[May 13 00:19:41]ikev2_packet_allocate: Allocated packet da8400 from freelist [May 13 00:19:41]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 13 00:19:41]ike_get_sa: Start, SA = { 9db9e285 a948b664 - 00000000 00000000 } / 00000000, remote = 10.90.3.53:500 [May 13 00:19:41]ike_sa_allocate: Start, SA = { 9db9e285 a948b664 - 8edba338 6416bf0e } [May 13 00:19:41]ike_init_isakmp_sa: Start, remote = 10.90.3.53:500, initiator = 0 [May 13 00:19:41]ike_decode_packet: Start [May 13 00:19:41]ike_decode_packet: Start, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f} / 00000000, nego = -1 [May 13 00:19:41]ike_decode_payload_sa: Start [May 13 00:19:41]ike_decode_payload_t: Start, # trans = 1 [May 13 00:19:41]ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... [May 13 00:19:41]ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... [May 13 00:19:41]ike_st_i_vid: VID[0..16] = 16f6ca16 e4a4066d ... [May 13 00:19:41]ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... [May 13 00:19:41]ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... [May 13 00:19:41]ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [May 13 00:19:41]ike_st_i_vid: VID[0..16] = f14b94b7 bff1fef0 ... [May 13 00:19:41]ike_st_i_vid: VID[0..20] = 166f932d 55eb64d8 ... [May 13 00:19:41]ike_st_i_vid: VID[0..16] = 8404adf9 cda05760 ... [May 13 00:19:41]ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... [May 13 00:19:41]ike_st_i_vid: VID[0..40] = f4ed19e0 c114eb51 ... [May 13 00:19:41]ike_st_i_id: Start [May 13 00:19:41]ike_st_i_sa_proposal: Start [May 13 00:19:41]ike_free_id_payload: Start, id type = 2 [May 13 00:19:41]Gateway t400-ike-gw: number of connections=0, limit=50 [May 13 00:19:41]ike_isakmp_sa_reply: Start [May 13 00:19:41]ike_state_restart_packet: Start, restart packet SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = -1 [May 13 00:19:41]ike_st_i_sa_proposal: Start [May 13 00:19:41]ike_st_i_nonce: Start, nonce[0..20] = 25c0781c 2499c24b ... [May 13 00:19:41]ike_st_i_cert: Start [May 13 00:19:41]ike_st_i_hash_key: Start, no key_hash [May 13 00:19:41]ike_st_i_ke: Ke[0..128] = c5aec130 39543ab6 ... [May 13 00:19:41]ike_st_i_cr: Start [May 13 00:19:41]ike_st_i_private: Start [May 13 00:19:41]ike_st_o_sa_values: Start [May 13 00:19:41]ike_st_o_ke: Start [May 13 00:19:41]ike_st_o_nonce: Start [May 13 00:19:41]ike_policy_reply_isakmp_nonce_data_len: Start [May 13 00:19:41]ike_st_o_id: Start [May 13 00:19:41]ike_policy_reply_isakmp_id: Start [May 13 00:19:41]ike_state_restart_packet: Start, restart packet SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = -1 [May 13 00:19:41]ike_st_o_id: Start [May 13 00:19:41]ike_st_o_certs_base: Start [May 13 00:19:41]ike_st_o_sig_or_hash: Start, auth_method = 4 [May 13 00:19:41]ike_st_o_hash: Start [May 13 00:19:41]ike_find_pre_shared_key: Find pre shared key key for 10.90.3.25:500, id = ipv4(any:0,[0..3]=10.90.3.25) -> 10.90.3.53:500, id = fqdn(any:0,[0..14]=vpn.example.com) [May 13 00:19:41]Gateway t400-ike-gw: number of connections=0, limit=50 [May 13 00:19:41]ike_policy_reply_find_pre_shared_key: Start [May 13 00:19:41]ike_state_restart_packet: Start, restart packet SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = -1 [May 13 00:19:41]ike_st_o_sig_or_hash: