[Mar 5 06:39:54]iked_config_process_config_list, configuration diff complete [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Received IKE Trigger message with local_gw_addr = 13.80.80.10 remote_gw_addr = 80.80.80.10 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Triggering the IKE negotiation .... [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_pm_trigger_callback called for SERVER-BOX [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Triggering negotiation for SERVER-BOX config block [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_pm_trigger_callback: lookup peer entry for gateway SERVER-BOX, local_port=500, remote_port=500 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_lookup_peer_entry: Peer entry 0x0 Not FOUND for local 10.80.80.13:500 and remote 10.80.80.80:500 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_create_peer_entry: Created peer entry 0x8c95200 for local 10.80.80.13:500 remote 10.80.80.80:500 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_fetch_or_create_peer_entry: Create peer entry 0x8c95200 for local 10.80.80.13:500 remote 10.80.80.80:500. gw SERVER-BOX, VR id 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_dist_table_entry_update : Dist table entry creation not needed [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_pm_trigger_callback: FOUND peer entry for gateway SERVER-BOX [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Initiating new P1 SA for gateway SERVER-BOX [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ssh_ikev2_ike_sa_allocate: Allocating IKE SA 10.80.80.80;500/4500 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] chassis 0 fpc 0 pic 0 kmd-instance 0 current tunnel id 3283988 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Allocated IKE SA index 3283989, ref cnt 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] P1 SA 3283989 start timer. timer duration 30, reason 1. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_ike_sa_alloc_cb: Allocated IKE SA 8c9f400 I4444ab12 2717716d (10.80.80.80;500/4500) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_init: Allocating transmission windows for SA 8c9f400 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_allocate_exchange_data: Calling exchange_data_alloc [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_pm_ike_exchange_data_alloc: Successfully inserted pm_ed 8c95600 into list for sa_cfg N/A [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Exchange data allocated for IKE SA 3283989. VR 65535 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8c9f400 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ssh_ikev2_ipsec_create_sa: State = IKE_INIT_SA [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8c9f400 ED 8c94028 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8c9f400 ED 8c94028 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8c9f400 ED 8c94028 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8c9f400 ED 8c94028 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Taking reference to P1 SA 3283989 to ref count 1 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=SERVER-BOX [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_peer_insert_p1sa_entry: Insert p1 sa 3283989 in peer entry 0x8c95200 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ssh_ikev2_ts_allocate: Allocated ts 0x8bf33c0, ref_cnt 1 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ssh_ikev2_ts_allocate: Allocated ts 0x8bf33e0, ref_cnt 1 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ssh_ikev2_ipsec_send: Creating IKE and IPsec SA 10.80.80.80;500 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_allocate: Allocated packet 8c38800 from freelist [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_allocate: [8c38800/0] Allocating [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ssh_set_thread_debug_info: ssh_ikev2_ipsec_send: set thread debug info - local 10.80.80.13 remote 10.80.80.80 neg 0x0 neg->ike_sa 0x0 ike_sa 0x8c9f400 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_allocate_id: Allocated m-id 0 SA 8c9f400 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Taking reference to P1 SA 3283989 to ref count 2 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_reference_exchange_data: Taking reference to exchange data 8c94028 (to 2) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_update: [8c38800/8c9f400] Window update (fwd=8c21a80, rev=8c21adc): m-id 0 I ; sent [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_update: [8c38800/8c9f400] Packet in window (or cause slide): m-id 0 left 0 right 0 size 1 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_update: [8c38800/8c9f400] Stored packet into window 8c21a80 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ssh_ikev2_ipsec_send: Started IPsec SA creation 10.80.80.80;500 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Attach ed 8c94028 to P1 SA 3283989, slot 0. op handle 8c942a0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_reference_exchange_data: Taking reference to exchange data 8c94028 (to 3) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ssh_ikev2_ts_free: ts 0x8bf33c0, ref_cnt 2 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ssh_ikev2_ts_free: ts 0x8bf33e0, ref_cnt 2 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_init_initiator_out_fill_sa: Calling fill_ike_sa [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] IKE SA fill called for negotiation of local:10.80.80.13, remote:10.80.80.80 IKEv2 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Initiator's proposing IKE SA payload SA([0](id = 1) protocol = IKE (1), AES CBC key len = 128, HMAC-SHA1-96, 1024 bit MODP, HMAC-SHA1 PRF; ) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_reply_cb_init_initiator_fill_ike_sa: [8c38800/8c9f400] IKE SA filled successfully [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_init_initiator_out_sa: [8c38800/8c9f400] Adding SAi1 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_encode_sa: [8c38800/8c9f400] SA([0](id = 1) protocol = IKE (1), AES CBC key len = 128, HMAC-SHA1-96, 1024 bit MODP, HMAC-SHA1 PRF; ) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_encode_sa: No IKE SPI [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_find_policy_group: [8c38800/8c9f400] Using first group = 2 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_init_initiator_out_dh_setup: [8c38800/8c9f400] Starting Diffie-Hellman using group = 2 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Using software for dh_gen operation [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Inside kmd_sw_dh_gen... [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_init_i_out_dh_setup_cb: [8c38800/8c9f400] Diffie-Hellman done using group = 2 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_init_i_out_dh_setup_cb: [8c38800/8c9f400] Adding KEi [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_encode_ke: [8c38800/8c9f400] KE(group = 1024 bit MODP (2), len = 128, data = 2320c8e2 5d3ca6ab 3118c863 d6e53e5d a42f6748 c55d012a 4dc55e96 b8635f58 6347331c 5a0de1c8 27a57178 8a8f7f29 4 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_create_nonce_and_add: [8c38800/8c9f400] Adding NONCE [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_encode_nonce: [8c38800/8c9f400] NONCE(len = 32, data = 906155fd c6dca621 e591151e ab8478e1 42ace2a0 974ebbcb 0e6b2c13 7b8cbdff) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_add_nat_discovery_notify: Calling get_local_address_list [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_add_nat_discovery_notify_cb: [8c38800/8c9f400] Got 1 addresses [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_calc_nat_detection: Calculating NAT hash, ip = 10.80.80.13, port = 500, spi_i = 4444ab122717716d, spi_r = 0000000000000000 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_calc_nat_detection: NAT hash = 3a8a0e17 c67e0448 30f8f31d e879ebcf 6f29fa00 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_add_nat_discovery_notify_cb: [8c38800/8c9f400] Adding N [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_encode_notify: [8c38800/8c9f400] N(type = NAT detection source IP (16388), protocol = None (0), spi_len = 0, spi = , data_len = 20 data = 3a8a0e17 c67e0448 30f8f31d e879ebcf 6f29fa00) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_calc_nat_detection: Calculating NAT hash, ip = 10.80.80.80, port = 500, spi_i = 4444ab122717716d, spi_r = 0000000000000000 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_calc_nat_detection: NAT hash = ad1d99c3 3f50c600 83c7c9f2 edf8daeb d2653944 