2012-10-21 16:52:51: [48792] INFO: ***** racoon started: pid=48792 started by: 48791 2012-10-21 16:52:51: [48792] INFO: @(#) racoon / IPsec-tools 2012-10-21 16:52:51: [48792] INFO: @(#)This product linked OpenSSL 0.9.8r 8 Feb 2011 (http://www.openssl.org/) 2012-10-21 16:52:51: [48792] INFO: Reading configuration from "/etc/racoon/racoon.conf" 2012-10-21 16:52:51: [48792] DEBUG: call pfkey_send_register for AH 2012-10-21 16:52:51: [48792] DEBUG: call pfkey_send_register for ESP 2012-10-21 16:52:51: [48792] DEBUG: call pfkey_send_register for IPCOMP 2012-10-21 16:52:51: [48792] DEBUG: ===== parse config 2012-10-21 16:52:51: [48792] DEBUG: reading config file /etc/racoon/racoon.conf 2012-10-21 16:52:51: [48792] DEBUG2: lifetime = 60 2012-10-21 16:52:51: [48792] DEBUG2: lifebyte = 0 2012-10-21 16:52:51: [48792] DEBUG2: encklen=0 2012-10-21 16:52:51: [48792] DEBUG2: p:1 t:1 2012-10-21 16:52:51: [48792] DEBUG2: 3DES-CBC(5) 2012-10-21 16:52:51: [48792] DEBUG2: SHA(2) 2012-10-21 16:52:51: [48792] DEBUG2: 1024-bit MODP group(2) 2012-10-21 16:52:51: [48792] DEBUG2: pre-shared key(1) 2012-10-21 16:52:51: [48792] DEBUG2: 2012-10-21 16:52:51: [48792] DEBUG: hmac(modp1024) 2012-10-21 16:52:51: [48792] DEBUG: compression algorithm can not be checked because sadb message doesn't support it. 2012-10-21 16:52:51: [48792] DEBUG2: getsainfo - src id: 2012-10-21 16:52:51: [48792] DEBUG2: 053a0000 00000000 00000000 00000000 00000001 2012-10-21 16:52:51: [48792] DEBUG2: getsainfo - dst id: 2012-10-21 16:52:51: [48792] DEBUG2: 053a0000 00000000 00000000 00000000 00000001 2012-10-21 16:52:51: [48792] DEBUG: filename: /var/run/racoon/*.conf 2012-10-21 16:52:51: [48792] WARNING: glob found no matches for path "/var/run/racoon/*.conf" 2012-10-21 16:52:51: [48792] DEBUG2: parse successed. 2012-10-21 16:52:51: [48792] INFO: racoon launched by launchd. 2012-10-21 16:52:51: [48792] DEBUG: my interface: fe80::1%lo0 (lo0) 2012-10-21 16:52:51: [48792] DEBUG: my interface: 127.0.0.1 (lo0) 2012-10-21 16:52:51: [48792] DEBUG: my interface: ::1 (lo0) 2012-10-21 16:52:51: [48792] DEBUG: my interface: fe80::21b:63ff:fec0:857d%en1 (en1) 2012-10-21 16:52:51: [48792] DEBUG: my interface: 192.168.157.128 (en1) 2012-10-21 16:52:51: [48792] DEBUG: configuring default isakmp port. 2012-10-21 16:52:51: [48792] DEBUG: 10 addrs are configured successfully 2012-10-21 16:52:51: [48792] INFO: 192.168.157.128[500] used as isakmp port (fd=9) 2012-10-21 16:52:51: [48792] INFO: 192.168.157.128[4500] used as isakmp port (fd=10) 2012-10-21 16:52:51: [48792] INFO: fe80::21b:63ff:fec0:857d%en1[500] used as isakmp port (fd=11) 2012-10-21 16:52:51: [48792] INFO: fe80::21b:63ff:fec0:857d%en1[4500] used as isakmp port (fd=12) 2012-10-21 16:52:51: [48792] INFO: ::1[500] used as isakmp port (fd=13) 2012-10-21 16:52:51: [48792] INFO: ::1[4500] used as isakmp port (fd=14) 2012-10-21 16:52:51: [48792] INFO: 127.0.0.1[500] used as isakmp port (fd=15) 2012-10-21 16:52:51: [48792] INFO: 127.0.0.1[4500] used as isakmp port (fd=16) 2012-10-21 16:52:51: [48792] INFO: fe80::1%lo0[500] used as isakmp port (fd=17) 2012-10-21 16:52:51: [48792] INFO: fe80::1%lo0[4500] used as isakmp port (fd=18) 2012-10-21 16:52:51: [48792] DEBUG: open /var/run/racoon.sock as racoon management. 2012-10-21 16:52:51: [48792] INFO: found launchd socket. 2012-10-21 16:52:51: [48792] NOTIFY: accepted connection on vpn control socket. 2012-10-21 16:52:51: [48792] DEBUG: get pfkey X_SPDDUMP message 2012-10-21 16:52:51: [48792] DEBUG2: 02120200 02000000 00000000 98be0000 2012-10-21 16:52:51: [48792] DEBUG: pfkey X_SPDDUMP failed: No such file or directory 2012-10-21 16:52:51: [48792] DEBUG: received bind command on vpn control socket. 2012-10-21 16:52:51: [48792] INFO: caught signal 13 2012-10-21 16:52:51: [48792] DEBUG: received connect command on vpn control socket. 2012-10-21 16:52:51: [48792] DEBUG: no remote configuration found. 2012-10-21 16:52:51: [48792] ERROR: no configuration found for 193.110.157.149 2012-10-21 16:52:51: [48792] INFO: caught signal 13 2012-10-21 16:52:51: [48792] DEBUG: received disconnect command on vpn control socket. 2012-10-21 16:52:51: [48792] INFO: caught signal 13 2012-10-21 16:52:51: [48792] DEBUG: vpn_control socket closed by peer. 2012-10-21 16:52:51: [48792] DEBUG: vpncontrol_close_comm. 2012-10-21 16:52:54: [48792] DEBUG: performing auto exit 2012-10-21 16:52:54: [48792] DEBUG: get pfkey FLUSH message 2012-10-21 16:52:54: [48792] DEBUG2: 02090000 02000000 00000000 98be0000 2012-10-21 16:52:54: [48792] DEBUG2: flushing ph2 handles: ignore_estab_or_assert 0... 2012-10-21 16:52:54: [48792] DEBUG2: flushing ph1 handles: ignore_estab_or_assert 0... 2012-10-21 16:52:55: [48792] DEBUG: call pfkey_send_dump 2012-10-21 16:52:55: [48792] DEBUG2: flushing ph1 handles: ignore_estab_or_assert 0... 2012-10-21 16:52:55: [48792] DEBUG: vpncontrol_close. 2012-10-21 16:52:55: [48792] INFO: racoon shutdown 2012-10-21 16:53:01: [48795] INFO: ***** racoon started: pid=48795 started by: 48794 2012-10-21 16:53:01: [48795] INFO: @(#) racoon / IPsec-tools 2012-10-21 16:53:01: [48795] INFO: @(#)This product linked OpenSSL 0.9.8r 8 Feb 2011 (http://www.openssl.org/) 2012-10-21 16:53:01: [48795] INFO: Reading configuration from "/etc/racoon/racoon.conf" 2012-10-21 16:53:01: [48795] DEBUG: call pfkey_send_register for AH 2012-10-21 16:53:01: [48795] DEBUG: call pfkey_send_register for ESP 2012-10-21 16:53:01: [48795] DEBUG: call pfkey_send_register for IPCOMP 2012-10-21 16:53:01: [48795] DEBUG: ===== parse config 2012-10-21 16:53:01: [48795] DEBUG: reading config file /etc/racoon/racoon.conf 2012-10-21 16:53:01: [48795] DEBUG2: lifetime = 60 2012-10-21 16:53:01: [48795] DEBUG2: lifebyte = 0 2012-10-21 16:53:01: [48795] DEBUG2: encklen=0 2012-10-21 16:53:01: [48795] DEBUG2: p:1 t:1 2012-10-21 16:53:01: [48795] DEBUG2: 3DES-CBC(5) 2012-10-21 16:53:01: [48795] DEBUG2: SHA(2) 2012-10-21 16:53:01: [48795] DEBUG2: 1024-bit MODP group(2) 2012-10-21 16:53:01: [48795] DEBUG2: pre-shared key(1) 2012-10-21 16:53:01: [48795] DEBUG2: 2012-10-21 16:53:01: [48795] DEBUG: hmac(modp1024) 2012-10-21 16:53:01: [48795] DEBUG: compression algorithm can not be checked because sadb message doesn't support it. 2012-10-21 16:53:01: [48795] DEBUG2: getsainfo - src id: 2012-10-21 16:53:01: [48795] DEBUG2: 053a0000 00000000 00000000 00000000 00000001 2012-10-21 16:53:01: [48795] DEBUG2: getsainfo - dst id: 2012-10-21 16:53:01: [48795] DEBUG2: 053a0000 00000000 00000000 00000000 00000001 2012-10-21 16:53:01: [48795] DEBUG: filename: /var/run/racoon/*.conf 2012-10-21 16:53:01: [48795] DEBUG: reading config file /var/run/racoon/193.110.157.149.conf 2012-10-21 16:53:01: [48795] WARNING: /var/run/racoon/193.110.157.149.conf:14: "support_mip6" it is obsoleted. use "support_proxy". 2012-10-21 16:53:01: [48795] DEBUG2: lifetime = 3600 2012-10-21 16:53:01: [48795] DEBUG2: lifebyte = 0 2012-10-21 16:53:01: [48795] DEBUG2: encklen=256 2012-10-21 16:53:01: [48795] DEBUG2: p:1 t:1 2012-10-21 16:53:01: [48795] DEBUG2: AES-CBC(7) 2012-10-21 16:53:01: [48795] DEBUG2: SHA(2) 2012-10-21 16:53:01: [48795] DEBUG2: 1024-bit MODP group(2) 2012-10-21 16:53:01: [48795] DEBUG2: XAuth pskey client(65001) 2012-10-21 16:53:01: [48795] DEBUG2: 2012-10-21 16:53:01: [48795] DEBUG2: lifetime = 3600 2012-10-21 16:53:01: [48795] DEBUG2: lifebyte = 0 2012-10-21 16:53:01: [48795] DEBUG2: encklen=128 2012-10-21 16:53:01: [48795] DEBUG2: p:1 t:2 2012-10-21 16:53:01: [48795] DEBUG2: AES-CBC(7) 2012-10-21 16:53:01: [48795] DEBUG2: SHA(2) 2012-10-21 16:53:01: [48795] DEBUG2: 1024-bit MODP group(2) 2012-10-21 16:53:01: [48795] DEBUG2: XAuth pskey client(65001) 2012-10-21 16:53:01: [48795] DEBUG2: 2012-10-21 16:53:01: [48795] DEBUG2: lifetime = 3600 2012-10-21 16:53:01: [48795] DEBUG2: lifebyte = 0 2012-10-21 16:53:01: [48795] DEBUG2: encklen=256 2012-10-21 16:53:01: [48795] DEBUG2: p:1 t:3 2012-10-21 16:53:01: [48795] DEBUG2: AES-CBC(7) 2012-10-21 16:53:01: [48795] DEBUG2: MD5(1) 2012-10-21 16:53:01: [48795] DEBUG2: 1024-bit MODP group(2) 2012-10-21 16:53:01: [48795] DEBUG2: XAuth pskey client(65001) 2012-10-21 16:53:01: [48795] DEBUG2: 2012-10-21 16:53:01: [48795] DEBUG2: lifetime = 3600 2012-10-21 16:53:01: [48795] DEBUG2: lifebyte = 0 2012-10-21 16:53:01: [48795] DEBUG2: encklen=128 2012-10-21 16:53:01: [48795] DEBUG2: p:1 t:4 2012-10-21 16:53:01: [48795] DEBUG2: AES-CBC(7) 2012-10-21 16:53:01: [48795] DEBUG2: MD5(1) 2012-10-21 16:53:01: [48795] DEBUG2: 1024-bit MODP group(2) 2012-10-21 16:53:01: [48795] DEBUG2: XAuth pskey client(65001) 2012-10-21 16:53:01: [48795] DEBUG2: 2012-10-21 16:53:01: [48795] DEBUG2: lifetime = 3600 2012-10-21 16:53:01: [48795] DEBUG2: lifebyte = 0 2012-10-21 16:53:01: [48795] DEBUG2: encklen=0 2012-10-21 16:53:01: [48795] DEBUG2: p:1 t:5 2012-10-21 16:53:01: [48795] DEBUG2: 3DES-CBC(5) 2012-10-21 16:53:01: [48795] DEBUG2: SHA(2) 2012-10-21 16:53:01: [48795] DEBUG2: 1024-bit MODP group(2) 2012-10-21 16:53:01: [48795] DEBUG2: XAuth pskey client(65001) 2012-10-21 16:53:01: [48795] DEBUG2: 2012-10-21 16:53:01: [48795] DEBUG2: lifetime = 3600 2012-10-21 16:53:01: [48795] DEBUG2: lifebyte = 0 2012-10-21 16:53:01: [48795] DEBUG2: encklen=0 2012-10-21 16:53:01: [48795] DEBUG2: p:1 t:6 2012-10-21 16:53:01: [48795] DEBUG2: 3DES-CBC(5) 2012-10-21 16:53:01: [48795] DEBUG2: MD5(1) 2012-10-21 16:53:01: [48795] DEBUG2: 1024-bit MODP group(2) 2012-10-21 16:53:01: [48795] DEBUG2: XAuth pskey client(65001) 2012-10-21 16:53:01: [48795] DEBUG2: 2012-10-21 16:53:01: [48795] DEBUG2: lifetime = 3600 2012-10-21 16:53:01: [48795] DEBUG2: lifebyte = 0 2012-10-21 16:53:01: [48795] DEBUG2: encklen=0 2012-10-21 16:53:01: [48795] DEBUG2: p:1 t:7 2012-10-21 16:53:01: [48795] DEBUG2: DES-CBC(1) 2012-10-21 16:53:01: [48795] DEBUG2: SHA(2) 2012-10-21 16:53:01: [48795] DEBUG2: 1024-bit MODP group(2) 2012-10-21 16:53:01: [48795] DEBUG2: XAuth pskey client(65001) 2012-10-21 16:53:01: [48795] DEBUG2: 2012-10-21 16:53:01: [48795] DEBUG2: lifetime = 3600 2012-10-21 16:53:01: [48795] DEBUG2: lifebyte = 0 2012-10-21 16:53:01: [48795] DEBUG2: encklen=0 2012-10-21 16:53:01: [48795] DEBUG2: p:1 t:8 2012-10-21 16:53:01: [48795] DEBUG2: DES-CBC(1) 2012-10-21 16:53:01: [48795] DEBUG2: MD5(1) 2012-10-21 16:53:01: [48795] DEBUG2: 1024-bit MODP group(2) 2012-10-21 16:53:01: [48795] DEBUG2: XAuth pskey client(65001) 2012-10-21 16:53:01: [48795] DEBUG2: 2012-10-21 16:53:01: [48795] DEBUG: hmac(modp1024) 2012-10-21 16:53:01: [48795] DEBUG2: parse successed. 2012-10-21 16:53:01: [48795] INFO: racoon launched by launchd. 2012-10-21 16:53:01: [48795] DEBUG: my interface: fe80::1%lo0 (lo0) 2012-10-21 16:53:01: [48795] DEBUG: my interface: 127.0.0.1 (lo0) 2012-10-21 16:53:01: [48795] DEBUG: my interface: ::1 (lo0) 2012-10-21 16:53:01: [48795] DEBUG: my interface: fe80::21b:63ff:fec0:857d%en1 (en1) 2012-10-21 16:53:01: [48795] DEBUG: my interface: 192.168.157.128 (en1) 2012-10-21 16:53:01: [48795] DEBUG: configuring default isakmp port. 2012-10-21 16:53:01: [48795] DEBUG: 10 addrs are configured successfully 2012-10-21 16:53:01: [48795] INFO: 192.168.157.128[500] used as isakmp port (fd=8) 2012-10-21 16:53:01: [48795] INFO: 192.168.157.128[4500] used as isakmp port (fd=10) 2012-10-21 16:53:01: [48795] INFO: fe80::21b:63ff:fec0:857d%en1[500] used as isakmp port (fd=11) 2012-10-21 16:53:01: [48795] INFO: fe80::21b:63ff:fec0:857d%en1[4500] used as isakmp port (fd=12) 2012-10-21 16:53:01: [48795] INFO: ::1[500] used as isakmp port (fd=13) 2012-10-21 16:53:01: [48795] INFO: ::1[4500] used as isakmp port (fd=14) 2012-10-21 16:53:01: [48795] INFO: 127.0.0.1[500] used as isakmp port (fd=15) 2012-10-21 16:53:01: [48795] INFO: 127.0.0.1[4500] used as isakmp port (fd=16) 2012-10-21 16:53:01: [48795] INFO: fe80::1%lo0[500] used as isakmp port (fd=17) 2012-10-21 16:53:01: [48795] INFO: fe80::1%lo0[4500] used as isakmp port (fd=18) 2012-10-21 16:53:01: [48795] DEBUG: open /var/run/racoon.sock as racoon management. 2012-10-21 16:53:01: [48795] INFO: found launchd socket. 2012-10-21 16:53:01: [48795] NOTIFY: accepted connection on vpn control socket. 2012-10-21 16:53:01: [48795] DEBUG: get pfkey X_SPDDUMP message 2012-10-21 16:53:01: [48795] DEBUG2: 02120200 02000000 00000000 9bbe0000 2012-10-21 16:53:01: [48795] DEBUG: pfkey X_SPDDUMP failed: No such file or directory 2012-10-21 16:53:01: [48795] DEBUG: received bind command on vpn control socket. 2012-10-21 16:53:01: [48795] DEBUG: received connect command on vpn control socket. 2012-10-21 16:53:01: [48795] DEBUG: configuration found for 193.110.157.149[62465]. 2012-10-21 16:53:01: [48795] INFO: accept a request to establish IKE-SA: 193.110.157.149 2012-10-21 16:53:01: [48795] DEBUG: start search for IKE-Session. target 193.110.157.149[500]. 2012-10-21 16:53:01: [48795] DEBUG: New IKE-Session to 193.110.157.149[500]. 2012-10-21 16:53:01: [48795] DEBUG: new parent session. 2012-10-21 16:53:01: [48795] DEBUG: === 2012-10-21 16:53:01: [48795] INFO: initiate new phase 1 negotiation: 192.168.157.128[500]<=>193.110.157.149[500] 2012-10-21 16:53:01: [48795] INFO: begin Aggressive mode. 2012-10-21 16:53:01: [48795] DEBUG: new cookie: c3ba69bdb562c252 2012-10-21 16:53:01: [48795] DEBUG: use ID type of KEY_ID 2012-10-21 16:53:01: [48795] DEBUG: 0b000000 74657374 2012-10-21 16:53:01: [48795] DEBUG: compute DH's private. 2012-10-21 16:53:01: [48795] DEBUG: 5927da0b e7cbc745 b2239b61 852bf641 07183a5a fb2a7e7d 9c38ef78 0c40c6b3 9c76647c e6d1de83 c2867ec7 ca025624 43fecf41 aa31b4b0 ba0b9b11 1f425a9b 7027f6d3 d11b026c 1d5ab00d de4b6baa 2b0a490c 8e55bd96 d17875b4 0fcb8ec6 d404e5e8 1d4b52d8 ceaab038 1e24e35b 0afbd368 3264169a 558588d6 7cab3f00 2012-10-21 16:53:01: [48795] DEBUG: compute DH's public. 