Start, auth_method = 4 [May 13 00:19:41]ike_st_o_hash: Start [May 13 00:19:41]ike_find_pre_shared_key: Find pre shared key key for 10.90.3.25:500, id = ipv4(any:0,[0..3]=10.90.3.25) -> 10.90.3.53:500, id = fqdn(any:0,[0..14]=vpn.example.com) [May 13 00:19:41]ike_calc_mac: Start, initiator = false, local = true [May 13 00:19:41]ike_policy_reply_isakmp_vendor_ids: Start [May 13 00:19:41]ike_st_o_status_n: Start [May 13 00:19:41]ike_st_o_private: Start [May 13 00:19:41]ike_policy_reply_private_payload_out: Start [May 13 00:19:41]ike_policy_reply_private_payload_out: Start [May 13 00:19:41]ike_policy_reply_private_payload_out: Start [May 13 00:19:41]ike_st_o_calc_skeyid: Calculating skeyid [May 13 00:19:41]ike_encode_packet: Start, SA = { 0x9db9e285 a948b664 - 77011ca3 92420f1f } / 00000000, nego = -1 [May 13 00:19:41]ike_send_packet: Start, send SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = -1, dst = 10.90.3.53:500, routing table id = 0 [May 13 00:19:41]ikev2_packet_allocate: Allocated packet da8800 from freelist [May 13 00:19:41]ike_sa_find: Found SA = { 9db9e285 a948b664 - 77011ca3 92420f1f } [May 13 00:19:41]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 13 00:19:41]ike_get_sa: Start, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f } / 00000000, remote = 10.90.3.53:500 [May 13 00:19:41]ike_sa_find: Found SA = { 9db9e285 a948b664 - 77011ca3 92420f1f } [May 13 00:19:41]ike_decode_packet: Start [May 13 00:19:41]ike_decode_packet: Start, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f} / 00000000, nego = -1 [May 13 00:19:41]ike_st_i_hash: Start, hash[0..16] = ae4d805f 49ba8ad5 ... [May 13 00:19:41]ike_calc_mac: Start, initiator = false, local = false [May 13 00:19:41]ike_st_i_cert: Start [May 13 00:19:41]ike_st_i_private: Start [May 13 00:19:41]ike_st_o_wait_done: Marking for waiting for done [May 13 00:19:41]ike_st_o_all_done: MESSAGE: Phase 1 { 0x9db9e285 a948b664 - 0x77011ca3 92420f1f } / 00000000, version = 1.0, xchg = Aggressive, auth_method = Pre shared keys with XAuth (initiator), Responder, cipher = 3des-cbc, hash = md5, [May 13 00:19:41]10.90.3.25:500 (Responder) <-> 10.90.3.53:500 { 9db9e285 a948b664 - 77011ca3 92420f1f [-1] / 0x00000000 } Aggr; MESSAGE: Phase 1 version = 1.0, auth_method = Pre shared keys with XAuth (initiator), cipher = 3des-cbc, hash = [May 13 00:19:41]ike_send_notify: Connected, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = -1 [May 13 00:19:41]iked_pm_ike_sa_done: local:10.90.3.25, remote:10.90.3.53 IKEv1 [May 13 00:19:41]IKE negotiation done for local:10.90.3.25, remote:10.90.3.53 IKEv1 with status: Error ok [May 13 00:19:41]ssh_ike_connect_cfg: Start, remote_name = :500, flags = 00008000 [May 13 00:19:41]ike_sa_find_ip_port: Remote = all:500, Found SA = { 9db9e285 a948b664 - 77011ca3 92420f1f} [May 13 00:19:41]ike_alloc_negotiation: Start, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f} [May 13 00:19:41]ssh_ike_connect_cfg: SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 0 [May 13 00:19:41]ike_init_cfg_negotiation: Start, initiator = 1, message_id = c70ea6a3 [May 13 00:19:41]ike_st_o_gen_hash: Start [May 13 00:19:41]ike_st_o_cfg_attr: Start [May 13 00:19:41]ike_st_o_private: Start [May 13 00:19:41]ike_policy_reply_private_payload_out: