Hi! I'm trying to setup StrongSwan (oh, the pain...) to iked(8) IPsec. When trying to bring up the connection from the Linux end (ipsec up <connection>), the iked(8) at the OpenBSD (5.3-stable) endpoint segfaults. I'm trying to use certs and public keys for authentication for this host-to-host ESP tunnel connection. For the life of me I can not get a coredump from the ikev2 program, but attaching gdb to its PID won't give me a bt either because it can't seem to load the symbol table. I've recompiled iked from sources with CFLAGS=-g and without stripping, but still, no luck.
The network looks like this: [ Linux StrongSwan ] <--> [ NAT gw <remote_ip> ]O--Internetz--O[ <firefly_ip> ] | | `========================== IPsec IKEv2 ======================' Here is the output of iked -dvv from the start until the sig11. I'm sorry about the "anonimization", if it confuses the reader I'll gladly elaborate. # /sbin/iked -dvv firefly_ip = "<firefly_ip>" remote_ip = "<remote_ip>" /etc/iked.conf: loaded 1 configuration rules ca_reload: loaded ca file ecentrum_cacert.pem ca_reload: /O=eCentrum/OU=eCentrum Root CA/emailAddress=leva [at] ecentrum.hu/L=Szekesfehervar/ST=Fejer/C=HU/CN=... ca_reload: loaded 1 ca certificate ca_reload: loaded cert file ipsec_firefly_cert.pem ca_validate_cert: /C=HU/ST=Fejer/O=eCentrum/OU=IPsec IKEv2/CN=<firefly_host>/subjectAltName=<firefly_ip> ok config_getpolicy: received policy ikev2 "test-ikev2" passive esp inet from <firefly_ip> to <remote_ip> local <firefly_ip> peer <remote_ip> ikesa enc aes-256,aes-192,aes-128,3des prf hmac-sha2-256,hmac-sha1,hmac-md5 auth hmac-sha2-256,hmac-sha1,hmac-md5 group modp2048-256,modp2048,modp1536,modp1024 childsa enc aes-256,aes-192,aes-128 auth hmac-sha2-256,hmac-sha1 lifetime 10800 bytes 536870912 rsa config_getpfkey: received pfkey fd 4 config_getcompile: compilation done config_getsocket: received socket fd 11 config_getsocket: received socket fd 12 ikev2_dispatch_cert: updated local CERTREQ signatures length 20 config_getsocket: received socket fd 14 config_getsocket: received socket fd 20 ikev2_recv: INFORMATIONAL from initiator <remote_ip>:4761 to <firefly_ip>:4500 policy 'test-ikev2' id 2, 76 bytes ikev2_recv: ispi 0x0943538bae4b0ba0 rspi 0xea2c1a40848ed222 ikev2_recv: IKE_SA_INIT from initiator <remote_ip>:443 to <firefly_ip>:500 policy 'test-ikev2' id 0, 660 bytes ikev2_recv: ispi 0x12412ae4e06726b8 rspi 0x0000000000000000 ikev2_policy2id: srcid FQDN/<firefly_host> length 23 ikev2_pld_parse: header ispi 0x12412ae4e06726b8 rspi 0x0000000000000000 nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x08 msgid 0 length 660 response 0 ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 276 ikev2_pld_sa: more 2 reserved 0 length 44 proposal #1 protoid IKE spisize 0 xforms 4 spi 0 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96 ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1 ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048 ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 264 ikev2_pld_ke: dh group MODP_2048 reserved 0 ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 36 ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28 ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP ikev2_nat_detection: peer source 0x12412ae4e06726b8 0x0000000000000000 <remote_ip>:443 ikev2_pld_notify: NAT_DETECTION_SOURCE_IP detected NAT, enabling UDP encapsulation ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00 length 28 ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP ikev2_nat_detection: peer destination 0x12412ae4e06726b8 0x0000000000000000 <firefly_ip>:500 sa_state: INIT -> SA_INIT ikev2_sa_negotiate: score 16 sa_stateok: SA_INIT flags 0x00, require 0x00 sa_stateflags: 0x00 -> 0x08 sa (required 0x00 ) ikev2_sa_keys: SKEYSEED with 20 bytes ikev2_sa_keys: S with 80 bytes ikev2_prfplus: T1 with 20 bytes ikev2_prfplus: T2 with 20 bytes ikev2_prfplus: T3 with 20 bytes ikev2_prfplus: T4 with 20 bytes ikev2_prfplus: T5 with 20 bytes ikev2_prfplus: T6 with 20 bytes ikev2_prfplus: T7 with 20 bytes ikev2_prfplus: Tn with 140 bytes ikev2_sa_keys: SK_d with 20 bytes ikev2_sa_keys: SK_ai with 20 bytes ikev2_sa_keys: SK_ar with 20 bytes ikev2_sa_keys: SK_ei with 16 bytes ikev2_sa_keys: SK_er with 16 bytes ikev2_sa_keys: SK_pi with 20 bytes ikev2_sa_keys: SK_pr with 20 bytes ikev2_add_proposals: length 44 ikev2_next_payload: length 48 nextpayload KE ikev2_next_payload: length 264 nextpayload NONCE ikev2_next_payload: length 36 nextpayload NOTIFY ikev2_nat_detection: local source 0x12412ae4e06726b8 0xe5db467165bf35cb <firefly_ip>:500 ikev2_next_payload: length 28 nextpayload NOTIFY ikev2_nat_detection: local destination 0x12412ae4e06726b8 0xe5db467165bf35cb <remote_ip>:443 ikev2_next_payload: length 28 nextpayload CERTREQ ikev2_next_payload: length 25 nextpayload NONE ikev2_pld_parse: header ispi 0x12412ae4e06726b8 rspi 0xe5db467165bf35cb nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x20 msgid 0 length 457 response 1 ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 48 ikev2_pld_sa: more 0 reserved 0 length 44 proposal #1 protoid IKE spisize 0 xforms 4 spi 0 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96 ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048 ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 264 ikev2_pld_ke: dh group MODP_2048 reserved 0 ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 36 ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28 ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP ikev2_pld_payloads: payload NOTIFY nextpayload CERTREQ critical 0x00 length 28 ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP ikev2_pld_payloads: payload CERTREQ nextpayload NONE critical 0x00 length 25 ikev2_pld_certreq: type X509_CERT signatures length 20 ikev2_msg_send: IKE_SA_INIT from <firefly_ip>:500 to <remote_ip>:443, 457 bytes config_free_proposals: free 0x8659ad40 ikev2_recv: IKE_AUTH from initiator <remote_ip>:4761 to <firefly_ip>:4500 policy 'test-ikev2' id 1, 1516 bytes ikev2_recv: ispi 0x12412ae4e06726b8 rspi 0xe5db467165bf35cb ikev2_recv: updated SA to peer <remote_ip>:4761 local <firefly_ip>:4500 ikev2_pld_parse: header ispi 0x12412ae4e06726b8 rspi 0xe5db467165bf35cb nextpayload SK version 0x20 exchange IKE_AUTH flags 0x08 msgid 1 length 1516 response 0 ikev2_pld_payloads: payload SK nextpayload IDi critical 0x00 length 1488 ikev2_msg_decrypt: IV length 16 ikev2_msg_decrypt: encrypted payload length 1456 ikev2_msg_decrypt: integrity checksum length 12 ikev2_msg_decrypt: integrity check succeeded ikev2_msg_decrypt: decrypted payload length 1456/1456 padding 16 ikev2_pld_payloads: decrypted payload IDi nextpayload CERT critical 0x00 length 22 ikev2_pld_id: id FQDN/<remote_host> length 18 ikev2_pld_payloads: decrypted payload CERT nextpayload CERTREQ critical 0x00 length 853 ikev2_pld_cert: type X509_CERT length 848 ikev2_pld_payloads: decrypted payload CERTREQ nextpayload IDr critical 0x00 length 25 ikev2_pld_certreq: type X509_CERT signatures length 20 ikev2_policy2id: srcid FQDN/<firefly_host> length 23 ikev2_pld_payloads: decrypted payload IDr nextpayload AUTH critical 0x00 length 27 ikev2_pld_id: id FQDN/<firefly_host> length 