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_add_nat_discovery_notify_cb: [8c38800/8c9f400] Adding N [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_encode_notify: [8c38800/8c9f400] N(type = NAT detection destination IP (16389), protocol = None (0), spi_len = 0, spi = , data_len = 20 data = ad1d99c3 3f50c600 83c7c9f2 edf8daeb d265394 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_add_notify: Calling notify_request [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Parsing notification payload for local:10.80.80.13, remote:10.80.80.80 IKEv2 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_reply_cb_notify_request: [8c38800/8c9f400] No more notifies [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_add_vid: Calling vendor_id_request [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_reply_cb_vid_request: [8c38800/8c9f400] Got VID [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_reply_cb_vid_request: [8c38800/8c9f400] Adding VID [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_encode_vendor_id: [8c38800/8c9f400] VID(len = 28, data = 69936922 8741c6d4 ca094c93 e242c9de 19e7b7c6 00000005 00000500) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_pm_ike_request_vendor_id: Sending VID NetScreen Technologies [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_reply_cb_vid_request: [8c38800/8c9f400] No more VIDs [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_add_private_payload: Calling private_payload_request [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_reply_cb_private_payload_request: [8c38800/8c9f400] No more private payloads [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_send: [8c38800/8c9f400] Sending packet [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_st_send_request_address: [8c38800/8c9f400] Sending packet/request address pair [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_st_send: [8c38800/8c9f400] Sending packet/Do [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_st_send: Sending packet 0 :500 to 10.80.80.80:500 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000000: 4444 ab12 2717 716d 0000 0000 0000 0000 DD..'.qm........ [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000010: 2120 2208 0000 0000 0000 0150 2200 0030 ! "........P"..0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000020: 0000 002c 0101 0004 0300 000c 0100 000c ...,............ [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000030: 800e 0080 0300 0008 0300 0002 0300 0008 ................ [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000040: 0400 0002 0000 0008 0200 0002 2800 0088 ............(... [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000050: 0002 0000 2320 c8e2 5d3c a6ab 3118 c863 ....# ..]<..1..c [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000060: d6e5 3e5d a42f 6748 c55d 012a 4dc5 5e96 ..>]./gH.].*M.^. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000070: b863 5f58 6347 331c 5a0d e1c8 27a5 7178 .c_XcG3.Z...'.qx [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000080: 8a8f 7f29 416f db22 cdde ac36 3bb7 ef4e ...)Ao."...6;..N [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000090: 5196 35ed 8cc2 2492 2900 6ef0 9ff9 ce01 Q.5...$.).n..... [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 000000a0: c282 b523 76ab 4e17 b65d a150 cebd af0b ...#v.N..].P.... [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 000000b0: 6855 233c 7219 abdd 600d c0ef f7ac d04f hU# 10.80.80.80] 000000c0: 07dd a68a 115c e647 6bd0 85b2 c4f0 7538 .....\.Gk.....u8 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 000000d0: 9e99 f43a 2900 0024 9061 55fd c6dc a621 ...:)..$.aU....! [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 000000e0: e591 151e ab84 78e1 42ac e2a0 974e bbcb ......x.B....N.. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 000000f0: 0e6b 2c13 7b8c bdff 2900 001c 0000 4004 .k,.{...).....@. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000100: 3a8a 0e17 c67e 0448 30f8 f31d e879 ebcf :....~.H0....y.. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000110: 6f29 fa00 2b00 001c 0000 4005 ad1d 99c3 o)..+.....@..... [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000120: 3f50 c600 83c7 c9f2 edf8 daeb d265 3944 ?P...........e9D [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000130: 0000 0020 6993 6922 8741 c6d4 ca09 4c93 ... i.i".A....L. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000140: e242 c9de 19e7 b7c6 0000 0005 0000 0500 .B.............. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_udp_send_packet: [8c38800/8c9f400] Sending packet using VR id 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_st_send: Registering timeout at 10000 (10.0) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] *** Processing received packet from 10.80.80.80:500 to 10.80.80.13:0 VR 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_st_input_start: [8c38c00/0] Processing received [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Found IKEv2 P1 SA 3283989 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Taking reference to P1 SA 3283989 to ref count 3 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_st_input_get_or_create_sa: [8c38c00/8c9f400] Packet to existing v2 SA [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_st_verify: [8c38c00/8c9f400] Verifying [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_check: [8c38c00/8c9f400] Window check (fwd=8c21adc rev=8c21a80): m-id 0 R; received [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_check: [8c38c00/8c9f400] PASS: Requested response for 8c38800: Sending to SM. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_reference_exchange_data: Taking reference to exchange data 8c94028 (to 4) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_st_forward: [8c38c00/8c9f400] Forwarding packet to state machine [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_st_forward: [8c38c00/8c9f400] R: IKE SA REFCNT: 3 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_packet: [8c38c00/8c9f400] Decoding packet [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_packet: [8c38c00/8c9f400] We have old context [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_sa: [8c38c00/8c9f400] SA([0](id = 1) protocol = IKE (1), AES CBC key len = 128, HMAC-SHA1-96, HMAC-SHA1 PRF, 1024 bit MODP; ) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_ke: [8c38c00/8c9f400] KE(group = 1024 bit MODP (2), len = 128, data = 174f7bcf 89d1b0a9 f3b5082c a47284bd f1e633df b27b9ce7 a5ddce19 ef5fd95f c0c87dad 88ec8544 dd6dfb1a 72ca743b 6 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_nonce: [8c38c00/8c9f400] NONCE(len = 32, data = e7bdfd9d dd4535a5 ee0ad6bc 436e44be eaf70461 ca5d631c 3f3ccfe0 492a31d3) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_notify: Calling notify_received [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:10.80.80.13 remote:10.80.80.80 IKEv2 for P1 SA 3283989 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Ignoring unauthenticated message, notify_message_type is 16388 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_notify: [8c38c00/8c9f400] N(type = NAT detection source IP (16388), protocol = None (0), spi_len = 0, spi = , data_len = 20 data = f15746d5 941ec68f 52578165 e52af16c d1e3677b) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_notify: Calling notify_received [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:10.80.80.13 remote:10.80.80.80 IKEv2 for P1 SA 3283989 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Ignoring unauthenticated message, notify_message_type is 16389 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_notify: [8c38c00/8c9f400] N(type = NAT detection destination IP (16389), protocol = None (0), spi_len = 0, spi = , data_len = 20 data = 9b30bdb6 f69d8121 a6ca82d3 2c5f4e27 6defb9d [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_notify: Calling notify_received [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload Multiple auth supported from local:10.80.80.13 remote:10.80.80.80 IKEv2 for P1 SA 3283989 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Ignoring unauthenticated message, notify_message_type is 16404 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_notify: [8c38c00/8c9f400] N(type = Multiple auth supported (16404), protocol = None (0), spi_len = 0, spi = , data_len = 0 data = ) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_vendor_id: Calling vendor_id [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_vendor_id: [8c38c00/8c9f400] VID(len = 16, data = 882fe56d 6fd20dbc 2251613b 2ebe5beb) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_packet: [8c38c00/8c9f400] Updating responder IKE SPI to IKE SA 8c9f400 I 4444ab12 2717716d R 4980326c ef722580 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_packet: [8c38c00/8c9f400] Received packet: HDR, SA, KE, Nonce, N(NAT_DETECTION_SOURCE_IP), N(NAT_DETECTION_DESTINATION_IP), N(MULTIPLE_AUTH_SUPPORTED), Vid [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_dispatch: [8c38c00/8c9f400] Dispatching packet [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_dispatch: [8c38c00/8c9f400] Initiator side IKE_SA_INIT [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_process_notify: [8c38c00/8c9f400] Ignored status notify Multiple auth supported (16404) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_init_initiator_in_sa: [8c38c00/8c9f400] Verify SAr1 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_init_initiator_in_sa: [8c38c00/8c9f400] SAr1 was ok [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_init_initiator_in_ke: [8c38c00/8c9f400] KE was ok [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_check_nat_detection: Calling get_local_address_list [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_check_nat_detection_cb: [8c38c00/8c9f400] Got 1 addresses [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_calc_nat_detection: Calculating NAT hash, ip = 10.80.80.13, port = 500, spi_i = 4444ab122717716d, spi_r = 4980326cef722580 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_calc_nat_detection: NAT hash = 9b30bdb6 f69d8121 a6ca82d3 2c5f4e27 6defb9d2 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_compute_nat_detection: [8c38c00/8c9f400] We are not behind NAT [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_calc_nat_detection: Calculating NAT hash, ip = 10.80.80.80, port = 500, spi_i = 4444ab122717716d, spi_r = 4980326cef722580 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_calc_nat_detection: NAT hash = f15746d5 941ec68f 52578165 e52af16c d1e3677b [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_compute_nat_detection: [8c38c00/8c9f400] Remote end is not behind NAT [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_update: [8c38c00/8c9f400] Window update (fwd=8c21adc, rev=8c21a80): m-id 0 R; received [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_update: [8c38c00/8c9f400] Packet in window (or cause slide): m-id 0 left 0 right 0 size 1 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_free_exchange_data: Freeing exchange data from SA 8c9f400, ED 8c94028 (4) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Freeing reference to P1 SA 3283989 to ref count 2 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_update: [8c38c00/8c9f400] STOP-RETRANSMIT: Response to request 8c38800 with m-id 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_update: [8c38c00/8c9f400] Stored packet into window 8c21adc [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_allocate_id: Allocated m-id 1 SA 8c9f400 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_init_initiator_in_end: [8c38c00/8c9f400] State = AUTH_1ST [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_reply_packet_allocate: [8c38c00/8c9f400] Allocating reply packet [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_allocate: Allocated packet 8c39000 from freelist [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_allocate: [8c39000/0] Allocating [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ssh_set_thread_debug_info: ikev2_reply_packet_allocate: set thread debug info - local 10.80.80.13 remote 10.80.80.80 neg 0x0 neg->ike_sa 0x0 ike_sa 0x8c9f400 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_reply_packet_allocate: [8c38c00/0] Allocated reply packet [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_update: [8c39000/8c9f400] Window update (fwd=8c21a80, rev=8c21adc): m-id 1 I ; sent [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_update: [8c39000/8c9f400] Packet in window (or cause slide): m-id 1 left 1 right 1 size 1 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_update: [8c39000/8c9f400] Stored packet into window 8c21a80 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_init_initiator_in_end: [8c38c00/0] Move to the IKE_AUTH exchange [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_destroy: [8c38c00/0] Destructor [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_st_send_request_address: [8c38800/0] Sending packet/request address pair [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_st_send: [8c38800/0] Sending packet/Do [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_destroy: [8c38800/0] Destructor [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_free: [8c38800/0] Freeing [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_auth_initiator_out: [8c39000/8c9f400] Making sure that the SKEYSEED is calculated [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_skeyseed: Starting SKEYSEED calculation for SA 8c9f400 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Using software for dh_comp operation [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Inside kmd_sw_dh_comp... [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_restart_packet: [8c39000/8c9f400] Restarting packet [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_skeyseed_agree: SKEYSEED calculation done [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_add_id: Calling id [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_reply_cb_id: [8c39000/8c9f400] Adding IDi [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_encode_id: [8c39000/8c9f400] ID(type = ipv4 (1), len = 4, value = 10.80.80.13) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_add_certs: Calling get_certificates [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_reply_cb_get_certs: [8c39000/8c9f400] No private keys [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_reply_cb_get_certs: [8c39000/8c9f400] Got 0 certificates [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_add_certreq: Calling get_cas [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_reply_cb_get_cas: [8c39000/8c9f400] Got 0 CAs [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_add_id: Calling id [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_reply_cb_id: [8c39000/8c9f400] Adding IDr [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_encode_id: [8c39000/8c9f400] ID(type = ipv4 (1), len = 4, value = 10.80.80.80) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_auth_data: [8c39000/8c9f400] Using local packet [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_auth_data: [8c39000/8c9f400] Using responder nonce [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_auth_data: [8c39000/8c9f400] Using IDi and sk_pi [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_auth_initiator_out_auth_shared_key: [8c39000/8c9f400] Try to use shared key [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_add_auth_shared_key: Calling shared_key [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_pm_ike_pre_shared_key Start... [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_pm_id_validate NO remote ID, skip validation. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_reply_cb_shared_key_local: [8c39000/8c9f400] Shared key found [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_add_auth: [8c39000/8c9f400] Adding AUTH [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_encode_auth: [8c39000/8c9f400] AUTH(method = Shared key (2), len = 20, data = 554d0341 6e2dfcbf 4fdaa3a6 ebefb691 7f5780d2) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_auth_initiator_out_auth_done: [8c39000/8c9f400] No EAP [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_auth_initiator_out_alloc_sa: Calling ipsec_spi_allocate [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_pm_ipsec_spi_allocate: local:10.80.80.13, remote:10.80.80.80 IKEv2 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Allocated SPI [eb7dcb81]. proto 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Added (spi=0x81cb7deb, protocol=0) entry to the spi table [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Parsing notification payload for local:10.80.80.13, remote:10.80.80.80 IKEv2 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Ignoring notification of type 16404 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Ignoring notification of type 16389 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Ignoring notification of type 16388 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_reply_cb_auth_initiator_ipsec_spi_allocate: [8c39000/8c9f400] IPsec SA allocated