You probably don't want your st0 interface in your trust zone.
Because of your static route with next-hop of st0.0, traffic from your hosts in the trust zone will then be going from trust->trust zones, not from trust->untrust. You have your security policies set for trust->untrust.
I would recommend you put st0 in the untrust zone, or even in a new zone (which is what I do sometimes with route-based VPNs). You can put st0 in a "VPN" zone, then set your security policies from trust->VPN and vice versa. It helps separate VPN traffic going over the tunnel from non-VPN traffic. Keeps things cleaner in my opinion.
Also, you have your ike external interface set to reth0.0, but you put ge-0/0/0 into your untrust zone. Unless you have a cluster, you won't have any reth interfaces. If you do have a cluster, ge-0/0/0 becomes fxp0 and you can't use it anyway. Either way, you've got an issue. I suspect that you're not using a cluster, so your external interface for your ike config would be ge-0/0/0.0 and also you'll want to specify the unit number when you assign it to the untrust zone -- ge-0/0/0.0 rather than just ge-0/0/0.
When interoperating with ASA devices, proxy IDs have big teeth and tend to bite hard. I would recommend you manually set your proxy IDs on the SRX side in the ipsec vpn configuration to match exactly what's going to be matched by your "interesting traffic" ACLs on the ASA side.