Hello

We have a linux box with libreswan 3.32 and kernel 4.1.12-112.14.10.el6uek.x86_64 (Oracle Linux 6) terminating a number of IPsec site-to-site tunnels with our customers.

The problem tunnel configuration is typical for us, customer side uses a Mikrotik router. Public IP's are masked as A.B.C.D our and E.F.G.H customer's

conn customer
        type=tunnel
        auto=ondemand
        authby=secret
        left=A.B.C.D
        leftsubnet=172.16.80.0/20
        right=E.F.G.H
        rightsubnets=10.50.1.8/29,10.50.2.8/29
        ikev2=yes
        ikelifetime=8h
        ike=aes256-sha2;modp2048

        phase2=esp
        salifetime=1h
        pfs=yes
        encapsulation=no
        rekey=yes
        rekeymargin=5m
        keyingtries=3

        fragmentation=yes
        dpddelay=30
        dpdtimeout=120
        dpdaction=restart

Sometimes there is a situation when first sub-tunnel to 10.50.1.8/29 is up and works correctly but the second to 10.50.2.8/29 is not going up while intersting traffic come in. Our side does not try to initiate corresponding ESP SA up, there is no any IKE traffic to customer side at that time. So we have access to one customer's network but not to another. In some cases the problem disappears after some hours, probably after parent SA rekey. Or we need to terminate/initiate the tunnel manually

The status in the problem state:

$ sudo ipsec auto --status |grep customer
000 "customer/0x1": 172.16.80.0/20===A.B.C.D<A.B.C.D>...E.F.G.H<E.F.G.H>===10.50.1.8/29; erouted; eroute owner: #33751 000 "customer/0x1": oriented; my_ip=unset; their_ip=unset; my_updown=ipsec _updown; 000 "customer/0x1": xauth us:none, xauth them:none, my_username=[any]; their_username=[any]
000 "customer/0x1":   our auth:secret, their auth:secret
000 "customer/0x1": modecfg info: us:none, them:none, modecfg policy:push, dns:unset, domains:unset, banner:unset, cat:unset;
000 "customer/0x1":   policy_label:unset;
000 "customer/0x1": ike_life: 28800s; ipsec_life: 3600s; replay_window: 32; rekey_margin: 300s; rekey_fuzz: 100%; keyingtries: 3;
000 "customer/0x1":   retransmit-interval: 500ms; retransmit-timeout: 60s;
000 "customer/0x1": initial-contact:no; cisco-unity:no; fake-strongswan:no; send-vendorid:no; send-no-esp-tfc:no; 000 "customer/0x1": policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO;
000 "customer/0x1":   v2-auth-hash-policy: none;
000 "customer/0x1": conn_prio: 20,29; interface: bond0.5; metric: 0; mtu: unset; sa_prio:auto; sa_tfc:none; 000 "customer/0x1": nflog-group: unset; mark: unset; vti-iface:unset; vti-routing:no; vti-shared:no; nic-offload:auto; 000 "customer/0x1": our idtype: ID_IPV4_ADDR; our id=A.B.C.D; their idtype: ID_IPV4_ADDR; their id=E.F.G.H 000 "customer/0x1": dpd: action:restart; delay:30; timeout:120; nat-t: encaps:no; nat_keepalive:yes; ikev1_natt:both
000 "customer/0x1":   newest ISAKMP SA: #33417; newest IPsec SA: #33751;
000 "customer/0x1":   aliases: customer
000 "customer/0x1":   IKE algorithms: AES_CBC_256-HMAC_SHA2_256-MODP2048
