-FW01..COM-> get db stream ## 2016-05-21 18:51:10 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:51:10 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:51:10 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:51:10 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:51:10 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:51:10 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:51:10 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:51:10 : getProfileFromP1Proposal-> ## 2016-05-21 18:51:10 : find profile[0]=<00000005 00000002 00000001 00000002> for p1 proposal (id 5), xauth(0) ## 2016-05-21 18:51:10 : init p1sa, pidt = 0x0 ## 2016-05-21 18:51:10 : change peer identity for p1 sa, pidt = 0x0 ## 2016-05-21 18:51:10 : IKE<0.0.0.0 > peer_identity_create_with_uid: uid<0> ## 2016-05-21 18:51:10 : IKE<0.0.0.0 > create peer identity 0x6990b54 ## 2016-05-21 18:51:10 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry before add <1> ## 2016-05-21 18:51:10 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry after add <2> ## 2016-05-21 18:51:10 : peer identity 6990b54 created. ## 2016-05-21 18:51:10 : IKE<0.0.0.0 > EDIPI disabled ## 2016-05-21 18:51:10 : IKE<0.0.0.0 > set_phase1_transform, dh_group(2). ## 2016-05-21 18:51:11 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:51:11 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:51:11 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:51:11 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:51:11 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:51:11 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:51:11 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:51:13 : IKE<2.2.2.2> re-trans timer expired, msg retry (6) (80120f/2) ## 2016-05-21 18:51:13 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:13 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:51:15 : IKE<2.2.2.2> ike packet, len 172, action 1 ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Catcher: received 144 bytes from socket. ## 2016-05-21 18:51:15 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Catcher: get 144 bytes. src port 500 ## 2016-05-21 18:51:15 : IKE<0.0.0.0 > ISAKMP msg: len 144, nxp 1[SA], exch 2[MM], flag 00 ## 2016-05-21 18:51:15 : IKE<2.2.2.2 > Recv : [SA] [VID] [VID] ## 2016-05-21 18:51:15 : IKE<2.2.2.2> found peer Dallas_VPN_Gateway ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Found peer entry (Dallas_VPN_Gateway) from 2.2.2.2. ## 2016-05-21 18:51:15 : responder create sa: 2.2.2.2->199.188.209.36 ## 2016-05-21 18:51:15 : init p1sa, pidt = 0x0 ## 2016-05-21 18:51:15 : change peer identity for p1 sa, pidt = 0x0 ## 2016-05-21 18:51:15 : IKE<0.0.0.0 > peer_identity_create_with_uid: uid<0> ## 2016-05-21 18:51:15 : IKE<0.0.0.0 > create peer identity 0x69910bc ## 2016-05-21 18:51:15 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry before add <3> ## 2016-05-21 18:51:15 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry after add <4> ## 2016-05-21 18:51:15 : peer identity 69910bc created. ## 2016-05-21 18:51:15 : IKE<0.0.0.0 > EDIPI disabled ## 2016-05-21 18:51:15 : IKE<2.2.2.2> getProfileFromP1Proposal-> ## 2016-05-21 18:51:15 : IKE<2.2.2.2> find profile[0]=<00000005 00000002 00000001 00000002> for p1 proposal (id 5), xauth(0) ## 2016-05-21 18:51:15 : IKE<2.2.2.2> responder create sa: 2.2.2.2->199.188.209.36 ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Phase 1: Responder starts MAIN mode negotiations. ## 2016-05-21 18:51:15 : IKE<2.2.2.2> MM in state OAK_MM_NO_STATE. ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Process [VID]: ## 2016-05-21 18:51:15 : IKE<2.2.2.2 > Vendor ID: ## 2016-05-21 18:51:15 : af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Process [VID]: ## 2016-05-21 18:51:15 : IKE<2.2.2.2 > Vendor ID: ## 2016-05-21 18:51:15 : 69 93 69 22 87 41 c6 d4 ca 09 4c 93 e2 42 c9 de ## 2016-05-21 18:51:15 : 19 e7 b7 c6 00 00 00 05 00 00 05 00 ## 2016-05-21 18:51:15 : IKE<2.2.2.2> peer is an NetScreen box, model=NetScreen-204, ver=5.00 ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Process [SA]: ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Proposal received: xauthflag 0 ## 2016-05-21 18:51:15 : IKE<2.2.2.2> auth(1), encr(5)<3DES>, hash(2), group(2) ## 2016-05-21 18:51:15 : IKE<2.2.2.2> xauth attribute: disabled ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Phase 1 proposal [0] selected. ## 2016-05-21 18:51:15 : IKE<2.2.2.2> SA Life Type = seconds ## 2016-05-21 18:51:15 : IKE<2.2.2.2> SA lifetime (TLV) = 28800 ## 2016-05-21 18:51:15 : IKE<2.2.2.2> DH_BG_consume OK. p1 resp ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Phase 1 MM Responder constructing 2nd message. ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Msg header built (next payload #1) ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Construct [SA] for ISAKMP ## 2016-05-21 18:51:15 : IKE<2.2.2.2> auth(1), encr(5)<3DES>, hash(2), group(2) ## 2016-05-21 18:51:15 : IKE<2.2.2.2> xauth attribute: disabled ## 2016-05-21 18:51:15 : IKE<2.2.2.2> lifetime/lifesize (28800/0) ## 2016-05-21 18:51:15 : IKE<0.0.0.0 > set_phase1_transform, dh_group(2). ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Construct NetScreen [VID] ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Construct custom [VID] ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Construct custom [VID] ## 2016-05-21 18:51:15 : IKE<2.2.2.2 > Xmit : [SA] [VID] [VID] [VID] ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Send Phase 1 packet (len=156) ## 2016-05-21 18:51:15 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<1/800203> ## 2016-05-21 18:51:15 : IKE<2.2.2.2> ike packet, len 208, action 0 ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Catcher: received 180 bytes from socket. ## 2016-05-21 18:51:15 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Catcher: get 180 bytes. src port 500 ## 2016-05-21 18:51:15 : IKE<0.0.0.0 > ISAKMP msg: len 180, nxp 4[KE], exch 2[MM], flag 00 ## 2016-05-21 18:51:15 : IKE<2.2.2.2 > Recv : [KE] [NONCE] ## 2016-05-21 18:51:15 : IKE<0.0.0.0 > extract payload (152): ## 2016-05-21 18:51:15 : IKE<2.2.2.2> MM in state OAK_MM_SA_SETUP. ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Process [KE]: ## 2016-05-21 18:51:15 : IKE<2.2.2.2> processing ISA_KE in phase 1. ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Phase1: his_DH_pub_len is 128 ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Process [NONCE]: ## 2016-05-21 18:51:15 : IKE<2.2.2.2> processing NONCE in phase 1. ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Phase 1 MM Responder constructing 4th message. ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Msg header built (next payload #4) ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Construct [KE] for ISAKMP ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Construct [NONCE] ## 2016-05-21 18:51:15 : IKE<2.2.2.2 > Xmit : [KE] [NONCE] ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:51:15 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<2/80220f> ## 2016-05-21 18:51:15 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:51:15 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:51:15 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:51:15 : IKE<2.2.2.2> gen_skeyid() ## 2016-05-21 18:51:15 : IKE<2.2.2.2> gen_skeyid: returning 0 ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Decrypting payload (length 64) ## 2016-05-21 18:51:15 : IKE<2.2.2.2 > Recv*: [ID] +++ Corrupted MSG ## 2016-05-21 18:51:15 : valid id checking, id type:unknown, len:36014. ## 2016-05-21 18:51:15 : Error: invalid id payload type. ## 2016-05-21 18:51:15 : IKE<0.0.0.0 > Validate (64): bad 5 ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Packet is invalid! ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Pre-shared key might not match. ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Create conn entry... ## 2016-05-21 18:51:15 : IKE<2.2.2.2> ...done(new 3475c51e) ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Msg header built (next payload #8) ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Construct [HASH] ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Construct [NOTIF]:(PAYLOAD-MALFORMED) ## 2016-05-21 18:51:15 : IKE<2.2.2.2> construct QM HASH ## 2016-05-21 18:51:15 : IKE<2.2.2.2 > Xmit*: [HASH] [NOTIF] ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Encrypt P2 payload (len 88) ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Send Phase 2 packet (len=92) ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Delete conn entry... ## 2016-05-21 18:51:15 : IKE<2.2.2.2> ...found conn entry(3475c51e) ## 2016-05-21 18:51:17 : IKE<2.2.2.2> re-trans timer expired, msg retry (7) (80120f/2) ## 2016-05-21 18:51:17 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:17 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:51:19 : IKE<2.2.2.2> re-trans timer expired, msg retry (0) (80120f/2) ## 2016-05-21 18:51:19 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:19 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:51:21 : IKE<2.2.2.2> re-trans timer expired, msg retry (8) (80120f/2) ## 2016-05-21 18:51:21 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:21 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:51:23 : IKE<2.2.2.2> re-trans timer expired, msg retry (1) (80120f/2) ## 2016-05-21 18:51:23 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:23 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:51:25 : IKE<2.2.2.2> re-trans timer expired, msg retry (9) (80120f/2) ## 2016-05-21 18:51:25 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:25 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:51:25 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:51:25 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:51:25 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:51:25 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:51:25 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:51:25 : IKE<2.2.2.2> Receive re-transmit IKE packet phase 1 SA(2.2.2.2) exchg(2) len(92) ## 2016-05-21 18:51:27 : IKE<2.2.2.2> re-trans timer expired, msg retry (2) (80120f/2) ## 2016-05-21 18:51:27 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:27 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:51:29 : IKE<2.2.2.2> re-trans timer expired, msg retry (10) (80120f/2) ## 2016-05-21 18:51:29 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:29 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:51:31 : IKE<2.2.2.2> re-trans timer expired, msg retry (3) (80120f/2) ## 2016-05-21 18:51:31 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:31 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:51:32 : reap_db. deleting p1sa 6999210 ## 2016-05-21 18:51:32 : terminate_SA: trying to delete SA cause: 0 cond: 2 ## 2016-05-21 18:51:32 : IKE<2.2.2.2> xauth_cleanup() ## 2016-05-21 18:51:32 : IKE<2.2.2.2> Done cleaning up IKE Phase 1 SA ## 2016-05-21 18:51:32 : peer_identity_unregister_p1_sa. ## 2016-05-21 18:51:32 : IKE<0.0.0.0 > delete peer identity 0x6991370 ## 2016-05-21 18:51:32 : IKE<0.0.0.0 > peer_identity_remove_from_peer: num entry before remove <4> ## 2016-05-21 18:51:32 : peer_idt.c peer_identity_unregister_p1_sa 686: pidt deleted. ## 2016-05-21 18:51:32 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:51:32 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:51:32 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:51:32 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:51:32 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:51:32 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:51:32 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:51:33 : IKE<2.2.2.2> re-trans timer expired, msg retry (11) (80120f/2) ## 2016-05-21 18:51:33 : IKE<2.2.2.2> Phase 1: Retransmission limit has been reached. MAVERICK-FW01.MAVTECHGLOBAL.COM-> get db stream ## 2016-05-21 18:51:10 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:51:10 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:51:10 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:51:10 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:51:10 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:51:10 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:51:10 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:51:10 : getProfileFromP1Proposal-> ## 2016-05-21 18:51:10 : find profile[0]=<00000005 00000002 00000001 00000002> for p1 proposal (id 5), xauth(0) ## 2016-05-21 18:51:10 : init p1sa, pidt = 0x0 ## 2016-05-21 18:51:10 : change peer identity for p1 sa, pidt = 0x0 ## 2016-05-21 18:51:10 : IKE<0.0.0.0 > peer_identity_create_with_uid: uid<0> ## 2016-05-21 18:51:10 : IKE<0.0.0.0 > create peer identity 0x6990b54 ## 2016-05-21 18:51:10 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry before add <1> ## 2016-05-21 18:51:10 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry after add <2> ## 2016-05-21 18:51:10 : peer identity 6990b54 created. ## 2016-05-21 18:51:10 : IKE<0.0.0.0 > EDIPI disabled ## 2016-05-21 18:51:10 : IKE<0.0.0.0 > set_phase1_transform, dh_group(2). ## 2016-05-21 18:51:11 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:51:11 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:51:11 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:51:11 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:51:11 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:51:11 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:51:11 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:51:13 : IKE<2.2.2.2> re-trans timer expired, msg retry (6) (80120f/2) ## 2016-05-21 18:51:13 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:13 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:51:15 : IKE<2.2.2.2> ike packet, len 172, action 1 ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Catcher: received 144 bytes from socket. ## 2016-05-21 18:51:15 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Catcher: get 144 bytes. src port 500 ## 2016-05-21 18:51:15 : IKE<0.0.0.0 > ISAKMP msg: len 144, nxp 1[SA], exch 2[MM], flag 00 ## 2016-05-21 18:51:15 : IKE<2.2.2.2 > Recv : [SA] [VID] [VID] ## 2016-05-21 18:51:15 : IKE<2.2.2.2> found peer Dallas_VPN_Gateway ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Found peer entry (Dallas_VPN_Gateway) from 2.2.2.2. ## 2016-05-21 18:51:15 : responder create sa: 2.2.2.2->199.188.209.36 ## 2016-05-21 18:51:15 : init p1sa, pidt = 0x0 ## 2016-05-21 18:51:15 : change peer identity for p1 sa, pidt = 0x0 ## 2016-05-21 18:51:15 : IKE<0.0.0.0 > peer_identity_create_with_uid: uid<0> ## 2016-05-21 18:51:15 : IKE<0.0.0.0 > create peer identity 0x69910bc ## 2016-05-21 18:51:15 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry before add <3> ## 2016-05-21 18:51:15 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry after add <4> ## 2016-05-21 18:51:15 : peer identity 69910bc created. ## 2016-05-21 18:51:15 : IKE<0.0.0.0 > EDIPI disabled ## 2016-05-21 18:51:15 : IKE<2.2.2.2> getProfileFromP1Proposal-> ## 2016-05-21 18:51:15 : IKE<2.2.2.2> find profile[0]=<00000005 00000002 00000001 00000002> for p1 proposal (id 5), xauth(0) ## 2016-05-21 18:51:15 : IKE<2.2.2.2> responder create sa: 2.2.2.2->199.188.209.36 ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Phase 1: Responder starts MAIN mode negotiations. ## 2016-05-21 18:51:15 : IKE<2.2.2.2> MM in state OAK_MM_NO_STATE. ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Process [VID]: ## 2016-05-21 18:51:15 : IKE<2.2.2.2 > Vendor ID: ## 2016-05-21 18:51:15 : af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Process [VID]: ## 2016-05-21 18:51:15 : IKE<2.2.2.2 > Vendor ID: ## 2016-05-21 18:51:15 : 69 93 69 22 87 41 c6 d4 ca 09 4c 93 e2 42 c9 de ## 2016-05-21 18:51:15 : 19 e7 b7 c6 00 00 00 05 00 00 05 00 ## 2016-05-21 18:51:15 : IKE<2.2.2.2> peer is an NetScreen box, model=NetScreen-204, ver=5.00 ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Process [SA]: ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Proposal received: xauthflag 0 ## 2016-05-21 18:51:15 : IKE<2.2.2.2> auth(1), encr(5)<3DES>, hash(2), group(2) ## 2016-05-21 18:51:15 : IKE<2.2.2.2> xauth attribute: disabled ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Phase 1 proposal [0] selected. ## 2016-05-21 18:51:15 : IKE<2.2.2.2> SA Life Type = seconds ## 2016-05-21 18:51:15 : IKE<2.2.2.2> SA lifetime (TLV) = 28800 ## 2016-05-21 18:51:15 : IKE<2.2.2.2> DH_BG_consume OK. p1 resp ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Phase 1 MM Responder constructing 2nd message. ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Msg header built (next payload #1) ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Construct [SA] for ISAKMP ## 2016-05-21 18:51:15 : IKE<2.2.2.2> auth(1), encr(5)<3DES>, hash(2), group(2) ## 2016-05-21 18:51:15 : IKE<2.2.2.2> xauth attribute: disabled ## 2016-05-21 18:51:15 : IKE<2.2.2.2> lifetime/lifesize (28800/0) ## 2016-05-21 18:51:15 : IKE<0.0.0.0 > set_phase1_transform, dh_group(2). ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Construct NetScreen [VID] ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Construct custom [VID] ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Construct custom [VID] ## 2016-05-21 18:51:15 : IKE<2.2.2.2 > Xmit : [SA] [VID] [VID] [VID] ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Send Phase 1 packet (len=156) ## 2016-05-21 18:51:15 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<1/800203> ## 2016-05-21 18:51:15 : IKE<2.2.2.2> ike packet, len 208, action 0 ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Catcher: received 180 bytes from socket. ## 2016-05-21 18:51:15 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Catcher: get 180 bytes. src port 500 ## 2016-05-21 18:51:15 : IKE<0.0.0.0 > ISAKMP msg: len 180, nxp 4[KE], exch 2[MM], flag 00 ## 2016-05-21 18:51:15 : IKE<2.2.2.2 > Recv : [KE] [NONCE] ## 2016-05-21 18:51:15 : IKE<0.0.0.0 > extract payload (152): ## 2016-05-21 18:51:15 : IKE<2.2.2.2> MM in state OAK_MM_SA_SETUP. ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Process [KE]: ## 2016-05-21 18:51:15 : IKE<2.2.2.2> processing ISA_KE in phase 1. ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Phase1: his_DH_pub_len is 128 ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Process [NONCE]: ## 2016-05-21 18:51:15 : IKE<2.2.2.2> processing NONCE in phase 1. ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Phase 1 MM Responder constructing 4th message. ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Msg header built (next payload #4) ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Construct [KE] for ISAKMP ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Construct [NONCE] ## 2016-05-21 18:51:15 : IKE<2.2.2.2 > Xmit : [KE] [NONCE] ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:51:15 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<2/80220f> ## 2016-05-21 18:51:15 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:51:15 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:51:15 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:51:15 : IKE<2.2.2.2> gen_skeyid() ## 2016-05-21 18:51:15 : IKE<2.2.2.2> gen_skeyid: returning 0 ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Decrypting payload (length 64) ## 2016-05-21 18:51:15 : IKE<2.2.2.2 > Recv*: [ID] +++ Corrupted MSG ## 2016-05-21 18:51:15 : valid id checking, id type:unknown, len:36014. ## 2016-05-21 18:51:15 : Error: invalid id payload type. ## 2016-05-21 18:51:15 : IKE<0.0.0.0 > Validate (64): bad 5 ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Packet is invalid! ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Pre-shared key might not match. ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Create conn entry... ## 2016-05-21 18:51:15 : IKE<2.2.2.2> ...done(new 3475c51e) ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Msg header built (next payload #8) ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Construct [HASH] ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Construct [NOTIF]:(PAYLOAD-MALFORMED) ## 2016-05-21 18:51:15 : IKE<2.2.2.2> construct QM HASH ## 2016-05-21 18:51:15 : IKE<2.2.2.2 > Xmit*: [HASH] [NOTIF] ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Encrypt P2 payload (len 88) ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Send Phase 2 packet (len=92) ## 2016-05-21 18:51:15 : IKE<2.2.2.2> Delete conn entry... ## 2016-05-21 18:51:15 : IKE<2.2.2.2> ...found conn entry(3475c51e) ## 2016-05-21 18:51:17 : IKE<2.2.2.2> re-trans timer expired, msg retry (7) (80120f/2) ## 2016-05-21 18:51:17 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:17 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:51:19 : IKE<2.2.2.2> re-trans timer expired, msg retry (0) (80120f/2) ## 2016-05-21 18:51:19 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:19 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:51:21 : IKE<2.2.2.2> re-trans timer expired, msg retry (8) (80120f/2) ## 2016-05-21 18:51:21 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:21 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:51:23 : IKE<2.2.2.2> re-trans timer expired, msg retry (1) (80120f/2) ## 2016-05-21 18:51:23 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:23 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:51:25 : IKE<2.2.2.2> re-trans timer expired, msg retry (9) (80120f/2) ## 2016-05-21 18:51:25 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:25 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:51:25 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:51:25 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:51:25 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:51:25 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:51:25 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:51:25 : IKE<2.2.2.2> Receive re-transmit IKE packet phase 1 SA(2.2.2.2) exchg(2) len(92) ## 2016-05-21 18:51:27 : IKE<2.2.2.2> re-trans timer expired, msg retry (2) (80120f/2) ## 2016-05-21 18:51:27 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:27 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:51:29 : IKE<2.2.2.2> re-trans timer expired, msg retry (10) (80120f/2) ## 2016-05-21 18:51:29 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:29 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:51:31 : IKE<2.2.2.2> re-trans timer expired, msg retry (3) (80120f/2) ## 2016-05-21 18:51:31 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:31 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:51:32 : reap_db. deleting p1sa 6999210 ## 2016-05-21 18:51:32 : terminate_SA: trying to delete SA cause: 0 cond: 2 ## 2016-05-21 18:51:32 : IKE<2.2.2.2> xauth_cleanup() ## 2016-05-21 18:51:32 : IKE<2.2.2.2> Done cleaning up IKE Phase 1 SA ## 2016-05-21 18:51:32 : peer_identity_unregister_p1_sa. ## 2016-05-21 18:51:32 : IKE<0.0.0.0 > delete peer identity 0x6991370 ## 2016-05-21 18:51:32 : IKE<0.0.0.0 > peer_identity_remove_from_peer: num entry before remove <4> ## 2016-05-21 18:51:32 : peer_idt.c peer_identity_unregister_p1_sa 686: pidt deleted. ## 2016-05-21 18:51:32 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:51:32 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:51:32 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:51:32 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:51:32 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:51:32 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:51:32 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:51:33 : IKE<2.2.2.2> re-trans timer expired, msg retry (11) (80120f/2) ## 2016-05-21 18:51:33 : IKE<2.2.2.2> Phase 1: Retransmission limit has been reached. ## 2016-05-21 18:51:35 : IKE<2.2.2.2> re-trans timer expired, msg retry (4) (80120f/2) ## 2016-05-21 18:51:35 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:35 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:51:35 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:51:35 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:51:35 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:51:35 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:51:35 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:51:35 : IKE<2.2.2.2> Receive re-transmit IKE packet phase 1 SA(2.2.2.2) exchg(2) len(92) ## 2016-05-21 18:51:39 : IKE<2.2.2.2> re-trans timer expired, msg retry (5) (80120f/2) ## 2016-05-21 18:51:39 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:39 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:51:43 : IKE<2.2.2.2> re-trans timer expired, msg retry (6) (80120f/2) ## 2016-05-21 18:51:43 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:43 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:51:43 : IKE<2.2.2.2> ****** Recv kernel msg IDX-1, TYPE-5 ****** ## 2016-05-21 18:51:43 : IKE<2.2.2.2> ****** Recv kernel msg IDX-1, TYPE-5 ****** ## 2016-05-21 18:51:43 : IKE<2.2.2.2> sa orig index<1>, peer_id<3>. ## 2016-05-21 18:51:43 : IKE<2.2.2.2> isadb_get_entry_by_peer_and_local_if_port_p2sa isadb get entry by peer/local ip and port ## 2016-05-21 18:51:43 : IKE<2.2.2.2> Added Phase 2 session tasks to the task list. ## 2016-05-21 18:51:44 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:51:44 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:51:44 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:51:44 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:51:44 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:51:44 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:51:44 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:51:45 : IKE<2.2.2.2> ike packet, len 172, action 1 ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Catcher: received 144 bytes from socket. ## 2016-05-21 18:51:45 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Catcher: get 144 bytes. src port 500 ## 2016-05-21 18:51:45 : IKE<0.0.0.0 > ISAKMP msg: len 144, nxp 1[SA], exch 2[MM], flag 00 ## 2016-05-21 18:51:45 : IKE<2.2.2.2 > Recv : [SA] [VID] [VID] ## 2016-05-21 18:51:45 : IKE<2.2.2.2> found peer Dallas_VPN_Gateway ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Found peer entry (Dallas_VPN_Gateway) from 2.2.2.2. ## 2016-05-21 18:51:45 : responder create sa: 2.2.2.2->199.188.209.36 ## 2016-05-21 18:51:45 : init p1sa, pidt = 0x0 ## 2016-05-21 18:51:45 : change peer identity for p1 sa, pidt = 0x0 ## 2016-05-21 18:51:45 : IKE<0.0.0.0 > peer_identity_create_with_uid: uid<0> ## 2016-05-21 18:51:45 : IKE<0.0.0.0 > create peer identity 0x6991370 ## 2016-05-21 18:51:45 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry before add <3> ## 2016-05-21 18:51:45 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry after add <4> ## 2016-05-21 18:51:45 : peer identity 6991370 created. ## 2016-05-21 18:51:45 : IKE<0.0.0.0 > EDIPI disabled ## 2016-05-21 18:51:45 : IKE<2.2.2.2> getProfileFromP1Proposal-> ## 2016-05-21 18:51:45 : IKE<2.2.2.2> find profile[0]=<00000005 00000002 00000001 00000002> for p1 proposal (id 5), xauth(0) ## 2016-05-21 18:51:45 : IKE<2.2.2.2> responder create sa: 2.2.2.2->199.188.209.36 ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Phase 1: Responder starts MAIN mode negotiations. ## 2016-05-21 18:51:45 : IKE<2.2.2.2> MM in state OAK_MM_NO_STATE. ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Process [VID]: ## 2016-05-21 18:51:45 : IKE<2.2.2.2 > Vendor ID: ## 2016-05-21 18:51:45 : af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Process [VID]: ## 2016-05-21 18:51:45 : IKE<2.2.2.2 > Vendor ID: ## 2016-05-21 18:51:45 : 69 93 69 22 87 41 c6 d4 ca 09 4c 93 e2 42 c9 de ## 2016-05-21 18:51:45 : 19 e7 b7 c6 00 00 00 05 00 00 05 00 ## 2016-05-21 18:51:45 : IKE<2.2.2.2> peer is an NetScreen box, model=NetScreen-204, ver=5.00 ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Process [SA]: ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Proposal received: xauthflag 0 ## 2016-05-21 18:51:45 : IKE<2.2.2.2> auth(1), encr(5)<3DES>, hash(2), group(2) ## 2016-05-21 18:51:45 : IKE<2.2.2.2> xauth attribute: disabled ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Phase 1 proposal [0] selected. ## 2016-05-21 18:51:45 : IKE<2.2.2.2> SA Life Type = seconds ## 2016-05-21 18:51:45 : IKE<2.2.2.2> SA lifetime (TLV) = 28800 ## 2016-05-21 18:51:45 : IKE<2.2.2.2> DH_BG_consume OK. p1 resp ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Phase 1 MM Responder constructing 2nd message. ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Msg header built (next payload #1) ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Construct [SA] for ISAKMP ## 2016-05-21 18:51:45 : IKE<2.2.2.2> auth(1), encr(5)<3DES>, hash(2), group(2) ## 2016-05-21 18:51:45 : IKE<2.2.2.2> xauth attribute: disabled ## 2016-05-21 18:51:45 : IKE<2.2.2.2> lifetime/lifesize (28800/0) ## 2016-05-21 18:51:45 : IKE<0.0.0.0 > set_phase1_transform, dh_group(2). ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Construct NetScreen [VID] ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Construct custom [VID] ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Construct custom [VID] ## 2016-05-21 18:51:45 : IKE<2.2.2.2 > Xmit : [SA] [VID] [VID] [VID] ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Send Phase 1 packet (len=156) ## 2016-05-21 18:51:45 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<1/800203> ## 2016-05-21 18:51:45 : IKE<2.2.2.2> ike packet, len 208, action 0 ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Catcher: received 180 bytes from socket. ## 2016-05-21 18:51:45 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Catcher: get 180 bytes. src port 500 ## 2016-05-21 18:51:45 : IKE<0.0.0.0 > ISAKMP msg: len 180, nxp 4[KE], exch 2[MM], flag 00 ## 2016-05-21 18:51:45 : IKE<2.2.2.2 > Recv : [KE] [NONCE] ## 2016-05-21 18:51:45 : IKE<0.0.0.0 > extract payload (152): ## 2016-05-21 18:51:45 : IKE<2.2.2.2> MM in state OAK_MM_SA_SETUP. ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Process [KE]: ## 2016-05-21 18:51:45 : IKE<2.2.2.2> processing ISA_KE in phase 1. ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Phase1: his_DH_pub_len is 128 ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Process [NONCE]: ## 2016-05-21 18:51:45 : IKE<2.2.2.2> processing NONCE in phase 1. ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Phase 1 MM Responder constructing 4th message. ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Msg header built (next payload #4) ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Construct [KE] for ISAKMP ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Construct [NONCE] ## 2016-05-21 18:51:45 : IKE<2.2.2.2 > Xmit : [KE] [NONCE] ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:51:45 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<2/80220f> ## 2016-05-21 18:51:45 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:51:45 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:51:45 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:51:45 : IKE<2.2.2.2> gen_skeyid() ## 2016-05-21 18:51:45 : IKE<2.2.2.2> gen_skeyid: returning 0 ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Decrypting payload (length 64) ## 2016-05-21 18:51:45 : IKE<2.2.2.2 > Recv*: [ID] +++ Corrupted MSG ## 2016-05-21 18:51:45 : valid id checking, id type:unknown, len:28886. ## 2016-05-21 18:51:45 : Error: invalid id payload type. ## 2016-05-21 18:51:45 : IKE<0.0.0.0 > Validate (64): bad 5 ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Packet is invalid! ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Pre-shared key might not match. ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Create conn entry... ## 2016-05-21 18:51:45 : IKE<2.2.2.2> ...done(new f61926bb) ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Msg header built (next payload #8) ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Construct [HASH] ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Construct [NOTIF]:(PAYLOAD-MALFORMED) ## 2016-05-21 18:51:45 : IKE<2.2.2.2> construct QM HASH ## 2016-05-21 18:51:45 : IKE<2.2.2.2 > Xmit*: [HASH] [NOTIF] ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Encrypt P2 payload (len 88) ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Send Phase 2 packet (len=92) ## 2016-05-21 18:51:45 : IKE<2.2.2.2> Delete conn entry... ## 2016-05-21 18:51:45 : IKE<2.2.2.2> ...found conn entry(f61926bb) ## 2016-05-21 18:51:47 : IKE<2.2.2.2> re-trans timer expired, msg retry (7) (80120f/2) ## 2016-05-21 18:51:47 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:47 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:51:49 : IKE<2.2.2.2> re-trans timer expired, msg retry (0) (80120f/2) ## 2016-05-21 18:51:49 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:49 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:51:51 : IKE<2.2.2.2> re-trans timer expired, msg retry (8) (80120f/2) ## 2016-05-21 18:51:51 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:51 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:51:53 : IKE<2.2.2.2> re-trans timer expired, msg retry (1) (80120f/2) ## 2016-05-21 18:51:53 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:53 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:51:55 : IKE<2.2.2.2> re-trans timer expired, msg retry (9) (80120f/2) ## 2016-05-21 18:51:55 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:55 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:51:55 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:51:55 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:51:55 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:51:55 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:51:55 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:51:55 : IKE<2.2.2.2> Receive re-transmit IKE packet phase 1 SA(2.2.2.2) exchg(2) len(92) ## 2016-05-21 18:51:57 : IKE<2.2.2.2> re-trans timer expired, msg retry (2) (80120f/2) ## 2016-05-21 18:51:57 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:57 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:51:59 : IKE<2.2.2.2> re-trans timer expired, msg retry (10) (80120f/2) ## 2016-05-21 18:51:59 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:51:59 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:52:01 : IKE<2.2.2.2> re-trans timer expired, msg retry (3) (80120f/2) ## 2016-05-21 18:52:01 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:52:01 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:52:02 : reap_db. deleting p1sa 6997638 ## 2016-05-21 18:52:02 : terminate_SA: trying to delete SA cause: 0 cond: 2 ## 2016-05-21 18:52:02 : peer_identity_unregister_p1_sa. ## 2016-05-21 18:52:02 : IKE<0.0.0.0 > delete peer identity 0x6990b54 ## 2016-05-21 18:52:02 : IKE<0.0.0.0 > peer_identity_remove_from_peer: num entry before remove <2> ## 2016-05-21 18:52:02 : peer_idt.c peer_identity_unregister_p1_sa 686: pidt deleted. ## 2016-05-21 18:52:02 : reap_db. deleting p1sa 6999b58 ## 2016-05-21 18:52:02 : terminate_SA: trying to delete SA cause: 0 cond: 2 ## 2016-05-21 18:52:02 : peer_identity_unregister_p1_sa. ## 2016-05-21 18:52:02 : IKE<0.0.0.0 > delete peer identity 0x698fb1c ## 2016-05-21 18:52:02 : IKE<0.0.0.0 > peer_identity_remove_from_peer: num entry before remove <2> ## 2016-05-21 18:52:02 : peer_idt.c peer_identity_unregister_p1_sa 686: pidt deleted. ## 2016-05-21 18:52:02 : reap_db. deleting p1sa 6998d6c ## 2016-05-21 18:52:02 : terminate_SA: trying to delete SA cause: 0 cond: 2 ## 2016-05-21 18:52:02 : IKE<2.2.2.2> xauth_cleanup() ## 2016-05-21 18:52:02 : IKE<2.2.2.2> Done cleaning up IKE Phase 1 SA ## 2016-05-21 18:52:02 : peer_identity_unregister_p1_sa. ## 2016-05-21 18:52:02 : IKE<0.0.0.0 > delete peer identity 0x69905ec ## 2016-05-21 18:52:02 : IKE<0.0.0.0 > peer_identity_remove_from_peer: num entry before remove <4> ## 2016-05-21 18:52:02 : peer_idt.c peer_identity_unregister_p1_sa 686: pidt deleted. ## 2016-05-21 18:52:02 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:52:02 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:52:02 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:52:02 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:52:02 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:52:02 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:52:02 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:52:03 : IKE<2.2.2.2> re-trans timer expired, msg retry (11) (80120f/2) ## 2016-05-21 18:52:03 : IKE<2.2.2.2> Phase 1: Retransmission limit has been reached. ## 2016-05-21 18:52:05 : IKE<2.2.2.2> re-trans timer expired, msg retry (4) (80120f/2) ## 2016-05-21 18:52:05 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:52:05 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:52:05 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:52:05 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:52:05 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:52:05 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:52:05 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:52:05 : IKE<2.2.2.2> Receive re-transmit IKE packet phase 1 SA(2.2.2.2) exchg(2) len(92) ## 2016-05-21 18:52:09 : IKE<2.2.2.2> re-trans timer expired, msg retry (5) (80120f/2) ## 2016-05-21 18:52:09 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:52:09 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:52:09 : getProfileFromP1Proposal-> ## 2016-05-21 18:52:09 : find profile[0]=<00000005 00000002 00000001 00000002> for p1 proposal (id 5), xauth(0) ## 2016-05-21 18:52:09 : init p1sa, pidt = 0x0 ## 2016-05-21 18:52:09 : change peer identity for p1 sa, pidt = 0x0 ## 2016-05-21 18:52:09 : IKE<0.0.0.0 > peer_identity_create_with_uid: uid<0> ## 2016-05-21 18:52:09 : IKE<0.0.0.0 > create peer identity 0x698fb1c ## 2016-05-21 18:52:09 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry before add <1> ## 2016-05-21 18:52:09 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry after add <2> ## 2016-05-21 18:52:09 : peer identity 698fb1c created. ## 2016-05-21 18:52:09 : IKE<0.0.0.0 > EDIPI disabled ## 2016-05-21 18:52:09 : IKE<0.0.0.0 > set_phase1_transform, dh_group(2). ## 2016-05-21 18:52:10 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:52:10 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:52:10 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:52:10 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:52:10 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:52:10 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:52:10 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:52:10 : getProfileFromP1Proposal-> ## 2016-05-21 18:52:10 : find profile[0]=<00000005 00000002 00000001 00000002> for p1 proposal (id 5), xauth(0) ## 2016-05-21 18:52:10 : init p1sa, pidt = 0x0 ## 2016-05-21 18:52:10 : change peer identity for p1 sa, pidt = 0x0 ## 2016-05-21 18:52:10 : IKE<0.0.0.0 > peer_identity_create_with_uid: uid<0> ## 2016-05-21 18:52:10 : IKE<0.0.0.0 > create peer identity 0x69905ec ## 2016-05-21 18:52:10 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry before add <1> ## 2016-05-21 18:52:10 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry after add <2> ## 2016-05-21 18:52:10 : peer identity 69905ec created. ## 2016-05-21 18:52:10 : IKE<0.0.0.0 > EDIPI disabled ## 2016-05-21 18:52:10 : IKE<0.0.0.0 > set_phase1_transform, dh_group(2). ## 2016-05-21 18:52:11 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:52:11 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:52:11 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:52:11 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:52:11 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:52:11 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:52:11 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:52:13 : IKE<2.2.2.2> re-trans timer expired, msg retry (6) (80120f/2) ## 2016-05-21 18:52:13 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:52:13 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:52:15 : IKE<2.2.2.2> ike packet, len 172, action 1 ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Catcher: received 144 bytes from socket. ## 2016-05-21 18:52:15 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Catcher: get 144 bytes. src port 500 ## 2016-05-21 18:52:15 : IKE<0.0.0.0 > ISAKMP msg: len 144, nxp 1[SA], exch 2[MM], flag 00 ## 2016-05-21 18:52:15 : IKE<2.2.2.2 > Recv : [SA] [VID] [VID] ## 2016-05-21 18:52:15 : IKE<2.2.2.2> found peer Dallas_VPN_Gateway ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Found peer entry (Dallas_VPN_Gateway) from 2.2.2.2. ## 2016-05-21 18:52:15 : responder create sa: 2.2.2.2->199.188.209.36 ## 2016-05-21 18:52:15 : init p1sa, pidt = 0x0 ## 2016-05-21 18:52:15 : change peer identity for p1 sa, pidt = 0x0 ## 2016-05-21 18:52:15 : IKE<0.0.0.0 > peer_identity_create_with_uid: uid<0> ## 2016-05-21 18:52:15 : IKE<0.0.0.0 > create peer identity 0x6990b54 ## 2016-05-21 18:52:15 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry before add <3> ## 2016-05-21 18:52:15 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry after add <4> ## 2016-05-21 18:52:15 : peer identity 6990b54 created. ## 2016-05-21 18:52:15 : IKE<0.0.0.0 > EDIPI disabled ## 2016-05-21 18:52:15 : IKE<2.2.2.2> getProfileFromP1Proposal-> ## 2016-05-21 18:52:15 : IKE<2.2.2.2> find profile[0]=<00000005 00000002 00000001 00000002> for p1 proposal (id 5), xauth(0) ## 2016-05-21 18:52:15 : IKE<2.2.2.2> responder create sa: 2.2.2.2->199.188.209.36 ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Phase 1: Responder starts MAIN mode negotiations. ## 2016-05-21 18:52:15 : IKE<2.2.2.2> MM in state OAK_MM_NO_STATE. ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Process [VID]: ## 2016-05-21 18:52:15 : IKE<2.2.2.2 > Vendor ID: ## 2016-05-21 18:52:15 : af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Process [VID]: ## 2016-05-21 18:52:15 : IKE<2.2.2.2 > Vendor ID: ## 2016-05-21 18:52:15 : 69 93 69 22 87 41 c6 d4 ca 09 4c 93 e2 42 c9 de ## 2016-05-21 18:52:15 : 19 e7 b7 c6 00 00 00 05 00 00 05 00 ## 2016-05-21 18:52:15 : IKE<2.2.2.2> peer is an NetScreen box, model=NetScreen-204, ver=5.00 ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Process [SA]: ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Proposal received: xauthflag 0 ## 2016-05-21 18:52:15 : IKE<2.2.2.2> auth(1), encr(5)<3DES>, hash(2), group(2) ## 2016-05-21 18:52:15 : IKE<2.2.2.2> xauth attribute: disabled ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Phase 1 proposal [0] selected. ## 2016-05-21 18:52:15 : IKE<2.2.2.2> SA Life Type = seconds ## 2016-05-21 18:52:15 : IKE<2.2.2.2> SA lifetime (TLV) = 28800 ## 2016-05-21 18:52:15 : IKE<2.2.2.2> DH_BG_consume OK. p1 resp ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Phase 1 MM Responder constructing 2nd message. ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Msg header built (next payload #1) ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Construct [SA] for ISAKMP ## 2016-05-21 18:52:15 : IKE<2.2.2.2> auth(1), encr(5)<3DES>, hash(2), group(2) ## 2016-05-21 18:52:15 : IKE<2.2.2.2> xauth attribute: disabled ## 2016-05-21 18:52:15 : IKE<2.2.2.2> lifetime/lifesize (28800/0) ## 2016-05-21 18:52:15 : IKE<0.0.0.0 > set_phase1_transform, dh_group(2). ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Construct NetScreen [VID] ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Construct custom [VID] ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Construct custom [VID] ## 2016-05-21 18:52:15 : IKE<2.2.2.2 > Xmit : [SA] [VID] [VID] [VID] ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Send Phase 1 packet (len=156) ## 2016-05-21 18:52:15 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<1/800203> ## 2016-05-21 18:52:15 : IKE<2.2.2.2> ike packet, len 208, action 0 ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Catcher: received 180 bytes from socket. ## 2016-05-21 18:52:15 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Catcher: get 180 bytes. src port 500 ## 2016-05-21 18:52:15 : IKE<0.0.0.0 > ISAKMP msg: len 180, nxp 4[KE], exch 2[MM], flag 00 ## 2016-05-21 18:52:15 : IKE<2.2.2.2 > Recv : [KE] [NONCE] ## 2016-05-21 18:52:15 : IKE<0.0.0.0 > extract payload (152): ## 2016-05-21 18:52:15 : IKE<2.2.2.2> MM in state OAK_MM_SA_SETUP. ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Process [KE]: ## 2016-05-21 18:52:15 : IKE<2.2.2.2> processing ISA_KE in phase 1. ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Phase1: his_DH_pub_len is 128 ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Process [NONCE]: ## 2016-05-21 18:52:15 : IKE<2.2.2.2> processing NONCE in phase 1. ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Phase 1 MM Responder constructing 4th message. ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Msg header built (next payload #4) ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Construct [KE] for ISAKMP ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Construct [NONCE] ## 2016-05-21 18:52:15 : IKE<2.2.2.2 > Xmit : [KE] [NONCE] ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:52:15 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<2/80220f> ## 2016-05-21 18:52:15 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:52:15 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:52:15 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:52:15 : IKE<2.2.2.2> gen_skeyid() ## 2016-05-21 18:52:15 : IKE<2.2.2.2> gen_skeyid: returning 0 ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Decrypting payload (length 64) ## 2016-05-21 18:52:15 : IKE<2.2.2.2 > Recv*: [ID] +++ Corrupted MSG ## 2016-05-21 18:52:15 : valid id checking, id type:unknown, len:13813. ## 2016-05-21 18:52:15 : Error: invalid id payload type. ## 2016-05-21 18:52:15 : IKE<0.0.0.0 > Validate (64): bad 5 ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Packet is invalid! ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Pre-shared key might not match. ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Create conn entry... ## 2016-05-21 18:52:15 : IKE<2.2.2.2> ...done(new e852c535) ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Msg header built (next payload #8) ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Construct [HASH] ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Construct [NOTIF]:(PAYLOAD-MALFORMED) ## 2016-05-21 18:52:15 : IKE<2.2.2.2> construct QM HASH ## 2016-05-21 18:52:15 : IKE<2.2.2.2 > Xmit*: [HASH] [NOTIF] ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Encrypt P2 payload (len 88) ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Send Phase 2 packet (len=92) ## 2016-05-21 18:52:15 : IKE<2.2.2.2> Delete conn entry... ## 2016-05-21 18:52:15 : IKE<2.2.2.2> ...found conn entry(e852c535) ## 2016-05-21 18:52:17 : IKE<2.2.2.2> re-trans timer expired, msg retry (7) (80120f/2) ## 2016-05-21 18:52:17 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:52:17 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:52:19 : IKE<2.2.2.2> re-trans timer expired, msg retry (0) (80120f/2) ## 2016-05-21 18:52:19 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:52:19 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:52:21 : IKE<2.2.2.2> re-trans timer expired, msg retry (8) (80120f/2) ## 2016-05-21 18:52:21 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:52:21 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:52:23 : IKE<2.2.2.2> re-trans timer expired, msg retry (1) (80120f/2) ## 2016-05-21 18:52:23 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:52:23 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:52:25 : IKE<2.2.2.2> re-trans timer expired, msg retry (9) (80120f/2) ## 2016-05-21 18:52:25 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:52:25 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:52:25 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:52:25 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:52:25 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:52:25 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:52:25 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:52:25 : IKE<2.2.2.2> Receive re-transmit IKE packet phase 1 SA(2.2.2.2) exchg(2) len(92) ## 2016-05-21 18:52:27 : IKE<2.2.2.2> re-trans timer expired, msg retry (2) (80120f/2) ## 2016-05-21 18:52:27 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:52:27 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:52:29 : IKE<2.2.2.2> re-trans timer expired, msg retry (10) (80120f/2) ## 2016-05-21 18:52:29 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:52:29 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:52:31 : IKE<2.2.2.2> re-trans timer expired, msg retry (3) (80120f/2) ## 2016-05-21 18:52:31 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:52:31 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:52:32 : reap_db. deleting p1sa 69963a8 ## 2016-05-21 18:52:32 : terminate_SA: trying to delete SA cause: 0 cond: 2 ## 2016-05-21 18:52:32 : IKE<2.2.2.2> xauth_cleanup() ## 2016-05-21 18:52:32 : IKE<2.2.2.2> Done cleaning up IKE Phase 1 SA ## 2016-05-21 18:52:32 : peer_identity_unregister_p1_sa. ## 2016-05-21 18:52:32 : IKE<0.0.0.0 > delete peer identity 0x69910bc ## 2016-05-21 18:52:32 : IKE<0.0.0.0 > peer_identity_remove_from_peer: num entry before remove <4> ## 2016-05-21 18:52:32 : peer_idt.c peer_identity_unregister_p1_sa 686: pidt deleted. ## 2016-05-21 18:52:32 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:52:32 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:52:32 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:52:32 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:52:32 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:52:32 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:52:32 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:52:33 : IKE<2.2.2.2> re-trans timer expired, msg retry (11) (80120f/2) ## 2016-05-21 18:52:33 : IKE<2.2.2.2> Phase 1: Retransmission limit has been reached. ## 2016-05-21 18:52:35 : IKE<2.2.2.2> re-trans timer expired, msg retry (4) (80120f/2) ## 2016-05-21 18:52:35 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:52:35 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:52:35 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:52:35 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:52:35 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:52:35 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:52:35 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:52:35 : IKE<2.2.2.2> Receive re-transmit IKE packet phase 1 SA(2.2.2.2) exchg(2) len(92) ## 2016-05-21 18:52:36 : IKE<2.2.2.2> ****** Recv kernel msg IDX-1, TYPE-5 ****** ## 2016-05-21 18:52:36 : IKE<2.2.2.2> ****** Recv kernel msg IDX-1, TYPE-5 ****** ## 2016-05-21 18:52:36 : IKE<2.2.2.2> sa orig index<1>, peer_id<3>. ## 2016-05-21 18:52:36 : IKE<2.2.2.2> isadb_get_entry_by_peer_and_local_if_port_p2sa isadb get entry by peer/local ip and port ## 2016-05-21 18:52:36 : IKE<2.2.2.2> Added Phase 2 session tasks to the task list. ## 2016-05-21 18:52:37 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:52:37 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:52:37 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:52:37 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:52:37 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:52:37 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:52:37 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:52:39 : IKE<2.2.2.2> re-trans timer expired, msg retry (5) (80120f/2) ## 2016-05-21 18:52:39 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:52:39 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:52:43 : IKE<2.2.2.2> re-trans timer expired, msg retry (6) (80120f/2) ## 2016-05-21 18:52:43 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:52:43 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:52:47 : IKE<2.2.2.2> re-trans timer expired, msg retry (7) (80120f/2) ## 2016-05-21 18:52:47 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:52:47 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:52:51 : IKE<2.2.2.2> re-trans timer expired, msg retry (8) (80120f/2) ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:52:51 : IKE<2.2.2.2> ike packet, len 172, action 1 ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Catcher: received 144 bytes from socket. ## 2016-05-21 18:52:51 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Catcher: get 144 bytes. src port 500 ## 2016-05-21 18:52:51 : IKE<0.0.0.0 > ISAKMP msg: len 144, nxp 1[SA], exch 2[MM], flag 00 ## 2016-05-21 18:52:51 : IKE<2.2.2.2 > Recv : [SA] [VID] [VID] ## 2016-05-21 18:52:51 : IKE<2.2.2.2> found peer Dallas_VPN_Gateway ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Found peer entry (Dallas_VPN_Gateway) from 2.2.2.2. ## 2016-05-21 18:52:51 : responder create sa: 2.2.2.2->199.188.209.36 ## 2016-05-21 18:52:51 : init p1sa, pidt = 0x0 ## 2016-05-21 18:52:51 : change peer identity for p1 sa, pidt = 0x0 ## 2016-05-21 18:52:51 : IKE<0.0.0.0 > peer_identity_create_with_uid: uid<0> ## 2016-05-21 18:52:51 : IKE<0.0.0.0 > create peer identity 0x69910bc ## 2016-05-21 18:52:51 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry before add <3> ## 2016-05-21 18:52:51 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry after add <4> ## 2016-05-21 18:52:51 : peer identity 69910bc created. ## 2016-05-21 18:52:51 : IKE<0.0.0.0 > EDIPI disabled ## 2016-05-21 18:52:51 : IKE<2.2.2.2> getProfileFromP1Proposal-> ## 2016-05-21 18:52:51 : IKE<2.2.2.2> find profile[0]=<00000005 00000002 00000001 00000002> for p1 proposal (id 5), xauth(0) ## 2016-05-21 18:52:51 : IKE<2.2.2.2> responder create sa: 2.2.2.2->199.188.209.36 ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Phase 1: Responder starts MAIN mode negotiations. ## 2016-05-21 18:52:51 : IKE<2.2.2.2> MM in state OAK_MM_NO_STATE. ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Process [VID]: ## 2016-05-21 18:52:51 : IKE<2.2.2.2 > Vendor ID: ## 2016-05-21 18:52:51 : af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Process [VID]: ## 2016-05-21 18:52:51 : IKE<2.2.2.2 > Vendor ID: ## 2016-05-21 18:52:51 : 69 93 69 22 87 41 c6 d4 ca 09 4c 93 e2 42 c9 de ## 2016-05-21 18:52:51 : 19 e7 b7 c6 00 00 00 05 00 00 05 00 ## 2016-05-21 18:52:51 : IKE<2.2.2.2> peer is an NetScreen box, model=NetScreen-204, ver=5.00 ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Process [SA]: ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Proposal received: xauthflag 0 ## 2016-05-21 18:52:51 : IKE<2.2.2.2> auth(1), encr(5)<3DES>, hash(2), group(2) ## 2016-05-21 18:52:51 : IKE<2.2.2.2> xauth attribute: disabled ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Phase 1 proposal [0] selected. ## 2016-05-21 18:52:51 : IKE<2.2.2.2> SA Life Type = seconds ## 2016-05-21 18:52:51 : IKE<2.2.2.2> SA lifetime (TLV) = 28800 ## 2016-05-21 18:52:51 : IKE<2.2.2.2> DH_BG_consume OK. p1 resp ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Phase 1 MM Responder constructing 2nd message. ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Msg header built (next payload #1) ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Construct [SA] for ISAKMP ## 2016-05-21 18:52:51 : IKE<2.2.2.2> auth(1), encr(5)<3DES>, hash(2), group(2) ## 2016-05-21 18:52:51 : IKE<2.2.2.2> xauth attribute: disabled ## 2016-05-21 18:52:51 : IKE<2.2.2.2> lifetime/lifesize (28800/0) ## 2016-05-21 18:52:51 : IKE<0.0.0.0 > set_phase1_transform, dh_group(2). ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Construct NetScreen [VID] ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Construct custom [VID] ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Construct custom [VID] ## 2016-05-21 18:52:51 : IKE<2.2.2.2 > Xmit : [SA] [VID] [VID] [VID] ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Send Phase 1 packet (len=156) ## 2016-05-21 18:52:51 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<1/800203> ## 2016-05-21 18:52:51 : IKE<2.2.2.2> ike packet, len 208, action 0 ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Catcher: received 180 bytes from socket. ## 2016-05-21 18:52:51 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Catcher: get 180 bytes. src port 500 ## 2016-05-21 18:52:51 : IKE<0.0.0.0 > ISAKMP msg: len 180, nxp 4[KE], exch 2[MM], flag 00 ## 2016-05-21 18:52:51 : IKE<2.2.2.2 > Recv : [KE] [NONCE] ## 2016-05-21 18:52:51 : IKE<0.0.0.0 > extract payload (152): ## 2016-05-21 18:52:51 : IKE<2.2.2.2> MM in state OAK_MM_SA_SETUP. ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Process [KE]: ## 2016-05-21 18:52:51 : IKE<2.2.2.2> processing ISA_KE in phase 1. ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Phase1: his_DH_pub_len is 128 ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Process [NONCE]: ## 2016-05-21 18:52:51 : IKE<2.2.2.2> processing NONCE in phase 1. ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Phase 1 MM Responder constructing 4th message. ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Msg header built (next payload #4) ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Construct [KE] for ISAKMP ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Construct [NONCE] ## 2016-05-21 18:52:51 : IKE<2.2.2.2 > Xmit : [KE] [NONCE] ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:52:51 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<2/80220f> ## 2016-05-21 18:52:51 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:52:51 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:52:51 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:52:51 : IKE<2.2.2.2> gen_skeyid() ## 2016-05-21 18:52:51 : IKE<2.2.2.2> gen_skeyid: returning 0 ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Decrypting payload (length 64) ## 2016-05-21 18:52:51 : IKE<2.2.2.2 > Recv*: [ID] +++ Corrupted MSG ## 2016-05-21 18:52:51 : valid id checking, id type:unknown, len:39542. ## 2016-05-21 18:52:51 : Error: invalid id payload type. ## 2016-05-21 18:52:51 : IKE<0.0.0.0 > Validate (64): bad 5 ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Packet is invalid! ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Pre-shared key might not match. ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Create conn entry... ## 2016-05-21 18:52:51 : IKE<2.2.2.2> ...done(new 49ffb93b) ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Msg header built (next payload #8) ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Construct [HASH] ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Construct [NOTIF]:(PAYLOAD-MALFORMED) ## 2016-05-21 18:52:51 : IKE<2.2.2.2> construct QM HASH ## 2016-05-21 18:52:51 : IKE<2.2.2.2 > Xmit*: [HASH] [NOTIF] ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Encrypt P2 payload (len 88) ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Send Phase 2 packet (len=92) ## 2016-05-21 18:52:51 : IKE<2.2.2.2> Delete conn entry... ## 2016-05-21 18:52:51 : IKE<2.2.2.2> ...found conn entry(49ffb93b) ## 2016-05-21 18:52:55 : IKE<2.2.2.2> re-trans timer expired, msg retry (9) (80120f/2) ## 2016-05-21 18:52:55 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:52:55 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:52:56 : IKE<2.2.2.2> re-trans timer expired, msg retry (0) (80120f/2) ## 2016-05-21 18:52:56 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:52:56 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:52:59 : IKE<2.2.2.2> re-trans timer expired, msg retry (10) (80120f/2) ## 2016-05-21 18:52:59 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:52:59 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:53:00 : IKE<2.2.2.2> re-trans timer expired, msg retry (1) (80120f/2) ## 2016-05-21 18:53:00 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:53:00 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:53:01 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:53:01 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:53:01 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:53:01 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:53:01 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:53:01 : IKE<2.2.2.2> Receive re-transmit IKE packet phase 1 SA(2.2.2.2) exchg(2) len(92) ## 2016-05-21 18:53:02 : reap_db. deleting p1sa 6999b58 ## 2016-05-21 18:53:02 : terminate_SA: trying to delete SA cause: 0 cond: 2 ## 2016-05-21 18:53:02 : peer_identity_unregister_p1_sa. ## 2016-05-21 18:53:02 : IKE<0.0.0.0 > delete peer identity 0x69905ec ## 2016-05-21 18:53:02 : IKE<0.0.0.0 > peer_identity_remove_from_peer: num entry before remove <2> ## 2016-05-21 18:53:02 : peer_idt.c peer_identity_unregister_p1_sa 686: pidt deleted. ## 2016-05-21 18:53:02 : reap_db. deleting p1sa 6997adc ## 2016-05-21 18:53:02 : terminate_SA: trying to delete SA cause: 0 cond: 2 ## 2016-05-21 18:53:02 : peer_identity_unregister_p1_sa. ## 2016-05-21 18:53:02 : IKE<0.0.0.0 > delete peer identity 0x698fb1c ## 2016-05-21 18:53:02 : IKE<0.0.0.0 > peer_identity_remove_from_peer: num entry before remove <2> ## 2016-05-21 18:53:02 : peer_idt.c peer_identity_unregister_p1_sa 686: pidt deleted. ## 2016-05-21 18:53:02 : reap_db. deleting p1sa 699c078 ## 2016-05-21 18:53:02 : terminate_SA: trying to delete SA cause: 0 cond: 2 ## 2016-05-21 18:53:02 : IKE<2.2.2.2> xauth_cleanup() ## 2016-05-21 18:53:02 : IKE<2.2.2.2> Done cleaning up IKE Phase 1 SA ## 2016-05-21 18:53:02 : peer_identity_unregister_p1_sa. ## 2016-05-21 18:53:02 : IKE<0.0.0.0 > delete peer identity 0x6991370 ## 2016-05-21 18:53:02 : IKE<0.0.0.0 > peer_identity_remove_from_peer: num entry before remove <4> ## 2016-05-21 18:53:02 : peer_idt.c peer_identity_unregister_p1_sa 686: pidt deleted. ## 2016-05-21 18:53:02 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:53:02 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:53:02 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:53:02 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:53:02 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:53:02 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:53:02 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:53:03 : IKE<2.2.2.2> re-trans timer expired, msg retry (11) (80120f/2) ## 2016-05-21 18:53:03 : IKE<2.2.2.2> Phase 1: Retransmission limit has been reached. ## 2016-05-21 18:53:04 : IKE<2.2.2.2> re-trans timer expired, msg retry (2) (80120f/2) ## 2016-05-21 18:53:04 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:53:04 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:53:08 : IKE<2.2.2.2> re-trans timer expired, msg retry (3) (80120f/2) ## 2016-05-21 18:53:08 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:53:08 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:53:09 : getProfileFromP1Proposal-> ## 2016-05-21 18:53:09 : find profile[0]=<00000005 00000002 00000001 00000002> for p1 proposal (id 5), xauth(0) ## 2016-05-21 18:53:09 : init p1sa, pidt = 0x0 ## 2016-05-21 18:53:09 : change peer identity for p1 sa, pidt = 0x0 ## 2016-05-21 18:53:09 : IKE<0.0.0.0 > peer_identity_create_with_uid: uid<0> ## 2016-05-21 18:53:09 : IKE<0.0.0.0 > create peer identity 0x698fb1c ## 2016-05-21 18:53:09 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry before add <1> ## 2016-05-21 18:53:09 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry after add <2> ## 2016-05-21 18:53:09 : peer identity 698fb1c created. ## 2016-05-21 18:53:09 : IKE<0.0.0.0 > EDIPI disabled ## 2016-05-21 18:53:09 : IKE<0.0.0.0 > set_phase1_transform, dh_group(2). ## 2016-05-21 18:53:10 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:53:10 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:53:10 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:53:10 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:53:10 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:53:10 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:53:10 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:53:10 : getProfileFromP1Proposal-> ## 2016-05-21 18:53:10 : find profile[0]=<00000005 00000002 00000001 00000002> for p1 proposal (id 5), xauth(0) ## 2016-05-21 18:53:10 : init p1sa, pidt = 0x0 ## 2016-05-21 18:53:10 : change peer identity for p1 sa, pidt = 0x0 ## 2016-05-21 18:53:10 : IKE<0.0.0.0 > peer_identity_create_with_uid: uid<0> ## 2016-05-21 18:53:10 : IKE<0.0.0.0 > create peer identity 0x69905ec ## 2016-05-21 18:53:10 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry before add <1> ## 2016-05-21 18:53:10 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry after add <2> ## 2016-05-21 18:53:10 : peer identity 69905ec created. ## 2016-05-21 18:53:10 : IKE<0.0.0.0 > EDIPI disabled ## 2016-05-21 18:53:10 : IKE<0.0.0.0 > set_phase1_transform, dh_group(2). ## 2016-05-21 18:53:11 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:53:11 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:53:11 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:53:11 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:53:11 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:53:11 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:53:11 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:53:11 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:53:11 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:53:11 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:53:11 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:53:11 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:53:11 : IKE<2.2.2.2> Receive re-transmit IKE packet phase 1 SA(2.2.2.2) exchg(2) len(92) ## 2016-05-21 18:53:12 : IKE<2.2.2.2> re-trans timer expired, msg retry (4) (80120f/2) ## 2016-05-21 18:53:12 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:53:12 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:53:16 : IKE<2.2.2.2> re-trans timer expired, msg retry (5) (80120f/2) ## 2016-05-21 18:53:16 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:53:16 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:53:20 : IKE<2.2.2.2> re-trans timer expired, msg retry (6) (80120f/2) ## 2016-05-21 18:53:20 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:53:20 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:53:24 : IKE<2.2.2.2> re-trans timer expired, msg retry (7) (80120f/2) ## 2016-05-21 18:53:24 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:53:24 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:53:25 : IKE<2.2.2.2> ike packet, len 172, action 1 ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Catcher: received 144 bytes from socket. ## 2016-05-21 18:53:25 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Catcher: get 144 bytes. src port 500 ## 2016-05-21 18:53:25 : IKE<0.0.0.0 > ISAKMP msg: len 144, nxp 1[SA], exch 2[MM], flag 00 ## 2016-05-21 18:53:25 : IKE<2.2.2.2 > Recv : [SA] [VID] [VID] ## 2016-05-21 18:53:25 : IKE<2.2.2.2> found peer Dallas_VPN_Gateway ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Found peer entry (Dallas_VPN_Gateway) from 2.2.2.2. ## 2016-05-21 18:53:25 : responder create sa: 2.2.2.2->199.188.209.36 ## 2016-05-21 18:53:25 : init p1sa, pidt = 0x0 ## 2016-05-21 18:53:25 : change peer identity for p1 sa, pidt = 0x0 ## 2016-05-21 18:53:25 : IKE<0.0.0.0 > peer_identity_create_with_uid: uid<0> ## 2016-05-21 18:53:25 : IKE<0.0.0.0 > create peer identity 0x6991370 ## 2016-05-21 18:53:25 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry before add <3> ## 2016-05-21 18:53:25 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry after add <4> ## 2016-05-21 18:53:25 : peer identity 6991370 created. ## 2016-05-21 18:53:25 : IKE<0.0.0.0 > EDIPI disabled ## 2016-05-21 18:53:25 : IKE<2.2.2.2> getProfileFromP1Proposal-> ## 2016-05-21 18:53:25 : IKE<2.2.2.2> find profile[0]=<00000005 00000002 00000001 00000002> for p1 proposal (id 5), xauth(0) ## 2016-05-21 18:53:25 : IKE<2.2.2.2> responder create sa: 2.2.2.2->199.188.209.36 ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Phase 1: Responder starts MAIN mode negotiations. ## 2016-05-21 18:53:25 : IKE<2.2.2.2> MM in state OAK_MM_NO_STATE. ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Process [VID]: ## 2016-05-21 18:53:25 : IKE<2.2.2.2 > Vendor ID: ## 2016-05-21 18:53:25 : af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Process [VID]: ## 2016-05-21 18:53:25 : IKE<2.2.2.2 > Vendor ID: ## 2016-05-21 18:53:25 : 69 93 69 22 87 41 c6 d4 ca 09 4c 93 e2 42 c9 de ## 2016-05-21 18:53:25 : 19 e7 b7 c6 00 00 00 05 00 00 05 00 ## 2016-05-21 18:53:25 : IKE<2.2.2.2> peer is an NetScreen box, model=NetScreen-204, ver=5.00 ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Process [SA]: ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Proposal received: xauthflag 0 ## 2016-05-21 18:53:25 : IKE<2.2.2.2> auth(1), encr(5)<3DES>, hash(2), group(2) ## 2016-05-21 18:53:25 : IKE<2.2.2.2> xauth attribute: disabled ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Phase 1 proposal [0] selected. ## 2016-05-21 18:53:25 : IKE<2.2.2.2> SA Life Type = seconds ## 2016-05-21 18:53:25 : IKE<2.2.2.2> SA lifetime (TLV) = 28800 ## 2016-05-21 18:53:25 : IKE<2.2.2.2> DH_BG_consume OK. p1 resp ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Phase 1 MM Responder constructing 2nd message. ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Msg header built (next payload #1) ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Construct [SA] for ISAKMP ## 2016-05-21 18:53:25 : IKE<2.2.2.2> auth(1), encr(5)<3DES>, hash(2), group(2) ## 2016-05-21 18:53:25 : IKE<2.2.2.2> xauth attribute: disabled ## 2016-05-21 18:53:25 : IKE<2.2.2.2> lifetime/lifesize (28800/0) ## 2016-05-21 18:53:25 : IKE<0.0.0.0 > set_phase1_transform, dh_group(2). ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Construct NetScreen [VID] ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Construct custom [VID] ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Construct custom [VID] ## 2016-05-21 18:53:25 : IKE<2.2.2.2 > Xmit : [SA] [VID] [VID] [VID] ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Send Phase 1 packet (len=156) ## 2016-05-21 18:53:25 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<1/800203> ## 2016-05-21 18:53:25 : IKE<2.2.2.2> ike packet, len 208, action 0 ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Catcher: received 180 bytes from socket. ## 2016-05-21 18:53:25 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Catcher: get 180 bytes. src port 500 ## 2016-05-21 18:53:25 : IKE<0.0.0.0 > ISAKMP msg: len 180, nxp 4[KE], exch 2[MM], flag 00 ## 2016-05-21 18:53:25 : IKE<2.2.2.2 > Recv : [KE] [NONCE] ## 2016-05-21 18:53:25 : IKE<0.0.0.0 > extract payload (152): ## 2016-05-21 18:53:25 : IKE<2.2.2.2> MM in state OAK_MM_SA_SETUP. ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Process [KE]: ## 2016-05-21 18:53:25 : IKE<2.2.2.2> processing ISA_KE in phase 1. ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Phase1: his_DH_pub_len is 128 ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Process [NONCE]: ## 2016-05-21 18:53:25 : IKE<2.2.2.2> processing NONCE in phase 1. ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Phase 1 MM Responder constructing 4th message. ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Msg header built (next payload #4) ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Construct [KE] for ISAKMP ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Construct [NONCE] ## 2016-05-21 18:53:25 : IKE<2.2.2.2 > Xmit : [KE] [NONCE] ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:53:25 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<2/80220f> ## 2016-05-21 18:53:25 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:53:25 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:53:25 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:53:25 : IKE<2.2.2.2> gen_skeyid() ## 2016-05-21 18:53:25 : IKE<2.2.2.2> gen_skeyid: returning 0 ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Decrypting payload (length 64) ## 2016-05-21 18:53:25 : IKE<2.2.2.2 > Recv*: [ID] +++ Corrupted MSG ## 2016-05-21 18:53:25 : valid id checking, id type:unknown, len:43987. ## 2016-05-21 18:53:25 : Error: invalid id payload type. ## 2016-05-21 18:53:25 : IKE<0.0.0.0 > Validate (64): bad 5 ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Packet is invalid! ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Pre-shared key might not match. ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Create conn entry... ## 2016-05-21 18:53:25 : IKE<2.2.2.2> ...done(new 1dfa98fa) ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Msg header built (next payload #8) ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Construct [HASH] ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Construct [NOTIF]:(PAYLOAD-MALFORMED) ## 2016-05-21 18:53:25 : IKE<2.2.2.2> construct QM HASH ## 2016-05-21 18:53:25 : IKE<2.2.2.2 > Xmit*: [HASH] [NOTIF] ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Encrypt P2 payload (len 88) ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Send Phase 2 packet (len=92) ## 2016-05-21 18:53:25 : IKE<2.2.2.2> Delete conn entry... ## 2016-05-21 18:53:25 : IKE<2.2.2.2> ...found conn entry(1dfa98fa) ## 2016-05-21 18:53:28 : IKE<2.2.2.2> re-trans timer expired, msg retry (8) (80120f/2) ## 2016-05-21 18:53:28 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:53:28 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:53:29 : IKE<2.2.2.2> re-trans timer expired, msg retry (0) (80120f/2) ## 2016-05-21 18:53:29 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:53:29 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:53:32 : IKE<2.2.2.2> re-trans timer expired, msg retry (9) (80120f/2) ## 2016-05-21 18:53:32 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:53:32 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:53:32 : reap_db. deleting p1sa 699c9c0 ## 2016-05-21 18:53:32 : terminate_SA: trying to delete SA cause: 0 cond: 2 ## 2016-05-21 18:53:32 : IKE<2.2.2.2> xauth_cleanup() ## 2016-05-21 18:53:32 : IKE<2.2.2.2> Done cleaning up IKE Phase 1 SA ## 2016-05-21 18:53:32 : peer_identity_unregister_p1_sa. ## 2016-05-21 18:53:32 : IKE<0.0.0.0 > delete peer identity 0x6990b54 ## 2016-05-21 18:53:32 : IKE<0.0.0.0 > peer_identity_remove_from_peer: num entry before remove <4> ## 2016-05-21 18:53:32 : peer_idt.c peer_identity_unregister_p1_sa 686: pidt deleted. ## 2016-05-21 18:53:32 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:53:32 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:53:32 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:53:32 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:53:32 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:53:32 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:53:32 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:53:33 : IKE<2.2.2.2> re-trans timer expired, msg retry (1) (80120f/2) ## 2016-05-21 18:53:33 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:53:33 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:53:35 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:53:35 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:53:35 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:53:35 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:53:35 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:53:35 : IKE<2.2.2.2> Receive re-transmit IKE packet phase 1 SA(2.2.2.2) exchg(2) len(92) ## 2016-05-21 18:53:36 : IKE<2.2.2.2> re-trans timer expired, msg retry (10) (80120f/2) ## 2016-05-21 18:53:36 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:53:36 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:53:36 : IKE<2.2.2.2> ****** Recv kernel msg IDX-1, TYPE-5 ****** ## 2016-05-21 18:53:36 : IKE<2.2.2.2> ****** Recv kernel msg IDX-1, TYPE-5 ****** ## 2016-05-21 18:53:36 : IKE<2.2.2.2> sa orig index<1>, peer_id<3>. ## 2016-05-21 18:53:36 : IKE<2.2.2.2> isadb_get_entry_by_peer_and_local_if_port_p2sa isadb get entry by peer/local ip and port ## 2016-05-21 18:53:36 : IKE<2.2.2.2> Added Phase 2 session tasks to the task list. ## 2016-05-21 18:53:37 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:53:37 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:53:37 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:53:37 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:53:37 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:53:37 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:53:37 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:53:37 : IKE<2.2.2.2> re-trans timer expired, msg retry (2) (80120f/2) ## 2016-05-21 18:53:37 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:53:37 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:53:40 : IKE<2.2.2.2> re-trans timer expired, msg retry (11) (80120f/2) ## 2016-05-21 18:53:40 : IKE<2.2.2.2> Phase 1: Retransmission limit has been reached. ## 2016-05-21 18:53:41 : IKE<2.2.2.2> re-trans timer expired, msg retry (3) (80120f/2) ## 2016-05-21 18:53:41 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:53:41 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:53:45 : IKE<2.2.2.2> re-trans timer expired, msg retry (4) (80120f/2) ## 2016-05-21 18:53:45 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:53:45 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:53:45 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:53:45 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:53:45 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:53:45 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:53:45 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:53:45 : IKE<2.2.2.2> Receive re-transmit IKE packet phase 1 SA(2.2.2.2) exchg(2) len(92) ## 2016-05-21 18:53:49 : IKE<2.2.2.2> re-trans timer expired, msg retry (5) (80120f/2) ## 2016-05-21 18:53:49 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:53:49 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:53:53 : IKE<2.2.2.2> re-trans timer expired, msg retry (6) (80120f/2) ## 2016-05-21 18:53:53 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:53:53 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:53:55 : IKE<2.2.2.2> ike packet, len 172, action 1 ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Catcher: received 144 bytes from socket. ## 2016-05-21 18:53:55 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Catcher: get 144 bytes. src port 500 ## 2016-05-21 18:53:55 : IKE<0.0.0.0 > ISAKMP msg: len 144, nxp 1[SA], exch 2[MM], flag 00 ## 2016-05-21 18:53:55 : IKE<2.2.2.2 > Recv : [SA] [VID] [VID] ## 2016-05-21 18:53:55 : IKE<2.2.2.2> found peer Dallas_VPN_Gateway ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Found peer entry (Dallas_VPN_Gateway) from 2.2.2.2. ## 2016-05-21 18:53:55 : responder create sa: 2.2.2.2->199.188.209.36 ## 2016-05-21 18:53:55 : init p1sa, pidt = 0x0 ## 2016-05-21 18:53:55 : change peer identity for p1 sa, pidt = 0x0 ## 2016-05-21 18:53:55 : IKE<0.0.0.0 > peer_identity_create_with_uid: uid<0> ## 2016-05-21 18:53:55 : IKE<0.0.0.0 > create peer identity 0x6990b54 ## 2016-05-21 18:53:55 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry before add <3> ## 2016-05-21 18:53:55 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry after add <4> ## 2016-05-21 18:53:55 : peer identity 6990b54 created. ## 2016-05-21 18:53:55 : IKE<0.0.0.0 > EDIPI disabled ## 2016-05-21 18:53:55 : IKE<2.2.2.2> getProfileFromP1Proposal-> ## 2016-05-21 18:53:55 : IKE<2.2.2.2> find profile[0]=<00000005 00000002 00000001 00000002> for p1 proposal (id 5), xauth(0) ## 2016-05-21 18:53:55 : IKE<2.2.2.2> responder create sa: 2.2.2.2->199.188.209.36 ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Phase 1: Responder starts MAIN mode negotiations. ## 2016-05-21 18:53:55 : IKE<2.2.2.2> MM in state OAK_MM_NO_STATE. ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Process [VID]: ## 2016-05-21 18:53:55 : IKE<2.2.2.2 > Vendor ID: ## 2016-05-21 18:53:55 : af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Process [VID]: ## 2016-05-21 18:53:55 : IKE<2.2.2.2 > Vendor ID: ## 2016-05-21 18:53:55 : 69 93 69 22 87 41 c6 d4 ca 09 4c 93 e2 42 c9 de ## 2016-05-21 18:53:55 : 19 e7 b7 c6 00 00 00 05 00 00 05 00 ## 2016-05-21 18:53:55 : IKE<2.2.2.2> peer is an NetScreen box, model=NetScreen-204, ver=5.00 ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Process [SA]: ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Proposal received: xauthflag 0 ## 2016-05-21 18:53:55 : IKE<2.2.2.2> auth(1), encr(5)<3DES>, hash(2), group(2) ## 2016-05-21 18:53:55 : IKE<2.2.2.2> xauth attribute: disabled ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Phase 1 proposal [0] selected. ## 2016-05-21 18:53:55 : IKE<2.2.2.2> SA Life Type = seconds ## 2016-05-21 18:53:55 : IKE<2.2.2.2> SA lifetime (TLV) = 28800 ## 2016-05-21 18:53:55 : IKE<2.2.2.2> DH_BG_consume OK. p1 resp ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Phase 1 MM Responder constructing 2nd message. ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Msg header built (next payload #1) ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Construct [SA] for ISAKMP ## 2016-05-21 18:53:55 : IKE<2.2.2.2> auth(1), encr(5)<3DES>, hash(2), group(2) ## 2016-05-21 18:53:55 : IKE<2.2.2.2> xauth attribute: disabled ## 2016-05-21 18:53:55 : IKE<2.2.2.2> lifetime/lifesize (28800/0) ## 2016-05-21 18:53:55 : IKE<0.0.0.0 > set_phase1_transform, dh_group(2). ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Construct NetScreen [VID] ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Construct custom [VID] ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Construct custom [VID] ## 2016-05-21 18:53:55 : IKE<2.2.2.2 > Xmit : [SA] [VID] [VID] [VID] ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Send Phase 1 packet (len=156) ## 2016-05-21 18:53:55 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<1/800203> ## 2016-05-21 18:53:55 : IKE<2.2.2.2> ike packet, len 208, action 0 ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Catcher: received 180 bytes from socket. ## 2016-05-21 18:53:55 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Catcher: get 180 bytes. src port 500 ## 2016-05-21 18:53:55 : IKE<0.0.0.0 > ISAKMP msg: len 180, nxp 4[KE], exch 2[MM], flag 00 ## 2016-05-21 18:53:55 : IKE<2.2.2.2 > Recv : [KE] [NONCE] ## 2016-05-21 18:53:55 : IKE<0.0.0.0 > extract payload (152): ## 2016-05-21 18:53:55 : IKE<2.2.2.2> MM in state OAK_MM_SA_SETUP. ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Process [KE]: ## 2016-05-21 18:53:55 : IKE<2.2.2.2> processing ISA_KE in phase 1. ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Phase1: his_DH_pub_len is 128 ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Process [NONCE]: ## 2016-05-21 18:53:55 : IKE<2.2.2.2> processing NONCE in phase 1. ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Phase 1 MM Responder constructing 4th message. ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Msg header built (next payload #4) ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Construct [KE] for ISAKMP ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Construct [NONCE] ## 2016-05-21 18:53:55 : IKE<2.2.2.2 > Xmit : [KE] [NONCE] ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:53:55 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<2/80220f> ## 2016-05-21 18:53:55 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:53:55 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:53:55 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:53:55 : IKE<2.2.2.2> gen_skeyid() ## 2016-05-21 18:53:55 : IKE<2.2.2.2> gen_skeyid: returning 0 ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Decrypting payload (length 64) ## 2016-05-21 18:53:55 : IKE<2.2.2.2 > Recv*: [ID] +++ Corrupted MSG ## 2016-05-21 18:53:55 : valid id checking, id type:unknown, len:39462. ## 2016-05-21 18:53:55 : Error: invalid id payload type. ## 2016-05-21 18:53:55 : IKE<0.0.0.0 > Validate (64): bad 5 ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Packet is invalid! ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Pre-shared key might not match. ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Create conn entry... ## 2016-05-21 18:53:55 : IKE<2.2.2.2> ...done(new fd131ec0) ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Msg header built (next payload #8) ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Construct [HASH] ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Construct [NOTIF]:(PAYLOAD-MALFORMED) ## 2016-05-21 18:53:55 : IKE<2.2.2.2> construct QM HASH ## 2016-05-21 18:53:55 : IKE<2.2.2.2 > Xmit*: [HASH] [NOTIF] ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Encrypt P2 payload (len 88) ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Send Phase 2 packet (len=92) ## 2016-05-21 18:53:55 : IKE<2.2.2.2> Delete conn entry... ## 2016-05-21 18:53:55 : IKE<2.2.2.2> ...found conn entry(fd131ec0) ## 2016-05-21 18:53:57 : IKE<2.2.2.2> re-trans timer expired, msg retry (7) (80120f/2) ## 2016-05-21 18:53:57 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:53:57 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:53:59 : IKE<2.2.2.2> re-trans timer expired, msg retry (0) (80120f/2) ## 2016-05-21 18:53:59 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:53:59 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:54:01 : IKE<2.2.2.2> re-trans timer expired, msg retry (8) (80120f/2) ## 2016-05-21 18:54:01 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:54:01 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:54:02 : reap_db. deleting p1sa 6997adc ## 2016-05-21 18:54:02 : terminate_SA: trying to delete SA cause: 0 cond: 2 ## 2016-05-21 18:54:02 : peer_identity_unregister_p1_sa. ## 2016-05-21 18:54:02 : IKE<0.0.0.0 > delete peer identity 0x69905ec ## 2016-05-21 18:54:02 : IKE<0.0.0.0 > peer_identity_remove_from_peer: num entry before remove <2> ## 2016-05-21 18:54:02 : peer_idt.c peer_identity_unregister_p1_sa 686: pidt deleted. ## 2016-05-21 18:54:02 : reap_db. deleting p1sa 699a944 ## 2016-05-21 18:54:02 : terminate_SA: trying to delete SA cause: 0 cond: 2 ## 2016-05-21 18:54:02 : peer_identity_unregister_p1_sa. ## 2016-05-21 18:54:02 : IKE<0.0.0.0 > delete peer identity 0x698fb1c ## 2016-05-21 18:54:02 : IKE<0.0.0.0 > peer_identity_remove_from_peer: num entry before remove <2> ## 2016-05-21 18:54:02 : peer_idt.c peer_identity_unregister_p1_sa 686: pidt deleted. ## 2016-05-21 18:54:02 : reap_db. deleting p1sa 6999210 ## 2016-05-21 18:54:02 : terminate_SA: trying to delete SA cause: 0 cond: 2 ## 2016-05-21 18:54:02 : IKE<2.2.2.2> xauth_cleanup() ## 2016-05-21 18:54:02 : IKE<2.2.2.2> Done cleaning up IKE Phase 1 SA ## 2016-05-21 18:54:02 : peer_identity_unregister_p1_sa. ## 2016-05-21 18:54:02 : IKE<0.0.0.0 > delete peer identity 0x69910bc ## 2016-05-21 18:54:02 : IKE<0.0.0.0 > peer_identity_remove_from_peer: num entry before remove <4> ## 2016-05-21 18:54:02 : peer_idt.c peer_identity_unregister_p1_sa 686: pidt deleted. ## 2016-05-21 18:54:02 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:54:02 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:54:02 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:54:02 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:54:02 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:54:02 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:54:02 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:54:03 : IKE<2.2.2.2> re-trans timer expired, msg retry (1) (80120f/2) ## 2016-05-21 18:54:03 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:54:03 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:54:05 : IKE<2.2.2.2> re-trans timer expired, msg retry (9) (80120f/2) ## 2016-05-21 18:54:05 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:54:05 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:54:05 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:54:05 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:54:05 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:54:05 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:54:05 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:54:05 : IKE<2.2.2.2> Receive re-transmit IKE packet phase 1 SA(2.2.2.2) exchg(2) len(92) ## 2016-05-21 18:54:07 : IKE<2.2.2.2> re-trans timer expired, msg retry (2) (80120f/2) ## 2016-05-21 18:54:07 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:54:07 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:54:09 : IKE<2.2.2.2> re-trans timer expired, msg retry (10) (80120f/2) ## 2016-05-21 18:54:09 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:54:09 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:54:09 : getProfileFromP1Proposal-> ## 2016-05-21 18:54:09 : find profile[0]=<00000005 00000002 00000001 00000002> for p1 proposal (id 5), xauth(0) ## 2016-05-21 18:54:09 : init p1sa, pidt = 0x0 ## 2016-05-21 18:54:09 : change peer identity for p1 sa, pidt = 0x0 ## 2016-05-21 18:54:09 : IKE<0.0.0.0 > peer_identity_create_with_uid: uid<0> ## 2016-05-21 18:54:09 : IKE<0.0.0.0 > create peer identity 0x698fb1c ## 2016-05-21 18:54:09 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry before add <1> ## 2016-05-21 18:54:09 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry after add <2> ## 2016-05-21 18:54:09 : peer identity 698fb1c created. ## 2016-05-21 18:54:09 : IKE<0.0.0.0 > EDIPI disabled ## 2016-05-21 18:54:09 : IKE<0.0.0.0 > set_phase1_transform, dh_group(2). ## 2016-05-21 18:54:10 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:54:10 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:54:10 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:54:10 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:54:10 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:54:10 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:54:10 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:54:10 : getProfileFromP1Proposal-> ## 2016-05-21 18:54:10 : find profile[0]=<00000005 00000002 00000001 00000002> for p1 proposal (id 5), xauth(0) ## 2016-05-21 18:54:10 : init p1sa, pidt = 0x0 ## 2016-05-21 18:54:10 : change peer identity for p1 sa, pidt = 0x0 ## 2016-05-21 18:54:10 : IKE<0.0.0.0 > peer_identity_create_with_uid: uid<0> ## 2016-05-21 18:54:10 : IKE<0.0.0.0 > create peer identity 0x69905ec ## 2016-05-21 18:54:10 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry before add <1> ## 2016-05-21 18:54:10 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry after add <2> ## 2016-05-21 18:54:10 : peer identity 69905ec created. ## 2016-05-21 18:54:10 : IKE<0.0.0.0 > EDIPI disabled ## 2016-05-21 18:54:10 : IKE<0.0.0.0 > set_phase1_transform, dh_group(2). ## 2016-05-21 18:54:11 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:54:11 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:54:11 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:54:11 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:54:11 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:54:11 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:54:11 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:54:11 : IKE<2.2.2.2> re-trans timer expired, msg retry (3) (80120f/2) ## 2016-05-21 18:54:11 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:54:11 