2012-10-21 16:53:01: [48795] DEBUG: 0e248712 79ad5fe2 74f34b00 fe8112b1 bd80662b 7970b2f9 3d0b7c2a ea58fc99 823fb72a 4eb042ab ab3cf1c9 1f83b9df eb7718e2 5221c5b9 53123569 73a93db2 99123282 9a14a880 cefda327 aefedce1 cf756ab5 f30c5d0b 90d6d6c2 93868466 9197b816 eb2300c9 cf13634b c44f09d7 9a781ad2 294f88ba e8ecc8d9 11e03614 2012-10-21 16:53:01: [48795] DEBUG: authmethod is XAuth pskey client 2012-10-21 16:53:01: [48795] DEBUG: add payload of len 288, next type 4 2012-10-21 16:53:01: [48795] DEBUG: add payload of len 128, next type 10 2012-10-21 16:53:01: [48795] DEBUG: add payload of len 16, next type 5 2012-10-21 16:53:01: [48795] DEBUG: add payload of len 8, next type 13 2012-10-21 16:53:01: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 16:53:01: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 16:53:01: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 16:53:01: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 16:53:01: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 16:53:01: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 16:53:01: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 16:53:01: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 16:53:01: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 16:53:01: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 16:53:01: [48795] DEBUG: add payload of len 8, next type 13 2012-10-21 16:53:01: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 16:53:01: [48795] DEBUG: add payload of len 16, next type 0 2012-10-21 16:53:01: [48795] DEBUG: 736 bytes from 192.168.157.128[500] to 193.110.157.149[500] 2012-10-21 16:53:01: [48795] DEBUG: sockname 192.168.157.128[500] 2012-10-21 16:53:01: [48795] DEBUG: send packet from 192.168.157.128[500] 2012-10-21 16:53:01: [48795] DEBUG: send packet to 193.110.157.149[500] 2012-10-21 16:53:01: [48795] DEBUG: 1 times of 736 bytes message will be sent to 193.110.157.149[500] 2012-10-21 16:53:01: [48795] DEBUG: c3ba69bd b562c252 00000000 00000000 01100400 00000000 000002e0 04000124 00000001 00000001 00000118 01010008 03000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 03000024 02010000 800b0001 800c0e10 80010007 800e0080 8003fde9 80020002 80040002 03000024 03010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020001 80040002 03000024 04010000 800b0001 800c0e10 80010007 800e0080 8003fde9 80020001 80040002 03000020 05010000 800b0001 800c0e10 80010005 8003fde9 80020002 80040002 03000020 06010000 800b0001 800c0e10 80010005 8003fde9 80020001 80040002 03000020 07010000 800b0001 800c0e10 80010001 8003fde9 80020002 80040002 00000020 08010000 800b0001 800c0e10 80010001 8003fde9 80020001 80040002 0a000084 0e248712 79ad5fe2 74f34b00 fe8112b1 bd80662b 7970b2f9 3d0b7c2a ea58fc99 823fb72a 4eb042ab ab3cf1c9 1f83b9df eb7718e2 5221c5b9 53123569 73a93db2 99123282 9a14a880 cefda327 aefedce1 cf756ab5 f30c5d0b 90d6d6c2 93868466 9197b816 eb2300c9 cf13634b c44f09d7 9a781ad2 294f88ba e8ecc8d9 11e03614 05000014 af56ddd5 ce0058a6 22ab6700 3422b4d2 0d00000c 0b000000 74657374 0d000014 4a131c81 07035845 5c5728f2 0e95452f 0d000014 4df37928 e9fc4fd1 b3262170 d515c662 0d000014 8f8d8382 6d246b6f c7a8a6a4 28c11de8 0d000014 439b59f8 ba676c4c 7737ae22 eab8f582 0d000014 4d1e0e13 6deafa34 c4f3ea9f 02ec7285 0d000014 80d0bb3d ef54565e e84645d4 c85ce3ee 0d000014 9909b64e ed937c65 73de52ac e952fa6b 0d000014 7d9419a6 5310ca6f 2c179d92 15529d56 0d000014 cd604643 35df21f8 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e 086381b5 ec427b1f 0d00000c 09002689 dfd6b712 0d000014 12f5f28c 457168a9 702d9fe2 74cc0100 00000014 afcad713 68a1f1c9 6b8696fc 77570100 2012-10-21 16:53:01: [48795] DEBUG: resend phase1 packet c3ba69bdb562c252:0000000000000000 2012-10-21 16:53:01: [48795] DEBUG: sending vpn_control phase change status 2012-10-21 16:53:01: [48795] DEBUG: vpn control writing 20 bytes 2012-10-21 16:53:01: [48795] DEBUG: 80110000 00000000 00000000 00000004 c16e9d95 2012-10-21 16:53:04: [48795] DEBUG: 736 bytes from 192.168.157.128[500] to 193.110.157.149[500] 2012-10-21 16:53:04: [48795] DEBUG: sockname 192.168.157.128[500] 2012-10-21 16:53:04: [48795] DEBUG: send packet from 192.168.157.128[500] 2012-10-21 16:53:04: [48795] DEBUG: send packet to 193.110.157.149[500] 2012-10-21 16:53:04: [48795] DEBUG: 1 times of 736 bytes message will be sent to 193.110.157.149[500] 2012-10-21 16:53:04: [48795] DEBUG: c3ba69bd b562c252 00000000 00000000 01100400 00000000 000002e0 04000124 00000001 00000001 00000118 01010008 03000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 03000024 02010000 800b0001 800c0e10 80010007 800e0080 8003fde9 80020002 80040002 03000024 03010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020001 80040002 03000024 04010000 800b0001 800c0e10 80010007 800e0080 8003fde9 80020001 80040002 03000020 05010000 800b0001 800c0e10 80010005 8003fde9 80020002 80040002 03000020 06010000 800b0001 800c0e10 80010005 8003fde9 80020001 80040002 03000020 07010000 800b0001 800c0e10 80010001 8003fde9 80020002 80040002 00000020 08010000 800b0001 800c0e10 80010001 8003fde9 80020001 80040002 0a000084 0e248712 79ad5fe2 74f34b00 fe8112b1 bd80662b 7970b2f9 3d0b7c2a ea58fc99 823fb72a 4eb042ab ab3cf1c9 1f83b9df eb7718e2 5221c5b9 53123569 73a93db2 99123282 9a14a880 cefda327 aefedce1 cf756ab5 f30c5d0b 90d6d6c2 93868466 9197b816 eb2300c9 cf13634b c44f09d7 9a781ad2 294f88ba e8ecc8d9 11e03614 05000014 af56ddd5 ce0058a6 22ab6700 3422b4d2 0d00000c 0b000000 74657374 0d000014 4a131c81 07035845 5c5728f2 0e95452f 0d000014 4df37928 e9fc4fd1 b3262170 d515c662 0d000014 8f8d8382 6d246b6f c7a8a6a4 28c11de8 0d000014 439b59f8 ba676c4c 7737ae22 eab8f582 0d000014 4d1e0e13 6deafa34 c4f3ea9f 02ec7285 0d000014 80d0bb3d ef54565e e84645d4 c85ce3ee 0d000014 9909b64e ed937c65 73de52ac e952fa6b 0d000014 7d9419a6 5310ca6f 2c179d92 15529d56 0d000014 cd604643 35df21f8 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e 086381b5 ec427b1f 0d00000c 09002689 dfd6b712 0d000014 12f5f28c 457168a9 702d9fe2 74cc0100 00000014 afcad713 68a1f1c9 6b8696fc 77570100 2012-10-21 16:53:04: [48795] DEBUG: resend phase1 packet c3ba69bdb562c252:0000000000000000 2012-10-21 16:53:04: [48795] DEBUG: === 2012-10-21 16:53:04: [48795] DEBUG: 360 bytes message received from 193.110.157.149[500] to 192.168.157.128[500] 2012-10-21 16:53:04: [48795] DEBUG: c3ba69bd b562c252 edcc5459 0d5fd51e 01100400 00000000 00000168 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 0a000084 39ba1df3 66038602 2fe84337 8b8efdc8 f8fa2af4 23b4b8b7 fbd70945 ba84017a 407e0180 86e68dc7 2f3937f8 2663618a d90f5623 2c722c2c 06e2a4c2 47d926c4 09b0c9ad 7534b175 5916498f 372b39a4 72388e2b 351dce47 6f44d704 26cfa47a b5666fb6 12fa16f5 8a2ebc85 b5df9014 764b2c8b 2cdeced1 b8f46cfb 8a496c88 05000014 68759a57 c4329217 c64065cd 2af4993d 0800000c 01000000 c16e9d95 0d000018 24355236 d9c67748 772ba496 890e8c74 2191748b 14000014 afcad713 68a1f1c9 6b8696fc 77570100 14000018 15cbd2a3 3b05e14c 746cbe27 e247482b 44307c19 0d000018 3d03df0e d0552687 fb696562 7b6795ec cf189e99 00000014 4a131c81 07035845 5c5728f2 0e95452f 2012-10-21 16:53:04: [48795] DEBUG: begin. 2012-10-21 16:53:04: [48795] DEBUG: seen nptype=1(sa) 2012-10-21 16:53:04: [48795] DEBUG: seen nptype=4(ke) 2012-10-21 16:53:04: [48795] DEBUG: seen nptype=10(nonce) 2012-10-21 16:53:04: [48795] DEBUG: seen nptype=5(id) 2012-10-21 16:53:04: [48795] DEBUG: seen nptype=8(hash) 2012-10-21 16:53:04: [48795] DEBUG: seen nptype=13(vid) 2012-10-21 16:53:04: [48795] DEBUG: seen nptype=20(nat-d) 2012-10-21 16:53:04: [48795] DEBUG: seen nptype=20(nat-d) 2012-10-21 16:53:04: [48795] DEBUG: seen nptype=13(vid) 2012-10-21 16:53:04: [48795] DEBUG: succeed. 2012-10-21 16:53:04: [48795] INFO: received Vendor ID: DPD 2012-10-21 16:53:04: [48795] DEBUG: remote supports DPD 2012-10-21 16:53:04: [48795] INFO: received Vendor ID: RFC 3947 2012-10-21 16:53:04: [48795] DEBUG: total SA len=52 2012-10-21 16:53:04: [48795] DEBUG: 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 2012-10-21 16:53:04: [48795] DEBUG: begin. 2012-10-21 16:53:04: [48795] DEBUG: seen nptype=2(prop) 2012-10-21 16:53:04: [48795] DEBUG: succeed. 2012-10-21 16:53:04: [48795] DEBUG: proposal #1 len=44 2012-10-21 16:53:04: [48795] DEBUG: begin. 2012-10-21 16:53:04: [48795] DEBUG: seen nptype=3(trns) 2012-10-21 16:53:04: [48795] DEBUG: succeed. 2012-10-21 16:53:04: [48795] DEBUG: transform #1 len=36 2012-10-21 16:53:04: [48795] DEBUG: type=Life Type, flag=0x8000, lorv=seconds 2012-10-21 16:53:04: [48795] DEBUG: type=Life Duration, flag=0x8000, lorv=3600 2012-10-21 16:53:04: [48795] DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 2012-10-21 16:53:04: [48795] DEBUG: encryption(aes) 2012-10-21 16:53:04: [48795] DEBUG: type=Key Length, flag=0x8000, lorv=256 2012-10-21 16:53:04: [48795] DEBUG: type=Authentication Method, flag=0x8000, lorv=XAuth pskey client 2012-10-21 16:53:04: [48795] DEBUG: type=Hash Algorithm, flag=0x8000, lorv=SHA 2012-10-21 16:53:04: [48795] DEBUG: hash(sha1) 2012-10-21 16:53:04: [48795] DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group 2012-10-21 16:53:04: [48795] DEBUG: hmac(modp1024) 2012-10-21 16:53:04: [48795] DEBUG: pair 1: 2012-10-21 16:53:04: [48795] DEBUG: 0x7fcf7ad02540: next=0x0 tnext=0x0 2012-10-21 16:53:04: [48795] DEBUG: proposal #1: 1 transform 2012-10-21 16:53:04: [48795] DEBUG: prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1 2012-10-21 16:53:04: [48795] DEBUG: trns#=1, trns-id=IKE 2012-10-21 16:53:04: [48795] DEBUG: type=Life Type, flag=0x8000, lorv=seconds 2012-10-21 16:53:04: [48795] DEBUG: type=Life Duration, flag=0x8000, lorv=3600 2012-10-21 16:53:04: [48795] DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 2012-10-21 16:53:04: [48795] DEBUG: type=Key Length, flag=0x8000, lorv=256 2012-10-21 16:53:04: [48795] DEBUG: type=Authentication Method, flag=0x8000, lorv=XAuth pskey client 2012-10-21 16:53:04: [48795] DEBUG: type=Hash Algorithm, flag=0x8000, lorv=SHA 2012-10-21 16:53:04: [48795] DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group 2012-10-21 16:53:04: [48795] DEBUG: Compared: DB:Peer 2012-10-21 16:53:04: [48795] DEBUG: (lifetime = 3600:3600) 2012-10-21 16:53:04: [48795] DEBUG: (lifebyte = 0:0) 2012-10-21 16:53:04: [48795] DEBUG: enctype = AES-CBC:AES-CBC 2012-10-21 16:53:04: [48795] DEBUG: (encklen = 256:256) 2012-10-21 16:53:04: [48795] DEBUG: hashtype = SHA:SHA 2012-10-21 16:53:04: [48795] DEBUG: authmethod = XAuth pskey client:XAuth pskey client 2012-10-21 16:53:04: [48795] DEBUG: dh_group = 1024-bit MODP group:1024-bit MODP group 2012-10-21 16:53:04: [48795] DEBUG: an acceptable proposal found. 2012-10-21 16:53:04: [48795] DEBUG: hmac(modp1024) 2012-10-21 16:53:04: [48795] DEBUG: agreed on XAuth pskey client auth. 2012-10-21 16:53:04: [48795] INFO: Selected NAT-T version: RFC 3947 2012-10-21 16:53:04: [48795] INFO: NAT detected: ME PEER 2012-10-21 16:53:04: [48795] DEBUG: compute DH's shared. 2012-10-21 16:53:04: [48795] DEBUG: 650d5d95 f7c399e9 817598c6 b68b059c f06dffd0 9ea3c357 66041e90 22823397 16edbeef 22af0121 e73c9535 75d05176 fc99b031 caea7369 1f0d0d91 e5e5ab2b ec9793d8 6c23e141 32a98ebe 3affc3de 37b3c506 47f976d6 68a63804 51c2a65e 88a16496 5e18b5e5 0c90a097 13e31c26 e2431e65 7b6c5ba7 7573acfa 74a201d2 2012-10-21 16:53:04: [48795] DEBUG: Getting pre-shared key from keychain. 2012-10-21 16:53:04: [48795] DEBUG: the psk found. 2012-10-21 16:53:04: [48795] DEBUG2: psk: 2012-10-21 16:53:04: [48795] DEBUG2: 74657374 2012-10-21 16:53:04: [48795] DEBUG: nonce 1: 2012-10-21 16:53:04: [48795] DEBUG: af56ddd5 ce0058a6 22ab6700 3422b4d2 2012-10-21 16:53:04: [48795] DEBUG: nonce 2: 2012-10-21 16:53:04: [48795] DEBUG: 68759a57 c4329217 c64065cd 2af4993d 2012-10-21 16:53:04: [48795] DEBUG: hmac(hmac_sha1) 2012-10-21 16:53:04: [48795] DEBUG: SKEYID computed: 2012-10-21 16:53:04: [48795] DEBUG: cfa4e221 5389e88a 780f55ed d437fbe5 6c3b04fb 2012-10-21 16:53:04: [48795] DEBUG: hmac(hmac_sha1) 2012-10-21 16:53:04: [48795] DEBUG: SKEYID_d computed: 2012-10-21 16:53:04: [48795] DEBUG: 443bfd4a 806a8ec1 05f0afe3 7efffe0d 79537015 2012-10-21 16:53:04: [48795] DEBUG: hmac(hmac_sha1) 2012-10-21 16:53:04: [48795] DEBUG: SKEYID_a computed: 2012-10-21 16:53:04: [48795] DEBUG: 50794097 90f64299 5a7f1aef 8dd531b7 8708927b 2012-10-21 16:53:04: [48795] DEBUG: hmac(hmac_sha1) 2012-10-21 16:53:04: [48795] DEBUG: SKEYID_e computed: 2012-10-21 16:53:04: [48795] DEBUG: bc508444 c528f5fb 9d337291 d409fd84 170dc653 2012-10-21 16:53:04: [48795] DEBUG: encryption(aes) 2012-10-21 16:53:04: [48795] DEBUG: hash(sha1) 2012-10-21 16:53:04: [48795] DEBUG: len(SKEYID_e) < len(Ka) (20 < 32), generating long key (Ka = K1 | K2 | ...) 2012-10-21 16:53:04: [48795] DEBUG: hmac(hmac_sha1) 2012-10-21 16:53:04: [48795] DEBUG: compute intermediate encryption key K1 2012-10-21 16:53:04: [48795] DEBUG: 00 2012-10-21 16:53:04: [48795] DEBUG: ecc71eb2 b98f3878 9a5793f9 68e0dbdd 6d6c62ef 2012-10-21 16:53:04: [48795] DEBUG: hmac(hmac_sha1) 2012-10-21 16:53:04: [48795] DEBUG: compute intermediate encryption key K2 2012-10-21 16:53:04: [48795] DEBUG: ecc71eb2 b98f3878 9a5793f9 68e0dbdd 6d6c62ef 2012-10-21 16:53:04: [48795] DEBUG: e2085ed6 d5fb4dd4 2e3de2eb c58df2fa e8d5dc37 2012-10-21 16:53:04: [48795] DEBUG: final encryption key computed: 2012-10-21 16:53:04: [48795] DEBUG: ecc71eb2 b98f3878 9a5793f9 68e0dbdd 6d6c62ef e2085ed6 d5fb4dd4 2e3de2eb 2012-10-21 16:53:04: [48795] DEBUG: hash(sha1) 2012-10-21 16:53:04: [48795] DEBUG: encryption(aes) 2012-10-21 16:53:04: [48795] DEBUG: IV computed: 2012-10-21 16:53:04: [48795] DEBUG: d69ba87a 44aec74b af3b224e c0e3ec58 2012-10-21 16:53:04: [48795] ERROR: No SIG was passed, hybrid auth is enabled, but peer is no Xauth compliant 2012-10-21 16:53:04: [48795] DEBUG: sending vpn_control ike failed message - code=3 from=local. 2012-10-21 16:53:04: [48795] DEBUG: compute IV for phase2 2012-10-21 16:53:04: [48795] DEBUG: phase1 last IV: 2012-10-21 16:53:04: [48795] DEBUG: d69ba87a 44aec74b af3b224e c0e3ec58 93318c2f 2012-10-21 16:53:04: [48795] DEBUG: hash(sha1) 2012-10-21 16:53:04: [48795] DEBUG: encryption(aes) 2012-10-21 16:53:04: [48795] DEBUG: phase2 IV computed: 2012-10-21 16:53:04: [48795] DEBUG: 03150075 a54a7c38 32f842b6 8b830a70 2012-10-21 16:53:04: [48795] DEBUG: HASH with: 2012-10-21 16:53:04: [48795] DEBUG: 93318c2f 0000000c 00000001 01000003 2012-10-21 16:53:04: [48795] DEBUG: hmac(hmac_sha1) 2012-10-21 16:53:04: [48795] DEBUG: HASH computed: 2012-10-21 16:53:04: [48795] DEBUG: 5c6ccdca 091c916e 8094feeb 7d94d6a2 c852f0c6 2012-10-21 16:53:04: [48795] DEBUG: begin encryption. 