68ed488 58e99359 0a3a22f9 c0407827

146adc07 08df768c ba6edc47 fd2d571a 1456b0b0 296cbe46 857fbf4c 8329884f

32b683a6 899617d2 4c10331c 5ea538bb edf73f4b e3b7007b 1690c7ef 3f4ea8b1

099cc8c0 b5f7c6dd 5b8e4d6a d4b67916 638f2daa fcc93d4f 404fc47d ac0036f0

e58da5fa e4ed00de df3d02fa 20deaa25 bce3d9c2 337c35e2 05000014 fc3831ea

28df553b 1409e4fa 55fdcc28 0800000c 01000000 7a98911d 0d000044 75c0339f

fddf9c29 17ee2f57 53d978fc c4e55e61 0b1028b8 b329fd1b 2409a27d 17d0a259

499cd9c9 9ce6ced9 7e353c05 32014-04-23 09:22:04 [INFO]: ikev1.c:318:ikev1_main(): the packet is retransmitted by 195.243.XX.XX[500].

2014-04-23 09:22:04 [DEBUG]: ikev1.c:2978:isakmp_send(): 676 bytes from 122.152.XX.XX[500] to 195.243.XX.XX[500]

2014-04-23 09:22:04 [DEBUG]: ikev1.c:2978:isakmp_send(): 548 bytes from 122.152.XX.XX[500] to 195.243.XX.XX[500]

2014-04-23 09:22:04 [DEBUG]: sockmisc.c:335:sendfromto(): sockname 122.152.XX.XX[500]

2014-04-23 09:22:04 [DEBUG]: sockmisc.c:337:sendfromto(): send packet from 122.152.XX.XX[500]

2014-04-23 09:22:04 [DEBUG]: sockmisc.c:339:sendfromto(): send packet to 195.243.XX.XX[500]

2014-04-23 09:22:04 [DEBUG]: sockmisc.c:524:sendfromto(): 1 times of 548 bytes message will be sent to 195.243.XX.XX[500]

2014-04-23 09:22:04 [DEBUG]: sockmisc.c:528:sendfromto():

12f2e961 943f0451 d4bfae00 36686dc1 84100400 00000000 00000224 00000208

00010100 12f2e961 943f0451 d4bfae00 36686dc1 01100400 00000000 000002a4

04000038 00000001 00000001 0000002c 01010001 00000024 01010000 80010007

800e0100 80020006 8004000e 80030001 800b0001 800c0708 0a000104 56939011

c3d52772 6e02adab c4c0d526 db830833 d8dce02f 44c3bed9 97c8bb8a 314fb461

7ac98c13 321ee2ff 6494bed1 5f770831 bd307330 4a0b312e aae14037 2e7858c3

15032d22 4ae547c1 cfafbcf3 0a529a4c 010d34d7 91559795 57a1b4f8 e8e8be28

674538d5 ecac7b67 7f9b1adf 54d342c1 c60a17bb d68ed488 58e99359 0a3a22f9

c0407827 146adc07 08df768c ba6edc47 fd2d571a 1456b0b0 296cbe46 857fbf4c

8329884f 32b683a6 899617d2 4c10331c 5ea538bb edf73f4b e3b7007b 1690c7ef

3f4ea8b1 099cc8c0 b5f7c6dd 5b8e4d6a d4b67916 638f2daa fcc93d4f 404fc47d

ac0036f0 e58da5fa e4ed00de df3d02fa 20deaa25 bce3d9c2 337c35e2 05000014

fc3831ea 28df553b 1409e4fa 55fdcc28 0800000c 01000000 7a98911d 0d000044

75c0339f fddf9c29 17ee2f57 52014-04-23 09:22:04 [DEBUG]: ikev1.c:2978:isakmp_send(): 200 bytes from 122.152.XX.XX[500] to 195.243.XX.XX[500]

2014-04-23 09:22:04 [DEBUG]: sockmisc.c:335:sendfromto(): sockname 122.152.XX.XX[500]

2014-04-23 09:22:04 [DEBUG]: sockmisc.c:337:sendfromto(): send packet from 122.152.XX.XX[500]

2014-04-23 09:22:04 [DEBUG]: sockmisc.c:339:sendfromto(): send packet to 195.243.XX.XX[500]

2014-04-23 09:22:04 [DEBUG]: sockmisc.c:524:sendfromto(): 1 times of 200 bytes message will be sent to 195.243.XX.XX[500]

2014-04-23 09:22:04 [DEBUG]: sockmisc.c:528:sendfromto():

12f2e961 943f0451 d4bfae00 36686dc1 84100400 00000000 000000c8 000000ac

00010201 2ab0d308 1a8e3074 18626886 1234948e 17dc58a4 57f2de84 1578afda

102d83be 0d000044 5b623b9b 2c433c3f 179fdd48 904deb9c 6858a3cc 08a3ddfe

246b2fa2 ea51bbfe 48febd37 f445bbc7 194dd9f2 eee1b306 6b1a70b1 c9a4ca81

ab580dbf 8454f5c4 0d000018 4048b7d5 6ebce885 25e7de7f 00d6c2d3 80000000

0d000014 afcad713 68a1f1c9 6b8696fc 77570100 00000014 a9b9b103 4f7e50a2

513b47b1 00bb85a9

2014-04-23 09:22:04 [DEBUG]: ikev1.c:1672:isakmp_ph1resend(): resend phase1 packet 12f2e961943f0451:d4bfae0036686dc1

2014-04-23 09:22:04 [DEBUG]: isakmp.c:944:isakmp_handler(): ===

2014-04-23 09:22:04 [DEBUG]: isakmp.c:945:isakmp_handler(): 236 bytes message received from 195.243.XX.XX[4500]

2014-04-23 09:22:04 [DEBUG]: isakmp.c:948:isakmp_handler():

12f2e961 943f0451 d4bfae00 36686dc1 08100401 00000000 000000ec e4dbb809

54a345f3 b12ae425 003af9b6 50ae163b a725e1ed c21dca9f eddc1773 72d58341

1e4ef0fe b5d1f919 8a865c1a 4d6395c7 75b847b0 c4536db5 a834c6f9 d5caf038

c415d8ec 9fce1745 d5beab5f a9091b95 5b01c874 995bfc1d 9479753b 5798a3bf

d894e440 448fb2b4 e48db1b2 27409d83 9bd70217 f8dbdb19 012e2111 c5b85733

f81ce2b7 fa26dbc9 bb4d03fa 7978aa77 a746dab6 c708ee49 69eed67a 1a310978

97b729a4 f51fd168 15e5c979 53201cd4 1046132a 8b89744f d1655226 932ea3a6

46bac677 74b0a410 9ca00acd

2014-04-23 09:22:04 [DEBUG]: oakley.c:3109:oakley_do_decrypt(): begin decryption.

2014-04-23 09:22:04 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:22:04 [DEBUG]: oakley.c:3123:oakley_do_decrypt(): IV was saved for next processing:

2014-04-23 09:22:04 [DEBUG]: oakley.c:3125:oakley_do_decrypt():

932ea3a6 46bac677 74b0a410 9ca00acd

2014-04-23 09:22:04 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:22:04 [DEBUG]: oakley.c:3148:oakley_do_decrypt(): with key:

2014-04-23 09:22:04 [DEBUG]: oakley.c:3149:oakley_do_decrypt():

d7337258 41d74255 31c70f8c 9ae72620 b9ee228c b7980138 e1b75316 2c09557b

2014-04-23 09:22:04 [DEBUG]: oakley.c:3154:oakley_do_decrypt(): decrypted payload by IV:

2014-04-23 09:22:04 [DEBUG]: oakley.c:3155:oakley_do_decrypt():

50ef6279 69418f9d fbb71d85 6004e297

2014-04-23 09:22:04 [DEBUG]: oakley.c:3157:oakley_do_decrypt(): decrypted payload, but not trimed.

2014-04-23 09:22:04 [DEBUG]: oakley.c:3159:oakley_do_decrypt():

14000044 cd36c3ec 34b15f85 41e51527 2e79d792 baea14a1 9fd5a7aa a8ec81c1

ed0b9b67 730dd327 50ac4057 2361ab39 a679e498 85bc9e60 e3cbed02 3c5c1001

a6f01bba 14000044 72858507 8dab0396 3378e3c3 7cb86661 8d9beb5e cd2d8a5f

edaaed6e 39b7437f 489d3204 a0ef6c83 15149c0a c0875931 0b3b0006 24660f70

ac15ded2 c273efb0 00000044 c3859723 b92ca3e9 9a609c0f fd774c2a 19db5b46

0ff102aa 8d16932c ee5dfcd4 7a86612f 64ed729a 6aedc20c c992aa63 edeb78f0

191bf313 99ba6b14 fd569527 00000000

2014-04-23 09:22:04 [DEBUG]: oakley.c:3168:oakley_do_decrypt(): padding len=0

2014-04-23 09:22:04 [DEBUG]: oakley.c:3199:oakley_do_decrypt(): decrypted.

2014-04-23 09:22:04 [DEBUG]: oakley.c:3200:oakley_do_decrypt():

12f2e961 943f0451 d4bfae00 36686dc1 08100401 00000000 000000ec 14000044

cd36c3ec 34b15f85 41e51527 2e79d792 baea14a1 9fd5a7aa a8ec81c1 ed0b9b67

730dd327 50ac4057 2361ab39 a679e498 85bc9e60 e3cbed02 3c5c1001 a6f01bba

14000044 72858507 8dab0396 3378e3c3 7cb86661 8d9beb5e cd2d8a5f edaaed6e

39b7437f 489d3204 a0ef6c83 15149c0a c0875931 0b3b0006 24660f70 ac15ded2

c273efb0 00000044 c3859723 b92ca3e9 9a609c0f fd774c2a 19db5b46 0ff102aa

8d16932c ee5dfcd4 7a86612f 64ed729a 6aedc20c c992aa63 edeb78f0 191bf313

99ba6b14 fd569527 00000000

2014-04-23 09:22:04 [DEBUG]: ikev1.c:2831:isakmp_parsewoh(): begin.

2014-04-23 09:22:04 [DEBUG]: ikev1.c:2858:isakmp_parsewoh(): seen nptype=8(hash)

2014-04-23 09:22:04 [DEBUG]: ikev1.c:2858:isakmp_parsewoh(): seen nptype=20(nat-d)

2014-04-23 09:22:04 [DEBUG]: ikev1.c:2858:isakmp_parsewoh(): seen nptype=20(nat-d)

2014-04-23 09:22:04 [DEBUG]: ikev1.c:2897:isakmp_parsewoh(): succeed.

2014-04-23 09:22:04 [INFO]: ikev1_natt.c:136:ikev1_natt_hash_addr(): Hashing 122.152.XX.XX[4500] with algo #6

2014-04-23 09:22:04 [DEBUG]: algorithm.c:386:alg_oakley_hashdef(): hash(sha512)

2014-04-23 09:22:04 [INFO]: isakmp_agg.c:1493:agg_r2recv(): NAT-D payload #0 verified

2014-04-23 09:22:04 [INFO]: ikev1_natt.c:136:ikev1_natt_hash_addr(): Hashing 195.243.XX.XX[4500] with algo #6

2014-04-23 09:22:04 [DEBUG]: algorithm.c:386:alg_oakley_hashdef(): hash(sha512)

2014-04-23 09:22:04 [INFO]: isakmp_agg.c:1493:agg_r2recv(): NAT-D payload #1 doesn't match

2014-04-23 09:22:04 [INFO]: isakmp_agg.c:1516:agg_r2recv(): NAT detected: PEER

2014-04-23 09:22:04 [DEBUG]: oakley.c:1323:oakley_validate_auth(): HASH received:

2014-04-23 09:22:04 [DEBUG]: oakley.c:1324:oakley_validate_auth():

cd36c3ec 34b15f85 41e51527 2e79d792 baea14a1 9fd5a7aa a8ec81c1 ed0b9b67

730dd327 50ac4057 2361ab39 a679e498 85bc9e60 e3cbed02 3c5c1001 a6f01bba

2014-04-23 09:22:04 [DEBUG]: oakley.c:801:oakley_ph1hash_common(): HASH with:

2014-04-23 09:22:04 [DEBUG]: oakley.c:802:oakley_ph1hash_common():

7273d78a efa09af6 a945fe1a 1b38a728 f2f7af2b 991697fc 68754405 d5461382

87282931 2c813c92 87894734 c0db0b03 907cf85c 8a39e128 45c7d89e 2c2fa9d7

19a27248 4c9d6fb3 f0a58fc6 d7179729 0c20a685 cc870a13 1f14734e 58a7c512

6af79365 e02d43b1 b6302371 4a4c312a bc5e0df3 f4f247ac 3883ed09 ee1be047

a7f55741 bdb7818b c32e8113 a9432a8c 6ae25ca0 21390e6c e9c1728c 7f33102f

c8865034 48752c8e 290c51db 75724b72 61743046 20bf7370 4970e1df 5a8507ed

0a6a4154 0ccfda99 8660b6ed 610ba01a c1e232c1 00ce0c6a b4744f6a 4ae7b048

650f52a0 a2ec5441 6cef8788 4416ac8b 3bc806cd 4cae5d20 7c6fb1a0 05e7905c

56939011 c3d52772 6e02adab c4c0d526 db830833 d8dce02f 44c3bed9 97c8bb8a

314fb461 7ac98c13 321ee2ff 6494bed1 5f770831 bd307330 4a0b312e aae14037

2e7858c3 15032d22 4ae547c1 cfafbcf3 0a529a4c 010d34d7 91559795 57a1b4f8

e8e8be28 674538d5 ecac7b67 7f9b1adf 54d342c1 c60a17bb d68ed488 58e99359

0a3a22f9 c0407827 146adc07 08df768c ba6edc47 fd2d571a 1456b0b0 296cbe46

857fbf4c 8329884f 32014-04-23 09:22:04 [DEBUG]: algorithm.c:469:alg_oakley_hmacdef(): hmac(hmac_sha2_512)

2014-04-23 09:22:04 [DEBUG]: oakley.c:811:oakley_ph1hash_common(): HASH (resp) computed:

2014-04-23 09:22:04 [DEBUG]: oakley.c:813:oakley_ph1hash_common():

cd36c3ec 34b15f85 41e51527 2e79d792 baea14a1 9fd5a7aa a8ec81c1 ed0b9b67

730dd327 50ac4057 2361ab39 a679e498 85bc9e60 e3cbed02 3c5c1001 a6f01bba

2014-04-23 09:22:04 [DEBUG]: oakley.c:1355:oakley_validate_auth(): HASH for PSK validated.

