On 13/06/2018 7:49 am, Paul Wouters wrote:
Is there any way to support both families concurrently (a type of autodetect)

Not yet. You will have to define a v4 and a v6 conn.

Ok - that's fine. That works (but for anyone else who tries this as I did - just remember you need to have a different conn name for each one even if the policies are otherwise almost identical, otherwise Libreswan starts normally but only applies one of the two conns)

I have copied my original and appended it with -ipv4 and the new one with -ipv6. The only difference aside from the conn name is the left= and right= parameters.

But back to this connection, it's now progressing a lot further - but not quite completing still and data is still not flowing:

The below only shows liveness. So that assumes the connection
established? So can you show "ip xfrm pol" and "ip xfrm state" and
"ipsec status |grep router-2.reub.net"

It looks more or less OK but there's still no data flow. I still cannot ping IPv4 between the two devices over IPv6.

Just to recap - this is what I have on the Cisco side:

interface Tunnel1
<snip>
 tunnel mode ipsec ipv6 v4-overlay
 tunnel destination 2400:8901::F03C:91FF:FE6E:9DC
end

The router is an 819 with IOS 15.7(3)M2, which is the latest release for this platform.

Do the mark or any other values of the two separate conn's need to be different even if only one is used at a time?

Here are the outputs requested above:

lightning /etc/ipsec.d # ip xfrm pol
src 0.0.0.0/0 dst 0.0.0.0/0
        dir out priority 1048575
        mark 0xc/0xffffff
tmpl src 2400:8901::f03c:91ff:fe6e:9dc dst 2001:8004:1400:20c9:1863:feff:fea4:d208
                proto esp reqid 16397 mode tunnel
src 0.0.0.0/0 dst 0.0.0.0/0
        dir fwd priority 1048575
        mark 0xc/0xffffff
tmpl src 2001:8004:1400:20c9:1863:feff:fea4:d208 dst 2400:8901::f03c:91ff:fe6e:9dc
                proto esp reqid 16397 mode tunnel
src 0.0.0.0/0 dst 0.0.0.0/0
        dir in priority 1048575
        mark 0xc/0xffffff
tmpl src 2001:8004:1400:20c9:1863:feff:fea4:d208 dst 2400:8901::f03c:91ff:fe6e:9dc
                proto esp reqid 16397 mode tunnel
src ::/0 dst ::/0
        socket out priority 0
src ::/0 dst ::/0
        socket in priority 0
src ::/0 dst ::/0
        socket out priority 0
src ::/0 dst ::/0
        socket in priority 0
src ::/0 dst ::/0
        socket out priority 0
src ::/0 dst ::/0
        socket in priority 0
src ::/0 dst ::/0
        socket out priority 0
src ::/0 dst ::/0
        socket in priority 0
src ::/0 dst ::/0
        socket out priority 0
src ::/0 dst ::/0
        socket in priority 0
src ::/0 dst ::/0
        socket out priority 0
src ::/0 dst ::/0
        socket in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
        socket out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
        socket in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
        socket out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
        socket in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
        socket out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
        socket in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
        socket out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
        socket in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
        socket out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
        socket in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
        socket out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
        socket in priority 0
src ::/0 dst ::/0 proto ipv6-icmp type 135
        dir out priority 1
src ::/0 dst ::/0 proto ipv6-icmp type 135
        dir fwd priority 1
src ::/0 dst ::/0 proto ipv6-icmp type 135
        dir in priority 1
src ::/0 dst ::/0 proto ipv6-icmp type 136
        dir out priority 1
src ::/0 dst ::/0 proto ipv6-icmp type 136
        dir fwd priority 1
src ::/0 dst ::/0 proto ipv6-icmp type 136
        dir in priority 1
lightning /etc/ipsec.d #

