12/10/31 10:41:12 ## : IKE Daemon, ver 2.1.7 12/10/31 10:41:12 ## : Copyright 2010 Shrew Soft Inc. 12/10/31 10:41:12 ## : This product linked OpenSSL 0.9.8h 28 May 2008 12/10/31 10:41:12 ii : opened 'C:\Program Files\VPN Client\debug\iked.log' 12/10/31 10:41:12 ii : opened 'C:\Program Files\VPN Client/debug/dump-ike-decrypt.cap' 12/10/31 10:41:12 ii : rebuilding vnet device list ... 12/10/31 10:41:12 ii : device ROOT\VNET\0000 disabled 12/10/31 10:41:12 ii : network process thread begin ... 12/10/31 10:41:12 ii : pfkey process thread begin ... 12/10/31 10:41:12 ii : ipc server process thread begin ... 12/10/31 10:41:23 ii : ipc client process thread begin ... 12/10/31 10:41:23 :500 12/10/31 10:41:23 DB : b496e6af73f427cd:0000000000000000 12/10/31 10:41:23 DB : phase1 added ( obj count = 1 ) 12/10/31 10:41:23 >> : security association payload 12/10/31 10:41:23 >> : - proposal #1 payload 12/10/31 10:41:23 >> : -- transform #1 payload 12/10/31 10:41:23 >> : -- transform #2 payload 12/10/31 10:41:23 >> : -- transform #3 payload 12/10/31 10:41:23 >> : -- transform #4 payload 12/10/31 10:41:23 >> : -- transform #5 payload 12/10/31 10:41:23 >> : -- transform #6 payload 12/10/31 10:41:23 >> : -- transform #7 payload 12/10/31 10:41:23 >> : -- transform #8 payload 12/10/31 10:41:23 >> : -- transform #9 payload 12/10/31 10:41:23 >> : -- transform #10 payload 12/10/31 10:41:23 >> : -- transform #11 payload 12/10/31 10:41:23 >> : -- transform #12 payload 12/10/31 10:41:23 >> : -- transform #13 payload 12/10/31 10:41:23 >> : -- transform #14 payload 12/10/31 10:41:23 >> : -- transform #15 payload 12/10/31 10:41:23 >> : -- transform #16 payload 12/10/31 10:41:23 >> : -- transform #17 payload 12/10/31 10:41:23 >> : -- transform #18 payload 12/10/31 10:41:23 >> : key exchange payload 12/10/31 10:41:23 >> : nonce payload 12/10/31 10:41:23 >> : identification payload 12/10/31 10:41:23 >> : vendor id payload 12/10/31 10:41:23 ii : local supports nat-t ( draft v00 ) 12/10/31 10:41:23 >> : vendor id payload 12/10/31 10:41:23 ii : local supports nat-t ( draft v01 ) 12/10/31 10:41:23 >> : vendor id payload 12/10/31 10:41:23 ii : local supports nat-t ( draft v02 ) 12/10/31 10:41:23 >> : vendor id payload 12/10/31 10:41:23 ii : local supports nat-t ( draft v03 ) 12/10/31 10:41:23 >> : vendor id payload 12/10/31 10:41:23 ii : local supports nat-t ( rfc ) 12/10/31 10:41:23 >> : vendor id payload 12/10/31 10:41:23 ii : local supports FRAGMENTATION 12/10/31 10:41:23 >> : vendor id payload 12/10/31 10:41:23 ii : local supports DPDv1 12/10/31 10:41:23 >> : vendor id payload 12/10/31 10:41:23 ii : local is SHREW SOFT compatible 12/10/31 10:41:23 >> : vendor id payload 12/10/31 10:41:23 ii : local is NETSCREEN compatible 12/10/31 10:41:23 >> : vendor id payload 12/10/31 10:41:23 ii : local is SIDEWINDER compatible 12/10/31 10:41:23 >> : vendor id payload 12/10/31 10:41:23 ii : local is CISCO UNITY compatible 12/10/31 10:41:23 >= : cookies b496e6af73f427cd:0000000000000000 12/10/31 10:41:23 >= : message 00000000 12/10/31 10:41:23 -> : send IKE packet 192.168.1.150:500 -> :500 ( 1179 bytes ) 12/10/31 10:41:23 