Hello misc@, hallo Reyk, first of all, a big thank you to all the developers for your great work on OpenBSD! I'm using it for my router, my workstation, webserver, everything!
While configuring a new router for my home network I think found a problem in iked which might be related to rekeying. I set up IPsec between the router (5.6-stable) and my laptop (current) with iked. For performance testing, I created a 1 GB file and tried to transfer it via HTTP (ftp http://ip/test) After transfering about 430 MB, the connection stalls. After I cancel it I can start the transfer again, until I hit around 430 MB again. If I add lifetime 1h bytes 2G to iked.conf, I can transfer the file successfully, if I then try again, it stalls. With "lifetime 0 bytes 0" it works and I can transfer the file many times. scp has the same problem, it stalls at around 430 MB. While I found the problem between my new router (5.6-stable) and my laptop (current), both amd64, I decided to make a test configuration as simple as possible and found the same problems as above. I set up 2 V240 with the latest snapshot, pf is disabled on both systems. System 1 is running httpd, System 2 is downloading the 1 GB file. The following tests were done without any special lifetime configuration. The logs below contain one rekeying which causes the connection to stall. My uneducated guess is SAs not getting deleted after rekeying, as the SAs on the "passive" side aren't getting deleted while the "active" side SAs are deleted. If I try to transfer the file once, the passive side has 4 SAs (see below), if I try to transfer it twice, the passive side has 6 SAs, etc. I also tried isakmpd/ipsec.conf and rekeying works without a problem there. Configuration and logs are following below. If it is indeed a bug instead of user error and there are any more tests/logs needed, I'll be happy to test more. Sorry if I forgot any important information! Thanks for any answers in advance! Regards, Sigi Rudzio Configuration: System 1: 192.168.0.3 iked.conf ikev2 esp from 192.168.0.3 to 192.168.0.4 psk a System 2: 192.168.0.4 iked.conf ikev2 active esp from 192.168.0.4 to 192.168.0.3 psk a iked -dvv outputs: System 1 (started first): # iked -dvv ca_privkey_serialize: type RSA_KEY length 1190 ca_pubkey_serialize: type RSA_KEY length 270 /etc/iked.conf: loaded 1 configuration rules config_getpolicy: received policy ikev2 "policy1" passive esp inet from 192.168.0.3 to 192.168.0.4 local 192.168.0.3 peer 192.168.0.4 ikesa enc aes-256,aes-192,aes-128,3des prf hmac-sha2-256,hmac-sha1,hmac-md5 auth hmac-sha2-256,hmac-sha1,hmac-md5 group modp2048-256,modp2048,modp1536,modp1024 childsa enc aes-256,aes-192,aes-128 auth hmac-sha2-256,hmac-sha1 lifetime 10800 bytes 536870912 psk 0x61 config_getpfkey: received pfkey fd 3 config_getcompile: compilation done config_getsocket: received socket fd 4 config_getsocket: received socket fd 5 config_getsocket: received socket fd 7 config_getsocket: received socket fd 8 ca_reload: local cert type RSA_KEY config_getocsp: ocsp_url none ikev2_dispatch_cert: updated local CERTREQ type RSA_KEY length 0 ikev2_recv: IKE_SA_INIT request from initiator 192.168.0.4:500 to 192.168.0.3:500 policy 'policy1' id 0, 520 bytes ikev2_recv: ispi 0x3a8f96d8307a0131 rspi 0x0000000000000000 ikev2_policy2id: srcid FQDN/ags.local length 13 ikev2_pld_parse: header ispi 0x3a8f96d8307a0131 rspi 0x0000000000000000 nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x08 msgid 0 length 520 response 0 ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 136 ikev2_pld_sa: more 0 reserved 0 length 132 proposal #1 protoid IKE spisize 0 xforms 14 spi 0 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 ikev2_pld_xform: more 3 reserved 0 length 8 type ENCR id 3DES ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256 ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1 ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_MD5 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_MD5_96 ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_2048_256 ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_2048 ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_1536 ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_1024 ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 264 ikev2_pld_ke: dh group MODP_2048_256 reserved 0 ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 36 ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28 ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP ikev2_nat_detection: peer source 0x3a8f96d8307a0131 0x0000000000000000 192.168.0.4:500 ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00 length 28 ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP ikev2_nat_detection: peer destination 0x3a8f96d8307a0131 0x0000000000000000 192.168.0.3:500 sa_state: INIT -> SA_INIT ikev2_sa_negotiate: score 4 sa_stateok: SA_INIT flags 0x00, require 0x00 sa_stateflags: 0x00 -> 0x10 sa (required 0x00 ) ikev2_sa_keys: SKEYSEED with 32 bytes ikev2_sa_keys: S with 80 bytes ikev2_prfplus: T1 with 32 bytes ikev2_prfplus: T2 with 32 bytes ikev2_prfplus: T3 with 32 bytes ikev2_prfplus: T4 with 32 bytes ikev2_prfplus: T5 with 32 bytes ikev2_prfplus: T6 with 32 bytes ikev2_prfplus: T7 with 32 bytes ikev2_prfplus: Tn with 224 bytes ikev2_sa_keys: SK_d with 32 bytes ikev2_sa_keys: SK_ai with 32 bytes ikev2_sa_keys: SK_ar with 32 bytes ikev2_sa_keys: SK_ei with 32 bytes ikev2_sa_keys: SK_er with 32 bytes ikev2_sa_keys: SK_pi with 32 bytes ikev2_sa_keys: SK_pr with 32 bytes ikev2_add_proposals: length 44 ikev2_next_payload: length 48 nextpayload KE ikev2_next_payload: length 264 nextpayload NONCE ikev2_next_payload: length 36 nextpayload NOTIFY ikev2_nat_detection: local source 0x3a8f96d8307a0131 0xc6b8da536dd498c7 192.168.0.3:500 ikev2_next_payload: length 28 nextpayload NOTIFY ikev2_nat_detection: local destination 0x3a8f96d8307a0131 0xc6b8da536dd498c7 192.168.0.4:500 ikev2_next_payload: length 28 nextpayload NONE ikev2_pld_parse: header ispi 0x3a8f96d8307a0131 rspi 0xc6b8da536dd498c7 nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x20 msgid 0 length 432 response 1 ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 48 ikev2_pld_sa: more 0 reserved 0 length 44 proposal #1 protoid IKE spisize 0 xforms 4 