Start [May 13 00:19:41]ike_st_o_encrypt: Marking encryption for packet [May 13 00:19:41]ike_encode_packet: Start, SA = { 0x9db9e285 a948b664 - 77011ca3 92420f1f } / c70ea6a3, nego = 0 [May 13 00:19:41]ike_send_packet: Start, send SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 0, dst = 10.90.3.53:500, routing table id = 0 [May 13 00:19:41]ikev2_packet_allocate: Allocated packet da8c00 from freelist [May 13 00:19:41]ike_sa_find: Found SA = { 9db9e285 a948b664 - 77011ca3 92420f1f } [May 13 00:19:41]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 13 00:19:41]ike_get_sa: Start, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f } / d656d109, remote = 10.90.3.53:500 [May 13 00:19:41]ike_sa_find: Found SA = { 9db9e285 a948b664 - 77011ca3 92420f1f } [May 13 00:19:41]ike_st_o_done: ISAKMP SA negotiation done [May 13 00:19:41]ike_send_notify: Connected, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = -1 [May 13 00:19:41]ike_free_negotiation_isakmp: Start, nego = -1 [May 13 00:19:41]ike_free_negotiation: Start, nego = -1 [May 13 00:19:41]ike_alloc_negotiation: Start, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f} [May 13 00:19:41]ike_decode_packet: Start [May 13 00:19:41]ike_decode_packet: Start, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f} / d656d109, nego = 1 [May 13 00:19:41]ike_st_i_encrypt: Check that packet was encrypted succeeded [May 13 00:19:41]ike_st_i_gen_hash: Start, hash[0..16] = c967a037 83f18171 ... [May 13 00:19:41]ike_st_i_n: Start, doi = 1, protocol = 1, code = Initial contact notification (24578), spi[0..16] = 9db9e285 a948b664 ..., data[0..0] = 00000000 00000000 ... [May 13 00:19:41]Received authenticated notification payload unknown from local:10.90.3.25 remote:10.90.3.53 IKEv1 for P1 SA 5598121 [May 13 00:19:41]ike_st_i_private: Start [May 13 00:19:41]ike_send_notify: Connected, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 1 [May 13 00:19:41]ike_delete_negotiation: Start, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 1 [May 13 00:19:41]ike_free_negotiation_info: Start, nego = 1 [May 13 00:19:41]ike_free_negotiation: Start, nego = 1 [May 13 00:19:41]ikev2_packet_allocate: Allocated packet da9000 from freelist [May 13 00:19:41]ike_sa_find: Found SA = { 9db9e285 a948b664 - 77011ca3 92420f1f } [May 13 00:19:41]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 13 00:19:41]ike_get_sa: Start, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f } / c70ea6a3, remote = 10.90.3.53:500 [May 13 00:19:41]ike_sa_find: Found SA = { 9db9e285 a948b664 - 77011ca3 92420f1f } [May 13 00:19:41]ike_decode_packet: Start [May 13 00:19:41]ike_decode_packet: Start, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f} / c70ea6a3, nego = 0 [May 13 00:19:41]ike_decode_payload_attr: Start [May 13 00:19:41]ike_st_i_encrypt: Check that packet was encrypted succeeded [May 13 00:19:41]ike_st_i_gen_hash: Start, hash[0..16] = e51dd850 0a933e1f ... [May 13 00:19:41]ike_st_i_cfg_attr: Start [May 13 00:19:41]ike_st_i_private: Start [May 13 00:19:41]ike_st_o_cfg_wait_done: Marking for waiting for done [May 13 00:19:41]ike_st_o_cfg_wait_done: MESSAGE: CFG Mode wait done [May 13 00:19:41]:500 (Initiator) <-> 10.90.3.53:500 { 9db9e285 a948b664 - 77011ca3 92420f1f [0] / 0xc70ea6a3 } CFG; MESSAGE: CFG Mode wait done [May 13 00:19:41]ike_send_notify: Connected, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 0 [May 13 00:19:41]ssh_ike_connect_cfg: Start, remote_name = :500, flags = 00008000 [May 13 00:19:41]ike_sa_find_ip_port: Remote = all:500, Found SA = { 9db9e285 a948b664 - 77011ca3 92420f1f} [May 13 00:19:41]ike_alloc_negotiation: Start, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f} [May 13 00:19:41]ssh_ike_connect_cfg: SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 1 [May 13 00:19:41]ike_init_cfg_negotiation: Start, initiator = 1, message_id = 560066cc [May 13 00:19:41]ike_st_o_gen_hash: Start [May 13 00:19:41]ike_st_o_cfg_attr: Start [May 13 00:19:41]ike_st_o_private: Start [May 13 00:19:41]ike_policy_reply_private_payload_out: Start [May 13 00:19:41]ike_st_o_encrypt: Marking encryption for packet [May 13 00:19:41]ike_encode_packet: Start, SA = { 0x9db9e285 a948b664 - 77011ca3 92420f1f } / 560066cc, nego = 1 [May 13 00:19:41]ike_send_packet: Start, send SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 1, dst = 10.90.3.53:500, routing table id = 0 [May 13 00:19:41]ikev2_packet_allocate: Allocated packet da9400 from freelist [May 13 00:19:41]ike_sa_find: Found SA = { 9db9e285 a948b664 - 77011ca3 92420f1f } [May 13 00:19:41]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 13 00:19:41]ike_get_sa: Start, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f } / 560066cc, remote = 10.90.3.53:500 [May 13 00:19:41]ike_sa_find: Found SA = { 9db9e285 a948b664 - 77011ca3 92420f1f } [May 13 00:19:41]ike_decode_packet: Start [May 13 00:19:41]ike_decode_packet: Start, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f} / 560066cc, nego = 1 [May 13 00:19:41]ike_decode_payload_attr: Start [May 13 00:19:41]ike_st_i_encrypt: Check that packet was encrypted succeeded [May 13 00:19:41]ike_st_i_gen_hash: Start, hash[0..16] = c64a5b66 d637d271 ... [May 13 00:19:41]ike_st_i_cfg_attr: Start [May 13 00:19:41]ike_st_i_private: Start [May 13 00:19:41]ike_st_o_cfg_wait_done: Marking for waiting for done [May 13 00:19:41]ike_st_o_cfg_wait_done: MESSAGE: CFG Mode wait done [May 13 00:19:41]:500 (Initiator) <-> 10.90.3.53:500 { 9db9e285 a948b664 - 77011ca3 92420f1f [1] / 0x560066cc } CFG; MESSAGE: CFG Mode wait done [May 13 00:19:41]ike_send_notify: Connected, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 1 [May 13 00:19:41]ssh_ike_connect_cfg: Start, remote_name = :500, flags = 00008000 [May 13 00:19:41]ike_sa_find_ip_port: Remote = all:500, Found SA = { 9db9e285 a948b664 - 77011ca3 92420f1f} [May 13 00:19:41]ike_alloc_negotiation: Start, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f} [May 13 00:19:41]ssh_ike_connect_cfg: SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 2 [May 13 00:19:41]ike_init_cfg_negotiation: Start, initiator = 1, message_id = 4e7c4b2c [May 13 00:19:41]ike_st_o_gen_hash: Start [May 13 00:19:41]ike_st_o_cfg_attr: Start [May 13 00:19:41]ike_st_o_private: Start [May 13 00:19:41]ike_policy_reply_private_payload_out: Start [May 13 00:19:41]ike_st_o_encrypt: Marking encryption for packet [May 13 00:19:41]ike_encode_packet: Start, SA = { 0x9db9e285 a948b664 - 77011ca3 92420f1f } / 4e7c4b2c, nego = 2 [May 13 