DB : phase1 resend event scheduled ( ref count = 2 ) 12/10/31 10:41:24 <- : recv IKE packet :500 -> 192.168.1.150:500 ( 410 bytes ) 12/10/31 10:41:24 DB : phase1 found 12/10/31 10:41:24 ii : processing phase1 packet ( 410 bytes ) 12/10/31 10:41:24 =< : cookies b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:24 =< : message 00000000 12/10/31 10:41:24 << : security association payload 12/10/31 10:41:24 << : - propsal #1 payload 12/10/31 10:41:24 << : -- transform #14 payload 12/10/31 10:41:24 ii : unmatched isakmp proposal/transform 12/10/31 10:41:24 ii : cipher type ( 3des != aes ) 12/10/31 10:41:24 ii : unmatched isakmp proposal/transform 12/10/31 10:41:24 ii : cipher type ( 3des != aes ) 12/10/31 10:41:24 ii : unmatched isakmp proposal/transform 12/10/31 10:41:24 ii : cipher type ( 3des != aes ) 12/10/31 10:41:24 ii : unmatched isakmp proposal/transform 12/10/31 10:41:24 ii : cipher type ( 3des != aes ) 12/10/31 10:41:24 ii : unmatched isakmp proposal/transform 12/10/31 10:41:24 ii : cipher type ( 3des != aes ) 12/10/31 10:41:24 ii : unmatched isakmp proposal/transform 12/10/31 10:41:24 ii : cipher type ( 3des != aes ) 12/10/31 10:41:24 ii : unmatched isakmp proposal/transform 12/10/31 10:41:24 ii : cipher type ( 3des != blowfish ) 12/10/31 10:41:24 ii : unmatched isakmp proposal/transform 12/10/31 10:41:24 ii : cipher type ( 3des != blowfish ) 12/10/31 10:41:24 ii : unmatched isakmp proposal/transform 12/10/31 10:41:24 ii : cipher type ( 3des != blowfish ) 12/10/31 10:41:24 ii : unmatched isakmp proposal/transform 12/10/31 10:41:24 ii : cipher type ( 3des != blowfish ) 12/10/31 10:41:24 ii : unmatched isakmp proposal/transform 12/10/31 10:41:24 ii : cipher type ( 3des != blowfish ) 12/10/31 10:41:24 ii : unmatched isakmp proposal/transform 12/10/31 10:41:24 ii : cipher type ( 3des != blowfish ) 12/10/31 10:41:24 ii : unmatched isakmp proposal/transform 12/10/31 10:41:24 ii : hash type ( hmac-sha != hmac-md5 ) 12/10/31 10:41:24 ii : matched isakmp proposal #1 transform #14 12/10/31 10:41:24 ii : - transform = ike 12/10/31 10:41:24 ii : - cipher type = 3des 12/10/31 10:41:24 ii : - key length = default 12/10/31 10:41:24 ii : - hash type = sha1 12/10/31 10:41:24 ii : - dh group = modp-1024 12/10/31 10:41:24 ii : - auth type = psk 12/10/31 10:41:24 ii : - life seconds = 86400 12/10/31 10:41:24 ii : - life kbytes = 0 12/10/31 10:41:24 << : key exchange payload 12/10/31 10:41:24 << : nonce payload 12/10/31 10:41:24 << : identification payload 12/10/31 10:41:24 ii : phase1 id match 12/10/31 10:41:24 ii : received = fqdn srx_local1.com 12/10/31 10:41:24 << : hash payload 12/10/31 10:41:24 << : vendor id payload 12/10/31 10:41:24 ii : peer is CISCO UNITY compatible 12/10/31 10:41:24 << : vendor id payload 12/10/31 10:41:24 ii : peer is IPSEC-TOOLS compatible 12/10/31 10:41:24 << : vendor id payload 12/10/31 10:41:24 ii : peer supports nat-t ( rfc ) 12/10/31 10:41:24 << : nat discovery payload 12/10/31 10:41:24 << : nat discovery payload 12/10/31 10:41:24 << : vendor id payload 12/10/31 10:41:24 ii : peer supports DPDv1 12/10/31 10:41:24 ii : nat discovery - local address is