2014-04-23 09:22:04 [DEBUG]: isakmp_agg.c:1542:agg_r2recv(): PH1 state changed:  3 to  5 [PHASE1ST_MSG2RECEIVED]         @agg_r2recv

2014-04-23 09:22:04 [DEBUG]: ikev1.c:1023:ph1_main(): ===> PHASE-1 SEND PACKET <===

2014-04-23 09:22:04 [DEBUG]: isakmp_agg.c:1614:agg_r2send(): PH1 state changed:  5 to 12 [PHASE1ST_ESTABLISHED]  @agg_r2send

2014-04-23 09:22:04 [PROTO_NOTIFY]: ikev1.c:2446:log_ph1established(): ====> PHASE-1 NEGOTIATION SUCCEEDED AS RESPONDER, AGGRESSIVE MODE <====

====> Established SA: 122.152.XX.XX[4500]-195.243.XX.XX[4500] cookie:12f2e961943f0451:d4bfae0036686dc1 lifetime 1800 Sec <====

2014-04-23 09:22:04 [DEBUG]: ikev1.c:921:ph1_established(): ===

Apr 23 09:22:06 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:22:06 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:22:06 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:22:06 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:22:06 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:22:06 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:22:06 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:22:06 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:22:06 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:22:06 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:22:10 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:22:10 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:22:10 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:22:10 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:22:10 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:22:10 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:22:10 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:22:10 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:22:10 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:22:10 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:22:16 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:22:16 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:22:16 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:22:16 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:22:16 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:22:16 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:22:16 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:22:16 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:22:16 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:22:16 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:22:20 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:22:20 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:22:20 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:22:20 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:22:20 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

2014-04-23 09:22:20 [DEBUG]: ikev1_natt.c:348:natt_keepalive_send(): KA: 122.152.XX.XX[4500]->195.243.XX.XX[4500]

2014-04-23 09:22:20 [DEBUG]: sockmisc.c:335:sendfromto(): sockname 122.152.XX.XX[4500]

2014-04-23 09:22:20 [DEBUG]: sockmisc.c:337:sendfromto(): send packet from 122.152.XX.XX[4500]

2014-04-23 09:22:20 [DEBUG]: sockmisc.c:339:sendfromto(): send packet to 195.243.XX.XX[4500]

2014-04-23 09:22:20 [DEBUG]: sockmisc.c:524:sendfromto(): 1 times of 1 bytes message will be sent to 195.243.XX.XX[4500]

2014-04-23 09:22:20 [DEBUG]: sockmisc.c:528:sendfromto():

ff

Apr 23 09:22:20 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:22:20 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:22:20 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:22:20 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:22:20 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:22:24 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:22:24 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:22:24 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:22:24 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:22:24 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:22:24 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:22:24 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:22:24 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:22:24 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:22:24 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:22:28 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:22:28 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:22:28 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:22:28 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:22:28 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:22:28 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:22:28 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:22:28 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:22:28 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:22:28 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:22:35 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:22:35 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:22:35 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:22:35 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:22:35 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:22:35 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:22:35 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:22:35 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:22:35 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:22:35 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:22:38 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:22:38 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:22:38 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:22:38 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BPN-OSPF-Router(Gateway-BPN-OSPF-Router)_out

2014-04-23 09:22:38 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BPN-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:22:38 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:22:38 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:22:38 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:22:38 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-JHB-OSPF-Router(Gateway-JHB-OSPF-Router)_out

2014-04-23 09:22:38 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-JHB-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:22:38 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:22:38 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:22:38 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:22:38 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-LIN-Test-Router(Gateway-LIN-Test-Router)_out

2014-04-23 09:22:38 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-LIN-Test-Router passive mode specified for IKEv1, dropping acquire request

2014-04-23 09:22:39 [DEBUG]: isakmp.c:944:isakmp_handler(): ===

2014-04-23 09:22:39 [DEBUG]: isakmp.c:945:isakmp_handler(): 140 bytes message received from 195.243.XX.XX[4500]

2014-04-23 09:22:39 [DEBUG]: isakmp.c:948:isakmp_handler():

12f2e961 943f0451 d4bfae00 36686dc1 08100501 5e629d7c 0000008c 0adf805b

ebc9ac9b dc52e49f a468e974 eb83e889 9bf0d06c 78069290 bb5c3a8d ea73c3f5

0eecacae 0c8979ce 29ef7e0a b7be6a8a b8107dcf ed3a3453 ada584cb 7fe4f203

492cd6f2 59ea09fd e63db4b6 6ce187d1 e0d4591e d7f2c17d 6c27f82f 61e8221f

2741dbe6 be29f24e 485cf731

2014-04-23 09:22:39 [DEBUG]: isakmp_inf.c:147:isakmp_info_recv(): receive Information.

2014-04-23 09:22:39 [DEBUG]: oakley.c:3028:oakley_newiv2(): compute IV for phase2

2014-04-23 09:22:39 [DEBUG]: oakley.c:3029:oakley_newiv2(): phase1 last IV:

2014-04-23 09:22:39 [DEBUG]: oakley.c:3030:oakley_newiv2():

932ea3a6 46bac677 74b0a410 9ca00acd 5e629d7c

2014-04-23 09:22:39 [DEBUG]: algorithm.c:386:alg_oakley_hashdef(): hash(sha512)

2014-04-23 09:22:39 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:22:39 [DEBUG]: oakley.c:3063:oakley_newiv2(): phase2 IV computed:

2014-04-23 09:22:39 [DEBUG]: oakley.c:3064:oakley_newiv2():

988f1d5c 66fa67ac 1b3acfb7 64322e39

2014-04-23 09:22:39 [DEBUG]: oakley.c:3109:oakley_do_decrypt(): begin decryption.

2014-04-23 09:22:39 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:22:39 [DEBUG]: oakley.c:3123:oakley_do_decrypt(): IV was saved for next processing:

2014-04-23 09:22:39 [DEBUG]: oakley.c:3125:oakley_do_decrypt():

61e8221f 2741dbe6 be29f24e 485cf731

2014-04-23 09:22:39 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:22:39 [DEBUG]: oakley.c:3148:oakley_do_decrypt(): with key:

2014-04-23 09:22:39 [DEBUG]: oakley.c:3149:oakley_do_decrypt():

d7337258 41d74255 31c70f8c 9ae72620 b9ee228c b7980138 e1b75316 2c09557b

2014-04-23 09:22:39 [DEBUG]: oakley.c:3154:oakley_do_decrypt(): decrypted payload by IV:

2014-04-23 09:22:39 [DEBUG]: oakley.c:3155:oakley_do_decrypt():

988f1d5c 66fa67ac 1b3acfb7 64322e39

2014-04-23 09:22:39 [DEBUG]: oakley.c:3157:oakley_do_decrypt(): decrypted payload, but not trimed.

2014-04-23 09:22:39 [DEBUG]: oakley.c:3159:oakley_do_decrypt():

0b000044 cb13c1e2 a2e93462 6d17ef17 f82f6bf7 d55200cc 685d79bb d571495e

c589d673 5fafda7e e8dbc9d4 cce007fd 808ddea5 273ed15e c62f9425 be2643b8

b88cf965 00000020 00000001 01108d28 12f2e961 943f0451 d4bfae00 36686dc1

2dc4edaa 00000000 00000000 00000000

2014-04-23 09:22:39 [DEBUG]: oakley.c:3168:oakley_do_decrypt(): padding len=0

2014-04-23 09:22:39 [DEBUG]: oakley.c:3199:oakley_do_decrypt(): decrypted.

2014-04-23 09:22:39 [DEBUG]: oakley.c:3200:oakley_do_decrypt():

12f2e961 943f0451 d4bfae00 36686dc1 08100501 5e629d7c 0000008c 0b000044

cb13c1e2 a2e93462 6d17ef17 f82f6bf7 d55200cc 685d79bb d571495e c589d673

5fafda7e e8dbc9d4 cce007fd 808ddea5 273ed15e c62f9425 be2643b8 b88cf965

00000020 00000001 01108d28 12f2e961 943f0451 d4bfae00 36686dc1 2dc4edaa

00000000 00000000 00000000

2014-04-23 09:22:39 [DEBUG]: oakley.c:3088:oakley_delivm(): IV freed

2014-04-23 09:22:39 [DEBUG]: oakley.c:682:oakley_compute_hash1(): HASH with:

2014-04-23 09:22:39 [DEBUG]: oakley.c:683:oakley_compute_hash1():

5e629d7c 00000020 00000001 01108d28 12f2e961 943f0451 d4bfae00 36686dc1

2dc4edaa

2014-04-23 09:22:39 [DEBUG]: algorithm.c:469:alg_oakley_hmacdef(): hmac(hmac_sha2_512)

2014-04-23 09:22:39 [DEBUG]: oakley.c:692:oakley_compute_hash1(): HASH computed:

2014-04-23 09:22:39 [DEBUG]: oakley.c:693:oakley_compute_hash1():

cb13c1e2 a2e93462 6d17ef17 f82f6bf7 d55200cc 685d79bb d571495e c589d673

5fafda7e e8dbc9d4 cce007fd 808ddea5 273ed15e c62f9425 be2643b8 b88cf965

2014-04-23 09:22:39 [DEBUG]: isakmp_inf.c:262:isakmp_info_recv(): hash validated.

2014-04-23 09:22:39 [DEBUG]: ikev1.c:2831:isakmp_parsewoh(): begin.

2014-04-23 09:22:39 [DEBUG]: ikev1.c:2858:isakmp_parsewoh(): seen nptype=8(hash)

2014-04-23 09:22:39 [DEBUG]: ikev1.c:2858:isakmp_parsewoh(): seen nptype=11(notify)

2014-04-23 09:22:39 [DEBUG]: ikev1.c:2897:isakmp_parsewoh(): succeed.

2014-04-23 09:22:39 [DEBUG]: isakmp_inf.c:1540:isakmp_info_recv_r_u(): DPD R-U-There received

2014-04-23 09:22:39 [DEBUG]: oakley.c:3028:oakley_newiv2(): compute IV for phase2

2014-04-23 09:22:39 [DEBUG]: oakley.c:3029:oakley_newiv2(): phase1 last IV:

2014-04-23 09:22:39 [DEBUG]: oakley.c:3030:oakley_newiv2():

932ea3a6 46bac677 74b0a410 9ca00acd 7e2c384e

2014-04-23 09:22:39 [DEBUG]: algorithm.c:386:alg_oakley_hashdef(): hash(sha512)

2014-04-23 09:22:39 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:22:39 [DEBUG]: oakley.c:3063:oakley_newiv2(): phase2 IV computed:

2014-04-23 09:22:39 [DEBUG]: oakley.c:3064:oakley_newiv2():

fd2056f1 08c1f970 4fadd442 fbd2b948

2014-04-23 09:22:39 [DEBUG]: oakley.c:682:oakley_compute_hash1(): HASH with:

2014-04-23 09:22:39 [DEBUG]: oakley.c:683:oakley_compute_hash1():

7e2c384e 00000020 00000001 01108d29 12f2e961 943f0451 d4bfae00 36686dc1

2dc4edaa

2014-04-23 09:22:39 [DEBUG]: algorithm.c:469:alg_oakley_hmacdef(): hmac(hmac_sha2_512)

2014-04-23 09:22:39 [DEBUG]: oakley.c:692:oakley_compute_hash1(): HASH computed:

2014-04-23 09:22:39 [DEBUG]: oakley.c:693:oakley_compute_hash1():

fae65715 660f096d ce69ec97 fea02f69 8bf245d1 9a53f584 15e82061 16dc6f0a

a24fc45d 5239aa11 673d9e69 5e2fc9e3 9b44d3b1 ca2acfd1 d03af7fe 279e79ef

2014-04-23 09:22:39 [DEBUG]: oakley.c:3234:oakley_do_encrypt(): begin encryption.

2014-04-23 09:22:39 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:22:39 [DEBUG]: oakley.c:3250:oakley_do_encrypt(): pad length = 12

2014-04-23 09:22:39 [DEBUG]: oakley.c:3280:oakley_do_encrypt():

0b000044 fae65715 660f096d ce69ec97 fea02f69 8bf245d1 9a53f584 15e82061

16dc6f0a a24fc45d 5239aa11 673d9e69 5e2fc9e3 9b44d3b1 ca2acfd1 d03af7fe

279e79ef 00000020 00000001 01108d29 12f2e961 943f0451 d4bfae00 36686dc1

2dc4edaa 4dd98aac 1e91986a c2db620c

2014-04-23 09:22:39 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:22:39 [DEBUG]: oakley.c:3290:oakley_do_encrypt(): with key:

2014-04-23 09:22:39 [DEBUG]: oakley.c:3291:oakley_do_encrypt():

d7337258 41d74255 31c70f8c 9ae72620 b9ee228c b7980138 e1b75316 2c09557b

2014-04-23 09:22:39 [DEBUG]: oakley.c:3296:oakley_do_encrypt(): encrypted payload by IV:

2014-04-23 09:22:39 [DEBUG]: oakley.c:3297:oakley_do_encrypt():

fd2056f1 08c1f970 4fadd442 fbd2b948

2014-04-23 09:22:39 [DEBUG]: oakley.c:3303:oakley_do_encrypt(): save IV for next:

2014-04-23 09:22:39 [DEBUG]: oakley.c:3304:oakley_do_encrypt():

78a153a3 9e30e989 5bfdd060 6c992d74

2014-04-23 09:22:39 [DEBUG]: oakley.c:3320:oakley_do_encrypt(): encrypted.

2014-04-23 09:22:39 [DEBUG]: ikev1.c:2953:isakmp_send(): Adding NON-ESP marker

2014-04-23 09:22:39 [DEBUG]: ikev1.c:2978:isakmp_send(): 144 bytes from 122.152.XX.XX[4500] to 195.243.XX.XX[4500]

2014-04-23 09:22:39 [DEBUG]: sockmisc.c:335:sendfromto(): sockname 122.152.XX.XX[4500]

2014-04-23 09:22:39 [DEBUG]: sockmisc.c:337:sendfromto(): send packet from 122.152.XX.XX[4500]

2014-04-23 09:22:39 [DEBUG]: sockmisc.c:339:sendfromto(): send packet to 195.243.XX.XX[4500]

2014-04-23 09:22:39 [DEBUG]: sockmisc.c:524:sendfromto(): 1 times of 144 bytes message will be sent to 195.243.XX.XX[4500]

2014-04-23 09:22:39 [DEBUG]: sockmisc.c:528:sendfromto():

00000000 12f2e961 943f0451 d4bfae00 36686dc1 08100501 7e2c384e 0000008c

155e3936 3811b27e 09fe878d bde40f74 95acc6b5 ab19921a f02536d5 0eac9836

3a79c57d 54550695 7b950f40 b1bee109 6c16352f e410d9d6 68282cac ff94f8f3

28aced65 d21701f5 4a5de24f a194a208 1f603261 9e998250 f0745426 361ed488

78a153a3 9e30e989 5bfdd060 6c992d74

2014-04-23 09:22:39 [DEBUG]: isakmp_inf.c:805:isakmp_info_send_common(): sendto Information notify.

2014-04-23 09:22:39 [DEBUG]: oakley.c:3088:oakley_delivm(): IV freed

2014-04-23 09:22:39 [DEBUG]: isakmp_inf.c:1569:isakmp_info_recv_r_u(): received a valid R-U-THERE, ACK sent

2014-04-23 09:22:39 [PROTO_NOTIFY]: isakmp_inf.c:1159:isakmp_info_recv_n(): notification message 36136:R-U-THERE, doi=1 proto_id=1 spi=12f2e961943f0451 d4bfae0036686dc1 (size=16).

Apr 23 09:22:39 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:22:39 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:22:39 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

Apr 23 09:22:39 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

2014-04-23 09:22:39 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:22:39 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:22:39 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:22:39 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:22:39 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:22:39 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

2014-04-23 09:22:40 [DEBUG]: ikev1_natt.c:348:natt_keepalive_send(): KA: 122.152.XX.XX[4500]->195.243.XX.XX[4500]

2014-04-23 09:22:40 [DEBUG]: sockmisc.c:335:sendfromto(): sockname 122.152.XX.XX[4500]

2014-04-23 09:22:40 [DEBUG]: sockmisc.c:337:sendfromto(): send packet from 122.152.XX.XX[4500]

2014-04-23 09:22:40 [DEBUG]: sockmisc.c:339:sendfromto(): send packet to 195.243.XX.XX[4500]

2014-04-23 09:22:40 [DEBUG]: sockmisc.c:524:sendfromto(): 1 times of 1 bytes message will be sent to 195.243.XX.XX[4500]

2014-04-23 09:22:40 [DEBUG]: sockmisc.c:528:sendfromto():

ff

Apr 23 09:22:46 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:22:46 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:22:46 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:22:46 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:22:46 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:22:46 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:22:46 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:22:46 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:22:46 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:22:46 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:22:53 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:22:53 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:22:53 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:22:53 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:22:53 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:22:53 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:22:53 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:22:53 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:22:53 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:22:53 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:22:57 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:22:57 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:22:57 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:22:57 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:22:57 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:22:57 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:22:57 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:22:57 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:22:57 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:22:57 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

2014-04-23 09:23:00 [DEBUG]: ikev1_natt.c:348:natt_keepalive_send(): KA: 122.152.XX.XX[4500]->195.243.XX.XX[4500]

2014-04-23 09:23:00 [DEBUG]: sockmisc.c:335:sendfromto(): sockname 122.152.XX.XX[4500]

2014-04-23 09:23:00 [DEBUG]: sockmisc.c:337:sendfromto(): send packet from 122.152.XX.XX[4500]

2014-04-23 09:23:00 [DEBUG]: sockmisc.c:339:sendfromto(): send packet to 195.243.XX.XX[4500]

2014-04-23 09:23:00 [DEBUG]: sockmisc.c:524:sendfromto(): 1 times of 1 bytes message will be sent to 195.243.XX.XX[4500]

