15/05/11 20:54:31 ii : ipc client process thread begin ... 15/05/11 20:54:31 10.90.3.25:500 15/05/11 20:54:31 DB : 9db9e285a948b664:0000000000000000 15/05/11 20:54:31 DB : phase1 added ( obj count = 1 ) 15/05/11 20:54:31 >> : security association payload 15/05/11 20:54:31 >> : - proposal #1 payload 15/05/11 20:54:31 >> : -- transform #1 payload 15/05/11 20:54:31 >> : key exchange payload 15/05/11 20:54:31 >> : nonce payload 15/05/11 20:54:31 >> : identification payload 15/05/11 20:54:31 >> : vendor id payload 15/05/11 20:54:31 ii : local supports XAUTH 15/05/11 20:54:31 >> : vendor id payload 15/05/11 20:54:31 ii : local supports nat-t ( draft v00 ) 15/05/11 20:54:31 >> : vendor id payload 15/05/11 20:54:31 ii : local supports nat-t ( draft v01 ) 15/05/11 20:54:31 >> : vendor id payload 15/05/11 20:54:31 ii : local supports nat-t ( draft v02 ) 15/05/11 20:54:31 >> : vendor id payload 15/05/11 20:54:31 ii : local supports nat-t ( draft v03 ) 15/05/11 20:54:31 >> : vendor id payload 15/05/11 20:54:31 ii : local supports nat-t ( rfc ) 15/05/11 20:54:31 >> : vendor id payload 15/05/11 20:54:31 ii : local is SHREW SOFT compatible 15/05/11 20:54:31 >> : vendor id payload 15/05/11 20:54:31 ii : local is NETSCREEN compatible 15/05/11 20:54:31 >> : vendor id payload 15/05/11 20:54:31 ii : local is SIDEWINDER compatible 15/05/11 20:54:31 >> : vendor id payload 15/05/11 20:54:31 ii : local is CISCO UNITY compatible 15/05/11 20:54:31 >> : vendor id payload 15/05/11 20:54:31 ii : local is CHECKPOINT compatible 15/05/11 20:54:31 >= : cookies 9db9e285a948b664:0000000000000000 15/05/11 20:54:31 >= : message 00000000 15/05/11 20:54:31 -> : send IKE packet 10.90.3.53:500 -> 10.90.3.25:500 ( 531 bytes ) 15/05/11 20:54:31 DB : phase1 resend event scheduled ( ref count = 2 ) 15/05/11 20:54:32 <- : recv IKE packet 10.90.3.25:500 -> 10.90.3.53:500 ( 380 bytes ) 15/05/11 20:54:32 DB : phase1 found 15/05/11 20:54:32 ii : processing phase1 packet ( 380 bytes ) 15/05/11 20:54:32 =< : cookies 9db9e285a948b664:77011ca392420f1f 15/05/11 20:54:32 =< : message 00000000 15/05/11 20:54:32 << : security association payload 15/05/11 20:54:32 << : - propsal #1 payload 15/05/11 20:54:32 << : -- transform #1 payload 15/05/11 20:54:32 ii : matched isakmp proposal #1 transform #1 15/05/11 20:54:32 ii : - transform = ike 15/05/11 20:54:32 ii : - cipher type = 3des 15/05/11 20:54:32 ii : - key length = default 15/05/11 20:54:32 ii : - hash type = md5 15/05/11 20:54:32 ii : - dh group = group2 ( modp-1024 ) 15/05/11 20:54:32 ii : - auth type = xauth-initiator-psk 15/05/11 20:54:32 ii : - life seconds = 180 15/05/11 20:54:32 ii : - life kbytes = 0 15/05/11 20:54:32 << : key exchange payload 15/05/11 20:54:32 << : nonce payload 15/05/11 20:54:32 << : identification payload 15/05/11 20:54:32 ii : phase1 id match ( natt prevents ip match ) 15/05/11 20:54:32 ii : received = ipv4-host 