Electric Fence 2.1 Copyright (C) 1987-1998 Bruce Perens. ../parentI2x509 adjusting ipsec.d to ../../../baseconfigs/west/etc/ipsec.d ../parentI2x509 ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC_SSH: Ok (ret=0) ../parentI2x509 ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC: Ok (ret=0) ../parentI2x509 ike_alg_register_enc(): Activating OAKLEY_SERPENT_CBC: Ok (ret=0) ../parentI2x509 ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0) ../parentI2x509 ike_alg_register_enc(): Activating OAKLEY_BLOWFISH_CBC: Ok (ret=0) ../parentI2x509 ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0) ../parentI2x509 ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0) ../parentI2x509 Changed path to directory '../../../baseconfigs/west/etc/ipsec.d/cacerts' ../parentI2x509 loaded CA cert file 'otherca.crt' (1428 bytes) ../parentI2x509 loaded CA cert file 'ca.crt' (1407 bytes) ../parentI2x509 loading secrets from "../../../baseconfigs/west/etc/ipsec.secrets" ../parentI2x509 loaded private key for keyid: PPK_RSA:AQNzGEFs1 ../parentI2x509 loaded private key file '../../../baseconfigs/west/etc/ipsec.d/private/west.key' (963 bytes) ../parentI2x509 loaded private key for keyid: PPK_RSA:AwEAAbmpA ../parentI2x509 loading certificate from west.crt ../parentI2x509 loaded host cert file './west.crt' (1704 bytes) | interface "eth0" matched left side ../parentI2x509 added connection description "ikev2-westnet-eastnet-x509-cr" RC=0 "ikev2-westnet-eastnet-x509-cr": 192.1.2.45<192.1.2.45>[C=ca, ST=Ontario, O=Libreswan, OU=Test Department, CN=west.testing.libreswan.org, E=testing.libreswan.org,S=C]...192.1.2.23<192.1.2.23>[C=ca, ST=Ontario, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=testing.libreswan.org,S=C]; unrouted; eroute owner: #0 RC=0 "ikev2-westnet-eastnet-x509-cr": myip=unset; hisip=unset; mycert=west.crt; RC=0 "ikev2-westnet-eastnet-x509-cr": CAs: 'C=ca, ST=Ontario, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing.libreswan.org'...'%any' RC=0 "ikev2-westnet-eastnet-x509-cr": ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 3 RC=0 "ikev2-westnet-eastnet-x509-cr": policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEv2ALLOW+IKEv2Init; prio: 32,32; interface: eth0; RC=0 "ikev2-westnet-eastnet-x509-cr": newest ISAKMP SA: #0; newest IPsec SA: #0; | interface "eth0" matched left side | ICOOKIE: 00 01 02 03 04 05 06 07 | RCOOKIE: 00 00 00 00 00 00 00 00 | state hash entry 4 ../parentI2x509 initiating v2 parent SA RC=133 STATE_PARENT_I1: initiate sending 508 bytes for ikev2_parent_outI1_tail through eth0:500 to 192.1.2.23:500 (using #1) | 00 01 02 03 04 05 06 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 fc 22 80 00 f4 | 02 00 00 28 01 01 00 04 03 00 00 08 01 00 00 0c | 03 00 00 08 03 00 00 02 03 00 00 08 02 00 00 02 | 00 00 00 08 04 00 00 05 02 00 00 28 02 01 00 04 | 03 00 00 08 01 00 00 0c 03 00 00 08 03 00 00 02 | 03 00 00 08 02 00 00 01 00 00 00 08 04 00 00 05 | 02 00 00 28 03 01 00 04 03 00 00 08 01 00 00 03 | 03 00 00 08 03 00 00 02 03 00 00 08 02 00 00 02 | 00 00 00 08 04 00 00 05 02 00 00 28 04 01 00 04 | 03 00 00 08 01 00 00 03 03 00 00 08 03 00 00 02 | 03 00 00 08 02 00 00 01 00 00 00 08 04 00 00 05 | 02 00 00 28 05 01 00 04 03 00 00 08 01 00 00 03 | 03 00 00 08 03 00 00 02 03 00 00 08 02 00 00 02 | 00 00 00 08 04 00 00 02 00 00 00 28 06 01 00 04 | 03 00 00 08 01 00 00 03 03 00 00 08 03 00 00 02 | 03 00 00 08 02 00 00 01 00 00 00 08 04 00 00 02 | 28 00 00 c8 00 05 00 00 ff bc 6a 92 a6 b9 55 9b | 05 fa 96 a7 a4 35 07 b4 c1 e1 c0 86 1a 58 71 d9 | ba 73 a1 63 11 37 88 c0 de bb 39 79 e7 ff 0c 52 | b4 ce 60 50 eb 05 36 9e a4 30 0d 2b ff 3b 1b 29 | 9f 3b 80 2c cb 13 31 8c 2a b9 e3 b5 62 7c b4 b3 | 5e b9 39 98 20 76 b5 7c 05 0d 7b 35 c3 c5 c7 cc | 8c 0f ea b7 b6 4a 7d 7b 6b 8f 6b 4d ab f4 ac 40 | 6d d2 01 26 b9 0a 98 ac 76 6e fa 37 a7 89 0c 43 | 94 ff 9a 77 61 5b 58 f5 2d 65 1b bf a5 8d 2a 54 | 9a f8 b0 1a a4 bc a3 d7 62 42 66 63 b1 55 d4 eb | da 9f 60 a6 a1 35 73 e6 a8 88 13 5c dc 67 3d d4 | 83 02 99 03 f3 a9 0e ca 23 e1 ec 1e 27 03 31 b2 | d0 50 f4 f7 58 f4 99 27 2b 80 00 14 b5 ce 84 19 | 09 5c 6e 2b 6b 62 d3 05 53 05 b3 c4 00 00 00 10 | 4f 45 VENDOR ../parentI2x509 transition from state STATE_IKEv2_START to state STATE_PARENT_I1 ../parentI2x509 STATE_PARENT_I1: sent v2I1, expected v2R1 | *received 308 bytes from 192.1.2.23:500 on eth0 (port=500) | 00 01 02 03 04 05 06 07 c0 2e 7a 30 31 a0 31 88 | 21 20 22 20 00 00 00 00 00 00 01 34 22 80 00 2c | 00 00 00 28 01 01 00 04 03 00 00 08 01 00 00 0c | 03 00 00 08 03 00 00 02 03 00 00 08 02 00 00 02 | 00 00 00 08 04 00 00 05 28 00 00 c8 00 05 00 00 | cd 30 df 6e c0 85 44 12 53 01 80 d8 7e 1a fb b3 | 26 79 3e 99 56 c8 6a 96 25 53 c2 77 ad 5b ab 50 | f8 32 5a d8 64 0b 0e fe a5 1d 6c 83 1f a1 7c fb | 0f 2e 1a f4 b1 66 a0 fe 30 75 12 ad 0f 81 ab b8 | aa fb 68 48 ec 10 a4 97 6c 3d b1 17 ec e1 e6 61 | db bf 48 0c 28 2e 3f 11 07 c1 86 42 80 1e e8 3f | 9e 4a b9 ab 63 6f 23 7d aa f6 a7 aa d8 22 99 3e | a4 1e a3 31 ee 27 82 0b 93 f5 0b 8f 3f 71 05 61 | c9 25 70 26 97 ba 6b 1e 95 3c 21 fb c9 a7 7d 2b | 5f 87 3c fc 50 99 e7 7d 48 4c dd 52 66 4b cf 0d | bf 00 ca fd ae 6d e7 14 6d 11 35 f6 5d 93 5f 60 | b9 73 0f e0 49 2c 2a f8 c9 04 f6 4c 59 16 90 9d | 2b 80 00 14 47 e9 f9 25 8c a2 38 58 f6 75 b1 66 | b0 2c c2 92 00 00 00 10 4f 45 70 6c 75 74 6f 75 | 6e 69 