translated 12/10/31 10:41:24 ii : nat discovery - remote address is translated 12/10/31 10:41:24 ii : switching to src nat-t udp port 4500 12/10/31 10:41:24 ii : switching to dst nat-t udp port 500 12/10/31 10:41:24 == : DH shared secret ( 128 bytes ) 12/10/31 10:41:24 == : SETKEYID ( 20 bytes ) 12/10/31 10:41:24 == : SETKEYID_d ( 20 bytes ) 12/10/31 10:41:24 == : SETKEYID_a ( 20 bytes ) 12/10/31 10:41:24 == : SETKEYID_e ( 20 bytes ) 12/10/31 10:41:24 == : cipher key ( 40 bytes ) 12/10/31 10:41:24 == : cipher iv ( 8 bytes ) 12/10/31 10:41:24 == : phase1 hash_i ( computed ) ( 20 bytes ) 12/10/31 10:41:24 >> : hash payload 12/10/31 10:41:24 >> : nat discovery payload 12/10/31 10:41:24 >> : nat discovery payload 12/10/31 10:41:24 >= : cookies b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:24 >= : message 00000000 12/10/31 10:41:24 >= : encrypt iv ( 8 bytes ) 12/10/31 10:41:24 == : encrypt packet ( 100 bytes ) 12/10/31 10:41:24 == : stored iv ( 8 bytes ) 12/10/31 10:41:24 DB : phase1 resend event canceled ( ref count = 1 ) 12/10/31 10:41:24 -> : send NAT-T:IKE packet 192.168.1.150:4500 -> :500 ( 132 bytes ) 12/10/31 10:41:24 == : phase1 hash_r ( computed ) ( 20 bytes ) 12/10/31 10:41:24 == : phase1 hash_r ( received ) ( 20 bytes ) 12/10/31 10:41:24 ii : phase1 sa established 12/10/31 10:41:24 ii : :500 <-> 192.168.1.150:4500 12/10/31 10:41:24 ii : b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:24 ii : sending peer INITIAL-CONTACT notification 12/10/31 10:41:24 ii : - 192.168.1.150:4500 -> :500 12/10/31 10:41:24 ii : - isakmp spi = b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:24 ii : - data size 0 12/10/31 10:41:24 >> : hash payload 12/10/31 10:41:24 >> : notification payload 12/10/31 10:41:24 == : new informational hash ( 20 bytes ) 12/10/31 10:41:24 == : new informational iv ( 8 bytes ) 12/10/31 10:41:24 >= : cookies b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:24 >= : message 911bf921 12/10/31 10:41:24 >= : encrypt iv ( 8 bytes ) 12/10/31 10:41:24 == : encrypt packet ( 80 bytes ) 12/10/31 10:41:24 == : stored iv ( 8 bytes ) 12/10/31 10:41:24 -> : send NAT-T:IKE packet 192.168.1.150:4500 -> :500 ( 116 bytes ) 12/10/31 10:41:24 DB : config added ( obj count = 1 ) 12/10/31 10:41:24 ii : configuration method is manual 12/10/31 10:41:24 DB : phase2 not found 12/10/31 10:41:24 ii : generating IPSEC security policies at UNIQUE level 12/10/31 10:41:24 ii : creating NONE INBOUND policy ANY::* -> ANY:192.168.1.150:* 12/10/31 10:41:24 DB : policy added ( obj count = 1 ) 12/10/31 10:41:24 K> : send pfkey X_SPDADD UNSPEC message 12/10/31 10:41:24 K< : recv pfkey X_SPDADD UNSPEC message 12/10/31 10:41:24 DB : policy found 12/10/31 10:41:24 ii : creating NONE OUTBOUND policy ANY:192.168.1.150:* -> ANY::* 12/10/31 10:41:24 ii : created NONE policy route for /32 12/10/31 10:41:24 DB : policy added ( obj count = 2 ) 12/10/31 10:41:24 K> : send pfkey X_SPDADD UNSPEC message 12/10/31 10:41:24 K< : recv pfkey X_SPDADD UNSPEC message 12/10/31 10:41:24 DB : policy found 12/10/31 10:41:24 ii : creating NONE INBOUND policy ANY:192.168.1.1:* -> ANY:192.168.1.150:* 