00:19:41]ike_send_packet: Start, send SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 2, dst = 10.90.3.53:500, routing table id = 0 [May 13 00:19:41]ikev2_packet_allocate: Allocated packet da9800 from freelist [May 13 00:19:41]ike_sa_find: Found SA = { 9db9e285 a948b664 - 77011ca3 92420f1f } [May 13 00:19:41]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 13 00:19:41]ike_get_sa: Start, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f } / 560066cc, remote = 10.90.3.53:500 [May 13 00:19:41]ike_sa_find: Found SA = { 9db9e285 a948b664 - 77011ca3 92420f1f } [May 13 00:19:41]ike_decode_packet: Start [May 13 00:19:41]ike_decode_packet: Start, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f} / 560066cc, nego = 1 [May 13 00:19:41]ike_decode_payload_attr: Start [May 13 00:19:41]ike_st_o_cfg_done: CFG negotiation done [May 13 00:19:41]ike_send_notify: Connected, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 1 [May 13 00:19:41]ike_delete_negotiation: Start, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 1 [May 13 00:19:41]ike_free_negotiation_cfg: Start, nego = 1 [May 13 00:19:41]ike_free_negotiation: Start, nego = 1 [May 13 00:19:41]ikev2_packet_allocate: Allocated packet da9c00 from freelist [May 13 00:19:41]ike_sa_find: Found SA = { 9db9e285 a948b664 - 77011ca3 92420f1f } [May 13 00:19:41]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 13 00:19:41]ike_get_sa: Start, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f } / f75a2230, remote = 10.90.3.53:500 [May 13 00:19:41]ike_sa_find: Found SA = { 9db9e285 a948b664 - 77011ca3 92420f1f } [May 13 00:19:41]ike_alloc_negotiation: Start, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f} [May 13 00:19:41]ike_init_qm_negotiation: Start, initiator = 0, message_id = f75a2230 [May 13 00:19:41]ike_decode_packet: Start [May 13 00:19:41]ike_decode_packet: Start, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f} / f75a2230, nego = 1 [May 13 00:19:41]ike_decode_payload_sa: Start [May 13 00:19:41]ike_decode_payload_t: Start, # trans = 1 [May 13 00:19:41]ike_st_i_encrypt: Check that packet was encrypted succeeded [May 13 00:19:41]ike_st_i_qm_hash_1: Start, hash[0..16] = 3b346e0f ca18228f ... [May 13 00:19:41]ike_st_i_qm_nonce: Nonce[0..20] = 2e6cc67d 81f3e468 ... [May 13 00:19:41]ike_st_i_qm_sa_proposals: Start [May 13 00:19:41]Added (spi=0x8dd596cd, protocol=0) entry to the spi table [May 13 00:19:41]Added (spi=0x4fb241eb, protocol=0) entry to the spi table [May 13 00:19:41]ike_qm_sa_reply: Start [May 13 00:19:41]ike_qm_sa_reply: Selected proposal 0, and transform 0 for protocol 0 [May 13 00:19:41]ike_state_restart_packet: Start, restart packet SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 1 [May 13 00:19:41]ike_st_i_qm_sa_proposals: Start [May 13 00:19:41]ike_st_i_private: Start [May 13 00:19:41]ike_st_o_qm_hash_2: Start [May 13 00:19:41]ike_st_o_qm_sa_values: Start [May 13 00:19:41]ike_st_o_qm_nonce: Start [May 13 00:19:41]ike_policy_reply_qm_nonce_data_len: Start [May 13 00:19:41]ike_st_o_qm_optional_ke: Start [May 13 00:19:41]ike_st_o_qm_optional_ids: Start [May 13 00:19:41]ikev2_fb_qm_local_id: Using ipv4_subnet(any:0,[0..7]=0.0.0.0/0) as local QM identity [May 13 00:19:41]ike_policy_reply_qm_local_id: Start [May 