10.90.3.25 15/05/11 20:54:32 << : hash payload 15/05/11 20:54:32 << : vendor id payload 15/05/11 20:54:32 ii : peer supports DPDv1 15/05/11 20:54:32 << : vendor id payload 15/05/11 20:54:32 ii : peer supports nat-t ( rfc ) 15/05/11 20:54:32 << : vendor id payload 15/05/11 20:54:32 ii : unknown vendor id ( 28 bytes ) 15/05/11 20:54:32 0x : 69936922 8741c6d4 ca094c93 e242c9de 19e7b7c6 00000005 00000500 15/05/11 20:54:32 << : nat discovery payload 15/05/11 20:54:32 << : nat discovery payload 15/05/11 20:54:32 ii : disabled nat-t ( no nat detected ) 15/05/11 20:54:32 == : DH shared secret ( 128 bytes ) 15/05/11 20:54:32 == : SETKEYID ( 16 bytes ) 15/05/11 20:54:32 == : SETKEYID_d ( 16 bytes ) 15/05/11 20:54:32 == : SETKEYID_a ( 16 bytes ) 15/05/11 20:54:32 == : SETKEYID_e ( 16 bytes ) 15/05/11 20:54:32 == : cipher key ( 32 bytes ) 15/05/11 20:54:32 == : cipher iv ( 8 bytes ) 15/05/11 20:54:32 == : phase1 hash_i ( computed ) ( 16 bytes ) 15/05/11 20:54:32 >> : hash payload 15/05/11 20:54:32 >> : nat discovery payload 15/05/11 20:54:32 >> : nat discovery payload 15/05/11 20:54:32 >= : cookies 9db9e285a948b664:77011ca392420f1f 15/05/11 20:54:32 >= : message 00000000 15/05/11 20:54:32 >= : encrypt iv ( 8 bytes ) 15/05/11 20:54:32 == : encrypt packet ( 88 bytes ) 15/05/11 20:54:32 == : stored iv ( 8 bytes ) 15/05/11 20:54:32 DB : phase1 resend event canceled ( ref count = 1 ) 15/05/11 20:54:32 -> : send IKE packet 10.90.3.53:500 -> 10.90.3.25:500 ( 120 bytes ) 15/05/11 20:54:32 == : phase1 hash_r ( computed ) ( 16 bytes ) 15/05/11 20:54:32 == : phase1 hash_r ( received ) ( 16 bytes ) 15/05/11 20:54:32 ii : phase1 sa established 15/05/11 20:54:32 ii : 10.90.3.25:500 <-> 10.90.3.53:500 15/05/11 20:54:32 ii : 9db9e285a948b664:77011ca392420f1f 15/05/11 20:54:32 ii : sending peer INITIAL-CONTACT notification 15/05/11 20:54:32 ii : - 10.90.3.53:500 -> 10.90.3.25:500 15/05/11 20:54:32 ii : - isakmp spi = 9db9e285a948b664:77011ca392420f1f 15/05/11 20:54:32 ii : - data size 0 15/05/11 20:54:32 >> : hash payload 15/05/11 20:54:32 >> : notification payload 15/05/11 20:54:32 == : new informational hash ( 16 bytes ) 15/05/11 20:54:32 == : new informational iv ( 8 bytes ) 15/05/11 20:54:32 >= : cookies 9db9e285a948b664:77011ca392420f1f 15/05/11 20:54:32 >= : message d656d109 15/05/11 20:54:32 >= : encrypt iv ( 8 bytes ) 15/05/11 20:54:32 == : encrypt packet ( 76 bytes ) 15/05/11 20:54:32 == : stored iv ( 8 bytes ) 15/05/11 20:54:32 -> : send IKE packet 10.90.3.53:500 -> 10.90.3.25:500 ( 104 bytes ) 15/05/11 20:54:32 DB : phase2 not found 15/05/11 20:54:32 <- : recv IKE packet 10.90.3.25:500 -> 10.90.3.53:500 ( 68 bytes ) 15/05/11 20:54:32 DB : phase1 found 15/05/11 20:54:32 ii : processing config packet ( 68 bytes ) 15/05/11 20:54:32 DB : config not found 15/05/11 20:54:32 DB : config added ( obj count = 1 ) 15/05/11 20:54:32 == : new config iv ( 8 bytes ) 