lightning /etc/ipsec.d # ip xfrm state
src 2001:8004:1400:20c9:1863:feff:fea4:d208 dst 2400:8901::f03c:91ff:fe6e:9dc
        proto esp spi 0x1d6f43e9 reqid 16397 mode tunnel
        replay-window 32 flag af-unspec
        auth-trunc hmac(sha1) 0x56130393b7b349ff0c61ee45a0ed58dc1db52b3a 96
        enc cbc(aes) 0x909d165e146fcd52272a4946a3bea41d
        anti-replay context: seq 0x12, oseq 0x0, bitmap 0x0003ffff
src 2400:8901::f03c:91ff:fe6e:9dc dst 2001:8004:1400:20c9:1863:feff:fea4:d208
        proto esp spi 0x2867ffcc reqid 16397 mode tunnel
        replay-window 32 flag af-unspec
        auth-trunc hmac(sha1) 0xb8aba431f6d67229bca8fb3d66fca8edeb7f8f8f 96
        enc cbc(aes) 0xb406eb113427edb19abcc0c752dbc1d1
        anti-replay context: seq 0x0, oseq 0x0, bitmap 0x00000000
lightning /etc/ipsec.d #

Ignore the ipv4 connection below because it's not used in this test, but:
lightning /etc/ipsec.d # ipsec status |grep router-2.reub.net
000 "router-2.reub.net-ipv4": 0.0.0.0/0===139.162.51.249<139.162.51.249>[@lightning.reub.net]...%any[[email protected]]===0.0.0.0/0; unrouted; eroute owner: #0 000 "router-2.reub.net-ipv4": oriented; my_ip=unset; their_ip=unset; my_updown=ipsec _updown; 000 "router-2.reub.net-ipv4": xauth us:none, xauth them:none, my_username=[any]; their_username=[any]
000 "router-2.reub.net-ipv4":   our auth:secret, their auth:secret
000 "router-2.reub.net-ipv4": modecfg info: us:none, them:none, modecfg policy:push, dns:unset, domains:unset, banner:unset, cat:unset;
000 "router-2.reub.net-ipv4":   labeled_ipsec:no;
000 "router-2.reub.net-ipv4":   policy_label:unset;
000 "router-2.reub.net-ipv4": ike_life: 86400s; ipsec_life: 3600s; replay_window: 32; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; 000 "router-2.reub.net-ipv4": retransmit-interval: 500ms; retransmit-timeout: 60s; 000 "router-2.reub.net-ipv4": initial-contact:no; cisco-unity:no; fake-strongswan:no; send-vendorid:no; send-no-esp-tfc:no; 000 "router-2.reub.net-ipv4": policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+IKEV2_PROPOSE+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO; 000 "router-2.reub.net-ipv4": conn_prio: 0,0; interface: eth0; metric: 0; mtu: unset; sa_prio:auto; sa_tfc:none; 000 "router-2.reub.net-ipv4": nflog-group: unset; mark: 12/0xffffff, 12/0xffffff; vti-iface:vti-1; vti-routing:no; vti-shared:no; nic-offload:auto; 000 "router-2.reub.net-ipv4": our idtype: ID_FQDN; our [email protected]; their idtype: ID_USER_FQDN; their [email protected] 000 "router-2.reub.net-ipv4": dpd: action:clear; delay:15; timeout:45; nat-t: encaps:auto; nat_keepalive:yes; ikev1_natt:both
000 "router-2.reub.net-ipv4":   newest ISAKMP SA: #0; newest IPsec SA: #0;
000 "router-2.reub.net-ipv4": IKE algorithms: AES_CBC_256-HMAC_SHA1-MODP1536 000 "router-2.reub.net-ipv6": 0.0.0.0/0===2400:8901::f03c:91ff:fe6e:9dc<2400:8901::f03c:91ff:fe6e:09dc>[@lightning.reub.net]...%any[[email protected]]===0.0.0.0/0; unrouted; eroute owner: #0 000 "router-2.reub.net-ipv6": oriented; my_ip=unset; their_ip=unset; my_updown=ipsec _updown; 000 "router-2.reub.net-ipv6": xauth us:none, xauth them:none, my_username=[any]; their_username=[any]
000 "router-2.reub.net-ipv6":   our auth:secret, their auth:secret
000 "router-2.reub.net-ipv6": modecfg info: us:none, them:none, modecfg policy:push, dns:unset, domains:unset, banner:unset, cat:unset;
000 "router-2.reub.net-ipv6":   labeled_ipsec:no;
000 "router-2.reub.net-ipv6":   policy_label:unset;