23 ikev2_pld_id: unexpected id payload ikev2_pld_payloads: decrypted payload AUTH nextpayload SA critical 0x00 length 264 ikev2_pld_auth: method RSA_SIG length 256 sa_state: SA_INIT -> AUTH_REQUEST ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00 length 180 ikev2_pld_sa: more 2 reserved 0 length 40 proposal #1 protoid ESP spisize 4 xforms 3 spi 0xc5eb9108 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96 ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length 24 ikev2_pld_ts: count 1 length 16 ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 ikev2_pld_ts: start <internal_ip> end <internal_ip> ikev2_pld_payloads: decrypted payload TSr nextpayload NOTIFY critical 0x00 length 24 ikev2_pld_ts: count 1 length 16 ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 ikev2_pld_ts: start <firefly_ip> end <firefly_ip> ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NOTIFY critical 0x00 length 8 ikev2_pld_notify: protoid NONE spisize 0 type MOBIKE_SUPPORTED ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NONE critical 0x00 length 12 ikev2_pld_notify: protoid NONE spisize 0 type ADDITIONAL_IP4_ADDRESS ikev2_resp_recv: NAT-T message received, updated SA sa_stateok: SA_INIT flags 0x00, require 0x00 ikev2_msg_auth: responder auth data length 509 ca_setauth: auth length 509 ikev2_msg_auth: initiator auth data length 712 ikev2_msg_authverify: method RSA_SIG keylen 848 type X509_CERT ikev2_msg_authverify: authentication successful sa_state: AUTH_REQUEST -> AUTH_SUCCESS ikev2_sa_negotiate: score 13 sa_stateflags: 0x08 -> 0x08 sa (required 0x0f cert,valid,auth,sa) config_free_proposals: free 0x8659a000 ca_getreq: found CA /O=eCentrum/OU=eCentrum Root CA/emailAddress=leva [at] ecentrum.hu/L=Szekesfehervar/ST=Fejer/C=HU/CN=... ca_x509_subjectaltname: FQDN/<firefly_host> ca_getreq: found local certificate /C=HU/ST=Fejer/O=eCentrum/OU=IPsec IKEv2/CN=<firefly_host>/subjectAltName=<firefly_ip> ca_setauth: auth length 256 ca_validate_pubkey: looking up fqdn/<remote_host> ca_x509_subjectaltname: FQDN/<remote_host> ca_validate_cert: /C=HU/ST=Pest/O=eCentrum/OU=IPsec IKEv2/CN=<remote_host>/subjectAltName=<remote_ip> ok ikev2_getimsgdata: imsg 18 rspi 0xe5db467165bf35cb ispi 0x12412ae4e06726b8 initiator 0 sa valid type 4 data length 859 ikev2_dispatch_cert: cert type 4 length 859 sa_stateflags: 0x08 -> 0x09 cert,sa (required 0x0f cert,valid,auth,sa) ikev2_getimsgdata: imsg 21 rspi 0xe5db467165bf35cb ispi 0x12412ae4e06726b8 initiator 0 sa valid type 1 data length 256 ikev2_dispatch_cert: AUTH type 1 len 256 sa_stateflags: 0x09 -> 0x0d cert,auth,sa (required 0x0f cert,valid,auth,sa) ikev2_dispatch_cert: peer certificate is valid sa_stateflags: 0x0d -> 0x0f cert,valid,auth,sa (required 0x0f cert,valid,auth,sa) sa_state: AUTH_SUCCESS -> VALID sa_stateok: VALID flags 0x0f, require 0x0f cert,valid,auth,sa sa_stateok: VALID flags 0x0f, require 0x0f cert,valid,auth,sa ikev2_sa_tag: (0) ikev2_childsa_negotiate: proposal 1 ikev2_childsa_negotiate: key material length 72 ikev2_prfplus: T1 with 20 bytes ikev2_prfplus: T2 with 20 bytes ikev2_prfplus: T3 with 20 bytes ikev2_prfplus: T4 with 20 bytes ikev2_prfplus: Tn with 80 bytes pfkey_sa_getspi: spi 0xfa48f5b7 pfkey_sa_init: new spi 0xfa48f5b7 sa_stateok: VALID flags 0x0f, require 0x0f cert,valid,auth,sa ikev2_next_payload: length 27 nextpayload CERT ikev2_next_payload: length 864 nextpayload AUTH ikev2_next_payload: length 264 nextpayload SA ikev2_add_proposals: length 40 ikev2_next_payload: length 44 nextpayload TSi ikev2_next_payload: length 24 nextpayload TSr ikev2_next_payload: length 24 nextpayload NONE ikev2_msg_encrypt: decrypted length 1247 ikev2_msg_encrypt: padded length 1248 ikev2_msg_encrypt: length 1248, padding 0, output length 1276 ikev2_next_payload: length 1280 nextpayload IDr ikev2_msg_integr: message length 1308 ikev2_msg_integr: integrity checksum length 12 ikev2_pld_parse: header ispi 0x12412ae4e06726b8 rspi 0xe5db467165bf35cb nextpayload SK version 0x20 exchange IKE_AUTH flags 0x20 msgid 1 length 1308 response 1 ikev2_pld_payloads: payload SK nextpayload IDr critical 0x00 length 1280 ikev2_msg_decrypt: IV length 16 ikev2_msg_decrypt: encrypted payload length 1248 ikev2_msg_decrypt: integrity checksum length 12 ikev2_msg_decrypt: integrity check succeeded ikev2_msg_decrypt: decrypted payload length 1248/1248 padding 0 ikev2_pld_payloads: decrypted payload IDr nextpayload CERT critical 0x00 length 27 ikev2_pld_id: id FQDN/<firefly_host> length 23 ikev2_pld_payloads: decrypted payload CERT nextpayload AUTH critical 0x00 length 864 ikev2_pld_cert: type X509_CERT length 859 ikev2_pld_payloads: decrypted payload AUTH nextpayload SA critical 0x00 length 264 ikev2_pld_auth: method RSA_SIG length 256 ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00 length 44 ikev2_pld_sa: more 0 reserved 0 length 40 proposal #1 protoid ESP spisize 4 xforms 3 spi 0xfa48f5b7 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96 ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length 24 ikev2_pld_ts: count 1 length 16 ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 ikev2_pld_ts: start <remote_ip> end <remote_ip> ikev2_pld_payloads: decrypted payload TSr nextpayload NONE critical 0x00 length 24 ikev2_pld_ts: count 1 length 16 ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 ikev2_pld_ts: start <firefly_ip> end <firefly_ip> ikev2_msg_send: IKE_AUTH from <firefly_ip>:4500 to <remote_ip>:4761, 1308 bytes, NAT-T ca exiting lost child: ikev2 terminated; signal 11 ikev1 exiting parent terminating iked.conf: ikev2 "test-ikev2" from <firefly_ip> to <remote_ip> The StrongSwan setup: $ ipsec --version Linux strongSwan U4.3.5/K3.9.11-smp ipsec.conf: ------------------------------8<------------------------------ config setup charondebug=all conn ecentrum auto=add keyexchange=ikev2 left=%defaultroute leftcert=ipsec_teszt_ikev2_cert.pem leftid=@<remote_host> leftfirewall=yes right=<firefly_ip> rightcert=ipsec_firefly_cert.pem rightid=@<firefly_host> ------------------------------8<------------------------------ Anyone got any idea what could be going on? Thanks, Daniel dmesg: OpenBSD 5.3-stable (GENERIC) #0: Thu Jun 13 14:02:23 CEST 2013 dani...@openbsd-stable.my.domain:/usr/src/sys/arch/i386/compile/GENERIC cpu0: Intel(R) Pentium(R) 4 CPU 2.40GHz ("GenuineIntel" 686-class) 2.41 GHz cpu0: FPU,V86,DE,PSE,TSC,MSR,PAE,MCE,CX8,APIC,SEP,MTRR,PGE,MCA,CMOV,PAT,PSE36,CFLUSH,DS,ACPI,MMX,FXSR,SSE,SSE2,SS,HTT,TM,PBE,CNXT-ID,xTPR,PERF real mem = 1064103936 (1014MB) avail mem = 1035730944 (987MB) mainbus0 at root bios0 at mainbus0: AT/286+ BIOS, date 02/26/03, BIOS32 rev. 0 @ 0xf0010, SMBIOS rev. 2.3 @ 0xfbfb0 (68 entries) bios0: vendor Intel Corp. version "RG84510A.86A.0028.P15.0302260937" date 02/26/2003 bios0: Intel Corporation D845GEBV2 acpi0 at bios0: rev 0 acpi0: sleep states S0 S1 S4 S5 acpi0: tables DSDT FACP APIC ASF! acpi0: wakeup devices P0P1(S4) UAR1(S4) USB0(S4) USB1(S4) USB2(S4) USB3(S4) AC97(S4) SLPB(S4) acpitimer0 at acpi0: 3579545 Hz, 24 bits acpimadt0 at acpi0 addr 0xfee00000: PC-AT compat cpu0 at mainbus0: apid 0 (boot processor) cpu0: apic clock running at 133MHz ioapic0 at mainbus0: apid 1 pa 0xfec00000, version 20, 24 pins acpiprt0 at acpi0: bus 0 (PCI0) acpiprt1 at acpi0: bus 1 (P0P1) acpicpu0 at acpi0 acpipwrres0 at acpi0: URP1 acpipwrres1 at acpi0: FDDP acpipwrres2 at acpi0: LPTP acpibtn0 at acpi0: SLPB bios0: ROM list: 0xc0000/0xb200! 