spi 0 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128 ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048_256 ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 264 ikev2_pld_ke: dh group MODP_2048_256 reserved 0 ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 36 ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28 ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00 length 28 ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP ikev2_msg_send: IKE_SA_INIT response from 192.168.0.3:500 to 192.168.0.4:500 msgid 0, 432 bytes config_free_proposals: free 0xc0c7b83e80 ikev2_recv: IKE_AUTH request from initiator 192.168.0.4:500 to 192.168.0.3:500 policy 'policy1' id 1, 256 bytes ikev2_recv: ispi 0x3a8f96d8307a0131 rspi 0xc6b8da536dd498c7 ikev2_recv: updated SA to peer 192.168.0.4:500 local 192.168.0.3:500 ikev2_pld_parse: header ispi 0x3a8f96d8307a0131 rspi 0xc6b8da536dd498c7 nextpayload SK version 0x20 exchange IKE_AUTH flags 0x08 msgid 1 length 256 response 0 ikev2_pld_payloads: payload SK nextpayload IDi critical 0x00 length 228 ikev2_msg_decrypt: IV length 16 ikev2_msg_decrypt: encrypted payload length 192 ikev2_msg_decrypt: integrity checksum length 16 ikev2_msg_decrypt: integrity check succeeded ikev2_msg_decrypt: decrypted payload length 192/192 padding 2 ikev2_pld_payloads: decrypted payload IDi nextpayload AUTH critical 0x00 length 17 ikev2_pld_id: id FQDN/agp.local length 13 ikev2_pld_payloads: decrypted payload AUTH nextpayload SA critical 0x00 length 40 ikev2_pld_auth: method SHARED_KEY_MIC length 32 sa_state: SA_INIT -> AUTH_REQUEST ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00 length 84 ikev2_pld_sa: more 0 reserved 0 length 80 proposal #2 protoid ESP spisize 4 xforms 7 spi 0xb6dfa36a ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96 ikev2_pld_xform: more 3 reserved 0 length 8 type ESN id ESN ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length 24 ikev2_pld_ts: count 1 length 16 ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 ikev2_pld_ts: start 192.168.0.4 end 192.168.0.4 ikev2_pld_payloads: decrypted payload TSr nextpayload NONE critical 0x00 length 24 ikev2_pld_ts: count 1 length 16 ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 ikev2_pld_ts: start 192.168.0.3 end 192.168.0.3 sa_stateok: SA_INIT flags 0x00, require 0x00 policy_lookup: peerid 'agp.local' ikev2_msg_auth: responder auth data length 496 ikev2_msg_auth: initiator auth data length 584 ikev2_msg_authverify: method SHARED_KEY_MIC keylen 32 type NONE ikev2_msg_authverify: authentication successful sa_state: AUTH_REQUEST -> AUTH_SUCCESS sa_stateflags: 0x14 -> 0x1c auth,authvalid,sa (required 0x1c auth,authvalid,sa) ikev2_sa_negotiate: score 3 sa_stateflags: 0x1c -> 0x1c auth,authvalid,sa (required 0x1c auth,authvalid,sa) sa_stateok: VALID flags 0x1c, require 0x1c auth,authvalid,sa sa_state: AUTH_SUCCESS -> VALID sa_stateok: VALID flags 0x1c, require 0x1c auth,authvalid,sa sa_stateok: VALID flags 0x1c, require 0x1c auth,authvalid,sa ikev2_sa_tag: (0) ikev2_childsa_negotiate: proposal 2 ikev2_childsa_negotiate: key material length 128 ikev2_prfplus: T1 with 32 bytes ikev2_prfplus: T2 with 32 bytes ikev2_prfplus: T3 with 32 bytes ikev2_prfplus: T4 with 32 bytes ikev2_prfplus: Tn with 128 bytes pfkey_sa_getspi: spi 0x9095cd4d pfkey_sa_init: new spi 0x9095cd4d sa_stateok: VALID flags 0x1c, require 0x1c auth,authvalid,sa ikev2_next_payload: length 17 nextpayload AUTH ikev2_next_payload: length 40 nextpayload SA ikev2_add_proposals: length 40 ikev2_next_payload: length 44 nextpayload TSi ikev2_next_payload: length 24 nextpayload TSr ikev2_next_payload: length 24 nextpayload NONE ikev2_msg_encrypt: decrypted length 149 ikev2_msg_encrypt: padded length 160 ikev2_msg_encrypt: length 150, padding 10, output length 192 ikev2_next_payload: length 196 nextpayload IDr ikev2_msg_integr: message length 224 ikev2_msg_integr: integrity checksum length 16 ikev2_pld_parse: header ispi 0x3a8f96d8307a0131 rspi 0xc6b8da536dd498c7 nextpayload SK version 0x20 exchange IKE_AUTH flags 0x20 msgid 1 length 224 response 1 ikev2_pld_payloads: payload SK nextpayload IDr critical 0x00 length 196 ikev2_msg_decrypt: IV length 16 ikev2_msg_decrypt: encrypted payload length 160 ikev2_msg_decrypt: integrity checksum length 16 ikev2_msg_decrypt: integrity check succeeded ikev2_msg_decrypt: decrypted payload length 160/160 padding 10 ikev2_pld_payloads: decrypted payload IDr nextpayload AUTH critical 0x00 length 17 ikev2_pld_id: id FQDN/ags.local length 13 ikev2_pld_payloads: decrypted payload AUTH nextpayload SA critical 0x00 length 40 ikev2_pld_auth: method SHARED_KEY_MIC length 32 ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00 length 44 ikev2_pld_sa: more 0 reserved 0 length 40 proposal #2 protoid ESP spisize 4 xforms 3 spi 0x9095cd4d ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128 ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id ESN ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length 24 ikev2_pld_ts: count 1 length 16 ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 ikev2_pld_ts: start 192.168.0.4 end 192.168.0.4 ikev2_pld_payloads: decrypted payload TSr nextpayload NONE critical 0x00 length 24 ikev2_pld_ts: count 1 length 16 ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 ikev2_pld_ts: start 192.168.0.3 end 192.168.0.3 ikev2_msg_send: IKE_AUTH response from 192.168.0.3:500 to 192.168.0.4:500 msgid 1, 224 bytes pfkey_sa_add: update spi 0x9095cd4d ikev2_childsa_enable: loaded CHILD SA spi 0x9095cd4d pfkey_sa_add: add spi 0xb6dfa36a ikev2_childsa_enable: loaded CHILD SA spi 0xb6dfa36a ikev2_childsa_enable: loaded flow 0xc0b55ba400 ikev2_childsa_enable: loaded flow 0xc105070000 sa_state: VALID -> ESTABLISHED from 192.168.0.4:500 to 192.168.0.3:500 policy 'policy1' config_free_proposals: free 0xc0d856fe00 pfkey_sa_last_used: last_used 1423004921 ikev2_ike_sa_alive: incoming CHILD SA spi 0x9095cd4d last used 0 second(s) ago pfkey_sa_last_used: last_used 1423004981 ikev2_ike_sa_alive: incoming CHILD SA spi 0x9095cd4d last used 0 second(s) ago ikev2_recv: CREATE_CHILD_SA request from initiator 192.168.0.4:500 to 192.168.0.3:500 policy 'policy1' id 2, 256 bytes ikev2_recv: ispi 0x3a8f96d8307a0131 rspi 0xc6b8da536dd498c7 ikev2_recv: updated SA to peer 192.168.0.4:500 local 192.168.0.3:500 ikev2_pld_parse: header ispi 0x3a8f96d8307a0131 rspi 0xc6b8da536dd498c7 nextpayload SK version 0x20 exchange CREATE_CHILD_SA flags 0x08 msgid 2 length 256 response 0 ikev2_pld_payloads: payload SK nextpayload SA critical 0x00 length 228 ikev2_msg_decrypt: IV length 16 ikev2_msg_decrypt: encrypted payload length 192 ikev2_msg_decrypt: integrity checksum length 16 ikev2_msg_decrypt: integrity check succeeded ikev2_msg_decrypt: decrypted payload length 192/192 padding 11 ikev2_pld_payloads: decrypted payload SA nextpayload NONCE critical 0x00 length 84 ikev2_pld_sa: more 0 reserved 0 length 80 proposal #2 protoid ESP spisize 4 xforms 7 spi 0x4ecc3218 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96 ikev2_pld_xform: more 3 reserved 0 length 8 type ESN id ESN ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE ikev2_pld_payloads: decrypted payload NONCE nextpayload TSi critical 0x00 length 36 ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length 24 ikev2_pld_ts: count 1 length 16 ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 ikev2_pld_ts: start 192.168.0.4 end 192.168.0.4 ikev2_pld_payloads: decrypted payload TSr nextpayload NOTIFY critical 0x00 length 24 ikev2_pld_ts: count 1 length 16 ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 ikev2_pld_ts: start 192.168.0.3 end 192.168.0.3 ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NONE critical 0x00 length 12 ikev2_pld_notify: protoid ESP spisize 4 type REKEY_SA ikev2_pld_notify: rekey ESP spi 0xb6dfa36a ikev2_resp_create_child_sa: rekey ESP spi 0xb6dfa36a ikev2_sa_negotiate: score 3 sa_stateok: VALID flags 0x1c, require 0x1c auth,authvalid,sa ikev2_sa_tag: (0) ikev2_childsa_negotiate: proposal 2 ikev2_childsa_negotiate: key material length 128 ikev2_prfplus: T1 with 32 bytes ikev2_prfplus: T2 with 32 bytes ikev2_prfplus: T3 with 32 bytes ikev2_prfplus: T4 with 32 bytes ikev2_prfplus: Tn with 128 bytes pfkey_sa_getspi: spi 0xfa78579f pfkey_sa_init: new spi 0xfa78579f ikev2_add_proposals: length 40 ikev2_next_payload: length 44 nextpayload NONCE ikev2_next_payload: length 36 nextpayload TSi ikev2_next_payload: length 24 nextpayload TSr ikev2_next_payload: length 24 nextpayload NONE ikev2_msg_encrypt: decrypted length 128 ikev2_msg_encrypt: padded length 144 ikev2_msg_encrypt: length 129, padding 15, output length 176 ikev2_next_payload: length 180 nextpayload SA ikev2_msg_integr: message length 208 ikev2_msg_integr: integrity checksum length 16 ikev2_pld_parse: header ispi 0x3a8f96d8307a0131 rspi 0xc6b8da536dd498c7 nextpayload SK version 0x20 exchange CREATE_CHILD_SA flags 0x20 msgid 2 length 208 response 1 ikev2_pld_payloads: payload SK nextpayload SA critical 0x00 length 180 ikev2_msg_decrypt: IV length 16 ikev2_msg_decrypt: encrypted payload length 144 ikev2_msg_decrypt: integrity checksum length 16 ikev2_msg_decrypt: integrity check succeeded ikev2_msg_decrypt: decrypted payload length 144/144 padding 15 ikev2_pld_payloads: decrypted payload SA nextpayload NONCE critical 0x00 length 44 ikev2_pld_sa: more 0 reserved 0 length 40 proposal #2 protoid ESP spisize 4 xforms 3 spi 0xfa78579f ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128 ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id ESN ikev2_pld_payloads: decrypted payload NONCE nextpayload TSi critical 0x00 length 36 ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length 24 ikev2_pld_ts: count 1 length 16 ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 ikev2_pld_ts: start 192.168.0.4 end 192.168.0.4 ikev2_pld_payloads: decrypted payload TSr nextpayload NONE critical 0x00 length 24 ikev2_pld_ts: count 1 length 16 ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 ikev2_pld_ts: start 192.168.0.3 end 192.168.0.3 ikev2_msg_send: CREATE_CHILD_SA response from 192.168.0.3:500 to 192.168.0.4:500 msgid 2, 208 bytes pfkey_sa_add: update spi 0xfa78579f ikev2_childsa_enable: loaded CHILD SA spi 0xfa78579f pfkey_sa_add: add spi 0x4ecc3218 ikev2_childsa_enable: loaded CHILD SA spi 0x4ecc3218 config_free_proposals: free 0xc0d856e300 config_free_proposals: free 0xc14911cf80 ikev2_recv: INFORMATIONAL request from initiator 192.168.0.4:500 to 192.168.0.3:500 policy 'policy1' id 3, 80 bytes ikev2_recv: ispi 0x3a8f96d8307a0131 rspi 0xc6b8da536dd498c7 ikev2_recv: updated SA to peer 192.168.0.4:500 local 192.168.0.3:500 ikev2_pld_parse: header ispi 0x3a8f96d8307a0131 rspi 0xc6b8da536dd498c7 nextpayload SK version 0x20 exchange INFORMATIONAL flags 0x08 msgid 3 length 80 response 0 ikev2_pld_payloads: payload SK nextpayload DELETE critical 0x00 length 52 ikev2_msg_decrypt: IV length 16 ikev2_msg_decrypt: encrypted payload length 16 ikev2_msg_decrypt: integrity checksum length 16 ikev2_msg_decrypt: integrity check succeeded ikev2_msg_decrypt: decrypted payload length 16/16 padding 3 ikev2_pld_payloads: decrypted payload DELETE nextpayload NONE critical 0x00 length 12 ikev2_pld_delete: proto ESP spisize 4 nspi 1 ikev2_pld_delete: spi 0xb6dfa36a ikev2_childsa_delete: deleted CHILD SA spi 0x9095cd4d ikev2_childsa_delete: deleted CHILD SA spi 0xb6dfa36a ikev2_pld_delete: deleted 1 spis ikev2_next_payload: length 12 nextpayload NONE ikev2_msg_encrypt: decrypted length 12 ikev2_msg_encrypt: padded length 16 ikev2_msg_encrypt: length 13, padding 3, output length 48 ikev2_next_payload: length 52 nextpayload DELETE ikev2_msg_integr: message length 80 ikev2_msg_integr: integrity checksum length 16 ikev2_pld_parse: header ispi 0x3a8f96d8307a0131 rspi 0xc6b8da536dd498c7 nextpayload SK version 0x20 exchange INFORMATIONAL flags 0x20 msgid 3 length 80 response 1 ikev2_pld_payloads: payload SK nextpayload DELETE critical 0x00 length 52 ikev2_msg_decrypt: IV length 16 ikev2_msg_decrypt: encrypted payload length 16 ikev2_msg_decrypt: integrity checksum length 16 ikev2_msg_decrypt: integrity check succeeded ikev2_msg_decrypt: decrypted payload length 16/16 padding 3 ikev2_pld_payloads: decrypted payload DELETE nextpayload NONE critical 0x00 length 12 ikev2_pld_delete: proto ESP spisize 4 nspi 1 ikev2_pld_delete: spi 0x9095cd4d ikev2_msg_send: INFORMATIONAL response from 192.168.0.3:500 to 192.168.0.4:500 msgid 3, 80 bytes pfkey_sa_last_used: last_used 1423005041 ikev2_ike_sa_alive: incoming CHILD SA spi 0xfa78579f last used 0 second(s) ago pfkey_sa_last_used: last_used 1423005090 ikev2_ike_sa_alive: incoming CHILD SA spi 0xfa78579f last used 11 second(s) ago System 2 (started second): # iked -dvv ca_privkey_serialize: type RSA_KEY length 1191 ca_pubkey_serialize: type RSA_KEY length 270 /etc/iked.conf: loaded 1 configuration rules config_getpolicy: received policy ikev2 "policy1" active esp inet from 192.168.0.4 to 192.168.0.3 local 192.168.0.4 peer 192.168.0.3 ikesa enc aes-256,aes-192,aes-128,3des prf hmac-sha2-256,hmac-sha1,hmac-md5 auth hmac-sha2-256,hmac-sha1,hmac-md5 group modp2048-256,modp2048,modp1536,modp1024 childsa enc aes-256,aes-192,aes-128 auth hmac-sha2-256,hmac-sha1 lifetime 10800 bytes 536870912 psk 0x61 config_getpfkey: received pfkey fd 3 config_getcompile: compilation done config_getsocket: received socket fd 4 config_getsocket: received socket fd 5 config_getsocket: received socket fd 7 config_getsocket: received socket fd 8 ca_reload: local cert type RSA_KEY config_getocsp: ocsp_url none ikev2_dispatch_cert: updated local CERTREQ type RSA_KEY length 0 ikev2_init_ike_sa: initiating "policy1" ikev2_policy2id: srcid FQDN/agp.local length 13 ikev2_add_proposals: length 132 ikev2_next_payload: length 136 nextpayload KE ikev2_next_payload: length 264 nextpayload NONCE ikev2_next_payload: length 36 nextpayload NOTIFY ikev2_nat_detection: local source 0x3a8f96d8307a0131 0x0000000000000000 192.168.0.4:500 ikev2_next_payload: length 28 nextpayload NOTIFY ikev2_nat_detection: local destination 0x3a8f96d8307a0131 0x0000000000000000 192.168.0.3:500 ikev2_next_payload: length 28 nextpayload NONE ikev2_pld_parse: header ispi 0x3a8f96d8307a0131 rspi 0x0000000000000000 nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x08 msgid 0 length 520 response 0 ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 136 ikev2_pld_sa: more 0 reserved 0 length 132 proposal #1 protoid IKE spisize 0 xforms 14 spi 0 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 ikev2_pld_xform: more 3 reserved 0 length 8 type ENCR id 3DES ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256 ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1 ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_MD5 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_MD5_96 ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_2048_256 ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_2048 ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_1536 ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_1024 ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 264 ikev2_pld_ke: dh group MODP_2048_256 reserved 0 ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 36 ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28 ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00 length 28 ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP ikev2_msg_send: IKE_SA_INIT request from 192.168.0.4:500 to 192.168.0.3:500 msgid 0, 520 bytes sa_state: INIT -> SA_INIT ikev2_recv: IKE_SA_INIT response from responder 192.168.0.3:500 to 192.168.0.4:500 policy 'policy1' id 0, 432 bytes ikev2_recv: ispi 0x3a8f96d8307a0131 rspi 0xc6b8da536dd498c7 ikev2_recv: updated SA to peer 192.168.0.3:500 local 192.168.0.4:500 ikev2_pld_parse: header ispi 0x3a8f96d8307a0131 rspi 0xc6b8da536dd498c7 nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x20 msgid 0 length 432 response 1 ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 48 ikev2_pld_sa: more 0 reserved 0 length 44 proposal #1 protoid IKE spisize 0 xforms 4 spi 0 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128 ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048_256 ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 264 ikev2_pld_ke: dh group MODP_2048_256 reserved 0 ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 36 ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28 ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP ikev2_nat_detection: peer source 0x3a8f96d8307a0131 0xc6b8da536dd498c7 192.168.0.3:500 ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00 length 28 ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP ikev2_nat_detection: peer destination 0x3a8f96d8307a0131 0xc6b8da536dd498c7 192.168.0.4:500 ikev2_sa_negotiate: score 4 sa_stateok: SA_INIT flags 0x00, require 0x04 auth ikev2_sa_keys: SKEYSEED with 32 bytes ikev2_sa_keys: S with 80 bytes ikev2_prfplus: T1 with 32 bytes ikev2_prfplus: T2 with 32 bytes ikev2_prfplus: T3 with 32 bytes ikev2_prfplus: T4 with 32 bytes ikev2_prfplus: T5 with 32 bytes ikev2_prfplus: T6 with 32 bytes ikev2_prfplus: T7 with 32 bytes ikev2_prfplus: Tn with 224 bytes ikev2_sa_keys: SK_d with 32 bytes ikev2_sa_keys: SK_ai with 32 bytes ikev2_sa_keys: SK_ar with 32 bytes ikev2_sa_keys: SK_ei with 32 bytes ikev2_sa_keys: SK_er with 32 bytes ikev2_sa_keys: SK_pi with 32 bytes ikev2_sa_keys: SK_pr with 32 bytes ikev2_msg_auth: initiator auth data length 584 sa_stateok: SA_INIT flags 0x04, require 0x04 auth ikev2_next_payload: length 17 nextpayload AUTH ikev2_next_payload: length 40 nextpayload SA pfkey_sa_getspi: spi 0xb6dfa36a pfkey_sa_init: new spi 0xb6dfa36a ikev2_add_proposals: length 80 ikev2_next_payload: length 84 nextpayload TSi ikev2_next_payload: length 24 nextpayload TSr ikev2_next_payload: length 24 nextpayload NONE ikev2_msg_encrypt: decrypted length 189 ikev2_msg_encrypt: padded length 192 ikev2_msg_encrypt: length 190, padding 2, output length 224 ikev2_next_payload: length 228 nextpayload IDi ikev2_msg_integr: message length 256 ikev2_msg_integr: integrity checksum length 16 ikev2_pld_parse: header ispi 0x3a8f96d8307a0131 rspi 0xc6b8da536dd498c7 nextpayload SK version 0x20 exchange IKE_AUTH flags 0x08 msgid 1 length 256 response 0 ikev2_pld_payloads: payload SK nextpayload IDi critical 0x00 length 228 ikev2_msg_decrypt: IV length 16 ikev2_msg_decrypt: encrypted payload length 192 ikev2_msg_decrypt: integrity checksum length 16 ikev2_msg_decrypt: integrity check succeeded ikev2_msg_decrypt: decrypted payload length 192/192 padding 2 ikev2_pld_payloads: decrypted payload IDi nextpayload AUTH critical 0x00 length 17 ikev2_pld_id: id FQDN/agp.local length 13 ikev2_pld_payloads: decrypted payload AUTH nextpayload SA critical 0x00 length 40 ikev2_pld_auth: method SHARED_KEY_MIC length 32 ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00 length 84 ikev2_pld_sa: more 0 reserved 0 length 80 proposal #2 protoid ESP spisize 4 xforms 7 spi 0xb6dfa36a ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96 ikev2_pld_xform: more 3 reserved 0 length 8 type ESN id ESN ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length 24 ikev2_pld_ts: count 1 length 16 ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 ikev2_pld_ts: start 192.168.0.4 end 192.168.0.4 ikev2_pld_payloads: decrypted payload TSr nextpayload NONE critical 0x00 length 24 ikev2_pld_ts: count 1 length 16 ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 ikev2_pld_ts: start 192.168.0.3 end 192.168.0.3 ikev2_msg_send: IKE_AUTH request from 192.168.0.4:500 to 192.168.0.3:500 msgid 1, 256 bytes config_free_proposals: free 0xb90ee2680 ikev2_recv: IKE_AUTH response from responder 192.168.0.3:500 to 192.168.0.4:500 policy 'policy1' id 1, 224 bytes ikev2_recv: ispi 0x3a8f96d8307a0131 rspi 0xc6b8da536dd498c7 ikev2_recv: updated SA to peer 192.168.0.3:500 local 192.168.0.4:500 ikev2_pld_parse: header ispi 0x3a8f96d8307a0131 rspi 0xc6b8da536dd498c7 nextpayload SK version 0x20 exchange IKE_AUTH flags 0x20 msgid 1 length 224 response 1 ikev2_pld_payloads: payload SK nextpayload IDr critical 0x00 length 196 ikev2_msg_decrypt: IV length 16 ikev2_msg_decrypt: encrypted payload length 160 ikev2_msg_decrypt: integrity checksum length 16 ikev2_msg_decrypt: integrity check succeeded ikev2_msg_decrypt: decrypted payload length 160/160 padding 10 ikev2_pld_payloads: decrypted payload IDr nextpayload AUTH critical 0x00 length 17 ikev2_pld_id: id FQDN/ags.local length 13 ikev2_pld_payloads: decrypted payload AUTH nextpayload SA critical 0x00 length 40 ikev2_pld_auth: method SHARED_KEY_MIC length 32 sa_state: SA_INIT -> AUTH_REQUEST ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00 length 44 ikev2_pld_sa: more 0 reserved 0 length 40 proposal #2 protoid ESP spisize 4 xforms 3 spi 0x9095cd4d ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128 ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id ESN ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length 24 ikev2_pld_ts: count 1 length 16 ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 ikev2_pld_ts: start 192.168.0.4 end 192.168.0.4 ikev2_pld_payloads: decrypted payload TSr nextpayload NONE critical 0x00 length 24 ikev2_pld_ts: count 1 length 16 ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 ikev2_pld_ts: start 192.168.0.3 end 192.168.0.3 ikev2_msg_auth: responder auth data length 496 ikev2_msg_authverify: method SHARED_KEY_MIC keylen 32 type NONE ikev2_msg_authverify: authentication successful sa_state: AUTH_REQUEST -> AUTH_SUCCESS sa_stateflags: 0x04 -> 0x0c auth,authvalid (required 0x18 authvalid,sa) ikev2_sa_negotiate: score 3 sa_stateflags: 0x0c -> 0x1c auth,authvalid,sa (required 0x18 authvalid,sa) sa_stateok: VALID flags 0x18, require 0x18 authvalid,sa sa_state: AUTH_SUCCESS -> VALID sa_stateok: VALID flags 0x18, require 0x18 authvalid,sa sa_stateok: VALID flags 0x18, require 0x18 authvalid,sa ikev2_sa_tag: (0) ikev2_childsa_negotiate: proposal 2 ikev2_childsa_negotiate: key material length 128 ikev2_prfplus: T1 with 32 bytes ikev2_prfplus: T2 with 32 bytes ikev2_prfplus: T3 with 32 bytes ikev2_prfplus: T4 with 32 bytes ikev2_prfplus: Tn with 128 bytes pfkey_sa_add: add spi 0x9095cd4d ikev2_childsa_enable: loaded CHILD SA spi 0x9095cd4d pfkey_sa_add: update spi 0xb6dfa36a ikev2_childsa_enable: loaded CHILD SA spi 0xb6dfa36a ikev2_childsa_enable: loaded flow 0xb536d5000 ikev2_childsa_enable: loaded flow 0xb0b39f400 sa_state: VALID -> ESTABLISHED from 192.168.0.3:500 to 192.168.0.4:500 policy 'policy1' config_free_proposals: free 0xb68fdf400 ikev2_init_ike_sa: "policy1" is already active pfkey_sa_last_used: last_used 1423008468 ikev2_ike_sa_alive: outgoing CHILD SA spi 0x9095cd4d last used 0 second(s) ago pfkey_sa_last_used: last_used 1423008468 ikev2_ike_sa_alive: incoming CHILD SA spi 0xb6dfa36a last used 0 second(s) ago ikev2_init_ike_sa: "policy1" is already active pfkey_sa_last_used: last_used 1423008528 ikev2_ike_sa_alive: outgoing CHILD SA spi 0x9095cd4d last used 0 second(s) ago pfkey_sa_last_used: last_used 1423008528 ikev2_ike_sa_alive: incoming CHILD SA spi 0xb6dfa36a last used 0 second(s) ago pfkey_process: SA 0xb6dfa36a is expired, pending rekeying ikev2_send_create_child_sa: rekeying ESP spi 0x9095cd4d config_free_proposals: free 0xb6b74e680 pfkey_sa_getspi: spi 0x4ecc3218 pfkey_sa_init: new spi 0x4ecc3218 ikev2_add_proposals: length 80 ikev2_next_payload: length 84 nextpayload NONCE ikev2_next_payload: length 36 nextpayload TSi ikev2_next_payload: length 24 nextpayload TSr ikev2_next_payload: length 24 nextpayload NOTIFY ikev2_next_payload: length 12 nextpayload NONE ikev2_msg_encrypt: decrypted length 180 ikev2_msg_encrypt: padded length 192 ikev2_msg_encrypt: length 181, padding 11, output length 224 ikev2_next_payload: length 228 nextpayload SA ikev2_msg_integr: message length 256 ikev2_msg_integr: integrity checksum length 16 ikev2_pld_parse: header ispi 0x3a8f96d8307a0131 rspi 0xc6b8da536dd498c7 nextpayload SK version 0x20 exchange CREATE_CHILD_SA flags 0x08 msgid 2 length 256 response 0 ikev2_pld_payloads: payload SK nextpayload SA critical 0x00 length 228 ikev2_msg_decrypt: IV length 16 ikev2_msg_decrypt: encrypted payload length 192 ikev2_msg_decrypt: integrity checksum length 16 ikev2_msg_decrypt: integrity check succeeded ikev2_msg_decrypt: decrypted payload length 192/192 padding 11 ikev2_pld_payloads: decrypted payload SA nextpayload NONCE critical 0x00 length 84 ikev2_pld_sa: more 0 reserved 0 length 80 proposal #2 protoid ESP spisize 4 xforms 7 spi 0x4ecc3218 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96 ikev2_pld_xform: more 3 reserved 0 length 8 type ESN id ESN ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE ikev2_pld_payloads: decrypted payload NONCE nextpayload TSi critical 0x00 length 36 ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length 24 ikev2_pld_ts: count 1 length 16 ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 ikev2_pld_ts: start 192.168.0.4 end 192.168.0.4 ikev2_pld_payloads: decrypted payload TSr