000 "router-2.reub.net-ipv6": ike_life: 86400s; ipsec_life: 3600s; replay_window: 32; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; 000 "router-2.reub.net-ipv6": retransmit-interval: 500ms; retransmit-timeout: 60s; 000 "router-2.reub.net-ipv6": initial-contact:no; cisco-unity:no; fake-strongswan:no; send-vendorid:no; send-no-esp-tfc:no; 000 "router-2.reub.net-ipv6": policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+IKEV2_PROPOSE+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO; 000 "router-2.reub.net-ipv6": conn_prio: 0,0; interface: eth0; metric: 0; mtu: unset; sa_prio:auto; sa_tfc:none; 000 "router-2.reub.net-ipv6": nflog-group: unset; mark: 12/0xffffff, 12/0xffffff; vti-iface:vti-1; vti-routing:no; vti-shared:no; nic-offload:auto; 000 "router-2.reub.net-ipv6": our idtype: ID_FQDN; our [email protected]; their idtype: ID_USER_FQDN; their [email protected] 000 "router-2.reub.net-ipv6": dpd: action:clear; delay:15; timeout:45; nat-t: encaps:auto; nat_keepalive:yes; ikev1_natt:both
000 "router-2.reub.net-ipv6":   newest ISAKMP SA: #0; newest IPsec SA: #0;
000 "router-2.reub.net-ipv6": IKE algorithms: AES_CBC_256-HMAC_SHA1-MODP1536 000 "router-2.reub.net-ipv6"[1]: 0.0.0.0/0===2400:8901::f03c:91ff:fe6e:9dc<2400:8901::f03c:91ff:fe6e:09dc>[@lightning.reub.net]...2001:8004:1400:20c9:1863:feff:fea4:d208<::>[[email protected]]===0.0.0.0/0; erouted; eroute owner: #2 000 "router-2.reub.net-ipv6"[1]: oriented; my_ip=unset; their_ip=unset; my_updown=ipsec _updown; 000 "router-2.reub.net-ipv6"[1]: xauth us:none, xauth them:none, my_username=[any]; their_username=[any]
000 "router-2.reub.net-ipv6"[1]:   our auth:secret, their auth:secret
000 "router-2.reub.net-ipv6"[1]: modecfg info: us:none, them:none, modecfg policy:push, dns:unset, domains:unset, banner:unset, cat:unset;
000 "router-2.reub.net-ipv6"[1]:   labeled_ipsec:no;
000 "router-2.reub.net-ipv6"[1]:   policy_label:unset;
000 "router-2.reub.net-ipv6"[1]: ike_life: 86400s; ipsec_life: 3600s; replay_window: 32; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; 000 "router-2.reub.net-ipv6"[1]: retransmit-interval: 500ms; retransmit-timeout: 60s; 000 "router-2.reub.net-ipv6"[1]: initial-contact:no; cisco-unity:no; fake-strongswan:no; send-vendorid:no; send-no-esp-tfc:no; 000 "router-2.reub.net-ipv6"[1]: policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+IKEV2_PROPOSE+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO; 000 "router-2.reub.net-ipv6"[1]: conn_prio: 0,0; interface: eth0; metric: 0; mtu: unset; sa_prio:auto; sa_tfc:none; 000 "router-2.reub.net-ipv6"[1]: nflog-group: unset; mark: 12/0xffffff, 12/0xffffff; vti-iface:vti-1; vti-routing:no; vti-shared:no; nic-offload:auto; 000 "router-2.reub.net-ipv6"[1]: our idtype: ID_FQDN; our [email protected]; their idtype: ID_USER_FQDN; their [email protected] 000 "router-2.reub.net-ipv6"[1]: dpd: action:clear; delay:15; timeout:45; nat-t: encaps:auto; nat_keepalive:yes; ikev1_natt:both 000 "router-2.reub.net-ipv6"[1]: newest ISAKMP SA: #1; newest IPsec SA: #2; 000 "router-2.reub.net-ipv6"[1]: IKE algorithms: AES_CBC_256-HMAC_SHA1-MODP1536 000 "router-2.reub.net-ipv6"[1]: IKEv2 algorithm newest: AES_CBC_256-HMAC_SHA1-MODP1536 000 "router-2.reub.net-ipv6"[1]: ESP algorithm newest: AES_CBC_128-HMAC_SHA1_96; pfsgroup=<Phase1> 000 #1: "router-2.reub.net-ipv6"[1] 2001:8004:1400:20c9:1863:feff:fea4:d208:500 STATE_PARENT_R2 (received v2I2, PARENT SA established); EVENT_SA_REPLACE in 85640s; newest ISAKMP; idle; import:respond to stranger 000 #2: "router-2.reub.net-ipv6"[1] 2001:8004:1400:20c9:1863:feff:fea4:d208:500 STATE_V2_IPSEC_R (IPsec SA established); EVENT_SA_REPLACE in 2840s; newest IPSEC; eroute owner; isakmp#1; idle; import:respond to stranger 000 #2: "router-2.reub.net-ipv6"[1] 2001:8004:1400:20c9:1863:feff:fea4:d208 esp:2867ffcc@2001:8004:1400:20c9:1863:feff:fea4:d208 esp:1d6f43e9@2400:8901::f03c:91ff:fe6e:9dc tun:0@2001:8004:1400:20c9:1863:feff:fea4:d208 tun:0@2400:8901::f03c:91ff:fe6e:9dc ref=0 refhim=0 Traffic: ESPin=1KB ESPout=0B! ESPmax=0B
lightning /etc/ipsec.d #