2014-04-23 09:23:00 [DEBUG]: sockmisc.c:528:sendfromto():

ff

Apr 23 09:23:04 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:23:04 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:23:04 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:23:04 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:23:04 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:23:04 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:23:04 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:23:04 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:23:04 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:23:04 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:23:10 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:23:10 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:23:10 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:23:10 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:23:10 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:23:10 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:23:10 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:23:10 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:23:10 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:23:10 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:23:15 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:23:15 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:23:15 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:23:15 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:23:15 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:23:15 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:23:15 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:23:15 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:23:15 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:23:15 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:23:20 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:23:20 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:23:20 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:23:20 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:23:20 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

2014-04-23 09:23:20 [DEBUG]: ikev1_natt.c:348:natt_keepalive_send(): KA: 122.152.XX.XX[4500]->195.243.XX.XX[4500]

2014-04-23 09:23:20 [DEBUG]: sockmisc.c:335:sendfromto(): sockname 122.152.XX.XX[4500]

2014-04-23 09:23:20 [DEBUG]: sockmisc.c:337:sendfromto(): send packet from 122.152.XX.XX[4500]

2014-04-23 09:23:20 [DEBUG]: sockmisc.c:339:sendfromto(): send packet to 195.243.XX.XX[4500]

2014-04-23 09:23:20 [DEBUG]: sockmisc.c:524:sendfromto(): 1 times of 1 bytes message will be sent to 195.243.XX.XX[4500]

2014-04-23 09:23:20 [DEBUG]: sockmisc.c:528:sendfromto():

ff

Apr 23 09:23:20 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:23:20 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:23:20 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:23:20 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:23:20 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:23:25 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:23:25 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:23:25 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:23:25 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:23:25 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:23:25 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:23:25 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:23:25 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:23:25 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:23:25 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:23:29 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:23:29 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:23:29 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:23:29 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:23:29 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:23:29 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:23:29 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:23:29 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:23:29 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:23:29 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:23:33 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:23:33 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:23:33 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:23:33 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:23:33 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:23:33 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:23:33 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:23:33 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:23:33 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:23:33 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:23:39 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:23:39 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:23:39 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:23:39 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:23:39 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:23:39 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:23:39 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:23:39 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:23:39 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:23:39 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

2014-04-23 09:23:40 [DEBUG]: ikev1_natt.c:348:natt_keepalive_send(): KA: 122.152.XX.XX[4500]->195.243.XX.XX[4500]

2014-04-23 09:23:40 [DEBUG]: sockmisc.c:335:sendfromto(): sockname 122.152.XX.XX[4500]

2014-04-23 09:23:40 [DEBUG]: sockmisc.c:337:sendfromto(): send packet from 122.152.XX.XX[4500]

2014-04-23 09:23:40 [DEBUG]: sockmisc.c:339:sendfromto(): send packet to 195.243.XX.XX[4500]

2014-04-23 09:23:40 [DEBUG]: sockmisc.c:524:sendfromto(): 1 times of 1 bytes message will be sent to 195.243.XX.XX[4500]

2014-04-23 09:23:40 [DEBUG]: sockmisc.c:528:sendfromto():

ff

Apr 23 09:23:46 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:23:46 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:23:46 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:23:46 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:23:46 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:23:46 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:23:46 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:23:46 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:23:46 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:23:46 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:23:53 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:23:53 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:23:53 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:23:53 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:23:53 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:23:53 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:23:53 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:23:53 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:23:53 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:23:53 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:23:57 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:23:57 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:23:57 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:23:57 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:23:57 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:23:57 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:23:57 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:23:57 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:23:57 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:23:57 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

2014-04-23 09:24:00 [DEBUG]: ikev1_natt.c:348:natt_keepalive_send(): KA: 122.152.XX.XX[4500]->195.243.XX.XX[4500]

2014-04-23 09:24:00 [DEBUG]: sockmisc.c:335:sendfromto(): sockname 122.152.XX.XX[4500]

2014-04-23 09:24:00 [DEBUG]: sockmisc.c:337:sendfromto(): send packet from 122.152.XX.XX[4500]

2014-04-23 09:24:00 [DEBUG]: sockmisc.c:339:sendfromto(): send packet to 195.243.XX.XX[4500]

2014-04-23 09:24:00 [DEBUG]: sockmisc.c:524:sendfromto(): 1 times of 1 bytes message will be sent to 195.243.XX.XX[4500]

2014-04-23 09:24:00 [DEBUG]: sockmisc.c:528:sendfromto():

ff

Apr 23 09:24:01 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:24:01 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:24:01 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:24:01 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:24:01 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:24:01 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:24:01 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:24:01 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:24:01 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:24:01 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:24:05 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:24:05 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:24:05 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:24:05 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:24:05 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:24:05 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:24:05 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:24:05 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:24:05 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:24:05 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:24:09 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:24:09 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:24:09 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:24:09 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:24:09 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:24:09 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:24:09 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:24:09 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:24:09 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:24:09 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:24:13 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:24:13 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:24:13 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:24:13 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:24:13 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:24:13 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:24:13 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:24:13 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:24:13 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:24:13 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:24:20 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:24:20 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:24:20 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:24:20 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:24:20 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

2014-04-23 09:24:20 [DEBUG]: ikev1_natt.c:348:natt_keepalive_send(): KA: 122.152.XX.XX[4500]->195.243.XX.XX[4500]

2014-04-23 09:24:20 [DEBUG]: sockmisc.c:335:sendfromto(): sockname 122.152.XX.XX[4500]

2014-04-23 09:24:20 [DEBUG]: sockmisc.c:337:sendfromto(): send packet from 122.152.XX.XX[4500]

2014-04-23 09:24:20 [DEBUG]: sockmisc.c:339:sendfromto(): send packet to 195.243.XX.XX[4500]

2014-04-23 09:24:20 [DEBUG]: sockmisc.c:524:sendfromto(): 1 times of 1 bytes message will be sent to 195.243.XX.XX[4500]

2014-04-23 09:24:20 [DEBUG]: sockmisc.c:528:sendfromto():

ff

Apr 23 09:24:20 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:24:20 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:24:20 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:24:20 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:24:20 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:24:23 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:24:23 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:24:23 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:24:23 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:24:23 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:24:23 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:24:23 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:24:23 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:24:23 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:24:23 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:24:27 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:24:27 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:24:27 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:24:27 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:24:27 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:24:27 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:24:27 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:24:27 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:24:27 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:24:27 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:24:31 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:24:31 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:24:31 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:24:31 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:24:31 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:24:31 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:24:31 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:24:31 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:24:31 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:24:31 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:24:35 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:24:35 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:24:35 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:24:35 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:24:35 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:24:35 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:24:35 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:24:35 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:24:35 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:24:35 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:24:39 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:24:39 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:24:39 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:24:39 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:24:39 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:24:39 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:24:39 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:24:39 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:24:39 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:24:39 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

2014-04-23 09:24:40 [DEBUG]: ikev1_natt.c:348:natt_keepalive_send(): KA: 122.152.XX.XX[4500]->195.243.XX.XX[4500]

2014-04-23 09:24:40 [DEBUG]: sockmisc.c:335:sendfromto(): sockname 122.152.XX.XX[4500]

2014-04-23 09:24:40 [DEBUG]: sockmisc.c:337:sendfromto(): send packet from 122.152.XX.XX[4500]

2014-04-23 09:24:40 [DEBUG]: sockmisc.c:339:sendfromto(): send packet to 195.243.XX.XX[4500]

2014-04-23 09:24:40 [DEBUG]: sockmisc.c:524:sendfromto(): 1 times of 1 bytes message will be sent to 195.243.XX.XX[4500]

2014-04-23 09:24:40 [DEBUG]: sockmisc.c:528:sendfromto():

ff

Apr 23 09:24:43 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:24:43 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:24:43 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:24:43 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:24:43 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:24:43 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:24:43 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:24:43 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:24:43 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:24:43 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:24:49 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:24:49 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:24:49 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:24:49 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:24:49 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:24:49 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:24:49 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:24:49 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:24:49 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:24:49 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:24:53 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:24:53 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:24:53 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:24:53 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:24:53 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:24:53 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:24:53 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:24:53 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:24:53 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:24:53 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:24:57 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:24:57 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:24:57 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:24:57 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:24:57 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:24:57 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:24:57 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:24:57 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:24:57 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:24:57 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

2014-04-23 09:25:00 [DEBUG]: ikev1_natt.c:348:natt_keepalive_send(): KA: 122.152.XX.XX[4500]->195.243.XX.XX[4500]

2014-04-23 09:25:00 [DEBUG]: sockmisc.c:335:sendfromto(): sockname 122.152.XX.XX[4500]

2014-04-23 09:25:00 [DEBUG]: sockmisc.c:337:sendfromto(): send packet from 122.152.XX.XX[4500]

2014-04-23 09:25:00 [DEBUG]: sockmisc.c:339:sendfromto(): send packet to 195.243.XX.XX[4500]

2014-04-23 09:25:00 [DEBUG]: sockmisc.c:524:sendfromto(): 1 times of 1 bytes message will be sent to 195.243.XX.XX[4500]

2014-04-23 09:25:00 [DEBUG]: sockmisc.c:528:sendfromto():

ff

Apr 23 09:25:01 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:25:01 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:25:01 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:25:01 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:25:01 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:25:01 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:25:01 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:25:01 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:25:01 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:25:01 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:25:08 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:25:08 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:25:08 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:25:08 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:25:08 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:25:08 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:25:08 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:25:08 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:25:08 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:25:08 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:25:12 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:25:12 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:25:12 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:25:12 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:25:12 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:25:12 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:25:12 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:25:12 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:25:12 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:25:12 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:25:16 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:25:16 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:25:16 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:25:16 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:25:16 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:25:16 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:25:16 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:25:16 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:25:16 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:25:16 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:25:20 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:25:20 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:25:20 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:25:20 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:25:20 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

2014-04-23 09:25:20 [DEBUG]: ikev1_natt.c:348:natt_keepalive_send(): KA: 122.152.XX.XX[4500]->195.243.XX.XX[4500]

2014-04-23 09:25:20 [DEBUG]: sockmisc.c:335:sendfromto(): sockname 122.152.XX.XX[4500]

2014-04-23 09:25:20 [DEBUG]: sockmisc.c:337:sendfromto(): send packet from 122.152.XX.XX[4500]

2014-04-23 09:25:20 [DEBUG]: sockmisc.c:339:sendfromto(): send packet to 195.243.XX.XX[4500]

2014-04-23 09:25:20 [DEBUG]: sockmisc.c:524:sendfromto(): 1 times of 1 bytes message will be sent to 195.243.XX.XX[4500]

2014-04-23 09:25:20 [DEBUG]: sockmisc.c:528:sendfromto():

ff

Apr 23 09:25:20 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:25:20 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:25:20 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:25:20 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:25:20 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:25:24 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:25:24 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:25:24 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:25:24 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:25:24 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:25:24 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:25:24 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:25:24 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:25:24 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:25:24 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:25:29 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:25:29 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:25:29 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:25:29 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:25:29 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:25:29 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:25:29 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:25:29 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:25:29 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:25:29 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:25:33 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:25:33 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:25:33 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:25:33 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:25:33 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:25:33 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:25:33 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:25:33 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:25:33 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:25:33 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:25:37 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:25:37 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:25:37 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:25:37 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:25:37 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:25:37 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:25:37 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:25:37 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:25:37 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:25:37 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

2014-04-23 09:25:40 [DEBUG]: ikev1_natt.c:348:natt_keepalive_send(): KA: 122.152.XX.XX[4500]->195.243.XX.XX[4500]

2014-04-23 09:25:40 [DEBUG]: sockmisc.c:335:sendfromto(): sockname 122.152.XX.XX[4500]

2014-04-23 09:25:40 [DEBUG]: sockmisc.c:337:sendfromto(): send packet from 122.152.XX.XX[4500]

2014-04-23 09:25:40 [DEBUG]: sockmisc.c:339:sendfromto(): send packet to 195.243.XX.XX[4500]

2014-04-23 09:25:40 [DEBUG]: sockmisc.c:524:sendfromto(): 1 times of 1 bytes message will be sent to 195.243.XX.XX[4500]

2014-04-23 09:25:40 [DEBUG]: sockmisc.c:528:sendfromto():

ff

Apr 23 09:25:41 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:25:41 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:25:41 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:25:41 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:25:41 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:25:41 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:25:41 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:25:41 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:25:41 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:25:41 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:25:46 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:25:46 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:25:46 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:25:46 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:25:46 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:25:46 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:25:46 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:25:46 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:25:46 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:25:46 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:25:50 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:25:50 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:25:50 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:25:50 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:25:50 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:25:50 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:25:50 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:25:50 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:25:50 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:25:50 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:25:56 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:25:56 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:25:56 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:25:56 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:25:56 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:25:56 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:25:56 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:25:56 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:25:56 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:25:56 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:26:00 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:26:00 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:26:00 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:26:00 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:26:00 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

2014-04-23 09:26:00 [DEBUG]: ikev1_natt.c:348:natt_keepalive_send(): KA: 122.152.XX.XX[4500]->195.243.XX.XX[4500]

2014-04-23 09:26:00 [DEBUG]: sockmisc.c:335:sendfromto(): sockname 122.152.XX.XX[4500]

2014-04-23 09:26:00 [DEBUG]: sockmisc.c:337:sendfromto(): send packet from 122.152.XX.XX[4500]

2014-04-23 09:26:00 [DEBUG]: sockmisc.c:339:sendfromto(): send packet to 195.243.XX.XX[4500]

2014-04-23 09:26:00 [DEBUG]: sockmisc.c:524:sendfromto(): 1 times of 1 bytes message will be sent to 195.243.XX.XX[4500]

2014-04-23 09:26:00 [DEBUG]: sockmisc.c:528:sendfromto():

ff

Apr 23 09:26:00 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:26:00 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:26:00 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:26:00 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:26:00 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

2014-04-23 09:26:01 [DEBUG]: isakmp.c:944:isakmp_handler(): ===

2014-04-23 09:26:01 [DEBUG]: isakmp.c:945:isakmp_handler(): 108 bytes message received from 175.184.XX.XX[500]

2014-04-23 09:26:01 [DEBUG]: isakmp.c:948:isakmp_handler():

145d0809 aa26336e 51486f01 4c369834 08100501 c7e67393 0000006c b63fd7df

b58f6f7b d91b1cbd ae369f74 fbea485a 2ba1f3f1 e0947ecd 97b2cfe0 886aadff

4b3dd069 a6c4e7bd cf6906a6 ee9bc4c0 9aa69a9a 9db1fad5 3fba7791 f9f34d69

23fb36d0 613eb03f 51d3e456

2014-04-23 09:26:01 [DEBUG]: isakmp_inf.c:147:isakmp_info_recv(): receive Information.

2014-04-23 09:26:01 [DEBUG]: oakley.c:3028:oakley_newiv2(): compute IV for phase2

2014-04-23 09:26:01 [DEBUG]: oakley.c:3029:oakley_newiv2(): phase1 last IV:

2014-04-23 09:26:01 [DEBUG]: oakley.c:3030:oakley_newiv2():

f48759f0 6611810f 1ee2b6c3 8429842c c7e67393

2014-04-23 09:26:01 [DEBUG]: algorithm.c:386:alg_oakley_hashdef(): hash(sha256)

2014-04-23 09:26:01 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:26:01 [DEBUG]: oakley.c:3063:oakley_newiv2(): phase2 IV computed:

2014-04-23 09:26:01 [DEBUG]: oakley.c:3064:oakley_newiv2():

3caa6faa ac5a2ae9 82a80c9d 40921597

2014-04-23 09:26:01 [DEBUG]: oakley.c:3109:oakley_do_decrypt(): begin decryption.

2014-04-23 09:26:01 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:26:01 [DEBUG]: oakley.c:3123:oakley_do_decrypt(): IV was saved for next processing:

2014-04-23 09:26:01 [DEBUG]: oakley.c:3125:oakley_do_decrypt():

f9f34d69 23fb36d0 613eb03f 51d3e456

2014-04-23 09:26:01 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:26:01 [DEBUG]: oakley.c:3148:oakley_do_decrypt(): with key:

2014-04-23 09:26:01 [DEBUG]: oakley.c:3149:oakley_do_decrypt():

ee9ab0b8 45683e6c 2d4acc33 c75e88b1 19b2305d 7dc6bbe8 a1a58893 c00d708d

2014-04-23 09:26:01 [DEBUG]: oakley.c:3154:oakley_do_decrypt(): decrypted payload by IV:

2014-04-23 09:26:01 [DEBUG]: oakley.c:3155:oakley_do_decrypt():

3caa6faa ac5a2ae9 82a80c9d 40921597

2014-04-23 09:26:01 [DEBUG]: oakley.c:3157:oakley_do_decrypt(): decrypted payload, but not trimed.