74 30 | **parse ISAKMP Message: | initiator cookie: | 00 01 02 03 04 05 06 07 | responder cookie: | c0 2e 7a 30 31 a0 31 88 | next payload type: ISAKMP_NEXT_v2SA | ISAKMP version: IKEv2 version 2.0 (rfc4306) | exchange type: ISAKMP_v2_SA_INIT | flags: ISAKMP_FLAG_RESPONSE | message ID: 00 00 00 00 | length: 308 | processing version=2.0 packet with exchange type=ISAKMP_v2_SA_INIT (34) | ICOOKIE: 00 01 02 03 04 05 06 07 | RCOOKIE: c0 2e 7a 30 31 a0 31 88 | state hash entry 30 | v2 state object not found | ICOOKIE: 00 01 02 03 04 05 06 07 | RCOOKIE: 00 00 00 00 00 00 00 00 | state hash entry 4 | v2 peer and cookies match on #1 | v2 state object #1 found, in STATE_PARENT_I1 | ICOOKIE: 00 01 02 03 04 05 06 07 | RCOOKIE: 00 00 00 00 00 00 00 00 | state hash entry 4 | ICOOKIE: 00 01 02 03 04 05 06 07 | RCOOKIE: c0 2e 7a 30 31 a0 31 88 | state hash entry 30 | ***parse IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2KE | critical bit: Payload-Critical | length: 44 | processing payload: ISAKMP_NEXT_v2SA (len=44) | ***parse IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2Ni | length: 200 | transform type: 5 | processing payload: ISAKMP_NEXT_v2KE (len=200) | ***parse IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2V | critical bit: Payload-Critical | length: 20 | processing payload: ISAKMP_NEXT_v2Ni (len=20) | ***parse IKEv2 Vendor ID Payload: | next payload type: ISAKMP_NEXT_NONE | critical bit: Payload-Non-Critical | length: 16 | processing payload: ISAKMP_NEXT_v2V (len=16) | ikev2 parent inR1: calculating g^{xy} in order to send I2 | DH public value received: | cd 30 df 6e c0 85 44 12 53 01 80 d8 7e 1a fb b3 | 26 79 3e 99 56 c8 6a 96 25 53 c2 77 ad 5b ab 50 | f8 32 5a d8 64 0b 0e fe a5 1d 6c 83 1f a1 7c fb | 0f 2e 1a f4 b1 66 a0 fe 30 75 12 ad 0f 81 ab b8 | aa fb 68 48 ec 10 a4 97 6c 3d b1 17 ec e1 e6 61 | db bf 48 0c 28 2e 3f 11 07 c1 86 42 80 1e e8 3f | 9e 4a b9 ab 63 6f 23 7d aa f6 a7 aa d8 22 99 3e | a4 1e a3 31 ee 27 82 0b 93 f5 0b 8f 3f 71 05 61 | c9 25 70 26 97 ba 6b 1e 95 3c 21 fb c9 a7 7d 2b | 5f 87 3c fc 50 99 e7 7d 48 4c dd 52 66 4b cf 0d | bf 00 ca fd ae 6d e7 14 6d 11 35 f6 5d 93 5f 60 | b9 73 0f e0 49 2c 2a f8 c9 04 f6 4c 59 16 90 9d | ****parse IKEv2 Proposal Substructure Payload: | next payload type: ISAKMP_NEXT_NONE | length: 40 | prop #: 1 | proto ID: 1 | spi size: 0 | # transforms: 4 | *****parse IKEv2 Transform Substructure Payload: | next payload type: ISAKMP_NEXT_T | length: 8 | transform type: 1 | transform ID: 12 | *****parse IKEv2 Transform Substructure Payload: | next payload type: ISAKMP_NEXT_T | length: 8 | transform type: 3 | transform ID: 2 | *****parse IKEv2 Transform Substructure Payload: | next payload type: ISAKMP_NEXT_T | length: 8 | transform type: 2 | transform ID: 2 | *****parse IKEv2 Transform Substructure Payload: | next payload type: ISAKMP_NEXT_NONE | length: 8 | transform type: 4 | transform ID: 5 | ikev2 I 0x0001020304050607 0xc02e7a3031a03188 sha1:0x4ea8e662b07cdd430f6944c6723e4b82d5722418 aes128:0x3f44bf47cafd8150591deb088199fcbf | ikev2 R 0x0001020304050607 0xc02e7a3031a03188 sha1:0x515b0bd22e6d76b34fdb760aa7bfad80b109b75d aes128:0xbedb67ec7dc3d00cccac42e70cd63bde | duplicating state object #1 | creating state object #2 at ADDR | ICOOKIE: 00 01 02 03 04 05 06 07 | RCOOKIE: c0 2e 7a 30 31 a0 31 88 | state hash entry 30 | **emit ISAKMP Message: | initiator cookie: | 00 01 02 03 04 05 06 07 | responder cookie: | c0 2e 7a 30 31 a0 31 88 | next payload type: ISAKMP_NEXT_v2E | ISAKMP version: IKEv2 version 2.0 (rfc4306) | exchange type: ISAKMP_v2_AUTH | flags: ISAKMP_FLAG_INIT | message ID: 00 00 00 01 | ***emit IKEv2 Encryption Payload: | next payload type: ISAKMP_NEXT_v2IDi | critical bit: Payload-Critical | emitting 16 zero bytes of iv into IKEv2 Encryption Payload | IKEv2 thinking whether to send my certificate: | my policy has RSASIG, the policy is : RSASIG+ENCRYPT+TUNNEL+PFS+IKEv2ALLOW+IKEv2Init | sendcert: CERT_ALWAYSSEND and I did not get a certificate request | so send cert. | *****emit IKEv2 Identification Payload: | next payload type: ISAKMP_NEXT_v2CERT | id_type: ID_DER_ASN1_DN | emitting 155 raw bytes of my identity into IKEv2 Identification Payload | my identity 30 81 98 31 0b 30 09 06 03 55 04 06 13 02 63 61 | 31 10 30 0e 06 03 55 04 08 13 07 4f 6e 74 61 72 | 69 6f 31 12 30 10 06 03 55 04 0a 13 09 58 65 6c | 65 72 61 6e 63 65 31 18 30 16 06 03 55 04 0b 13 | 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 6e 74 | 31 23 30 21 06 03 55 04 03 13 1a 77 65 73 74 2e | 74 65 73 74 69 6e 67 2e 78 65 6c 65 72 61 6e 63 | 65 2e 63 6f 6d 31 24 30 22 06 09 2a 86 48 86 f7 | 0d 01 09 01 16 15 74 65 73 74 69 6e 67 40 78 65 | 6c 65 72 61 6e 63 65 2e 63 6f 6d | emitting length of IKEv2 Identification Payload: 163 | idhash calc pi cc 07 97 44 b4 a3 4e 8a 0d 2f 27 8b ee 06 6d 07 | a5 a5 75 2e | idhash calc I2 09 00 00 00 30 81 98 31 0b 30 09 06 03 55 04 06 | 13 02 63 61 31 10 30 0e 06 03 55 04 08 13 07 4f | 6e 74 61 72 69 6f 31 12 30 10 06 03 55 04 0a 13 | 09 58 65 6c 65 72 61 6e 63 65 31 18 30 16 06 03 | 55 04 0b 13 0f 54 65 73 74 20 44 65 70 61 72 74 | 6d 65 6e 74 31 23 30 21 06 03 55 04 03 13 1a 77 | 65 73 74 2e 74 65 73 74 69 6e 67 2e 78 65 6c 65 | 72 61 6e 63 65 2e 63 6f 6d 31 24 30 22 06 09 2a | 86 48 86 f7 0d 01 09 01 16 15 74 65 73 74 69 6e | 67 40 78 65 