000 "customer/0x1": IKEv2 algorithm newest: AES_CBC_256-HMAC_SHA2_256-MODP2048 000 "customer/0x1": ESP algorithm newest: AES_CBC_256-HMAC_SHA2_256_128; pfsgroup=<Phase1> 000 "customer/0x2": 172.16.80.0/20===A.B.C.D<A.B.C.D>...E.F.G.H<E.F.G.H>===10.50.2.8/29; prospective erouted; eroute owner: #0 000 "customer/0x2": oriented; my_ip=unset; their_ip=unset; my_updown=ipsec _updown; 000 "customer/0x2": xauth us:none, xauth them:none, my_username=[any]; their_username=[any]
000 "customer/0x2":   our auth:secret, their auth:secret
000 "customer/0x2": modecfg info: us:none, them:none, modecfg policy:push, dns:unset, domains:unset, banner:unset, cat:unset;
000 "customer/0x2":   policy_label:unset;
000 "customer/0x2": ike_life: 28800s; ipsec_life: 3600s; replay_window: 32; rekey_margin: 300s; rekey_fuzz: 100%; keyingtries: 3;
000 "customer/0x2":   retransmit-interval: 500ms; retransmit-timeout: 60s;
000 "customer/0x2": initial-contact:no; cisco-unity:no; fake-strongswan:no; send-vendorid:no; send-no-esp-tfc:no; 000 "customer/0x2": policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO;
000 "customer/0x2":   v2-auth-hash-policy: none;
000 "customer/0x2": conn_prio: 20,29; interface: bond0.5; metric: 0; mtu: unset; sa_prio:auto; sa_tfc:none; 000 "customer/0x2": nflog-group: unset; mark: unset; vti-iface:unset; vti-routing:no; vti-shared:no; nic-offload:auto; 000 "customer/0x2": our idtype: ID_IPV4_ADDR; our id=A.B.C.D; their idtype: ID_IPV4_ADDR; their id=E.F.G.H 000 "customer/0x2": dpd: action:restart; delay:30; timeout:120; nat-t: encaps:no; nat_keepalive:yes; ikev1_natt:both
000 "customer/0x2":   newest ISAKMP SA: #0; newest IPsec SA: #0;
000 "customer/0x2":   aliases: customer
000 "customer/0x2":   IKE algorithms: AES_CBC_256-HMAC_SHA2_256-MODP2048
000 #33417: "customer/0x1":500 STATE_PARENT_I3 (PARENT SA established); EVENT_SA_REKEY in 16654s; newest ISAKMP; idle; 000 #33751: "customer/0x1":500 STATE_V2_IPSEC_R (IPsec SA established); EVENT_SA_REKEY in 3414s; newest IPSEC; eroute owner; isakmp#33417; idle; 000 #33751: "customer/0x1" esp.9d603d4@E.F.G.H esp.232cb42f@A.B.C.D tun.0@E.F.G.H tun.0@A.B.C.D ref=0 refhim=0 Traffic: ESPin=0B ESPout=0B! ESPmax=0B

I began to ping 10.50.2.11 from 172.16.80.160 at 10:35:56 and took a debug log, fragment is attached.

What can be a diagnose tactics?

--
Regards, Ivan Kuznetsov
SOVLO ltd
Dec 22 10:35:56.152809: |  kernel_process_msg_cb process netlink message
Dec 22 10:35:56.152870: | netlink_get: XFRM_MSG_ACQUIRE message
Dec 22 10:35:56.152875: | xfrm netlink msg len 376
Dec 22 10:35:56.152878: | xfrm acquire rtattribute type 5
Dec 22 10:35:56.152881: | xfrm template attribute with reqid:0, spi:0, proto:50
Dec 22 10:35:56.152884: | xfrm acquire rtattribute type 16
Dec 22 10:35:56.152891: | subnet from endpoint 172.16.85.160:8 (in 
netlink_acquire() at kernel_xfrm.c:1822)
Dec 22 10:35:56.152895: | subnet from address 10.50.2.11 (in netlink_acquire() 
at kernel_xfrm.c:1823)
Dec 22 10:35:56.152900: | subnet from endpoint 172.16.85.160:8 (in 
has_bare_hold() at kernel.c:1265)
Dec 22 10:35:56.152904: | subnet from address 10.50.2.11 (in has_bare_hold() at 
kernel.c:1266)
Dec 22 10:35:56.152915: | add bare shunt 0xd20b50 172.16.85.160/32:8 --1--> 