2014-04-23 09:26:01 [DEBUG]: oakley.c:3159:oakley_do_decrypt():

0b000024 75f0efed 34de1dbe f03b8207 16ef4958 b7648e53 01f3e15f c7f19a3b

a8817710 00000020 00000001 01108d28 145d0809 aa26336e 51486f01 4c369834

13adfd18 00000000 00000000 00000000

2014-04-23 09:26:01 [DEBUG]: oakley.c:3168:oakley_do_decrypt(): padding len=0

2014-04-23 09:26:01 [DEBUG]: oakley.c:3199:oakley_do_decrypt(): decrypted.

2014-04-23 09:26:01 [DEBUG]: oakley.c:3200:oakley_do_decrypt():

145d0809 aa26336e 51486f01 4c369834 08100501 c7e67393 0000006c 0b000024

75f0efed 34de1dbe f03b8207 16ef4958 b7648e53 01f3e15f c7f19a3b a8817710

00000020 00000001 01108d28 145d0809 aa26336e 51486f01 4c369834 13adfd18

00000000 00000000 00000000

2014-04-23 09:26:01 [DEBUG]: oakley.c:3088:oakley_delivm(): IV freed

2014-04-23 09:26:01 [DEBUG]: oakley.c:682:oakley_compute_hash1(): HASH with:

2014-04-23 09:26:01 [DEBUG]: oakley.c:683:oakley_compute_hash1():

c7e67393 00000020 00000001 01108d28 145d0809 aa26336e 51486f01 4c369834

13adfd18

2014-04-23 09:26:01 [DEBUG]: algorithm.c:469:alg_oakley_hmacdef(): hmac(hmac_sha2_256)

2014-04-23 09:26:01 [DEBUG]: oakley.c:692:oakley_compute_hash1(): HASH computed:

2014-04-23 09:26:01 [DEBUG]: oakley.c:693:oakley_compute_hash1():

75f0efed 34de1dbe f03b8207 16ef4958 b7648e53 01f3e15f c7f19a3b a8817710

2014-04-23 09:26:01 [DEBUG]: isakmp_inf.c:262:isakmp_info_recv(): hash validated.

2014-04-23 09:26:01 [DEBUG]: ikev1.c:2831:isakmp_parsewoh(): begin.

2014-04-23 09:26:01 [DEBUG]: ikev1.c:2858:isakmp_parsewoh(): seen nptype=8(hash)

2014-04-23 09:26:01 [DEBUG]: ikev1.c:2858:isakmp_parsewoh(): seen nptype=11(notify)

2014-04-23 09:26:01 [DEBUG]: ikev1.c:2897:isakmp_parsewoh(): succeed.

2014-04-23 09:26:01 [DEBUG]: isakmp_inf.c:1540:isakmp_info_recv_r_u(): DPD R-U-There received

2014-04-23 09:26:01 [DEBUG]: oakley.c:3028:oakley_newiv2(): compute IV for phase2

2014-04-23 09:26:01 [DEBUG]: oakley.c:3029:oakley_newiv2(): phase1 last IV:

2014-04-23 09:26:01 [DEBUG]: oakley.c:3030:oakley_newiv2():

f48759f0 6611810f 1ee2b6c3 8429842c 31e8e8e9

2014-04-23 09:26:01 [DEBUG]: algorithm.c:386:alg_oakley_hashdef(): hash(sha256)

2014-04-23 09:26:01 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:26:01 [DEBUG]: oakley.c:3063:oakley_newiv2(): phase2 IV computed:

2014-04-23 09:26:01 [DEBUG]: oakley.c:3064:oakley_newiv2():

a4590b78 f01d1b55 81e56e66 3a797954

2014-04-23 09:26:01 [DEBUG]: oakley.c:682:oakley_compute_hash1(): HASH with:

2014-04-23 09:26:01 [DEBUG]: oakley.c:683:oakley_compute_hash1():

31e8e8e9 00000020 00000001 01108d29 145d0809 aa26336e 51486f01 4c369834

13adfd18

2014-04-23 09:26:01 [DEBUG]: algorithm.c:469:alg_oakley_hmacdef(): hmac(hmac_sha2_256)

2014-04-23 09:26:01 [DEBUG]: oakley.c:692:oakley_compute_hash1(): HASH computed:

2014-04-23 09:26:01 [DEBUG]: oakley.c:693:oakley_compute_hash1():

b89d3e73 6630d125 9bed3e97 4df40e79 bb5aacb6 69f0e0f4 80320038 f2f07a4b

2014-04-23 09:26:01 [DEBUG]: oakley.c:3234:oakley_do_encrypt(): begin encryption.

2014-04-23 09:26:01 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:26:01 [DEBUG]: oakley.c:3250:oakley_do_encrypt(): pad length = 12

2014-04-23 09:26:01 [DEBUG]: oakley.c:3280:oakley_do_encrypt():

0b000024 b89d3e73 6630d125 9bed3e97 4df40e79 bb5aacb6 69f0e0f4 80320038

f2f07a4b 00000020 00000001 01108d29 145d0809 aa26336e 51486f01 4c369834

13adfd18 442ef4b0 3517fc5a 8f93f30c

2014-04-23 09:26:01 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:26:01 [DEBUG]: oakley.c:3290:oakley_do_encrypt(): with key:

2014-04-23 09:26:01 [DEBUG]: oakley.c:3291:oakley_do_encrypt():

ee9ab0b8 45683e6c 2d4acc33 c75e88b1 19b2305d 7dc6bbe8 a1a58893 c00d708d

2014-04-23 09:26:01 [DEBUG]: oakley.c:3296:oakley_do_encrypt(): encrypted payload by IV:

2014-04-23 09:26:01 [DEBUG]: oakley.c:3297:oakley_do_encrypt():

a4590b78 f01d1b55 81e56e66 3a797954

2014-04-23 09:26:01 [DEBUG]: oakley.c:3303:oakley_do_encrypt(): save IV for next:

2014-04-23 09:26:01 [DEBUG]: oakley.c:3304:oakley_do_encrypt():

e0066987 f85906b4 c20a9788 24beb305

2014-04-23 09:26:01 [DEBUG]: oakley.c:3320:oakley_do_encrypt(): encrypted.

2014-04-23 09:26:01 [DEBUG]: ikev1.c:2978:isakmp_send(): 108 bytes from 122.152.XX.XX[500] to 175.184.XX.XX[500]

2014-04-23 09:26:01 [DEBUG]: sockmisc.c:335:sendfromto(): sockname 122.152.XX.XX[500]

2014-04-23 09:26:01 [DEBUG]: sockmisc.c:337:sendfromto(): send packet from 122.152.XX.XX[500]

2014-04-23 09:26:01 [DEBUG]: sockmisc.c:339:sendfromto(): send packet to 175.184.XX.XX[500]

2014-04-23 09:26:01 [DEBUG]: sockmisc.c:524:sendfromto(): 1 times of 108 bytes message will be sent to 175.184.XX.XX[500]

2014-04-23 09:26:01 [DEBUG]: sockmisc.c:528:sendfromto():

145d0809 aa26336e 51486f01 4c369834 08100501 31e8e8e9 0000006c 6c14a920

58a2bc54 04bb6754 81334668 f9b6fc32 a3c8225f 44560a48 9e043e0a 8c189207

85b7d931 80c9abd7 5c33cc3b c90282f4 674673e9 d306b4d3 e8933eca e0066987

f85906b4 c20a9788 24beb305

2014-04-23 09:26:01 [DEBUG]: isakmp_inf.c:805:isakmp_info_send_common(): sendto Information notify.

2014-04-23 09:26:01 [DEBUG]: oakley.c:3088:oakley_delivm(): IV freed

2014-04-23 09:26:01 [DEBUG]: isakmp_inf.c:1569:isakmp_info_recv_r_u(): received a valid R-U-THERE, ACK sent

2014-04-23 09:26:01 [PROTO_NOTIFY]: isakmp_inf.c:1159:isakmp_info_recv_n(): notification message 36136:R-U-THERE, doi=1 proto_id=1 spi=145d0809aa26336e 51486f014c369834 (size=16).

2014-04-23 09:26:01 [DEBUG]: isakmp.c:944:isakmp_handler(): ===

2014-04-23 09:26:01 [DEBUG]: isakmp.c:945:isakmp_handler(): 140 bytes message received from 195.243.XX.XX[4500]

2014-04-23 09:26:01 [DEBUG]: isakmp.c:948:isakmp_handler():

12f2e961 943f0451 d4bfae00 36686dc1 08100501 f26f1857 0000008c 5928cc6e

944d0f20 0324723b 948bcd45 792478d0 cae22352 5b86c1a1 1d8a818b 780e5866

f8d7a5e4 602155f8 86db954a eef9091f 8f826088 d71eeb50 9ab2eda4 a1cb2b56

655d86f6 3262b197 f8628d10 5d813ae2 abbbdd52 a25d1e1f d899bd0a 671b2ca2

9b617b6a ff675894 c2d4b3f0

2014-04-23 09:26:01 [DEBUG]: isakmp_inf.c:147:isakmp_info_recv(): receive Information.

2014-04-23 09:26:01 [DEBUG]: oakley.c:3028:oakley_newiv2(): compute IV for phase2

2014-04-23 09:26:01 [DEBUG]: oakley.c:3029:oakley_newiv2(): phase1 last IV:

2014-04-23 09:26:01 [DEBUG]: oakley.c:3030:oakley_newiv2():

932ea3a6 46bac677 74b0a410 9ca00acd f26f1857

2014-04-23 09:26:01 [DEBUG]: algorithm.c:386:alg_oakley_hashdef(): hash(sha512)

2014-04-23 09:26:01 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:26:01 [DEBUG]: oakley.c:3063:oakley_newiv2(): phase2 IV computed:

2014-04-23 09:26:01 [DEBUG]: oakley.c:3064:oakley_newiv2():

10099a60 3b69000f b4cc9576 da175cfb

2014-04-23 09:26:01 [DEBUG]: oakley.c:3109:oakley_do_decrypt(): begin decryption.

2014-04-23 09:26:01 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:26:01 [DEBUG]: oakley.c:3123:oakley_do_decrypt(): IV was saved for next processing:

2014-04-23 09:26:01 [DEBUG]: oakley.c:3125:oakley_do_decrypt():

671b2ca2 9b617b6a ff675894 c2d4b3f0

2014-04-23 09:26:01 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:26:01 [DEBUG]: oakley.c:3148:oakley_do_decrypt(): with key:

2014-04-23 09:26:01 [DEBUG]: oakley.c:3149:oakley_do_decrypt():

d7337258 41d74255 31c70f8c 9ae72620 b9ee228c b7980138 e1b75316 2c09557b

2014-04-23 09:26:01 [DEBUG]: oakley.c:3154:oakley_do_decrypt(): decrypted payload by IV:

2014-04-23 09:26:01 [DEBUG]: oakley.c:3155:oakley_do_decrypt():

10099a60 3b69000f b4cc9576 da175cfb

2014-04-23 09:26:01 [DEBUG]: oakley.c:3157:oakley_do_decrypt(): decrypted payload, but not trimed.

2014-04-23 09:26:01 [DEBUG]: oakley.c:3159:oakley_do_decrypt():

0b000044 92aec208 8911826a fbec5ed4 029e8bed a4452500 258eb6bd f9e6c3c4

5f572c22 528aa88c 9050d1b5 3e950c4e bdcb40a2 8fbd2094 bed0ee63 d769cbbb

c325d8f7 00000020 00000001 01108d28 12f2e961 943f0451 d4bfae00 36686dc1

2dc4edac 00000000 00000000 00000000

2014-04-23 09:26:01 [DEBUG]: oakley.c:3168:oakley_do_decrypt(): padding len=0

2014-04-23 09:26:01 [DEBUG]: oakley.c:3199:oakley_do_decrypt(): decrypted.

2014-04-23 09:26:01 [DEBUG]: oakley.c:3200:oakley_do_decrypt():

12f2e961 943f0451 d4bfae00 36686dc1 08100501 f26f1857 0000008c 0b000044

92aec208 8911826a fbec5ed4 029e8bed a4452500 258eb6bd f9e6c3c4 5f572c22

528aa88c 9050d1b5 3e950c4e bdcb40a2 8fbd2094 bed0ee63 d769cbbb c325d8f7

00000020 00000001 01108d28 12f2e961 943f0451 d4bfae00 36686dc1 2dc4edac

00000000 00000000 00000000

2014-04-23 09:26:01 [DEBUG]: oakley.c:3088:oakley_delivm(): IV freed

2014-04-23 09:26:01 [DEBUG]: oakley.c:682:oakley_compute_hash1(): HASH with:

2014-04-23 09:26:01 [DEBUG]: oakley.c:683:oakley_compute_hash1():

f26f1857 00000020 00000001 01108d28 12f2e961 943f0451 d4bfae00 36686dc1

2dc4edac

2014-04-23 09:26:01 [DEBUG]: algorithm.c:469:alg_oakley_hmacdef(): hmac(hmac_sha2_512)

2014-04-23 09:26:01 [DEBUG]: oakley.c:692:oakley_compute_hash1(): HASH computed:

2014-04-23 09:26:01 [DEBUG]: oakley.c:693:oakley_compute_hash1():

92aec208 8911826a fbec5ed4 029e8bed a4452500 258eb6bd f9e6c3c4 5f572c22

528aa88c 9050d1b5 3e950c4e bdcb40a2 8fbd2094 bed0ee63 d769cbbb c325d8f7

2014-04-23 09:26:01 [DEBUG]: isakmp_inf.c:262:isakmp_info_recv(): hash validated.

2014-04-23 09:26:01 [DEBUG]: isakmp_inf.c:262:isakmp_info_recv(): hash validated.

2014-04-23 09:26:01 [DEBUG]: ikev1.c:2831:isakmp_parsewoh(): begin.

2014-04-23 09:26:01 [DEBUG]: ikev1.c:2858:isakmp_parsewoh(): seen nptype=8(hash)

2014-04-23 09:26:01 [DEBUG]: ikev1.c:2858:isakmp_parsewoh(): seen nptype=11(notify)

2014-04-23 09:26:01 [DEBUG]: ikev1.c:2897:isakmp_parsewoh(): succeed.

2014-04-23 09:26:01 [DEBUG]: isakmp_inf.c:1540:isakmp_info_recv_r_u(): DPD R-U-There received

2014-04-23 09:26:01 [DEBUG]: oakley.c:3028:oakley_newiv2(): compute IV for phase2

2014-04-23 09:26:01 [DEBUG]: oakley.c:3029:oakley_newiv2(): phase1 last IV:

2014-04-23 09:26:01 [DEBUG]: oakley.c:3030:oakley_newiv2():

932ea3a6 46bac677 74b0a410 9ca00acd 284714b0

2014-04-23 09:26:01 [DEBUG]: algorithm.c:386:alg_oakley_hashdef(): hash(sha512)

2014-04-23 09:26:01 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:26:01 [DEBUG]: oakley.c:3063:oakley_newiv2(): phase2 IV computed:

2014-04-23 09:26:01 [DEBUG]: oakley.c:3064:oakley_newiv2():

308c5b76 71384e07 31812484 9332c132

2014-04-23 09:26:01 [DEBUG]: oakley.c:682:oakley_compute_hash1(): HASH with:

2014-04-23 09:26:01 [DEBUG]: oakley.c:683:oakley_compute_hash1():

284714b0 00000020 00000001 01108d29 12f2e961 943f0451 d4bfae00 36686dc1

2dc4edac

2014-04-23 09:26:01 [DEBUG]: algorithm.c:469:alg_oakley_hmacdef(): hmac(hmac_sha2_512)

2014-04-23 09:26:01 [DEBUG]: oakley.c:692:oakley_compute_hash1(): HASH computed:

2014-04-23 09:26:01 [DEBUG]: oakley.c:693:oakley_compute_hash1():

570b9980 88291a55 97e58910 e0541ee0 4a47ff96 8c2c4411 09e8056d b4055728

b1705e69 6c2c94e9 6fa26c5a 057eaa89 85acd580 179fc56a 1cba106e 5d4dfd3f

2014-04-23 09:26:01 [DEBUG]: oakley.c:3234:oakley_do_encrypt(): begin encryption.