nextpayload NOTIFY critical 0x00 length 24 ikev2_pld_ts: count 1 length 16 ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 ikev2_pld_ts: start 192.168.0.3 end 192.168.0.3 ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NONE critical 0x00 length 12 ikev2_pld_notify: protoid ESP spisize 4 type REKEY_SA ikev2_msg_send: CREATE_CHILD_SA request from 192.168.0.4:500 to 192.168.0.3:500 msgid 2, 256 bytes ikev2_recv: CREATE_CHILD_SA response from responder 192.168.0.3:500 to 192.168.0.4:500 policy 'policy1' id 2, 208 bytes ikev2_recv: ispi 0x3a8f96d8307a0131 rspi 0xc6b8da536dd498c7 ikev2_recv: updated SA to peer 192.168.0.3:500 local 192.168.0.4:500 ikev2_pld_parse: header ispi 0x3a8f96d8307a0131 rspi 0xc6b8da536dd498c7 nextpayload SK version 0x20 exchange CREATE_CHILD_SA flags 0x20 msgid 2 length 208 response 1 ikev2_pld_payloads: payload SK nextpayload SA critical 0x00 length 180 ikev2_msg_decrypt: IV length 16 ikev2_msg_decrypt: encrypted payload length 144 ikev2_msg_decrypt: integrity checksum length 16 ikev2_msg_decrypt: integrity check succeeded ikev2_msg_decrypt: decrypted payload length 144/144 padding 15 ikev2_pld_payloads: decrypted payload SA nextpayload NONCE critical 0x00 length 44 ikev2_pld_sa: more 0 reserved 0 length 40 proposal #2 protoid ESP spisize 4 xforms 3 spi 0xfa78579f ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128 ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id ESN ikev2_pld_payloads: decrypted payload NONCE nextpayload TSi critical 0x00 length 36 ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length 24 ikev2_pld_ts: count 1 length 16 ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 ikev2_pld_ts: start 192.168.0.4 end 192.168.0.4 ikev2_pld_payloads: decrypted payload TSr nextpayload NONE critical 0x00 length 24 ikev2_pld_ts: count 1 length 16 ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 ikev2_pld_ts: start 192.168.0.3 end 192.168.0.3 ikev2_sa_negotiate: score 3 config_free_proposals: free 0xb6b74f300 ikev2_init_create_child_sa: rekeying CHILD SA old 0xb6dfa36a spi 0xfa78579f sa_stateok: VALID flags 0x18, require 0x18 authvalid,sa ikev2_sa_tag: (0) ikev2_childsa_negotiate: proposal 2 ikev2_childsa_negotiate: key material length 128 ikev2_prfplus: T1 with 32 bytes ikev2_prfplus: T2 with 32 bytes ikev2_prfplus: T3 with 32 bytes ikev2_prfplus: T4 with 32 bytes ikev2_prfplus: Tn with 128 bytes ikev2_next_payload: length 12 nextpayload NONE ikev2_msg_encrypt: decrypted length 12 ikev2_msg_encrypt: padded length 16 ikev2_msg_encrypt: length 13, padding 3, output length 48 ikev2_next_payload: length 52 nextpayload DELETE ikev2_msg_integr: message length 80 ikev2_msg_integr: integrity checksum length 16 ikev2_pld_parse: header ispi 0x3a8f96d8307a0131 rspi 0xc6b8da536dd498c7 nextpayload SK version 0x20 exchange INFORMATIONAL flags 0x08 msgid 3 length 80 response 0 ikev2_pld_payloads: payload SK nextpayload DELETE critical 0x00 length 52 ikev2_msg_decrypt: IV length 16 ikev2_msg_decrypt: encrypted payload length 16 ikev2_msg_decrypt: integrity checksum length 16 ikev2_msg_decrypt: integrity check succeeded ikev2_msg_decrypt: decrypted payload length 16/16 padding 3 ikev2_pld_payloads: decrypted payload DELETE nextpayload NONE critical 0x00 length 12 ikev2_pld_delete: proto ESP spisize 4 nspi 1 ikev2_pld_delete: spi 0xb6dfa36a ikev2_msg_send: INFORMATIONAL request from 192.168.0.4:500 to 192.168.0.3:500 msgid 3, 80 bytes pfkey_sa_add: add spi 0xfa78579f ikev2_childsa_enable: loaded CHILD SA spi 0xfa78579f pfkey_sa_add: update spi 0x4ecc3218 ikev2_childsa_enable: loaded CHILD SA spi 0x4ecc3218 config_free_proposals: free 0xb6b74fc00 ikev2_recv: INFORMATIONAL response from responder 192.168.0.3:500 to 192.168.0.4:500 policy 'policy1' id 3, 80 bytes ikev2_recv: ispi 0x3a8f96d8307a0131 rspi 0xc6b8da536dd498c7 ikev2_recv: updated SA to peer 192.168.0.3:500 local 192.168.0.4:500 ikev2_pld_parse: header ispi 0x3a8f96d8307a0131 rspi 0xc6b8da536dd498c7 nextpayload SK version 0x20 exchange INFORMATIONAL flags 0x20 msgid 3 length 80 response 1 ikev2_pld_payloads: payload SK nextpayload DELETE critical 0x00 length 52 ikev2_msg_decrypt: IV length 16 ikev2_msg_decrypt: encrypted payload length 16 ikev2_msg_decrypt: integrity checksum length 16 ikev2_msg_decrypt: integrity check succeeded ikev2_msg_decrypt: decrypted payload length 16/16 padding 3 ikev2_pld_payloads: decrypted payload DELETE nextpayload NONE critical 0x00 length 12 ikev2_init_ike_sa: "policy1" is already active pfkey_sa_last_used: last_used 1423008588 ikev2_ike_sa_alive: outgoing CHILD SA spi 0x9095cd4d last used 0 second(s) ago pfkey_sa_last_used: last_used 1423008574 ikev2_ike_sa_alive: incoming CHILD SA spi 0xb6dfa36a last used 14 second(s) ago ikev2_init_ike_sa: "policy1" is already active pfkey_sa_last_used: last_used 1423008637 ikev2_ike_sa_alive: outgoing CHILD SA spi 0x9095cd4d last used 11 second(s) ago pfkey_sa_last_used: last_used 1423008574 ikev2_ike_sa_alive: incoming CHILD SA spi 0xb6dfa36a last used 74 second(s) ago pfkey_sa_last_used: last_used 1423008637 ikev2_ike_sa_alive: outgoing CHILD SA spi 0xfa78579f last used 11 second(s) ago pfkey_sa_last_used: last_used 1423008637 ikev2_ike_sa_alive: incoming CHILD SA spi 0x4ecc3218 last used 11 second(s) ago ipsecctl -sa outputs after first rekeying: System 1: # ipsecctl -sa FLOWS: flow esp in from 192.168.0.4 to 192.168.0.3 peer 192.168.0.4 srcid FQDN/ags.local dstid FQDN/agp.local type use flow esp out from 192.168.0.3 to 192.168.0.4 peer 192.168.0.4 srcid FQDN/ags.local dstid FQDN/agp.local type require flow esp out from ::/0 to ::/0 type deny SAD: esp tunnel from 192.168.0.3 to 192.168.0.4 spi 0x4ecc3218 auth hmac-sha2-256 enc aes-256 esp tunnel from 192.168.0.4 to 192.168.0.3 spi 0xfa78579f auth hmac-sha2-256 enc aes-256 System 2: # ipsecctl -sa FLOWS: flow esp in from 192.168.0.3 to 192.168.0.4 peer 192.168.0.3 srcid FQDN/agp.local dstid FQDN/ags.local type use flow esp out from 192.168.0.4 to 192.168.0.3 peer 192.168.0.3 srcid FQDN/agp.local dstid FQDN/ags.local type require flow esp out from ::/0 to ::/0 type deny SAD: esp tunnel from 192.168.0.3 to 192.168.0.4 spi 0x4ecc3218 auth hmac-sha2-256 enc aes-256 esp tunnel from 192.168.0.4 to 192.168.0.3 spi 0x9095cd4d auth hmac-sha2-256 enc aes-256 