successfully spi = 0x81cb7deb [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_add_conf: Calling conf_request [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_pm_ike_conf_request: SA-CFG SERVER-BOX not configured for config payload. Skipping... [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_reply_cb_conf: [8c39000/8c9f400] No Conf payload [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_auth_initiator_out_fill_sa: Calling fill_ipsec_sa [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_reply_cb_auth_initiator_fill_ipsec_sa: [8c39000/8c9f400] IPsec SA filled successfully [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_auth_initiator_out_sa: [8c39000/8c9f400] Adding SAi2 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_encode_sa: [8c39000/8c9f400] SA([0](id = 1) protocol = ESP (3), AES CBC key len = 128, HMAC-SHA1-96, No ESN; ) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_encode_sa: IPsec SPI = 0x81cb7deb [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_auth_initiator_out_ts: [8c39000/8c9f400] Adding TSi [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_encode_ts: [8c39000/8c9f400] TS(# ts = 1, [0] type = ipv4 range (7), protocol = 0, port = any, ip range = 0.0.0.0 - 255.255.255.255; ) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_auth_initiator_out_ts: [8c39000/8c9f400] Adding TSr [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_encode_ts: [8c39000/8c9f400] TS(# ts = 1, [0] type = ipv4 range (7), protocol = 0, port = any, ip range = 0.0.0.0 - 255.255.255.255; ) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_add_notify: Calling notify_request [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Parsing notification payload for local:10.80.80.13, remote:10.80.80.80 IKEv2 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Ignoring notification of type 16404 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Ignoring notification of type 16389 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Ignoring notification of type 16388 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_pm_ike_spd_notify_request: Sending Initial contact [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_reply_cb_notify_request: [8c39000/8c9f400] Notify from policymanager = 16384 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_reply_cb_notify_request: [8c39000/8c9f400] Adding N [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_encode_notify: [8c39000/8c9f400] N(type = Initial contact (16384), protocol = None (0), spi_len = 0, spi = , data_len = 0 data = ) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Sending IKE window size notification for IKE SA of size 1 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_configure: Reconfiguring transmission windows for SA 8c9f400 local 1 remote 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_reply_cb_notify_request: [8c39000/8c9f400] Notify from policymanager = 16385 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_reply_cb_notify_request: [8c39000/8c9f400] Adding N [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_encode_notify: [8c39000/8c9f400] N(type = Set window size (16385), protocol = None (0), spi_len = 0, spi = , data_len = 4 data = 00000001) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_reply_cb_notify_request: [8c39000/8c9f400] No more notifies [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_add_vid: Calling vendor_id_request [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_reply_cb_vid_request: [8c39000/8c9f400] No more VIDs [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_add_private_payload: Calling private_payload_request [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Construction NHTB payload for local:10.80.80.13, remote:10.80.80.80 IKEv2 P1 SA index 3283989 sa-cfg SERVER-BOX [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Peer router vendor is not Juniper. Not sending NHTB payload for sa-cfg SERVER-BOX, p1_sa=3283989 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_reply_cb_private_payload_request: [8c39000/8c9f400] No more private payloads [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_send: [8c39000/8c9f400] Sending packet [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_st_send_request_address: [8c39000/8c9f400] Sending packet/request address pair [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_st_send: [8c39000/8c9f400] Sending packet/Do [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_st_send: Sending packet 1 :500 to 10.80.80.80:500 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000000: 4444 ab12 2717 716d 4980 326c ef72 2580 DD..'.qmI.2l.r%. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000010: 2e20 2308 0000 0001 0000 00ec 2300 00d0 . #.........#... [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000020: 2510 853e 3d6a 8bb4 4916 aad1 2f01 c177 %..>=j..I.../..w [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000030: 2d36 3a3c 2990 96cb 8ab6 ce54 1f7b 4bc5 -6:<)......T.{K. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000040: 29d4 9d08 53a6 351f 699a 62bd 4621 781d )...S.5.i.b.F!x. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000050: 09dc fce9 0ed5 b7c1 7574 6639 c0fd cfa8 ........utf9.... [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000060: 5eb8 7510 8354 cde0 211d 9d7b 7b6e 41f6 ^.u..T..!..{{nA. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000070: cd1f fb9c 35fd 46c8 9463 2711 1961 57c4 ....5.F..c'..aW. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000080: b9a6 07ac ee99 e862 069b f5c9 f1f6 df82 .......b........ [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000090: 9df4 4984 0c29 0719 0cf1 0061 036b a593 ..I..).....a.k.. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 000000a0: 1a5e 0cd9 d34e 34b2 3d49 5a7b ef52 b633 .^...N4.=IZ{.R.3 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 000000b0: db89 11bd e8b1 aeaa c0ae 5b1f 8640 6bbe ..........[..@k. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 000000c0: 91f7 769d 9986 4394 e131 b052 e05c 6813 ..v...C..1.R.\h. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 000000d0: 9847 c426 90f8 e8fd 654f a1ea 8a7e 35bb .G.&....eO...~5. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 000000e0: 0913 d6dc 49d6 f787 d603 581a ....I.....X. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_udp_send_packet: [8c39000/8c9f400] Sending packet using VR id 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_st_send: Registering timeout at 10000 (10.0) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] *** Processing received packet from 10.80.80.80:500 to 10.80.80.13:0 VR 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_st_input_start: [8c39400/0] Processing received [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Found IKEv2 P1 SA 3283989 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Taking reference to P1 SA 3283989 to ref count 3 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_st_input_get_or_create_sa: [8c39400/8c9f400] Packet to existing v2 SA [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_st_verify: [8c39400/8c9f400] Verifying [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_check: [8c39400/8c9f400] Window check (fwd=8c21adc rev=8c21a80): m-id 1 R; received [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_check: [8c39400/8c9f400] PASS: Requested response for 8c39000: Sending to SM. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_reference_exchange_data: Taking reference to exchange data 8c94028 (to 4) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_st_forward: [8c39400/8c9f400] Forwarding packet to state machine [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_st_forward: [8c39400/8c9f400] R: IKE SA REFCNT: 3 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_packet: [8c39400/8c9f400] Decoding packet [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_packet: [8c39400/8c9f400] Encrypted packet [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_encr: Mac input [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000000: 4444 ab12 2717 716d 4980 326c ef72 2580 DD..'.qmI.2l.r%. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000010: 2e20 2320 0000 0001 0000 00dc 2400 00c0 . # ........$... [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000020: 0ee1 a00d 3963 de35 8fc0 a9b5 a9c3 5fd8 ....9c.5......_. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000030: 86c0 cc53 7a73 75dc efc4 34aa 8e5e 222b ...Szsu...4..^"+ [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000040: 9a2d e953 757e 1730 8306 937b c75a 0e4c .