15/05/11 20:54:32 =< : cookies 9db9e285a948b664:77011ca392420f1f 15/05/11 20:54:32 =< : message c70ea6a3 15/05/11 20:54:32 =< : decrypt iv ( 8 bytes ) 15/05/11 20:54:32 == : decrypt packet ( 68 bytes ) 15/05/11 20:54:32 <= : trimmed packet padding ( 4 bytes ) 15/05/11 20:54:32 <= : stored iv ( 8 bytes ) 15/05/11 20:54:32 << : hash payload 15/05/11 20:54:32 << : attribute payload 15/05/11 20:54:32 == : configure hash_i ( computed ) ( 16 bytes ) 15/05/11 20:54:32 == : configure hash_c ( computed ) ( 16 bytes ) 15/05/11 20:54:32 ii : configure hash verified 15/05/11 20:54:32 ii : - xauth username 15/05/11 20:54:32 ii : - xauth password 15/05/11 20:54:32 ii : received basic xauth request - 15/05/11 20:54:32 ii : - standard xauth username 15/05/11 20:54:32 ii : - standard xauth password 15/05/11 20:54:32 ii : sending xauth response for tepafray 15/05/11 20:54:32 >> : hash payload 15/05/11 20:54:32 >> : attribute payload 15/05/11 20:54:32 == : new configure hash ( 16 bytes ) 15/05/11 20:54:32 >= : cookies 9db9e285a948b664:77011ca392420f1f 15/05/11 20:54:32 >= : message c70ea6a3 15/05/11 20:54:32 >= : encrypt iv ( 8 bytes ) 15/05/11 20:54:32 == : encrypt packet ( 83 bytes ) 15/05/11 20:54:32 == : stored iv ( 8 bytes ) 15/05/11 20:54:32 -> : send IKE packet 10.90.3.53:500 -> 10.90.3.25:500 ( 112 bytes ) 15/05/11 20:54:32 DB : config resend event scheduled ( ref count = 2 ) 15/05/11 20:54:32 <- : recv IKE packet 10.90.3.25:500 -> 10.90.3.53:500 ( 60 bytes ) 15/05/11 20:54:32 DB : phase1 found 15/05/11 20:54:32 ii : processing config packet ( 60 bytes ) 15/05/11 20:54:32 DB : config found 15/05/11 20:54:32 == : new config iv ( 8 bytes ) 15/05/11 20:54:32 =< : cookies 9db9e285a948b664:77011ca392420f1f 15/05/11 20:54:32 =< : message 560066cc 15/05/11 20:54:32 =< : decrypt iv ( 8 bytes ) 15/05/11 20:54:32 == : decrypt packet ( 60 bytes ) 15/05/11 20:54:32 <= : stored iv ( 8 bytes ) 15/05/11 20:54:32 << : hash payload 15/05/11 20:54:32 << : attribute payload 15/05/11 20:54:32 == : configure hash_i ( computed ) ( 16 bytes ) 15/05/11 20:54:32 == : configure hash_c ( computed ) ( 16 bytes ) 15/05/11 20:54:32 ii : configure hash verified 15/05/11 20:54:32 ii : received xauth result - 15/05/11 20:54:32 ii : user tepafray authentication succeeded 15/05/11 20:54:32 ii : sending xauth acknowledge 15/05/11 20:54:32 >> : hash payload 15/05/11 20:54:32 >> : attribute payload 15/05/11 20:54:32 == : new configure hash ( 16 bytes ) 15/05/11 20:54:32 >= : cookies 9db9e285a948b664:77011ca392420f1f 15/05/11 20:54:32 >= : message 560066cc 15/05/11 20:54:32 >= : encrypt iv ( 8 bytes ) 15/05/11 20:54:32 == : encrypt packet ( 56 bytes ) 15/05/11 20:54:32 == : stored iv ( 8 bytes ) 15/05/11 20:54:32 DB : config resend event canceled ( ref count = 1 ) 15/05/11 20:54:32 -> : send IKE packet 10.90.3.53:500 -> 10.90.3.25:500 ( 88 bytes ) 15/05/11 20:54:32 DB : config resend