12/10/31 10:41:24 DB : policy added ( obj count = 3 ) 12/10/31 10:41:24 K> : send pfkey X_SPDADD UNSPEC message 12/10/31 10:41:24 ii : creating NONE OUTBOUND policy ANY:192.168.1.150:* -> ANY:192.168.1.1:* 12/10/31 10:41:24 K< : recv pfkey X_SPDADD UNSPEC message 12/10/31 10:41:24 DB : policy found 12/10/31 10:41:24 ii : created NONE policy route for 192.168.1.1/32 12/10/31 10:41:24 DB : policy added ( obj count = 4 ) 12/10/31 10:41:24 K> : send pfkey X_SPDADD UNSPEC message 12/10/31 10:41:24 ii : creating IPSEC INBOUND policy ANY:192.168.2.0/24:* -> ANY:192.168.1.150:* 12/10/31 10:41:24 DB : policy added ( obj count = 5 ) 12/10/31 10:41:24 K> : send pfkey X_SPDADD UNSPEC message 12/10/31 10:41:24 ii : creating IPSEC OUTBOUND policy ANY:192.168.1.150:* -> ANY:192.168.2.0/24:* 12/10/31 10:41:24 K< : recv pfkey X_SPDADD UNSPEC message 12/10/31 10:41:24 DB : policy found 12/10/31 10:41:24 K< : recv pfkey X_SPDADD UNSPEC message 12/10/31 10:41:24 DB : policy found 12/10/31 10:41:24 ii : created IPSEC policy route for 192.168.2.0/24 12/10/31 10:41:24 DB : policy added ( obj count = 6 ) 12/10/31 10:41:24 K> : send pfkey X_SPDADD UNSPEC message 12/10/31 10:41:24 ii : split DNS is disabled 12/10/31 10:41:24 K< : recv pfkey X_SPDADD UNSPEC message 12/10/31 10:41:24 DB : policy found 12/10/31 10:41:24 ii : calling init phase2 for initial policy 12/10/31 10:41:24 DB : policy found 12/10/31 10:41:24 DB : policy found 12/10/31 10:41:24 DB : tunnel found 12/10/31 10:41:24 DB : new phase2 ( IPSEC initiator ) 12/10/31 10:41:24 DB : phase2 added ( obj count = 1 ) 12/10/31 10:41:24 K> : send pfkey GETSPI ESP message 12/10/31 10:41:24 K< : recv pfkey GETSPI ESP message 12/10/31 10:41:24 DB : phase2 found 12/10/31 10:41:24 ii : updated spi for 1 ipsec-esp proposal 12/10/31 10:41:24 DB : phase1 found 12/10/31 10:41:24 >> : hash payload 12/10/31 10:41:24 >> : security association payload 12/10/31 10:41:24 >> : - proposal #1 payload 12/10/31 10:41:24 >> : -- transform #1 payload 12/10/31 10:41:24 >> : -- transform #2 payload 12/10/31 10:41:24 >> : -- transform #3 payload 12/10/31 10:41:24 >> : -- transform #4 payload 12/10/31 10:41:24 >> : -- transform #5 payload 12/10/31 10:41:24 >> : -- transform #6 payload 12/10/31 10:41:24 >> : -- transform #7 payload 12/10/31 10:41:24 >> : -- transform #8 payload 12/10/31 10:41:24 >> : -- transform #9 payload 12/10/31 10:41:24 >> : -- transform #10 payload 12/10/31 10:41:24 >> : -- transform #11 payload 12/10/31 10:41:24 >> : -- transform #12 payload 12/10/31 10:41:24 >> : -- transform #13 payload 12/10/31 10:41:24 >> : -- transform #14 payload 12/10/31 10:41:24 >> : -- transform #15 payload 12/10/31 10:41:24 >> : -- transform #16 payload 12/10/31 10:41:24 >> : -- transform #17 payload 12/10/31 10:41:24 >> : -- transform #18 payload 12/10/31 10:41:24 >> : nonce payload 12/10/31 10:41:24 >> : identification payload 12/10/31 10:41:24 >> : identification payload 12/10/31 10:41:24 == : phase2 hash_i ( input ) ( 632 bytes ) 12/10/31 10:41:24 == : phase2 hash_i ( computed ) ( 20 bytes ) 12/10/31 10:41:24 == : new phase2 iv ( 8 bytes ) 12/10/31 10:41:24 >= : cookies