2012-10-21 16:53:04: [48795] DEBUG: encryption(aes) 2012-10-21 16:53:04: [48795] DEBUG: pad length = 12 2012-10-21 16:53:04: [48795] DEBUG: 0b000018 5c6ccdca 091c916e 8094feeb 7d94d6a2 c852f0c6 0000000c 00000001 01000003 00000000 00000000 0000000c 2012-10-21 16:53:04: [48795] DEBUG: encryption(aes) 2012-10-21 16:53:04: [48795] DEBUG: with key: 2012-10-21 16:53:04: [48795] DEBUG: ecc71eb2 b98f3878 9a5793f9 68e0dbdd 6d6c62ef e2085ed6 d5fb4dd4 2e3de2eb 2012-10-21 16:53:04: [48795] DEBUG: encrypted payload by IV: 2012-10-21 16:53:04: [48795] DEBUG: 03150075 a54a7c38 32f842b6 8b830a70 2012-10-21 16:53:04: [48795] DEBUG: save IV for next: 2012-10-21 16:53:04: [48795] DEBUG: 19401b7b ac5b923b 0ae61a4e 7a1a4ecf 2012-10-21 16:53:04: [48795] DEBUG: encrypted. 2012-10-21 16:53:04: [48795] DEBUG: Adding NON-ESP marker 2012-10-21 16:53:04: [48795] DEBUG: 80 bytes from 192.168.157.128[4500] to 193.110.157.149[4500] 2012-10-21 16:53:04: [48795] DEBUG: sockname 192.168.157.128[4500] 2012-10-21 16:53:04: [48795] DEBUG: send packet from 192.168.157.128[4500] 2012-10-21 16:53:04: [48795] DEBUG: send packet to 193.110.157.149[4500] 2012-10-21 16:53:04: [48795] DEBUG: 1 times of 80 bytes message will be sent to 193.110.157.149[4500] 2012-10-21 16:53:04: [48795] DEBUG: 00000000 c3ba69bd b562c252 edcc5459 0d5fd51e 08100501 93318c2f 0000004c 1d3bad8e d827192c f587262a 0efde5d9 f4125ee6 5e641dec 4ea61565 afcb32f2 19401b7b ac5b923b 0ae61a4e 7a1a4ecf 2012-10-21 16:53:04: [48795] DEBUG: sendto Information notify. 2012-10-21 16:53:04: [48795] DEBUG: unbindph12. 2012-10-21 16:53:04: [48795] DEBUG: IV freed 2012-10-21 16:53:04: [48795] DEBUG: received disconnect command on vpn control socket. 2012-10-21 16:53:04: [48795] WARNING: in purgephXbydstaddrwop... purging phase1 and related phase2s 2012-10-21 16:53:04: [48795] INFO: ISAKMP-SA expired 192.168.157.128[4500]-193.110.157.149[4500] spi:c3ba69bdb562c252:edcc54590d5fd51e 2012-10-21 16:53:04: [48795] DEBUG2: no ph1bind replacement found. NULL ph1. 2012-10-21 16:53:04: [48795] INFO: caught signal 13 2012-10-21 16:53:04: [48795] DEBUG: vpn_control socket closed by peer. 2012-10-21 16:53:04: [48795] DEBUG: vpncontrol_close_comm. 2012-10-21 16:53:05: [48795] INFO: ISAKMP-SA deleted 192.168.157.128[4500]-193.110.157.149[4500] spi:c3ba69bdb562c252:edcc54590d5fd51e 2012-10-21 16:53:05: [48795] DEBUG: an undead schedule has been deleted. 2012-10-21 16:53:05: [48795] DEBUG: IV freed 2012-10-21 16:53:05: [48795] DEBUG: Freeing IKE-Session to 193.110.157.149[4500]. 2012-10-21 16:53:07: [48795] DEBUG: === 2012-10-21 16:53:07: [48795] DEBUG: 360 bytes message received from 193.110.157.149[500] to 192.168.157.128[500] 2012-10-21 16:53:07: [48795] DEBUG: c3ba69bd b562c252 88b6c7d5 392c5c7e 01100400 00000000 00000168 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 0a000084 c4c50054 21de8c71 178abd59 2569eb6b a888177a 5062fde7 dd941cde 32733082 8ffe8b88 e0079033 dffb02ee 6527697d 92895257 f5e20f94 9cbd5772 ef516f7b 41292b3c 57fc482b 313f7ee6 ee1d2c48 cc3b3d7a 8521e58b 436b99e3 23a2e58c 4aa21586 19b49b0d 72a1c2a4 2dfa38f8 3845d925 2ebe32a0 7dc5757d d1d645d9 05000014 9d742ddc 24a6729d 36c5aabd 2caff7c4 0800000c 01000000 c16e9d95 0d000018 0e5f1971 700e9890 83b4720d 44a5b5f4 74f338c4 14000014 afcad713 68a1f1c9 6b8696fc 77570100 14000018 a65ebf61 03ec039b 105d0a7a 10273abf 3581a63d 0d000018 f0f838bd 3083d2c0 918ab6d2 e010bc1c 31adcfbb 00000014 4a131c81 07035845 5c5728f2 0e95452f 2012-10-21 16:53:07: [48795] DEBUG: malformed cookie received or the spi expired. 2012-10-21 16:53:17: [48795] DEBUG: === 2012-10-21 16:53:17: [48795] DEBUG: 360 bytes message received from 193.110.157.149[500] to 192.168.157.128[500] 2012-10-21 16:53:17: [48795] DEBUG: c3ba69bd b562c252 edcc5459 0d5fd51e 01100400 00000000 00000168 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 0a000084 39ba1df3 66038602 2fe84337 8b8efdc8 f8fa2af4 23b4b8b7 fbd70945 ba84017a 407e0180 86e68dc7 2f3937f8 2663618a d90f5623 2c722c2c 06e2a4c2 47d926c4 09b0c9ad 7534b175 5916498f 372b39a4 72388e2b 351dce47 6f44d704 26cfa47a b5666fb6 12fa16f5 8a2ebc85 b5df9014 764b2c8b 2cdeced1 b8f46cfb 8a496c88 05000014 68759a57 c4329217 c64065cd 2af4993d 0800000c 01000000 c16e9d95 0d000018 24355236 d9c67748 772ba496 890e8c74 2191748b 14000014 afcad713 68a1f1c9 6b8696fc 77570100 14000018 15cbd2a3 3b05e14c 746cbe27 e247482b 44307c19 0d000018 3d03df0e d0552687 fb696562 7b6795ec cf189e99 00000014 4a131c81 07035845 5c5728f2 0e95452f 2012-10-21 16:53:17: [48795] DEBUG: malformed cookie received or the spi expired. 2012-10-21 16:53:20: [48795] DEBUG: === 2012-10-21 16:53:20: [48795] DEBUG: 360 bytes message received from 193.110.157.149[500] to 192.168.157.128[500] 2012-10-21 16:53:20: [48795] DEBUG: c3ba69bd b562c252 88b6c7d5 392c5c7e 01100400 00000000 00000168 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 0a000084 c4c50054 21de8c71 178abd59 2569eb6b a888177a 5062fde7 dd941cde 32733082 8ffe8b88 e0079033 dffb02ee 6527697d 92895257 f5e20f94 9cbd5772 ef516f7b 41292b3c 57fc482b 313f7ee6 ee1d2c48 cc3b3d7a 8521e58b 436b99e3 23a2e58c 4aa21586 19b49b0d 72a1c2a4 2dfa38f8 3845d925 2ebe32a0 7dc5757d d1d645d9 05000014 9d742ddc 24a6729d 36c5aabd 2caff7c4 0800000c 01000000 c16e9d95 0d000018 0e5f1971 700e9890 83b4720d 44a5b5f4 74f338c4 14000014 afcad713 68a1f1c9 6b8696fc 77570100 14000018 a65ebf61 03ec039b 105d0a7a 10273abf 3581a63d 0d000018 f0f838bd 3083d2c0 918ab6d2 e010bc1c 31adcfbb 00000014 4a131c81 07035845 5c5728f2 0e95452f 2012-10-21 16:53:20: [48795] DEBUG: malformed cookie received or the spi expired. 2012-10-21 16:53:40: [48795] DEBUG: === 2012-10-21 16:53:40: [48795] DEBUG: 360 bytes message received from 193.110.157.149[500] to 192.168.157.128[500] 2012-10-21 16:53:40: [48795] DEBUG: c3ba69bd b562c252 edcc5459 0d5fd51e 01100400 00000000 00000168 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 0a000084 39ba1df3 66038602 2fe84337 8b8efdc8 f8fa2af4 23b4b8b7 fbd70945 ba84017a 407e0180 86e68dc7 2f3937f8 2663618a d90f5623 2c722c2c 06e2a4c2 47d926c4 09b0c9ad 7534b175 5916498f 372b39a4 72388e2b 351dce47 6f44d704 26cfa47a b5666fb6 12fa16f5 8a2ebc85 b5df9014 764b2c8b 2cdeced1 b8f46cfb 8a496c88 05000014 68759a57 c4329217 c64065cd 2af4993d 0800000c 01000000 c16e9d95 0d000018 24355236 d9c67748 772ba496 890e8c74 2191748b 14000014 afcad713 68a1f1c9 6b8696fc 77570100 14000018 15cbd2a3 3b05e14c 746cbe27 e247482b 44307c19 0d000018 3d03df0e d0552687 fb696562 7b6795ec cf189e99 00000014 4a131c81 07035845 5c5728f2 0e95452f 2012-10-21 16:53:40: [48795] DEBUG: malformed cookie received or the spi expired. 2012-10-21 16:53:43: [48795] DEBUG: === 2012-10-21 16:53:43: [48795] DEBUG: 360 bytes message received from 193.110.157.149[500] to 192.168.157.128[500] 2012-10-21 16:53:43: [48795] DEBUG: c3ba69bd b562c252 88b6c7d5 392c5c7e 01100400 00000000 00000168 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 0a000084 c4c50054 21de8c71 178abd59 2569eb6b a888177a 5062fde7 dd941cde 32733082 8ffe8b88 e0079033 dffb02ee 6527697d 92895257 f5e20f94 9cbd5772 ef516f7b 41292b3c 57fc482b 313f7ee6 ee1d2c48 cc3b3d7a 8521e58b 436b99e3 23a2e58c 4aa21586 19b49b0d 72a1c2a4 2dfa38f8 3845d925 2ebe32a0 7dc5757d d1d645d9 05000014 9d742ddc 24a6729d 36c5aabd 2caff7c4 0800000c 01000000 c16e9d95 0d000018 0e5f1971 700e9890 83b4720d 44a5b5f4 74f338c4 14000014 afcad713 68a1f1c9 6b8696fc 77570100 14000018 a65ebf61 03ec039b 105d0a7a 10273abf 3581a63d 0d000018 f0f838bd 3083d2c0 918ab6d2 e010bc1c 31adcfbb 00000014 4a131c81 07035845 5c5728f2 0e95452f 2012-10-21 16:53:43: [48795] DEBUG: malformed cookie received or the spi expired. 2012-10-21 17:08:00: [48795] NOTIFY: accepted connection on vpn control socket. 2012-10-21 17:08:00: [48795] DEBUG: received bind command on vpn control socket. 2012-10-21 17:08:00: [48795] DEBUG: received connect command on vpn control socket. 2012-10-21 17:08:00: [48795] DEBUG: configuration found for 193.110.157.149[62465]. 2012-10-21 17:08:00: [48795] INFO: accept a request to establish IKE-SA: 193.110.157.149 2012-10-21 17:08:00: [48795] DEBUG: start search for IKE-Session. target 193.110.157.149[500]. 2012-10-21 17:08:00: [48795] DEBUG: New IKE-Session to 193.110.157.149[500]. 2012-10-21 17:08:00: [48795] DEBUG: new parent session. 2012-10-21 17:08:00: [48795] DEBUG: === 2012-10-21 17:08:00: [48795] INFO: initiate new phase 1 negotiation: 192.168.157.128[500]<=>193.110.157.149[500] 2012-10-21 17:08:00: [48795] INFO: begin Aggressive mode. 2012-10-21 17:08:00: [48795] DEBUG: new cookie: 421c195a0c4c314e 2012-10-21 17:08:00: [48795] DEBUG: use ID type of KEY_ID 2012-10-21 17:08:00: [48795] DEBUG: 0b000000 74657374 2012-10-21 17:08:00: [48795] DEBUG: compute DH's private. 2012-10-21 17:08:00: [48795] DEBUG: 4d62ff5e dd64e20e cfe94c24 cb71b95e 08e652b8 4efe5abd 9485d484 10f0b89a 19656a21 fae74023 1fc49607 027fe743 f9ebb3f9 e1005368 aa7fcd04 12f9592b 3a78d955 8fdaf571 0ae34090 d1b66a18 e03c0933 2bd2d112 d1a279a3 532eb2bb 287ff8a0 d0c27527 a4a6874c 4c23db83 c7b929e7 c4838540 22f2fa09 72c23840 2012-10-21 17:08:00: [48795] DEBUG: compute DH's public. 2012-10-21 17:08:00: [48795] DEBUG: 411a9dda 949dc92e 78842237 18df62f9 99c49a0f 26dd4bed e2adc624 9480e984 b0419899 eeab63f9 c986837b a5e861d8 c62913ae 1697df5f a258b0fd 1b054476 7ad91d8f f1662b8c d407ffcd 304f7c50 65e2df84 fea26ae3 e58b2048 f0708af3 187f9dd1 cf47090b f98dd726 ae069a6a efdef790 f670ea4e b2acae4b 1f88aa3f 2012-10-21 17:08:00: [48795] DEBUG: authmethod is XAuth pskey client 2012-10-21 17:08:00: [48795] DEBUG: add payload of len 288, next type 4 2012-10-21 17:08:00: [48795] DEBUG: add payload of len 128, next type 10 2012-10-21 17:08:00: [48795] DEBUG: add payload of len 16, next type 5 2012-10-21 17:08:00: [48795] DEBUG: add payload of len 8, next type 13 2012-10-21 17:08:00: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:08:00: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:08:00: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:08:00: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:08:00: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:08:00: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:08:00: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:08:00: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:08:00: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:08:00: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:08:00: [48795] DEBUG: add payload of len 8, next type 13 2012-10-21 17:08:00: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:08:00: [48795] DEBUG: add payload of len 16, next type 0 2012-10-21 17:08:00: [48795] DEBUG: 736 bytes from 192.168.157.128[500] to 193.110.157.149[500] 2012-10-21 17:08:00: [48795] DEBUG: sockname 192.168.157.128[500] 2012-10-21 17:08:00: [48795] DEBUG: send packet from 192.168.157.128[500] 2012-10-21 17:08:00: [48795] DEBUG: send packet to 193.110.157.149[500] 2012-10-21 17:08:00: [48795] DEBUG: 1 times of 736 bytes message will be sent to 193.110.157.149[500] 2012-10-21 17:08:00: [48795] DEBUG: 421c195a 0c4c314e 00000000 00000000 01100400 00000000 000002e0 04000124 00000001 00000001 00000118 01010008 03000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 03000024 02010000 800b0001 800c0e10 80010007 800e0080 8003fde9 80020002 80040002 03000024 03010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020001 80040002 03000024 04010000 800b0001 800c0e10 80010007 800e0080 8003fde9 80020001 80040002 03000020 05010000 800b0001 800c0e10 80010005 8003fde9 80020002 80040002 03000020 06010000 800b0001 800c0e10 80010005 8003fde9 80020001 80040002 03000020 07010000 800b0001 800c0e10 80010001 8003fde9 80020002 80040002 00000020 08010000 800b0001 800c0e10 80010001 8003fde9 80020001 80040002 0a000084 411a9dda 949dc92e 78842237 18df62f9 99c49a0f 26dd4bed e2adc624 9480e984 b0419899 eeab63f9 c986837b a5e861d8 c62913ae 1697df5f a258b0fd 1b054476 7ad91d8f f1662b8c d407ffcd 304f7c50 65e2df84 fea26ae3 e58b2048 f0708af3 187f9dd1 cf47090b f98dd726 ae069a6a efdef790 f670ea4e b2acae4b 1f88aa3f 05000014 d6d3ab7b d2277ba8 3ce9492c 4cc4d6fd 0d00000c 0b000000 74657374 0d000014 4a131c81 07035845 5c5728f2 0e95452f 0d000014 4df37928 e9fc4fd1 b3262170 d515c662 0d000014 8f8d8382 6d246b6f c7a8a6a4 28c11de8 0d000014 439b59f8 ba676c4c 7737ae22 eab8f582 0d000014 4d1e0e13 6deafa34 c4f3ea9f 02ec7285 0d000014 80d0bb3d ef54565e e84645d4 c85ce3ee 0d000014 9909b64e ed937c65 73de52ac e952fa6b 0d000014 7d9419a6 5310ca6f 2c179d92 15529d56 0d000014 cd604643 35df21f8 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e 086381b5 ec427b1f 0d00000c 09002689 dfd6b712 0d000014 12f5f28c 457168a9 702d9fe2 74cc0100 00000014 afcad713 68a1f1c9 6b8696fc 77570100 2012-10-21 17:08:00: [48795] DEBUG: resend phase1 packet 421c195a0c4c314e:0000000000000000 2012-10-21 17:08:00: [48795] DEBUG: sending vpn_control phase change status 2012-10-21 17:08:00: [48795] DEBUG: vpn control writing 20 bytes 2012-10-21 17:08:00: [48795] DEBUG: 80110000 00000000 00000000 00000004 c16e9d95 2012-10-21 17:08:03: [48795] DEBUG: 736 bytes from 192.168.157.128[500] to 193.110.157.149[500] 2012-10-21 17:08:03: [48795] DEBUG: sockname 192.168.157.128[500] 2012-10-21 17:08:03: [48795] DEBUG: send packet from 192.168.157.128[500] 2012-10-21 17:08:03: [48795] DEBUG: send packet to 193.110.157.149[500] 2012-10-21 17:08:03: [48795] DEBUG: 1 times of 736 bytes message will be sent to 193.110.157.149[500] 2012-10-21 17:08:03: [48795] DEBUG: 421c195a 0c4c314e 00000000 00000000 01100400 00000000 000002e0 04000124 00000001 00000001 00000118 01010008 03000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 03000024 02010000 800b0001 800c0e10 80010007 800e0080 8003fde9 80020002 80040002 03000024 03010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020001 80040002 03000024 04010000 800b0001 800c0e10 80010007 800e0080 8003fde9 80020001 80040002 03000020 05010000 800b0001 800c0e10 80010005 8003fde9 80020002 80040002 03000020 06010000 800b0001 800c0e10 80010005 8003fde9 80020001 80040002 03000020 07010000 800b0001 800c0e10 80010001 8003fde9 80020002 80040002 00000020 08010000 800b0001 800c0e10 80010001 8003fde9 80020001 80040002 0a000084 411a9dda 949dc92e 78842237 18df62f9 99c49a0f 26dd4bed e2adc624 9480e984 b0419899 eeab63f9 c986837b a5e861d8 c62913ae 1697df5f a258b0fd 1b054476 7ad91d8f f1662b8c d407ffcd 304f7c50 65e2df84 fea26ae3 e58b2048 f0708af3 187f9dd1 cf47090b f98dd726 ae069a6a efdef790 f670ea4e b2acae4b 1f88aa3f 05000014 d6d3ab7b d2277ba8 3ce9492c 4cc4d6fd 0d00000c 0b000000 74657374 0d000014 4a131c81 07035845 5c5728f2 0e95452f 0d000014 4df37928 e9fc4fd1 b3262170 d515c662 0d000014 8f8d8382 6d246b6f c7a8a6a4 28c11de8 0d000014 439b59f8 ba676c4c 7737ae22 eab8f582 0d000014 4d1e0e13 6deafa34 c4f3ea9f 02ec7285 0d000014 80d0bb3d ef54565e e84645d4 c85ce3ee 0d000014 9909b64e ed937c65 73de52ac e952fa6b 0d000014 7d9419a6 5310ca6f 2c179d92 15529d56 0d000014 cd604643 35df21f8 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e 086381b5 ec427b1f 0d00000c 09002689 dfd6b712 0d000014 12f5f28c 457168a9 702d9fe2 74cc0100 00000014 afcad713 68a1f1c9 6b8696fc 77570100 2012-10-21 17:08:03: [48795] DEBUG: resend phase1 packet 421c195a0c4c314e:0000000000000000 2012-10-21 17:08:03: [48795] DEBUG: === 2012-10-21 17:08:03: [48795] DEBUG: 360 bytes message received from 193.110.157.149[500] to 192.168.157.128[500] 2012-10-21 17:08:03: [48795] DEBUG: 421c195a 0c4c314e aa50e591 124b6bf3 01100400 00000000 00000168 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 0a000084 3905b367 23bf3fa6 a821a4db 47722f14 05feff42 699b8001 729c220c 4c993935 781a0f65 96cc8709 dd161bc8 15663a66 7edf3c6f 3b3c506e 14323f3c 4563ee41 b378d0b2 aeff5304 cc37759f a3a83e81 00f29467 3aad707d 51f74d96 d763b612 621cf7f4 277b0f82 a1cf543c 83ea2649 8df0f1d6 cbd1af32 715bce80 5b0e0e35 05000014 5dc6247d 465363f1 20c68ba0 37dd0712 0800000c 01000000 c16e9d95 0d000018 c6288389 f04d4a3b 7109c896 b17af63c bc93a82c 14000014 afcad713 68a1f1c9 6b8696fc 77570100 14000018 a43ec2fe 57bb3a1b 19038214 3f79dcad d2bc447e 0d000018 ee5342d4 2a13688d 7f175586 6c54980f 366ef2e9 00000014 4a131c81 07035845 5c5728f2 0e95452f 2012-10-21 17:08:03: [48795] DEBUG: begin. 