The Cisco is logging this:

Jun 13 22:07:30: IKEv2:(SESSION ID = 43,SA ID = 1):Received Packet [From 2400:8901::F03C:91FF:FE6E:9DC:500/To 2001:8004:1400:20C9:1863:FEFF:FEA4:D208:500/VRF i0:f0] Initiator SPI : 6840CF33E4136A03 - Responder SPI : 8169A2EC2CE3E2A2 Message id: 34
IKEv2 INFORMATIONAL Exchange RESPONSE
Payload contents:


Jun 13 22:07:30: IKEv2:(SESSION ID = 43,SA ID = 1):Processing ACK to informational exchange Jun 13 22:07:42: IKEv2:Send NAT keepalive packet local 2001:8004:1400:20C9:1863:FEFF:FEA4:D208:500 remote 2400:8901::F03C:91FF:FE6E:9DC:500 Jun 13 22:07:42: IKEv2-ERROR:Couldn't find matching SA: Received an IKE msg id outside supported window

Jun 13 22:07:42: IKEv2:(SESSION ID = 0,SA ID = 0):Received Packet [From 2400:8901::F03C:91FF:FE6E:9DC:500/To 2001:8004:1400:20C9:1863:FEFF:FEA4:D208:500/VRF i0:f0] Initiator SPI : 6840CF33E4136A03 - Responder SPI : 8169A2EC2CE3E2A2 Message id: 30
IKEv2 INFORMATIONAL Exchange REQUEST
Jun 13 22:07:42: IKEv2-ERROR:: A supplied parameter is incorrect
Jun 13 22:07:45: IKEv2:(SESSION ID = 43,SA ID = 1):Sending DPD/liveness query Jun 13 22:07:45: IKEv2:(SESSION ID = 43,SA ID = 1):Building packet for encryption. Jun 13 22:07:45: IKEv2:(SESSION ID = 43,SA ID = 1):Checking if request will fit in peer window

Jun 13 22:07:45: IKEv2:(SESSION ID = 43,SA ID = 1):Sending Packet [To 2400:8901::F03C:91FF:FE6E:9DC:500/From 2001:8004:1400:20C9:1863:FEFF:FEA4:D208:500/VRF i0:f0] Initiator SPI : 6840CF33E4136A03 - Responder SPI : 8169A2EC2CE3E2A2 Message id: 35
IKEv2 INFORMATIONAL Exchange REQUEST
Payload contents:
 ENCR


Jun 13 22:07:45: IKEv2:(SESSION ID = 43,SA ID = 1):Received Packet [From 2400:8901::F03C:91FF:FE6E:9DC:500/To 2001:8004:1400:20C9:1863:FEFF:FEA4:D208:500/VRF i0:f0] Initiator SPI : 6840CF33E4136A03 - Responder SPI : 8169A2EC2CE3E2A2 Message id: 35
IKEv2 INFORMATIONAL Exchange RESPONSE
Payload contents:


Jun 13 22:07:45: IKEv2:(SESSION ID = 43,SA ID = 1):Processing ACK to informational exchange Jun 13 22:07:57: IKEv2-ERROR:Couldn't find matching SA: Received an IKE msg id outside supported window