6c 65 72 61 6e 63 65 2e 63 6f 6d | thinking! to send a CERTREQ or not | my policy is : RSASIG+ENCRYPT+TUNNEL+PFS+IKEv2ALLOW+IKEv2Init | my next payload will not be a certificate request | I did not send a certificate request because | no known CA for the other end | I am sending my cert | *****emit IKEv2 Certificate Payload: | next payload type: ISAKMP_NEXT_v2AUTH | critical bit: Payload-Non-Critical | ikev2 cert encoding: CERT_X509_SIGNATURE | emitting 1216 raw bytes of CERT into IKEv2 Certificate Payload | CERT 30 82 04 bc 30 82 04 25 a0 03 02 01 02 02 01 02 | 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 | 81 96 31 0b 30 09 06 03 55 04 06 13 02 63 61 31 | 10 30 0e 06 03 55 04 08 13 07 4f 6e 74 61 72 69 | 6f 31 12 30 10 06 03 55 04 0a 13 09 58 65 6c 65 | 72 61 6e 63 65 31 18 30 16 06 03 55 04 0b 13 0f | 54 65 73 74 20 44 65 70 61 72 74 6d 65 6e 74 31 | 21 30 1f 06 03 55 04 03 13 18 58 65 6c 65 72 61 | 6e 63 65 20 74 65 73 74 20 43 41 20 66 6f 72 20 | 63 61 31 24 30 22 06 09 2a 86 48 86 f7 0d 01 09 | 01 16 15 74 65 73 74 69 6e 67 40 78 65 6c 65 72 | 61 6e 63 65 2e 63 6f 6d 30 1e 17 0d 30 38 30 31 | 33 30 30 30 30 30 30 30 5a 17 0d 31 32 30 32 30 | 33 30 30 30 30 30 30 5a 30 81 98 31 0b 30 09 06 | 03 55 04 06 13 02 63 61 31 10 30 0e 06 03 55 04 | 08 13 07 4f 6e 74 61 72 69 6f 31 12 30 10 06 03 | 55 04 0a 13 09 58 65 6c 65 72 61 6e 63 65 31 18 | 30 16 06 03 55 04 0b 13 0f 54 65 73 74 20 44 65 | 70 61 72 74 6d 65 6e 74 31 23 30 21 06 03 55 04 | 03 13 1a 77 65 73 74 2e 74 65 73 74 69 6e 67 2e | 78 65 6c 65 72 61 6e 63 65 2e 63 6f 6d 31 24 30 | 22 06 09 2a 86 48 86 f7 0d 01 09 01 16 15 74 65 | 73 74 69 6e 67 40 78 65 6c 65 72 61 6e 63 65 2e | 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d | 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 | ca c7 0f c1 05 40 b0 fc 48 ee 07 f0 67 2c d9 8f | 36 e4 b6 b7 51 e5 e6 cd a1 8c 34 be 92 b1 8a 08 | 94 4d e9 4a d7 01 78 39 7e 2b d8 9b 7f af 4f 6b | 64 95 b1 ef a2 0c 0b 2b a3 c3 68 3c 98 9e eb 6f | 2a 22 ad 3c d2 32 09 e3 4f 82 4f 86 64 c2 44 46 | ae 89 98 45 39 a2 5e 38 f7 90 57 81 da 0a 22 d6 | 01 07 46 4c 86 8b 65 77 1a 0c b2 5b 14 0a 0d 32 | 7b 88 61 b1 fb 90 97 7a d6 38 b9 58 c9 d9 e2 39 | 02 03 01 00 01 a3 82 02 14 30 82 02 10 30 09 06 | 03 55 1d 13 04 02 30 00 30 81 b1 06 03 55 1d 1f | 04 81 a9 30 81 a6 30 2c a0 2a a0 28 86 26 68 74 | 74 70 3a 2f 2f 63 65 72 74 73 2e 78 65 6c 65 72 | 61 6e 63 65 2e 63 6f 6d 2f 72 65 76 6f 6b 65 64 | 2e 63 72 6c 30 76 a0 74 a0 72 86 70 6c 64 61 70 | 3a 2f 2f 63 65 72 74 73 2e 78 65 6c 65 72 61 6e | 63 65 2e 63 6f 6d 2f 6f 3d 58 65 6c 65 72 61 6e | 63 65 2c 20 63 3d 43 41 3f 63 65 72 74 69 66 69 | 63 61 74 65 52 65 76 6f 63 61 74 69 6f 6e 4c 69 | 73 74 3f 62 61 73 65 3f 28 6f 62 6a 65 63 74 43 | 6c 61 73 73 3d 63 65 72 74 69 66 69 63 61 74 69 | 6f 6e 41 75 74 68 6f 72 69 74 79 29 30 0b 06 03 | 55 1d 0f 04 04 03 02 05 e0 30 27 06 03 55 1d 25 | 04 20 30 1e 06 08 2b 06 01 05 05 07 03 02 06 08 | 2b 06 01 05 05 07 03 01 06 08 2b 06 01 05 05 07 | 03 03 30 2c 06 09 60 86 48 01 86 f8 42 01 0d 04 | 1f 16 1d 4f 70 65 6e 53 53 4c 20 47 65 6e 65 72 | 61 74 65 64 20 43 65 72 74 69 66 69 63 61 74 65 | 30 1d 06 03 55 1d 0e 04 16 04 14 3f 0e 79 ee b6 | c7 cb 65 43 6f a4 e1 51 79 09 a6 14 4d 5d 3b 30 | 81 cb 06 03 55 1d 23 04 81 c3 30 81 c0 80 14 45 | d7 61 cd 80 1a 9c 73 9a c9 25 b7 a5 9d db 9a 55 | 5a 1b 04 a1 81 9c a4 81 99 30 81 96 31 0b 30 09 | 06 03 55 04 06 13 02 63 61 31 10 30 0e 06 03 55 | 04 08 13 07 4f 6e 74 61 72 69 6f 31 12 30 10 06 | 03 55 04 0a 13 09 58 65 6c 65 72 61 6e 63 65 31 | 18 30 16 06 03 55 04 0b 13 0f 54 65 73 74 20 44 | 65 70 61 72 74 6d 65 6e 74 31 21 30 1f 06 03 55 | 04 03 13 18 58 65 6c 65 72 61 6e 63 65 20 74 65 | 73 74 20 43 41 20 66 6f 72 20 63 61 31 24 30 22 | 06 09 2a 86 48 86 f7 0d 01 09 01 16 15 74 65 73 | 74 69 6e 67 40 78 65 6c 65 72 61 6e 63 65 2e 63 | 6f 6d 82 09 00 bb 38 7f 63 31 90 8b 41 30 0d 06 | 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 | 99 1b 58 cc f9 81 88 cc 17 56 eb ea f6 b3 61 c9 | 14 74 94 03 8f a4 b1 42 a4 80 4b 4a 29 0d 65 4f | 96 76 e4 3e 4b ad 2e d2 c0 3c 91 02 e1 93 4e b6 | 26 31 6d e4 87 71 52 84 af 29 d8 a8 d7 e4 0a 05 | 88 a9 f3 2c 45 4f 5c c8 f9 18 4d 0a 5a bd a4 99 | ef 88 c4 16 55 4d 8d fc d3 e7 61 bf 18 d8 75 b6 | ee 04 e7 51 e2 cd aa 61 e3 b2 48 6d 0e 65 37 fd | bc 30 15 d3 35 42 81 52 2c 36 aa 0e 5c 55 70 54 | emitting length of IKEv2 Certificate Payload: 1221 | *****emit IKEv2 Authentication Payload: | next payload type: ISAKMP_NEXT_v2SA | auth method: v2_AUTH_RSA | emitting 192 zero bytes of fake rsa sig into IKEv2 Authentication Payload | emitting length of IKEv2 Authentication Payload: 200 | empty esp_info, returning defaults | *****emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2TSi | critical bit: Payload-Critical | ******emit IKEv2 Proposal Substructure Payload: | next payload type: ISAKMP_NEXT_P | prop #: 1 | proto ID: 3 | spi size: 4 | # transforms: 3 | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 12 34 56 78 | *******emit IKEv2 Transform Substructure Payload: | next payload type: ISAKMP_NEXT_T | transform type: 1 | transform ID: 12 | emitting length of IKEv2 Transform Substructure Payload: 8 | *******emit IKEv2 Transform Substructure Payload: | next payload type: ISAKMP_NEXT_T | transform type: 3 | transform ID: 2 | emitting length of IKEv2 