2012-10-21 17:08:03: [48795] DEBUG: seen nptype=1(sa) 2012-10-21 17:08:03: [48795] DEBUG: seen nptype=4(ke) 2012-10-21 17:08:03: [48795] DEBUG: seen nptype=10(nonce) 2012-10-21 17:08:03: [48795] DEBUG: seen nptype=5(id) 2012-10-21 17:08:03: [48795] DEBUG: seen nptype=8(hash) 2012-10-21 17:08:03: [48795] DEBUG: seen nptype=13(vid) 2012-10-21 17:08:03: [48795] DEBUG: seen nptype=20(nat-d) 2012-10-21 17:08:03: [48795] DEBUG: seen nptype=20(nat-d) 2012-10-21 17:08:03: [48795] DEBUG: seen nptype=13(vid) 2012-10-21 17:08:03: [48795] DEBUG: succeed. 2012-10-21 17:08:03: [48795] INFO: received Vendor ID: DPD 2012-10-21 17:08:03: [48795] DEBUG: remote supports DPD 2012-10-21 17:08:03: [48795] INFO: received Vendor ID: RFC 3947 2012-10-21 17:08:03: [48795] DEBUG: total SA len=52 2012-10-21 17:08:03: [48795] DEBUG: 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 2012-10-21 17:08:03: [48795] DEBUG: begin. 2012-10-21 17:08:03: [48795] DEBUG: seen nptype=2(prop) 2012-10-21 17:08:03: [48795] DEBUG: succeed. 2012-10-21 17:08:03: [48795] DEBUG: proposal #1 len=44 2012-10-21 17:08:03: [48795] DEBUG: begin. 2012-10-21 17:08:03: [48795] DEBUG: seen nptype=3(trns) 2012-10-21 17:08:03: [48795] DEBUG: succeed. 2012-10-21 17:08:03: [48795] DEBUG: transform #1 len=36 2012-10-21 17:08:03: [48795] DEBUG: type=Life Type, flag=0x8000, lorv=seconds 2012-10-21 17:08:03: [48795] DEBUG: type=Life Duration, flag=0x8000, lorv=3600 2012-10-21 17:08:03: [48795] DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 2012-10-21 17:08:03: [48795] DEBUG: encryption(aes) 2012-10-21 17:08:03: [48795] DEBUG: type=Key Length, flag=0x8000, lorv=256 2012-10-21 17:08:03: [48795] DEBUG: type=Authentication Method, flag=0x8000, lorv=XAuth pskey client 2012-10-21 17:08:03: [48795] DEBUG: type=Hash Algorithm, flag=0x8000, lorv=SHA 2012-10-21 17:08:03: [48795] DEBUG: hash(sha1) 2012-10-21 17:08:03: [48795] DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group 2012-10-21 17:08:03: [48795] DEBUG: hmac(modp1024) 2012-10-21 17:08:03: [48795] DEBUG: pair 1: 2012-10-21 17:08:03: [48795] DEBUG: 0x101c342e0: next=0x0 tnext=0x0 2012-10-21 17:08:03: [48795] DEBUG: proposal #1: 1 transform 2012-10-21 17:08:03: [48795] DEBUG: prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1 2012-10-21 17:08:03: [48795] DEBUG: trns#=1, trns-id=IKE 2012-10-21 17:08:03: [48795] DEBUG: type=Life Type, flag=0x8000, lorv=seconds 2012-10-21 17:08:03: [48795] DEBUG: type=Life Duration, flag=0x8000, lorv=3600 2012-10-21 17:08:03: [48795] DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 2012-10-21 17:08:03: [48795] DEBUG: type=Key Length, flag=0x8000, lorv=256 2012-10-21 17:08:03: [48795] DEBUG: type=Authentication Method, flag=0x8000, lorv=XAuth pskey client 2012-10-21 17:08:03: [48795] DEBUG: type=Hash Algorithm, flag=0x8000, lorv=SHA 2012-10-21 17:08:03: [48795] DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group 2012-10-21 17:08:03: [48795] DEBUG: Compared: DB:Peer 2012-10-21 17:08:03: [48795] DEBUG: (lifetime = 3600:3600) 2012-10-21 17:08:03: [48795] DEBUG: (lifebyte = 0:0) 2012-10-21 17:08:03: [48795] DEBUG: enctype = AES-CBC:AES-CBC 2012-10-21 17:08:03: [48795] DEBUG: (encklen = 256:256) 2012-10-21 17:08:03: [48795] DEBUG: hashtype = SHA:SHA 2012-10-21 17:08:03: [48795] DEBUG: authmethod = XAuth pskey client:XAuth pskey client 2012-10-21 17:08:03: [48795] DEBUG: dh_group = 1024-bit MODP group:1024-bit MODP group 2012-10-21 17:08:03: [48795] DEBUG: an acceptable proposal found. 2012-10-21 17:08:03: [48795] DEBUG: hmac(modp1024) 2012-10-21 17:08:03: [48795] DEBUG: agreed on XAuth pskey client auth. 2012-10-21 17:08:03: [48795] INFO: Selected NAT-T version: RFC 3947 2012-10-21 17:08:03: [48795] INFO: NAT detected: ME PEER 2012-10-21 17:08:03: [48795] DEBUG: compute DH's shared. 2012-10-21 17:08:03: [48795] DEBUG: e65edb19 4312b09c a4bc8f1f 073e2394 44809d51 69cdb744 2faa6441 6bb47132 9c566fe7 38272a3a d4a2ef50 52abe453 88801d53 43b8a6f4 85120b9d f54245fb 594bc5ff dbc1e7c9 6544b0c0 b746d845 17f08bbe 53cf54b7 a8ce4530 c8bb6eaf 102fe2b4 ea028f2b adb1cf24 7c335cc4 29a7d956 27a42116 5862e2f8 5ab154a8 2012-10-21 17:08:03: [48795] DEBUG: Getting pre-shared key from keychain. 2012-10-21 17:08:03: [48795] DEBUG: the psk found. 2012-10-21 17:08:03: [48795] DEBUG2: psk: 2012-10-21 17:08:03: [48795] DEBUG2: 74657374 2012-10-21 17:08:03: [48795] DEBUG: nonce 1: 2012-10-21 17:08:03: [48795] DEBUG: d6d3ab7b d2277ba8 3ce9492c 4cc4d6fd 2012-10-21 17:08:03: [48795] DEBUG: nonce 2: 2012-10-21 17:08:03: [48795] DEBUG: 5dc6247d 465363f1 20c68ba0 37dd0712 2012-10-21 17:08:03: [48795] DEBUG: hmac(hmac_sha1) 2012-10-21 17:08:03: [48795] DEBUG: SKEYID computed: 2012-10-21 17:08:03: [48795] DEBUG: 748fafa1 3c455d20 60fd9c34 30e70bda 0428179f 2012-10-21 17:08:03: [48795] DEBUG: hmac(hmac_sha1) 2012-10-21 17:08:03: [48795] DEBUG: SKEYID_d computed: 2012-10-21 17:08:03: [48795] DEBUG: 87d7691f 4ca52fa5 1d7129aa 7e68ce27 a90e10f6 2012-10-21 17:08:03: [48795] DEBUG: hmac(hmac_sha1) 2012-10-21 17:08:03: [48795] DEBUG: SKEYID_a computed: 2012-10-21 17:08:03: [48795] DEBUG: 3a06864c 74a6499e 1b4183c6 7751e024 8438cd48 2012-10-21 17:08:03: [48795] DEBUG: hmac(hmac_sha1) 2012-10-21 17:08:03: [48795] DEBUG: SKEYID_e computed: 2012-10-21 17:08:03: [48795] DEBUG: 35948ae0 54748301 89b27d64 502498d9 6fea4d96 2012-10-21 17:08:03: [48795] DEBUG: encryption(aes) 2012-10-21 17:08:03: [48795] DEBUG: hash(sha1) 2012-10-21 17:08:03: [48795] DEBUG: len(SKEYID_e) < len(Ka) (20 < 32), generating long key (Ka = K1 | K2 | ...) 2012-10-21 17:08:03: [48795] DEBUG: hmac(hmac_sha1) 2012-10-21 17:08:03: [48795] DEBUG: compute intermediate encryption key K1 2012-10-21 17:08:03: [48795] DEBUG: 00 2012-10-21 17:08:03: [48795] DEBUG: 8936fea2 d9004e6e 6cd7c076 7074e3cd 4565a375 2012-10-21 17:08:03: [48795] DEBUG: hmac(hmac_sha1) 2012-10-21 17:08:03: [48795] DEBUG: compute intermediate encryption key K2 2012-10-21 17:08:03: [48795] DEBUG: 8936fea2 d9004e6e 6cd7c076 7074e3cd 4565a375 2012-10-21 17:08:03: [48795] DEBUG: 7310bc6a 9831043b ba67fb8b ee06fb77 7b8fcf4f 2012-10-21 17:08:03: [48795] DEBUG: final encryption key computed: 2012-10-21 17:08:03: [48795] DEBUG: 8936fea2 d9004e6e 6cd7c076 7074e3cd 4565a375 7310bc6a 9831043b ba67fb8b 2012-10-21 17:08:03: [48795] DEBUG: hash(sha1) 2012-10-21 17:08:03: [48795] DEBUG: encryption(aes) 2012-10-21 17:08:03: [48795] DEBUG: IV computed: 2012-10-21 17:08:03: [48795] DEBUG: a98dc26c 12eeb926 1423d8d2 9c190bc2 2012-10-21 17:08:03: [48795] ERROR: No SIG was passed, hybrid auth is enabled, but peer is no Xauth compliant 2012-10-21 17:08:03: [48795] DEBUG: sending vpn_control ike failed message - code=3 from=local. 2012-10-21 17:08:03: [48795] DEBUG: compute IV for phase2 2012-10-21 17:08:03: [48795] DEBUG: phase1 last IV: 2012-10-21 17:08:03: [48795] DEBUG: a98dc26c 12eeb926 1423d8d2 9c190bc2 ed6062d5 2012-10-21 17:08:03: [48795] DEBUG: hash(sha1) 2012-10-21 17:08:03: [48795] DEBUG: encryption(aes) 2012-10-21 17:08:03: [48795] DEBUG: phase2 IV computed: 2012-10-21 17:08:03: [48795] DEBUG: b5e91fc0 1568c0d2 d9a3d3a8 49e778f9 2012-10-21 17:08:03: [48795] DEBUG: HASH with: 2012-10-21 17:08:03: [48795] DEBUG: ed6062d5 0000000c 00000001 01000003 2012-10-21 17:08:03: [48795] DEBUG: hmac(hmac_sha1) 2012-10-21 17:08:03: [48795] DEBUG: HASH computed: 2012-10-21 17:08:03: [48795] DEBUG: 05be12d3 c0d04db4 5030161b 49e27bdf 4dfc43fd 2012-10-21 17:08:03: [48795] DEBUG: begin encryption. 2012-10-21 17:08:03: [48795] DEBUG: encryption(aes) 2012-10-21 17:08:03: [48795] DEBUG: pad length = 12 2012-10-21 17:08:03: [48795] DEBUG: 0b000018 05be12d3 c0d04db4 5030161b 49e27bdf 4dfc43fd 0000000c 00000001 01000003 00000000 00000000 0000000c 2012-10-21 17:08:03: [48795] DEBUG: encryption(aes) 2012-10-21 17:08:04: [48795] DEBUG: with key: 2012-10-21 17:08:04: [48795] DEBUG: 8936fea2 d9004e6e 6cd7c076 7074e3cd 4565a375 7310bc6a 9831043b ba67fb8b 2012-10-21 17:08:04: [48795] DEBUG: encrypted payload by IV: 2012-10-21 17:08:04: [48795] DEBUG: b5e91fc0 1568c0d2 d9a3d3a8 49e778f9 2012-10-21 17:08:04: [48795] DEBUG: save IV for next: 2012-10-21 17:08:04: [48795] DEBUG: e15b987f 31c1af93 ce999766 7893b2a8 2012-10-21 17:08:04: [48795] DEBUG: encrypted. 2012-10-21 17:08:04: [48795] DEBUG: Adding NON-ESP marker 2012-10-21 17:08:04: [48795] DEBUG: 80 bytes from 192.168.157.128[4500] to 193.110.157.149[4500] 2012-10-21 17:08:04: [48795] DEBUG: sockname 192.168.157.128[4500] 2012-10-21 17:08:04: [48795] DEBUG: send packet from 192.168.157.128[4500] 2012-10-21 17:08:04: [48795] DEBUG: send packet to 193.110.157.149[4500] 2012-10-21 17:08:04: [48795] DEBUG: 1 times of 80 bytes message will be sent to 193.110.157.149[4500] 2012-10-21 17:08:04: [48795] DEBUG: 00000000 421c195a 0c4c314e aa50e591 124b6bf3 08100501 ed6062d5 0000004c 1efddcd2 0580477e 012da718 e1f7784d bec9ccbb e4af2a2a b25e9e9d 6334cf67 e15b987f 31c1af93 ce999766 7893b2a8 2012-10-21 17:08:04: [48795] DEBUG: sendto Information notify. 2012-10-21 17:08:04: [48795] DEBUG: unbindph12. 2012-10-21 17:08:04: [48795] DEBUG: IV freed 2012-10-21 17:08:04: [48795] DEBUG: received disconnect command on vpn control socket. 2012-10-21 17:08:04: [48795] WARNING: in purgephXbydstaddrwop... purging phase1 and related phase2s 2012-10-21 17:08:04: [48795] INFO: ISAKMP-SA expired 192.168.157.128[4500]-193.110.157.149[4500] spi:421c195a0c4c314e:aa50e591124b6bf3 2012-10-21 17:08:04: [48795] DEBUG2: no ph1bind replacement found. NULL ph1. 2012-10-21 17:08:04: [48795] INFO: caught signal 13 2012-10-21 17:08:04: [48795] DEBUG: vpn_control socket closed by peer. 2012-10-21 17:08:04: [48795] DEBUG: vpncontrol_close_comm. 2012-10-21 17:08:05: [48795] INFO: ISAKMP-SA deleted 192.168.157.128[4500]-193.110.157.149[4500] spi:421c195a0c4c314e:aa50e591124b6bf3 2012-10-21 17:08:05: [48795] DEBUG: an undead schedule has been deleted. 2012-10-21 17:08:05: [48795] DEBUG: IV freed 2012-10-21 17:08:05: [48795] DEBUG: Freeing IKE-Session to 193.110.157.149[4500]. 2012-10-21 17:08:06: [48795] DEBUG: === 2012-10-21 17:08:06: [48795] DEBUG: 360 bytes message received from 193.110.157.149[500] to 192.168.157.128[500] 2012-10-21 17:08:06: [48795] DEBUG: 421c195a 0c4c314e 1dd97781 1755bc0e 01100400 00000000 00000168 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 0a000084 72a1b7f6 aceb8082 921f8a0a bbbe46e7 9d07d57b 1fae9074 de0f6e3f dabbe563 57e59115 b9c80dde c30dd74d 7cf9e48b 31a5ca0b 5c4c96d3 83e706bc 09cc378f bc349bd2 6faf2002 05d148eb b6cf07ad 3259b11b 06128df0 a92d36c1 b842ff35 f8bbe703 6510331e 1b704699 16365389 bba78631 b252d081 69b2acd5 e783f8ce 05000014 5eb2733f 1d140509 11a81e29 e9aa9523 0800000c 01000000 c16e9d95 0d000018 86e9b8df d6ad8f64 cc982640 5187b34e 6c187846 14000014 afcad713 68a1f1c9 6b8696fc 77570100 14000018 fdb3568a 24b8d03e c5ae6070 6a84abef b80e29ce 0d000018 2e99483e 4d239763 5f436cb6 6786634c 531c32a3 00000014 4a131c81 07035845 5c5728f2 0e95452f 2012-10-21 17:08:06: [48795] DEBUG: malformed cookie received or the spi expired. 2012-10-21 17:08:09: [48795] DEBUG: === 2012-10-21 17:08:09: [48795] DEBUG: 40 bytes message received from 193.110.157.149[500] to 192.168.157.128[500] 2012-10-21 17:08:09: [48795] DEBUG: 421c195a 0c4c314e aa50e591 124b6bf3 0b100500 1095b09d 00000028 0000000c 00000001 01000010 2012-10-21 17:08:09: [48795] ERROR: unknown Informational exchange received. 2012-10-21 17:08:16: [48795] DEBUG: === 2012-10-21 17:08:16: [48795] DEBUG: 360 bytes message received from 193.110.157.149[500] to 192.168.157.128[500] 2012-10-21 17:08:16: [48795] DEBUG: 421c195a 0c4c314e aa50e591 124b6bf3 01100400 00000000 00000168 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 0a000084 3905b367 23bf3fa6 a821a4db 47722f14 05feff42 699b8001 729c220c 4c993935 781a0f65 96cc8709 dd161bc8 15663a66 7edf3c6f 3b3c506e 14323f3c 4563ee41 b378d0b2 aeff5304 cc37759f a3a83e81 00f29467 3aad707d 51f74d96 d763b612 621cf7f4 277b0f82 a1cf543c 83ea2649 8df0f1d6 cbd1af32 715bce80 5b0e0e35 05000014 5dc6247d 465363f1 20c68ba0 37dd0712 0800000c 01000000 c16e9d95 0d000018 c6288389 f04d4a3b 7109c896 b17af63c bc93a82c 14000014 afcad713 68a1f1c9 6b8696fc 77570100 14000018 a43ec2fe 57bb3a1b 19038214 3f79dcad d2bc447e 0d000018 ee5342d4 2a13688d 7f175586 6c54980f 366ef2e9 00000014 4a131c81 07035845 5c5728f2 0e95452f 2012-10-21 17:08:16: [48795] DEBUG: malformed cookie received or the spi expired. 