Jun 13 22:07:57: IKEv2:(SESSION ID = 0,SA ID = 0):Received Packet [From 2400:8901::F03C:91FF:FE6E:9DC:500/To 2001:8004:1400:20C9:1863:FEFF:FEA4:D208:500/VRF i0:f0] Initiator SPI : 6840CF33E4136A03 - Responder SPI : 8169A2EC2CE3E2A2 Message id: 31
IKEv2 INFORMATIONAL Exchange REQUEST
Jun 13 22:07:57: IKEv2-ERROR:: A supplied parameter is incorrect
Jun 13 22:08:00: IKEv2:(SESSION ID = 43,SA ID = 1):Sending DPD/liveness query Jun 13 22:08:00: IKEv2:(SESSION ID = 43,SA ID = 1):Building packet for encryption. Jun 13 22:08:00: IKEv2:(SESSION ID = 43,SA ID = 1):Checking if request will fit in peer window

Jun 13 22:08:00: IKEv2:(SESSION ID = 43,SA ID = 1):Sending Packet [To 2400:8901::F03C:91FF:FE6E:9DC:500/From 2001:8004:1400:20C9:1863:FEFF:FEA4:D208:500/VRF i0:f0] Initiator SPI : 6840CF33E4136A03 - Responder SPI : 8169A2EC2CE3E2A2 Message id: 36
IKEv2 INFORMATIONAL Exchange REQUEST
Payload contents:
 ENCR


Jun 13 22:08:00: IKEv2:(SESSION ID = 43,SA ID = 1):Received Packet [From 2400:8901::F03C:91FF:FE6E:9DC:500/To 2001:8004:1400:20C9:1863:FEFF:FEA4:D208:500/VRF i0:f0] Initiator SPI : 6840CF33E4136A03 - Responder SPI : 8169A2EC2CE3E2A2 Message id: 36
IKEv2 INFORMATIONAL Exchange RESPONSE
Payload contents:


Jun 13 22:08:00: IKEv2:(SESSION ID = 43,SA ID = 1):Processing ACK to informational exchange Jun 13 22:08:12: IKEv2:Send NAT keepalive packet local 2001:8004:1400:20C9:1863:FEFF:FEA4:D208:500 remote 2400:8901::F03C:91FF:FE6E:9DC:500 Jun 13 22:08:12: IKEv2-ERROR:Couldn't find matching SA: Received an IKE msg id outside supported window

Jun 13 22:08:12: IKEv2:(SESSION ID = 0,SA ID = 0):Received Packet [From 2400:8901::F03C:91FF:FE6E:9DC:500/To 2001:8004:1400:20C9:1863:FEFF:FEA4:D208:500/VRF i0:f0] Initiator SPI : 6840CF33E4136A03 - Responder SPI : 8169A2EC2CE3E2A2 Message id: 32
IKEv2 INFORMATIONAL Exchange REQUEST
Jun 13 22:08:12: IKEv2-ERROR:: A supplied parameter is incorrect
Jun 13 22:08:15: IKEv2:(SESSION ID = 43,SA ID = 1):Sending DPD/liveness query Jun 13 22:08:15: IKEv2:(SESSION ID = 43,SA ID = 1):Building packet for encryption. Jun 13 22:08:15: IKEv2:(SESSION ID = 43,SA ID = 1):Checking if request will fit in peer window

Jun 13 22:08:15: IKEv2:(SESSION ID = 43,SA ID = 1):Sending Packet [To 2400:8901::F03C:91FF:FE6E:9DC:500/From 2001:8004:1400:20C9:1863:FEFF:FEA4:D208:500/VRF i0:f0] Initiator SPI : 6840CF33E4136A03 - Responder SPI : 8169A2EC2CE3E2A2 Message id: 37
IKEv2 INFORMATIONAL Exchange REQUEST
Payload contents:
 ENCR

Jun 13 22:08:17: IKEv2:(SESSION ID = 43,SA ID = 1):Retransmitting packet

Jun 13 22:08:17: IKEv2:(SESSION ID = 43,SA ID = 1):Sending Packet [To 2400:8901::F03C:91FF:FE6E:9DC:500/From 2001:8004:1400:20C9:1863:FEFF:FEA4:D208:500/VRF i0:f0] Initiator SPI : 6840CF33E4136A03 - Responder SPI : 8169A2EC2CE3E2A2 Message id: 37
IKEv2 INFORMATIONAL Exchange REQUEST
Payload contents:
 ENCR