10.50.2.11/32:0 => %hold 0    %acquire-netlink
Dec 22 10:35:56.152922: initiate on demand from 172.16.85.160:8 to 10.50.2.11:0 
proto=1 because: acquire
Dec 22 10:35:56.152929: | find_connection: looking for policy for connection: 
172.16.85.160:1/8 -> 10.50.2.11:1/0
Dec 22 10:35:56.152932: | FOR_EACH_CONNECTION_... in find_connection_for_clients
Dec 22 10:35:56.152953: | find_connection: conn "customer/0x2" has compatible 
peers: 172.16.80.0/20:0 -> 10.50.2.8/29:0 [pri: 21030922]
Dec 22 10:35:56.152957: | find_connection: first OK "customer/0x2" 
[pri:21030922]{0xccd690} (child none)
Dec 22 10:35:56.152966: | find_connection: concluding with "customer/0x2" 
[pri:21030922]{0xccd690} kind=CK_PERMANENT
Dec 22 10:35:56.152970: | assign hold, routing was prospective erouted, needs 
to be erouted HOLD
Dec 22 10:35:56.152973: | assign_holdpass() need broad(er) shunt
Dec 22 10:35:56.152977: | priority calculation of connection "customer/0x2" is 
0x1fd7c4
Dec 22 10:35:56.152983: | eroute_connection replace %trap with broad %pass or 
%hold eroute 172.16.80.0/20:0 --0-> 10.50.2.8/29:0 => %hold>%hold using reqid 0 
(raw_eroute)
Dec 22 10:35:56.152989: | netlink_raw_eroute: SPI_HOLD implemented as no-op
Dec 22 10:35:56.152993: | raw_eroute result=success
Dec 22 10:35:56.152995: | assign_holdpass() eroute_connection() done
Dec 22 10:35:56.152999: | fiddle_bare_shunt called
Dec 22 10:35:56.153003: | subnet from endpoint 172.16.85.160:8 (in 
fiddle_bare_shunt() at kernel.c:1344)
Dec 22 10:35:56.153006: | subnet from address 10.50.2.11 (in 
fiddle_bare_shunt() at kernel.c:1345)
Dec 22 10:35:56.153010: | fiddle_bare_shunt with transport_proto 1
Dec 22 10:35:56.153013: | removing specific host-to-host bare shunt
Dec 22 10:35:56.153019: | delete narrow %hold eroute 172.16.85.160/32:8 --1-> 
10.50.2.11/32:0 => %hold using reqid 0 (raw_eroute)
Dec 22 10:35:56.153022: | netlink_raw_eroute: SPI_PASS
Dec 22 10:35:56.153033: | raw_eroute result=success
Dec 22 10:35:56.153037: | raw_eroute with op='delete' for transport_proto='1' 
kernel shunt succeeded, bare shunt lookup succeeded
Dec 22 10:35:56.153043: | delete bare shunt 0xd20b50 172.16.85.160/32:8 --1--> 
10.50.2.11/32:0 => %hold 0    %acquire-netlink
Dec 22 10:35:56.153047: assign_holdpass() delete_bare_shunt() failed
Dec 22 10:35:56.153050: initiate_ondemand_body() failed to install 
negotiation_shunt,
Dec 22 10:35:56.153053: | FOR_EACH_STATE_... in find_phase1_state
Dec 22 10:35:56.153069: | FOR_EACH_STATE_... in find_pending_phase2
Dec 22 10:35:56.153085: | addref fd@NULL (in new_state() at state.c:555)
Dec 22 10:35:56.153089: | creating state object #33787 at 0xe00c00
Dec 22 10:35:56.153093: | State DB: adding IKEv2 state #33787 in UNDEFINED
Dec 22 10:35:56.153098: | serialno list: inserting #33787 
(nil)<-0xe01470->(nil) into list HEAD 0xf18610<-0x798e40->0xe0aa10
Dec 22 10:35:56.153102: | serialno list: inserted  #33787 
0xf18610<-0xe01470->0x798e40 into list HEAD 0xe01470<-0x798e40->0xe0aa10
Dec 22 10:35:56.153106: | st_serialno table: inserting #33787 
(nil)<-0xe01490->(nil) into list HEAD 0xd16be0<-0x77f560->0xd16be0
