INFO:klips_debug:ipsec_sadb_init: initialising main table of size 16 (2 ^ 4). INFO:klips_debug:ipsec_SArefSubTable_alloc: allocating 16384 bytes for table 0 of 16. INFO:klips_debug:ipsec_SArefSubTable_alloc: initialising 4096 elements (2 ^ 12) of table 0. INFO:klips_debug:ipsec_saref_freelist_init: initialising 256 elements of FreeList. INFO:klips_info:ipsec_alg_init: KLIPS alg v=0.8.1-0 (EALG_MAX=255, AALG_MAX=251) INFO:klips_info:ipsec_alg_init: calling ipsec_alg_static_init() ERR;pfkey_list_insert_supported returned -1. Loading anyway. ipsec_aes_init(alg_type=15 alg_id=12 name=aes): ret=0 DEBUG:klips_debug: experimental ipsec_alg_AES_MAC not registered [Ok] (auth_id=0) ERR;pfkey_list_insert_supported returned -1. Loading anyway. ipsec_3des_init(alg_type=15 alg_id=3 name=3des): ret=0 INFO:klips_debug:ipsec_sa_get: ipsec_sa SA:unk0:0@, ref:0 reference count incremented. INFO:klips_debug:ipsec_SAref_alloc: SAref requested... head=0, cont=1, tail=0, listsize=256. INFO:klips_debug:ipsec_SAref_alloc: FreeList empty, recycling... INFO:klips_debug:ipsec_SAref_recycle: recycling, continuing from SAref=1 (0p(nil)), table=0, entry=1. INFO:klips_debug:ipsec_SAref_recycle: SArefFreeList refilled. INFO:klips_debug:ipsec_SAref_alloc: allocating SAref=1, table=0, entry=1 of 65536. INFO:ipsec_sa_alloc: allocated 532 bytes for ipsec_sa struct=0p0xABCDABCD ref=0. INFO:klips_debug:ipsec_sa_get: ipsec_sa SA:unk0:0@, ref:1 reference count incremented. INFO:ipsec_sa_alloc: SAref[1]=0xABCDABCD INFO:klips_debug:ipsec_sa_get: ipsec_sa SA:unk0:0@, ref:0 reference count incremented. INFO:klips_debug:ipsec_SAref_alloc: SAref requested... head=2, cont=256, tail=255, listsize=256. INFO:klips_debug:ipsec_SAref_alloc: allocating SAref=2, table=0, entry=2 of 65536. INFO:ipsec_sa_alloc: allocated 532 bytes for ipsec_sa struct=0p0xABCDABCD ref=0. INFO:klips_debug:ipsec_sa_get: ipsec_sa SA:unk0:0@, ref:2 reference count incremented. INFO:ipsec_sa_alloc: SAref[2]=0xABCDABCD INFO:klips_debug:ipsec_sa_get: ipsec_sa SA:esp:12345678@, ref:2 reference count incremented. INFO:klips_debug:ipsec_rcv: <<< Info -- INFO:klips_debug:ipsec_rcv: Informational -- **if this happens, find out why** skb->dev:NULL is not equal to dev:NULL INFO:klips_debug:ipsec_rcv: device supplied with skb is NULL INFO:klips_error:ipsec_rcv: packet received from physical I/F (NULL) not connected to ipsec I/F. Cannot record stats. May not have SA for decoding. Is IPSEC traffic expected on this I/F? Check routing. INFO:klips_debug:ipsec_rcv_decap_once: decap (50) from 192.1.2.23 -> 192.1.2.45 INFO:klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=130 of SA:esp.12345678@192.1.2.45 requested. INFO:klips_debug:ipsec_sa_get: ipsec_sa SA:esp:12345678@, ref:2 reference count incremented. INFO:klips_debug:ipsec_rcv: SA:esp.12345678@192.1.2.45, src=192.1.2.23 of pkt agrees with expected SA source address policy. INFO:klips_debug:ipsec_rcv: SA:esp.12345678@192.1.2.45 First SA in group. INFO:klips_debug:ipsec_rcv: packet from 192.1.2.23 received with seq=1 (iv)=0x4c20452f3cb09211 iplen=116 esplen=104 sa=esp.12345678@192.1.2.45 INFO:klips_debug:ipsec_rcv: encalg = 3, authalg = 2. INFO:klips_dmp: at ictx, len=88: INFO:klips_debug: @000: 3e e9 ed c3 3f 8e 3b 10 6b a1 a7 2b b1 09 d0 34 INFO:klips_debug: @010: 00 02 00 00 00 00 00 00 b1 53 b1 53 b1 53 b1 53 INFO:klips_debug: @020: b1 53 b1 53 b1 53 b1 53 36 36 36 36 36 36 36 36 INFO:klips_debug: @030: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 INFO:klips_debug: @040: 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 INFO:klips_debug: @050: 36 36 36 36 36 36 36 36 INFO:klips_dmp: at mac_esp, len=104: INFO:klips_debug: @000: 12 34 56 78 00 00 00 01 4c 20 45 2f 3c b0 92 11 INFO:klips_debug: @010: d3 a7 48 cd e5 c8 11 e3 9c 4e e8 3c fe 96 a1 e4 INFO:klips_debug: @020: 2a cf d2 b8 7a ab 05 d1 64 2b a3 af 9c 1b c3 42 INFO:klips_debug: @030: 10 2c 40 ad 15 df 4d e0 20 0a 63 63 87 34 71 11 INFO:klips_debug: @040: 87 d4 12 09 3b 83 bf aa 43 19 1c bd 84 a4 5b 02 INFO:klips_debug: @050: 76 33 83 99 b1 f5 ca 17 cc 92 54 45 7e 59 06 55 INFO:klips_debug: @060: 1a 70 41 e3 dc 91 76 e8 INFO:klips_dmp: at hash1, len=16: INFO:klips_debug: @000: 18 5e b6 9b 2f fd c2 1b 24 6f 3b d2 9c 6a be a6 INFO:klips_dmp: at octx, len=88: INFO:klips_debug: @000: df 34 22 04 0b 3c 66 d4 7c 72 c3 77 48 0f 0e 2e INFO:klips_debug: @010: 00 02 00 00 00 00 00 00 db 39 db 39 db 39 db 39 INFO:klips_debug: @020: db 39 db 39 db 39 db 39 5c 5c 5c 5c 5c 5c 5c 5c INFO:klips_debug: @030: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c INFO:klips_debug: @040: 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c 5c INFO:klips_debug: @050: 5c 5c 5c 5c 5c 5c 5c 5c INFO:klips_debug:ipsec_rcv: authentication successful. INFO:klips_debug:ipsec_rcv: encalg=3 esphlen=16 INFO:klips_debug:ipsec_alg_esp_encrypt: entering with encalg=3, ixt_e=0xDEADF00D INFO:klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=3 ips_key_e=0xDEADF00D idat=0xDEADF00D ilen=88 iv=0xDEADF00D, encrypt=0 INFO:klips_debug:ipsec_alg_esp_encrypt: returned ret=1 INFO:klips_dmp: at postdecrypt, len=88: INFO:klips_debug: @000: 45 00 00 54 00 00 40 00 3f 01 b8 a6 c0 00 02 01 INFO:klips_debug: @010: c0 00 01 01 08 00 ba f0 6f 00 05 00 23 9b c7 3b INFO:klips_debug: @020: f2 34 01 00 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 INFO:klips_debug: @030: 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f 20 21 22 23 INFO:klips_debug: @040: 24 25 26 27 28 29 2a 2b 2c 2d 2e 2f 30 31 32 33 INFO:klips_debug: @050: 34 35 36 37 01 02 02 04 INFO:klips_debug:ipsec_rcv: padlen=2, contents: 0x: 0x 0x ... INFO:klips_debug: 00: 01 02 INFO:klips_debug:ipsec_rcv: packet decrypted from 192.1.2.23: next_header = 4, padding = 2 INFO:klips_dmp: at esp postmove, len=108: INFO:klips_debug: @000: 45 00 00 68 ff 67 00 00 40 32 00 00 c0 01 02 17 