b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:24 >= : message 3beb6f53 12/10/31 10:41:24 >= : encrypt iv ( 8 bytes ) 12/10/31 10:41:24 == : encrypt packet ( 680 bytes ) 12/10/31 10:41:24 == : stored iv ( 8 bytes ) 12/10/31 10:41:24 -> : send NAT-T:IKE packet 192.168.1.150:4500 -> :500 ( 716 bytes ) 12/10/31 10:41:24 DB : phase2 resend event scheduled ( ref count = 2 ) 12/10/31 10:41:24 <- : recv NAT-T:IKE packet :500 -> 192.168.1.150:4500 ( 84 bytes ) 12/10/31 10:41:24 DB : phase1 found 12/10/31 10:41:24 ii : processing informational packet ( 84 bytes ) 12/10/31 10:41:24 == : new informational iv ( 8 bytes ) 12/10/31 10:41:24 =< : cookies b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:24 =< : message f94f5564 12/10/31 10:41:24 =< : decrypt iv ( 8 bytes ) 12/10/31 10:41:24 == : decrypt packet ( 84 bytes ) 12/10/31 10:41:24 <= : trimmed packet padding ( 4 bytes ) 12/10/31 10:41:24 <= : stored iv ( 8 bytes ) 12/10/31 10:41:24 << : hash payload 12/10/31 10:41:24 << : notification payload 12/10/31 10:41:24 == : informational hash_i ( computed ) ( 20 bytes ) 12/10/31 10:41:24 == : informational hash_c ( received ) ( 20 bytes ) 12/10/31 10:41:24 ii : informational hash verified 12/10/31 10:41:24 ii : received peer INITIAL-CONTACT notification 12/10/31 10:41:24 ii : - :500 -> 192.168.1.150:4500 12/10/31 10:41:24 ii : - isakmp spi = b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:24 ii : - data size 0 12/10/31 10:41:25 <- : recv NAT-T:IKE packet :500 -> 192.168.1.150:4500 ( 156 bytes ) 12/10/31 10:41:25 DB : phase1 found 12/10/31 10:41:25 ii : processing phase2 packet ( 156 bytes ) 12/10/31 10:41:25 DB : phase2 found 12/10/31 10:41:25 =< : cookies b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:25 =< : message 3beb6f53 12/10/31 10:41:25 =< : decrypt iv ( 8 bytes ) 12/10/31 10:41:25 == : decrypt packet ( 156 bytes ) 12/10/31 10:41:25 <= : trimmed packet padding ( 4 bytes ) 12/10/31 10:41:25 <= : stored iv ( 8 bytes ) 12/10/31 10:41:25 << : hash payload 12/10/31 10:41:25 << : security association payload 12/10/31 10:41:25 << : - propsal #1 payload 12/10/31 10:41:25 << : -- transform #14 payload 12/10/31 10:41:25 << : nonce payload 12/10/31 10:41:25 << : identification payload 12/10/31 10:41:25 << : identification payload 12/10/31 10:41:25 == : phase2 hash_r ( input ) ( 124 bytes ) 12/10/31 10:41:25 == : phase2 hash_r ( computed ) ( 20 bytes ) 12/10/31 10:41:25 == : phase2 hash_r ( received ) ( 20 bytes ) 12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform 12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-aes ) 12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform 12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-aes ) 12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform 12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-aes ) 12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform 12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-aes ) 12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform 12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-aes ) 12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform 12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-aes ) 12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform 12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-blowfish ) 12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform 12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-blowfish ) 12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform 12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-blowfish ) 12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform 12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-blowfish ) 12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform 12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-blowfish ) 12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform 12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-blowfish ) 12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform 12/10/31 10:41:25 ii : msg auth ( hmac-sha != hmac-md5 ) 12/10/31 10:41:25 ii : matched ipsec-esp proposal #1 transform #14 12/10/31 10:41:25 ii : - transform = esp-3des 12/10/31 10:41:25 ii : - key length = default 12/10/31 10:41:25 ii : - encap mode = udp-tunnel ( rfc ) 12/10/31 10:41:25 ii : - msg auth = hmac-sha 12/10/31 10:41:25 ii : - pfs dh group = none 12/10/31 10:41:25 ii : - life seconds = 3600 12/10/31 10:41:25 ii : - life kbytes = 0 12/10/31 10:41:25 DB : policy found 12/10/31 10:41:25 K> : send pfkey GETSPI ESP message 12/10/31 10:41:25 ii : phase2 ids accepted 12/10/31 10:41:25 ii : - loc ANY:192.168.1.150:* -> ANY:192.168.2.0/24:* 12/10/31 10:41:25 ii : - rmt ANY:192.168.2.0/24:* -> ANY:192.168.1.150:* 12/10/31 10:41:25 ii : phase2 sa established 12/10/31 10:41:25 ii : 192.168.1.150:4500 <-> :500 12/10/31 10:41:25 == : phase2 hash_p ( input ) ( 41 bytes ) 12/10/31 10:41:25 == : phase2 hash_p ( computed ) ( 20 bytes ) 12/10/31 10:41:25 >> : hash payload 12/10/31 10:41:25 >= : cookies b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:25 >= : message 3beb6f53 12/10/31 10:41:25 >= : encrypt iv ( 8 bytes ) 12/10/31 10:41:25 == : encrypt packet ( 52 bytes ) 12/10/31 10:41:25 K< : recv pfkey GETSPI ESP message 12/10/31 10:41:25 == : stored iv ( 8 bytes ) 12/10/31 10:41:25 DB : phase2 found 12/10/31 10:41:25 DB : phase2 resend event canceled ( ref count = 2 ) 12/10/31 10:41:25 -> : send NAT-T:IKE packet 192.168.1.150:4500 -> :500 ( 84 bytes ) 12/10/31 10:41:25 == : spi cipher key data ( 24 bytes ) 12/10/31 10:41:25 == : spi hmac key data ( 20 bytes ) 12/10/31 10:41:25 K> : send pfkey UPDATE ESP message 12/10/31 10:41:25 == : spi cipher key data ( 24 bytes ) 12/10/31 10:41:25 == : spi hmac key data ( 20 bytes ) 12/10/31 10:41:25 K> : send pfkey UPDATE ESP message 12/10/31 10:41:25 K< : recv pfkey UPDATE ESP message 12/10/31 10:41:25 K< : recv pfkey UPDATE ESP message 12/10/31 10:41:39 DB : phase1 found 12/10/31 10:41:39 ii : sending peer DPDV1-R-U-THERE notification 12/10/31 10:41:39 ii : - 192.168.1.150:4500 -> :500 12/10/31 10:41:39 ii : - isakmp spi = b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:39 ii : - data size 4 12/10/31 10:41:39 >> : hash payload 12/10/31 10:41:39 >> : notification payload 12/10/31 10:41:39 == : new informational hash ( 20 bytes ) 12/10/31 10:41:39 == : new informational iv ( 8 bytes ) 12/10/31 10:41:39 >= : cookies b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:39 >= : message 1f844efa 12/10/31 10:41:39 >= : encrypt iv ( 8 bytes ) 12/10/31 10:41:39 == : encrypt packet ( 84 bytes ) 12/10/31 10:41:39 == : stored iv ( 8 bytes ) 12/10/31 10:41:39 -> : send NAT-T:IKE packet 192.168.1.150:4500 -> :500 ( 116 bytes ) 12/10/31 10:41:39 ii : DPD ARE-YOU-THERE sequence 05024ba0 requested 12/10/31 10:41:39 DB : phase1 found 12/10/31 10:41:39 -> : send NAT-T:KEEP-ALIVE packet 192.168.1.150:4500 -> :500 12/10/31 10:41:39 <- : recv NAT-T:IKE packet :500 -> 192.168.1.150:4500 ( 92 bytes ) 12/10/31 10:41:39 DB : phase1 found 12/10/31 10:41:39 ii : processing informational packet ( 92 bytes ) 12/10/31 10:41:39 == : new informational iv ( 8 bytes ) 12/10/31 10:41:39 =< : cookies b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:39 =< : message 9e503a50 12/10/31 10:41:39 =< : decrypt iv ( 8 bytes ) 12/10/31 10:41:39 == : decrypt packet ( 92 bytes ) 12/10/31 10:41:39 <= : trimmed packet padding ( 8 bytes ) 12/10/31 10:41:39 <= : stored iv ( 8 bytes ) 12/10/31 10:41:39 << : hash payload 12/10/31 10:41:39 << : notification payload 12/10/31 10:41:39 == : informational hash_i ( computed ) ( 20 bytes ) 12/10/31 10:41:39 == : informational hash_c ( received ) ( 20 bytes ) 12/10/31 10:41:39 ii : informational hash verified 12/10/31 10:41:39 ii : received peer DPDV1-R-U-THERE-ACK notification 12/10/31 10:41:39 ii : - :500 -> 192.168.1.150:4500 12/10/31 10:41:39 ii : - isakmp spi = b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:39 ii : - data size 4 12/10/31 10:41:39 ii : DPD ARE-YOU-THERE-ACK sequence 05024ba0 accepted 12/10/31 10:41:39 ii : next tunnel DPD request in 15 secs for peer :500 12/10/31 10:41:54 DB : phase1 found 12/10/31 10:41:54 -> : send NAT-T:KEEP-ALIVE packet 192.168.1.150:4500 -> :500 12/10/31 10:41:54 DB : phase1 found 12/10/31 10:41:54 ii : sending peer DPDV1-R-U-THERE notification 12/10/31 10:41:54 ii : - 192.168.1.150:4500 -> :500 12/10/31 10:41:54 ii : - isakmp spi = b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:54 ii : - data size 4 12/10/31 10:41:54 >> : hash payload 12/10/31 10:41:54 >> : notification payload 12/10/31 10:41:54 == : new informational hash ( 20 bytes ) 12/10/31 10:41:54 == : new informational iv ( 8 bytes ) 12/10/31 10:41:54 >= : cookies b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:54 >= : message 91dd2913 12/10/31 10:41:54 >= : encrypt iv ( 8 bytes ) 12/10/31 10:41:54 == : encrypt packet ( 84 bytes ) 12/10/31 10:41:54 == : stored iv ( 8 bytes ) 12/10/31 10:41:54 -> : send NAT-T:IKE packet 192.168.1.150:4500 -> :500 ( 116 bytes ) 12/10/31 10:41:54 ii : DPD ARE-YOU-THERE sequence 05024ba1 requested 12/10/31 10:41:54 <- : recv NAT-T:IKE packet :500 -> 192.168.1.150:4500 ( 92 bytes ) 12/10/31 10:41:54 DB : phase1 found 12/10/31 10:41:54 ii : processing informational packet ( 92 bytes ) 12/10/31 10:41:54 == : new informational iv ( 8 bytes ) 12/10/31 10:41:54 =< : cookies