Jun 13 22:08:17: IKEv2:(SESSION ID = 43,SA ID = 1):Received Packet [From 2400:8901::F03C:91FF:FE6E:9DC:500/To 2001:8004:1400:20C9:1863:FEFF:FEA4:D208:500/VRF i0:f0] Initiator SPI : 6840CF33E4136A03 - Responder SPI : 8169A2EC2CE3E2A2 Message id: 37
IKEv2 INFORMATIONAL Exchange RESPONSE
Payload contents:


Jun 13 22:08:17: IKEv2:(SESSION ID = 43,SA ID = 1):Processing ACK to informational exchange Jun 13 22:08:27: IKEv2-ERROR:Couldn't find matching SA: Received an IKE msg id outside supported window

Jun 13 22:08:27: IKEv2:(SESSION ID = 0,SA ID = 0):Received Packet [From 2400:8901::F03C:91FF:FE6E:9DC:500/To 2001:8004:1400:20C9:1863:FEFF:FEA4:D208:500/VRF i0:f0] Initiator SPI : 6840CF33E4136A03 - Responder SPI : 8169A2EC2CE3E2A2 Message id: 33
IKEv2 INFORMATIONAL Exchange REQUEST
Jun 13 22:08:27: IKEv2-ERROR:: A supplied parameter is incorrect
Jun 13 22:08:32: IKEv2:(SESSION ID = 43,SA ID = 1):Sending DPD/liveness query Jun 13 22:08:32: IKEv2:(SESSION ID = 43,SA ID = 1):Building packet for encryption. Jun 13 22:08:32: IKEv2:(SESSION ID = 43,SA ID = 1):Checking if request will fit in peer window

Jun 13 22:08:32: IKEv2:(SESSION ID = 43,SA ID = 1):Sending Packet [To 2400:8901::F03C:91FF:FE6E:9DC:500/From 2001:8004:1400:20C9:1863:FEFF:FEA4:D208:500/VRF i0:f0] Initiator SPI : 6840CF33E4136A03 - Responder SPI : 8169A2EC2CE3E2A2 Message id: 38
IKEv2 INFORMATIONAL Exchange REQUEST
Payload contents:
 ENCR


Jun 13 22:08:33: IKEv2:(SESSION ID = 43,SA ID = 1):Received Packet [From 2400:8901::F03C:91FF:FE6E:9DC:500/To 2001:8004:1400:20C9:1863:FEFF:FEA4:D208:500/VRF i0:f0] Initiator SPI : 6840CF33E4136A03 - Responder SPI : 8169A2EC2CE3E2A2 Message id: 38
IKEv2 INFORMATIONAL Exchange RESPONSE
Payload contents:


Jun 13 22:08:33: IKEv2:(SESSION ID = 43,SA ID = 1):Processing ACK to informational exchange
router-2#
router-2#
Jun 13 22:08:42: IKEv2:Send NAT keepalive packet local 2001:8004:1400:20C9:1863:FEFF:FEA4:D208:500 remote 2400:8901::F03C:91FF:FE6E:9DC:500 Jun 13 22:08:42: IKEv2-ERROR:Couldn't find matching SA: Received an IKE msg id outside supported window

Jun 13 22:08:42: IKEv2:(SESSION ID = 0,SA ID = 0):Received Packet [From 2400:8901::F03C:91FF:FE6E:9DC:500/To 2001:8004:1400:20C9:1863:FEFF:FEA4:D208:500/VRF i0:f0] Initiator SPI : 6840CF33E4136A03 - Responder SPI : 8169A2EC2CE3E2A2 Message id: 34
IKEv2 INFORMATIONAL Exchange REQUEST
Jun 13 22:08:42: IKEv2-ERROR:: A supplied parameter is incorrect
Jun 13 22:08:48: IKEv2:(SESSION ID = 43,SA ID = 1):Sending DPD/liveness query Jun 13 22:08:48: IKEv2:(SESSION ID = 43,SA ID = 1):Building packet for encryption. Jun 13 22:08:48: IKEv2:(SESSION ID = 43,SA ID = 1):Checking if request will fit in peer window