Dec 22 10:35:56.153110: | st_serialno table: inserted  #33787 
0xd16be0<-0xe01490->0x77f560 into list HEAD 0xe01490<-0x77f560->0xd16be0
Dec 22 10:35:56.153114: | st_connection table: inserting #33787 
(nil)<-0xe014b0->(nil) into list HEAD 0x7812c0<-0x7812c0->0x7812c0
Dec 22 10:35:56.153117: | st_connection table: inserted  #33787 
0x7812c0<-0xe014b0->0x7812c0 into list HEAD 0xe014b0<-0x7812c0->0xe014b0
Dec 22 10:35:56.153121: | st_reqid table: inserting #33787 
(nil)<-0xe014d0->(nil) into list HEAD 0xf18670<-0x785120->0xe0aa70
Dec 22 10:35:56.153125: | st_reqid table: inserted  #33787 
0xf18670<-0xe014d0->0x785120 into list HEAD 0xe014d0<-0x785120->0xe0aa70
Dec 22 10:35:56.153132: | IKE SPI[ir] table: inserting #33787: d2 f4 27 1f  2e 
33 24 99  5f 65 35 39  75 07 61 a3 (nil)<-0xe014f0->(nil) into list HEAD 
0xd0f740<-0x78a0a0->0xf52070
Dec 22 10:35:56.153139: | IKE SPI[ir] table: inserted  #33787: d2 f4 27 1f  2e 
33 24 99  5f 65 35 39  75 07 61 a3 0xd0f740<-0xe014f0->0x78a0a0 into list HEAD 
0xe014f0<-0x78a0a0->0xf52070
Dec 22 10:35:56.153144: | IKE SPIi table: inserting #33787: d2 f4 27 1f  2e 33 
24 99 (nil)<-0xe01510->(nil) into list HEAD 0xd0f760<-0x78d7e0->0xf52090
Dec 22 10:35:56.153149: | IKE SPIi table: inserted  #33787: d2 f4 27 1f  2e 33 
24 99 0xd0f760<-0xe01510->0x78d7e0 into list HEAD 0xe01510<-0x78d7e0->0xf52090
Dec 22 10:35:56.153152: | pstats #33787 ikev2.child started
Dec 22 10:35:56.153156: | duplicating state object #33417 "customer/0x1" as 
#33787 for IPSEC SA
Dec 22 10:35:56.153160: | st_connection table: removing #33787 
0x7812c0<-0xe014b0->0x7812c0
Dec 22 10:35:56.153163: | st_connection table: empty
Dec 22 10:35:56.153177: | st_connection table: inserting #33787 
(nil)<-0xe014b0->(nil) into list HEAD 0xd0f700<-0x784120->0xf52030
Dec 22 10:35:56.153181: | st_connection table: inserted  #33787 
0xd0f700<-0xe014b0->0x784120 into list HEAD 0xe014b0<-0x784120->0xf52030
Dec 22 10:35:56.153186: | #33787 setting local endpoint to A.B.C.D:500 from 
#33417.st_localport (in duplicate_state() at state.c:1548)
Dec 22 10:35:56.153195: | Message ID: CHILD #33417.#33787 initializing (CHILD 
SA): ike.initiator.sent=397 ike.initiator.recv=175 ike.responder.sent=125 
ike.responder.recv=125 child.wip.initiator=0->-1 child.wip.responder=0->-1
Dec 22 10:35:56.153198: | st_connection table: removing #33787 
0xd0f700<-0xe014b0->0x784120
Dec 22 10:35:56.153202: | st_connection table: updated older #33751 
0xf52030<-0xd0f700->0x784120
Dec 22 10:35:56.153205: | st_connection table: updated newer  HEAD 
0xd0f700<-0x784120->0xf52030
Dec 22 10:35:56.153209: | st_connection table: inserting #33787 
(nil)<-0xe014b0->(nil) into list HEAD 0x785080<-0x785080->0x785080
Dec 22 10:35:56.153213: | st_connection table: inserted  #33787 
0x785080<-0xe014b0->0x785080 into list HEAD 0xe014b0<-0x785080->0xe014b0
Dec 22 10:35:56.153216: | in connection_discard for connection customer/0x1
Dec 22 10:35:56.153221: | start processing: state #33787 connection 
"customer/0x2" from E.F.G.H:500 (in ikev2_initiate_child_sa() at 
ikev2_parent.c:5825)