13 00:19:41]ikev2_fb_qm_remote_id: Using ipv4(any:0,[0..3]=44.128.0.17) as remote QM identity [May 13 00:19:41]ike_policy_reply_qm_remote_id: Start [May 13 00:19:41]ike_st_qm_optional_id: Start [May 13 00:19:41]ike_st_qm_optional_id: Start [May 13 00:19:41]ike_st_o_qm_optional_responder_lifetime_n: Start [May 13 00:19:41]ike_st_o_private: Start [May 13 00:19:41]Construction NHTB payload for local:10.90.3.25, remote:10.90.3.53 IKEv1 P1 SA index 5598121 sa-cfg INSTANCE-t400-vpn_0002_0004_0000 [May 13 00:19:41]Not route based VPN. Not sending NHTB notify payload for sa-cfg INSTANCE-t400-vpn_0002_0004_0000 [May 13 00:19:41]ike_policy_reply_private_payload_out: Start [May 13 00:19:41]ike_st_o_encrypt: Marking encryption for packet [May 13 00:19:41]ike_encode_packet: Start, SA = { 0x9db9e285 a948b664 - 77011ca3 92420f1f } / f75a2230, nego = 1 [May 13 00:19:41]ike_send_packet: Start, send SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 1, dst = 10.90.3.53:500, routing table id = 0 [May 13 00:19:41]ikev2_packet_allocate: Allocated packet daa000 from freelist [May 13 00:19:41]ike_sa_find: Found SA = { 9db9e285 a948b664 - 77011ca3 92420f1f } [May 13 00:19:41]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 13 00:19:41]ike_get_sa: Start, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f } / f75a2230, remote = 10.90.3.53:500 [May 13 00:19:41]ike_sa_find: Found SA = { 9db9e285 a948b664 - 77011ca3 92420f1f } [May 13 00:19:41]ike_decode_packet: Start [May 13 00:19:41]ike_decode_packet: Start, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f} / f75a2230, nego = 1 [May 13 00:19:41]ike_st_i_encrypt: Check that packet was encrypted succeeded [May 13 00:19:41]ike_st_i_qm_hash_3: Start, hash[0..16] = db693a11 25ffcbd1 ... [May 13 00:19:41]ike_st_i_private: Start [May 13 00:19:41]:500 (Responder) <-> 10.90.3.53:500 { 9db9e285 a948b664 - 77011ca3 92420f1f [1] / 0xf75a2230 } QM; MESSAGE: Phase 2 connection succeeded, No PFS, group = 0 [May 13 00:19:41]ike_qm_call_callback: MESSAGE: Phase 2 connection succeeded, No PFS, group = 0 [May 13 00:19:41]:500 (Responder) <-> 10.90.3.53:500 { 9db9e285 a948b664 - 77011ca3 92420f1f [1] / 0xf75a2230 } QM; MESSAGE: SA[0][0] = ESP aes, life = 0 kB/28800 sec, group = 0, tunnel, hmac-sha1-96, Extended seq not used, key len = [May 13 00:19:41]ike_qm_call_callback: MESSAGE: SA[0][0] = ESP aes, life = 0 kB/28800 sec, group = 0, tunnel, hmac-sha1-96, Extended seq not used, key len = 256, key rounds = 0 [May 13 00:19:41]iked_pm_ipsec_sa_install: local:10.90.3.25, remote:10.90.3.53 IKEv1 for SA-CFG INSTANCE-t400-vpn_0002_0004_0000 [May 13 00:19:41]In iked_get_blob_from_kernel [May 13 00:19:41]Getting gencfg blog with key; Tunnel = 268173331, SPI-In = 0x0; msg len = 672, minor-type = 0 [May 13 00:19:41]In iked_sa_config_update Updating GENCFG msg with key; Tunnel = 268173331, SPI-In = 0x0 [May 13 00:19:41]Successfully added SA Config [May 13 00:19:41]Added (spi=0x8dd596cd, protocol=ESP dst=10.90.3.25) entry to the peer hash table [May 13 00:19:41]Added (spi=0x2da096, protocol=ESP dst=10.90.3.53) entry to the peer hash table [May 13 00:19:41]Hardlife timer started for inbound instance-INSTANCE-t400-vpn_0002_0004_0000_268173331 with 28800 seconds/0 kilobytes [May 13 00:19:41]Softlife