2014-04-23 09:26:01 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:26:01 [DEBUG]: oakley.c:3250:oakley_do_encrypt(): pad length = 12

2014-04-23 09:26:01 [DEBUG]: oakley.c:3280:oakley_do_encrypt():

0b000044 570b9980 88291a55 97e58910 e0541ee0 4a47ff96 8c2c4411 09e8056d

b4055728 b1705e69 6c2c94e9 6fa26c5a 057eaa89 85acd580 179fc56a 1cba106e

5d4dfd3f 00000020 00000001 01108d29 12f2e961 943f0451 d4bfae00 36686dc1

2dc4edac b1ae0007 a0cd929a c879090c

2014-04-23 09:26:01 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:26:01 [DEBUG]: oakley.c:3290:oakley_do_encrypt(): with key:

2014-04-23 09:26:01 [DEBUG]: oakley.c:3291:oakley_do_encrypt():

d7337258 41d74255 31c70f8c 9ae72620 b9ee228c b7980138 e1b75316 2c09557b

2014-04-23 09:26:01 [DEBUG]: oakley.c:3296:oakley_do_encrypt(): encrypted payload by IV:

2014-04-23 09:26:01 [DEBUG]: oakley.c:3297:oakley_do_encrypt():

308c5b76 71384e07 31812484 9332c132

2014-04-23 09:26:01 [DEBUG]: oakley.c:3303:oakley_do_encrypt(): save IV for next:

2014-04-23 09:26:01 [DEBUG]: oakley.c:3304:oakley_do_encrypt():

f0c7e72d c4897256 aac91fbd d7afea3c

2014-04-23 09:26:01 [DEBUG]: oakley.c:3320:oakley_do_encrypt(): encrypted.

2014-04-23 09:26:01 [DEBUG]: ikev1.c:2953:isakmp_send(): Adding NON-ESP marker

2014-04-23 09:26:01 [DEBUG]: ikev1.c:2978:isakmp_send(): 144 bytes from 122.152.XX.XX[4500] to 195.243.XX.XX[4500]

2014-04-23 09:26:01 [DEBUG]: sockmisc.c:335:sendfromto(): sockname 122.152.XX.XX[4500]

2014-04-23 09:26:01 [DEBUG]: sockmisc.c:337:sendfromto(): send packet from 122.152.XX.XX[4500]

2014-04-23 09:26:01 [DEBUG]: sockmisc.c:339:sendfromto(): send packet to 195.243.XX.XX[4500]

2014-04-23 09:26:01 [DEBUG]: sockmisc.c:524:sendfromto(): 1 times of 144 bytes message will be sent to 195.243.XX.XX[4500]

2014-04-23 09:26:01 [DEBUG]: sockmisc.c:528:sendfromto():

00000000 12f2e961 943f0451 d4bfae00 36686dc1 08100501 284714b0 0000008c

1998db73 f4c0a42c f4be706a c7a016c7 9a68a45c 44a21aba 0b5761fa a1db90e1

f278d71a ce5c5dfa 19a68ee8 6d8d209f 727dc200 dc7215fe 5fffdde8 ac461037

3dc5a14d d508a0f3 3f9ab870 a325ff67 86d51e17 278f9705 2ee1d102 f0a215fd

f0c7e72d c4897256 aac91fbd d7afea3c

2014-04-23 09:26:01 [DEBUG]: isakmp_inf.c:805:isakmp_info_send_common(): sendto Information notify.

2014-04-23 09:26:01 [DEBUG]: oakley.c:3088:oakley_delivm(): IV freed

2014-04-23 09:26:01 [DEBUG]: isakmp_inf.c:1569:isakmp_info_recv_r_u(): received a valid R-U-THERE, ACK sent

2014-04-23 09:26:01 [PROTO_NOTIFY]: isakmp_inf.c:1159:isakmp_info_recv_n(): notification message 36136:R-U-THERE, doi=1 proto_id=1 spi=12f2e961943f0451 d4bfae0036686dc1 (size=16).

2014-04-23 09:26:02 [DEBUG]: isakmp.c:944:isakmp_handler(): ===

2014-04-23 09:26:02 [DEBUG]: isakmp.c:945:isakmp_handler(): 108 bytes message received from 175.141.XX.XX[500]

2014-04-23 09:26:02 [DEBUG]: isakmp.c:948:isakmp_handler():

e83fbd85 4cba7233 621245d3 15bd2379 08100501 0d2e23c4 0000006c 6087262a

54a9993b 7be62b1f 46f23409 39588063 98504ad6 95e7c1b9 1ab39923 5f445250

6867e272 d203f5a0 aa31973d 8ad3d5ea e034893d 4fb926fb 4bd2826d abfcc168

32d2dc92 7a25b6e8 26666f3b

2014-04-23 09:26:02 [DEBUG]: isakmp_inf.c:147:isakmp_info_recv(): receive Information.

2014-04-23 09:26:02 [DEBUG]: oakley.c:3028:oakley_newiv2(): compute IV for phase2

2014-04-23 09:26:02 [DEBUG]: oakley.c:3029:oakley_newiv2(): phase1 last IV:

2014-04-23 09:26:02 [DEBUG]: oakley.c:3030:oakley_newiv2():

01b02da7 af7ffffd 159c73f7 00c1a160 0d2e23c4

2014-04-23 09:26:02 [DEBUG]: algorithm.c:386:alg_oakley_hashdef(): hash(sha256)

2014-04-23 09:26:02 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:26:02 [DEBUG]: oakley.c:3063:oakley_newiv2(): phase2 IV computed:

2014-04-23 09:26:02 [DEBUG]: oakley.c:3064:oakley_newiv2():

bb52a6c1 49925310 bfea1745 1f9f3865

2014-04-23 09:26:02 [DEBUG]: oakley.c:3109:oakley_do_decrypt(): begin decryption.

2014-04-23 09:26:02 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:26:02 [DEBUG]: oakley.c:3123:oakley_do_decrypt(): IV was saved for next processing:

2014-04-23 09:26:02 [DEBUG]: oakley.c:3125:oakley_do_decrypt():

abfcc168 32d2dc92 7a25b6e8 26666f3b

2014-04-23 09:26:02 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:26:02 [DEBUG]: oakley.c:3148:oakley_do_decrypt(): with key:

2014-04-23 09:26:02 [DEBUG]: oakley.c:3149:oakley_do_decrypt():

631a6335 2240d720 6e3977af 7383dd84 ef01871f 7d19c621 24d1228f 20966358

2014-04-23 09:26:02 [DEBUG]: oakley.c:3154:oakley_do_decrypt(): decrypted payload by IV:

2014-04-23 09:26:02 [DEBUG]: oakley.c:3155:oakley_do_decrypt():

bb52a6c1 49925310 bfea1745 1f9f3865

2014-04-23 09:26:02 [DEBUG]: oakley.c:3157:oakley_do_decrypt(): decrypted payload, but not trimed.

2014-04-23 09:26:02 [DEBUG]: oakley.c:3159:oakley_do_decrypt():

0b000024 331c95e2 5bef0111 75f3f2b3 f38ef8a6 389bae63 1e6b46f5 d8ef87b6

3d33151c 00000020 00000001 01108d28 e83fbd85 4cba7233 621245d3 15bd2379

34b57d93 00000000 00000000 00000000

2014-04-23 09:26:02 [DEBUG]: oakley.c:3168:oakley_do_decrypt(): padding len=0

2014-04-23 09:26:02 [DEBUG]: oakley.c:3199:oakley_do_decrypt(): decrypted.

2014-04-23 09:26:02 [DEBUG]: oakley.c:3200:oakley_do_decrypt():

e83fbd85 4cba7233 621245d3 15bd2379 08100501 0d2e23c4 0000006c 0b000024

331c95e2 5bef0111 75f3f2b3 f38ef8a6 389bae63 1e6b46f5 d8ef87b6 3d33151c

00000020 00000001 01108d28 e83fbd85 4cba7233 621245d3 15bd2379 34b57d93

00000000 00000000 00000000

2014-04-23 09:26:02 [DEBUG]: oakley.c:3088:oakley_delivm(): IV freed

2014-04-23 09:26:02 [DEBUG]: oakley.c:682:oakley_compute_hash1(): HASH with:

2014-04-23 09:26:02 [DEBUG]: oakley.c:683:oakley_compute_hash1():

0d2e23c4 00000020 00000001 01108d28 e83fbd85 4cba7233 621245d3 15bd2379

34b57d93

2014-04-23 09:26:02 [DEBUG]: algorithm.c:469:alg_oakley_hmacdef(): hmac(hmac_sha2_256)

2014-04-23 09:26:02 [DEBUG]: oakley.c:692:oakley_compute_hash1(): HASH computed:

2014-04-23 09:26:02 [DEBUG]: oakley.c:693:oakley_compute_hash1():

331c95e2 5bef0111 75f3f2b3 f38ef8a6 389bae63 1e6b46f5 d8ef87b6 3d33151c

2014-04-23 09:26:02 [DEBUG]: isakmp_inf.c:262:isakmp_info_recv(): hash validated.

2014-04-23 09:26:02 [DEBUG]: ikev1.c:2831:isakmp_parsewoh(): begin.

2014-04-23 09:26:02 [DEBUG]: ikev1.c:2858:isakmp_parsewoh(): seen nptype=8(hash)

2014-04-23 09:26:02 [DEBUG]: ikev1.c:2858:isakmp_parsewoh(): seen nptype=11(notify)

2014-04-23 09:26:02 [DEBUG]: ikev1.c:2897:isakmp_parsewoh(): succeed.

2014-04-23 09:26:02 [DEBUG]: isakmp_inf.c:1540:isakmp_info_recv_r_u(): DPD R-U-There received

2014-04-23 09:26:02 [DEBUG]: oakley.c:3028:oakley_newiv2(): compute IV for phase2

2014-04-23 09:26:02 [DEBUG]: oakley.c:3029:oakley_newiv2(): phase1 last IV:

2014-04-23 09:26:02 [DEBUG]: oakley.c:3030:oakley_newiv2():

01b02da7 af7ffffd 159c73f7 00c1a160 4fdb55e7

2014-04-23 09:26:02 [DEBUG]: algorithm.c:386:alg_oakley_hashdef(): hash(sha256)

2014-04-23 09:26:02 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:26:02 [DEBUG]: oakley.c:3063:oakley_newiv2(): phase2 IV computed:

2014-04-23 09:26:02 [DEBUG]: oakley.c:3064:oakley_newiv2():

f60e34d0 40c2eec0 50e5a29b f63d749f

2014-04-23 09:26:02 [DEBUG]: oakley.c:682:oakley_compute_hash1(): HASH with:

2014-04-23 09:26:02 [DEBUG]: oakley.c:683:oakley_compute_hash1():

4fdb55e7 00000020 00000001 01108d29 e83fbd85 4cba7233 621245d3 15bd2379

34b57d93

2014-04-23 09:26:02 [DEBUG]: algorithm.c:469:alg_oakley_hmacdef(): hmac(hmac_sha2_256)

2014-04-23 09:26:02 [DEBUG]: oakley.c:692:oakley_compute_hash1(): HASH computed:

2014-04-23 09:26:02 [DEBUG]: oakley.c:693:oakley_compute_hash1():

d0971385 50530427 2773358d 53316301 324f3e0e 8da6064f 24a6a89f 33131b79

2014-04-23 09:26:02 [DEBUG]: oakley.c:3234:oakley_do_encrypt(): begin encryption.

2014-04-23 09:26:02 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:26:02 [DEBUG]: oakley.c:3250:oakley_do_encrypt(): pad length = 12

2014-04-23 09:26:02 [DEBUG]: oakley.c:3280:oakley_do_encrypt():

0b000024 d0971385 50530427 2773358d 53316301 324f3e0e 8da6064f 24a6a89f

33131b79 00000020 00000001 01108d29 e83fbd85 4cba7233 621245d3 15bd2379

34b57d93 9ead0aa5 8c4549fd 1ed6300c

2014-04-23 09:26:02 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:26:02 [DEBUG]: oakley.c:3290:oakley_do_encrypt(): with key:

2014-04-23 09:26:02 [DEBUG]: oakley.c:3291:oakley_do_encrypt():

631a6335 2240d720 6e3977af 7383dd84 ef01871f 7d19c621 24d1228f 20966358

2014-04-23 09:26:02 [DEBUG]: oakley.c:3296:oakley_do_encrypt(): encrypted payload by IV:

2014-04-23 09:26:02 [DEBUG]: oakley.c:3297:oakley_do_encrypt():

f60e34d0 40c2eec0 50e5a29b f63d749f

2014-04-23 09:26:02 [DEBUG]: oakley.c:3303:oakley_do_encrypt(): save IV for next:

2014-04-23 09:26:02 [DEBUG]: oakley.c:3304:oakley_do_encrypt():

27c3e352 9b971805 ac8e3f3b 7dc1be55

2014-04-23 09:26:02 [DEBUG]: oakley.c:3320:oakley_do_encrypt(): encrypted.

2014-04-23 09:26:02 [DEBUG]: ikev1.c:2978:isakmp_send(): 108 bytes from 122.152.XX.XX[500] to 175.141.XX.XX[500]

2014-04-23 09:26:02 [DEBUG]: sockmisc.c:335:sendfromto(): sockname 122.152.XX.XX[500]

2014-04-23 09:26:02 [DEBUG]: sockmisc.c:337:sendfromto(): send packet from 122.152.XX.XX[500]

2014-04-23 09:26:02 [DEBUG]: sockmisc.c:339:sendfromto(): send packet to 175.141.XX.XX[500]

2014-04-23 09:26:02 [DEBUG]: sockmisc.c:524:sendfromto(): 1 times of 108 bytes message will be sent to 175.141.XX.XX[500]

2014-04-23 09:26:02 [DEBUG]: sockmisc.c:528:sendfromto():

e83fbd85 4cba7233 621245d3 15bd2379 08100501 4fdb55e7 0000006c 0eb9bb72

adc63881 ce76a334 a308e96d d18b323e 00736fc5 9e3820d1 82ed608f 05efae9d

03348416 ab154352 dbf6b241 4ecafa95 371febb2 c6f0f261 1b82b0d5 27c3e352

9b971805 ac8e3f3b 7dc1be55

2014-04-23 09:26:02 [DEBUG]: isakmp_inf.c:805:isakmp_info_send_common(): sendto Information notify.

2014-04-23 09:26:02 [DEBUG]: oakley.c:3088:oakley_delivm(): IV freed

2014-04-23 09:26:02 [DEBUG]: isakmp_inf.c:1569:isakmp_info_recv_r_u(): received a valid R-U-THERE, ACK sent

2014-04-23 09:26:02 [PROTO_NOTIFY]: isakmp_inf.c:1159:isakmp_info_recv_n(): notification message 36136:R-U-THERE, doi=1 proto_id=1 spi=e83fbd854cba7233 621245d315bd2379 (size=16).