Dec 22 10:35:56.153226: | child state #33787: UNDEFINED(ignore) => 
V2_CREATE_I0(established IKE SA)
Dec 22 10:35:56.153237: | using existing local ESP/AH proposals for 
customer/0x2 (ESP/AH initiator emitting proposals): 
1:ESP=AES_GCM_C_256-NONE-MODP2048-DISABLED 
2:ESP=AES_GCM_C_128-NONE-MODP2048-DISABLED 
3:ESP=AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128-MODP2048-DISABLED 
4:ESP=AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128-MODP2048-DISABLED
Dec 22 10:35:56.153247: | #33787 schedule initiate IPsec SA 
PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO using IKE# 
33417 pfs=MODP2048
Dec 22 10:35:56.153251: | event_schedule: newref 
EVENT_v2_INITIATE_CHILD-pe@0xd48df0
Dec 22 10:35:56.153255: | inserting event EVENT_v2_INITIATE_CHILD, timeout in 0 
seconds for #33787
Dec 22 10:35:56.153259: | libevent_malloc: newref ptr-libevent@0xe64b10 size 136
Dec 22 10:35:56.153266: | RESET processing: state #33787 connection 
"customer/0x2" from E.F.G.H:500 (in ikev2_initiate_child_sa() at 
ikev2_parent.c:5923)
Dec 22 10:35:56.153271: | initiate on demand using RSASIG from 172.16.85.160 to 
10.50.2.11
Dec 22 10:35:56.153279: | spent 0.41 milliseconds in kernel message
Dec 22 10:35:56.153286: | timer_event_cb: processing event@0xd48df0
Dec 22 10:35:56.153290: | handling event EVENT_v2_INITIATE_CHILD for child 
state #33787
Dec 22 10:35:56.153295: | start processing: state #33787 connection 
"customer/0x2" from E.F.G.H:500 (in timer_event_cb() at timer.c:250)
Dec 22 10:35:56.153301: | adding Child Initiator KE and nonce ni work-order 
57429 for state #33787
Dec 22 10:35:56.153305: | event_schedule: newref 
EVENT_CRYPTO_TIMEOUT-pe@0xe2fda0
Dec 22 10:35:56.153308: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 
seconds for #33787
Dec 22 10:35:56.153311: | libevent_malloc: newref ptr-libevent@0xd0e820 size 136
Dec 22 10:35:56.153316: | backlog: inserting work-order 57429 state #33787 
(nil)<-0xf5e0a0->(nil) into list HEAD 0x79dc20<-0x79dc20->0x79dc20
Dec 22 10:35:56.153320: | backlog: inserted  work-order 57429 state #33787 
0x79dc20<-0xf5e0a0->0x79dc20 into list HEAD 0xf5e0a0<-0x79dc20->0xf5e0a0
Dec 22 10:35:56.153328: | libevent_free: delref ptr-libevent@0xe64b10
Dec 22 10:35:56.153331: | free_event_entry: delref 
EVENT_v2_INITIATE_CHILD-pe@0xd48df0
Dec 22 10:35:56.153336: | #33787 spent 0.0492 milliseconds in timer_event_cb() 
EVENT_v2_INITIATE_CHILD
Dec 22 10:35:56.153341: | stop processing: state #33787 connection 
"customer/0x2" from E.F.G.H:500 (in timer_event_cb() at timer.c:557)
Dec 22 10:35:56.153345: | crypto helper 1 resuming
Dec 22 10:35:56.153360: | backlog: removing work-order 57429 state #33787 
0x79dc20<-0xf5e0a0->0x79dc20
Dec 22 10:35:56.153363: | backlog: empty
Dec 22 10:35:56.153368: | crypto helper 1 starting work-order 57429 for state 
#33787
Dec 22 10:35:56.153372: | crypto helper 1 doing build KE and nonce (Child 
Initiator KE and nonce ni); request ID 57429
Dec 22 10:35:56.154110: | crypto helper 1 finished build KE and nonce (Child 
Initiator KE and nonce ni); request ID 57429 time elapsed 0.000738 seconds