event scheduled ( ref count = 2 ) 15/05/11 20:54:32 ii : building config attribute list 15/05/11 20:54:32 ii : - IP4 Address 15/05/11 20:54:32 ii : - Address Expiry 15/05/11 20:54:32 ii : - IP4 Netmask 15/05/11 20:54:32 ii : - IP4 DNS Server 15/05/11 20:54:32 ii : - IP4 WINS Server 15/05/11 20:54:32 ii : sending config push acknowledge 15/05/11 20:54:32 >> : hash payload 15/05/11 20:54:32 >> : attribute payload 15/05/11 20:54:32 == : new configure hash ( 16 bytes ) 15/05/11 20:54:32 >= : cookies 9db9e285a948b664:77011ca392420f1f 15/05/11 20:54:32 >= : message 560066cc 15/05/11 20:54:32 >= : encrypt iv ( 8 bytes ) 15/05/11 20:54:32 == : encrypt packet ( 76 bytes ) 15/05/11 20:54:32 == : stored iv ( 8 bytes ) 15/05/11 20:54:32 DB : config resend event canceled ( ref count = 1 ) 15/05/11 20:54:32 -> : send IKE packet 10.90.3.53:500 -> 10.90.3.25:500 ( 104 bytes ) 15/05/11 20:54:32 DB : config resend event scheduled ( ref count = 2 ) 15/05/11 20:54:32 <- : recv IKE packet 10.90.3.25:500 -> 10.90.3.53:500 ( 92 bytes ) 15/05/11 20:54:32 DB : phase1 found 15/05/11 20:54:32 ii : processing config packet ( 92 bytes ) 15/05/11 20:54:32 DB : config found 15/05/11 20:54:32 == : new config iv ( 8 bytes ) 15/05/11 20:54:32 =< : cookies 9db9e285a948b664:77011ca392420f1f 15/05/11 20:54:32 =< : message 4e7c4b2c 15/05/11 20:54:32 =< : decrypt iv ( 8 bytes ) 15/05/11 20:54:32 == : decrypt packet ( 92 bytes ) 15/05/11 20:54:32 <= : stored iv ( 8 bytes ) 15/05/11 20:54:32 << : hash payload 15/05/11 20:54:32 << : attribute payload 15/05/11 20:54:32 == : configure hash_i ( computed ) ( 16 bytes ) 15/05/11 20:54:32 == : configure hash_c ( computed ) ( 16 bytes ) 15/05/11 20:54:32 ii : configure hash verified 15/05/11 20:54:32 ii : received config push request 15/05/11 20:54:32 ii : - IP4 Address = 44.128.0.17 15/05/11 20:54:32 ii : - IP4 Netmask = 255.255.255.255 15/05/11 20:54:32 ii : - IP4 DNS Server = 8.8.8.8 15/05/11 20:54:32 ii : - IP4 Subnet 15/05/11 20:54:32 DB : config resend event canceled ( ref count = 1 ) 15/05/11 20:54:32 ii : opened tap device tap0 15/05/11 20:54:32 ii : configured adapter tap0 15/05/11 20:54:32 ii : generating IPSEC security policies at REQUIRE level 15/05/11 20:54:32 ii : creating NONE INBOUND policy ANY:10.90.3.25:* -> ANY:10.90.3.53:* 15/05/11 20:54:32 DB : policy added ( obj count = 5 ) 15/05/11 20:54:32 K> : send pfkey X_SPDADD UNSPEC message 15/05/11 20:54:32 ii : creating NONE OUTBOUND policy ANY:10.90.3.53:* -> ANY:10.90.3.25:* 15/05/11 20:54:32 K< : recv pfkey X_SPDADD UNSPEC message 15/05/11 20:54:32 DB : policy found 15/05/11 20:54:32 ii : created NONE policy route for 10.90.3.25/32 15/05/11 20:54:32 DB : policy added ( obj count = 6 ) 15/05/11 20:54:32 K> : send pfkey X_SPDADD UNSPEC message 15/05/11 20:54:32 ii : creating IPSEC INBOUND policy ANY:0.0.0.0/0:* -> ANY:44.128.0.17:* 15/05/11 20:54:32 K< : recv pfkey