Transform Substructure Payload: 8 | *******emit IKEv2 Transform Substructure Payload: | next payload type: ISAKMP_NEXT_NONE | transform type: 5 | transform ID: 0 | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 36 | ******emit IKEv2 Proposal Substructure Payload: | next payload type: ISAKMP_NEXT_P | prop #: 2 | proto ID: 3 | spi size: 4 | # transforms: 3 | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 12 34 56 78 | *******emit IKEv2 Transform Substructure Payload: | next payload type: ISAKMP_NEXT_T | transform type: 1 | transform ID: 12 | emitting length of IKEv2 Transform Substructure Payload: 8 | *******emit IKEv2 Transform Substructure Payload: | next payload type: ISAKMP_NEXT_T | transform type: 3 | transform ID: 2 | emitting length of IKEv2 Transform Substructure Payload: 8 | *******emit IKEv2 Transform Substructure Payload: | next payload type: ISAKMP_NEXT_NONE | transform type: 5 | transform ID: 0 | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 36 | ******emit IKEv2 Proposal Substructure Payload: | next payload type: ISAKMP_NEXT_P | prop #: 3 | proto ID: 3 | spi size: 4 | # transforms: 3 | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 12 34 56 78 | *******emit IKEv2 Transform Substructure Payload: | next payload type: ISAKMP_NEXT_T | transform type: 1 | transform ID: 3 | emitting length of IKEv2 Transform Substructure Payload: 8 | *******emit IKEv2 Transform Substructure Payload: | next payload type: ISAKMP_NEXT_T | transform type: 3 | transform ID: 2 | emitting length of IKEv2 Transform Substructure Payload: 8 | *******emit IKEv2 Transform Substructure Payload: | next payload type: ISAKMP_NEXT_NONE | transform type: 5 | transform ID: 0 | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 36 | ******emit IKEv2 Proposal Substructure Payload: | next payload type: ISAKMP_NEXT_NONE | prop #: 4 | proto ID: 3 | spi size: 4 | # transforms: 3 | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 12 34 56 78 | *******emit IKEv2 Transform Substructure Payload: | next payload type: ISAKMP_NEXT_T | transform type: 1 | transform ID: 3 | emitting length of IKEv2 Transform Substructure Payload: 8 | *******emit IKEv2 Transform Substructure Payload: | next payload type: ISAKMP_NEXT_T | transform type: 3 | transform ID: 2 | emitting length of IKEv2 Transform Substructure Payload: 8 | *******emit IKEv2 Transform Substructure Payload: | next payload type: ISAKMP_NEXT_NONE | transform type: 5 | transform ID: 0 | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 36 | emitting length of IKEv2 Security Association Payload: 148 | *****emit IKEv2 Traffic Selectors: | next payload type: ISAKMP_NEXT_v2TSr | number of TS: 1 | ******emit IKEv2 Traffic Selectors: | TS type: ID_IPV4_ADDR_RANGE | IP Protocol ID: 0 | start port: 0 | end port: 65535 | emitting 4 raw bytes of ipv4 low into IKEv2 Traffic Selectors | ipv4 low c0 01 02 2d | emitting 4 raw bytes of ipv4 high into IKEv2 Traffic Selectors | ipv4 high c0 01 02 2d | emitting length of IKEv2 Traffic Selectors: 16 | emitting length of IKEv2 Traffic Selectors: 24 | *****emit IKEv2 Traffic Selectors: | next payload type: ISAKMP_NEXT_NONE | number of TS: 1 | ******emit IKEv2 Traffic Selectors: | TS type: ID_IPV4_ADDR_RANGE | IP Protocol ID: 0 | start port: 0 | end port: 65535 | emitting 4 raw bytes of ipv4 low into IKEv2 Traffic Selectors | ipv4 low c0 01 02 17 | emitting 4 raw bytes of ipv4 high into IKEv2 Traffic Selectors | ipv4 high c0 01 02 17 | emitting length of IKEv2 Traffic Selectors: 16 | emitting length of IKEv2 Traffic Selectors: 24 | emitting 12 raw bytes of padding and length into cleartext | padding and length 00 01 02 03 04 05 06 07 08 09 0a 0b | emitting 12 zero bytes of 96-bits of truncated HMAC into IKEv2 Encryption Payload | emitting length of IKEv2 Encryption Payload: 1824 | emitting length of ISAKMP Message: 1852 | data before encryption: | 25 00 00 a3 09 00 00 00 30 81 98 31 0b 30 09 06 | 03 55 04 06 13 02 63 61 31 10 30 0e 06 03 55 04 | 08 13 07 4f 6e 74 61 72 69 6f 31 12 30 10 06 03 | 55 04 0a 13 09 58 65 6c 65 72 61 6e 63 65 31 18 | 30 16 06 03 55 04 0b 13 0f 54 65 73 74 20 44 65 | 70 61 72 74 6d 65 6e 74 31 23 30 21 06 03 55 04 | 03 13 1a 77 65 73 74 2e 74 65 73 74 69 6e 67 2e | 78 65 6c 65 72 61 6e 63 65 2e 63 6f 6d 31 24 30 | 22 06 09 2a 86 48 86 f7 0d 01 09 01 16 15 74 65 | 73 74 69 6e 67 40 78 65 6c 65 72 61 6e 63 65 2e | 63 6f 6d 27 00 04 c5 04 30 82 04 bc 30 82 04 25 | a0 03 02 01 02 02 01 02 30 0d 06 09 2a 86 48 86 | f7 0d 01 01 04 05 00 30 81 96 31 0b 30 09 06 03 | 55 04 06 13 02 63 61 31 10 30 0e 06 03 55 04 08 | 13 07 4f 6e 74 61 72 69 6f 31 12 30 10 06 03 55 | 04 0a 13 09 58 65 6c 65 72 61 6e 63 65 31 18 30 | 16 06 03 55 04 0b 13 0f 54 65 73 74 20 44 65 70 | 61 72 74 6d 65 6e 74 31 21 30 1f 06 03 55 04 03 | 13 18 58 65 6c 65 72 61 6e 63 65 20 74 65 73 74 | 20 43 41 20 66 6f 72 20 63 61 31 24 30 22 06 09 | 2a 86 48 86 f7 0d 01 09 01 16 15 74 65 73 74 69 | 6e 67 40 78 65 6c 65 72 61 6e 63 65 2e 63 6f 6d | 30 1e 17 0d 30 38 30 31 33 30 30 30 30 30 30 30 | 5a 17 0d 31 32 30 32 30 33 30 30 30 30 30 30 5a | 30 81 98 31 0b 30 09 06 03 55 04 06 13 02 63 61 | 31 10 30 0e 06 03 55 04 08 13 07 4f 6e 74 61 72 | 69 6f 31 12 30 10 06 03 55 04 0a 13 09 58 65 6c | 65 72 61 6e 63 65 31 18 30 16 06 03 55 04 0b 13 | 