Dec 22 10:35:56.154119: | (#33787) spent 0.745 milliseconds in crypto helper 
computing work-order 57429: Child Initiator KE and nonce ni (pcr)
Dec 22 10:35:56.154123: | crypto helper 1 sending results from work-order 57429 
for state #33787 to event queue
Dec 22 10:35:56.154126: | scheduling resume sending helper answer for #33787
Dec 22 10:35:56.154130: | libevent_malloc: newref ptr-libevent@0x7f5a5404a040 
size 136
Dec 22 10:35:56.154138: | crypto helper 1 waiting (nothing to do)
Dec 22 10:35:56.154186: | processing resume sending helper answer for #33787
Dec 22 10:35:56.154200: | start processing: state #33787 connection 
"customer/0x2" from E.F.G.H:500 (in resume_handler() at server.c:817)
Dec 22 10:35:56.154205: | unsuspending #33787 MD (nil)
Dec 22 10:35:56.154209: | crypto helper 1 replies to request ID 57429
Dec 22 10:35:56.154212: | calling continuation function 0x4aae90
Dec 22 10:35:56.154215: | ikev2_child_outI_continue() for #33787 
STATE_V2_CREATE_I0
Dec 22 10:35:56.154221: | adding CHILD SA #33787 to IKE SA #33417 message 
initiator queue
Dec 22 10:35:56.154225: | state #33787 requesting EVENT_CRYPTO_TIMEOUT to be 
deleted
Dec 22 10:35:56.154229: | libevent_free: delref ptr-libevent@0xd0e820
Dec 22 10:35:56.154232: | free_event_entry: delref 
EVENT_CRYPTO_TIMEOUT-pe@0xe2fda0
Dec 22 10:35:56.154235: | event_schedule: newref EVENT_SA_REPLACE-pe@0xe2fda0
Dec 22 10:35:56.154239: | inserting event EVENT_SA_REPLACE, timeout in 200 
seconds for #33787
Dec 22 10:35:56.154247: | libevent_malloc: newref ptr-libevent@0xf522c0 size 136
Dec 22 10:35:56.154253: | Message ID: CHILD #33417.#LOST next initiator blocked 
by outstanding response (unack 222): ike.initiator.sent=397 
ike.initiator.recv=175 ike.responder.sent=125 ike.responder.recv=125
Dec 22 10:35:56.154257: | MD.ST contains the CHILD SA #33787
Dec 22 10:35:56.154262: | [RE]START processing: state #33787 connection 
"customer/0x2" from E.F.G.H:500 (in complete_v2_state_transition() at 
ikev2.c:3235)
Dec 22 10:35:56.154266: | #33787 complete_v2_state_transition() V2_CREATE_I0 -> 
V2_CREATE_I with status STF_SUSPEND
Dec 22 10:35:56.154270: | suspending state #33787 and saving MD 0xf08040
Dec 22 10:35:56.154273: | #33787 is busy; has suspended MD 0xf08040
Dec 22 10:35:56.154277: | [RE]START processing: state #33787 connection 
"customer/0x2" from E.F.G.H:500 (in log_stf_suspend() at ikev2.c:3030)
Dec 22 10:35:56.154281: | "customer/0x2" #33787 complete v2 state 
STATE_V2_CREATE_I0 transition with STF_SUSPEND suspended from 
complete_v2_state_transition:3313
Dec 22 10:35:56.154285: | resume sending helper answer for #33787 suppresed 
complete_v2_state_transition()
Dec 22 10:35:56.154290: | #33787 spent 0.0839 milliseconds in resume sending 
helper answer
Dec 22 10:35:56.154295: | stop processing: state #33787 connection 
"customer/0x2" from E.F.G.H:500 (in resume_handler() at server.c:860)
Dec 22 10:35:56.154298: | libevent_free: delref ptr-libevent@0x7f5a5404a040
Dec 22 10:36:05.114632: | timer_event_cb: processing event@0xf04500
Dec 22 10:36:05.114675: | handling event EVENT_v2_LIVENESS for child state 
#33751