2012-10-21 17:08:19: [48795] DEBUG: === 2012-10-21 17:08:19: [48795] DEBUG: 360 bytes message received from 193.110.157.149[500] to 192.168.157.128[500] 2012-10-21 17:08:19: [48795] DEBUG: 421c195a 0c4c314e 1dd97781 1755bc0e 01100400 00000000 00000168 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 0a000084 72a1b7f6 aceb8082 921f8a0a bbbe46e7 9d07d57b 1fae9074 de0f6e3f dabbe563 57e59115 b9c80dde c30dd74d 7cf9e48b 31a5ca0b 5c4c96d3 83e706bc 09cc378f bc349bd2 6faf2002 05d148eb b6cf07ad 3259b11b 06128df0 a92d36c1 b842ff35 f8bbe703 6510331e 1b704699 16365389 bba78631 b252d081 69b2acd5 e783f8ce 05000014 5eb2733f 1d140509 11a81e29 e9aa9523 0800000c 01000000 c16e9d95 0d000018 86e9b8df d6ad8f64 cc982640 5187b34e 6c187846 14000014 afcad713 68a1f1c9 6b8696fc 77570100 14000018 fdb3568a 24b8d03e c5ae6070 6a84abef b80e29ce 0d000018 2e99483e 4d239763 5f436cb6 6786634c 531c32a3 00000014 4a131c81 07035845 5c5728f2 0e95452f 2012-10-21 17:08:19: [48795] DEBUG: malformed cookie received or the spi expired. 2012-10-21 17:08:39: [48795] DEBUG: === 2012-10-21 17:08:39: [48795] DEBUG: 360 bytes message received from 193.110.157.149[500] to 192.168.157.128[500] 2012-10-21 17:08:39: [48795] DEBUG: 421c195a 0c4c314e aa50e591 124b6bf3 01100400 00000000 00000168 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 0a000084 3905b367 23bf3fa6 a821a4db 47722f14 05feff42 699b8001 729c220c 4c993935 781a0f65 96cc8709 dd161bc8 15663a66 7edf3c6f 3b3c506e 14323f3c 4563ee41 b378d0b2 aeff5304 cc37759f a3a83e81 00f29467 3aad707d 51f74d96 d763b612 621cf7f4 277b0f82 a1cf543c 83ea2649 8df0f1d6 cbd1af32 715bce80 5b0e0e35 05000014 5dc6247d 465363f1 20c68ba0 37dd0712 0800000c 01000000 c16e9d95 0d000018 c6288389 f04d4a3b 7109c896 b17af63c bc93a82c 14000014 afcad713 68a1f1c9 6b8696fc 77570100 14000018 a43ec2fe 57bb3a1b 19038214 3f79dcad d2bc447e 0d000018 ee5342d4 2a13688d 7f175586 6c54980f 366ef2e9 00000014 4a131c81 07035845 5c5728f2 0e95452f 2012-10-21 17:08:39: [48795] DEBUG: malformed cookie received or the spi expired. 2012-10-21 17:08:42: [48795] DEBUG: === 2012-10-21 17:08:42: [48795] DEBUG: 360 bytes message received from 193.110.157.149[500] to 192.168.157.128[500] 2012-10-21 17:08:42: [48795] DEBUG: 421c195a 0c4c314e 1dd97781 1755bc0e 01100400 00000000 00000168 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 0a000084 72a1b7f6 aceb8082 921f8a0a bbbe46e7 9d07d57b 1fae9074 de0f6e3f dabbe563 57e59115 b9c80dde c30dd74d 7cf9e48b 31a5ca0b 5c4c96d3 83e706bc 09cc378f bc349bd2 6faf2002 05d148eb b6cf07ad 3259b11b 06128df0 a92d36c1 b842ff35 f8bbe703 6510331e 1b704699 16365389 bba78631 b252d081 69b2acd5 e783f8ce 05000014 5eb2733f 1d140509 11a81e29 e9aa9523 0800000c 01000000 c16e9d95 0d000018 86e9b8df d6ad8f64 cc982640 5187b34e 6c187846 14000014 afcad713 68a1f1c9 6b8696fc 77570100 14000018 fdb3568a 24b8d03e c5ae6070 6a84abef b80e29ce 0d000018 2e99483e 4d239763 5f436cb6 6786634c 531c32a3 00000014 4a131c81 07035845 5c5728f2 0e95452f 2012-10-21 17:08:42: [48795] DEBUG: malformed cookie received or the spi expired. 2012-10-21 17:09:05: [48795] NOTIFY: accepted connection on vpn control socket. 2012-10-21 17:09:05: [48795] DEBUG: received bind command on vpn control socket. 2012-10-21 17:09:05: [48795] DEBUG: received connect command on vpn control socket. 2012-10-21 17:09:05: [48795] DEBUG: configuration found for 193.110.157.149[62465]. 2012-10-21 17:09:05: [48795] INFO: accept a request to establish IKE-SA: 193.110.157.149 2012-10-21 17:09:05: [48795] DEBUG: start search for IKE-Session. target 193.110.157.149[500]. 2012-10-21 17:09:05: [48795] DEBUG: New IKE-Session to 193.110.157.149[500]. 2012-10-21 17:09:05: [48795] DEBUG: new parent session. 2012-10-21 17:09:05: [48795] DEBUG: === 2012-10-21 17:09:05: [48795] INFO: initiate new phase 1 negotiation: 192.168.157.128[500]<=>193.110.157.149[500] 2012-10-21 17:09:05: [48795] INFO: begin Aggressive mode. 2012-10-21 17:09:05: [48795] DEBUG: new cookie: 6383987ff90ec951 2012-10-21 17:09:05: [48795] DEBUG: use ID type of KEY_ID 2012-10-21 17:09:05: [48795] DEBUG: 0b000000 74657374 2012-10-21 17:09:05: [48795] DEBUG: compute DH's private. 2012-10-21 17:09:05: [48795] DEBUG: 5d3c06dc e0277d3a 5deb2bfb 281f2deb 2976fa42 34925685 d615b9fd 428c9003 3fd5af84 58c607a9 dd8d340b 7501da9f e605ed8a 6ca0fe37 391cb20d 09a1da24 70a0ab22 f41b173f c8999282 4b02f856 c291f47a 91a31abb fc27c446 792fe9c2 124dcecf d6f9be10 269d5de9 37f8692a 207dbba3 fab44d40 b345cbd7 a4ab5429 2012-10-21 17:09:05: [48795] DEBUG: compute DH's public. 2012-10-21 17:09:05: [48795] DEBUG: 8018734b e3ef0684 8340b82e 997b2ce9 3c006203 22433d6c dc8dbdf4 fbc81963 bf0f8a51 ffd437b4 2dc31199 f4aef2b4 28818d79 b18ffb9f a0939f94 c9bec79f 1ee98fe0 1b5bfe5e 9579937c aba8020c 4a7bf394 e7ada802 51b80445 1c6a810d 4c71a9d2 dd3c10bc d4e75b98 4967656e d4a04cc1 afae591e 6d1ee6e5 41ff92c0 2012-10-21 17:09:05: [48795] DEBUG: authmethod is XAuth pskey client 2012-10-21 17:09:05: [48795] DEBUG: add payload of len 288, next type 4 2012-10-21 17:09:05: [48795] DEBUG: add payload of len 128, next type 10 2012-10-21 17:09:05: [48795] DEBUG: add payload of len 16, next type 5 2012-10-21 17:09:05: [48795] DEBUG: add payload of len 8, next type 13 2012-10-21 17:09:05: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:09:05: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:09:05: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:09:05: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:09:05: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:09:05: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:09:05: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:09:05: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:09:05: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:09:05: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:09:05: [48795] DEBUG: add payload of len 8, next type 13 2012-10-21 17:09:05: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:09:05: [48795] DEBUG: add payload of len 16, next type 0 2012-10-21 17:09:05: [48795] DEBUG: 736 bytes from 192.168.157.128[500] to 193.110.157.149[500] 2012-10-21 17:09:05: [48795] DEBUG: sockname 192.168.157.128[500] 2012-10-21 17:09:05: [48795] DEBUG: send packet from 192.168.157.128[500] 2012-10-21 17:09:05: [48795] DEBUG: send packet to 193.110.157.149[500] 2012-10-21 17:09:05: [48795] DEBUG: 1 times of 736 bytes message will be sent to 193.110.157.149[500] 2012-10-21 17:09:05: [48795] DEBUG: 6383987f f90ec951 00000000 00000000 01100400 00000000 000002e0 04000124 00000001 00000001 00000118 01010008 03000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 03000024 02010000 800b0001 800c0e10 80010007 800e0080 8003fde9 80020002 80040002 03000024 03010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020001 80040002 03000024 04010000 800b0001 800c0e10 80010007 800e0080 8003fde9 80020001 80040002 03000020 05010000 800b0001 800c0e10 80010005 8003fde9 80020002 80040002 03000020 06010000 800b0001 800c0e10 80010005 8003fde9 80020001 80040002 03000020 07010000 800b0001 800c0e10 80010001 8003fde9 80020002 80040002 00000020 08010000 800b0001 800c0e10 80010001 8003fde9 80020001 80040002 0a000084 8018734b e3ef0684 8340b82e 997b2ce9 3c006203 22433d6c dc8dbdf4 fbc81963 bf0f8a51 ffd437b4 2dc31199 f4aef2b4 28818d79 b18ffb9f a0939f94 c9bec79f 1ee98fe0 1b5bfe5e 9579937c aba8020c 4a7bf394 e7ada802 51b80445 1c6a810d 4c71a9d2 dd3c10bc d4e75b98 4967656e d4a04cc1 afae591e 6d1ee6e5 41ff92c0 05000014 ec71a4d3 6d531c4a d822fdae e2c56c02 0d00000c 0b000000 74657374 0d000014 4a131c81 07035845 5c5728f2 0e95452f 0d000014 4df37928 e9fc4fd1 b3262170 d515c662 0d000014 8f8d8382 6d246b6f c7a8a6a4 28c11de8 0d000014 439b59f8 ba676c4c 7737ae22 eab8f582 0d000014 4d1e0e13 6deafa34 c4f3ea9f 02ec7285 0d000014 80d0bb3d ef54565e e84645d4 c85ce3ee 0d000014 9909b64e ed937c65 73de52ac e952fa6b 0d000014 7d9419a6 5310ca6f 2c179d92 15529d56 0d000014 cd604643 35df21f8 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e 086381b5 ec427b1f 0d00000c 09002689 dfd6b712 0d000014 12f5f28c 457168a9 702d9fe2 74cc0100 00000014 afcad713 68a1f1c9 6b8696fc 77570100 2012-10-21 17:09:05: [48795] DEBUG: resend phase1 packet 6383987ff90ec951:0000000000000000 2012-10-21 17:09:05: [48795] DEBUG: sending vpn_control phase change status 2012-10-21 17:09:05: [48795] DEBUG: vpn control writing 20 bytes 2012-10-21 17:09:05: [48795] DEBUG: 80110000 00000000 00000000 00000004 c16e9d95 2012-10-21 17:09:08: [48795] DEBUG: 736 bytes from 192.168.157.128[500] to 193.110.157.149[500] 2012-10-21 17:09:08: [48795] DEBUG: sockname 192.168.157.128[500] 2012-10-21 17:09:08: [48795] DEBUG: send packet from 192.168.157.128[500] 2012-10-21 17:09:08: [48795] DEBUG: send packet to 193.110.157.149[500] 2012-10-21 17:09:08: [48795] DEBUG: 1 times of 736 bytes message will be sent to 193.110.157.149[500] 2012-10-21 17:09:08: [48795] DEBUG: 6383987f f90ec951 00000000 00000000 01100400 00000000 000002e0 04000124 00000001 00000001 00000118 01010008 03000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 03000024 02010000 800b0001 800c0e10 80010007 800e0080 8003fde9 80020002 80040002 03000024 03010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020001 80040002 03000024 04010000 800b0001 800c0e10 80010007 800e0080 8003fde9 80020001 80040002 03000020 05010000 800b0001 800c0e10 80010005 8003fde9 80020002 80040002 03000020 06010000 800b0001 800c0e10 80010005 8003fde9 80020001 80040002 03000020 07010000 800b0001 800c0e10 80010001 8003fde9 80020002 80040002 00000020 08010000 800b0001 800c0e10 80010001 8003fde9 80020001 80040002 0a000084 8018734b e3ef0684 8340b82e 997b2ce9 3c006203 22433d6c dc8dbdf4 fbc81963 bf0f8a51 ffd437b4 2dc31199 f4aef2b4 28818d79 b18ffb9f a0939f94 c9bec79f 1ee98fe0 1b5bfe5e 9579937c aba8020c 4a7bf394 e7ada802 51b80445 1c6a810d 4c71a9d2 dd3c10bc d4e75b98 4967656e d4a04cc1 afae591e 6d1ee6e5 41ff92c0 05000014 ec71a4d3 6d531c4a d822fdae e2c56c02 0d00000c 0b000000 74657374 0d000014 4a131c81 07035845 5c5728f2 0e95452f 0d000014 4df37928 e9fc4fd1 b3262170 d515c662 0d000014 8f8d8382 6d246b6f c7a8a6a4 28c11de8 0d000014 439b59f8 ba676c4c 7737ae22 eab8f582 0d000014 4d1e0e13 6deafa34 c4f3ea9f 02ec7285 0d000014 80d0bb3d ef54565e e84645d4 c85ce3ee 0d000014 9909b64e ed937c65 73de52ac e952fa6b 0d000014 7d9419a6 5310ca6f 2c179d92 15529d56 0d000014 cd604643 35df21f8 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e 086381b5 ec427b1f 0d00000c 09002689 dfd6b712 0d000014 12f5f28c 457168a9 702d9fe2 74cc0100 00000014 afcad713 68a1f1c9 6b8696fc 77570100 2012-10-21 17:09:08: [48795] DEBUG: resend phase1 packet 6383987ff90ec951:0000000000000000 2012-10-21 17:09:08: [48795] DEBUG: === 2012-10-21 17:09:08: [48795] DEBUG: 360 bytes message received from 193.110.157.149[500] to 192.168.157.128[500] 2012-10-21 17:09:08: [48795] DEBUG: 6383987f f90ec951 2d667e2e 9e7d0027 01100400 00000000 00000168 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 0a000084 d06644b6 73c8a0f8 f5c5fa2f 0735fa18 254c68d0 5cd60f93 c4590ba5 08636ff8 21067daf 21768d28 49e0eed7 427459d2 6526c53f 6ca5ed54 d81b1946 3985c553 d7e7eb6f 15d9f16a 0cde819f 5a77b464 c5a43533 6cb10290 39eab39a 2fc24ede e8ec9331 606b9249 14625f42 bd77dab3 8fb7e674 19f4fb33 6b2dfa7c f182aed8 05000014 d4655459 c29af58f b4410404 c6b416a2 0800000c 01000000 c16e9d95 0d000018 20040ebe b96dec27 1db6fb05 5a05bd12 de7412cb 14000014 afcad713 68a1f1c9 6b8696fc 77570100 14000018 6e212bc0 2b3175f5 74adbd8b 8aa692a4 af54b119 0d000018 f72d0d6a d3b48f6e e20cbc3b 897c2587 b2d43934 00000014 4a131c81 07035845 5c5728f2 0e95452f 2012-10-21 17:09:08: [48795] DEBUG: begin. 2012-10-21 17:09:08: [48795] DEBUG: seen nptype=1(sa) 2012-10-21 17:09:08: [48795] DEBUG: seen nptype=4(ke) 2012-10-21 17:09:08: [48795] DEBUG: seen nptype=10(nonce) 2012-10-21 17:09:08: [48795] DEBUG: seen nptype=5(id) 2012-10-21 17:09:08: [48795] DEBUG: seen nptype=8(hash) 2012-10-21 17:09:08: [48795] DEBUG: seen nptype=13(vid) 2012-10-21 17:09:08: [48795] DEBUG: seen nptype=20(nat-d) 2012-10-21 17:09:08: [48795] DEBUG: seen nptype=20(nat-d) 2012-10-21 17:09:08: [48795] DEBUG: seen nptype=13(vid) 2012-10-21 17:09:08: [48795] DEBUG: succeed. 2012-10-21 17:09:08: [48795] INFO: received Vendor ID: DPD 2012-10-21 17:09:08: [48795] DEBUG: remote supports DPD 2012-10-21 17:09:08: [48795] INFO: received Vendor ID: RFC 3947 2012-10-21 17:09:08: [48795] DEBUG: total SA len=52 2012-10-21 17:09:08: [48795] DEBUG: 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 2012-10-21 17:09:08: [48795] DEBUG: begin. 2012-10-21 17:09:08: [48795] DEBUG: seen nptype=2(prop) 2012-10-21 17:09:08: [48795] DEBUG: succeed. 2012-10-21 17:09:08: [48795] DEBUG: proposal #1 len=44 2012-10-21 17:09:08: [48795] DEBUG: begin. 2012-10-21 17:09:08: [48795] DEBUG: seen nptype=3(trns) 2012-10-21 17:09:08: [48795] DEBUG: succeed. 