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:54:11 : IKE<2.2.2.2> ****** Recv kernel msg IDX-1, TYPE-5 ****** ## 2016-05-21 18:54:11 : IKE<2.2.2.2> ****** Recv kernel msg IDX-1, TYPE-5 ****** ## 2016-05-21 18:54:11 : IKE<2.2.2.2> sa orig index<1>, peer_id<3>. ## 2016-05-21 18:54:11 : IKE<2.2.2.2> isadb_get_entry_by_peer_and_local_if_port_p2sa isadb get entry by peer/local ip and port ## 2016-05-21 18:54:11 : IKE<2.2.2.2> Added Phase 2 session tasks to the task list. ## 2016-05-21 18:54:12 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:54:12 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:54:12 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:54:12 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:54:12 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:54:12 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:54:12 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:54:13 : IKE<2.2.2.2> re-trans timer expired, msg retry (11) (80120f/2) ## 2016-05-21 18:54:13 : IKE<2.2.2.2> Phase 1: Retransmission limit has been reached. ## 2016-05-21 18:54:15 : IKE<2.2.2.2> re-trans timer expired, msg retry (4) (80120f/2) ## 2016-05-21 18:54:15 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:54:15 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:54:15 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:54:15 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:54:15 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:54:15 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:54:15 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:54:15 : IKE<2.2.2.2> Receive re-transmit IKE packet phase 1 SA(2.2.2.2) exchg(2) len(92) ## 2016-05-21 18:54:19 : IKE<2.2.2.2> re-trans timer expired, msg retry (5) (80120f/2) ## 2016-05-21 18:54:19 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:54:19 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:54:23 : IKE<2.2.2.2> re-trans timer expired, msg retry (6) (80120f/2) ## 2016-05-21 18:54:23 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:54:23 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:54:25 : IKE<2.2.2.2> ike packet, len 172, action 1 ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Catcher: received 144 bytes from socket. ## 2016-05-21 18:54:25 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Catcher: get 144 bytes. src port 500 ## 2016-05-21 18:54:25 : IKE<0.0.0.0 > ISAKMP msg: len 144, nxp 1[SA], exch 2[MM], flag 00 ## 2016-05-21 18:54:25 : IKE<2.2.2.2 > Recv : [SA] [VID] [VID] ## 2016-05-21 18:54:25 : IKE<2.2.2.2> found peer Dallas_VPN_Gateway ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Found peer entry (Dallas_VPN_Gateway) from 2.2.2.2. ## 2016-05-21 18:54:25 : responder create sa: 2.2.2.2->199.188.209.36 ## 2016-05-21 18:54:25 : init p1sa, pidt = 0x0 ## 2016-05-21 18:54:25 : change peer identity for p1 sa, pidt = 0x0 ## 2016-05-21 18:54:25 : IKE<0.0.0.0 > peer_identity_create_with_uid: uid<0> ## 2016-05-21 18:54:25 : IKE<0.0.0.0 > create peer identity 0x69910bc ## 2016-05-21 18:54:25 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry before add <3> ## 2016-05-21 18:54:25 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry after add <4> ## 2016-05-21 18:54:25 : peer identity 69910bc created. ## 2016-05-21 18:54:25 : IKE<0.0.0.0 > EDIPI disabled ## 2016-05-21 18:54:25 : IKE<2.2.2.2> getProfileFromP1Proposal-> ## 2016-05-21 18:54:25 : IKE<2.2.2.2> find profile[0]=<00000005 00000002 00000001 00000002> for p1 proposal (id 5), xauth(0) ## 2016-05-21 18:54:25 : IKE<2.2.2.2> responder create sa: 2.2.2.2->199.188.209.36 ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Phase 1: Responder starts MAIN mode negotiations. ## 2016-05-21 18:54:25 : IKE<2.2.2.2> MM in state OAK_MM_NO_STATE. ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Process [VID]: ## 2016-05-21 18:54:25 : IKE<2.2.2.2 > Vendor ID: ## 2016-05-21 18:54:25 : af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Process [VID]: ## 2016-05-21 18:54:25 : IKE<2.2.2.2 > Vendor ID: ## 2016-05-21 18:54:25 : 69 93 69 22 87 41 c6 d4 ca 09 4c 93 e2 42 c9 de ## 2016-05-21 18:54:25 : 19 e7 b7 c6 00 00 00 05 00 00 05 00 ## 2016-05-21 18:54:25 : IKE<2.2.2.2> peer is an NetScreen box, model=NetScreen-204, ver=5.00 ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Process [SA]: ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Proposal received: xauthflag 0 ## 2016-05-21 18:54:25 : IKE<2.2.2.2> auth(1), encr(5)<3DES>, hash(2), group(2) ## 2016-05-21 18:54:25 : IKE<2.2.2.2> xauth attribute: disabled ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Phase 1 proposal [0] selected. ## 2016-05-21 18:54:25 : IKE<2.2.2.2> SA Life Type = seconds ## 2016-05-21 18:54:25 : IKE<2.2.2.2> SA lifetime (TLV) = 28800 ## 2016-05-21 18:54:25 : IKE<2.2.2.2> DH_BG_consume OK. p1 resp ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Phase 1 MM Responder constructing 2nd message. ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Msg header built (next payload #1) ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Construct [SA] for ISAKMP ## 2016-05-21 18:54:25 : IKE<2.2.2.2> auth(1), encr(5)<3DES>, hash(2), group(2) ## 2016-05-21 18:54:25 : IKE<2.2.2.2> xauth attribute: disabled ## 2016-05-21 18:54:25 : IKE<2.2.2.2> lifetime/lifesize (28800/0) ## 2016-05-21 18:54:25 : IKE<0.0.0.0 > set_phase1_transform, dh_group(2). ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Construct NetScreen [VID] ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Construct custom [VID] ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Construct custom [VID] ## 2016-05-21 18:54:25 : IKE<2.2.2.2 > Xmit : [SA] [VID] [VID] [VID] ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Send Phase 1 packet (len=156) ## 2016-05-21 18:54:25 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<1/800203> ## 2016-05-21 18:54:25 : IKE<2.2.2.2> ike packet, len 208, action 0 ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Catcher: received 180 bytes from socket. ## 2016-05-21 18:54:25 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Catcher: get 180 bytes. src port 500 ## 2016-05-21 18:54:25 : IKE<0.0.0.0 > ISAKMP msg: len 180, nxp 4[KE], exch 2[MM], flag 00 ## 2016-05-21 18:54:25 : IKE<2.2.2.2 > Recv : [KE] [NONCE] ## 2016-05-21 18:54:25 : IKE<0.0.0.0 > extract payload (152): ## 2016-05-21 18:54:25 : IKE<2.2.2.2> MM in state OAK_MM_SA_SETUP. ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Process [KE]: ## 2016-05-21 18:54:25 : IKE<2.2.2.2> processing ISA_KE in phase 1. ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Phase1: his_DH_pub_len is 128 ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Process [NONCE]: ## 2016-05-21 18:54:25 : IKE<2.2.2.2> processing NONCE in phase 1. ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Phase 1 MM Responder constructing 4th message. ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Msg header built (next payload #4) ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Construct [KE] for ISAKMP ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Construct [NONCE] ## 2016-05-21 18:54:25 : IKE<2.2.2.2 > Xmit : [KE] [NONCE] ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:54:25 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<2/80220f> ## 2016-05-21 18:54:25 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:54:25 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:54:25 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:54:25 : IKE<2.2.2.2> gen_skeyid() ## 2016-05-21 18:54:25 : IKE<2.2.2.2> gen_skeyid: returning 0 ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Decrypting payload (length 64) ## 2016-05-21 18:54:25 : IKE<2.2.2.2 > Recv*: [ID] +++ Corrupted MSG ## 2016-05-21 18:54:25 : valid id checking, id type:unknown, len:27918. ## 2016-05-21 18:54:25 : Error: invalid id payload type. ## 2016-05-21 18:54:25 : IKE<0.0.0.0 > Validate (64): bad 5 ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Packet is invalid! ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Pre-shared key might not match. ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Create conn entry... ## 2016-05-21 18:54:25 : IKE<2.2.2.2> ...done(new e8a29d91) ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Msg header built (next payload #8) ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Construct [HASH] ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Construct [NOTIF]:(PAYLOAD-MALFORMED) ## 2016-05-21 18:54:25 : IKE<2.2.2.2> construct QM HASH ## 2016-05-21 18:54:25 : IKE<2.2.2.2 > Xmit*: [HASH] [NOTIF] ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Encrypt P2 payload (len 88) ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Send Phase 2 packet (len=92) ## 2016-05-21 18:54:25 : IKE<2.2.2.2> Delete conn entry... ## 2016-05-21 18:54:25 : IKE<2.2.2.2> ...found conn entry(e8a29d91) ## 2016-05-21 18:54:27 : IKE<2.2.2.2> re-trans timer expired, msg retry (7) (80120f/2) ## 2016-05-21 18:54:27 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:54:27 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:54:29 : IKE<2.2.2.2> re-trans timer expired, msg retry (0) (80120f/2) ## 2016-05-21 18:54:29 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:54:29 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:54:31 : IKE<2.2.2.2> re-trans timer expired, msg retry (8) (80120f/2) ## 2016-05-21 18:54:31 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:54:31 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:54:32 : reap_db. deleting p1sa 6997638 ## 2016-05-21 18:54:32 : terminate_SA: trying to delete SA cause: 0 cond: 2 ## 2016-05-21 18:54:32 : IKE<2.2.2.2> xauth_cleanup() ## 2016-05-21 18:54:32 : IKE<2.2.2.2> Done cleaning up IKE Phase 1 SA ## 2016-05-21 18:54:32 : peer_identity_unregister_p1_sa. ## 2016-05-21 18:54:32 : IKE<0.0.0.0 > delete peer identity 0x6991370 ## 2016-05-21 18:54:32 : IKE<0.0.0.0 > peer_identity_remove_from_peer: num entry before remove <4> ## 2016-05-21 18:54:32 : peer_idt.c peer_identity_unregister_p1_sa 686: pidt deleted. ## 2016-05-21 18:54:32 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:54:32 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:54:32 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:54:32 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:54:32 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:54:32 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:54:32 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:54:33 : IKE<2.2.2.2> re-trans timer expired, msg retry (1) (80120f/2) ## 2016-05-21 18:54:33 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:54:33 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:54:35 : IKE<2.2.2.2> re-trans timer expired, msg retry (9) (80120f/2) ## 2016-05-21 18:54:35 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:54:35 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:54:35 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:54:35 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:54:35 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:54:35 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:54:35 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:54:35 : IKE<2.2.2.2> Receive re-transmit IKE packet phase 1 SA(2.2.2.2) exchg(2) len(92) ## 2016-05-21 18:54:36 : IKE<2.2.2.2> ****** Recv kernel msg IDX-1, TYPE-5 ****** ## 2016-05-21 18:54:36 : IKE<2.2.2.2> ****** Recv kernel msg IDX-1, TYPE-5 ****** ## 2016-05-21 18:54:36 : IKE<2.2.2.2> sa orig index<1>, peer_id<3>. ## 2016-05-21 18:54:36 : IKE<2.2.2.2> isadb_get_entry_by_peer_and_local_if_port_p2sa isadb get entry by peer/local ip and port ## 2016-05-21 18:54:36 : IKE<2.2.2.2> Added Phase 2 session tasks to the task list. ## 2016-05-21 18:54:37 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:54:37 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:54:37 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:54:37 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:54:37 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:54:37 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:54:37 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:54:37 : IKE<2.2.2.2> re-trans timer expired, msg retry (2) (80120f/2) ## 2016-05-21 18:54:37 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:54:37 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:54:39 : IKE<2.2.2.2> re-trans timer expired, msg retry (10) (80120f/2) ## 2016-05-21 18:54:39 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:54:39 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:54:41 : IKE<2.2.2.2> re-trans timer expired, msg retry (3) (80120f/2) ## 2016-05-21 18:54:41 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:54:41 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:54:43 : IKE<2.2.2.2> re-trans timer expired, msg retry (11) (80120f/2) ## 2016-05-21 18:54:43 : IKE<2.2.2.2> Phase 1: Retransmission limit has been reached. ## 2016-05-21 18:54:45 : IKE<2.2.2.2> re-trans timer expired, msg retry (4) (80120f/2) ## 2016-05-21 18:54:45 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:54:45 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:54:45 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:54:45 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:54:45 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:54:45 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:54:45 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:54:45 : IKE<2.2.2.2> Receive re-transmit IKE packet phase 1 SA(2.2.2.2) exchg(2) len(92) ## 2016-05-21 18:54:49 : IKE<2.2.2.2> re-trans timer expired, msg retry (5) (80120f/2) ## 2016-05-21 18:54:49 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:54:49 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:54:53 : IKE<2.2.2.2> re-trans timer expired, msg retry (6) (80120f/2) ## 2016-05-21 18:54:53 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:54:53 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:54:55 : IKE<2.2.2.2> ike packet, len 172, action 1 ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Catcher: received 144 bytes from socket. ## 2016-05-21 18:54:55 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Catcher: get 144 bytes. src port 500 ## 2016-05-21 18:54:55 : IKE<0.0.0.0 > ISAKMP msg: len 144, nxp 1[SA], exch 2[MM], flag 00 ## 2016-05-21 18:54:55 : IKE<2.2.2.2 > Recv : [SA] [VID] [VID] ## 2016-05-21 18:54:55 : IKE<2.2.2.2> found peer Dallas_VPN_Gateway ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Found peer entry (Dallas_VPN_Gateway) from 2.2.2.2. ## 2016-05-21 18:54:55 : responder create sa: 2.2.2.2->199.188.209.36 ## 2016-05-21 18:54:55 : init p1sa, pidt = 0x0 ## 2016-05-21 18:54:55 : change peer identity for p1 sa, pidt = 0x0 ## 2016-05-21 18:54:55 : IKE<0.0.0.0 > peer_identity_create_with_uid: uid<0> ## 2016-05-21 18:54:55 : IKE<0.0.0.0 > create peer identity 0x6991370 ## 2016-05-21 18:54:55 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry before add <3> ## 2016-05-21 18:54:55 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry after add <4> ## 2016-05-21 18:54:55 : peer identity 6991370 created. ## 2016-05-21 18:54:55 : IKE<0.0.0.0 > EDIPI disabled ## 2016-05-21 18:54:55 : IKE<2.2.2.2> getProfileFromP1Proposal-> ## 2016-05-21 18:54:55 : IKE<2.2.2.2> find profile[0]=<00000005 00000002 00000001 00000002> for p1 proposal (id 5), xauth(0) ## 2016-05-21 18:54:55 : IKE<2.2.2.2> responder create sa: 2.2.2.2->199.188.209.36 ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Phase 1: Responder starts MAIN mode negotiations. ## 2016-05-21 18:54:55 : IKE<2.2.2.2> MM in state OAK_MM_NO_STATE. ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Process [VID]: ## 2016-05-21 18:54:55 : IKE<2.2.2.2 > Vendor ID: ## 2016-05-21 18:54:55 : af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Process [VID]: ## 2016-05-21 18:54:55 : IKE<2.2.2.2 > Vendor ID: ## 2016-05-21 18:54:55 : 69 93 69 22 87 41 c6 d4 ca 09 4c 93 e2 42 c9 de ## 2016-05-21 18:54:55 : 19 e7 b7 c6 00 00 00 05 00 00 05 00 ## 2016-05-21 18:54:55 : IKE<2.2.2.2> peer is an NetScreen box, model=NetScreen-204, ver=5.00 ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Process [SA]: ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Proposal received: xauthflag 0 ## 2016-05-21 18:54:55 : IKE<2.2.2.2> auth(1), encr(5)<3DES>, hash(2), group(2) ## 2016-05-21 18:54:55 : IKE<2.2.2.2> xauth attribute: disabled ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Phase 1 proposal [0] selected. ## 2016-05-21 18:54:55 : IKE<2.2.2.2> SA Life Type = seconds ## 2016-05-21 18:54:55 : IKE<2.2.2.2> SA lifetime (TLV) = 28800 ## 2016-05-21 18:54:55 : IKE<2.2.2.2> DH_BG_consume OK. p1 resp ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Phase 1 MM Responder constructing 2nd message. ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Msg header built (next payload #1) ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Construct [SA] for ISAKMP ## 2016-05-21 18:54:55 : IKE<2.2.2.2> auth(1), encr(5)<3DES>, hash(2), group(2) ## 2016-05-21 18:54:55 : IKE<2.2.2.2> xauth attribute: disabled ## 2016-05-21 18:54:55 : IKE<2.2.2.2> lifetime/lifesize (28800/0) ## 2016-05-21 18:54:55 : IKE<0.0.0.0 > set_phase1_transform, dh_group(2). ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Construct NetScreen [VID] ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Construct custom [VID] ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Construct custom [VID] ## 2016-05-21 18:54:55 : IKE<2.2.2.2 > Xmit : [SA] [VID] [VID] [VID] ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Send Phase 1 packet (len=156) ## 2016-05-21 18:54:55 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<1/800203> ## 2016-05-21 18:54:55 : IKE<2.2.2.2> ike packet, len 208, action 0 ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Catcher: received 180 bytes from socket. ## 2016-05-21 18:54:55 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Catcher: get 180 bytes. src port 500 ## 2016-05-21 18:54:55 : IKE<0.0.0.0 > ISAKMP msg: len 180, nxp 4[KE], exch 2[MM], flag 00 ## 2016-05-21 18:54:55 : IKE<2.2.2.2 > Recv : [KE] [NONCE] ## 2016-05-21 18:54:55 : IKE<0.0.0.0 > extract payload (152): ## 2016-05-21 18:54:55 : IKE<2.2.2.2> MM in state OAK_MM_SA_SETUP. ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Process [KE]: ## 2016-05-21 18:54:55 : IKE<2.2.2.2> processing ISA_KE in phase 1. ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Phase1: his_DH_pub_len is 128 ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Process [NONCE]: ## 2016-05-21 18:54:55 : IKE<2.2.2.2> processing NONCE in phase 1. ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Phase 1 MM Responder constructing 4th message. ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Msg header built (next payload #4) ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Construct [KE] for ISAKMP ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Construct [NONCE] ## 2016-05-21 18:54:55 : IKE<2.2.2.2 > Xmit : [KE] [NONCE] ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:54:55 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<2/80220f> ## 2016-05-21 18:54:55 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:54:55 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:54:55 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:54:55 : IKE<2.2.2.2> gen_skeyid() ## 2016-05-21 18:54:55 : IKE<2.2.2.2> gen_skeyid: returning 0 ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Decrypting payload (length 64) ## 2016-05-21 18:54:55 : IKE<2.2.2.2 > Recv*: [ID] +++ Corrupted MSG ## 2016-05-21 18:54:55 : valid id checking, id type:unknown, len:30426. ## 2016-05-21 18:54:55 : Error: invalid id payload type. ## 2016-05-21 18:54:55 : IKE<0.0.0.0 > Validate (64): bad 5 ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Packet is invalid! ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Pre-shared key might not match. ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Create conn entry... ## 2016-05-21 18:54:55 : IKE<2.2.2.2> ...done(new 7ca3f0a9) ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Msg header built (next payload #8) ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Construct [HASH] ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Construct [NOTIF]:(PAYLOAD-MALFORMED) ## 2016-05-21 18:54:55 : IKE<2.2.2.2> construct QM HASH ## 2016-05-21 18:54:55 : IKE<2.2.2.2 > Xmit*: [HASH] [NOTIF] ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Encrypt P2 payload (len 88) ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Send Phase 2 packet (len=92) ## 2016-05-21 18:54:55 : IKE<2.2.2.2> Delete conn entry... ## 2016-05-21 18:54:55 : IKE<2.2.2.2> ...found conn entry(7ca3f0a9) ## 2016-05-21 18:54:57 : IKE<2.2.2.2> re-trans timer expired, msg retry (7) (80120f/2) ## 2016-05-21 18:54:57 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:54:57 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:54:59 : IKE<2.2.2.2> re-trans timer expired, msg retry (0) (80120f/2) ## 2016-05-21 18:54:59 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:54:59 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:55:01 : IKE<2.2.2.2> re-trans timer expired, msg retry (8) (80120f/2) ## 2016-05-21 18:55:01 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:55:01 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:55:02 : reap_db. deleting p1sa 6997adc ## 2016-05-21 18:55:02 : terminate_SA: trying to delete SA cause: 0 cond: 2 ## 2016-05-21 18:55:02 : peer_identity_unregister_p1_sa. ## 2016-05-21 18:55:02 : IKE<0.0.0.0 > delete peer identity 0x69905ec ## 2016-05-21 18:55:02 : IKE<0.0.0.0 > peer_identity_remove_from_peer: num entry before remove <2> ## 2016-05-21 18:55:02 : peer_idt.c peer_identity_unregister_p1_sa 686: pidt deleted. ## 2016-05-21 18:55:02 : reap_db. deleting p1sa 6999210 ## 2016-05-21 18:55:02 : terminate_SA: trying to delete SA cause: 0 cond: 2 ## 2016-05-21 18:55:02 : peer_identity_unregister_p1_sa. ## 2016-05-21 18:55:02 : IKE<0.0.0.0 > delete peer identity 0x698fb1c ## 2016-05-21 18:55:02 : IKE<0.0.0.0 > peer_identity_remove_from_peer: num entry before remove <2> ## 2016-05-21 18:55:02 : peer_idt.c peer_identity_unregister_p1_sa 686: pidt deleted. ## 2016-05-21 18:55:02 : reap_db. deleting p1sa 69963a8 ## 2016-05-21 18:55:02 : terminate_SA: trying to delete SA cause: 0 cond: 2 ## 2016-05-21 18:55:02 : IKE<2.2.2.2> xauth_cleanup() ## 2016-05-21 18:55:02 : IKE<2.2.2.2> Done cleaning up IKE Phase 1 SA ## 2016-05-21 18:55:02 : peer_identity_unregister_p1_sa. ## 2016-05-21 18:55:02 : IKE<0.0.0.0 > delete peer identity 0x6990b54 ## 2016-05-21 18:55:02 : IKE<0.0.0.0 > peer_identity_remove_from_peer: num entry before remove <4> ## 2016-05-21 18:55:02 : peer_idt.c peer_identity_unregister_p1_sa 686: pidt deleted. ## 2016-05-21 18:55:02 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:55:02 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:55:02 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:55:02 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:55:02 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:55:02 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:55:02 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:55:03 : IKE<2.2.2.2> re-trans timer expired, msg retry (1) (80120f/2) ## 2016-05-21 18:55:03 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:55:03 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:55:05 : IKE<2.2.2.2> re-trans timer expired, msg retry (9) (80120f/2) ## 2016-05-21 18:55:05 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:55:05 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:55:05 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:55:05 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:55:05 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:55:05 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:55:05 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:55:05 : IKE<2.2.2.2> Receive re-transmit IKE packet phase 1 SA(2.2.2.2) exchg(2) len(92) ## 2016-05-21 18:55:07 : IKE<2.2.2.2> re-trans timer expired, msg retry (2) (80120f/2) ## 2016-05-21 18:55:07 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:55:07 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:55:09 : IKE<2.2.2.2> re-trans timer expired, msg retry (10) (80120f/2) ## 2016-05-21 18:55:09 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:55:09 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:55:09 : getProfileFromP1Proposal-> ## 2016-05-21 18:55:09 : find profile[0]=<00000005 00000002 00000001 00000002> for p1 proposal (id 5), xauth(0) ## 2016-05-21 18:55:09 : init p1sa, pidt = 0x0 ## 2016-05-21 18:55:09 : change peer identity for p1 sa, pidt = 0x0 ## 2016-05-21 18:55:09 : IKE<0.0.0.0 > peer_identity_create_with_uid: uid<0> ## 2016-05-21 18:55:09 : IKE<0.0.0.0 > create peer identity 0x698fb1c ## 2016-05-21 18:55:09 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry before add <1> ## 2016-05-21 18:55:09 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry after add <2> ## 2016-05-21 18:55:09 : peer identity 698fb1c created. ## 2016-05-21 18:55:09 : IKE<0.0.0.0 > EDIPI disabled ## 2016-05-21 18:55:09 : IKE<0.0.0.0 > set_phase1_transform, dh_group(2). ## 2016-05-21 18:55:10 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:55:10 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:55:10 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:55:10 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:55:10 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:55:10 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:55:10 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:55:10 : getProfileFromP1Proposal-> ## 2016-05-21 18:55:10 : find profile[0]=<00000005 00000002 00000001 00000002> for p1 proposal (id 5), xauth(0) ## 2016-05-21 18:55:10 : init p1sa, pidt = 0x0 ## 2016-05-21 18:55:10 : change peer identity for p1 sa, pidt = 0x0 ## 2016-05-21 18:55:10 : IKE<0.0.0.0 > peer_identity_create_with_uid: uid<0> ## 2016-05-21 18:55:10 : IKE<0.0.0.0 > create peer identity 0x69905ec ## 2016-05-21 18:55:10 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry before add <1> ## 2016-05-21 18:55:10 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry after add <2> ## 2016-05-21 18:55:10 : peer identity 69905ec created. ## 2016-05-21 18:55:10 : IKE<0.0.0.0 > EDIPI disabled ## 2016-05-21 18:55:10 : IKE<0.0.0.0 > set_phase1_transform, dh_group(2). ## 2016-05-21 18:55:11 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:55:11 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:55:11 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:55:11 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:55:11 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:55:11 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:55:11 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:55:11 : IKE<2.2.2.2> re-trans timer expired, msg retry (3) (80120f/2) ## 2016-05-21 18:55:11 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:55:11 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:55:12 : IKE<2.2.2.2> ****** Recv kernel msg IDX-1, TYPE-5 ****** ## 2016-05-21 18:55:12 : IKE<2.2.2.2> ****** Recv kernel msg IDX-1, TYPE-5 ****** ## 2016-05-21 18:55:12 : IKE<2.2.2.2> sa orig index<1>, peer_id<3>. ## 2016-05-21 18:55:12 : IKE<2.2.2.2> isadb_get_entry_by_peer_and_local_if_port_p2sa isadb get entry by peer/local ip and port ## 2016-05-21 18:55:12 : IKE<2.2.2.2> Added Phase 2 session tasks to the task list. ## 2016-05-21 18:55:13 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:55:13 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:55:13 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:55:13 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:55:13 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:55:13 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:55:13 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:55:13 : IKE<2.2.2.2> re-trans timer expired, msg retry (11) (80120f/2) ## 2016-05-21 18:55:13 : IKE<2.2.2.2> Phase 1: Retransmission limit has been reached. ## 2016-05-21 18:55:15 : IKE<2.2.2.2> re-trans timer expired, msg retry (4) (80120f/2) ## 2016-05-21 18:55:15 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:55:15 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:55:15 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:55:15 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:55:15 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:55:15 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:55:15 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:55:15 : IKE<2.2.2.2> Receive re-transmit IKE packet phase 1 SA(2.2.2.2) exchg(2) len(92) ## 2016-05-21 18:55:19 : IKE<2.2.2.2> re-trans timer expired, msg retry (5) (80120f/2) ## 2016-05-21 18:55:19 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:55:19 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:55:23 : IKE<2.2.2.2> re-trans timer expired, msg retry (6) (80120f/2) ## 2016-05-21 18:55:23 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:55:23 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:55:25 : IKE<2.2.2.2> ike packet, len 172, action 1 ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Catcher: received 144 bytes from socket. ## 2016-05-21 18:55:25 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Catcher: get 144 bytes. src port 500 ## 2016-05-21 18:55:25 : IKE<0.0.0.0 > ISAKMP msg: len 144, nxp 1[SA], exch 2[MM], flag 00 ## 2016-05-21 18:55:25 : IKE<2.2.2.2 > Recv : [SA] [VID] [VID] ## 2016-05-21 18:55:25 : IKE<2.2.2.2> found peer Dallas_VPN_Gateway ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Found peer entry (Dallas_VPN_Gateway) from 2.2.2.2. ## 2016-05-21 18:55:25 : responder create sa: 2.2.2.2->199.188.209.36 ## 2016-05-21 18:55:25 : init p1sa, pidt = 0x0 ## 2016-05-21 18:55:25 : change peer identity for p1 sa, pidt = 0x0 ## 2016-05-21 18:55:25 : IKE<0.0.0.0 > peer_identity_create_with_uid: uid<0> ## 2016-05-21 18:55:25 : IKE<0.0.0.0 > create peer identity 0x6990b54 ## 2016-05-21 18:55:25 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry before add <3> ## 2016-05-21 18:55:25 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry after add <4> ## 2016-05-21 18:55:25 : peer identity 6990b54 created. ## 2016-05-21 18:55:25 : IKE<0.0.0.0 > EDIPI disabled ## 2016-05-21 18:55:25 : IKE<2.2.2.2> getProfileFromP1Proposal-> ## 2016-05-21 18:55:25 : IKE<2.2.2.2> find profile[0]=<00000005 00000002 00000001 00000002> for p1 proposal (id 5), xauth(0) ## 2016-05-21 18:55:25 : IKE<2.2.2.2> responder create sa: 2.2.2.2->199.188.209.36 ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Phase 1: Responder starts MAIN mode negotiations. ## 2016-05-21 18:55:25 : IKE<2.2.2.2> MM in state OAK_MM_NO_STATE. ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Process [VID]: ## 2016-05-21 18:55:25 : IKE<2.2.2.2 > Vendor ID: ## 2016-05-21 18:55:25 : af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Process [VID]: ## 2016-05-21 18:55:25 : IKE<2.2.2.2 > Vendor ID: ## 2016-05-21 18:55:25 : 69 93 69 22 87 41 c6 d4 ca 09 4c 93 e2 42 c9 de ## 2016-05-21 18:55:25 : 19 e7 b7 c6 00 00 00 05 00 00 05 00 ## 2016-05-21 18:55:25 : IKE<2.2.2.2> peer is an NetScreen box, model=NetScreen-204, ver=5.00 ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Process [SA]: ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Proposal received: xauthflag 0 ## 2016-05-21 18:55:25 : IKE<2.2.2.2> auth(1), encr(5)<3DES>, hash(2), group(2) ## 2016-05-21 18:55:25 : IKE<2.2.2.2> xauth attribute: disabled ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Phase 1 proposal [0] selected. ## 2016-05-21 18:55:25 : IKE<2.2.2.2> SA Life Type = seconds ## 2016-05-21 18:55:25 : IKE<2.2.2.2> SA lifetime (TLV) = 28800 ## 2016-05-21 18:55:25 : IKE<2.2.2.2> DH_BG_consume OK. p1 resp ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Phase 1 MM Responder constructing 2nd message. ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Msg header built (next payload #1) ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Construct [SA] for ISAKMP ## 2016-05-21 18:55:25 : IKE<2.2.2.2> auth(1), encr(5)<3DES>, hash(2), group(2) ## 2016-05-21 18:55:25 : IKE<2.2.2.2> xauth attribute: disabled ## 2016-05-21 18:55:25 : IKE<2.2.2.2> lifetime/lifesize (28800/0) ## 2016-05-21 18:55:25 : IKE<0.0.0.0 > set_phase1_transform, dh_group(2). ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Construct NetScreen [VID] ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Construct custom [VID] ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Construct custom [VID] ## 2016-05-21 18:55:25 : IKE<2.2.2.2 > Xmit : [SA] [VID] [VID] [VID] ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Send Phase 1 packet (len=156) ## 2016-05-21 18:55:25 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<1/800203> ## 2016-05-21 18:55:25 : IKE<2.2.2.2> ike packet, len 208, action 0 ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Catcher: received 180 bytes from socket. ## 2016-05-21 18:55:25 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Catcher: get 180 bytes. src port 500 ## 2016-05-21 18:55:25 : IKE<0.0.0.0 > ISAKMP msg: len 180, nxp 4[KE], exch 2[MM], flag 00 ## 2016-05-21 18:55:25 : IKE<2.2.2.2 > Recv : [KE] [NONCE] ## 2016-05-21 18:55:25 : IKE<0.0.0.0 > extract payload (152): ## 2016-05-21 18:55:25 : IKE<2.2.2.2> MM in state OAK_MM_SA_SETUP. ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Process [KE]: ## 2016-05-21 18:55:25 : IKE<2.2.2.2> processing ISA_KE in phase 1. ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Phase1: his_DH_pub_len is 128 ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Process [NONCE]: ## 2016-05-21 18:55:25 : IKE<2.2.2.2> processing NONCE in phase 1. ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Phase 1 MM Responder constructing 4th message. ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Msg header built (next payload #4) ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Construct [KE] for ISAKMP ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Construct [NONCE] ## 2016-05-21 18:55:25 : IKE<2.2.2.2 > Xmit : [KE] [NONCE] ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:55:25 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<2/80220f> ## 2016-05-21 18:55:25 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:55:25 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:55:25 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:55:25 : IKE<2.2.2.2> gen_skeyid() ## 2016-05-21 18:55:25 : IKE<2.2.2.2> gen_skeyid: returning 0 ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Decrypting payload (length 64) ## 2016-05-21 18:55:25 : IKE<2.2.2.2 > Recv*: [ID] +++ Corrupted MSG ## 2016-05-21 18:55:25 : valid id checking, id type:unknown, len:50411. ## 2016-05-21 18:55:25 : Error: invalid id payload type. ## 2016-05-21 18:55:25 : IKE<0.0.0.0 > Validate (64): bad 5 ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Packet is invalid! ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Pre-shared key might not match. ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Create conn entry... ## 2016-05-21 18:55:25 : IKE<2.2.2.2> ...done(new a202b702) ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Msg header built (next payload #8) ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Construct [HASH] ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Construct [NOTIF]:(PAYLOAD-MALFORMED) ## 2016-05-21 18:55:25 : IKE<2.2.2.2> construct QM HASH ## 2016-05-21 18:55:25 : IKE<2.2.2.2 > Xmit*: [HASH] [NOTIF] ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Encrypt P2 payload (len 88) ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Send Phase 2 packet (len=92) ## 2016-05-21 18:55:25 : IKE<2.2.2.2> Delete conn entry... ## 2016-05-21 18:55:25 : IKE<2.2.2.2> ...found conn entry(a202b702) ## 2016-05-21 18:55:27 : IKE<2.2.2.2> re-trans timer expired, msg retry (7) (80120f/2) ## 2016-05-21 18:55:27 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:55:27 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:55:29 : IKE<2.2.2.2> re-trans timer expired, msg retry (0) (80120f/2) ## 2016-05-21 18:55:29 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:55:29 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:55:31 : IKE<2.2.2.2> re-trans timer expired, msg retry (8) (80120f/2) ## 2016-05-21 18:55:31 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:55:31 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:55:32 : reap_db. deleting p1sa 6998d6c ## 2016-05-21 18:55:32 : terminate_SA: trying to delete SA cause: 0 cond: 2 ## 2016-05-21 18:55:32 : IKE<2.2.2.2> xauth_cleanup() ## 2016-05-21 18:55:32 : IKE<2.2.2.2> Done cleaning up IKE Phase 1 SA ## 2016-05-21 18:55:32 : peer_identity_unregister_p1_sa. ## 2016-05-21 18:55:32 : IKE<0.0.0.0 > delete peer identity 0x69910bc ## 2016-05-21 18:55:32 : IKE<0.0.0.0 > peer_identity_remove_from_peer: num entry before remove <4> ## 2016-05-21 18:55:32 : peer_idt.c peer_identity_unregister_p1_sa 686: pidt deleted. ## 2016-05-21 18:55:32 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:55:32 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:55:32 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:55:32 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:55:32 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:55:32 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:55:32 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:55:33 : IKE<2.2.2.2> re-trans timer expired, msg retry (1) (80120f/2) ## 2016-05-21 18:55:33 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:55:33 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:55:35 : IKE<2.2.2.2> re-trans timer expired, msg retry (9) (80120f/2) ## 2016-05-21 18:55:35 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:55:35 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:55:35 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:55:35 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:55:35 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:55:35 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:55:35 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:55:35 : IKE<2.2.2.2> Receive re-transmit IKE packet phase 1 SA(2.2.2.2) exchg(2) len(92) ## 2016-05-21 18:55:36 : IKE<2.2.2.2> ****** Recv kernel msg IDX-1, TYPE-5 ****** ## 2016-05-21 18:55:36 : IKE<2.2.2.2> ****** Recv kernel msg IDX-1, TYPE-5 ****** ## 2016-05-21 18:55:36 : IKE<2.2.2.2> sa orig index<1>, peer_id<3>. ## 2016-05-21 18:55:36 : IKE<2.2.2.2> isadb_get_entry_by_peer_and_local_if_port_p2sa isadb get entry by peer/local ip and port ## 2016-05-21 18:55:36 : IKE<2.2.2.2> Added Phase 2 session tasks to the task list. ## 2016-05-21 18:55:37 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:55:37 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:55:37 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:55:37 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:55:37 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:55:37 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:55:37 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:55:37 : IKE<2.2.2.2> re-trans timer expired, msg retry (2) (80120f/2) ## 2016-05-21 18:55:37 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:55:37 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:55:39 : IKE<2.2.2.2> re-trans timer expired, msg retry (10) (80120f/2) ## 2016-05-21 18:55:39 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:55:39 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:55:41 : IKE<2.2.2.2> re-trans timer expired, msg retry (3) (80120f/2) ## 2016-05-21 18:55:41 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:55:41 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:55:43 : IKE<2.2.2.2> re-trans timer expired, msg retry (11) (80120f/2) ## 2016-05-21 18:55:43 : IKE<2.2.2.2> Phase 1: Retransmission limit has been reached. ## 2016-05-21 18:55:45 : IKE<2.2.2.2> re-trans timer expired, msg retry (4) (80120f/2) ## 2016-05-21 18:55:45 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:55:45 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:55:45 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:55:45 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:55:45 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:55:45 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:55:45 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:55:45 : IKE<2.2.2.2> Receive re-transmit IKE packet phase 1 SA(2.2.2.2) exchg(2) len(92) ## 2016-05-21 18:55:49 : IKE<2.2.2.2> re-trans timer expired, msg retry (5) (80120f/2) ## 2016-05-21 18:55:49 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:55:49 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:55:53 : IKE<2.2.2.2> re-trans timer expired, msg retry (6) (80120f/2) ## 2016-05-21 18:55:53 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:55:53 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:55:55 : IKE<2.2.2.2> ike packet, len 172, action 1 ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Catcher: received 144 bytes from socket. ## 2016-05-21 18:55:55 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Catcher: get 144 bytes. src port 500 ## 2016-05-21 18:55:55 : IKE<0.0.0.0 > ISAKMP msg: len 144, nxp 1[SA], exch 2[MM], flag 00 ## 2016-05-21 18:55:55 : IKE<2.2.2.2 > Recv : [SA] [VID] [VID] ## 2016-05-21 18:55:55 : IKE<2.2.2.2> found peer Dallas_VPN_Gateway ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Found peer entry (Dallas_VPN_Gateway) from 2.2.2.2. ## 2016-05-21 18:55:55 : responder create sa: 2.2.2.2->199.188.209.36 ## 2016-05-21 18:55:55 : init p1sa, pidt = 0x0 ## 2016-05-21 18:55:55 : change peer identity for p1 sa, pidt = 0x0 ## 2016-05-21 18:55:55 : IKE<0.0.0.0 > peer_identity_create_with_uid: uid<0> ## 2016-05-21 18:55:55 : IKE<0.0.0.0 > create peer identity 0x69910bc ## 2016-05-21 18:55:55 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry before add <3> ## 2016-05-21 18:55:55 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry after add <4> ## 2016-05-21 18:55:55 : peer identity 69910bc created. ## 2016-05-21 18:55:55 : IKE<0.0.0.0 > EDIPI disabled ## 2016-05-21 18:55:55 : IKE<2.2.2.2> getProfileFromP1Proposal-> ## 2016-05-21 18:55:55 : IKE<2.2.2.2> find profile[0]=<00000005 00000002 00000001 00000002> for p1 proposal (id 5), xauth(0) ## 2016-05-21 18:55:55 : IKE<2.2.2.2> responder create sa: 2.2.2.2->199.188.209.36 ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Phase 1: Responder starts MAIN mode negotiations. ## 2016-05-21 18:55:55 : IKE<2.2.2.2> MM in state OAK_MM_NO_STATE. ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Process [VID]: ## 2016-05-21 18:55:55 : IKE<2.2.2.2 > Vendor ID: ## 2016-05-21 18:55:55 : af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Process [VID]: ## 2016-05-21 18:55:55 : IKE<2.2.2.2 > Vendor ID: ## 2016-05-21 18:55:55 : 69 93 69 22 87 41 c6 d4 ca 09 4c 93 e2 42 c9 de ## 2016-05-21 18:55:55 : 19 e7 b7 c6 00 00 00 05 00 00 05 00 ## 2016-05-21 18:55:55 : IKE<2.2.2.2> peer is an NetScreen box, model=NetScreen-204, ver=5.00 ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Process [SA]: ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Proposal received: xauthflag 0 ## 2016-05-21 18:55:55 : IKE<2.2.2.2> auth(1), encr(5)<3DES>, hash(2), group(2) ## 2016-05-21 18:55:55 : IKE<2.2.2.2> xauth attribute: disabled ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Phase 1 proposal [0] selected. ## 2016-05-21 18:55:55 : IKE<2.2.2.2> SA Life Type = seconds ## 2016-05-21 18:55:55 : IKE<2.2.2.2> SA lifetime (TLV) = 28800 ## 2016-05-21 18:55:55 : IKE<2.2.2.2> DH_BG_consume OK. p1 resp ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Phase 1 MM Responder constructing 2nd message. ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Msg header built (next payload #1) ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Construct [SA] for ISAKMP ## 2016-05-21 18:55:55 : IKE<2.2.2.2> auth(1), encr(5)<3DES>, hash(2), group(2) ## 2016-05-21 18:55:55 : IKE<2.2.2.2> xauth attribute: disabled ## 2016-05-21 18:55:55 : IKE<2.2.2.2> lifetime/lifesize (28800/0) ## 2016-05-21 18:55:55 : IKE<0.0.0.0 > set_phase1_transform, dh_group(2). ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Construct NetScreen [VID] ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Construct custom [VID] ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Construct custom [VID] ## 2016-05-21 18:55:55 : IKE<2.2.2.2 > Xmit : [SA] [VID] [VID] [VID] ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Send Phase 1 packet (len=156) ## 2016-05-21 18:55:55 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<1/800203> ## 2016-05-21 18:55:55 : IKE<2.2.2.2> ike packet, len 208, action 0 ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Catcher: received 180 bytes from socket. ## 2016-05-21 18:55:55 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Catcher: get 180 bytes. src port 500 ## 2016-05-21 18:55:55 : IKE<0.0.0.0 > ISAKMP msg: len 180, nxp 4[KE], exch 2[MM], flag 00 ## 2016-05-21 18:55:55 : IKE<2.2.2.2 > Recv : [KE] [NONCE] ## 2016-05-21 18:55:55 : IKE<0.0.0.0 > extract payload (152): ## 2016-05-21 18:55:55 : IKE<2.2.2.2> MM in state OAK_MM_SA_SETUP. ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Process [KE]: ## 2016-05-21 18:55:55 : IKE<2.2.2.2> processing ISA_KE in phase 1. ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Phase1: his_DH_pub_len is 128 ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Process [NONCE]: ## 2016-05-21 18:55:55 : IKE<2.2.2.2> processing NONCE in phase 1. ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Phase 1 MM Responder constructing 4th message. ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Msg header built (next payload #4) ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Construct [KE] for ISAKMP ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Construct [NONCE] ## 2016-05-21 18:55:55 : IKE<2.2.2.2 > Xmit : [KE] [NONCE] ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:55:55 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<2/80220f> ## 2016-05-21 18:55:55 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:55:55 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:55:55 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:55:55 : IKE<2.2.2.2> gen_skeyid() ## 2016-05-21 18:55:55 : IKE<2.2.2.2> gen_skeyid: returning 0 ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Decrypting payload (length 64) ## 2016-05-21 18:55:55 : IKE<2.2.2.2 > Recv*: [ID] +++ Corrupted MSG ## 2016-05-21 18:55:55 : valid id checking, id type:IP Subnet, len:60209. ## 2016-05-21 18:55:55 : IKE<0.0.0.0 > Validate (64): bad 184 ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Packet is invalid! ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Pre-shared key might not match. ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Create conn entry... ## 2016-05-21 18:55:55 : IKE<2.2.2.2> ...done(new 74c1df7a) ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Msg header built (next payload #8) ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Construct [HASH] ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Construct [NOTIF]:(PAYLOAD-MALFORMED) ## 2016-05-21 18:55:55 : IKE<2.2.2.2> construct QM HASH ## 2016-05-21 18:55:55 : IKE<2.2.2.2 > Xmit*: [HASH] [NOTIF] ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Encrypt P2 payload (len 88) ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Send Phase 2 packet (len=92) ## 2016-05-21 18:55:55 : IKE<2.2.2.2> Delete conn entry... ## 2016-05-21 18:55:55 : IKE<2.2.2.2> ...found conn entry(74c1df7a) ## 2016-05-21 18:55:57 : IKE<2.2.2.2> re-trans timer expired, msg retry (7) (80120f/2) ## 2016-05-21 18:55:57 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:55:57 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:55:59 : IKE<2.2.2.2> re-trans timer expired, msg retry (0) (80120f/2) ## 2016-05-21 18:55:59 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:55:59 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:56:01 : IKE<2.2.2.2> re-trans timer expired, msg retry (8) (80120f/2) ## 2016-05-21 18:56:01 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:56:01 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:56:02 : reap_db. deleting p1sa 6997adc ## 2016-05-21 18:56:02 : terminate_SA: trying to delete SA cause: 0 cond: 2 ## 2016-05-21 18:56:02 : peer_identity_unregister_p1_sa. ## 2016-05-21 18:56:02 : IKE<0.0.0.0 > delete peer identity 0x69905ec ## 2016-05-21 18:56:02 : IKE<0.0.0.0 > peer_identity_remove_from_peer: num entry before remove <2> ## 2016-05-21 18:56:02 : peer_idt.c peer_identity_unregister_p1_sa 686: pidt deleted. ## 2016-05-21 18:56:02 : reap_db. deleting p1sa 69963a8 ## 2016-05-21 18:56:02 : terminate_SA: trying to delete SA cause: 0 cond: 2 ## 2016-05-21 18:56:02 : peer_identity_unregister_p1_sa. ## 2016-05-21 18:56:02 : IKE<0.0.0.0 > delete peer identity 0x698fb1c ## 2016-05-21 18:56:02 : IKE<0.0.0.0 > peer_identity_remove_from_peer: num entry before remove <2> ## 2016-05-21 18:56:02 : peer_idt.c peer_identity_unregister_p1_sa 686: pidt deleted. ## 2016-05-21 18:56:02 : reap_db. deleting p1sa 699c9c0 ## 2016-05-21 18:56:02 : terminate_SA: trying to delete SA cause: 0 cond: 2 ## 2016-05-21 18:56:02 : IKE<2.2.2.2> xauth_cleanup() ## 2016-05-21 18:56:02 : IKE<2.2.2.2> Done cleaning up IKE Phase 1 SA ## 2016-05-21 18:56:02 : peer_identity_unregister_p1_sa. ## 2016-05-21 18:56:02 : IKE<0.0.0.0 > delete peer identity 0x6991370 ## 2016-05-21 18:56:02 : IKE<0.0.0.0 > peer_identity_remove_from_peer: num entry before remove <4> ## 2016-05-21 18:56:02 : peer_idt.c peer_identity_unregister_p1_sa 686: pidt deleted. ## 2016-05-21 18:56:02 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:56:02 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:56:02 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:56:02 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:56:02 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:56:02 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:56:02 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:56:03 : IKE<2.2.2.2> re-trans timer expired, msg retry (1) (80120f/2) ## 2016-05-21 18:56:03 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:56:03 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:56:05 : IKE<2.2.2.2> re-trans timer expired, msg retry (9) (80120f/2) ## 2016-05-21 18:56:05 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:56:05 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:56:05 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:56:05 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:56:05 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:56:05 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:56:05 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:56:05 : IKE<2.2.2.2> Receive re-transmit IKE packet phase 1 SA(2.2.2.2) exchg(2) len(92) ## 2016-05-21 18:56:07 : IKE<2.2.2.2> re-trans timer expired, msg retry (2) (80120f/2) ## 2016-05-21 18:56:07 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:56:07 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:56:09 : IKE<2.2.2.2> re-trans timer expired, msg retry (10) (80120f/2) ## 2016-05-21 18:56:09 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:56:09 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:56:09 : getProfileFromP1Proposal-> ## 2016-05-21 18:56:09 : find profile[0]=<00000005 00000002 00000001 00000002> for p1 proposal (id 5), xauth(0) ## 2016-05-21 18:56:09 : init p1sa, pidt = 0x0 ## 2016-05-21 18:56:09 : change peer identity for p1 sa, pidt = 0x0 ## 2016-05-21 18:56:09 : IKE<0.0.0.0 > peer_identity_create_with_uid: uid<0> ## 2016-05-21 18:56:09 : IKE<0.0.0.0 > create peer identity 0x698fb1c ## 2016-05-21 18:56:09 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry before add <1> ## 2016-05-21 18:56:09 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry after add <2> ## 2016-05-21 18:56:09 : peer identity 698fb1c created. ## 2016-05-21 18:56:09 : IKE<0.0.0.0 > EDIPI disabled ## 2016-05-21 18:56:09 : IKE<0.0.0.0 > set_phase1_transform, dh_group(2). ## 2016-05-21 18:56:09 : IKE<2.2.2.2> ****** Recv kernel msg IDX-1, TYPE-5 ****** ## 2016-05-21 18:56:09 : IKE<2.2.2.2> ****** Recv kernel msg IDX-1, TYPE-5 ****** ## 2016-05-21 18:56:09 : IKE<2.2.2.2> sa orig index<1>, peer_id<3>. ## 2016-05-21 18:56:09 : IKE<2.2.2.2> isadb_get_entry_by_peer_and_local_if_port_p2sa isadb get entry by peer/local ip and port ## 2016-05-21 18:56:09 : IKE<2.2.2.2> Added Phase 2 session tasks to the task list. ## 2016-05-21 18:56:10 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 18:56:10 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:56:10 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:56:10 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:56:10 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 18:56:10 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 18:56:10 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 18:56:11 : IKE<2.2.2.2> re-trans timer expired, msg retry (3) (80120f/2) ## 2016-05-21 18:56:11 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:56:11 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:56:13 : IKE<2.2.2.2> re-trans timer expired, msg retry (11) (80120f/2) ## 2016-05-21 18:56:13 : IKE<2.2.2.2> Phase 1: Retransmission limit has been reached. ## 2016-05-21 18:56:15 : IKE<2.2.2.2> re-trans timer expired, msg retry (4) (80120f/2) ## 2016-05-21 18:56:15 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:56:15 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:56:15 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 18:56:15 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 18:56:15 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 18:56:15 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 18:56:15 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 18:56:15 : IKE<2.2.2.2> Receive re-transmit IKE packet phase 1 SA(2.2.2.2) exchg(2) len(92) ## 2016-05-21 18:56:19 : IKE<2.2.2.2> re-trans timer expired, msg retry (5) (80120f/2) ## 2016-05-21 18:56:19 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:56:19 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 18:56:23 : IKE<2.2.2.2> re-trans timer expired, msg retry (6) (80120f/2) ## 2016-05-21 18:56:23 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 18:56:23 : IKE<2.2.2.2> Send Phase 1 packet (len=196)