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 6e 74 | 31 23 30 21 06 03 55 04 03 13 1a 77 65 73 74 2e | 74 65 73 74 69 6e 67 2e 78 65 6c 65 72 61 6e 63 | 65 2e 63 6f 6d 31 24 30 22 06 09 2a 86 48 86 f7 | 0d 01 09 01 16 15 74 65 73 74 69 6e 67 40 78 65 | 6c 65 72 61 6e 63 65 2e 63 6f 6d 30 81 9f 30 0d | 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d | 00 30 81 89 02 81 81 00 ca c7 0f c1 05 40 b0 fc | 48 ee 07 f0 67 2c d9 8f 36 e4 b6 b7 51 e5 e6 cd | a1 8c 34 be 92 b1 8a 08 94 4d e9 4a d7 01 78 39 | 7e 2b d8 9b 7f af 4f 6b 64 95 b1 ef a2 0c 0b 2b | a3 c3 68 3c 98 9e eb 6f 2a 22 ad 3c d2 32 09 e3 | 4f 82 4f 86 64 c2 44 46 ae 89 98 45 39 a2 5e 38 | f7 90 57 81 da 0a 22 d6 01 07 46 4c 86 8b 65 77 | 1a 0c b2 5b 14 0a 0d 32 7b 88 61 b1 fb 90 97 7a | d6 38 b9 58 c9 d9 e2 39 02 03 01 00 01 a3 82 02 | 14 30 82 02 10 30 09 06 03 55 1d 13 04 02 30 00 | 30 81 b1 06 03 55 1d 1f 04 81 a9 30 81 a6 30 2c | a0 2a a0 28 86 26 68 74 74 70 3a 2f 2f 63 65 72 | 74 73 2e 78 65 6c 65 72 61 6e 63 65 2e 63 6f 6d | 2f 72 65 76 6f 6b 65 64 2e 63 72 6c 30 76 a0 74 | a0 72 86 70 6c 64 61 70 3a 2f 2f 63 65 72 74 73 | 2e 78 65 6c 65 72 61 6e 63 65 2e 63 6f 6d 2f 6f | 3d 58 65 6c 65 72 61 6e 63 65 2c 20 63 3d 43 41 | 3f 63 65 72 74 69 66 69 63 61 74 65 52 65 76 6f | 63 61 74 69 6f 6e 4c 69 73 74 3f 62 61 73 65 3f | 28 6f 62 6a 65 63 74 43 6c 61 73 73 3d 63 65 72 | 74 69 66 69 63 61 74 69 6f 6e 41 75 74 68 6f 72 | 69 74 79 29 30 0b 06 03 55 1d 0f 04 04 03 02 05 | e0 30 27 06 03 55 1d 25 04 20 30 1e 06 08 2b 06 | 01 05 05 07 03 02 06 08 2b 06 01 05 05 07 03 01 | 06 08 2b 06 01 05 05 07 03 03 30 2c 06 09 60 86 | 48 01 86 f8 42 01 0d 04 1f 16 1d 4f 70 65 6e 53 | 53 4c 20 47 65 6e 65 72 61 74 65 64 20 43 65 72 | 74 69 66 69 63 61 74 65 30 1d 06 03 55 1d 0e 04 | 16 04 14 3f 0e 79 ee b6 c7 cb 65 43 6f a4 e1 51 | 79 09 a6 14 4d 5d 3b 30 81 cb 06 03 55 1d 23 04 | 81 c3 30 81 c0 80 14 45 d7 61 cd 80 1a 9c 73 9a | c9 25 b7 a5 9d db 9a 55 5a 1b 04 a1 81 9c a4 81 | 99 30 81 96 31 0b 30 09 06 03 55 04 06 13 02 63 | 61 31 10 30 0e 06 03 55 04 08 13 07 4f 6e 74 61 | 72 69 6f 31 12 30 10 06 03 55 04 0a 13 09 58 65 | 6c 65 72 61 6e 63 65 31 18 30 16 06 03 55 04 0b | 13 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 6e | 74 31 21 30 1f 06 03 55 04 03 13 18 58 65 6c 65 | 72 61 6e 63 65 20 74 65 73 74 20 43 41 20 66 6f | 72 20 63 61 31 24 30 22 06 09 2a 86 48 86 f7 0d | 01 09 01 16 15 74 65 73 74 69 6e 67 40 78 65 6c | 65 72 61 6e 63 65 2e 63 6f 6d 82 09 00 bb 38 7f | 63 31 90 8b 41 30 0d 06 09 2a 86 48 86 f7 0d 01 | 01 04 05 00 03 81 81 00 99 1b 58 cc f9 81 88 cc | 17 56 eb ea f6 b3 61 c9 14 74 94 03 8f a4 b1 42 | a4 80 4b 4a 29 0d 65 4f 96 76 e4 3e 4b ad 2e d2 | c0 3c 91 02 e1 93 4e b6 26 31 6d e4 87 71 52 84 | af 29 d8 a8 d7 e4 0a 05 88 a9 f3 2c 45 4f 5c c8 | f9 18 4d 0a 5a bd a4 99 ef 88 c4 16 55 4d 8d fc | d3 e7 61 bf 18 d8 75 b6 ee 04 e7 51 e2 cd aa 61 | e3 b2 48 6d 0e 65 37 fd bc 30 15 d3 35 42 81 52 | 2c 36 aa 0e 5c 55 70 54 21 00 00 c8 01 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 2c 80 00 94 02 00 00 24 01 03 04 03 12 34 56 78 | 03 00 00 08 01 00 00 0c 03 00 00 08 03 00 00 02 | 00 00 00 08 05 00 00 00 02 00 00 24 02 03 04 03 | 12 34 56 78 03 00 00 08 01 00 00 0c 03 00 00 08 | 03 00 00 02 00 00 00 08 05 00 00 00 02 00 00 24 | 03 03 04 03 12 34 56 78 03 00 00 08 01 00 00 03 | 03 00 00 08 03 00 00 02 00 00 00 08 05 00 00 00 | 00 00 00 24 04 03 04 03 12 34 56 78 03 00 00 08 | 01 00 00 03 03 00 00 08 03 00 00 02 00 00 00 08 | 05 00 00 00 2d 00 00 18 01 00 00 00 07 00 00 10 | 00 00 ff ff c0 01 02 2d c0 01 02 2d 00 00 00 18 | 01 00 00 00 07 00 00 10 00 00 ff ff c0 01 02 17 | c0 01 02 17 00 01 02 03 04 05 06 07 08 09 0a 0b | data after encryption: | 52 89 67 16 e9 8d 47 58 74 5c 54 fb 14 2f 59 6a | 75 23 a4 3c 57 a6 a4 3e ea a0 d1 e5 8a 30 00 e6 | 82 98 2f 39 cf 00 bc 04 36 49 f5 63 e7 88 c7 69 | 74 32 b9 33 84 db 13 10 f4 e9 8a fe a4 35 4d a2 | 41 8b ce e1 6a 9b 9b a3 fa fd 7c 7d 12 98 50 88 | b5 61 50 66 ef 62 4c 41 68 a8 d4 7c 9e fe b5 86 | cf ad fb d2 8c 9b 05 11 16 f0 ba dc 1a c3 42 ee | 8c 78 96 97 d3 19 e8 d4 94 8a 4c 7f 6e c6 bf ff | 9c 8b 36 27 c1 cf 76 4b 72 30 30 36 f2 ca 62 35 | bd 36 b3 ef ca c7 b5 ea f0 72 2a f6 87 2b 54 00 | c4 bb 77 89 86 de 0e e6 4f f1 4a 0e 34 d7 58 dd | bf bc 06 79 1d fa d9 c9 4b ae 15 b1 bc 26 12 90 | cf 07 5f d5 03 cd 4a 10 04 05 1e 9e 84 ff 0c 05 | dc 82 6e cb 69 cb 84 5b 1e 6f 95 49 7b 52 b3 b0 | 2a 00 dc 64 5c d1 ec 3a 07 ea d4 8d 7e 9b de e7 | 6c c3 2d 05 9e 27 de f9 3b c3 9a 5c 8f 2e 83 fc | 23 ce 36 2c 96 56 98 e5 2d 28 f8 ec ae c0 6e 19 | 2c 02 7d 26 b3 2c 6b 5f 8c ef 4b 26 09 0c 95 28 | 76 76 f9 1d 8b b7 98 e8 84 6c 6c fe ce cc 1d c0 | f8 9c 02 74 a0 99 52 3b 96 2b ff 91 63 26 a4 e0 | a5 7e a7 db d2 c2 9a 24 4b d1 e9 cc 23 4e d6 75 | 55 0c 0d 3a 1d cd 2c 23 56 82 05 c3 3e 87 45 d4 | 95 b4 e2 07 0c 87 e8 0d be 47 b8 99 a3 99 fc f3 | a9 c2 c5 6e cc 32 d5 a9 5a ff 25 e8 9d 9f de b4 | 70 20 e9 b6 60 7b 22 a9 13 18 f8 fd 82 ba 4b c6 | c6 55 20 6b ac e1 6c f1 09 06 d4 bd d5 96 51 ee | 6d b4 1f 39 08 4b dc 41 bc 15 d9 7e a5 c5 be 26 | 69 81 bf ee 9e ee b2 b3 9a 20 fa 65 d6 e4 b6 4d | 45 95 44 e8 48 6f fc 06 5c 64 f5 2c f1 3f 1b a4 | d0 b7 4b 4d d1 6d c8 07 0e dc d7 2c 18 59 dd ab | 31 a2 6a c8 8f bf 81 32 9f 26 e5 7c a6 c9 d9 d9 | 51 23 95 a5 fb bb 01 de 4a e3 92 b4 b7 47 7b 30 | aa c6 18 c1 a6 01 df 0f 4a 48 34 3f