b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:54 =< : message c3de8db9 12/10/31 10:41:54 =< : decrypt iv ( 8 bytes ) 12/10/31 10:41:54 == : decrypt packet ( 92 bytes ) 12/10/31 10:41:54 <= : trimmed packet padding ( 8 bytes ) 12/10/31 10:41:54 <= : stored iv ( 8 bytes ) 12/10/31 10:41:54 << : hash payload 12/10/31 10:41:54 << : notification payload 12/10/31 10:41:54 == : informational hash_i ( computed ) ( 20 bytes ) 12/10/31 10:41:54 == : informational hash_c ( received ) ( 20 bytes ) 12/10/31 10:41:54 ii : informational hash verified 12/10/31 10:41:54 ii : received peer DPDV1-R-U-THERE-ACK notification 12/10/31 10:41:54 ii : - :500 -> 192.168.1.150:4500 12/10/31 10:41:54 ii : - isakmp spi = b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:54 ii : - data size 4 12/10/31 10:41:54 ii : DPD ARE-YOU-THERE-ACK sequence 05024ba1 accepted 12/10/31 10:41:54 ii : next tunnel DPD request in 15 secs for peer :500 12/10/31 10:42:09 DB : phase1 found 12/10/31 10:42:09 -> : send NAT-T:KEEP-ALIVE packet 192.168.1.150:4500 -> :500 12/10/31 10:42:09 DB : phase1 found 12/10/31 10:42:09 ii : sending peer DPDV1-R-U-THERE notification 12/10/31 10:42:09 ii : - 192.168.1.150:4500 -> :500 12/10/31 10:42:09 ii : - isakmp spi = b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:42:09 ii : - data size 4 12/10/31 10:42:09 >> : hash payload 12/10/31 10:42:09 >> : notification payload 12/10/31 10:42:09 == : new informational hash ( 20 bytes ) 12/10/31 10:42:09 == : new informational iv ( 8 bytes ) 12/10/31 10:42:09 >= : cookies b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:42:09 >= : message 0c25fb25 12/10/31 10:42:09 >= : encrypt iv ( 8 bytes ) 12/10/31 10:42:09 == : encrypt packet ( 84 bytes ) 12/10/31 10:42:09 == : stored iv ( 8 bytes ) 12/10/31 10:42:09 -> : send NAT-T:IKE packet 192.168.1.150:4500 -> :500 ( 116 bytes ) 12/10/31 10:42:09 ii : DPD ARE-YOU-THERE sequence 05024ba2 requested 12/10/31 10:42:10 <- : recv NAT-T:IKE packet :500 -> 192.168.1.150:4500 ( 92 bytes ) 12/10/31 10:42:10 DB : phase1 found 12/10/31 10:42:10 ii : processing informational packet ( 92 bytes ) 12/10/31 10:42:10 == : new informational iv ( 8 bytes ) 12/10/31 10:42:10 =< : cookies b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:42:10 =< : message 8ab7c85d 12/10/31 10:42:10 =< : decrypt iv ( 8 bytes ) 12/10/31 10:42:10 == : decrypt packet ( 92 bytes ) 12/10/31 10:42:10 <= : trimmed packet padding ( 8 bytes ) 12/10/31 10:42:10 <= : stored iv ( 8 bytes ) 12/10/31 10:42:10 << : hash payload 12/10/31 10:42:10 << : notification payload 12/10/31 10:42:10 == : informational hash_i ( computed ) ( 20 bytes ) 12/10/31 10:42:10 == : informational hash_c ( received ) ( 20 bytes ) 12/10/31 10:42:10 ii : informational hash verified 12/10/31 10:42:10 ii : received peer DPDV1-R-U-THERE-ACK notification 12/10/31 10:42:10 ii : - :500 -> 192.168.1.150:4500 12/10/31 10:42:10 ii : - isakmp spi = b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:42:10 ii : - data size 4 12/10/31 10:42:10 ii : DPD ARE-YOU-THERE-ACK sequence 05024ba2 accepted 12/10/31 10:42:10 ii : next tunnel DPD request in 15 secs for peer :500