Apr 23 09:26:04 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:26:04 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:26:04 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:26:04 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:26:04 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:26:04 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:26:04 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:26:04 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:26:04 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:26:04 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:26:10 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:26:10 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:26:10 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:26:10 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:26:10 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:26:10 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:26:10 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:26:10 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:26:10 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:26:10 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:26:14 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:26:14 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:26:14 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:26:14 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:26:14 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:26:14 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:26:14 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:26:14 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:26:14 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:26:14 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:26:18 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:26:18 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:26:18 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:26:18 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:26:18 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:26:18 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:26:18 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:26:18 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:26:18 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:26:18 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

2014-04-23 09:26:20 [DEBUG]: ikev1_natt.c:348:natt_keepalive_send(): KA: 122.152.XX.XX[4500]->195.243.XX.XX[4500]

2014-04-23 09:26:20 [DEBUG]: sockmisc.c:335:sendfromto(): sockname 122.152.XX.XX[4500]

2014-04-23 09:26:20 [DEBUG]: sockmisc.c:337:sendfromto(): send packet from 122.152.XX.XX[4500]

2014-04-23 09:26:20 [DEBUG]: sockmisc.c:339:sendfromto(): send packet to 195.243.XX.XX[4500]

2014-04-23 09:26:20 [DEBUG]: sockmisc.c:524:sendfromto(): 1 times of 1 bytes message will be sent to 195.243.XX.XX[4500]

2014-04-23 09:26:20 [DEBUG]: sockmisc.c:528:sendfromto():

ff

Apr 23 09:26:22 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:26:22 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:26:22 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:26:22 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:26:22 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:26:22 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:26:22 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:26:22 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:26:22 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:26:22 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:26:27 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:26:27 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:26:27 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:26:27 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:26:27 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:26:27 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:26:27 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:26:27 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:26:27 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:26:27 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:26:31 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:26:31 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:26:31 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:26:31 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:26:31 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:26:31 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:26:31 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:26:31 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:26:31 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:26:31 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

2014-04-23 09:26:34 [DEBUG]: isakmp.c:944:isakmp_handler(): ===

2014-04-23 09:26:34 [DEBUG]: isakmp.c:945:isakmp_handler(): 188 bytes message received from 175.141.XX.XX[500]

2014-04-23 09:26:34 [DEBUG]: isakmp.c:948:isakmp_handler():

e83fbd85 4cba7233 621245d3 15bd2379 08102001 041039ca 000000bc 370d7814

828f5e78 c6eafc50 331b5fc5 937f114a 7cea9903 33c9d0ed b2b859dd bf0b2ffc

554c9e81 2b396ca8 e0c3b3bf b89b8dba a9d716f8 2a8d9b7f e2687df4 9940ec65

8107c50c 76cb3d53 f5720cac cf5a9537 96dad681 cd46e259 5620b418 0d310a87

df8ea3aa 32ae00b6 505bf40d a3c41f86 d5131254 407ffb66 60776653 8f1809a9

e6f46fc8 0b96735b 99879b41 b766c104 93fe8817 213720e0 a71afef3

2014-04-23 09:26:34 [DEBUG]: oakley.c:3028:oakley_newiv2(): compute IV for phase2

2014-04-23 09:26:34 [DEBUG]: oakley.c:3029:oakley_newiv2(): phase1 last IV:

2014-04-23 09:26:34 [DEBUG]: oakley.c:3030:oakley_newiv2():

01b02da7 af7ffffd 159c73f7 00c1a160 041039ca

2014-04-23 09:26:34 [DEBUG]: algorithm.c:386:alg_oakley_hashdef(): hash(sha256)

2014-04-23 09:26:34 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:26:34 [DEBUG]: oakley.c:3063:oakley_newiv2(): phase2 IV computed:

2014-04-23 09:26:34 [DEBUG]: oakley.c:3064:oakley_newiv2():

e5788955 70a1f7f4 9f576935 6baea79e

2014-04-23 09:26:34 [PROTO_NOTIFY]: ikev1.c:2506:log_ph2started(): ====> PHASE-2 NEGOTIATION STARTED AS RESPONDER, (QUICK MODE) <====

====> Initiated SA: 122.152.XX.XX[500]-175.141.XX.XX[500] message id:0x041039CA <====

2014-04-23 09:26:34 [DEBUG]: oakley.c:3109:oakley_do_decrypt(): begin decryption.

2014-04-23 09:26:34 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:26:34 [DEBUG]: oakley.c:3123:oakley_do_decrypt(): IV was saved for next processing:

2014-04-23 09:26:34 [DEBUG]: oakley.c:3125:oakley_do_decrypt():

b766c104 93fe8817 213720e0 a71afef3

2014-04-23 09:26:34 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:26:34 [DEBUG]: oakley.c:3148:oakley_do_decrypt(): with key:

2014-04-23 09:26:34 [DEBUG]: oakley.c:3149:oakley_do_decrypt():

631a6335 2240d720 6e3977af 7383dd84 ef01871f 7d19c621 24d1228f 20966358

2014-04-23 09:26:34 [DEBUG]: oakley.c:3154:oakley_do_decrypt(): decrypted payload by IV:

2014-04-23 09:26:34 [DEBUG]: oakley.c:3155:oakley_do_decrypt():

e5788955 70a1f7f4 9f576935 6baea79e

2014-04-23 09:26:34 [DEBUG]: oakley.c:3157:oakley_do_decrypt(): decrypted payload, but not trimed.

2014-04-23 09:26:34 [DEBUG]: oakley.c:3159:oakley_do_decrypt():

01000024 8f2f2112 97ebccfc 8bb7f2ba 87445d60 58265732 28b21d08 ce030ab3

85120cd5 0a000040 00000001 00000001 00000034 01030401 e1420445 00000028

010c0000 80040001 80010001 80020e10 80010002 00020004 00465000 80050007

80060100 05000018 621d615e 541d371c 3d170ab2 6547fb28 13dd844e 05000010

04000000 00000000 00000000 00000010 04000000 00000000 00000000 00000000

2014-04-23 09:26:34 [DEBUG]: oakley.c:3168:oakley_do_decrypt(): padding len=0

2014-04-23 09:26:34 [DEBUG]: oakley.c:3199:oakley_do_decrypt(): decrypted.

2014-04-23 09:26:34 [DEBUG]: oakley.c:3200:oakley_do_decrypt():

e83fbd85 4cba7233 621245d3 15bd2379 08102001 041039ca 000000bc 01000024

8f2f2112 97ebccfc 8bb7f2ba 87445d60 58265732 28b21d08 ce030ab3 85120cd5

0a000040 00000001 00000001 00000034 01030401 e1420445 00000028 010c0000

80040001 80010001 80020e10 80010002 00020004 00465000 80050007 80060100

05000018 621d615e 541d371c 3d170ab2 6547fb28 13dd844e 05000010 04000000

00000000 00000000 00000010 04000000 00000000 00000000 00000000

2014-04-23 09:26:34 [DEBUG]: ikev1.c:2831:isakmp_parsewoh(): begin.

2014-04-23 09:26:34 [DEBUG]: ikev1.c:2858:isakmp_parsewoh(): seen nptype=8(hash)

2014-04-23 09:26:34 [DEBUG]: ikev1.c:2858:isakmp_parsewoh(): seen nptype=1(sa)

2014-04-23 09:26:34 [DEBUG]: ikev1.c:2858:isakmp_parsewoh(): seen nptype=10(nonce)

2014-04-23 09:26:34 [DEBUG]: ikev1.c:2858:isakmp_parsewoh(): seen nptype=5(id)

2014-04-23 09:26:34 [DEBUG]: ikev1.c:2858:isakmp_parsewoh(): seen nptype=5(id)

2014-04-23 09:26:34 [DEBUG]: ikev1.c:2897:isakmp_parsewoh(): succeed.

2014-04-23 09:26:34 [DEBUG]: isakmp_quick.c:1163:quick_r1recv(): received IDci2:2014-04-23 09:26:34 [DEBUG]: isakmp_quick.c:1164:quick_r1recv():

04000000 00000000 00000000

2014-04-23 09:26:34 [DEBUG]: isakmp_quick.c:1167:quick_r1recv(): received IDcr2:2014-04-23 09:26:34 [DEBUG]: isakmp_quick.c:1168:quick_r1recv():

04000000 00000000 00000000

2014-04-23 09:26:34 [DEBUG]: isakmp_quick.c:1182:quick_r1recv(): HASH(1) validate:2014-04-23 09:26:34 [DEBUG]: isakmp_quick.c:1183:quick_r1recv():

8f2f2112 97ebccfc 8bb7f2ba 87445d60 58265732 28b21d08 ce030ab3 85120cd5

2014-04-23 09:26:34 [DEBUG]: oakley.c:682:oakley_compute_hash1(): HASH with:

2014-04-23 09:26:34 [DEBUG]: oakley.c:683:oakley_compute_hash1():

041039ca 0a000040 00000001 00000001 00000034 01030401 e1420445 00000028

010c0000 80040001 80010001 80020e10 80010002 00020004 00465000 80050007

80060100 05000018 621d615e 541d371c 3d170ab2 6547fb28 13dd844e 05000010

04000000 00000000 00000000 00000010 04000000 00000000 00000000

2014-04-23 09:26:34 [DEBUG]: algorithm.c:469:alg_oakley_hmacdef(): hmac(hmac_sha2_256)

2014-04-23 09:26:34 [DEBUG]: oakley.c:692:oakley_compute_hash1(): HASH computed:

2014-04-23 09:26:34 [DEBUG]: oakley.c:693:oakley_compute_hash1():

8f2f2112 97ebccfc 8bb7f2ba 87445d60 58265732 28b21d08 ce030ab3 85120cd5

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:1299:get_proppair(): total SA len=60

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:1300:get_proppair():

00000001 00000001 00000034 01030401 e1420445 00000028 010c0000 80040001

80010001 80020e10 80010002 00020004 00465000 80050007 80060100

2014-04-23 09:26:34 [DEBUG]: ikev1.c:2831:isakmp_parsewoh(): begin.

2014-04-23 09:26:34 [DEBUG]: ikev1.c:2858:isakmp_parsewoh(): seen nptype=2(prop)

2014-04-23 09:26:34 [DEBUG]: ikev1.c:2897:isakmp_parsewoh(): succeed.

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:1352:get_proppair(): proposal #1 len=52

2014-04-23 09:26:34 [DEBUG]: ikev1.c:2831:isakmp_parsewoh(): begin.

2014-04-23 09:26:34 [DEBUG]: ikev1.c:2858:isakmp_parsewoh(): seen nptype=3(trns)

2014-04-23 09:26:34 [DEBUG]: ikev1.c:2897:isakmp_parsewoh(): succeed.

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:1498:get_transform(): transform #1 len=40

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:2297:check_attr_ipsec(): type=Encryption Mode, flag=0x8000, lorv=Tunnel

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:2297:check_attr_ipsec(): type=SA Life Type, flag=0x8000, lorv=seconds

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:2297:check_attr_ipsec(): type=SA Life Duration, flag=0x8000, lorv=3600

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:2412:check_attr_ipsec(): life duration was in TLV.

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:2297:check_attr_ipsec(): type=SA Life Type, flag=0x8000, lorv=kilobytes

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:2297:check_attr_ipsec(): type=SA Life Duration, flag=0x0000, lorv=4

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:2297:check_attr_ipsec(): type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha512

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:2297:check_attr_ipsec(): type=Key Length, flag=0x8000, lorv=256

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:1395:get_proppair(): pair 1:

2014-04-23 09:26:34 [DEBUG]: proposal.c:1124:print_proppair0():  0x102acd60: next=(nil) tnext=(nil)

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:1430:get_proppair(): proposal #1: 1 transform

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:1128:get_ph2approval(): begin compare proposals.

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:1134:get_ph2approval(): pair[1]: 0x102acd60

2014-04-23 09:26:34 [DEBUG]: proposal.c:1124:print_proppair0():  0x102acd60: next=(nil) tnext=(nil)

2014-04-23 09:26:34 [DEBUG]: proposal.c:913:aproppair2saprop(): prop#=1 prot-id=ESP spi-size=4 #trns=1 trns#=1 trns-id=AES

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:3941:ipsecdoi_t2satrns(): type=Encryption Mode, flag=0x8000, lorv=Tunnel

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:3941:ipsecdoi_t2satrns(): type=SA Life Type, flag=0x8000, lorv=seconds

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:3941:ipsecdoi_t2satrns(): type=SA Life Duration, flag=0x8000, lorv=3600

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:4002:ipsecdoi_t2satrns(): lifetime 3600 seconds

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:3941:ipsecdoi_t2satrns(): type=SA Life Type, flag=0x8000, lorv=kilobytes

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:3941:ipsecdoi_t2satrns(): type=SA Life Duration, flag=0x0000, lorv=4

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:4023:ipsecdoi_t2satrns(): lifesize 4608000 KB

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:3941:ipsecdoi_t2satrns(): type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha512

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:3941:ipsecdoi_t2satrns(): type=Key Length, flag=0x8000, lorv=256

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:1172:get_ph2approvalx(): peer's single bundle:

2014-04-23 09:26:34 [DEBUG]: proposal.c:1057:printsaproto():  (proto_id=ESP spisize=4 spi=e1420445 spi_p=00000000 encmode=Tunnel reqid=0:0)

2014-04-23 09:26:34 [DEBUG]: proposal.c:1091:printsatrns():   (trns_id=AES encklen=256 authtype=hmac-sha512)

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:1175:get_ph2approvalx(): my single bundle:

2014-04-23 09:26:34 [DEBUG]: proposal.c:1057:printsaproto():  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=0:0)

2014-04-23 09:26:34 [DEBUG]: proposal.c:1091:printsatrns():   (trns_id=AES encklen=256 authtype=hmac-sha512)

2014-04-23 09:26:34 [INFO]: proposal.c:280:cmpsaprop_alloc(): use own lifetime: my:600 peer:3600

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:1194:get_ph2approvalx(): matched

2014-04-23 09:26:34 [DEBUG]: ikev1.c:1620:isakmp_ph2begin_r(): ===

2014-04-23 09:26:34 [DEBUG]: isakmp_quick.c:1306:quick_r1prep(): pfkey getspi sent.

2014-04-23 09:26:34 [DEBUG]: pfkey.c:696:pk_sendgetspi(): call pfkey_send_getspi

2014-04-23 09:26:34 [DEBUG]: pfkey.c:767:ikev1_getspi_response(): pfkey GETSPI succeeded: ESP/Tunnel 175.141.XX.XX[500]->122.152.XX.XX[500] spi=3482839041(0xcf97e801)

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:1299:get_proppair(): total SA len=60

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:1300:get_proppair():

00000001 00000001 00000034 01030401 00000000 00000028 010c0000 80040001

80010001 80020e10 80010002 00020004 00465000 80050007 80060100

2014-04-23 09:26:34 [DEBUG]: ikev1.c:2831:isakmp_parsewoh(): begin.

2014-04-23 09:26:34 [DEBUG]: ikev1.c:2858:isakmp_parsewoh(): seen nptype=2(prop)

2014-04-23 09:26:34 [DEBUG]: ikev1.c:2897:isakmp_parsewoh(): succeed.

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:1352:get_proppair(): proposal #1 len=52

2014-04-23 09:26:34 [DEBUG]: ikev1.c:2831:isakmp_parsewoh(): begin.

2014-04-23 09:26:34 [DEBUG]: ikev1.c:2858:isakmp_parsewoh(): seen nptype=3(trns)

2014-04-23 09:26:34 [DEBUG]: ikev1.c:2897:isakmp_parsewoh(): succeed.

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:1498:get_transform(): transform #1 len=40

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:2297:check_attr_ipsec(): type=Encryption Mode, flag=0x8000, lorv=Tunnel

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:2297:check_attr_ipsec(): type=SA Life Type, flag=0x8000, lorv=seconds

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:2297:check_attr_ipsec(): type=SA Life Duration, flag=0x8000, lorv=3600

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:2412:check_attr_ipsec(): life duration was in TLV.

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:2297:check_attr_ipsec(): type=SA Life Type, flag=0x8000, lorv=kilobytes

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:2297:check_attr_ipsec(): type=SA Life Duration, flag=0x0000, lorv=4

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:2297:check_attr_ipsec(): type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha512

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:2297:check_attr_ipsec(): type=Key Length, flag=0x8000, lorv=256

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:1395:get_proppair(): pair 1:

2014-04-23 09:26:34 [DEBUG]: proposal.c:1124:print_proppair0():  0x102cd8d0: next=(nil) tnext=(nil)

2014-04-23 09:26:34 [DEBUG]: ipsec_doi.c:1430:get_proppair(): proposal #1: 1 transform

2014-04-23 09:26:34 [DEBUG]: ikev1.c:2248:set_isakmp_payload(): add payload of len 60, next type 10(nonce)

2014-04-23 09:26:34 [DEBUG]: ikev1.c:2248:set_isakmp_payload(): add payload of len 16, next type 5(id)

2014-04-23 09:26:34 [DEBUG]: ikev1.c:2248:set_isakmp_payload(): add payload of len 12, next type 5(id)

2014-04-23 09:26:34 [DEBUG]: ikev1.c:2248:set_isakmp_payload(): add payload of len 12, next type 0(none)

2014-04-23 09:26:34 [DEBUG]: oakley.c:682:oakley_compute_hash1(): HASH with:

2014-04-23 09:26:34 [DEBUG]: oakley.c:683:oakley_compute_hash1():

041039ca 621d615e 541d371c 3d170ab2 6547fb28 13dd844e 0a000040 00000001

00000001 00000034 01030401 cf97e801 00000028 010c0000 80040001 80010001

80020e10 80010002 00020004 00465000 80050007 80060100 05000014 0e239601

9dd029c7 ab0f3134 fc087f12 05000010 04000000 00000000 00000000 0b000010

04000000 00000000 00000000 0000001c 00000001 03046000 cf97e801 80010001

00020004 00000258

2014-04-23 09:26:34 [DEBUG]: algorithm.c:469:alg_oakley_hmacdef(): hmac(hmac_sha2_256)

2014-04-23 09:26:34 [DEBUG]: oakley.c:692:oakley_compute_hash1(): HASH computed:

2014-04-23 09:26:34 [DEBUG]: oakley.c:693:oakley_compute_hash1():

3b0e883c ac097f1b c939707a 6c771cf9 19f23998 8fb6fa7d a5a89423 7da2925f

2014-04-23 09:26:34 [DEBUG]: ikev1.c:2248:set_isakmp_payload(): add payload of len 32, next type 1(sa)

2014-04-23 09:26:34 [DEBUG]: oakley.c:3234:oakley_do_encrypt(): begin encryption.