f8 22 d6 b8 | 05 d4 f1 42 b7 98 84 a1 36 5b d5 92 ae 93 0a f1 | 3d 58 86 9a 55 aa 28 80 35 87 8d 5d 51 8a bd 0c | ec 1d 5c f5 48 eb 99 33 28 66 70 9d 77 2d 9d cf | 4d 88 02 4d e4 f2 2f 2c 4c 18 fb 7c 58 60 1f a9 | 41 06 b2 43 8c 28 cb 62 98 bb 72 7c 64 be 17 96 | 16 67 2e 96 0b d4 b3 9c 79 64 2e 3e 17 03 73 ab | cc 2c 82 b5 e0 66 a2 3c a3 6b 1d c8 98 fe 40 7a | dd 73 50 9a 30 ad db 60 61 ba de 8d 2f 83 d0 ad | 9e e6 87 a2 1f 9c 87 08 c2 ec e6 57 b7 c5 ca 4d | 57 a7 65 d2 a2 d7 89 08 05 ff 52 39 c9 5f 65 9b | 83 21 7b 3c 3b cb 89 cf 62 95 ca d3 a4 0c d3 a6 | 8e f7 77 ee 7e 50 db be 13 04 cf 25 c8 7b 4b 7d | 23 7f 2c 76 4c 08 0e 50 ff 9c f1 27 0a 57 7b b0 | 7b b2 19 2c c2 e0 17 35 9e f1 55 72 26 3c 40 f1 | 9b 87 03 c2 44 2e d2 e4 fd 91 f8 f3 e9 c0 78 1b | cb 66 b5 3f 4c 59 14 d2 ca c9 7e be 6d bb 64 a2 | 46 7a af a6 e6 e1 28 3f f9 f7 80 4e 80 94 95 07 | b4 c8 1a e0 ef 5b af fe 03 5f 4a bc 85 66 8c da | bd ee a5 20 b3 b9 d5 d7 c8 00 1e 30 77 77 49 13 | a7 aa f6 6d 8a b9 7d 49 9b 74 1e 65 37 bf 98 7d | 71 8d 7e 48 ea 5e 23 d0 8a 44 d3 6a d1 32 48 40 | 84 5b 81 a7 1c 7b 5b d8 36 98 10 95 3a 51 10 f9 | b8 88 ba 40 9d 66 ea 81 ec d5 6e 56 66 de bd 14 | db 81 d4 43 0f d5 cc b6 1f cf 48 51 a1 c8 1b f3 | aa 50 be 91 cc 72 57 4a 70 a4 21 d5 22 79 04 a8 | fe 9a 52 b3 1d df 11 dd 9a a3 39 96 67 22 8c 4a | f0 0d b3 4a 8e be 48 b1 12 67 72 7d c8 9d 75 da | ee eb ef 9b 97 36 0f 9c d0 e5 1a 15 a0 54 fb 96 | 6f 52 8a 5a 21 d7 c2 10 dd fb 8a 31 73 40 3e 00 | 6f 44 10 7f 8c 29 ef 46 03 1f bb 5e 90 a6 e2 93 | c4 3e 62 22 b7 7c b1 81 f1 f2 83 17 0e a0 14 c3 | 69 7e e6 7c 95 fe 5d 4e 1e 80 0f 3c 9c d0 51 2f | 74 d5 74 b5 5e fc 83 fc 29 ed f8 c3 06 fc da a8 | a6 86 1d 03 b7 1b 90 41 9d 75 8a 52 07 82 dd 63 | 60 42 4a 58 fd d4 14 6a 51 9a 4d c6 e2 02 9f aa | 03 37 60 98 ad 21 bd 3e 8a b4 28 84 b7 dd 88 f9 | 1a 55 60 8a 41 f8 fd bb c2 c5 97 97 27 81 a8 73 | 3c e6 25 0f 78 db 51 ec 5f 09 21 62 2f 79 b9 6a | d9 15 72 e8 89 ac dc 7e df 7c 21 06 d9 5e 64 df | 14 dc 21 15 99 da c3 b0 b2 6b 04 38 ad 31 da cc | 59 bc ff 43 22 b5 32 c0 20 6b 2a b6 2a 3e 4f d0 | e8 6a 0d 6f 10 54 32 c6 2b 7a b9 11 8e d7 b9 13 | 5d 28 fb 0f c5 3e 78 a8 4d 18 95 2b 85 c0 74 5a | 3d 3b d8 b7 6e fe 16 9a d4 63 d1 32 33 cd 22 dd | ab b1 4f 8c 9b 3b 4d 6a d1 ea 0f c3 ee 01 31 51 | 6d 2f 14 f0 e6 13 4b 1d cb e1 81 d0 15 e7 b9 b3 | 70 a5 f4 32 22 24 ff b4 ad 72 c5 c6 5b 50 04 63 | bb e9 29 44 7b 77 fe 1b 14 1a d5 b1 b8 96 85 78 | 3d 74 a5 bc 09 8a f7 51 08 23 73 9d a4 ff 57 dd | e5 7a e0 33 5c c7 3a ef 3f 66 65 36 9b de 6a db | 7f 2c 03 28 86 67 5b 89 5a ba 58 bb 2a 83 f8 4f | f6 90 d3 37 20 b7 3d 40 20 d1 f7 4a b0 1e d3 36 | ae fa 53 e0 43 4a 43 ac 48 0f 99 82 4f 21 89 4f | d7 8b 3b fd a8 8b db 96 f5 3e d6 f2 56 ce da be | eb a0 3c b6 05 69 a8 bf a2 a5 d0 2b 1f ad d8 a0 | 3c d8 40 f4 d8 4d 6b c7 ec 30 33 24 67 63 64 92 | 4a fb 51 0c 1e bf d3 0e 82 e1 df 38 b2 41 31 47 | d4 8d 79 c4 68 ae 77 f5 26 19 54 dc 31 8c 27 cb | b6 33 8c 58 63 f3 1a 5a 0f 52 0d 02 43 12 b1 6a | eb 1a b6 ad 4e d2 d2 2d 76 29 9b 45 8d f6 21 e6 | 43 62 f3 5c a0 9a 41 b5 44 b8 e1 9f 82 49 8a 1a | a2 f3 8d 55 b8 35 44 93 8e 57 49 62 db 7a 7d f6 | 30 83 48 f1 3c ec ce e0 e1 75 c0 c7 24 ec 03 07 | 65 cb f3 ad 24 2e 51 b6 60 98 00 43 ea 6e 16 28 | a2 19 44 b2 2a 24 59 f0 21 a8 a5 f9 56 49 9b 5e | 68 83 65 28 1b 7f 80 79 07 c5 a4 b5 b3 98 fd 7f | 1a e2 3f 81 c3 34 a0 94 7d 94 eb 39 ce 6f d4 85 | 61 6a be 19 b7 6e 11 36 2e 2c b1 8f ff 5b 2d 84 | 1f ff 10 ec 2e b6 96 f0 ec 67 13 71 1f c2 8e 47 | 90 8b a8 3a 20 23 1d 7f f8 e8 ca 8f 54 35 93 15 | 93 d2 d6 a2 0f 85 78 9c e5 16 5e 29 92 4a 66 41 | 95 ed 5f 5f 21 ac a6 59 d4 f1 f2 d2 40 6e 25 8a | 34 40 b0 b1 62 84 6b ff d8 b0 ce 2e 18 6e 52 a8 | c6 fb fe 30 fc ba a9 27 39 e3 94 ef 44 ac a3 7c | b1 b7 9e d6 11 ef b0 fe 03 4f 60 fa a9 3b 04 f4 | 11 5a 43 40 27 31 63 e4 f2 bb 8d ee 87 c3 3b 70 | 08 a0 cc 75 d0 53 55 b5 64 f5 50 9e b2 56 64 06 | 9b c0 33 47 54 de fc 72 c2 53 01 d5 9d 59 d8 6d | f8 15 09 78 06 e3 b7 ab 7e a1 0f 01 21 d0 51 4e | complete v2 state transition with STF_OK ../parentI2x509 transition from state STATE_PARENT_I1 to state STATE_PARENT_I2 ../parentI2x509 STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=aes_128 integ=sha1 prf=oakley_sha group=modp1536} | sending reply packet to 192.1.2.23:500 (from port 500) sending 1852 bytes for STATE_PARENT_I1 through eth0:500 to 192.1.2.23:500 (using #2) | 00 01 02 03 04 05 06 07 c0 2e 7a 30 31 a0 31 88 | 2e 20 23 08 00 00 00 01 00 00 07 3c 23 80 07 20 | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 52 89 67 16 e9 8d 47 58 74 5c 54 fb 14 2f 59 6a | 75 23 a4 3c 57 a6 a4 3e ea a0 d1 e5 8a 30 00 e6 | 82 98 2f 39 cf 00 bc 04 36 49 f5 63 e7 88 c7 69 | 74 32 b9 33 84 db 13 10 f4 e9 8a fe a4 35 4d a2 | 41 8b ce e1 6a 9b 9b a3 fa fd 7c 7d 12 98 50 88 | b5 61 50 66 ef 62 4c 41 68 a8 d4 7c 9e fe b5 86 | cf ad fb d2 8c 9b 05 11 16 f0 ba dc 1a c3 42 ee | 8c 78 96 97 d3 19 e8 d4 94 8a 4c 7f 6e c6 bf ff | 9c 8b 36 27 c1 cf 76 4b 72 30 30 36 f2 ca 62 35 | bd 36 b3 ef ca c7 b5 ea f0 72 2a f6 87 2b 54 00 | c4 bb 77 89 86 de 0e e6 4f f1 4a 0e 34 d7 58 dd | bf bc 06 79 1d fa d9 c9 4b ae 15 b1 bc 26 12 90 | cf 07 5f d5 03 cd 4a 10 04 05 1e 9e 84 ff 0c 05 | dc 82 6e cb 69 cb 84 5b 1e 6f 95 49 7b 52 b3 b0 | 2a 00 dc 64 5c d1 ec 3a 07 ea d4 8d 7e 9b de e7 | 6c c3 2d 05 9e 27 de f9 3b c3 9a 5c 8f 2e 83 fc | 23 ce 36 2c 