X_SPDADD UNSPEC message 15/05/11 20:54:32 DB : policy added ( obj count = 7 ) 15/05/11 20:54:32 K> : send pfkey X_SPDADD UNSPEC message 15/05/11 20:54:32 DB : policy found 15/05/11 20:54:32 ii : calling init phase2 for nailed policy 15/05/11 20:54:32 DB : policy found 15/05/11 20:54:32 DB : policy not found 15/05/11 20:54:32 !! : unable to locate inbound policy for init phase2 15/05/11 20:54:32 ii : creating IPSEC OUTBOUND policy ANY:44.128.0.17:* -> ANY:0.0.0.0/0:* 15/05/11 20:54:32 K< : recv pfkey X_SPDADD UNSPEC message 15/05/11 20:54:32 DB : policy found 15/05/11 20:54:32 ii : created IPSEC policy route for 0.0.0.0 15/05/11 20:54:32 DB : policy added ( obj count = 8 ) 15/05/11 20:54:32 K> : send pfkey X_SPDADD UNSPEC message 15/05/11 20:54:32 K< : recv pfkey X_SPDADD UNSPEC message 15/05/11 20:54:32 DB : policy found 15/05/11 20:54:32 ii : calling init phase2 for nailed policy 15/05/11 20:54:32 DB : policy found 15/05/11 20:54:32 DB : policy found 15/05/11 20:54:32 DB : tunnel found 15/05/11 20:54:32 DB : new phase2 ( IPSEC initiator ) 15/05/11 20:54:32 DB : phase2 added ( obj count = 1 ) 15/05/11 20:54:32 K> : send pfkey GETSPI ESP message 15/05/11 20:54:32 K< : recv pfkey GETSPI ESP message 15/05/11 20:54:32 DB : phase2 found 15/05/11 20:54:32 ii : updated spi for 1 ipsec-esp proposal 15/05/11 20:54:32 DB : phase1 found 15/05/11 20:54:32 >> : hash payload 15/05/11 20:54:32 >> : security association payload 15/05/11 20:54:32 >> : - proposal #1 payload 15/05/11 20:54:32 >> : -- transform #1 payload 15/05/11 20:54:32 >> : nonce payload 15/05/11 20:54:32 >> : identification payload 15/05/11 20:54:32 >> : identification payload 15/05/11 20:54:32 == : phase2 hash_i ( input ) ( 112 bytes ) 15/05/11 20:54:32 == : phase2 hash_i ( computed ) ( 16 bytes ) 15/05/11 20:54:32 == : new phase2 iv ( 8 bytes ) 15/05/11 20:54:32 >= : cookies 9db9e285a948b664:77011ca392420f1f 15/05/11 20:54:32 >= : message f75a2230 15/05/11 20:54:32 >= : encrypt iv ( 8 bytes ) 15/05/11 20:54:32 == : encrypt packet ( 156 bytes ) 15/05/11 20:54:32 == : stored iv ( 8 bytes ) 15/05/11 20:54:32 -> : send IKE packet 10.90.3.53:500 -> 10.90.3.25:500 ( 184 bytes ) 15/05/11 20:54:32 DB : phase2 resend event scheduled ( ref count = 2 ) 15/05/11 20:54:32 <- : recv IKE packet 10.90.3.25:500 -> 10.90.3.53:500 ( 156 bytes ) 15/05/11 20:54:32 DB : phase1 found 15/05/11 20:54:32 ii : processing phase2 packet ( 156 bytes ) 15/05/11 20:54:32 DB : phase2 found 15/05/11 20:54:32 =< : cookies 9db9e285a948b664:77011ca392420f1f 15/05/11 20:54:32 =< : message f75a2230 15/05/11 20:54:32 =< : decrypt iv ( 8 bytes ) 15/05/11 20:54:32 == : decrypt packet ( 156 bytes ) 15/05/11 20:54:32 <= : trimmed packet padding ( 4 bytes ) 15/05/11 20:54:32 <= : stored iv ( 8 bytes ) 15/05/11 20:54:32 << : hash payload 15/05/11 20:54:32 << : security association payload 15/05/11 20:54:32 << : - propsal #1 