2012-10-21 17:09:08: [48795] DEBUG: transform #1 len=36 2012-10-21 17:09:08: [48795] DEBUG: type=Life Type, flag=0x8000, lorv=seconds 2012-10-21 17:09:08: [48795] DEBUG: type=Life Duration, flag=0x8000, lorv=3600 2012-10-21 17:09:08: [48795] DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 2012-10-21 17:09:08: [48795] DEBUG: encryption(aes) 2012-10-21 17:09:08: [48795] DEBUG: type=Key Length, flag=0x8000, lorv=256 2012-10-21 17:09:08: [48795] DEBUG: type=Authentication Method, flag=0x8000, lorv=XAuth pskey client 2012-10-21 17:09:08: [48795] DEBUG: type=Hash Algorithm, flag=0x8000, lorv=SHA 2012-10-21 17:09:08: [48795] DEBUG: hash(sha1) 2012-10-21 17:09:08: [48795] DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group 2012-10-21 17:09:08: [48795] DEBUG: hmac(modp1024) 2012-10-21 17:09:08: [48795] DEBUG: pair 1: 2012-10-21 17:09:08: [48795] DEBUG: 0x101c30490: next=0x0 tnext=0x0 2012-10-21 17:09:08: [48795] DEBUG: proposal #1: 1 transform 2012-10-21 17:09:08: [48795] DEBUG: prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1 2012-10-21 17:09:08: [48795] DEBUG: trns#=1, trns-id=IKE 2012-10-21 17:09:08: [48795] DEBUG: type=Life Type, flag=0x8000, lorv=seconds 2012-10-21 17:09:08: [48795] DEBUG: type=Life Duration, flag=0x8000, lorv=3600 2012-10-21 17:09:08: [48795] DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 2012-10-21 17:09:08: [48795] DEBUG: type=Key Length, flag=0x8000, lorv=256 2012-10-21 17:09:08: [48795] DEBUG: type=Authentication Method, flag=0x8000, lorv=XAuth pskey client 2012-10-21 17:09:08: [48795] DEBUG: type=Hash Algorithm, flag=0x8000, lorv=SHA 2012-10-21 17:09:08: [48795] DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group 2012-10-21 17:09:08: [48795] DEBUG: Compared: DB:Peer 2012-10-21 17:09:08: [48795] DEBUG: (lifetime = 3600:3600) 2012-10-21 17:09:08: [48795] DEBUG: (lifebyte = 0:0) 2012-10-21 17:09:08: [48795] DEBUG: enctype = AES-CBC:AES-CBC 2012-10-21 17:09:08: [48795] DEBUG: (encklen = 256:256) 2012-10-21 17:09:08: [48795] DEBUG: hashtype = SHA:SHA 2012-10-21 17:09:08: [48795] DEBUG: authmethod = XAuth pskey client:XAuth pskey client 2012-10-21 17:09:08: [48795] DEBUG: dh_group = 1024-bit MODP group:1024-bit MODP group 2012-10-21 17:09:08: [48795] DEBUG: an acceptable proposal found. 2012-10-21 17:09:08: [48795] DEBUG: hmac(modp1024) 2012-10-21 17:09:08: [48795] DEBUG: agreed on XAuth pskey client auth. 2012-10-21 17:09:08: [48795] INFO: Selected NAT-T version: RFC 3947 2012-10-21 17:09:08: [48795] INFO: NAT detected: ME PEER 2012-10-21 17:09:08: [48795] DEBUG: compute DH's shared. 2012-10-21 17:09:08: [48795] DEBUG: 75aef083 01224fb0 e954d599 1153c77f 770514aa e3aa0724 01e9f8d6 1dbb4f92 763ae5a5 113363ac 3d3e62d7 311bfbb7 4d600058 a6f10736 d8477ee5 8497808a 615c2277 c440b2f8 d69766bc 1de5f977 013107b2 874f2404 faa935dc edd8fae5 22e3f2fa aaa5e9c3 e99be675 5a6f88f9 a1d27610 a9667ba8 47364221 eaf5b2e0 2012-10-21 17:09:08: [48795] DEBUG: Getting pre-shared key from keychain. 2012-10-21 17:09:08: [48795] DEBUG: the psk found. 2012-10-21 17:09:08: [48795] DEBUG2: psk: 2012-10-21 17:09:08: [48795] DEBUG2: 74657374 2012-10-21 17:09:08: [48795] DEBUG: nonce 1: 2012-10-21 17:09:08: [48795] DEBUG: ec71a4d3 6d531c4a d822fdae e2c56c02 2012-10-21 17:09:08: [48795] DEBUG: nonce 2: 2012-10-21 17:09:08: [48795] DEBUG: d4655459 c29af58f b4410404 c6b416a2 2012-10-21 17:09:08: [48795] DEBUG: hmac(hmac_sha1) 2012-10-21 17:09:08: [48795] DEBUG: SKEYID computed: 2012-10-21 17:09:08: [48795] DEBUG: a2acf9c8 ef51f4aa e2d18f05 e5691993 9956be2b 2012-10-21 17:09:08: [48795] DEBUG: hmac(hmac_sha1) 2012-10-21 17:09:08: [48795] DEBUG: SKEYID_d computed: 2012-10-21 17:09:08: [48795] DEBUG: 1476c8f6 af348c35 1274c3f0 0e8521f9 0cfe44cd 2012-10-21 17:09:08: [48795] DEBUG: hmac(hmac_sha1) 2012-10-21 17:09:08: [48795] DEBUG: SKEYID_a computed: 2012-10-21 17:09:08: [48795] DEBUG: f17eda44 e746d3ba 48e435b9 d2544e3e 02cd0a78 2012-10-21 17:09:08: [48795] DEBUG: hmac(hmac_sha1) 2012-10-21 17:09:08: [48795] DEBUG: SKEYID_e computed: 2012-10-21 17:09:08: [48795] DEBUG: 59565f5f b96bd13a 70d162a8 20584aa8 401b90da 2012-10-21 17:09:08: [48795] DEBUG: encryption(aes) 2012-10-21 17:09:08: [48795] DEBUG: hash(sha1) 2012-10-21 17:09:08: [48795] DEBUG: len(SKEYID_e) < len(Ka) (20 < 32), generating long key (Ka = K1 | K2 | ...) 2012-10-21 17:09:08: [48795] DEBUG: hmac(hmac_sha1) 2012-10-21 17:09:08: [48795] DEBUG: compute intermediate encryption key K1 2012-10-21 17:09:08: [48795] DEBUG: 00 2012-10-21 17:09:08: [48795] DEBUG: 321f8d9e b022d7c8 0809e54a 3523734c c8a7051a 2012-10-21 17:09:08: [48795] DEBUG: hmac(hmac_sha1) 2012-10-21 17:09:08: [48795] DEBUG: compute intermediate encryption key K2 2012-10-21 17:09:08: [48795] DEBUG: 321f8d9e b022d7c8 0809e54a 3523734c c8a7051a 2012-10-21 17:09:08: [48795] DEBUG: f6302d24 58f9dec8 46b29f32 ff9f28c1 51f79ee5 2012-10-21 17:09:08: [48795] DEBUG: final encryption key computed: 2012-10-21 17:09:08: [48795] DEBUG: 321f8d9e b022d7c8 0809e54a 3523734c c8a7051a f6302d24 58f9dec8 46b29f32 2012-10-21 17:09:08: [48795] DEBUG: hash(sha1) 2012-10-21 17:09:08: [48795] DEBUG: encryption(aes) 2012-10-21 17:09:08: [48795] DEBUG: IV computed: 2012-10-21 17:09:08: [48795] DEBUG: 73c44d79 265fe0f6 4fcb967d 3d63ae5f 2012-10-21 17:09:08: [48795] ERROR: No SIG was passed, hybrid auth is enabled, but peer is no Xauth compliant 2012-10-21 17:09:08: [48795] DEBUG: sending vpn_control ike failed message - code=3 from=local. 2012-10-21 17:09:08: [48795] DEBUG: compute IV for phase2 2012-10-21 17:09:08: [48795] DEBUG: phase1 last IV: 2012-10-21 17:09:08: [48795] DEBUG: 73c44d79 265fe0f6 4fcb967d 3d63ae5f e404e0e6 2012-10-21 17:09:08: [48795] DEBUG: hash(sha1) 2012-10-21 17:09:08: [48795] DEBUG: encryption(aes) 2012-10-21 17:09:08: [48795] DEBUG: phase2 IV computed: 2012-10-21 17:09:08: [48795] DEBUG: a1cde29e 96a2bddd 8b7eee0b dd9e7986 2012-10-21 17:09:08: [48795] DEBUG: HASH with: 2012-10-21 17:09:08: [48795] DEBUG: e404e0e6 0000000c 00000001 01000003 2012-10-21 17:09:08: [48795] DEBUG: hmac(hmac_sha1) 2012-10-21 17:09:08: [48795] DEBUG: HASH computed: 2012-10-21 17:09:08: [48795] DEBUG: 5656edd2 3bf8fef1 4b52328c 7c8cf0de 33d7a629 2012-10-21 17:09:08: [48795] DEBUG: begin encryption. 2012-10-21 17:09:08: [48795] DEBUG: encryption(aes) 2012-10-21 17:09:08: [48795] DEBUG: pad length = 12 2012-10-21 17:09:08: [48795] DEBUG: 0b000018 5656edd2 3bf8fef1 4b52328c 7c8cf0de 33d7a629 0000000c 00000001 01000003 00000000 00000000 0000000c 2012-10-21 17:09:08: [48795] DEBUG: encryption(aes) 2012-10-21 17:09:08: [48795] DEBUG: with key: 2012-10-21 17:09:08: [48795] DEBUG: 321f8d9e b022d7c8 0809e54a 3523734c c8a7051a f6302d24 58f9dec8 46b29f32 2012-10-21 17:09:08: [48795] DEBUG: encrypted payload by IV: 2012-10-21 17:09:08: [48795] DEBUG: a1cde29e 96a2bddd 8b7eee0b dd9e7986 2012-10-21 17:09:08: [48795] DEBUG: save IV for next: 2012-10-21 17:09:08: [48795] DEBUG: bb7edaa3 600242cc 703f6770 8965f80e 2012-10-21 17:09:08: [48795] DEBUG: encrypted. 2012-10-21 17:09:08: [48795] DEBUG: Adding NON-ESP marker 2012-10-21 17:09:08: [48795] DEBUG: 80 bytes from 192.168.157.128[4500] to 193.110.157.149[4500] 2012-10-21 17:09:08: [48795] DEBUG: sockname 192.168.157.128[4500] 2012-10-21 17:09:08: [48795] DEBUG: send packet from 192.168.157.128[4500] 2012-10-21 17:09:08: [48795] DEBUG: send packet to 193.110.157.149[4500] 2012-10-21 17:09:08: [48795] DEBUG: 1 times of 80 bytes message will be sent to 193.110.157.149[4500] 2012-10-21 17:09:08: [48795] DEBUG: 00000000 6383987f f90ec951 2d667e2e 9e7d0027 08100501 e404e0e6 0000004c 96a3418b 87a0ff1e 1fe0725a 53e8e457 00c891b0 561ec74f 95504a64 1fb50909 bb7edaa3 600242cc 703f6770 8965f80e 2012-10-21 17:09:08: [48795] DEBUG: sendto Information notify. 2012-10-21 17:09:08: [48795] DEBUG: unbindph12. 2012-10-21 17:09:08: [48795] DEBUG: IV freed 2012-10-21 17:09:08: [48795] DEBUG: received disconnect command on vpn control socket. 2012-10-21 17:09:08: [48795] WARNING: in purgephXbydstaddrwop... purging phase1 and related phase2s 2012-10-21 17:09:08: [48795] INFO: ISAKMP-SA expired 192.168.157.128[4500]-193.110.157.149[4500] spi:6383987ff90ec951:2d667e2e9e7d0027 2012-10-21 17:09:08: [48795] DEBUG2: no ph1bind replacement found. NULL ph1. 2012-10-21 17:09:08: [48795] INFO: caught signal 13 2012-10-21 17:09:08: [48795] DEBUG: vpn_control socket closed by peer. 2012-10-21 17:09:08: [48795] DEBUG: vpncontrol_close_comm. 2012-10-21 17:09:09: [48795] INFO: ISAKMP-SA deleted 192.168.157.128[4500]-193.110.157.149[4500] spi:6383987ff90ec951:2d667e2e9e7d0027 2012-10-21 17:09:09: [48795] DEBUG: an undead schedule has been deleted. 2012-10-21 17:09:09: [48795] DEBUG: IV freed 2012-10-21 17:09:09: [48795] DEBUG: Freeing IKE-Session to 193.110.157.149[4500]. 2012-10-21 17:09:11: [48795] DEBUG: === 2012-10-21 17:09:11: [48795] DEBUG: 360 bytes message received from 193.110.157.149[500] to 192.168.157.128[500] 2012-10-21 17:09:11: [48795] DEBUG: 6383987f f90ec951 1b1e71c7 ad442473 01100400 00000000 00000168 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 0a000084 57bdf655 0e58eaa6 cf13bea2 3b592146 6afc5f07 def3790c 488767ff 9e183fa9 6c430dfd 6994abba 702c7fd9 2addacd1 b832aed6 51c30f51 28a9f7e3 43800c0a 9980b788 a33828b5 6b9ba3b9 e473f608 b9971a60 cb532d8c 6334b1b0 76a7a315 29489853 6e4d72ea 5aeb972c 09987280 6534804e 5c884906 af0a13f1 0c7fc783 05000014 b583871b 5f952fd6 71ecc4b2 f59c5eab 0800000c 01000000 c16e9d95 0d000018 3f4d60ca 5e63a88e 678a134f d38f3169 436aa209 14000014 afcad713 68a1f1c9 6b8696fc 77570100 14000018 2f705525 393e6fb7 7c7bccb1 87afa61f ddf5b8d9 0d000018 5d3d0757 f4f31553 28a32c4d 3afbeb2c 1510e71f 00000014 4a131c81 07035845 5c5728f2 0e95452f 2012-10-21 17:09:11: [48795] DEBUG: malformed cookie received or the spi expired. 2012-10-21 17:09:14: [48795] DEBUG: === 2012-10-21 17:09:14: [48795] DEBUG: 40 bytes message received from 193.110.157.149[500] to 192.168.157.128[500] 2012-10-21 17:09:14: [48795] DEBUG: 6383987f f90ec951 2d667e2e 9e7d0027 0b100500 8f3b9eb7 00000028 0000000c 00000001 01000010 2012-10-21 17:09:14: [48795] ERROR: unknown Informational exchange received. 2012-10-21 17:09:21: [48795] DEBUG: === 2012-10-21 17:09:21: [48795] DEBUG: 360 bytes message received from 193.110.157.149[500] to 192.168.157.128[500] 2012-10-21 17:09:21: [48795] DEBUG: 6383987f f90ec951 2d667e2e 9e7d0027 01100400 00000000 00000168 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 0a000084 d06644b6 73c8a0f8 f5c5fa2f 0735fa18 254c68d0 5cd60f93 c4590ba5 08636ff8 21067daf 21768d28 49e0eed7 427459d2 6526c53f 6ca5ed54 d81b1946 3985c553 d7e7eb6f 15d9f16a 0cde819f 5a77b464 c5a43533 6cb10290 39eab39a 2fc24ede e8ec9331 606b9249 14625f42 bd77dab3 8fb7e674 19f4fb33 6b2dfa7c f182aed8 05000014 d4655459 c29af58f b4410404 c6b416a2 0800000c 01000000 c16e9d95 0d000018 20040ebe b96dec27 1db6fb05 5a05bd12 de7412cb 14000014 afcad713 68a1f1c9 6b8696fc 77570100 14000018 6e212bc0 2b3175f5 74adbd8b 8aa692a4 af54b119 0d000018 f72d0d6a d3b48f6e e20cbc3b 897c2587 b2d43934 00000014 4a131c81 07035845 5c5728f2 0e95452f 2012-10-21 17:09:21: [48795] DEBUG: malformed cookie received or the spi expired. 2012-10-21 17:09:24: [48795] DEBUG: === 2012-10-21 17:09:24: [48795] DEBUG: 360 bytes message received from 193.110.157.149[500] to 192.168.157.128[500] 2012-10-21 17:09:24: [48795] DEBUG: 6383987f f90ec951 1b1e71c7 ad442473 01100400 00000000 00000168 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 0a000084 57bdf655 0e58eaa6 cf13bea2 3b592146 6afc5f07 def3790c 488767ff 9e183fa9 6c430dfd 6994abba 702c7fd9 2addacd1 b832aed6 51c30f51 28a9f7e3 43800c0a 9980b788 a33828b5 6b9ba3b9 e473f608 b9971a60 cb532d8c 6334b1b0 76a7a315 29489853 6e4d72ea 5aeb972c 09987280 6534804e 5c884906 af0a13f1 0c7fc783 05000014 b583871b 5f952fd6 71ecc4b2 f59c5eab 0800000c 01000000 c16e9d95 0d000018 3f4d60ca 5e63a88e 678a134f d38f3169 436aa209 14000014 afcad713 68a1f1c9 6b8696fc 77570100 14000018 2f705525 393e6fb7 7c7bccb1 87afa61f ddf5b8d9 0d000018 5d3d0757 f4f31553 28a32c4d 3afbeb2c 1510e71f 00000014 4a131c81 07035845 5c5728f2 0e95452f 2012-10-21 17:09:24: [48795] DEBUG: malformed cookie received or the spi expired. 2012-10-21 17:09:43: [48795] NOTIFY: accepted connection on vpn control socket. 2012-10-21 17:09:43: [48795] DEBUG: received bind command on vpn control socket. 2012-10-21 17:09:43: [48795] DEBUG: received connect command on vpn control socket. 2012-10-21 17:09:43: [48795] DEBUG: configuration found for 193.110.157.149[62465]. 2012-10-21 17:09:43: [48795] INFO: accept a request to establish IKE-SA: 193.110.157.149 2012-10-21 17:09:43: [48795] DEBUG: start search for IKE-Session. target 193.110.157.149[500]. 2012-10-21 17:09:43: [48795] DEBUG: New IKE-Session to 193.110.157.149[500]. 2012-10-21 17:09:43: [48795] DEBUG: new parent session. 2012-10-21 17:09:43: [48795] DEBUG: === 2012-10-21 17:09:43: [48795] INFO: initiate new phase 1 negotiation: 192.168.157.128[500]<=>193.110.157.149[500] 2012-10-21 17:09:43: [48795] INFO: begin Aggressive mode. 2012-10-21 17:09:43: [48795] DEBUG: new cookie: 4eab8aed8005ac9f 2012-10-21 17:09:43: [48795] DEBUG: use ID type of KEY_ID 2012-10-21 17:09:43: [48795] DEBUG: 0b000000 74657374 2012-10-21 17:09:43: [48795] DEBUG: compute DH's private. 2012-10-21 17:09:43: [48795] DEBUG: 52cfc9c1 e4409e58 a7fc0add 6d943a22 cc62bc36 c21be106 d73ba78c f3f4cd44 e0dc4f43 713651c2 838e23f7 6e6b3cd9 c746211f f4366380 0039d5e2 707d6897 22a324c3 62edb640 49303fa5 1d73c36b 744f1fa4 846a2273 2110563a c22ed146 336ee0c2 c89e5231 d9bcb3bc 5f6e456a 24eb99bd 0f916ea2 5fc72fcc c0339f54 2012-10-21 17:09:43: [48795] DEBUG: compute DH's public. 