96 56 98 e5 2d 28 f8 ec ae c0 6e 19 | 2c 02 7d 26 b3 2c 6b 5f 8c ef 4b 26 09 0c 95 28 | 76 76 f9 1d 8b b7 98 e8 84 6c 6c fe ce cc 1d c0 | f8 9c 02 74 a0 99 52 3b 96 2b ff 91 63 26 a4 e0 | a5 7e a7 db d2 c2 9a 24 4b d1 e9 cc 23 4e d6 75 | 55 0c 0d 3a 1d cd 2c 23 56 82 05 c3 3e 87 45 d4 | 95 b4 e2 07 0c 87 e8 0d be 47 b8 99 a3 99 fc f3 | a9 c2 c5 6e cc 32 d5 a9 5a ff 25 e8 9d 9f de b4 | 70 20 e9 b6 60 7b 22 a9 13 18 f8 fd 82 ba 4b c6 | c6 55 20 6b ac e1 6c f1 09 06 d4 bd d5 96 51 ee | 6d b4 1f 39 08 4b dc 41 bc 15 d9 7e a5 c5 be 26 | 69 81 bf ee 9e ee b2 b3 9a 20 fa 65 d6 e4 b6 4d | 45 95 44 e8 48 6f fc 06 5c 64 f5 2c f1 3f 1b a4 | d0 b7 4b 4d d1 6d c8 07 0e dc d7 2c 18 59 dd ab | 31 a2 6a c8 8f bf 81 32 9f 26 e5 7c a6 c9 d9 d9 | 51 23 95 a5 fb bb 01 de 4a e3 92 b4 b7 47 7b 30 | aa c6 18 c1 a6 01 df 0f 4a 48 34 3f f8 22 d6 b8 | 05 d4 f1 42 b7 98 84 a1 36 5b d5 92 ae 93 0a f1 | 3d 58 86 9a 55 aa 28 80 35 87 8d 5d 51 8a bd 0c | ec 1d 5c f5 48 eb 99 33 28 66 70 9d 77 2d 9d cf | 4d 88 02 4d e4 f2 2f 2c 4c 18 fb 7c 58 60 1f a9 | 41 06 b2 43 8c 28 cb 62 98 bb 72 7c 64 be 17 96 | 16 67 2e 96 0b d4 b3 9c 79 64 2e 3e 17 03 73 ab | cc 2c 82 b5 e0 66 a2 3c a3 6b 1d c8 98 fe 40 7a | dd 73 50 9a 30 ad db 60 61 ba de 8d 2f 83 d0 ad | 9e e6 87 a2 1f 9c 87 08 c2 ec e6 57 b7 c5 ca 4d | 57 a7 65 d2 a2 d7 89 08 05 ff 52 39 c9 5f 65 9b | 83 21 7b 3c 3b cb 89 cf 62 95 ca d3 a4 0c d3 a6 | 8e f7 77 ee 7e 50 db be 13 04 cf 25 c8 7b 4b 7d | 23 7f 2c 76 4c 08 0e 50 ff 9c f1 27 0a 57 7b b0 | 7b b2 19 2c c2 e0 17 35 9e f1 55 72 26 3c 40 f1 | 9b 87 03 c2 44 2e d2 e4 fd 91 f8 f3 e9 c0 78 1b | cb 66 b5 3f 4c 59 14 d2 ca c9 7e be 6d bb 64 a2 | 46 7a af a6 e6 e1 28 3f f9 f7 80 4e 80 94 95 07 | b4 c8 1a e0 ef 5b af fe 03 5f 4a bc 85 66 8c da | bd ee a5 20 b3 b9 d5 d7 c8 00 1e 30 77 77 49 13 | a7 aa f6 6d 8a b9 7d 49 9b 74 1e 65 37 bf 98 7d | 71 8d 7e 48 ea 5e 23 d0 8a 44 d3 6a d1 32 48 40 | 84 5b 81 a7 1c 7b 5b d8 36 98 10 95 3a 51 10 f9 | b8 88 ba 40 9d 66 ea 81 ec d5 6e 56 66 de bd 14 | db 81 d4 43 0f d5 cc b6 1f cf 48 51 a1 c8 1b f3 | aa 50 be 91 cc 72 57 4a 70 a4 21 d5 22 79 04 a8 | fe 9a 52 b3 1d df 11 dd 9a a3 39 96 67 22 8c 4a | f0 0d b3 4a 8e be 48 b1 12 67 72 7d c8 9d 75 da | ee eb ef 9b 97 36 0f 9c d0 e5 1a 15 a0 54 fb 96 | 6f 52 8a 5a 21 d7 c2 10 dd fb 8a 31 73 40 3e 00 | 6f 44 10 7f 8c 29 ef 46 03 1f bb 5e 90 a6 e2 93 | c4 3e 62 22 b7 7c b1 81 f1 f2 83 17 0e a0 14 c3 | 69 7e e6 7c 95 fe 5d 4e 1e 80 0f 3c 9c d0 51 2f | 74 d5 74 b5 5e fc 83 fc 29 ed f8 c3 06 fc da a8 | a6 86 1d 03 b7 1b 90 41 9d 75 8a 52 07 82 dd 63 | 60 42 4a 58 fd d4 14 6a 51 9a 4d c6 e2 02 9f aa | 03 37 60 98 ad 21 bd 3e 8a b4 28 84 b7 dd 88 f9 | 1a 55 60 8a 41 f8 fd bb c2 c5 97 97 27 81 a8 73 | 3c e6 25 0f 78 db 51 ec 5f 09 21 62 2f 79 b9 6a | d9 15 72 e8 89 ac dc 7e df 7c 21 06 d9 5e 64 df | 14 dc 21 15 99 da c3 b0 b2 6b 04 38 ad 31 da cc | 59 bc ff 43 22 b5 32 c0 20 6b 2a b6 2a 3e 4f d0 | e8 6a 0d 6f 10 54 32 c6 2b 7a b9 11 8e d7 b9 13 | 5d 28 fb 0f c5 3e 78 a8 4d 18 95 2b 85 c0 74 5a | 3d 3b d8 b7 6e fe 16 9a d4 63 d1 32 33 cd 22 dd | ab b1 4f 8c 9b 3b 4d 6a d1 ea 0f c3 ee 01 31 51 | 6d 2f 14 f0 e6 13 4b 1d cb e1 81 d0 15 e7 b9 b3 | 70 a5 f4 32 22 24 ff b4 ad 72 c5 c6 5b 50 04 63 | bb e9 29 44 7b 77 fe 1b 14 1a d5 b1 b8 96 85 78 | 3d 74 a5 bc 09 8a f7 51 08 23 73 9d a4 ff 57 dd | e5 7a e0 33 5c c7 3a ef 3f 66 65 36 9b de 6a db | 7f 2c 03 28 86 67 5b 89 5a ba 58 bb 2a 83 f8 4f | f6 90 d3 37 20 b7 3d 40 20 d1 f7 4a b0 1e d3 36 | ae fa 53 e0 43 4a 43 ac 48 0f 99 82 4f 21 89 4f | d7 8b 3b fd a8 8b db 96 f5 3e d6 f2 56 ce da be | eb a0 3c b6 05 69 a8 bf a2 a5 d0 2b 1f ad d8 a0 | 3c d8 40 f4 d8 4d 6b c7 ec 30 33 24 67 63 64 92 | 4a fb 51 0c 1e bf d3 0e 82 e1 df 38 b2 41 31 47 | d4 8d 79 c4 68 ae 77 f5 26 19 54 dc 31 8c 27 cb | b6 33 8c 58 63 f3 1a 5a 0f 52 0d 02 43 12 b1 6a | eb 1a b6 ad 4e d2 d2 2d 76 29 9b 45 8d f6 21 e6 | 43 62 f3 5c a0 9a 41 b5 44 b8 e1 9f 82 49 8a 1a | a2 f3 8d 55 b8 35 44 93 8e 57 49 62 db 7a 7d f6 | 30 83 48 f1 3c ec ce e0 e1 75 c0 c7 24 ec 03 07 | 65 cb f3 ad 24 2e 51 b6 60 98 00 43 ea 6e 16 28 | a2 19 44 b2 2a 24 59 f0 21 a8 a5 f9 56 49 9b 5e | 68 83 65 28 1b 7f 80 79 07 c5 a4 b5 b3 98 fd 7f | 1a e2 3f 81 c3 34 a0 94 7d 94 eb 39 ce 6f d4 85 | 61 6a be 19 b7 6e 11 36 2e 2c b1 8f ff 5b 2d 84 | 1f ff 10 ec 2e b6 96 f0 ec 67 13 71 1f c2 8e 47 | 90 8b a8 3a 20 23 1d 7f f8 e8 ca 8f 54 35 93 15 | 93 d2 d6 a2 0f 85 78 9c e5 16 5e 29 92 4a 66 41 | 95 ed 5f 5f 21 ac a6 59 d4 f1 f2 d2 40 6e 25 8a | 34 40 b0 b1 62 84 6b ff d8 b0 ce 2e 18 6e 52 a8 | c6 fb fe 30 fc ba a9 27 39 e3 94 ef 44 ac a3 7c | b1 b7 9e d6 11 ef b0 fe 03 4f 60 fa a9 3b 04 f4 | 11 5a 43 40 27 31 63 e4 f2 bb 8d ee 87 c3 3b 70 | 08 a0 cc 75 d0 53 55 b5 64 f5 50 9e b2 56 64 06 | 9b c0 33 47 54 de fc 72 c2 53 01 d5 9d 59 d8 6d | f8 15 09 78 06 e3 b7 ab 7e a1 0f 01 21 d0 51 4e | 65 c6 5d c2 3f 61 93 2e 76 47 2b 7e | deleting state #2 | ICOOKIE: 00 01 02 03 04 05 06 07 | RCOOKIE: c0 2e 7a 30 31 a0 31 88 | state hash entry 30 ../parentI2x509 leak: db_v2_trans ../parentI2x509 leak: db_v2_prop_conj ../parentI2x509 leak: db_v2_prop ../parentI2x509 leak: db_v2_trans ../parentI2x509 leak: db_v2_prop_conj ../parentI2x509 leak: db_v2_trans ../parentI2x509 leak: db_v2_prop_conj ../parentI2x509 leak: db_v2_trans ../parentI2x509 leak: db_v2_prop_conj ../parentI2x509 leak: 4 * sa copy attrs array ../parentI2x509 