timer started for inbound instance-INSTANCE-t400-vpn_0002_0004_0000_268173331 with 28230 seconds/0 kilobytes [May 13 00:19:41]Deleted (spi=0x3e524c5c, protocol=ESP dst=10.90.3.25) entry from the peer hash table. Reason: More than two SA pairs [May 13 00:19:41]ssh_ike_connect_delete: Start, remote_name = :500, flags = 00010000 [May 13 00:19:41]ssh_ike_create_delete_internal: Start, remote_name = :500, flags = 00010000 [May 13 00:19:41]ike_sa_find_ip_port: Remote = all:500, Found SA = { 9db9e285 a948b664 - 77011ca3 92420f1f} [May 13 00:19:41]ike_alloc_negotiation: Start, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f} [May 13 00:19:41]ssh_ike_create_delete_internal: SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 3 [May 13 00:19:41]ike_encode_packet: Start, SA = { 0x9db9e285 a948b664 - 77011ca3 92420f1f } / ebb536ea, nego = 3 [May 13 00:19:41]ike_send_packet: Start, send SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 3, dst = 10.90.3.53:500, routing table id = 0 [May 13 00:19:41]ike_delete_negotiation: Start, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 3 [May 13 00:19:41]ike_free_negotiation_info: Start, nego = 3 [May 13 00:19:41]ike_free_negotiation: Start, nego = 3 [May 13 00:19:41]In iked_ipsec_sa_pair_delete Deleting GENCFG msg with key; Tunnel = 268173331;SPI-In = 0x3e524c5c [May 13 00:19:41]Deleted SA pair for tunnel = 268173331 with SPI-In = 0x3e524c5c to kernel [May 13 00:19:41]Deleted (spi=0x3e524c5c, protocol=ESP) entry from the inbound sa spi hash table [May 13 00:19:41]Deleted (spi=0x90822f0, protocol=ESP dst=10.90.3.53) entry from the peer hash table. Reason: More than two SA pairs [May 13 00:19:41]In iked_ipsec_sa_pair_add Adding GENCFG msg with key; Tunnel = 268173331;SPI-In = 0x8dd596cd [May 13 00:19:41]Added dependency on SA config blob with tunnelid = 268173331 [May 13 00:19:41]Successfully added ipsec SA PAIR [May 13 00:19:41]ike_st_o_qm_wait_done: Marking for waiting for done [May 13 00:19:41]ike_send_notify: Connected, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 1 [May 13 00:19:41]IPSec negotiation done successfully for SA-CFG INSTANCE-t400-vpn_0002_0004_0000 for local:10.90.3.25, remote:10.90.3.53 IKEv1 [May 13 00:19:51]ike_retransmit_callback: Start, retransmit SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 2 [May 13 00:19:51]ike_send_packet: Start, retransmit previous packet SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 2, dst = 10.90.3.53:500 routing table id = 0 [May 13 00:20:01]ike_retransmit_callback: Start, retransmit SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 2 [May 13 00:20:01]ike_send_packet: Start, retransmit previous packet SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 2, dst = 10.90.3.53:500 routing table id = 0 [May 13 00:20:11]ike_retransmit_callback: Start, retransmit SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 2 [May 13 00:20:11]ike_send_packet: Start, retransmit previous packet SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 2, dst = 10.90.3.53:500 routing table id = 0 [May 13 00:20:21]ike_retransmit_callback: Start, retransmit SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 2 [May 13 00:20:21]ike_send_packet: Start, retransmit previous packet SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 2, dst = 10.90.3.53:500 routing table id = 0 [May 13 00:20:31]ike_retransmit_callback: Start, retransmit SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 2 [May 13 00:20:31]ike_send_packet: Start, retransmit previous packet SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 2, dst = 10.90.3.53:500 routing table id = 0 [May 13 00:20:41]ike_retransmit_callback: Start, retransmit SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 2 [May 13 00:20:41]ike_retransmit_callback: Isakmp query retry limit reached, deleting [May 13 00:20:41]:500 (Initiator) <-> 10.90.3.53:500 { 9db9e285 a948b664 - 77011ca3 92420f1f [2] / 0x4e7c4b2c } CFG; Error = Timeout (8197) [May 13 00:20:41]ike_send_notify: Private notification, do not send notification [May 13 00:20:41]ike_delete_negotiation: Start, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 2 [May 13 00:20:41]ike_free_negotiation_cfg: Start, nego = 2 [May 13 00:20:41]ike_free_negotiation: Start, nego = 2 [May 13 00:20:41]iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 5598121, ref cnt 2, status: Error ok [May 13 00:20:41]ike_expire_callback: Start, expire SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = -1 [May 13 00:20:41]ike_alloc_negotiation: Start, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f} [May 13 00:20:41]ike_encode_packet: Start, SA = { 0x9db9e285 a948b664 - 77011ca3 92420f1f } / 6c35776b, nego = 2 [May 13 00:20:41]ike_send_packet: Start, send SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 2, dst = 10.90.3.53:500, routing table id = 0 [May 13 00:20:41]ike_delete_negotiation: Start, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = 2 [May 13 00:20:41]ike_free_negotiation_info: Start, nego = 2 [May 13 00:20:41]ike_free_negotiation: Start, nego = 2 [May 13 00:20:41]ike_remove_callback: Start, delete SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = -1 [May 13 00:20:41]ike_delete_negotiation: Start, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f}, nego = -1 [May 13 00:20:41]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 13 00:20:41]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 13 00:20:41]ike_sa_delete: Start, SA = { 9db9e285 a948b664 - 77011ca3 92420f1f } [May 13 00:20:41]ike_free_negotiation_cfg: Start, nego = 0 [May 13 00:20:41]ike_free_negotiation: Start, nego = 0 [May 13 00:20:41]ike_free_negotiation_qm: Start, nego = 1 [May 13 00:20:41]ike_free_negotiation: Start, nego = 1 [May 13 00:20:41]ike_free_id_payload: Start, id type = 4 [May 13 00:20:41]ike_free_id_payload: Start, id type = 4 [May 13 00:20:41]ike_free_id_payload: Start, id type = 1 [May 13 00:20:41]ike_free_id_payload: Start, id type = 1 [May 13 00:20:41]ike_free_negotiation_isakmp: Start, nego = -1 [May 13 00:20:41]ike_free_negotiation: Start, nego = -1 [May 13 00:20:41]IKE SA delete called for p1 sa 5598121 (ref cnt 1) local:10.90.3.25, remote:10.90.3.53, IKEv1 [May 13 00:20:41]iked_pm_p1_sa_destroy: p1 sa 5598121 (ref cnt 0), waiting_for_del 0x0 [May 13 00:20:41]Reducing number of connection for ike gateway t400-ike-gw to 0 [May 13 00:20:41]ike_free_id_payload: Start, id type = 1 [May 13 00:20:41]ike_free_id_payload: Start, id type = 2 [May 13 00:20:41]ike_free_sa: Start