payload 15/05/11 20:54:32 << : -- transform #1 payload 15/05/11 20:54:32 << : nonce payload 15/05/11 20:54:32 << : identification payload 15/05/11 20:54:32 << : identification payload 15/05/11 20:54:32 == : phase2 hash_r ( input ) ( 128 bytes ) 15/05/11 20:54:32 == : phase2 hash_r ( computed ) ( 16 bytes ) 15/05/11 20:54:32 == : phase2 hash_r ( received ) ( 16 bytes ) 15/05/11 20:54:32 ii : matched ipsec-esp proposal #1 transform #1 15/05/11 20:54:32 ii : - transform = esp-aes 15/05/11 20:54:32 ii : - key length = 256 bits 15/05/11 20:54:32 ii : - encap mode = tunnel 15/05/11 20:54:32 ii : - msg auth = hmac-sha1 15/05/11 20:54:32 ii : - pfs dh group = none 15/05/11 20:54:32 ii : - life seconds = 28800 15/05/11 20:54:32 ii : - life kbytes = 0 15/05/11 20:54:32 DB : policy found 15/05/11 20:54:32 K> : send pfkey GETSPI ESP message 15/05/11 20:54:32 ii : phase2 ids accepted 15/05/11 20:54:32 ii : - loc ANY:44.128.0.17:* -> ANY:0.0.0.0/0:* 15/05/11 20:54:32 ii : - rmt ANY:0.0.0.0/0:* -> ANY:44.128.0.17:* 15/05/11 20:54:32 K< : recv pfkey GETSPI ESP message 15/05/11 20:54:32 DB : phase2 found 15/05/11 20:54:32 ii : phase2 sa established 15/05/11 20:54:32 ii : 10.90.3.53:500 <-> 10.90.3.25:500 15/05/11 20:54:32 == : phase2 hash_p ( input ) ( 41 bytes ) 15/05/11 20:54:32 == : phase2 hash_p ( computed ) ( 16 bytes ) 15/05/11 20:54:32 >> : hash payload 15/05/11 20:54:32 >= : cookies 9db9e285a948b664:77011ca392420f1f 15/05/11 20:54:32 >= : message f75a2230 15/05/11 20:54:32 >= : encrypt iv ( 8 bytes ) 15/05/11 20:54:32 == : encrypt packet ( 48 bytes ) 15/05/11 20:54:32 == : stored iv ( 8 bytes ) 15/05/11 20:54:32 DB : phase2 resend event canceled ( ref count = 1 ) 15/05/11 20:54:32 -> : send IKE packet 10.90.3.53:500 -> 10.90.3.25:500 ( 80 bytes ) 15/05/11 20:54:32 == : spi cipher key data ( 32 bytes ) 15/05/11 20:54:32 == : spi hmac key data ( 20 bytes ) 15/05/11 20:54:32 K> : send pfkey UPDATE ESP message 15/05/11 20:54:32 K< : recv pfkey UPDATE ESP message 15/05/11 20:54:32 == : spi cipher key data ( 32 bytes ) 15/05/11 20:54:32 == : spi hmac key data ( 20 bytes ) 15/05/11 20:54:32 K> : send pfkey UPDATE ESP message 15/05/11 20:54:32 K< : recv pfkey UPDATE ESP message 15/05/11 20:54:32 <- : recv IKE packet 10.90.3.25:500 -> 10.90.3.53:500 ( 68 bytes ) 15/05/11 20:54:32 DB : phase1 found 15/05/11 20:54:32 ii : processing informational packet ( 68 bytes ) 15/05/11 20:54:32 == : new informational iv ( 8 bytes ) 15/05/11 20:54:32 =< : cookies 9db9e285a948b664:77011ca392420f1f 15/05/11 20:54:32 =< : message ebb536ea 15/05/11 20:54:32 =< : decrypt iv ( 8 bytes ) 15/05/11 20:54:32 == : decrypt packet ( 68 bytes ) 15/05/11 20:54:32 <= : trimmed packet padding ( 4 bytes ) 15/05/11 20:54:32 <= : stored iv ( 8 bytes ) 15/05/11 20:54:32 << : hash payload 15/05/11 20:54:32 << : delete payload 15/05/11 20:54:32 == : informational hash_i ( computed ) ( 16 bytes ) 15/05/11 20:54:32 == : informational hash_c ( received ) ( 16 bytes ) 15/05/11 20:54:32 ii : informational hash verified 15/05/11 20:54:32 ii : received peer DELETE message 15/05/11 20:54:32 ii : - 10.90.3.25:500 -> 10.90.3.53:500 15/05/11 20:54:32 ii : - ipsec-esp spi = 0x3e524c5c 15/05/11 20:54:32 DB : phase2 not found 15/05/11 20:54:42 <- : recv IKE packet 10.90.3.25:500 -> 10.90.3.53:500 ( 92 bytes ) 15/05/11 20:54:42 DB : phase1 found 15/05/11 20:54:42 ii : processing config packet ( 92 bytes ) 15/05/11 20:54:42 DB : config found 15/05/11 20:54:42 !! : config packet ignored ( config already mature ) 15/05/11 20:54:52 <- : recv IKE packet 10.90.3.25:500 -> 10.90.3.53:500 ( 92 bytes ) 15/05/11 20:54:52 DB : phase1 found 15/05/11 20:54:52 ii : processing config packet ( 92 bytes ) 15/05/11 20:54:52 DB : config found 15/05/11 20:54:52 !! : config packet ignored ( config already mature ) 15/05/11 20:55:02 <- : recv IKE packet 10.90.3.25:500 -> 10.90.3.53:500 ( 92 bytes ) 15/05/11 20:55:02 DB : phase1 found 15/05/11 20:55:02 ii : processing config packet ( 92 bytes ) 15/05/11 20:55:02 DB : config found 15/05/11 20:55:02 !! : config packet ignored ( config already mature ) 15/05/11 20:55:12 <- : recv IKE packet 10.90.3.25:500 -> 10.90.3.53:500 ( 92 bytes ) 15/05/11 20:55:12 DB : phase1 found 15/05/11 20:55:12 ii : processing config packet ( 92 bytes ) 15/05/11 20:55:12 DB : config found 15/05/11 20:55:12 !! : config packet ignored ( config already mature ) 15/05/11 20:55:22 <- : recv IKE packet 10.90.3.25:500 -> 10.90.3.53:500 ( 92 bytes ) 15/05/11 20:55:22 DB : phase1 found 15/05/11 20:55:22 ii : processing config packet ( 92 bytes ) 15/05/11 20:55:22 DB : config found 15/05/11 20:55:22 !! : config packet ignored ( config already mature ) 15/05/11 20:55:32 <- : recv IKE packet 10.90.3.25:500 -> 10.90.3.53:500 ( 76 bytes ) 15/05/11 20:55:32 DB : phase1 found 15/05/11 20:55:32 ii : processing informational packet ( 76 bytes ) 15/05/11 20:55:32 == : new informational iv ( 8 bytes ) 15/05/11 20:55:32 =< : cookies 9db9e285a948b664:77011ca392420f1f 15/05/11 20:55:32 =< : message 6c35776b 15/05/11 20:55:32 =< : decrypt iv ( 8 bytes ) 15/05/11 20:55:32 == : decrypt packet ( 76 bytes ) 15/05/11 20:55:32 <= : stored iv ( 8 bytes ) 15/05/11 20:55:32 << : hash payload 15/05/11 20:55:32 << : delete payload 15/05/11 20:55:32 == : informational hash_i ( computed ) ( 16 bytes ) 15/05/11 20:55:32 == : informational hash_c ( received ) ( 16 bytes ) 15/05/11 20:55:32 ii : informational hash verified 15/05/11 20:55:32 ii : received peer DELETE message 15/05/11 20:55:32 ii : - 10.90.3.25:500 -> 10.90.3.53:500 15/05/11 20:55:32 ii : - isakmp spi = 9db9e285a948b664:77011ca392420f1f 15/05/11 20:55:32 DB : phase1 found 15/05/11 20:55:32 ii : cleanup, marked phase1 9db9e285a948b664:77011ca392420f1f for removal 15/05/11 20:55:32 DB : phase1 soft event canceled ( ref count = 4 ) 15/05/11 20:55:32 DB : phase1 hard event canceled ( ref count = 3 ) 15/05/11 20:55:32 DB : phase1 dead event canceled ( ref count = 2 ) 15/05/11 20:55:32 DB : config deleted ( obj count = 0 ) 15/05/11 20:55:32 ii : phase1 removal before expire time 15/05/11 20:55:32 DB : phase1 not found 15/05/11 20:55:32 DB : phase1 deleted ( obj count = 0 ) 15/05/11 20:55:32 DB : policy found 15/05/11 20:55:32 ii : removing IPSEC INBOUND policy ANY:0.0.0.0/0:* -> ANY:44.128.0.17:* 15/05/11 20:55:32 K> : send pfkey X_SPDDELETE2 UNSPEC message 15/05/11 20:55:32 K< : recv pfkey X_SPDDELETE2 UNSPEC message 15/05/11 20:55:32 DB : policy found 15/05/11 20:55:32 ii : removing IPSEC OUTBOUND policy ANY:44.128.0.17:* -> ANY:0.0.0.0/0:* 15/05/11 20:55:32 K> : send pfkey X_SPDDELETE2 UNSPEC message 15/05/11 20:55:32 ii : removed IPSEC policy route for ANY:0.0.0.0/0:* 15/05/11 20:55:32 DB : policy found 15/05/11 20:55:32 ii : removing NONE INBOUND policy ANY:10.90.3.25:* -> ANY:10.90.3.53:* 15/05/11 20:55:32 K> : send pfkey X_SPDDELETE2 UNSPEC message 15/05/11 20:55:32 DB : policy found 15/05/11 20:55:32 ii : removing NONE OUTBOUND policy ANY:10.90.3.53:* -> ANY:10.90.3.25:* 15/05/11 20:55:32 K> : send pfkey X_SPDDELETE2 UNSPEC message 15/05/11 20:55:32 ii : removed NONE policy route for ANY:10.90.3.25:* 15/05/11 20:55:32 DB : policy found 15/05/11 20:55:32 DB : policy deleted ( obj count = 7 ) 15/05/11 20:55:32 K< : recv pfkey X_SPDDELETE2 UNSPEC message 15/05/11 20:55:32 DB : policy found 15/05/11 20:55:32 DB : policy deleted ( obj count = 6 ) 15/05/11 20:55:32 K< : recv pfkey X_SPDDELETE2 UNSPEC message 15/05/11 20:55:32 DB : policy found 15/05/11 20:55:32 DB : policy deleted ( obj count = 5 ) 15/05/11 20:55:32 K< : recv pfkey X_SPDDELETE2 UNSPEC message 15/05/11 20:55:32 DB : policy found 15/05/11 20:55:32 DB : policy deleted ( obj count = 4 ) 15/05/11 20:55:32 ii : closed tap device tap0 15/05/11 20:55:32 DB : tunnel stats event canceled ( ref count = 2 ) 15/05/11 20:55:32 DB : removing tunnel config references 15/05/11 20:55:32 DB : removing tunnel phase2 references 15/05/11 20:55:32 DB : phase2 soft event canceled ( ref count = 2 ) 15/05/11 20:55:32 DB : phase2 hard event canceled ( ref count = 1 ) 15/05/11 20:55:32 DB : phase1 not found 15/05/11 20:55:32 K> : send pfkey DELETE ESP message 15/05/11 20:55:32 K> : send pfkey DELETE ESP message 15/05/11 20:55:32 ii : phase2 removal before expire time 15/05/11 20:55:32 K< : recv pfkey DELETE ESP message 15/05/11 20:55:32 K< : recv pfkey DELETE ESP message 15/05/11 20:55:32 DB : phase2 deleted ( obj count = 0 ) 15/05/11 20:55:32 DB : removing tunnel phase1 references 15/05/11 20:55:32 DB : tunnel deleted ( obj count = 0 ) 15/05/11 20:55:32 DB : removing all peer tunnel references 15/05/11 20:55:32 DB : peer deleted ( obj count = 0 ) 15/05/11 20:55:32 ii : ipc client process thread exit ...