-.Su~.0...{.Z.L [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000050: 2cc7 9e20 2b31 0e69 233b 0847 2ca0 fac8 ,.. +1.i#;.G,... [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000060: 5f45 646c 7a58 0152 7da8 04ca 619f e90a _EdlzX.R}...a... [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000070: eab5 7696 fe11 79d2 cdff ea01 0e9d 0047 ..v...y........G [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000080: 18eb 1470 7324 327a e93a d089 344c 9688 ...ps$2z.:..4L.. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000090: 1810 a4d3 4428 84c9 f90a 17f2 daae 8919 ....D(.......... [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 000000a0: abbd 7ac9 4f28 d331 a66f 0517 f038 b8d4 ..z.O(.1.o...8.. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 000000b0: b8e4 46c0 0fc4 98c2 e55a dd1a 1dcf 85ac ..F......Z...... [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 000000c0: 7e84 bd88 0148 60d2 63ef 4688 3ebe 128a ~....H`.c.F.>... [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_encr: Mac output [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000000: a4a1 7713 e132 214e 0269 1f60 ..w..2!N.i.` [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_encr: Mac from the packet [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000000: a4a1 7713 e132 214e 0269 1f60 ..w..2!N.i.` [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_encr: Padding of 15 bytes [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] 00000000: b3b9 aa39 d2a5 f719 38ba f3ca bbbb 66 ...9....8.....f [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_update: [8c39400/8c9f400] Window update (fwd=8c21adc, rev=8c21a80): m-id 1 R; received [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_make_space: [8c39400/8c9f400] Free old packet 8c38c00. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_done: [8c38c00/0] Scheduling packet (m-id=0) to be freed [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_done: [8c38c00/0] Destroyed already. Thread completed. Freeing now. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_free: [8c38c00/0] Freeing [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_update: [8c39400/8c9f400] Packet in window (or cause slide): m-id 1 left 1 right 1 size 1 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_free_exchange_data: Freeing exchange data from SA 8c9f400, ED 8c94028 (4) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Freeing reference to P1 SA 3283989 to ref count 2 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_update: [8c39400/8c9f400] STOP-RETRANSMIT: Response to request 8c39000 with m-id 1 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_update: [8c39400/8c9f400] Stored packet into window 8c21adc [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_encr: [8c39400/8c9f400] Packet decrypted successfully [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_packet: [8c39400/8c9f400] We have old context [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_id: [8c39400/8c9f400] IDr(type = ipv4 (1), len = 4, value = 10.80.80.80) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_auth: [8c39400/8c9f400] AUTH(method = Shared key (2), len = 20, data = 2b970008 6630c552 566a469f dd8ee5e7 07a46fc5) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_sa: [8c39400/8c9f400] SA([0](id = 1) protocol = ESP (3), spi_len = 4, spi = 0xc9c54fcc, AES CBC key len = 128, HMAC-SHA1-96, No ESN; ) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ssh_ikev2_ts_allocate: Allocated ts 0x8bf34c0, ref_cnt 1 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_ts: [8c39400/8c9f400] TSi(# ts = 1, [0] type = ipv4 range (7), protocol = 0, port = any, ip range = 2.0.0.0 - 2.255.255.255; ) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ssh_ikev2_ts_allocate: Allocated ts 0x8bf3e20, ref_cnt 1 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_ts: [8c39400/8c9f400] TSr(# ts = 1, [0] type = ipv4 range (7), protocol = 0, port = any, ip range = 1.0.0.0 - 1.255.255.255; ) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_notify: Calling notify_received [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload unknown from local:10.80.80.13 remote:10.80.80.80 IKEv2 for P1 SA 3283989 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Ignoring unauthenticated message, notify_message_type is 16403 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_notify: [8c39400/8c9f400] N(type = unknown (16403), protocol = None (0), spi_len = 0, spi = , data_len = 4 data = 00014d93) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_decode_packet: [8c39400/8c9f400] Received packet: HDR, IDr, AUTH, SA, TSi, TSr, N(RESERVED) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_dispatch: [8c39400/8c9f400] Dispatching packet [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_dispatch: [8c39400/8c9f400] Initiator side IKE_AUTH [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_process_notify: [8c39400/8c9f400] Ignored status notify unknown (16403) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_auth_data: [8c39400/8c9f400] Using remote packet [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_auth_data: [8c39400/8c9f400] Using initiator nonce [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_auth_data: [8c39400/8c9f400] Using IDr and sk_pr [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_auth_initiator_in_shared_key: [8c39400/8c9f400] Verify shared key AUTH payload [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_check_auth_shared_key: Calling shared_key [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_pm_ike_pre_shared_key Start... [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_fb_idv2_to_idv1: Converting the IKEv2 payload ID ID(type = ipv4 (1), len = 4, value = 10.80.80.80) to IKEv1 ID [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_fb_idv2_to_idv1: IKEv2 payload ID converted to IKEv1 payload ID ipv4(any:0,[0..3]=10.80.80.80) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_pm_id_validate called with id ipv4(any:0,[0..3]=10.80.80.80) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] kmd_ipaddr2ikeid: ipaddr = 10.80.80.80 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_pm_id_validate Use default id [ipv4(any:0,[0..3]=10.80.80.80)] [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_pm_id_validate default id matched. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_reply_cb_shared_key_auth_verify: [8c39400/8c9f400] Auth payload ok [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_auth_initiator_in_eap: [8c39400/8c9f400] State = AUTH_LAST [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_auth_initiator_in_eap: [8c39400/8c9f400] SAr2, TSi, or TSr, so this is final packet [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_auth_initiator_in_sa: [8c39400/8c9f400] Verify SAr2 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_auth_initiator_in_sa: [8c39400/8c9f400] SAr2 was ok [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ssh_ikev2_ts_free: ts 0x8bf33c0, ref_cnt 1 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ssh_ikev2_ts_free: ts 0x8bf33e0, ref_cnt 1 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_auth_initiator_in_ts: [8c39400/8c9f400] TSi and TSr were ok [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_auth_initiator_in_done: Calling ipsec_sa_install [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_pm_ipsec_sa_install: local:10.80.80.13, remote:10.80.80.80 IKEv2 for SA-CFG SERVER-BOX [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Parsing notification payload for local:10.80.80.13, remote:10.80.80.80 IKEv2 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Ignoring notification of type 16403 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Ignoring notification of type 16404 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Ignoring notification of type 16389 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Ignoring notification of type 16388 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_update_sa_cfg_port sa_cfg(SERVER-BOX) local_port(0)and remote_port(500) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Setting lifetime 1200 and lifesize 0 for IPSec SA [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_pm_ipsec_sa_create: encr key len 16, auth key len: 20, salt len: 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Creating a SA spi=0x81cb7deb, proto=ESP pair_index = 1 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Added (spi=0x81cb7deb, protocol=ESP dst=10.80.80.13) entry to the peer hash table [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_sa_cfg_update_sa_cfg_child_sa_count Parent not found for sa_cfg SERVER-BOX [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_lookup_peer_entry: Peer entry 0x8c95200 FOUND for local 10.80.80.13:500 and remote 10.80.80.80:500 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Peer entry exist for local 10.80.80.13:500 and remote 10.80.80.80:500 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_peer_insert_sa_cfg_entry: insert sa_cfg tunnel_id entry 131074 into peer entry 0x8c95200 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Creating a SA spi=0xc9c54fcc, proto=ESP pair_index = 1 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Added (spi=0xc9c54fcc, protocol=ESP dst=10.80.80.80) entry to the peer hash table [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_sa_cfg_update_sa_cfg_child_sa_count Parent not found for sa_cfg SERVER-BOX [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_nhtb_update_on_sa_create: Interface st0.80 is P2P for sa_cfg SERVER-BOX. Thus ignoring NHTB notification message [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_pm_ipsec_sa_install: SA LIFE CREATED time 1394001833 with HARD LIFETIME SECONDS 1200 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Hardlife timer started for inbound SERVER-BOX with 1200 seconds/0 kilobytes [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Softlife timer started for inbound SERVER-BOX with 933 seconds/0 kilobytes [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] kmd_update_sa_in_kernel [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] In iked_fill_sa_bundle [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] SERVER-BOX : VPN Monitor Interval=0(0) Optimized=0(0) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_lookup_peer_entry: Peer entry 0x8c95200 FOUND for local 10.80.80.13:500 and remote 10.80.80.80:500 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_fill_sa_bundle : DPD Interval=0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] SA bundle remote gateway: IP 10.80.80.80 chosen [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] SA bundle local gateway: IP 10.80.80.13 chosen [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] In iked_fill_ipsec_ipc_sa_pair [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] In iked_fill_ipc_sa_keys [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] In iked_fill_ipc_sa_keys [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] In iked_fill_ipc_sa_keys [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] In iked_fill_ipc_sa_keys [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ----------------Voyager ipsec SA BUNDLE------------------- [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] SA pair update request for: Tunnel index: 131074 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Local Gateway address: 10.80.80.13 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Primary remote Gateway address: 10.80.80.80 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Backup remote Gateway State: Active [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Anti replay: counter-based enabled [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Window_size: 64 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Server Time: 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Peer : Static [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Mode : Tunnel [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] VPN Type : route-based [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Tunnel mtu: 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] DF bit: 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] local-if ifl idx: 1207959552 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] tunnel-if ifl idx: 1291845632 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Tunnel mtu: 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] DPD interval: 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] policy id: 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] NATT enabled: 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] NATT version: 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] NAT position: 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] SA Idle time: 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] SA Outbound install delay time: 1 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] IKED ID: 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] DIST ID: 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Keepalive interval: 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] VPN monitoring interval: 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] VPN monitoring optimized: 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Respond-bad-SPI: 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] seq_out: 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Local port: 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Remote port: 500 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] SA CFG name: SERVER-BOX [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Dial-up IKE ID: [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] RG ID: 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Group template tunnel ID: 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ----------------Incoming SA ------------------- [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] SPI: 0x81cb7deb Protocol: 2 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Algorithm: 130 Auth key. length: 20 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Encr key. length; 16 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ----------------Outgoing SA ------------------- [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] SPI: 0xc9c54fcc Protocol: 2 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Algorithm: 130 Auth key. length: 20 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Encr key. length; 16 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] In iked_ipsec_sa_pair_add Adding GENCFG msg with key; Tunnel = 131074;SPI-In = 0x81cb7deb [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Added dependency on SA config blob with tunnelid = 131074 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Successfully added ipsec SA PAIR [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_is_anchoring_instance sa_dist_id=0, self_dist_id=255 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] (iked_is_anchoring_instance): This is ANCHORING instance [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_lookup_peer_entry: Peer entry 0x8c95200 FOUND for local 10.80.80.13:500 and remote 10.80.80.80:500 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] kmd_update_sa_in_kernel [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_reply_cb_auth_initiator_install: [8c39400/8c9f400] IPsec SA installed successfully [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_auth_initiator_in_finish: Calling ike_sa_done [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_pm_ike_sa_done: local:10.80.80.13, remote:10.80.80.80 IKEv2 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_fb_idv2_to_idv1: Converting the IKEv2 payload ID ID(type = ipv4 (1), len = 4, value = 10.80.80.80) to IKEv1 ID [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_fb_idv2_to_idv1: IKEv2 payload ID converted to IKEv1 payload ID ipv4(any:0,[0..3]=10.80.80.80) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_pm_id_validate called with id ipv4(any:0,[0..3]=10.80.80.80) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] kmd_ipaddr2ikeid: ipaddr = 10.80.80.80 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_pm_id_validate Use default id [ipv4(any:0,[0..3]=10.80.80.80)] [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_pm_id_validate default id matched. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] IKE negotiation done for local:10.80.80.13, remote:10.80.80.80 IKEv2 with status: Error ok [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Parsing notification payload for local:10.80.80.13, remote:10.80.80.80 IKEv2 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Ignoring notification of type 16403 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Ignoring notification of type 16404 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Ignoring notification of type 16389 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Ignoring notification of type 16388 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_lookup_peer_entry: Peer entry 0x8c95200 FOUND for local 10.80.80.13:500 and remote 10.80.80.80:500 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Peer entry exist for local 10.80.80.13:500 and remote 10.80.80.80:500 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_pm_ike_sa_done: Success to create or find peer_entry for local:10.80.80.13:500, remote:10.80.80.80:500 in ike sa done [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] P1 SA 3283989 stop timer. timer duration 30, reason 1. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] P1 SA 3283989 start timer. timer duration 86400, reason 2. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] lifetime timers started for p1_sa index 3283989 (hard 86400, soft 85807 secs) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_p1_sa_tree_entry_add: Adding p1_sa (sa_index:3283989) to IKE P1 SA P-tree, gw=10.80.80.80 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_p1_sa_tree_entry_add: Added P1 SA node for: ike index: 3283989 remote ip: 10.80.80.80IKE P1_SA P-tree [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_auth_initiator_in_finish: Calling ipsec_sa_done [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Inside iked_pm_ipsec_sa_done [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] IPSec negotiation done successfully for SA-CFG SERVER-BOX for local:10.80.80.13, remote:10.80.80.80 IKEv2 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_unset_sa_cfg_p2_ed unset_sa_cfg_p2_ed, sa_cfg=SERVER-BOX [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_auth_initiator_in_finish: [8c39400/8c9f400] Calling finished callback [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] IPSec SA done callback. ed 8c94028. status: Error ok [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Detach ed 8c94028 from P1 SA 3283989, slot 0. [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_free_exchange_data: Freeing exchange data from SA 8c9f400, ED 8c94028 (3) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_auth_initiator_in_finish: [8c39400/8c9f400] Freeing reference and exchange data [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_free_exchange_data: Freeing exchange data from SA 8c9f400, ED 8c94028 (2) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_free_exchange_data: Freeing exchange data from SA 8c9f400, ED 8c94028 (1) [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8c9f400 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ssh_ikev2_ts_free: ts 0x8bf34c0, ref_cnt 1 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ssh_ikev2_ts_free: ts 0x8bf3e20, ref_cnt 1 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8c9f400 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8c9f400 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8c9f400 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_free_exchange_data: Calling exchange_data_free [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Freeing P2 Ed for sa-cfg N/A [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] iked_pm_ike_exchange_data_free: Successfully removed pm_ed 8c95600 from list for sa_cfg N/A [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_free_exchange_data: Successfully freed exchange data from SA 8c9f400 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Freeing reference to P1 SA 3283989 to ref count 1 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_state_auth_initiator_in_finish: [8c39400/8c9f400] Initial exchange finished [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_destroy: [8c39400/8c9f400] Destructor [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_destroy: F: IKE SA REFCNT: 1 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] Freeing reference to P1 SA 3283989 to ref count 0 [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_st_send_request_address: [8c39000/0] Sending packet/request address pair [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_st_send: [8c39000/0] Sending packet/Do [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_destroy: [8c39000/0] Destructor [Mar 5 06:43:53][10.80.80.13 <-> 10.80.80.80] ikev2_packet_free: [8c39000/0] Freeing [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] *** Processing received packet from 10.80.80.80:500 to 10.80.80.13:0 VR 0 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_packet_st_input_start: [8c39800/0] Processing received [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] Found IKEv2 P1 SA 3283989 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] Taking reference to P1 SA 3283989 to ref count 1 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_packet_st_input_get_or_create_sa: [8c39800/8c9f400] Packet to existing v2 SA [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_packet_st_verify: [8c39800/8c9f400] Verifying [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_check: [8c39800/8c9f400] Window check (fwd=8c21ac0 rev=8c21a9c): m-id 0 ; received [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_check: [8c39800/8c9f400] PASS: New request: inside the window. [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_packet_st_forward: [8c39800/8c9f400] Forwarding packet to state machine [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_packet_st_forward: [8c39800/8c9f400] R: IKE SA REFCNT: 1 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_decode_packet: [8c39800/8c9f400] Decoding packet [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_decode_packet: [8c39800/8c9f400] Encrypted packet [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_decode_encr: Mac input [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] 00000000: 4444 ab12 2717 716d 4980 326c ef72 2580 DD..'.qmI.2l.r%. [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] 00000010: 2e20 2500 0000 0000 0000 004c 2a00 0030 . %........L*..0 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] 00000020: 8880 eecd 1892 0c7b 5562 a2fb 6818 8044 .......{Ub..h..D [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] 00000030: 0ca7 d797 ce63 3792 bfe6 e603 e33a e881 .....c7......:.. [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_decode_encr: Mac output [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] 00000000: 97f6 3269 b378 63c3 e440 fd34 ..2i.xc..@.4 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_decode_encr: Mac from the packet [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] 00000000: 97f6 3269 b378 63c3 e440 fd34 ..2i.xc..@.4 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_decode_encr: Padding of 7 bytes [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] 00000000: 3d4b df43 032f fb =K.C./. [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_update: [8c39800/8c9f400] Window update (fwd=8c21ac0, rev=8c21a9c): m-id 0 ; received [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_update: [8c39800/8c9f400] Packet in window (or cause slide): m-id 0 left 0 right 0 size 1 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_update: [8c39800/8c9f400] Stored packet into window 8c21ac0 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_decode_encr: [8c39800/8c9f400] Packet decrypted successfully [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_decode_packet: [8c39800/8c9f400] No old context [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_allocate_exchange_data: Calling exchange_data_alloc [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] iked_pm_ike_exchange_data_alloc: Successfully inserted pm_ed 8c95600 into list for sa_cfg N/A [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] Exchange data allocated for IKE SA 3283989. VR 0 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8c9f400 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_decode_packet: [8c39800/8c9f400] Setting ed pkt ctx from VR id 0 to VR id 0) [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_allocate_exchange_data_info: Allocating Info exchange data for SA 8c9f400 ED 8c94028 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_allocate_exchange_data_info: Successfully allocated Info exchange data for SA 8c9f400 ED 8c94028 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_decode_delete: [8c39800/8c9f400] DELETE(protocol = IKE (1), number of spis = 0, spi_size = 0, spis = ) [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_decode_packet: [8c39800/8c9f400] Received packet: HDR, DEL [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_state_dispatch: [8c39800/8c9f400] Dispatching packet [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_state_dispatch: [8c39800/8c9f400] Responder side INFORMATIONAL [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_state_info_responder_in: State = INFORMATIONAL [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] Taking reference to P1 SA 3283989 to ref count 2 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_state_info_responder_in_check_delete: Calling ike_sa_delete [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] IKE SA delete called for p1 sa 3283989 (ref cnt 2) local:10.80.80.13, remote:10.80.80.80, IKEv2 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] P1 SA 3283989 stop timer. timer duration 86400, reason 2. [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] Freeing all P2 SAs for IKEv2 p1 SA 3283989 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] Free all pending notification. p1_sa idx 3283989 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] kmd_sa_cfg_child_sas_free_by_p1sa: processing SA SERVER-BOX [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] kmd_sa_free free sa for SERVER-BOX [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] Freeing the SA spi=0x81cb7deb, proto=ESP [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] Deleted (spi=0x81cb7deb, protocol=ESP dst=10.80.80.13) entry from the peer hash table. Reason: P1 SA deleted [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] kmd_update_sa_in_kernel [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] iked_deactivate_sa_pair_and_update_kernel [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] NHTB entry not found. Not deleting NHTB entry [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] In iked_ipsec_sa_pair_delete Deleting GENCFG msg with key; Tunnel = 131074;SPI-In = 0x81cb7deb [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] Deleted SA pair for tunnel = 131074 with SPI-In = 0x81cb7deb to kernel [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] iked_sa_cfg_get_parent_sa_cfg_child_sas_count No parent for sa_cfg SERVER-BOX count is 2 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] iked_lookup_peer_entry: Peer entry 0x8c95200 FOUND for local 10.80.80.13:500 and remote 10.80.80.80:500 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] Deleted (spi=0x81cb7deb, protocol=ESP) entry from the inbound sa spi hash table [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] iked_sa_cfg_update_sa_cfg_child_sa_count Parent not found for sa_cfg SERVER-BOX [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] kmd_sa_free check if the child_sa_cnt = 0 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] kmd_sa_free child_sa_cnt !=0. It is 1 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] kmd_sa_free free sa for SERVER-BOX [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] Freeing the SA spi=0xc9c54fcc, proto=ESP [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] Out bound SA. Not sending notification [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] Deleted (spi=0xc9c54fcc, protocol=ESP dst=10.80.80.80) entry from the peer hash table. Reason: P1 SA deleted [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] kmd_update_sa_in_kernel [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] iked_sa_cfg_update_sa_cfg_child_sa_count Parent not found for sa_cfg SERVER-BOX [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] kmd_sa_free check if the child_sa_cnt = 0 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] kmd_sa_free child_sa_cnt = 0 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] iked_lookup_peer_entry: Peer entry 0x8c95200 FOUND for local 10.80.80.13:500 and remote 10.80.80.80:500 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] iked_peer_remove_sa_cfg_entry: remove sa_cfg tunnel_id entry 131074 from peer entry 0x8c95200 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] Freeing reference to P1 SA 3283989 to ref count 1 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] P1 SA 3283989 reference count is not zero (1). Delaying deletion of SA [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] Taking reference to P1 SA 3283989 to ref count 2 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_state_info_responder_in_check_delete: [8c39800/8c9f400] Postponing delete of IKE SA [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_reply_packet_allocate: [8c39800/8c9f400] Allocating reply packet [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_packet_allocate: Allocated packet 8c39c00 from freelist [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_packet_allocate: [8c39c00/0] Allocating [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ssh_set_thread_debug_info: ikev2_reply_packet_allocate: set thread debug info - local 10.80.80.13 remote 10.80.80.80 neg 0x0 neg->ike_sa 0x0 ike_sa 0x8c9f400 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_reply_packet_allocate: [8c39800/0] Allocated reply packet [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_update: [8c39c00/8c9f400] Window update (fwd=8c21a9c, rev=8c21ac0): m-id 0 IR; sent [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_update: [8c39c00/8c9f400] Packet in window (or cause slide): m-id 0 left 0 right 0 size 1 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_udp_window_update: [8c39c00/8c9f400] Stored packet into window 8c21a9c [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_packet_destroy: [8c39800/0] Destructor [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_add_notify: Calling notify_request [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_reply_cb_notify_request: [8c39c00/8c9f400] No more notifies [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] iked_pm_ike_spd_notify_request: UNUSABLE P1 SA 3283989 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_add_vid: Calling vendor_id_request [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] iked_pm_ike_request_vendor_id: UNUSABLE p1_sa 3283989 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_reply_cb_vid_request: [8c39c00/8c9f400] No more VIDs [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_add_private_payload: Calling private_payload_request [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] iked_pm_ike_private_payload_request: UNUSABLE P1 SA index 3283989 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_reply_cb_private_payload_request: [8c39c00/8c9f400] No more private payloads [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_responder_exchange_done: Responder exchange done [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_responder_exchange_done: Calling responder_exchange_done [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_free_exchange_data: Freeing exchange data from SA 8c9f400, ED 8c94028 (1) [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_free_exchange_data_info: Freeing Info exchange data from SA 8c9f400 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_free_exchange_data_info: Successfully freed Info exchange data from SA 8c9f400 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_free_exchange_data: Calling exchange_data_free [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] Freeing P2 Ed for sa-cfg N/A [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] iked_pm_ike_exchange_data_free: Successfully removed pm_ed 8c95600 from list for sa_cfg N/A [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_free_exchange_data: Successfully freed exchange data from SA 8c9f400 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_state_send: [8c39c00/8c9f400] Sending packet [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] Freeing reference to P1 SA 3283989 to ref count 1 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_packet_st_send_request_address: [8c39c00/0] Sending packet/request address pair [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_packet_st_send: [8c39c00/0] Sending packet/Do [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_packet_st_send: Sending packet 0 :500 to 10.80.80.80:500 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] 00000000: 4444 ab12 2717 716d 4980 326c ef72 2580 DD..'.qmI.2l.r%. [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] 00000010: 2e20 2528 0000 0000 0000 004c 0000 0030 . %(.......L...0 [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] 00000020: 7eff c5c9 9634 c78b a563 bc3e 0b9e 0628 ~....4...c.>...( [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] 00000030: b526 4fc5 81f8 2d61 1dfc 1f26 2f5d 7f77 .&O...-a...&/].w [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] 00000040: bc1b 7220 09d8 df92 5349 758c ..r ....SIu. [Mar 7 19:44:34][10.80.80.13 <-> 10.80.80.80] ikev2_udp_send_packet: [8c39c00/0] Sending packet using VR id 0