INFO:klips_debug: @010: c0 01 02 2d 45 00 00 54 00 00 40 00 3f 01 b8 a6 INFO:klips_debug: @020: c0 00 02 01 c0 00 01 01 08 00 ba f0 6f 00 05 00 INFO:klips_debug: @030: 23 9b c7 3b f2 34 01 00 08 09 0a 0b 0c 0d 0e 0f INFO:klips_debug: @040: 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f INFO:klips_debug: @050: 20 21 22 23 24 25 26 27 28 29 2a 2b 2c 2d 2e 2f INFO:klips_debug: @060: 30 31 32 33 34 35 36 37 01 02 02 04 INFO:klips_dmp: at esp postpull, len=100: INFO:klips_debug: @000: 45 00 00 54 00 00 40 00 3f 01 b8 a6 c0 00 02 01 INFO:klips_debug: @010: c0 00 01 01 08 00 ba f0 6f 00 05 00 23 9b c7 3b INFO:klips_debug: @020: f2 34 01 00 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 INFO:klips_debug: @030: 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f 20 21 22 23 INFO:klips_debug: @040: 24 25 26 27 28 29 2a 2b 2c 2d 2e 2f 30 31 32 33 INFO:klips_debug: @050: 34 35 36 37 01 02 02 04 6f d3 ff dd 00 b0 bc 11 INFO:klips_debug: @060: f8 10 30 97 INFO:klips_debug:ipsec_rcv: trimming to 84. INFO:klips_debug:ipsec_rcv: after , SA:esp.12345678@192.1.2.45: INFO:klips_debug:ipsec_rcv: SA:esp.12345678@192.1.2.45, Another IPSEC header to process. INFO:klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x20000. INFO:klips_debug:ipsec_rcv: IPIP tunnel stripped. INFO:klips_debug:ipsec_rcv: IPIP SA sets skb->nfmark=0x30000. INFO:klips_debug:ipsec_rcv: netif_rx() called. INFO:klips_dmp: at netif_rx, len=84: INFO:klips_debug: @000: 45 00 00 54 00 00 40 00 3f 01 b8 a6 c0 00 02 01 INFO:klips_debug: @010: c0 00 01 01 08 00 ba f0 6f 00 05 00 23 9b c7 3b INFO:klips_debug: @020: f2 34 01 00 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 INFO:klips_debug: @030: 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f 20 21 22 23 INFO:klips_debug: @040: 24 25 26 27 28 29 2a 2b 2c 2d 2e 2f 30 31 32 33 INFO:klips_debug: @050: 34 35 36 37 INFO:klips_dmp: at shouldbe, len=84: INFO:klips_debug: @000: 45 00 00 54 00 00 40 00 3e 01 b9 a6 c0 00 02 01 INFO:klips_debug: @010: c0 00 01 01 08 00 ba f0 6f 00 05 00 23 9b c7 3b INFO:klips_debug: @020: f2 34 01 00 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 INFO:klips_debug: @030: 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f 20 21 22 23 INFO:klips_debug: @040: 24 25 26 27 28 29 2a 2b 2c 2d 2e 2f 30 31 32 33 INFO:klips_debug: @050: 34 35 36 37 INFO:klips_debug:ipsec_sadb_cleanup: cleaning up proto=0. INFO:ipsec_sa_put: ipsec_sa 0xBCBCBCBC SA:esp:12345678@, ref:2 reference count decremented. INFO:klips_debug:ipsec_sadb_cleanup: removing SAref entries and tables.INFO:klips_debug:ipsec_sadb_cleanup: cleaning SAref table=0. INFO:ipsec_sa_put: ipsec_sa 0xBCBCBCBC SA:tun:12345678@, ref:1 reference count decremented. INFO:ipsec_sa_put: ipsec_sa 0xBCBCBCBC SA:esp:12345678@, ref:2 reference count decremented. INFO:klips_debug:ipsec_sadb_cleanup: cleaning SAref table=1. INFO:klips_debug:ipsec_sadb_cleanup: cleaned 1 used refTables. done