2014-04-23 09:26:34 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:26:34 [DEBUG]: oakley.c:3250:oakley_do_encrypt(): pad length = 12

2014-04-23 09:26:34 [DEBUG]: oakley.c:3280:oakley_do_encrypt():

01000024 3b0e883c ac097f1b c939707a 6c771cf9 19f23998 8fb6fa7d a5a89423

7da2925f 0a000040 00000001 00000001 00000034 01030401 cf97e801 00000028

010c0000 80040001 80010001 80020e10 80010002 00020004 00465000 80050007

80060100 05000014 0e239601 9dd029c7 ab0f3134 fc087f12 05000010 04000000

00000000 00000000 0b000010 04000000 00000000 00000000 0000001c 00000001

03046000 cf97e801 80010001 00020004 00000258 dc428e94 953c2df4 2818380c

2014-04-23 09:26:34 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:26:34 [DEBUG]: oakley.c:3290:oakley_do_encrypt(): with key:

2014-04-23 09:26:34 [DEBUG]: oakley.c:3291:oakley_do_encrypt():

631a6335 2240d720 6e3977af 7383dd84 ef01871f 7d19c621 24d1228f 20966358

2014-04-23 09:26:34 [DEBUG]: oakley.c:3296:oakley_do_encrypt(): encrypted payload by IV:

2014-04-23 09:26:34 [DEBUG]: oakley.c:3297:oakley_do_encrypt():

b766c104 93fe8817 213720e0 a71afef3

2014-04-23 09:26:34 [DEBUG]: oakley.c:3303:oakley_do_encrypt(): save IV for next:

2014-04-23 09:26:34 [DEBUG]: oakley.c:3304:oakley_do_encrypt():

7281c0f6 4693c688 7fcd7db2 e62f9726

2014-04-23 09:26:34 [DEBUG]: oakley.c:3320:oakley_do_encrypt(): encrypted.

2014-04-23 09:26:34 [DEBUG]: ikev1.c:1747:isakmp_ph2resend(): resend phase2 packet e83fbd854cba7233:621245d315bd2379:041039CA

2014-04-23 09:26:34 [DEBUG]: ikev1.c:2978:isakmp_send(): 220 bytes from 122.152.XX.XX[500] to 175.141.XX.XX[500]

2014-04-23 09:26:34 [DEBUG]: sockmisc.c:335:sendfromto(): sockname 122.152.XX.XX[500]

2014-04-23 09:26:34 [DEBUG]: sockmisc.c:337:sendfromto(): send packet from 122.152.XX.XX[500]

2014-04-23 09:26:34 [DEBUG]: sockmisc.c:339:sendfromto(): send packet to 175.141.XX.XX[500]

2014-04-23 09:26:34 [DEBUG]: sockmisc.c:524:sendfromto(): 1 times of 220 bytes message will be sent to 175.141.XX.XX[500]

2014-04-23 09:26:34 [DEBUG]: sockmisc.c:528:sendfromto():

e83fbd85 4cba7233 621245d3 15bd2379 08102001 041039ca 000000dc 771b3ef2

f1eaa817 032b829b 8d4b7d45 8de13b4a 211903f5 2a501cbe 5a358da7 2326e527

f0244f7a 5d250e79 2951d1c3 0f0a1abe b843adc3 129bafb2 18db814d 92c6cb2f

611c50a3 df8a9296 69fed85d 173c51ec df35a5f7 96b7e59c 16ec604f d1b67a94

2a7b8ca8 aadeaadb e559b930 0fd5ae76 3f5d0836 19555c8d 1d9965a1 d278519f

1e8c2059 97677ecb b5e0e52b 7c5d4536 c06136e4 a1983353 2a179506 27bc253b

40e635b5 bb4ffaa1 a67391fb 7281c0f6 4693c688 7fcd7db2 e62f9726

2014-04-23 09:26:34 [DEBUG]: pfkey.c:722:pk_sendgetspi(): pfkey GETSPI sent: ESP/Tunnel 0.0.0.0[500]->122.152.XX.XX[500]

2014-04-23 09:26:34 [DEBUG]: isakmp.c:944:isakmp_handler(): ===

2014-04-23 09:26:34 [DEBUG]: isakmp.c:945:isakmp_handler(): 76 bytes message received from 175.141.XX.XX[500]

2014-04-23 09:26:34 [DEBUG]: isakmp.c:948:isakmp_handler():

e83fbd85 4cba7233 621245d3 15bd2379 08102001 041039ca 0000004c aa2c9411

55b6332c a10fa6d6 74ff81f6 e5fb06a3 03fce8aa f355b5a5 f3750e6f d6ef8b4d

fe2936e9 4781b5df 779c7239

2014-04-23 09:26:34 [DEBUG]: oakley.c:3109:oakley_do_decrypt(): begin decryption.

2014-04-23 09:26:34 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:26:34 [DEBUG]: oakley.c:3123:oakley_do_decrypt(): IV was saved for next processing:

2014-04-23 09:26:34 [DEBUG]: oakley.c:3125:oakley_do_decrypt():

d6ef8b4d fe2936e9 4781b5df 779c7239

2014-04-23 09:26:34 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:26:34 [DEBUG]: oakley.c:3148:oakley_do_decrypt(): with key:

2014-04-23 09:26:34 [DEBUG]: oakley.c:3149:oakley_do_decrypt():

631a6335 2240d720 6e3977af 7383dd84 ef01871f 7d19c621 24d1228f 20966358

2014-04-23 09:26:34 [DEBUG]: oakley.c:3154:oakley_do_decrypt(): decrypted payload by IV:

2014-04-23 09:26:34 [DEBUG]: oakley.c:3155:oakley_do_decrypt():

7281c0f6 4693c688 7fcd7db2 e62f9726

2014-04-23 09:26:34 [DEBUG]: oakley.c:3157:oakley_do_decrypt(): decrypted payload, but not trimed.

2014-04-23 09:26:34 [DEBUG]: oakley.c:3159:oakley_do_decrypt():

00000024 6e192dc5 4e62a50c 917574f6 29fbbe42 02271fa2 a8a379bb ede9f130

9e3590c4 00000000 00000000 00000000

2014-04-23 09:26:34 [DEBUG]: oakley.c:3168:oakley_do_decrypt(): padding len=0

2014-04-23 09:26:34 [DEBUG]: oakley.c:3199:oakley_do_decrypt(): decrypted.

2014-04-23 09:26:34 [DEBUG]: oakley.c:3200:oakley_do_decrypt():

e83fbd85 4cba7233 621245d3 15bd2379 08102001 041039ca 0000004c 00000024

6e192dc5 4e62a50c 917574f6 29fbbe42 02271fa2 a8a379bb ede9f130 9e3590c4

00000000 00000000 00000000

2014-04-23 09:26:34 [DEBUG]: ikev1.c:2831:isakmp_parsewoh(): begin.

2014-04-23 09:26:34 [DEBUG]: ikev1.c:2858:isakmp_parsewoh(): seen nptype=8(hash)

2014-04-23 09:26:34 [DEBUG]: ikev1.c:2897:isakmp_parsewoh(): succeed.

2014-04-23 09:26:34 [DEBUG]: isakmp_quick.c:1604:quick_r3recv(): HASH(3) validate:2014-04-23 09:26:34 [DEBUG]: isakmp_quick.c:1605:quick_r3recv():

6e192dc5 4e62a50c 917574f6 29fbbe42 02271fa2 a8a379bb ede9f130 9e3590c4

2014-04-23 09:26:34 [DEBUG]: oakley.c:626:oakley_compute_hash3(): HASH with:

2014-04-23 09:26:34 [DEBUG]: oakley.c:627:oakley_compute_hash3():

00041039 ca621d61 5e541d37 1c3d170a b26547fb 2813dd84 4e0e2396 019dd029

c7ab0f31 34fc087f 12

2014-04-23 09:26:34 [DEBUG]: algorithm.c:469:alg_oakley_hmacdef(): hmac(hmac_sha2_256)

2014-04-23 09:26:34 [DEBUG]: oakley.c:636:oakley_compute_hash3(): HASH computed:

2014-04-23 09:26:34 [DEBUG]: oakley.c:637:oakley_compute_hash3():

6e192dc5 4e62a50c 917574f6 29fbbe42 02271fa2 a8a379bb ede9f130 9e3590c4

2014-04-23 09:26:34 [DEBUG]: ikev1.c:1132:quick_main(): ===

2014-04-23 09:26:34 [DEBUG]: oakley.c:391:oakley_compute_keymat_x(): KEYMAT compute with

2014-04-23 09:26:34 [DEBUG]: oakley.c:392:oakley_compute_keymat_x():

03cf97e8 01621d61 5e541d37 1c3d170a b26547fb 2813dd84 4e0e2396 019dd029

c7ab0f31 34fc087f 12

2014-04-23 09:26:34 [DEBUG]: algorithm.c:469:alg_oakley_hmacdef(): hmac(hmac_sha2_256)

2014-04-23 09:26:34 [DEBUG]: algorithm.c:669:alg_ipsec_encdef(): encryption(aes)

2014-04-23 09:26:34 [DEBUG]: algorithm.c:712:alg_ipsec_hmacdef(): hmac(null)

2014-04-23 09:26:34 [DEBUG]: oakley.c:424:oakley_compute_keymat_x(): encklen=256 authklen=512

2014-04-23 09:26:34 [DEBUG]: oakley.c:431:oakley_compute_keymat_x(): generating 1280 bits of key (dupkeymat=5)

2014-04-23 09:26:34 [DEBUG]: oakley.c:449:oakley_compute_keymat_x(): generating K1...K5 for KEYMAT.

2014-04-23 09:26:34 [DEBUG]: algorithm.c:469:alg_oakley_hmacdef(): hmac(hmac_sha2_256)

2014-04-23 09:26:34 [DEBUG]: algorithm.c:469:alg_oakley_hmacdef(): hmac(hmac_sha2_256)

2014-04-23 09:26:34 [DEBUG]: algorithm.c:469:alg_oakley_hmacdef(): hmac(hmac_sha2_256)

2014-04-23 09:26:34 [DEBUG]: algorithm.c:469:alg_oakley_hmacdef(): hmac(hmac_sha2_256)

2014-04-23 09:26:34 [DEBUG]: oakley.c:510:oakley_compute_keymat_x():

77934fc5 441e36f6 37940d8e 55e856d3 198b48a5 9401dddf cc29f787 84cad844

de154d3c 6bbe65f7 c3423e6b 9fc115d0 7aa5c9ba 566b32dc d303adc2 a45267c5

e28a306a 2e68b2c0 2515af02 f7f98da2 e767dec1 c2fc4938 328aa60d af9df7a6

332d85cd c04a7a4f 7f52c2e2 97eab879 dfc0d230 23a2cafd 11b0480a f635dc52

0a08e51c 9ee9c263 4445660c 239ea482 94023826 58e2074d 3850e3d4 3e29703a

2014-04-23 09:26:34 [DEBUG]: oakley.c:391:oakley_compute_keymat_x(): KEYMAT compute with

2014-04-23 09:26:34 [DEBUG]: oakley.c:392:oakley_compute_keymat_x():

03e14204 45621d61 5e541d37 1c3d170a b26547fb 2813dd84 4e0e2396 019dd029

c7ab0f31 34fc087f 12

2014-04-23 09:26:34 [DEBUG]: algorithm.c:469:alg_oakley_hmacdef(): hmac(hmac_sha2_256)

2014-04-23 09:26:34 [DEBUG]: algorithm.c:669:alg_ipsec_encdef(): encryption(aes)

2014-04-23 09:26:34 [DEBUG]: algorithm.c:712:alg_ipsec_hmacdef(): hmac(null)

2014-04-23 09:26:34 [DEBUG]: oakley.c:424:oakley_compute_keymat_x(): encklen=256 authklen=512

2014-04-23 09:26:34 [DEBUG]: oakley.c:431:oakley_compute_keymat_x(): generating 1280 bits of key (dupkeymat=5)

2014-04-23 09:26:34 [DEBUG]: oakley.c:449:oakley_compute_keymat_x(): generating K1...K5 for KEYMAT.

2014-04-23 09:26:34 [DEBUG]: algorithm.c:469:alg_oakley_hmacdef(): hmac(hmac_sha2_256)

2014-04-23 09:26:34 [DEBUG]: algorithm.c:469:alg_oakley_hmacdef(): hmac(hmac_sha2_256)

2014-04-23 09:26:34 [DEBUG]: algorithm.c:469:alg_oakley_hmacdef(): hmac(hmac_sha2_256)

2014-04-23 09:26:34 [DEBUG]: algorithm.c:469:alg_oakley_hmacdef(): hmac(hmac_sha2_256)

2014-04-23 09:26:34 [DEBUG]: oakley.c:510:oakley_compute_keymat_x():

b79d3e82 ef40040d aad0c7d3 89f85734 1f357258 c94da1e0 7064d5d2 f8bc99f7

a8ba1a1b 67597336 ae1f173f 6493e50f 17d20f06 2e4b0654 bdf20469 38373a5e

857edaff 4a27c1c7 bebb3ba1 c103fe36 44ee89f8 72709ccc d08b91f9 54a37e7e

669a0869 cea61809 5e32cff8 77e6165e e4f26981 80c462b2 a834e689 9aea805b

633c882d dddb713e 144be46e 3886dfc3 b93fff67 11ed08d9 daf7ceef 1984269f

2014-04-23 09:26:34 [DEBUG]: oakley.c:319:oakley_compute_keymat(): KEYMAT computed.

2014-04-23 09:26:34 [PROTO_NOTIFY]: ikev1.c:2548:log_ph2established(): ====> PHASE-2 NEGOTIATION SUCCEEDED AS RESPONDER, (QUICK MODE) <====

====> Established SA: 122.152.XX.XX[500]-175.141.XX.XX[500] message id:0x041039CA, SPI:0xCF97E801/0xE1420445 <====

2014-04-23 09:26:34 [DEBUG]: isakmp_quick.c:1824:quick_r3prep(): call pk_sendupdate

2014-04-23 09:26:34 [DEBUG]: algorithm.c:669:alg_ipsec_encdef(): encryption(aes)

2014-04-23 09:26:34 [DEBUG]: algorithm.c:712:alg_ipsec_hmacdef(): hmac(null)

2014-04-23 09:26:34 [INFO]: ike_pfkey.c:339:sadb_log_add(): SADB_UPDATE ul_proto=255 src=175.141.XX.XX[500] dst=122.152.XX.XX[500] satype=ESP samode=tunl spi=0xCF97E801 authtype=SHA512 enctype=AES256 lifetime soft time=600 bytes=47185

92000 hard time=600 bytes=4718592000

2014-04-23 09:26:34 [DEBUG]: isakmp_quick.c:1829:quick_r3prep(): pfkey update sent.