esp tunnel from 192.168.0.3 to 192.168.0.4 spi 0xb6dfa36a auth hmac-sha2-256 enc aes-256 esp tunnel from 192.168.0.4 to 192.168.0.3 spi 0xfa78579f auth hmac-sha2-256 enc aes-256 tcpdump on system 1 of another rekeying, command: tcpdump -n -e -i vlan100 not esp and not port ssh 01:32:41.761572 00:03:ba:90:4e:cd 00:03:ba:ea:21:7d 0800 298: 192.168.0.4.500 > 192.168.0.3.500: isakmp v2.0 exchange CREATE_CHILD_SA cookie: 9a55407f1e60895e->bc46c63a0069d925 msgid: 00000004 len: 256 01:32:41.764220 00:03:ba:ea:21:7d 00:03:ba:90:4e:cd 0800 250: 192.168.0.3.500 > 192.168.0.4.500: isakmp v2.0 exchange CREATE_CHILD_SA cookie: 9a55407f1e60895e->bc46c63a0069d925 msgid: 00000004 len: 208 01:32:41.765939 00:03:ba:90:4e:cd 00:03:ba:ea:21:7d 0800 122: 192.168.0.4.500 > 192.168.0.3.500: isakmp v2.0 exchange INFORMATIONAL cookie: 9a55407f1e60895e->bc46c63a0069d925 msgid: 00000005 len: 80 01:32:41.766586 00:03:ba:ea:21:7d 00:03:ba:90:4e:cd 0800 122: 192.168.0.3.500 > 192.168.0.4.500: isakmp v2.0 exchange INFORMATIONAL cookie: 9a55407f1e60895e->bc46c63a0069d925 msgid: 00000005 len: 80 dmesg: System 1: console is /pci@1e,600000/isa@7/serial@0,3f8 Copyright (c) 1982, 1986, 1989, 1991, 1993 The Regents of the University of California. All rights reserved. Copyright (c) 1995-2015 OpenBSD. All rights reserved. http://www.OpenBSD.org OpenBSD 5.7-beta (GENERIC.MP) #459: Tue Feb 3 03:31:57 MST 2015 [email protected]:/usr/src/sys/arch/sparc64/compile/GENERIC.MP real mem = 4294967296 (4096MB) avail mem = 4213178368 (4018MB) mpath0 at root scsibus0 at mpath0: 256 targets mainbus0 at root: Sun Fire V240 cpu0 at mainbus0: SUNW,UltraSPARC-IIIi (rev 3.4) @ 1503 MHz cpu0: physical 32K instruction (32 b/l), 64K data (32 b/l), 1024K external (64 b/l) cpu1 at mainbus0: SUNW,UltraSPARC-IIIi (rev 3.4) @ 1503 MHz cpu1: physical 32K instruction (32 b/l), 64K data (32 b/l), 1024K external (64 b/l) "memory-controller" at mainbus0 not configured "memory-controller" at mainbus0 not configured schizo0 at mainbus0: "Tomatillo", version 4, ign 7c0, bus B 0 to 0 schizo0: dvma map c0000000-dfffffff pci0 at schizo0 bge0 at pci0 dev 2 function 0 "Broadcom BCM5704C" rev 0x00, BCM5704 A3 (0x2003): ivec 0x7c8, address 00:03:ba:ea:21:7d brgphy0 at bge0 phy 1: BCM5704 10/100/1000baseT PHY, rev. 0 bge1 at pci0 dev 2 function 1 "Broadcom BCM5704C" rev 0x00, BCM5704 A3 (0x2003): ivec 0x7c9, address 00:03:ba:ea:21:7e brgphy1 at bge1 phy 1: BCM5704 10/100/1000baseT PHY, rev. 0 schizo1 at mainbus0: "Tomatillo", version 4, ign 780, bus A 0 to 0 schizo1: dvma map c0000000-dfffffff pci1 at schizo1 ebus0 at pci1 dev 7 function 0 "Acer Labs M1533 ISA" rev 0x00 "flashprom" at ebus0 addr 0-fffff, 290-290 not configured rtc0 at ebus0 addr 70-71: m5819p pcfiic0 at ebus0 addr 320-321 ivec 0x2e iic0 at pcfiic0 "SUNW,i2c-imax" at iic0 addr 0xb not configured "SUNW,i2c-imax" at iic0 addr 0xc not configured spdmem0 at iic0 addr 0x5b: 512MB DDR SDRAM registered ECC PC2300CL2.5 spdmem1 at iic0 addr 0x5c: 512MB DDR SDRAM registered ECC PC2300CL2.5 spdmem2 at iic0 addr 0x5d: 512MB DDR SDRAM registered ECC PC2300CL2.5 spdmem3 at iic0 addr 0x5e: 512MB DDR SDRAM registered ECC PC2300CL2.5 spdmem4 at iic0 addr 0x63: 1GB DDR SDRAM registered ECC PC2300CL2.5 spdmem5 at iic0 addr 0x64: 1GB DDR SDRAM registered ECC PC2300CL2.5 "ds1307" at iic0 addr 0x68 not configured "pca9555" at iic0 addr 0x22 not configured "pca9555" at iic0 addr 0x23 not configured "pca9555" at iic0 addr 0x25 not configured "pca9555" at iic0 addr 0x34 not configured "pca9555" at iic0 addr 0x44 not configured "pca9556" at iic0 addr 0x38 not configured power0 at ebus0 addr 800-82f ivec 0x20 com0 at ebus0 addr 3f8-3ff ivec 0x2c: ns16550a, 16 byte fifo com0: console com1 at ebus0 addr 2e8-2ef ivec 0x2c: ns16550a, 16 byte fifo "rmc-comm" at ebus0 addr 3e8-3ef ivec 0x2c not configured alipm0 at pci1 dev 6 function 0 "Acer Labs M7101 Power" rev 0x00: 223KHz clock iic1 at alipm0 ohci0 at pci1 dev 10 function 0 "Acer Labs M5237 USB" rev 0x03: ivec 0x7a7, version 1.0, legacy support pciide0 at pci1 dev 13 function 0 "Acer Labs M5229 UDMA IDE" rev 0xc4: DMA, channel 0 configured to native-PCI, channel 1 configured to native-PCI pciide0: using ivec 0x798 for native-PCI interrupt atapiscsi0 at pciide0 channel 0 drive 0 scsibus1 at atapiscsi0: 2 targets cd0 at scsibus1 targ 0 lun 0: <TEAC, DV-28E-C, 1.4B> ATAPI 5/cdrom removable cd0(pciide0:0:0): using PIO mode 4, Ultra-DMA mode 2 pciide0: channel 1 disabled (no drives) siop0 at pci1 dev 3 function 0 "Symbios Logic 53c875" rev 0x14: ivec 0x78c, using 4K of on-board RAM scsibus2 at siop0: 16 targets, initiator 7 siop1 at pci1 dev 3 function 1 "Symbios Logic 53c875" rev 0x14: ivec 0x78d, using 4K of on-board RAM scsibus3 at siop1: 16 targets, initiator 7 usb0 at ohci0: USB revision 1.0 uhub0 at usb0 "Acer Labs OHCI root hub" rev 1.00/1.00 addr 1 schizo2 at mainbus0: "Tomatillo", version 4, ign 700, bus A 0 to 0 schizo2: dvma map c0000000-dfffffff pci2 at schizo2 siop2 at pci2 dev 2 function 0 "Symbios Logic 53c1010-66" rev 0x01: ivec 0x729, using 8K of on-board RAM scsibus4 at siop2: 16 targets, initiator 7 sym0 at scsibus4 targ 0 lun 0: <FUJITSU, MAT3073N SUN72G, 0602> SCSI2 0/direct fixed serial.FUJITSU_MAT3073N_SUN72G_000528B08UT9_AAN0P5708UT9 sd0 at scsibus0 targ 0 lun 0: <FUJITSU, MAT3073N SUN72G, 0602> SCSI2 0/direct fixed serial.FUJITSU_MAT3073N_SUN72G_000528B08UT9_AAN0P5708UT9 sd0: 70007MB, 512 bytes/sector, 143374738 sectors siop3 at pci2 dev 2 function 1 "Symbios Logic 53c1010-66" rev 0x01: ivec 0x728, using 8K of on-board RAM scsibus5 at siop3: 16 targets, initiator 7 schizo3 at mainbus0: "Tomatillo", version 4, ign 740, bus B 0 to 0 schizo3: dvma map c0000000-dfffffff pci3 at schizo3 bge2 at pci3 dev 2 function 0 "Broadcom BCM5704C" rev 0x00, BCM5704 A3 (0x2003): ivec 0x75c, address 00:03:ba:ea:21:7f brgphy2 at bge2 phy 1: BCM5704 10/100/1000baseT PHY, rev. 0 bge3 at pci3 dev 2 function 1 "Broadcom BCM5704C" rev 0x00, BCM5704 A3 (0x2003): ivec 0x75d, address 00:03:ba:ea:21:80 brgphy3 at bge3 phy 1: BCM5704 10/100/1000baseT PHY, rev. 0 mpi0 at pci3 dev 1 function 0 "Symbios Logic FC919X" rev 0x00: ivec 0x744 mpi0: LSI7102XP-LC, firmware 1.2.0.0 scsibus6 at mpi0: 128 targets, initiator 15, WWPN 100000062b0a9b98, WWNN 200000062b0a9b98 