Dec 22 10:36:05.114696: | start processing: state #33751 connection 
"customer/0x1" from E.F.G.H:500 (in timer_event_cb() at timer.c:250)
Dec 22 10:36:05.114713: | [RE]START processing: state #33751 connection 
"customer/0x1" from E.F.G.H:500 (in liveness_check() at timer.c:113)
Dec 22 10:36:05.114733: | get_sa_info esp.232cb42f@A.B.C.D
Dec 22 10:36:05.114770: | #33751 liveness_check - last_liveness: 
21827561.686895, now: 21827619.411601 parent #33417
Dec 22 10:36:05.114783: | Opening output PBS liveness probe informational 
request
Dec 22 10:36:05.114794: | **emit ISAKMP Message:
Dec 22 10:36:05.114807: |    initiator cookie: d2 f4 27 1f  2e 33 24 99
Dec 22 10:36:05.114820: |    responder cookie: 5f 65 35 39  75 07 61 a3
Dec 22 10:36:05.114829: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Dec 22 10:36:05.114838: |    ISAKMP version: IKEv2 version 2.0 
(rfc4306/rfc5996) (0x20)
Dec 22 10:36:05.114848: |    exchange type: ISAKMP_v2_INFORMATIONAL (0x25)
Dec 22 10:36:05.114858: |    flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
Dec 22 10:36:05.114869: |    Message ID: 398 (00 00 01 8e)
Dec 22 10:36:05.114879: | next payload chain: saving message location 'ISAKMP 
Message'.'next payload type'
Dec 22 10:36:05.114906: | ***emit IKEv2 Encryption Payload:
Dec 22 10:36:05.114916: |    next payload type: ISAKMP_NEXT_v2NONE (0x0)
Dec 22 10:36:05.114925: |    flags: none (0x0)
Dec 22 10:36:05.114936: | next payload chain: setting previous 'ISAKMP 
Message'.'next payload type' to current IKEv2 Encryption Payload 
(46:ISAKMP_NEXT_v2SK)
Dec 22 10:36:05.114945: | next payload chain: saving location 'IKEv2 Encryption 
Payload'.'next payload type' in 'liveness probe informational request'
Dec 22 10:36:05.114956: | emitting 16 zero bytes of IV into IKEv2 Encryption 
Payload
Dec 22 10:36:05.114984: | adding 16 bytes of padding (including 1 byte 
padding-length)
Dec 22 10:36:05.114995: | emitting 1 0x00 repeated bytes of padding and length 
into IKEv2 Encryption Payload
Dec 22 10:36:05.115004: | emitting 1 0x01 repeated bytes of padding and length 
into IKEv2 Encryption Payload
Dec 22 10:36:05.115013: | emitting 1 0x02 repeated bytes of padding and length 
into IKEv2 Encryption Payload
Dec 22 10:36:05.115022: | emitting 1 0x03 repeated bytes of padding and length 
into IKEv2 Encryption Payload
Dec 22 10:36:05.115031: | emitting 1 0x04 repeated bytes of padding and length 
into IKEv2 Encryption Payload
Dec 22 10:36:05.115040: | emitting 1 0x05 repeated bytes of padding and length 
into IKEv2 Encryption Payload
Dec 22 10:36:05.115049: | emitting 1 0x06 repeated bytes of padding and length 
into IKEv2 Encryption Payload
Dec 22 10:36:05.115058: | emitting 1 0x07 repeated bytes of padding and length 
into IKEv2 Encryption Payload
Dec 22 10:36:05.115067: | emitting 1 0x08 repeated bytes of padding and length 
into IKEv2 Encryption Payload
Dec 22 10:36:05.115076: | emitting 1 0x09 repeated bytes of padding and length 
into IKEv2 Encryption Payload
Dec 22 10:36:05.115085: | emitting 1 0x0a repeated bytes of padding and length 
into IKEv2 Encryption Payload