2014-04-23 09:26:34 [DEBUG]: algorithm.c:669:alg_ipsec_encdef(): encryption(aes)

2014-04-23 09:26:34 [DEBUG]: algorithm.c:712:alg_ipsec_hmacdef(): hmac(null)

2014-04-23 09:26:34 [INFO]: ike_pfkey.c:339:sadb_log_add(): SADB_ADD ul_proto=255 src=122.152.XX.XX[500] dst=175.141.XX.XX[500] satype=ESP samode=tunl spi=0xE1420445 authtype=SHA512 enctype=AES256 lifetime soft time=600 bytes=47185920

00 hard time=600 bytes=4718592000

Apr 23 09:26:34 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keymirror_add

2014-04-23 09:26:34 [DEBUG]: pfkey.c:1182:ikev1_update_response(): pfkey UPDATE succeeded: ESP/Tunnel 175.141.XX.XX[500]->122.152.XX.XX[500] spi=3482839041(0xcf97e801)

2014-04-23 09:26:34 [INFO]: pfkey.c:1187:ikev1_update_response(): IPsec-SA established: ESP/Tunnel 175.141.XX.XX[500]->122.152.XX.XX[500] spi=3482839041(0xcf97e801)

2014-04-23 09:26:34 [PROTO_NOTIFY]: ikev1.c:2597:log_ipseckeyinstalled(): ====> IPSEC KEY INSTALLATION SUCCEEDED <====

====> Installed SA: 122.152.XX.XX[500]-175.141.XX.XX[500] SPI:0xCF97E801/0xE1420445 lifetime 600 Sec lifesize 4608000 KB <====

2014-04-23 09:26:34 [DEBUG]: isakmp_quick.c:1836:quick_r3prep(): pfkey add sent.

Apr 23 09:26:34 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 4

Apr 23 09:26:34 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keymirror_add

2014-04-23 09:26:34 [INFO]: keymgr_keymirror.c:83:ike_do_keymirror_add(): keymirror add start ++++++++++++++++

Apr 23 09:26:34 keymgr_keydb_insert(ikemgr/keymgr_db.c:108): keymgr: key insert called for tid:8

2014-04-23 09:26:34 [INFO]: keymgr_keymirror.c:87:ike_do_keymirror_add(): keymirror add for gw 7, tn 8, selfSPI CF97E801, retcode 0.

Apr 23 09:26:35 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keymirror_del

Apr 23 09:26:35 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 5

Apr 23 09:26:35 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keymirror_del

2014-04-23 09:26:35 [INFO]: keymgr_keymirror.c:125:ike_do_keymirror_del(): keymirror del start ----------------

2014-04-23 09:26:35 [INFO]: keymgr_keymirror.c:130:ike_do_keymirror_del(): keymirror del for gw 7, tn 8, selfSPI B8739224, retcode 0.

2014-04-23 09:26:35 [DEBUG]: handler.c:1666:remove_ph2(): Deleting a Ph2... status 9

2014-04-23 09:26:35 [DEBUG]: oakley.c:3028:oakley_newiv2(): compute IV for phase2

2014-04-23 09:26:35 [DEBUG]: oakley.c:3029:oakley_newiv2(): phase1 last IV:

2014-04-23 09:26:35 [DEBUG]: oakley.c:3030:oakley_newiv2():

01b02da7 af7ffffd 159c73f7 00c1a160 dc7bf457

2014-04-23 09:26:35 [DEBUG]: algorithm.c:386:alg_oakley_hashdef(): hash(sha256)

2014-04-23 09:26:35 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:26:35 [DEBUG]: oakley.c:3063:oakley_newiv2(): phase2 IV computed:

2014-04-23 09:26:35 [DEBUG]: oakley.c:3064:oakley_newiv2():

ee16e16e c809f012 0a317bac ef2a3e60

2014-04-23 09:26:35 [DEBUG]: oakley.c:682:oakley_compute_hash1(): HASH with:

2014-04-23 09:26:35 [DEBUG]: oakley.c:683:oakley_compute_hash1():

dc7bf457 00000010 00000001 03040001 b8739224

2014-04-23 09:26:35 [DEBUG]: algorithm.c:469:alg_oakley_hmacdef(): hmac(hmac_sha2_256)

2014-04-23 09:26:35 [DEBUG]: oakley.c:692:oakley_compute_hash1(): HASH computed:

2014-04-23 09:26:35 [DEBUG]: oakley.c:693:oakley_compute_hash1():

a860956d 27b26484 681ec5fa cf077743 87a5fee6 b2f0be10 c5db9fd2 de8db97f

2014-04-23 09:26:35 [DEBUG]: oakley.c:3234:oakley_do_encrypt(): begin encryption.

2014-04-23 09:26:35 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:26:35 [DEBUG]: oakley.c:3250:oakley_do_encrypt(): pad length = 12

2014-04-23 09:26:35 [DEBUG]: oakley.c:3280:oakley_do_encrypt():

0c000024 a860956d 27b26484 681ec5fa cf077743 87a5fee6 b2f0be10 c5db9fd2

de8db97f 00000010 00000001 03040001 b8739224 11680afe 20be0173 413f5c0c

2014-04-23 09:26:35 [DEBUG]: algorithm.c:529:alg_oakley_encdef(): encryption(aes)

2014-04-23 09:26:35 [DEBUG]: oakley.c:3290:oakley_do_encrypt(): with key:

2014-04-23 09:26:35 [DEBUG]: oakley.c:3291:oakley_do_encrypt():

631a6335 2240d720 6e3977af 7383dd84 ef01871f 7d19c621 24d1228f 20966358

2014-04-23 09:26:35 [DEBUG]: oakley.c:3296:oakley_do_encrypt(): encrypted payload by IV:

2014-04-23 09:26:35 [DEBUG]: oakley.c:3297:oakley_do_encrypt():

ee16e16e c809f012 0a317bac ef2a3e60

2014-04-23 09:26:35 [DEBUG]: oakley.c:3303:oakley_do_encrypt(): save IV for next:

2014-04-23 09:26:35 [DEBUG]: oakley.c:3304:oakley_do_encrypt():

dd450156 6801495d f70b28e2 e87d385c

2014-04-23 09:26:35 [DEBUG]: oakley.c:3320:oakley_do_encrypt(): encrypted.

2014-04-23 09:26:35 [DEBUG]: ikev1.c:2978:isakmp_send(): 92 bytes from 122.152.XX.XX[500] to 175.141.XX.XX[500]

2014-04-23 09:26:35 [DEBUG]: sockmisc.c:335:sendfromto(): sockname 122.152.XX.XX[500]

2014-04-23 09:26:35 [DEBUG]: sockmisc.c:337:sendfromto(): send packet from 122.152.XX.XX[500]

2014-04-23 09:26:35 [DEBUG]: sockmisc.c:339:sendfromto(): send packet to 175.141.XX.XX[500]

2014-04-23 09:26:35 [DEBUG]: sockmisc.c:524:sendfromto(): 1 times of 92 bytes message will be sent to 175.141.XX.XX[500]

2014-04-23 09:26:35 [DEBUG]: sockmisc.c:528:sendfromto():

e83fbd85 4cba7233 621245d3 15bd2379 08100501 dc7bf457 0000005c 8a46b387

cec45d68 cff04fbd 02d2055f 0509affc a083873f e3fb00a1 1c6c90e2 c5ae24fe

bc30ed8a 550a8d19 420fdbf8 dd450156 6801495d f70b28e2 e87d385c

2014-04-23 09:26:35 [DEBUG]: isakmp_inf.c:805:isakmp_info_send_common(): sendto Information delete.

2014-04-23 09:26:35 [DEBUG]: oakley.c:3088:oakley_delivm(): IV freed

2014-04-23 09:26:35 [PROTO_NOTIFY]: ikev1.c:2620:log_ipseckeydeleted(): ====> IPSEC KEY DELETED <====

====> Deleted SA: 122.152.XX.XX[500]-175.141.XX.XX[500] SPI:0xB8739224/0x33DAADA8 <====

2014-04-23 09:26:35 [INFO]: ike_pfkey.c:446:sadb_delete(): SADB_DELETE ul_proto=0 src=122.152.XX.XX[500] dst=175.141.XX.XX[500] satype=ESP spi=0xB8739224

2014-04-23 09:26:35 [INFO]: ike_pfkey.c:693:sadb_delete_callback(): received PFKEY_DELETE seq=0 satype=ESP spi=0xB8739224

2014-04-23 09:26:35 [DEBUG]: oakley.c:3088:oakley_delivm(): IV freed

Apr 23 09:26:36 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:26:36 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:26:36 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:26:36 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:26:36 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:26:36 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:26:36 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:26:36 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:26:36 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:26:36 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:26:40 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:26:40 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:26:40 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:26:40 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:26:40 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

2014-04-23 09:26:40 [DEBUG]: ikev1_natt.c:348:natt_keepalive_send(): KA: 122.152.XX.XX[4500]->195.243.XX.XX[4500]

2014-04-23 09:26:40 [DEBUG]: sockmisc.c:335:sendfromto(): sockname 122.152.XX.XX[4500]

2014-04-23 09:26:40 [DEBUG]: sockmisc.c:337:sendfromto(): send packet from 122.152.XX.XX[4500]

2014-04-23 09:26:40 [DEBUG]: sockmisc.c:339:sendfromto(): send packet to 195.243.XX.XX[4500]

2014-04-23 09:26:40 [DEBUG]: sockmisc.c:524:sendfromto(): 1 times of 1 bytes message will be sent to 195.243.XX.XX[4500]

2014-04-23 09:26:40 [DEBUG]: sockmisc.c:528:sendfromto():

ff

Apr 23 09:26:40 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:26:40 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:26:40 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:26:40 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:26:40 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:26:44 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:26:44 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:26:44 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:26:44 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:26:44 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:26:44 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:26:44 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:26:44 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:26:44 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:26:44 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:26:48 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:26:48 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:26:48 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:26:48 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:26:48 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:26:48 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:26:48 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:26:48 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:26:48 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:26:48 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:26:52 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:26:52 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:26:52 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:26:52 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:26:52 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:26:52 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:26:52 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:26:52 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:26:52 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:26:52 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:26:57 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:26:57 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:26:57 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:26:57 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:26:57 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:26:57 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:26:57 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:26:57 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:26:57 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:26:57 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

2014-04-23 09:27:00 [DEBUG]: ikev1_natt.c:348:natt_keepalive_send(): KA: 122.152.XX.XX[4500]->195.243.XX.XX[4500]

2014-04-23 09:27:00 [DEBUG]: sockmisc.c:335:sendfromto(): sockname 122.152.XX.XX[4500]

2014-04-23 09:27:00 [DEBUG]: sockmisc.c:337:sendfromto(): send packet from 122.152.XX.XX[4500]

2014-04-23 09:27:00 [DEBUG]: sockmisc.c:339:sendfromto(): send packet to 195.243.XX.XX[4500]

2014-04-23 09:27:00 [DEBUG]: sockmisc.c:524:sendfromto(): 1 times of 1 bytes message will be sent to 195.243.XX.XX[4500]

2014-04-23 09:27:00 [DEBUG]: sockmisc.c:528:sendfromto():

ff

Apr 23 09:27:01 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:27:01 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:27:01 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:27:01 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:27:01 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:27:01 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:27:01 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:27:01 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:27:01 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:27:01 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:27:06 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:27:06 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:27:06 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:27:06 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:27:06 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:27:06 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:27:06 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:27:06 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:27:06 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:27:06 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:27:10 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:27:10 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:27:10 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:27:10 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:27:10 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:27:10 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:27:10 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:27:10 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:27:10 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-MEL-OSPF-Router(Gateway-MEL-OSPF-Router)_out

2014-04-23 09:27:10 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-MEL-OSPF-Router passive mode specified for IKEv1, dropping acquire request

Apr 23 09:27:16 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:27:16 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:27:16 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

2014-04-23 09:27:16 [DEBUG]: if_spmd.c:912:parserep_slid(): SLID ok: 250 Tunnel-to-BDB-ACobiac(Gateway-BDB-ACobiac)_out

2014-04-23 09:27:16 [INFO]: ikev1.c:706:ikev1_initiate(): 0:122.152.XX.XX[0] - 0.0.0.0[0]:(nil):remote Gateway-BDB-ACobiac passive mode specified for IKEv1, dropping acquire request

Apr 23 09:27:16 ifmon_request_put(daemon/panike_sysd_if.c:860): 16 write to pipe: keyacquire

Apr 23 09:27:16 ifmon_request_get(daemon/panike_sysd_if.c:876): 16 read from pipe, msg type 3

Apr 23 09:27:16 pan_msg_process(daemon/panike_sysd_if.c:974): request from pipe: keyacquire

Hope you can help us. Thanks in advance.

24 REPLIES 24

thx.

Yes I set it up.... but we have not much experience with cisco and paloalto tunnels... so help is required 😃

Here are some outputs:

13:51:11.227051 IP 165.228.XXX.XXX.500 > 122.152.XXX.XX.500: isakmp: phase 2/others I inf

13:51:11.228118 IP 122.152.XXX.XX.500 > 165.228.XXX.XXX.500: isakmp: phase 2/others R inf

13:51:41.473616 IP 165.228.XXX.XXX.500 > 122.152.XXX.XX.500: isakmp: phase 2/others I inf

13:51:41.474677 IP 122.152.XXX.XX.500 > 165.228.XXX.XXX.500: isakmp: phase 2/others R inf

13:51:43.122819 IP 175.184.XXX.XXX.500 > 122.152.XXX.XX.500: isakmp: phase 2/others I oakley-quick

13:51:43.151751 IP 122.152.XXX.XX.500 > 175.184.XXX.XXX.500: isakmp: phase 2/others R oakley-quick

13:51:43.377068 IP 175.184.XXX.XXX.500 > 122.152.XXX.XX.500: isakmp: phase 2/others I oakley-quick

13:51:44.100986 IP 122.152.XXX.XX.500 > 175.184.XXX.XXX.500: isakmp: phase 2/others R inf

13:51:50.700915 IP 165.228.XXX.XXX.500 > 122.152.XXX.XX.500: isakmp: phase 2/others I inf

13:51:50.701992 IP 122.152.XXX.XX.500 > 165.228.XXX.XXX.500: isakmp: phase 2/others R inf

13:52:10.381501 IP 165.228.XXX.XXX.500 > 122.152.XXX.XX.500: isakmp: phase 2/others I inf

Searched in wirkeshark for "delete" :

5-27-2014 3-25-36 PM.png5-27-2014 3-23-23 PM.png5-27-2014 3-23-02 PM.png5-27-2014 3-21-47 PM.png

Did you check again if every phase is the same on the paloalto and the cisco device?

The last time I saw this behavior it was a damaged SA on the cisco device which generated two SAs for the same subnets and after a time one was deleted. I would delete the lifesize of the phase 2 if it's not needed. Do you have access to both sides?

the lifesize at PaloAlto side is not set and at Cisco side also with:

crypto IPsec profile P1

set security-association lifetime kilobytes disable


Hello Hithead,

Could you please share SYSTEM logs from Palo Alto FW during that time. It will give us some indication here.

Thanks

5-28-2014 9-37-34 AM.png

Ok the first message at 13:47 is that the cisco requests to delete the SA and a new SA is established right after that. Do you have DPD activated on the PA?

I would check again if the proxy IDs are matching and if the cisco has some dead SAs installed.

here are the DPD config:

PA...

5-28-2014 1-02-46 PM.png

Cisco...

crypto isakmp keepalive 10 5

Proxy IDs are not set on PA. On Cisco also no extra proxy ID config is installed. Do we have to configure proxy IDs? Suggestions how???

Why this link is in a restricted?

Hi

 

the link mentioned earlier in this discussion was removed as the article was outdated and no longer accurate

 

please take a look here : https://live.paloaltonetworks.com/t5/Management-Articles/IPSec-and-tunneling-resource-list/ta-p/6772...

 

Hope this helps

regards

Tom Piens
PANgurus - Strata specialist; config reviews, policy optimization

DPD is not supported on Cisco. This is a Palo Alto feature. You will see that in the ike logs. 

 

Overview

Dead Peer Detection (DPD) refers to functionality documented in RFC 3706, which is a method of detecting dead Internet Key Exchange (IKE/Phase1) peers. Tunnel Monitoring is a Palo Alto Networks proprietary feature that verifies traffic is successfully passing across the IPSEC tunnel in question by sending a PING down the tunnel to the configured destination. Tunnel monitoring can be used in conjunction with “Monitor Profiles” to bring down the tunnel interface allowing routing to update to allow traffic to route across secondary routes. Tunnel monitoring does not require DPD. Dead Peer Detection must be either active or disabled on both sides of the tunnel, having one side with DPD enabled and one side with it disabled can cause VPN reliability issues.

 

https://live.paloaltonetworks.com/t5/Configuration-Articles/Dead-Peer-Detection-and-Tunnel-Monitorin...

 

  • 13520 Views
  • 24 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!