siop2: target 0 now using tagged DT 16 bit 80.0 MHz 62 REQ/ACK offset xfers vscsi0 at root scsibus7 at vscsi0: 256 targets softraid0 at root scsibus8 at softraid0: 256 targets bootpath: /pci@1c,600000/scsi@2,0/disk@0,0 root on sd0a (e7e26cd2175487cc.a) swap on sd0b dump on sd0b System 2: console is /pci@1e,600000/isa@7/serial@0,3f8 Copyright (c) 1982, 1986, 1989, 1991, 1993 The Regents of the University of California. All rights reserved. Copyright (c) 1995-2015 OpenBSD. All rights reserved. http://www.OpenBSD.org OpenBSD 5.7-beta (GENERIC.MP) #459: Tue Feb 3 03:31:57 MST 2015 [email protected]:/usr/src/sys/arch/sparc64/compile/GENERIC.MP real mem = 2684354560 (2560MB) avail mem = 2627264512 (2505MB) mpath0 at root scsibus0 at mpath0: 256 targets mainbus0 at root: Sun Fire V240 cpu0 at mainbus0: SUNW,UltraSPARC-IIIi (rev 2.4) @ 1280 MHz cpu0: physical 32K instruction (32 b/l), 64K data (32 b/l), 1024K external (64 b/l) cpu1 at mainbus0: SUNW,UltraSPARC-IIIi (rev 2.4) @ 1280 MHz cpu1: physical 32K instruction (32 b/l), 64K data (32 b/l), 1024K external (64 b/l) "memory-controller" at mainbus0 not configured "memory-controller" at mainbus0 not configured schizo0 at mainbus0: "Tomatillo", version 4, ign 7c0, bus B 0 to 0 schizo0: dvma map c0000000-dfffffff pci0 at schizo0 bge0 at pci0 dev 2 function 0 "Broadcom BCM5704C" rev 0x00, BCM5704 A3 (0x2003): ivec 0x7c8, address 00:03:ba:90:4e:cd brgphy0 at bge0 phy 1: BCM5704 10/100/1000baseT PHY, rev. 0 bge1 at pci0 dev 2 function 1 "Broadcom BCM5704C" rev 0x00, BCM5704 A3 (0x2003): ivec 0x7c9, address 00:03:ba:90:4e:ce brgphy1 at bge1 phy 1: BCM5704 10/100/1000baseT PHY, rev. 0 schizo1 at mainbus0: "Tomatillo", version 4, ign 780, bus A 0 to 0 schizo1: dvma map c0000000-dfffffff pci1 at schizo1 ebus0 at pci1 dev 7 function 0 "Acer Labs M1533 ISA" rev 0x00 "flashprom" at ebus0 addr 0-fffff, 290-290 not configured rtc0 at ebus0 addr 70-71: m5819p pcfiic0 at ebus0 addr 320-321 ivec 0x2e iic0 at pcfiic0 "SUNW,i2c-imax" at iic0 addr 0xb not configured "SUNW,i2c-imax" at iic0 addr 0xc not configured spdmem0 at iic0 addr 0x5b: 256MB DDR SDRAM registered ECC PC2300CL2.5 spdmem1 at iic0 addr 0x5c: 256MB DDR SDRAM registered ECC PC2300CL2.5 spdmem2 at iic0 addr 0x63: 1GB DDR SDRAM registered ECC PC2300CL2.5 spdmem3 at iic0 addr 0x64: 1GB DDR SDRAM registered ECC PC2300CL2.5 "ds1307" at iic0 addr 0x68 not configured "pca9555" at iic0 addr 0x22 not configured "pca9555" at iic0 addr 0x23 not configured "pca9555" at iic0 addr 0x25 not configured "pca9555" at iic0 addr 0x34 not configured "pca9555" at iic0 addr 0x44 not configured "pca9556" at iic0 addr 0x38 not configured power0 at ebus0 addr 800-82f ivec 0x20 com0 at ebus0 addr 3f8-3ff ivec 0x2c: ns16550a, 16 byte fifo com0: console com1 at ebus0 addr 2e8-2ef ivec 0x2c: ns16550a, 16 byte fifo "rmc-comm" at ebus0 addr 3e8-3ef ivec 0x2c not configured alipm0 at pci1 dev 6 function 0 "Acer Labs M7101 Power" rev 0x00: 223KHz clock iic1 at alipm0 ohci0 at pci1 dev 10 function 0 "Acer Labs M5237 USB" rev 0x03: ivec 0x7a7, version 1.0, legacy support pciide0 at pci1 dev 13 function 0 "Acer Labs M5229 UDMA IDE" rev 0xc4: DMA, channel 0 configured to native-PCI, channel 1 configured to native-PCI pciide0: using ivec 0x798 for native-PCI interrupt pciide0: channel 0 disabled (no drives) pciide0: channel 1 disabled (no drives) usb0 at ohci0: USB revision 1.0 uhub0 at usb0 "Acer Labs OHCI root hub" rev 1.00/1.00 addr 1 schizo2 at mainbus0: "Tomatillo", version 4, ign 700, bus A 0 to 0 schizo2: dvma map c0000000-dfffffff pci2 at schizo2 siop0 at pci2 dev 2 function 0 "Symbios Logic 53c1010-66" rev 0x01: ivec 0x729, using 8K of on-board RAM scsibus1 at siop0: 16 targets, initiator 7 sym0 at scsibus1 targ 0 lun 0: <SEAGATE, ST336607LSUN36G, 0207> SCSI3 0/direct fixed serial.SEAGATE_ST336607LSUN36G_3JA1WR1H00007347US0S sd0 at scsibus0 targ 0 lun 0: <SEAGATE, ST336607LSUN36G, 0207> SCSI3 0/direct fixed serial.SEAGATE_ST336607LSUN36G_3JA1WR1H00007347US0S sd0: 34732MB, 512 bytes/sector, 71132959 sectors sym1 at scsibus1 targ 1 lun 0: <SEAGATE, ST336607LSUN36G, 0507> SCSI3 0/direct fixed serial.SEAGATE_ST336607LSUN36G_3JA7JQYE00007440P23A sd1 at scsibus0 targ 1 lun 0: <SEAGATE, ST336607LSUN36G, 0507> SCSI3 0/direct fixed serial.SEAGATE_ST336607LSUN36G_3JA7JQYE00007440P23A sd1: 34732MB, 512 bytes/sector, 71132959 sectors sym2 at scsibus1 targ 2 lun 0: <FUJITSU, MAP3367N SUN36G, 0401> SCSI2 0/direct fixed serial.FUJITSU_MAP3367N_SUN36G_00N035W6_ sd2 at scsibus0 targ 2 lun 0: <FUJITSU, MAP3367N SUN36G, 0401> SCSI2 0/direct fixed serial.FUJITSU_MAP3367N_SUN36G_00N035W6_ sd2: 34732MB, 512 bytes/sector, 71132959 sectors siop1 at pci2 dev 2 function 1 "Symbios Logic 53c1010-66" rev 0x01: ivec 0x728, using 8K of on-board RAM scsibus2 at siop1: 16 targets, initiator 7 schizo3 at mainbus0: "Tomatillo", version 4, ign 740, bus B 0 to 0 schizo3: dvma map c0000000-dfffffff pci3 at schizo3 bge2 at pci3 dev 2 function 0 "Broadcom BCM5704C" rev 0x00, BCM5704 A3 (0x2003): ivec 0x75c, address 00:03:ba:90:4e:cf brgphy2 at bge2 phy 1: BCM5704 10/100/1000baseT PHY, rev. 0 bge3 at pci3 dev 2 function 1 "Broadcom BCM5704C" rev 0x00, BCM5704 A3 (0x2003): ivec 0x75d, address 00:03:ba:90:4e:d0 brgphy3 at bge3 phy 1: BCM5704 10/100/1000baseT PHY, rev. 0 qla0 at pci3 dev 1 function 0 "QLogic ISP2312" rev 0x02: ivec 0x744 qla0: firmware rev 3.3.19, attrs 0x107 qla0: loop still down, giving up scsibus3 at qla0: 2048 targets, WWPN 210000e08b10a5ea, WWNN 200000e08b10a5ea qla1 at pci3 dev 1 function 1 "QLogic ISP2312" rev 0x02: ivec 0x745 qla1: firmware rev 3.3.19, attrs 0x107 qla1: loop still down, giving up scsibus4 at qla1: 2048 targets, WWPN 210100e08b30a5ea, WWNN 200000e08b30a5ea siop0: target 0 now using tagged DT 16 bit 80.0 MHz 62 REQ/ACK offset xfers vscsi0 at root scsibus5 at vscsi0: 256 targets softraid0 at root scsibus6 at softraid0: 256 targets siop0: target 1 now using tagged DT 16 bit 80.0 MHz 62 REQ/ACK offset xfers siop0: target 2 now using tagged DT 16 bit 80.0 MHz 62 REQ/ACK offset xfers sd3 at scsibus6 targ 1 lun 0: <OPENBSD, SR RAID 0, 005> SCSI2 0/direct fixed sd3: 69465MB, 512 bytes/sector, 142264832 sectors bootpath: /pci@1c,600000/scsi@2,0/disk@0,0 root on sd0a (0cb351aef3e2eee8.a) swap on sd0b dump on sd0b