leak: sa copy trans array ../parentI2x509 leak: sa copy prop array ../parentI2x509 leak: sa copy prop conj array ../parentI2x509 leak: sa copy prop_conj ../parentI2x509 leak: ikev2_inR1outI2 KE ../parentI2x509 leak: long term secret ../parentI2x509 leak: db_v2_trans ../parentI2x509 leak: db_v2_prop_conj ../parentI2x509 leak: db_v2_prop ../parentI2x509 leak: db_v2_trans ../parentI2x509 leak: db_v2_prop_conj ../parentI2x509 leak: db_v2_trans ../parentI2x509 leak: db_v2_prop_conj ../parentI2x509 leak: db_v2_trans ../parentI2x509 leak: db_v2_prop_conj ../parentI2x509 leak: db_v2_trans ../parentI2x509 leak: db_v2_prop_conj ../parentI2x509 leak: db_v2_trans ../parentI2x509 leak: db_v2_prop_conj ../parentI2x509 leak: msg_digest ../parentI2x509 leak: ikev2_outI1 KE ../parentI2x509 leak: db_v2_trans ../parentI2x509 leak: db_v2_prop_conj ../parentI2x509 leak: db_v2_prop ../parentI2x509 leak: db_v2_trans ../parentI2x509 leak: db_v2_prop_conj ../parentI2x509 leak: db_v2_trans ../parentI2x509 leak: db_v2_prop_conj ../parentI2x509 leak: db_v2_trans ../parentI2x509 leak: db_v2_prop_conj ../parentI2x509 leak: db_v2_trans ../parentI2x509 leak: db_v2_prop_conj ../parentI2x509 leak: db_v2_trans ../parentI2x509 leak: db_v2_prop_conj ../parentI2x509 leak: host_pair ../parentI2x509 leak: host ip ../parentI2x509 leak: keep id name ../parentI2x509 leak: host ip ../parentI2x509 leak: ca string ../parentI2x509 leak: keep id name ../parentI2x509 leak: connection name ../parentI2x509 leak: issuer dn ../parentI2x509 leak: keep id name ../parentI2x509 leak: pubkey entry ../parentI2x509 leak: pubkey ../parentI2x509 leak: 2 * generalName ../parentI2x509 leak: x509cert ../parentI2x509 leak: host cert ../parentI2x509 leak: certificate filename ../parentI2x509 leak: struct connection ../parentI2x509 leak: id_list ../parentI2x509 leak: keep id name ../parentI2x509 leak: id_list ../parentI2x509 leak: secret ../parentI2x509 leak: 2 * id list ../parentI2x509 leak: secret ../parentI2x509 leak: x509cert ../parentI2x509 leak: CA cert ../parentI2x509 leak: x509cert ../parentI2x509 leak: CA cert ../parentI2x509 leak: 2 * hasher name ../parentI2x509 leak: override / ../parentI2x509 leak: 7 * default conf ../parentI2x509 leak: policies path ../parentI2x509 leak: ocspcerts path ../parentI2x509 leak: aacerts path ../parentI2x509 leak: certs path ../parentI2x509 leak: private path ../parentI2x509 leak: crls path ../parentI2x509 leak: cacert path ../parentI2x509 leak: acert path ../parentI2x509 leak: override ipsec.d ../parentI2x509 leak: 7 * default conf TCPDUMP output reading from file parentI2x509.pcap, link-type NULL (BSD loopback) IP (tos 0x0, ttl 64, id 0, offset 0, flags [none], proto UDP (17), length 536, bad cksum 0 (->f48e)!) 192.1.2.45.500 > 192.1.2.23.500: [no cksum] isakmp 2.0 msgid 00000000 cookie 0001020304050607->0000000000000000: parent_sa ikev2_init[I]: (sa[C]: len=240 (p: #1 protoid=isakmp transform=4 len=40 (t: #1 type=encr id=aes ) (t: #2 type=integ id=hmac-sha ) (t: #3 type=prf id=hmac-sha ) (t: #4 type=dh id=modp1536 )) (p: #2 protoid=isakmp transform=4 len=40 (t: #1 type=encr id=aes ) (t: #2 type=integ id=hmac-sha ) (t: #3 type=prf id=hmac-md5 ) (t: #4 type=dh id=modp1536 )) (p: #3 protoid=isakmp transform=4 len=40 (t: #1 type=encr id=3des ) (t: #2 type=integ id=hmac-sha ) (t: #3 type=prf id=hmac-sha ) (t: #4 type=dh id=modp1536 )) (p: #4 protoid=isakmp transform=4 len=40 (t: #1 type=encr id=3des ) (t: #2 type=integ id=hmac-sha ) (t: #3 type=prf id=hmac-md5 ) (t: #4 type=dh id=modp1536 )) (p: #5 protoid=isakmp transform=4 len=40 (t: #1 type=encr id=3des ) (t: #2 type=integ id=hmac-sha ) (t: #3 type=prf id=hmac-sha ) (t: #4 type=dh id=modp1024 )) (p: #6 protoid=isakmp transform=4 len=40 (t: #1 type=encr id=3des ) (t: #2 type=integ id=hmac-sha ) (t: #3 type=prf id=hmac-md5 ) (t: #4 type=dh id=modp1024 ))) (v2ke: len=192 group=modp1536) (nonce[C]: len=16 nonce=(b5ce8419095c6e2b6b62d3055305b3c4) ) (v2vid: len=12 vid=OEababababab) IP (tos 0x0, ttl 64, id 0, offset 0, flags [none], proto UDP (17), length 1880, bad cksum 0 (->ef4e)!) 192.1.2.45.500 > 192.1.2.23.500: [no cksum] isakmp 2.0 msgid 00000001 cookie 0001020304050607->c02e7a3031a03188: child_sa ikev2_auth[I]: (v2e[C]: len=1820 (v2IDi: len=159 dn:308198310b30090603550406130263613110300e060355040813074f6e746172696f31123010060355040a130958656c6572616e636531183016060355040b130f54657374204465706172746d656e74312330210603550403131a776573742e74657374696e672e78656c6572616e63652e636f6d3124302206092a864886f70d010901161574657374696e674078656c6572616e63652e636f6d) (v2cert: len=1217) (v2auth: len=196 method=rsasig authdata=(000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000) ) (sa[C]: len=144 (p: #1 protoid=ipsec-esp transform=3 len=36 spi=12345678 (t: #1 type=encr id=aes ) (t: #2 type=integ id=hmac-sha ) (t: #3 type=esn id=no-esn )) (p: #2 protoid=ipsec-esp transform=3 len=36 spi=12345678 (t: #1 type=encr id=aes ) (t: #2 type=integ id=hmac-sha ) (t: #3 type=esn id=no-esn )) (p: #3 protoid=ipsec-esp transform=3 len=36 spi=12345678 (t: #1 type=encr id=3des ) (t: #2 type=integ id=hmac-sha ) (t: #3 type=esn id=no-esn )) (p: #4 protoid=ipsec-esp transform=3 len=36 spi=12345678 (t: #1 type=encr id=3des ) (t: #2 type=integ id=hmac-sha ) (t: #3 type=esn id=no-esn ))) (v2TSi: len=20) (v2TSr: len=20))