2012-10-21 17:09:43: [48795] DEBUG: 368efc4a 16e3a6dd 9aa58de3 0c71f962 747a9a18 7b70dc5a 6dc7c10b 701977fe 013c8dde d87d5ae5 4eaff02c 9be7289d 82a105fa d1fb3e8f ae56cac5 9c984dcd 7d845ba4 4b516413 8c60fabb bac6d36d e2e62b24 9e91011e 08e12caf 016d8452 678ab89a 25200631 a940ac64 59885397 870417f4 34606de4 5b430c9c b977989c 2012-10-21 17:09:43: [48795] DEBUG: authmethod is XAuth pskey client 2012-10-21 17:09:43: [48795] DEBUG: add payload of len 288, next type 4 2012-10-21 17:09:43: [48795] DEBUG: add payload of len 128, next type 10 2012-10-21 17:09:43: [48795] DEBUG: add payload of len 16, next type 5 2012-10-21 17:09:43: [48795] DEBUG: add payload of len 8, next type 13 2012-10-21 17:09:43: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:09:43: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:09:43: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:09:43: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:09:43: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:09:43: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:09:43: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:09:43: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:09:43: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:09:43: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:09:43: [48795] DEBUG: add payload of len 8, next type 13 2012-10-21 17:09:43: [48795] DEBUG: add payload of len 16, next type 13 2012-10-21 17:09:43: [48795] DEBUG: add payload of len 16, next type 0 2012-10-21 17:09:43: [48795] DEBUG: 736 bytes from 192.168.157.128[500] to 193.110.157.149[500] 2012-10-21 17:09:43: [48795] DEBUG: sockname 192.168.157.128[500] 2012-10-21 17:09:43: [48795] DEBUG: send packet from 192.168.157.128[500] 2012-10-21 17:09:43: [48795] DEBUG: send packet to 193.110.157.149[500] 2012-10-21 17:09:43: [48795] DEBUG: 1 times of 736 bytes message will be sent to 193.110.157.149[500] 2012-10-21 17:09:43: [48795] DEBUG: 4eab8aed 8005ac9f 00000000 00000000 01100400 00000000 000002e0 04000124 00000001 00000001 00000118 01010008 03000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 03000024 02010000 800b0001 800c0e10 80010007 800e0080 8003fde9 80020002 80040002 03000024 03010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020001 80040002 03000024 04010000 800b0001 800c0e10 80010007 800e0080 8003fde9 80020001 80040002 03000020 05010000 800b0001 800c0e10 80010005 8003fde9 80020002 80040002 03000020 06010000 800b0001 800c0e10 80010005 8003fde9 80020001 80040002 03000020 07010000 800b0001 800c0e10 80010001 8003fde9 80020002 80040002 00000020 08010000 800b0001 800c0e10 80010001 8003fde9 80020001 80040002 0a000084 368efc4a 16e3a6dd 9aa58de3 0c71f962 747a9a18 7b70dc5a 6dc7c10b 701977fe 013c8dde d87d5ae5 4eaff02c 9be7289d 82a105fa d1fb3e8f ae56cac5 9c984dcd 7d845ba4 4b516413 8c60fabb bac6d36d e2e62b24 9e91011e 08e12caf 016d8452 678ab89a 25200631 a940ac64 59885397 870417f4 34606de4 5b430c9c b977989c 05000014 ed25ef44 76260060 6916eef3 0caa223f 0d00000c 0b000000 74657374 0d000014 4a131c81 07035845 5c5728f2 0e95452f 0d000014 4df37928 e9fc4fd1 b3262170 d515c662 0d000014 8f8d8382 6d246b6f c7a8a6a4 28c11de8 0d000014 439b59f8 ba676c4c 7737ae22 eab8f582 0d000014 4d1e0e13 6deafa34 c4f3ea9f 02ec7285 0d000014 80d0bb3d ef54565e e84645d4 c85ce3ee 0d000014 9909b64e ed937c65 73de52ac e952fa6b 0d000014 7d9419a6 5310ca6f 2c179d92 15529d56 0d000014 cd604643 35df21f8 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e 086381b5 ec427b1f 0d00000c 09002689 dfd6b712 0d000014 12f5f28c 457168a9 702d9fe2 74cc0100 00000014 afcad713 68a1f1c9 6b8696fc 77570100 2012-10-21 17:09:43: [48795] DEBUG: resend phase1 packet 4eab8aed8005ac9f:0000000000000000 2012-10-21 17:09:43: [48795] DEBUG: sending vpn_control phase change status 2012-10-21 17:09:43: [48795] DEBUG: vpn control writing 20 bytes 2012-10-21 17:09:43: [48795] DEBUG: 80110000 00000000 00000000 00000004 c16e9d95 2012-10-21 17:09:44: [48795] DEBUG: === 2012-10-21 17:09:44: [48795] DEBUG: 360 bytes message received from 193.110.157.149[500] to 192.168.157.128[500] 2012-10-21 17:09:44: [48795] DEBUG: 6383987f f90ec951 2d667e2e 9e7d0027 01100400 00000000 00000168 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 0a000084 d06644b6 73c8a0f8 f5c5fa2f 0735fa18 254c68d0 5cd60f93 c4590ba5 08636ff8 21067daf 21768d28 49e0eed7 427459d2 6526c53f 6ca5ed54 d81b1946 3985c553 d7e7eb6f 15d9f16a 0cde819f 5a77b464 c5a43533 6cb10290 39eab39a 2fc24ede e8ec9331 606b9249 14625f42 bd77dab3 8fb7e674 19f4fb33 6b2dfa7c f182aed8 05000014 d4655459 c29af58f b4410404 c6b416a2 0800000c 01000000 c16e9d95 0d000018 20040ebe b96dec27 1db6fb05 5a05bd12 de7412cb 14000014 afcad713 68a1f1c9 6b8696fc 77570100 14000018 6e212bc0 2b3175f5 74adbd8b 8aa692a4 af54b119 0d000018 f72d0d6a d3b48f6e e20cbc3b 897c2587 b2d43934 00000014 4a131c81 07035845 5c5728f2 0e95452f 2012-10-21 17:09:44: [48795] DEBUG: malformed cookie received or the spi expired. 2012-10-21 17:09:46: [48795] DEBUG: 736 bytes from 192.168.157.128[500] to 193.110.157.149[500] 2012-10-21 17:09:46: [48795] DEBUG: sockname 192.168.157.128[500] 2012-10-21 17:09:46: [48795] DEBUG: send packet from 192.168.157.128[500] 2012-10-21 17:09:46: [48795] DEBUG: send packet to 193.110.157.149[500] 2012-10-21 17:09:46: [48795] DEBUG: 1 times of 736 bytes message will be sent to 193.110.157.149[500] 2012-10-21 17:09:46: [48795] DEBUG: 4eab8aed 8005ac9f 00000000 00000000 01100400 00000000 000002e0 04000124 00000001 00000001 00000118 01010008 03000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 03000024 02010000 800b0001 800c0e10 80010007 800e0080 8003fde9 80020002 80040002 03000024 03010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020001 80040002 03000024 04010000 800b0001 800c0e10 80010007 800e0080 8003fde9 80020001 80040002 03000020 05010000 800b0001 800c0e10 80010005 8003fde9 80020002 80040002 03000020 06010000 800b0001 800c0e10 80010005 8003fde9 80020001 80040002 03000020 07010000 800b0001 800c0e10 80010001 8003fde9 80020002 80040002 00000020 08010000 800b0001 800c0e10 80010001 8003fde9 80020001 80040002 0a000084 368efc4a 16e3a6dd 9aa58de3 0c71f962 747a9a18 7b70dc5a 6dc7c10b 701977fe 013c8dde d87d5ae5 4eaff02c 9be7289d 82a105fa d1fb3e8f ae56cac5 9c984dcd 7d845ba4 4b516413 8c60fabb bac6d36d e2e62b24 9e91011e 08e12caf 016d8452 678ab89a 25200631 a940ac64 59885397 870417f4 34606de4 5b430c9c b977989c 05000014 ed25ef44 76260060 6916eef3 0caa223f 0d00000c 0b000000 74657374 0d000014 4a131c81 07035845 5c5728f2 0e95452f 0d000014 4df37928 e9fc4fd1 b3262170 d515c662 0d000014 8f8d8382 6d246b6f c7a8a6a4 28c11de8 0d000014 439b59f8 ba676c4c 7737ae22 eab8f582 0d000014 4d1e0e13 6deafa34 c4f3ea9f 02ec7285 0d000014 80d0bb3d ef54565e e84645d4 c85ce3ee 0d000014 9909b64e ed937c65 73de52ac e952fa6b 0d000014 7d9419a6 5310ca6f 2c179d92 15529d56 0d000014 cd604643 35df21f8 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e 086381b5 ec427b1f 0d00000c 09002689 dfd6b712 0d000014 12f5f28c 457168a9 702d9fe2 74cc0100 00000014 afcad713 68a1f1c9 6b8696fc 77570100 2012-10-21 17:09:46: [48795] DEBUG: resend phase1 packet 4eab8aed8005ac9f:0000000000000000 2012-10-21 17:09:47: [48795] DEBUG: === 2012-10-21 17:09:47: [48795] DEBUG: 360 bytes message received from 193.110.157.149[500] to 192.168.157.128[500] 2012-10-21 17:09:47: [48795] DEBUG: 6383987f f90ec951 1b1e71c7 ad442473 01100400 00000000 00000168 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 0a000084 57bdf655 0e58eaa6 cf13bea2 3b592146 6afc5f07 def3790c 488767ff 9e183fa9 6c430dfd 6994abba 702c7fd9 2addacd1 b832aed6 51c30f51 28a9f7e3 43800c0a 9980b788 a33828b5 6b9ba3b9 e473f608 b9971a60 cb532d8c 6334b1b0 76a7a315 29489853 6e4d72ea 5aeb972c 09987280 6534804e 5c884906 af0a13f1 0c7fc783 05000014 b583871b 5f952fd6 71ecc4b2 f59c5eab 0800000c 01000000 c16e9d95 0d000018 3f4d60ca 5e63a88e 678a134f d38f3169 436aa209 14000014 afcad713 68a1f1c9 6b8696fc 77570100 14000018 2f705525 393e6fb7 7c7bccb1 87afa61f ddf5b8d9 0d000018 5d3d0757 f4f31553 28a32c4d 3afbeb2c 1510e71f 00000014 4a131c81 07035845 5c5728f2 0e95452f 2012-10-21 17:09:47: [48795] DEBUG: malformed cookie received or the spi expired. 2012-10-21 17:09:49: [48795] DEBUG: 736 bytes from 192.168.157.128[500] to 193.110.157.149[500] 2012-10-21 17:09:49: [48795] DEBUG: sockname 192.168.157.128[500] 2012-10-21 17:09:49: [48795] DEBUG: send packet from 192.168.157.128[500] 2012-10-21 17:09:49: [48795] DEBUG: send packet to 193.110.157.149[500] 2012-10-21 17:09:49: [48795] DEBUG: 1 times of 736 bytes message will be sent to 193.110.157.149[500] 2012-10-21 17:09:49: [48795] DEBUG: 4eab8aed 8005ac9f 00000000 00000000 01100400 00000000 000002e0 04000124 00000001 00000001 00000118 01010008 03000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 03000024 02010000 800b0001 800c0e10 80010007 800e0080 8003fde9 80020002 80040002 03000024 03010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020001 80040002 03000024 04010000 800b0001 800c0e10 80010007 800e0080 8003fde9 80020001 80040002 03000020 05010000 800b0001 800c0e10 80010005 8003fde9 80020002 80040002 03000020 06010000 800b0001 800c0e10 80010005 8003fde9 80020001 80040002 03000020 07010000 800b0001 800c0e10 80010001 8003fde9 80020002 80040002 00000020 08010000 800b0001 800c0e10 80010001 8003fde9 80020001 80040002 0a000084 368efc4a 16e3a6dd 9aa58de3 0c71f962 747a9a18 7b70dc5a 6dc7c10b 701977fe 013c8dde d87d5ae5 4eaff02c 9be7289d 82a105fa d1fb3e8f ae56cac5 9c984dcd 7d845ba4 4b516413 8c60fabb bac6d36d e2e62b24 9e91011e 08e12caf 016d8452 678ab89a 25200631 a940ac64 59885397 870417f4 34606de4 5b430c9c b977989c 05000014 ed25ef44 76260060 6916eef3 0caa223f 0d00000c 0b000000 74657374 0d000014 4a131c81 07035845 5c5728f2 0e95452f 0d000014 4df37928 e9fc4fd1 b3262170 d515c662 0d000014 8f8d8382 6d246b6f c7a8a6a4 28c11de8 0d000014 439b59f8 ba676c4c 7737ae22 eab8f582 0d000014 4d1e0e13 6deafa34 c4f3ea9f 02ec7285 0d000014 80d0bb3d ef54565e e84645d4 c85ce3ee 0d000014 9909b64e ed937c65 73de52ac e952fa6b 0d000014 7d9419a6 5310ca6f 2c179d92 15529d56 0d000014 cd604643 35df21f8 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e 086381b5 ec427b1f 0d00000c 09002689 dfd6b712 0d000014 12f5f28c 457168a9 702d9fe2 74cc0100 00000014 afcad713 68a1f1c9 6b8696fc 77570100 2012-10-21 17:09:49: [48795] DEBUG: resend phase1 packet 4eab8aed8005ac9f:0000000000000000 2012-10-21 17:09:50: [48795] DEBUG: === 2012-10-21 17:09:50: [48795] DEBUG: 360 bytes message received from 193.110.157.149[500] to 192.168.157.128[500] 2012-10-21 17:09:50: [48795] DEBUG: 4eab8aed 8005ac9f 72c877a5 2b9365f5 01100400 00000000 00000168 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 0a000084 6c1118c2 78bf5aa2 e005c4f1 ec90358e e4ae06cf 412c54e8 6f279cd6 3483682a 4c065fb3 12ccde9d 733100a0 8a9af92e 01dd0bb3 892707f7 7b5bb4ad 16caf87b bab673bf 28fafe58 446eea50 fa4a91bf 1186a610 54d1effa eb4fcc00 04e91556 92039f7e 9cdde760 73e24974 dc0c4e5f d9f466c9 1a230818 be903d86 6267de9c 05000014 6540ef15 22f2738c 4743a2ab 59e22cf1 0800000c 01000000 c16e9d95 0d000018 3b9bf11a 0be6b385 872c8ecd 3a2c208e 7a91f76c 14000014 afcad713 68a1f1c9 6b8696fc 77570100 14000018 ae370be4 663d0928 87bad6d5 7f39dbad 1d256e85 0d000018 dae5467d 2c98c90f 40a2625c 7aa1581d 5c607180 00000014 4a131c81 07035845 5c5728f2 0e95452f 2012-10-21 17:09:50: [48795] DEBUG: begin. 2012-10-21 17:09:50: [48795] DEBUG: seen nptype=1(sa) 2012-10-21 17:09:50: [48795] DEBUG: seen nptype=4(ke) 2012-10-21 17:09:50: [48795] DEBUG: seen nptype=10(nonce) 2012-10-21 17:09:50: [48795] DEBUG: seen nptype=5(id) 2012-10-21 17:09:50: [48795] DEBUG: seen nptype=8(hash) 2012-10-21 17:09:50: [48795] DEBUG: seen nptype=13(vid) 2012-10-21 17:09:50: [48795] DEBUG: seen nptype=20(nat-d) 2012-10-21 17:09:50: [48795] DEBUG: seen nptype=20(nat-d) 2012-10-21 17:09:50: [48795] DEBUG: seen nptype=13(vid) 2012-10-21 17:09:50: [48795] DEBUG: succeed. 2012-10-21 17:09:50: [48795] INFO: received Vendor ID: DPD 2012-10-21 17:09:50: [48795] DEBUG: remote supports DPD 2012-10-21 17:09:50: [48795] INFO: received Vendor ID: RFC 3947 2012-10-21 17:09:50: [48795] DEBUG: total SA len=52 2012-10-21 17:09:50: [48795] DEBUG: 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 2012-10-21 17:09:50: [48795] DEBUG: begin. 2012-10-21 17:09:50: [48795] DEBUG: seen nptype=2(prop) 2012-10-21 17:09:50: [48795] DEBUG: succeed. 2012-10-21 17:09:50: [48795] DEBUG: proposal #1 len=44 2012-10-21 17:09:50: [48795] DEBUG: begin. 2012-10-21 17:09:50: [48795] DEBUG: seen nptype=3(trns) 2012-10-21 17:09:50: [48795] DEBUG: succeed. 2012-10-21 17:09:50: [48795] DEBUG: transform #1 len=36 2012-10-21 17:09:50: [48795] DEBUG: type=Life Type, flag=0x8000, lorv=seconds 2012-10-21 17:09:50: [48795] DEBUG: type=Life Duration, flag=0x8000, lorv=3600 2012-10-21 17:09:50: [48795] DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 2012-10-21 17:09:50: [48795] DEBUG: encryption(aes) 2012-10-21 17:09:50: [48795] DEBUG: type=Key Length, flag=0x8000, lorv=256 2012-10-21 17:09:50: [48795] DEBUG: type=Authentication Method, flag=0x8000, lorv=XAuth pskey client 2012-10-21 17:09:50: [48795] DEBUG: type=Hash Algorithm, flag=0x8000, lorv=SHA 2012-10-21 17:09:50: [48795] DEBUG: hash(sha1) 2012-10-21 17:09:50: [48795] DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group 2012-10-21 17:09:50: [48795] DEBUG: hmac(modp1024) 2012-10-21 17:09:50: [48795] DEBUG: pair 1: 2012-10-21 17:09:50: [48795] DEBUG: 0x101c29950: next=0x0 tnext=0x0 2012-10-21 17:09:50: [48795] DEBUG: proposal #1: 1 transform 2012-10-21 17:09:50: [48795] DEBUG: prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1 2012-10-21 17:09:50: [48795] DEBUG: trns#=1, trns-id=IKE 2012-10-21 17:09:50: [48795] DEBUG: type=Life Type, flag=0x8000, lorv=seconds 2012-10-21 17:09:50: [48795] DEBUG: type=Life Duration, flag=0x8000, lorv=3600 2012-10-21 17:09:50: [48795] DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 2012-10-21 17:09:50: [48795] DEBUG: type=Key Length, flag=0x8000, lorv=256 2012-10-21 17:09:50: [48795] DEBUG: type=Authentication Method, flag=0x8000, lorv=XAuth pskey client 2012-10-21 17:09:50: [48795] DEBUG: type=Hash Algorithm, flag=0x8000, lorv=SHA 2012-10-21 17:09:50: [48795] DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group 2012-10-21 17:09:50: [48795] DEBUG: Compared: DB:Peer 2012-10-21 17:09:50: [48795] DEBUG: (lifetime = 3600:3600) 2012-10-21 17:09:50: [48795] DEBUG: (lifebyte = 0:0) 2012-10-21 17:09:50: [48795] DEBUG: enctype = AES-CBC:AES-CBC 2012-10-21 17:09:50: [48795] DEBUG: (encklen = 256:256) 2012-10-21 17:09:50: [48795] DEBUG: hashtype = SHA:SHA 2012-10-21 17:09:50: [48795] DEBUG: authmethod = XAuth pskey client:XAuth pskey client 2012-10-21 17:09:50: [48795] DEBUG: dh_group = 1024-bit MODP group:1024-bit MODP group 2012-10-21 17:09:50: [48795] DEBUG: an acceptable proposal found. 2012-10-21 17:09:50: [48795] DEBUG: hmac(modp1024) 2012-10-21 17:09:50: [48795] DEBUG: agreed on XAuth pskey client auth. 2012-10-21 17:09:50: [48795] INFO: Selected NAT-T version: RFC 3947 2012-10-21 17:09:50: [48795] INFO: NAT detected: ME PEER 2012-10-21 17:09:50: [48795] DEBUG: compute DH's shared. 2012-10-21 17:09:50: [48795] DEBUG: 5249f933 ca8bc7a9 18f6de33 cd57693b db87392a b50c7e8c b14b3e2d f4a8fc33 21297b66 2341f49c ed8954bc 37cb0a5d 7a6ef230 600745ef e1668cf3 f26160db 1b372d77 42557652 339900ac 171fbdec 3fb7b128 5bad1c6d 88c7cfeb 6764478f e569ba8c 47d66dc1 075aa714 cbd4e668 69290d17 4faf10b9 aa6599c9 9fffeda5 2012-10-21 17:09:50: [48795] DEBUG: Getting pre-shared key from keychain. 2012-10-21 17:09:50: [48795] DEBUG: the psk found. 