Dec 22 10:36:05.115094: | emitting 1 0x0b repeated bytes of padding and length 
into IKEv2 Encryption Payload
Dec 22 10:36:05.115103: | emitting 1 0x0c repeated bytes of padding and length 
into IKEv2 Encryption Payload
Dec 22 10:36:05.115112: | emitting 1 0x0d repeated bytes of padding and length 
into IKEv2 Encryption Payload
Dec 22 10:36:05.115121: | emitting 1 0x0e repeated bytes of padding and length 
into IKEv2 Encryption Payload
Dec 22 10:36:05.115130: | emitting 1 0x0f repeated bytes of padding and length 
into IKEv2 Encryption Payload
Dec 22 10:36:05.115140: | emitting 16 zero bytes of length of truncated 
HMAC/KEY into IKEv2 Encryption Payload
Dec 22 10:36:05.115149: | emitting length of IKEv2 Encryption Payload: 52
Dec 22 10:36:05.115157: | emitting length of ISAKMP Message: 80
Dec 22 10:36:05.115271: | sending 80 bytes for liveness probe informational 
request through bond0.5 from A.B.C.D:500 to E.F.G.H:500 (using #33751)
Dec 22 10:36:05.115282: |   d2 f4 27 1f  2e 33 24 99  5f 65 35 39  75 07 61 a3
Dec 22 10:36:05.115288: |   2e 20 25 08  00 00 01 8e  00 00 00 50  00 00 00 34
Dec 22 10:36:05.115294: |   ad bd 88 41  f4 61 20 77  b0 2d d1 fd  67 d2 d9 c7
Dec 22 10:36:05.115300: |   89 9c 40 e2  e3 b4 2c d6  20 16 c5 cc  be 83 45 31
Dec 22 10:36:05.115306: |   5e cd a8 24  63 b0 26 9f  b7 df ed 47  d4 98 cc 47
Dec 22 10:36:05.115348: | Message ID: CHILD #33417.#33751 XXX: in 
ikev2_send_livenss_probe() hacking around record'n'send bypassing send queue: 
ike.initiator.sent=397 ike.initiator.recv=175 ike.responder.sent=125 
ike.responder.recv=125 child.wip.initiator=-1 child.wip.responder=-1
Dec 22 10:36:05.115361: | Message ID: IKE #33417 XXX: expecting 
sender.wip.initiator 397 == -1 - suspect record'n'send out-of-order?): 
ike.initiator.sent=398 ike.initiator.recv=175 ike.responder.sent=125 
ike.responder.recv=125 ike.wip.initiator=398 ike.wip.responder=-1
Dec 22 10:36:05.115371: | Message ID: IKE #33417 updating initiator sent 
message request 398: ike.initiator.sent=397->398 ike.initiator.recv=175 
ike.responder.sent=125 ike.responder.recv=125 ike.wip.initiator=397->398 
ike.wip.responder=-1
Dec 22 10:36:05.115379: | #33751 liveness_check - peer E.F.G.H is missing - 
giving them some time to come back
Dec 22 10:36:05.115403: | #33751 liveness_check - peer E.F.G.H is ok schedule 
new
Dec 22 10:36:05.115412: | event_schedule: newref EVENT_v2_LIVENESS-pe@0xdf4da0
Dec 22 10:36:05.115419: | inserting event EVENT_v2_LIVENESS, timeout in 30 
seconds for #33751
Dec 22 10:36:05.115427: | libevent_malloc: newref ptr-libevent@0xd0b670 size 136
Dec 22 10:36:05.115437: | libevent_free: delref ptr-libevent@0xe15720
Dec 22 10:36:05.115444: | free_event_entry: delref EVENT_v2_LIVENESS-pe@0xf04500
Dec 22 10:36:05.115458: | #33751 spent 0.829 milliseconds in timer_event_cb() 
EVENT_v2_LIVENESS
Dec 22 10:36:05.115469: | stop processing: state #33751 connection 
"customer/0x1" from E.F.G.H:500 (in timer_event_cb() at timer.c:557)
_______________________________________________
Swan mailing list
Swan@lists.libreswan.org
https://lists.libreswan.org/mailman/listinfo/swan

Reply via email to