0xcb800/0x4800 0xd0000/0x1000 0xd1000/0x1000 pci0 at mainbus0 bus 0: configuration mode 1 (bios) pchb0 at pci0 dev 0 function 0 "Intel 82845G Host" rev 0x03 vga1 at pci0 dev 2 function 0 "Intel 82845G Video" rev 0x03 wsdisplay0 at vga1 mux 1: console (80x25, vt100 emulation) wsdisplay0: screen 1-5 added (80x25, vt100 emulation) intagp0 at vga1 agp0 at intagp0: aperture at 0xf0000000, size 0x8000000 inteldrm0 at vga1: apic 1 int 16 drm0 at inteldrm0 uhci0 at pci0 dev 29 function 0 "Intel 82801DB USB" rev 0x02: apic 1 int 16 uhci1 at pci0 dev 29 function 1 "Intel 82801DB USB" rev 0x02: apic 1 int 19 uhci2 at pci0 dev 29 function 2 "Intel 82801DB USB" rev 0x02: apic 1 int 18 ehci0 at pci0 dev 29 function 7 "Intel 82801DB USB" rev 0x02: apic 1 int 23 usb0 at ehci0: USB revision 2.0 uhub0 at usb0 "Intel EHCI root hub" rev 2.00/1.00 addr 1 ppb0 at pci0 dev 30 function 0 "Intel 82801BA Hub-to-PCI" rev 0x82 pci1 at ppb0 bus 1 pciide0 at pci1 dev 2 function 0 "CMD Technology SiI3512 SATA" rev 0x01: DMA pciide0: using apic 1 int 18 for native-PCI interrupt pciide0: port 0: device present, speed: 1.5Gb/s wd0 at pciide0 channel 0 drive 0: <ST3250310AS> wd0: 16-sector PIO, LBA48, 238475MB, 488397168 sectors wd0(pciide0:0:0): using BIOS timings, Ultra-DMA mode 5 pciide0: port 1: device present, speed: 1.5Gb/s wd1 at pciide0 channel 1 drive 0: <SAMSUNG HD501LJ> wd1: 16-sector PIO, LBA48, 476940MB, 976773168 sectors wd1(pciide0:1:0): using BIOS timings, Ultra-DMA mode 7 em0 at pci1 dev 5 function 0 "Intel PRO/1000GT (82541GI)" rev 0x05: apic 1 int 18, address fxp0 at pci1 dev 8 function 0 "Intel PRO/100 VE" rev 0x82, i82562: apic 1 int 20, address inphy0 at fxp0 phy 1: i82562ET 10/100 PHY, rev. 0 ichpcib0 at pci0 dev 31 function 0 "Intel 82801DB LPC" rev 0x02 pciide1 at pci0 dev 31 function 1 "Intel 82801DB IDE" rev 0x02: DMA, channel 0 configured to compatibility, channel 1 configured to compatibility pciide1: channel 0 ignored (disabled) pciide1: channel 1 ignored (disabled) ichiic0 at pci0 dev 31 function 3 "Intel 82801DB SMBus" rev 0x02: apic 1 int 17 iic0 at ichiic0 adt0 at iic0 addr 0x2e: lm85 rev 0x62 spdmem0 at iic0 addr 0x50: 1GB DDR SDRAM non-parity PC3200CL3.0 auich0 at pci0 dev 31 function 5 "Intel 82801DB AC97" rev 0x02: apic 1 int 17, ICH4 AC97 ac97: codec id 0x41445374 (Analog Devices AD1981B) ac97: codec features headphone, 20 bit DAC, No 3D Stereo audio0 at auich0 usb1 at uhci0: USB revision 1.0 uhub1 at usb1 "Intel UHCI root hub" rev 1.00/1.00 addr 1 usb2 at uhci1: USB revision 1.0 uhub2 at usb2 "Intel UHCI root hub" rev 1.00/1.00 addr 1 usb3 at uhci2: USB revision 1.0 uhub3 at usb3 "Intel UHCI root hub" rev 1.00/1.00 addr 1 isa0 at ichpcib0 isadma0 at isa0 com0 at isa0 port 0x3f8/8 irq 4: ns16550a, 16 byte fifo pckbc0 at isa0 port 0x60/5 pckbd0 at pckbc0 (kbd slot) pckbc0: using irq 1 for kbd slot wskbd0 at pckbd0: console keyboard, using wsdisplay0 pcppi0 at isa0 port 0x61 spkr0 at pcppi0 lpt0 at isa0 port 0x378/4 irq 7 npx0 at isa0 port 0xf0/16: reported by CPUID; using exception 16 mtrr: Pentium Pro MTRR support vscsi0 at root scsibus0 at vscsi0: 256 targets softraid0 at root scsibus1 at softraid0: 256 targets root on wd0a (69dbc259cb64de66.a) swap on wd0b dump on wd0b -- LÉVAI Dániel PGP key ID = 0x83B63A8F Key fingerprint = DBEC C66B A47A DFA2 792D 650C C69B BE4C 83B6 3A8F