2012-10-21 17:09:50: [48795] DEBUG2: psk: 2012-10-21 17:09:50: [48795] DEBUG2: 74657374 2012-10-21 17:09:50: [48795] DEBUG: nonce 1: 2012-10-21 17:09:50: [48795] DEBUG: ed25ef44 76260060 6916eef3 0caa223f 2012-10-21 17:09:50: [48795] DEBUG: nonce 2: 2012-10-21 17:09:50: [48795] DEBUG: 6540ef15 22f2738c 4743a2ab 59e22cf1 2012-10-21 17:09:50: [48795] DEBUG: hmac(hmac_sha1) 2012-10-21 17:09:50: [48795] DEBUG: SKEYID computed: 2012-10-21 17:09:50: [48795] DEBUG: 085a8445 88617c65 9b467120 d3c1113d 12476ba2 2012-10-21 17:09:50: [48795] DEBUG: hmac(hmac_sha1) 2012-10-21 17:09:50: [48795] DEBUG: SKEYID_d computed: 2012-10-21 17:09:50: [48795] DEBUG: 3a333e75 49a6fb49 1e467eb8 e8c63cb7 81c2209a 2012-10-21 17:09:50: [48795] DEBUG: hmac(hmac_sha1) 2012-10-21 17:09:50: [48795] DEBUG: SKEYID_a computed: 2012-10-21 17:09:50: [48795] DEBUG: 0acbc88a 3c540fdf 09f86ce7 6ea5a3fe ea48385a 2012-10-21 17:09:50: [48795] DEBUG: hmac(hmac_sha1) 2012-10-21 17:09:50: [48795] DEBUG: SKEYID_e computed: 2012-10-21 17:09:50: [48795] DEBUG: 8a09a7b6 3d24409e 5f7084cf 1906acbc d0f054dd 2012-10-21 17:09:50: [48795] DEBUG: encryption(aes) 2012-10-21 17:09:50: [48795] DEBUG: hash(sha1) 2012-10-21 17:09:50: [48795] DEBUG: len(SKEYID_e) < len(Ka) (20 < 32), generating long key (Ka = K1 | K2 | ...) 2012-10-21 17:09:50: [48795] DEBUG: hmac(hmac_sha1) 2012-10-21 17:09:50: [48795] DEBUG: compute intermediate encryption key K1 2012-10-21 17:09:50: [48795] DEBUG: 00 2012-10-21 17:09:50: [48795] DEBUG: 3075a394 d39a8fff 8a5636f8 fbb01c85 9bf5b2ce 2012-10-21 17:09:50: [48795] DEBUG: hmac(hmac_sha1) 2012-10-21 17:09:50: [48795] DEBUG: compute intermediate encryption key K2 2012-10-21 17:09:50: [48795] DEBUG: 3075a394 d39a8fff 8a5636f8 fbb01c85 9bf5b2ce 2012-10-21 17:09:50: [48795] DEBUG: 2a3c5cee d99a8a75 051429e6 49527be1 658c2094 2012-10-21 17:09:50: [48795] DEBUG: final encryption key computed: 2012-10-21 17:09:50: [48795] DEBUG: 3075a394 d39a8fff 8a5636f8 fbb01c85 9bf5b2ce 2a3c5cee d99a8a75 051429e6 2012-10-21 17:09:50: [48795] DEBUG: hash(sha1) 2012-10-21 17:09:50: [48795] DEBUG: encryption(aes) 2012-10-21 17:09:50: [48795] DEBUG: IV computed: 2012-10-21 17:09:50: [48795] DEBUG: 797f06ea 73ad7c40 0223ea23 a144128d 2012-10-21 17:09:50: [48795] ERROR: No SIG was passed, hybrid auth is enabled, but peer is no Xauth compliant 2012-10-21 17:09:50: [48795] DEBUG: sending vpn_control ike failed message - code=3 from=local. 2012-10-21 17:09:50: [48795] DEBUG: compute IV for phase2 2012-10-21 17:09:50: [48795] DEBUG: phase1 last IV: 2012-10-21 17:09:50: [48795] DEBUG: 797f06ea 73ad7c40 0223ea23 a144128d 90b9b4ba 2012-10-21 17:09:50: [48795] DEBUG: hash(sha1) 2012-10-21 17:09:50: [48795] DEBUG: encryption(aes) 2012-10-21 17:09:50: [48795] DEBUG: phase2 IV computed: 2012-10-21 17:09:50: [48795] DEBUG: 99e186a3 76075df4 ec054556 cb5f241b 2012-10-21 17:09:50: [48795] DEBUG: HASH with: 2012-10-21 17:09:50: [48795] DEBUG: 90b9b4ba 0000000c 00000001 01000003 2012-10-21 17:09:50: [48795] DEBUG: hmac(hmac_sha1) 2012-10-21 17:09:50: [48795] DEBUG: HASH computed: 2012-10-21 17:09:50: [48795] DEBUG: eb4afbd3 433c3194 23eca589 89a470df d000f8c0 2012-10-21 17:09:50: [48795] DEBUG: begin encryption. 2012-10-21 17:09:50: [48795] DEBUG: encryption(aes) 2012-10-21 17:09:50: [48795] DEBUG: pad length = 12 2012-10-21 17:09:50: [48795] DEBUG: 0b000018 eb4afbd3 433c3194 23eca589 89a470df d000f8c0 0000000c 00000001 01000003 00000000 00000000 0000000c 2012-10-21 17:09:50: [48795] DEBUG: encryption(aes) 2012-10-21 17:09:50: [48795] DEBUG: with key: 2012-10-21 17:09:50: [48795] DEBUG: 3075a394 d39a8fff 8a5636f8 fbb01c85 9bf5b2ce 2a3c5cee d99a8a75 051429e6 2012-10-21 17:09:50: [48795] DEBUG: encrypted payload by IV: 2012-10-21 17:09:50: [48795] DEBUG: 99e186a3 76075df4 ec054556 cb5f241b 2012-10-21 17:09:50: [48795] DEBUG: save IV for next: 2012-10-21 17:09:50: [48795] DEBUG: 80c14ad8 9c6c14e7 21337186 a8e12381 2012-10-21 17:09:50: [48795] DEBUG: encrypted. 2012-10-21 17:09:50: [48795] DEBUG: Adding NON-ESP marker 2012-10-21 17:09:50: [48795] DEBUG: 80 bytes from 192.168.157.128[4500] to 193.110.157.149[4500] 2012-10-21 17:09:50: [48795] DEBUG: sockname 192.168.157.128[4500] 2012-10-21 17:09:50: [48795] DEBUG: send packet from 192.168.157.128[4500] 2012-10-21 17:09:50: [48795] DEBUG: send packet to 193.110.157.149[4500] 2012-10-21 17:09:50: [48795] DEBUG: 1 times of 80 bytes message will be sent to 193.110.157.149[4500] 2012-10-21 17:09:50: [48795] DEBUG: 00000000 4eab8aed 8005ac9f 72c877a5 2b9365f5 08100501 90b9b4ba 0000004c 392bd82e 27074498 33978bc2 49514a4d 77dc9c7e ba3ecda4 fb3feef5 96ce6062 80c14ad8 9c6c14e7 21337186 a8e12381 2012-10-21 17:09:50: [48795] DEBUG: sendto Information notify. 2012-10-21 17:09:50: [48795] DEBUG: unbindph12. 2012-10-21 17:09:50: [48795] DEBUG: IV freed 2012-10-21 17:09:50: [48795] DEBUG: received disconnect command on vpn control socket. 2012-10-21 17:09:50: [48795] WARNING: in purgephXbydstaddrwop... purging phase1 and related phase2s 2012-10-21 17:09:50: [48795] INFO: ISAKMP-SA expired 192.168.157.128[4500]-193.110.157.149[4500] spi:4eab8aed8005ac9f:72c877a52b9365f5 2012-10-21 17:09:50: [48795] DEBUG2: no ph1bind replacement found. NULL ph1. 2012-10-21 17:09:50: [48795] INFO: caught signal 13 2012-10-21 17:09:50: [48795] DEBUG: vpn_control socket closed by peer. 2012-10-21 17:09:50: [48795] DEBUG: vpncontrol_close_comm. 2012-10-21 17:09:51: [48795] INFO: ISAKMP-SA deleted 192.168.157.128[4500]-193.110.157.149[4500] spi:4eab8aed8005ac9f:72c877a52b9365f5 2012-10-21 17:09:51: [48795] DEBUG: an undead schedule has been deleted. 2012-10-21 17:09:51: [48795] DEBUG: IV freed 2012-10-21 17:09:51: [48795] DEBUG: Freeing IKE-Session to 193.110.157.149[4500]. 2012-10-21 17:09:53: [48795] DEBUG: === 2012-10-21 17:09:53: [48795] DEBUG: 360 bytes message received from 193.110.157.149[500] to 192.168.157.128[500] 2012-10-21 17:09:53: [48795] DEBUG: 4eab8aed 8005ac9f e0c91518 dfb71733 01100400 00000000 00000168 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 0a000084 1602f7ac e0e09e24 dbdd6299 70ff11a1 c23620f3 432e8bd3 25b6b91e 9f1fff7d 97b431ea 6ef2879e 8b137376 ebbb9bb7 bff42feb 706eee48 95c6a95c 7f7d9ad0 39da83d0 ae53ad12 a5acbacc 56d1fbbe 6b211cc4 410b9bf0 d0b95ece 14c9b4ba bb77cf93 4a4f2ef0 fd80240f 942d33bd 35da87ca e23cc017 781e66bf 6b06fc4b 05000014 bd6ba2ac 4292a563 58564687 c55a6b6c 0800000c 01000000 c16e9d95 0d000018 8a7f7e4e f422febc 6085580b a57f88fc 84455791 14000014 afcad713 68a1f1c9 6b8696fc 77570100 14000018 94694308 d8b5a0c5 4fa11abc 852694bf b62df8f5 0d000018 a6b3c640 9fbdf9d0 ca20c506 0ca58566 dc8f941c 00000014 4a131c81 07035845 5c5728f2 0e95452f 2012-10-21 17:09:53: [48795] DEBUG: malformed cookie received or the spi expired. 2012-10-21 17:09:56: [48795] DEBUG: === 2012-10-21 17:09:56: [48795] DEBUG: 40 bytes message received from 193.110.157.149[500] to 192.168.157.128[500] 2012-10-21 17:09:56: [48795] DEBUG: 4eab8aed 8005ac9f 72c877a5 2b9365f5 0b100500 f3047be3 00000028 0000000c 00000001 01000010 2012-10-21 17:09:56: [48795] ERROR: unknown Informational exchange received. 2012-10-21 17:09:59: [48795] DEBUG: === 2012-10-21 17:09:59: [48795] DEBUG: 360 bytes message received from 193.110.157.149[500] to 192.168.157.128[500] 2012-10-21 17:09:59: [48795] DEBUG: 4eab8aed 8005ac9f 0315749e 3b268eed 01100400 00000000 00000168 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 0a000084 90fe3626 2e579b68 ad8de285 22233901 76b99bcf b824c1f9 0ec2071d c22c0b6a 574d9742 9ddcf87b e65f7f01 fa1881d0 0bb629ed efc2a70b dce7b5c7 f1a49d2e e671e300 fdd1e9ba 220afe18 b8ace2d7 476cd669 ebb616e3 14a22f8b c3973e6d 01f8516d ed83fbfa 14f5d824 095059b1 71b6c4c3 8faa5316 9aed0872 bb5d1bbe 05000014 7a4c6e17 2d5480c6 5c227ce3 7348fa56 0800000c 01000000 c16e9d95 0d000018 cf917163 bd9c6b00 30f074dd 3d0dd4b4 5b0648c9 14000014 afcad713 68a1f1c9 6b8696fc 77570100 14000018 35058d68 e3ffc548 6447b441 cde2cf94 f0057a5d 0d000018 9e1bc443 3594f754 15aa26ef f7e3ad90 556de2bd 00000014 4a131c81 07035845 5c5728f2 0e95452f 2012-10-21 17:09:59: [48795] DEBUG: malformed cookie received or the spi expired. 2012-10-21 17:10:03: [48795] DEBUG: === 2012-10-21 17:10:03: [48795] DEBUG: 360 bytes message received from 193.110.157.149[500] to 192.168.157.128[500] 2012-10-21 17:10:03: [48795] DEBUG: 4eab8aed 8005ac9f 72c877a5 2b9365f5 01100400 00000000 00000168 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 0a000084 6c1118c2 78bf5aa2 e005c4f1 ec90358e e4ae06cf 412c54e8 6f279cd6 3483682a 4c065fb3 12ccde9d 733100a0 8a9af92e 01dd0bb3 892707f7 7b5bb4ad 16caf87b bab673bf 28fafe58 446eea50 fa4a91bf 1186a610 54d1effa eb4fcc00 04e91556 92039f7e 9cdde760 73e24974 dc0c4e5f d9f466c9 1a230818 be903d86 6267de9c 05000014 6540ef15 22f2738c 4743a2ab 59e22cf1 0800000c 01000000 c16e9d95 0d000018 3b9bf11a 0be6b385 872c8ecd 3a2c208e 7a91f76c 14000014 afcad713 68a1f1c9 6b8696fc 77570100 14000018 ae370be4 663d0928 87bad6d5 7f39dbad 1d256e85 0d000018 dae5467d 2c98c90f 40a2625c 7aa1581d 5c607180 00000014 4a131c81 07035845 5c5728f2 0e95452f 2012-10-21 17:10:03: [48795] DEBUG: malformed cookie received or the spi expired. 2012-10-21 17:10:06: [48795] DEBUG: === 2012-10-21 17:10:06: [48795] DEBUG: 360 bytes message received from 193.110.157.149[500] to 192.168.157.128[500] 2012-10-21 17:10:06: [48795] DEBUG: 4eab8aed 8005ac9f e0c91518 dfb71733 01100400 00000000 00000168 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 0a000084 1602f7ac e0e09e24 dbdd6299 70ff11a1 c23620f3 432e8bd3 25b6b91e 9f1fff7d 97b431ea 6ef2879e 8b137376 ebbb9bb7 bff42feb 706eee48 95c6a95c 7f7d9ad0 39da83d0 ae53ad12 a5acbacc 56d1fbbe 6b211cc4 410b9bf0 d0b95ece 14c9b4ba bb77cf93 4a4f2ef0 fd80240f 942d33bd 35da87ca e23cc017 781e66bf 6b06fc4b 05000014 bd6ba2ac 4292a563 58564687 c55a6b6c 0800000c 01000000 c16e9d95 0d000018 8a7f7e4e f422febc 6085580b a57f88fc 84455791 14000014 afcad713 68a1f1c9 6b8696fc 77570100 14000018 94694308 d8b5a0c5 4fa11abc 852694bf b62df8f5 0d000018 a6b3c640 9fbdf9d0 ca20c506 0ca58566 dc8f941c 00000014 4a131c81 07035845 5c5728f2 0e95452f 2012-10-21 17:10:06: [48795] DEBUG: malformed cookie received or the spi expired. 2012-10-21 17:10:12: [48795] DEBUG: === 2012-10-21 17:10:12: [48795] DEBUG: 360 bytes message received from 193.110.157.149[500] to 192.168.157.128[500] 2012-10-21 17:10:12: [48795] DEBUG: 4eab8aed 8005ac9f 0315749e 3b268eed 01100400 00000000 00000168 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 0a000084 90fe3626 2e579b68 ad8de285 22233901 76b99bcf b824c1f9 0ec2071d c22c0b6a 574d9742 9ddcf87b e65f7f01 fa1881d0 0bb629ed efc2a70b dce7b5c7 f1a49d2e e671e300 fdd1e9ba 220afe18 b8ace2d7 476cd669 ebb616e3 14a22f8b c3973e6d 01f8516d ed83fbfa 14f5d824 095059b1 71b6c4c3 8faa5316 9aed0872 bb5d1bbe 05000014 7a4c6e17 2d5480c6 5c227ce3 7348fa56 0800000c 01000000 c16e9d95 0d000018 cf917163 bd9c6b00 30f074dd 3d0dd4b4 5b0648c9 14000014 afcad713 68a1f1c9 6b8696fc 77570100 14000018 35058d68 e3ffc548 6447b441 cde2cf94 f0057a5d 0d000018 9e1bc443 3594f754 15aa26ef f7e3ad90 556de2bd 00000014 4a131c81 07035845 5c5728f2 0e95452f 2012-10-21 17:10:12: [48795] DEBUG: malformed cookie received or the spi expired. 2012-10-21 17:10:26: [48795] DEBUG: === 2012-10-21 17:10:26: [48795] DEBUG: 360 bytes message received from 193.110.157.149[500] to 192.168.157.128[500] 2012-10-21 17:10:26: [48795] DEBUG: 4eab8aed 8005ac9f 72c877a5 2b9365f5 01100400 00000000 00000168 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 0a000084 6c1118c2 78bf5aa2 e005c4f1 ec90358e e4ae06cf 412c54e8 6f279cd6 3483682a 4c065fb3 12ccde9d 733100a0 8a9af92e 01dd0bb3 892707f7 7b5bb4ad 16caf87b bab673bf 28fafe58 446eea50 fa4a91bf 1186a610 54d1effa eb4fcc00 04e91556 92039f7e 9cdde760 73e24974 dc0c4e5f d9f466c9 1a230818 be903d86 6267de9c 05000014 6540ef15 22f2738c 4743a2ab 59e22cf1 0800000c 01000000 c16e9d95 0d000018 3b9bf11a 0be6b385 872c8ecd 3a2c208e 7a91f76c 14000014 afcad713 68a1f1c9 6b8696fc 77570100 14000018 ae370be4 663d0928 87bad6d5 7f39dbad 1d256e85 0d000018 dae5467d 2c98c90f 40a2625c 7aa1581d 5c607180 00000014 4a131c81 07035845 5c5728f2 0e95452f 2012-10-21 17:10:26: [48795] DEBUG: malformed cookie received or the spi expired. 2012-10-21 17:10:29: [48795] DEBUG: === 2012-10-21 17:10:29: [48795] DEBUG: 360 bytes message received from 193.110.157.149[500] to 192.168.157.128[500] 2012-10-21 17:10:29: [48795] DEBUG: 4eab8aed 8005ac9f e0c91518 dfb71733 01100400 00000000 00000168 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 0a000084 1602f7ac e0e09e24 dbdd6299 70ff11a1 c23620f3 432e8bd3 25b6b91e 9f1fff7d 97b431ea 6ef2879e 8b137376 ebbb9bb7 bff42feb 706eee48 95c6a95c 7f7d9ad0 39da83d0 ae53ad12 a5acbacc 56d1fbbe 6b211cc4 410b9bf0 d0b95ece 14c9b4ba bb77cf93 4a4f2ef0 fd80240f 942d33bd 35da87ca e23cc017 781e66bf 6b06fc4b 05000014 bd6ba2ac 4292a563 58564687 c55a6b6c 0800000c 01000000 c16e9d95 0d000018 8a7f7e4e f422febc 6085580b a57f88fc 84455791 14000014 afcad713 68a1f1c9 6b8696fc 77570100 14000018 94694308 d8b5a0c5 4fa11abc 852694bf b62df8f5 0d000018 a6b3c640 9fbdf9d0 ca20c506 0ca58566 dc8f941c 00000014 4a131c81 07035845 5c5728f2 0e95452f 2012-10-21 17:10:29: [48795] DEBUG: malformed cookie received or the spi expired. 2012-10-21 17:10:35: [48795] DEBUG: === 2012-10-21 17:10:35: [48795] DEBUG: 360 bytes message received from 193.110.157.149[500] to 192.168.157.128[500] 2012-10-21 17:10:35: [48795] DEBUG: 4eab8aed 8005ac9f 0315749e 3b268eed 01100400 00000000 00000168 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 0a000084 90fe3626 2e579b68 ad8de285 22233901 76b99bcf b824c1f9 0ec2071d c22c0b6a 574d9742 9ddcf87b e65f7f01 fa1881d0 0bb629ed efc2a70b dce7b5c7 f1a49d2e e671e300 fdd1e9ba 220afe18 b8ace2d7 476cd669 ebb616e3 14a22f8b c3973e6d 01f8516d ed83fbfa 14f5d824 095059b1 71b6c4c3 8faa5316 9aed0872 bb5d1bbe 05000014 7a4c6e17 2d5480c6 5c227ce3 7348fa56 0800000c 01000000 c16e9d95 0d000018 cf917163 bd9c6b00 30f074dd 3d0dd4b4 5b0648c9 14000014 afcad713 68a1f1c9 6b8696fc 77570100 14000018 35058d68 e3ffc548 6447b441 cde2cf94 f0057a5d 0d000018 9e1bc443 3594f754 15aa26ef f7e3ad90 556de2bd 00000014 4a131c81 07035845 5c5728f2 0e95452f 2012-10-21 17:10:35: [48795] DEBUG: malformed cookie received or the spi expired.