Jun 13 22:08:48: IKEv2:(SESSION ID = 43,SA ID = 1):Sending Packet [To 2400:8901::F03C:91FF:FE6E:9DC:500/From 2001:8004:1400:20C9:1863:FEFF:FEA4:D208:500/VRF i0:f0] Initiator SPI : 6840CF33E4136A03 - Responder SPI : 8169A2EC2CE3E2A2 Message id: 39
IKEv2 INFORMATIONAL Exchange REQUEST
Payload contents:
 ENCR


Jun 13 22:08:48: IKEv2:(SESSION ID = 43,SA ID = 1):Received Packet [From 2400:8901::F03C:91FF:FE6E:9DC:500/To 2001:8004:1400:20C9:1863:FEFF:FEA4:D208:500/VRF i0:f0] Initiator SPI : 6840CF33E4136A03 - Responder SPI : 8169A2EC2CE3E2A2 Message id: 39
IKEv2 INFORMATIONAL Exchange RESPONSE
Payload contents:


Jun 13 22:08:48: IKEv2:(SESSION ID = 43,SA ID = 1):Processing ACK to informational exchange
router-2#
Jun 13 22:08:57: IKEv2-ERROR:Couldn't find matching SA: Received an IKE msg id outside supported window

Jun 13 22:08:57: IKEv2:(SESSION ID = 0,SA ID = 0):Received Packet [From 2400:8901::F03C:91FF:FE6E:9DC:500/To 2001:8004:1400:20C9:1863:FEFF:FEA4:D208:500/VRF i0:f0] Initiator SPI : 6840CF33E4136A03 - Responder SPI : 8169A2EC2CE3E2A2 Message id: 35
IKEv2 INFORMATIONAL Exchange REQUEST
Jun 13 22:08:57: IKEv2-ERROR:: A supplied parameter is incorrect
router-2#

and Libreswan is logging this:

Jun 13 20:09:03.797874: | *received 76 bytes from 2001:8004:1400:20c9:1863:feff:fea4:d208:500 on eth0 (port=500) Jun 13 20:09:03.797973: | 68 40 cf 33 e4 13 6a 03 81 69 a2 ec 2c e3 e2 a2 Jun 13 20:09:03.797981: | 2e 20 25 08 00 00 00 28 00 00 00 4c 00 00 00 30 Jun 13 20:09:03.797986: | dd e2 a7 93 5c 22 4a 6a dd f8 8e a8 04 d1 16 28 Jun 13 20:09:03.797991: | 45 8c e3 3a 28 bf 0e 73 92 eb da 19 f7 1a 8e f2
Jun 13 20:09:03.797996: |   18 3c bd fa  e1 e1 2d c4  93 83 e7 3c
Jun 13 20:09:03.798011: | processing: start from 2001:8004:1400:20c9:1863:feff:fea4:d208:500 (in process_md() at demux.c:391)
Jun 13 20:09:03.798022: | **parse ISAKMP Message:
Jun 13 20:09:03.798028: |    initiator cookie:
Jun 13 20:09:03.798034: |   68 40 cf 33  e4 13 6a 03
Jun 13 20:09:03.798038: |    responder cookie:
Jun 13 20:09:03.798043: |   81 69 a2 ec  2c e3 e2 a2
Jun 13 20:09:03.798049: |    next payload type: ISAKMP_NEXT_v2SK (0x2e)
Jun 13 20:09:03.798054: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Jun 13 20:09:03.798060: |    exchange type: ISAKMP_v2_INFORMATIONAL (0x25)
Jun 13 20:09:03.798066: |    flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
Jun 13 20:09:03.798071: |    message ID:  00 00 00 28
Jun 13 20:09:03.798076: |    length: 76 (0x4c)
Jun 13 20:09:03.798083: | processing version=2.0 packet with exchange type=ISAKMP_v2_INFORMATIONAL (37) Jun 13 20:09:03.798090: | I am receiving an IKEv2 Request ISAKMP_v2_INFORMATIONAL
Jun 13 20:09:03.798095: | I am the IKE SA Original Responder
Jun 13 20:09:03.798112: | cookies table: hash icookie 68 40 cf 33 e4 13 6a 03 rcookie 81 69 a2 ec 2c e3 e2 a2 to 12656043768357558533 slot 0x56241087a9c0
Jun 13 20:09:03.798120: | parent v2 peer and cookies match on #1
Jun 13 20:09:03.798166: | v2 state object #1 found, in STATE_PARENT_R2
Jun 13 20:09:03.798184: | processing: start state #1 connection "router-2.reub.net-ipv6"[1] 2001:8004:1400:20c9:1863:feff:fea4:d208 2001:8004:1400:20c9:1863:feff:fea4:d208:500 (in processed_retransmit() at ikev2.c:1187)
Jun 13 20:09:03.798190: | found state #1
Jun 13 20:09:03.798200: | processing: [RE]START state #1 connection "router-2.reub.net-ipv6"[1] 2001:8004:1400:20c9:1863:feff:fea4:d208 2001:8004:1400:20c9:1863:feff:fea4:d208:500 (in ikev2_process_packet() at ikev2.c:1538) Jun 13 20:09:03.798209: | processing: start connection "router-2.reub.net-ipv6"[1] 2001:8004:1400:20c9:1863:feff:fea4:d208 (BACKGROUND) (in ikev2_process_packet() at ikev2.c:1543)
Jun 13 20:09:03.798215: | #1 is idle
Jun 13 20:09:03.798220: | #1 idle
Jun 13 20:09:03.798226: | #1 in state PARENT_R2: received v2I2, PARENT SA established Jun 13 20:09:03.798233: | Unpacking clear payload for svm: R2: process INFORMATIONAL Request
Jun 13 20:09:03.798238: | Now let's proceed with payload (ISAKMP_NEXT_v2SK)
Jun 13 20:09:03.798245: | ***parse IKEv2 Encryption Payload:
Jun 13 20:09:03.798250: |    next payload type: ISAKMP_NEXT_v2NONE (0x0)
Jun 13 20:09:03.798255: |    flags: none (0x0)
Jun 13 20:09:03.798259: |    length: 48 (0x30)
Jun 13 20:09:03.798264: | processing payload: ISAKMP_NEXT_v2SK (len=48)
Jun 13 20:09:03.798383: | data for hmac: 68 40 cf 33 e4 13 6a 03 81 69 a2 ec 2c e3 e2 a2 Jun 13 20:09:03.798394: | data for hmac: 2e 20 25 08 00 00 00 28 00 00 00 4c 00 00 00 30 Jun 13 20:09:03.798398: | data for hmac: dd e2 a7 93 5c 22 4a 6a dd f8 8e a8 04 d1 16 28 Jun 13 20:09:03.798402: | data for hmac: 45 8c e3 3a 28 bf 0e 73 92 eb da 19 f7 1a 8e f2 Jun 13 20:09:03.798407: | calculated auth: 18 3c bd fa e1 e1 2d c4 93 83 e7 3c Jun 13 20:09:03.798411: | provided auth: 18 3c bd fa e1 e1 2d c4 93 83 e7 3c
Jun 13 20:09:03.798416: | authenticator matched
Jun 13 20:09:03.798448: | #1 ikev2 ISAKMP_v2_INFORMATIONAL decrypt success
Jun 13 20:09:03.798455: | selected state microcode R2: process INFORMATIONAL Request
Jun 13 20:09:03.798460: | Now lets proceed with state specific processing
Jun 13 20:09:03.798465: | calling processor R2: process INFORMATIONAL Request
Jun 13 20:09:03.798471: | an informational request should send a response
Jun 13 20:09:03.798476: | MOBIKE request: not updating IPsec SA
Jun 13 20:09:03.798496: | Received an INFORMATIONAL response, updating st_last_liveness, no pending_liveness
Jun 13 20:09:03.798506: | **emit ISAKMP Message:
Jun 13 20:09:03.798511: |    initiator cookie:
Jun 13 20:09:03.798516: |   68 40 cf 33  e4 13 6a 03
Jun 13 20:09:03.798521: |    responder cookie:
Jun 13 20:09:03.798526: |   81 69 a2 ec  2c e3 e2 a2
Jun 13 20:09:03.798531: |    next payload type: ISAKMP_NEXT_v2SK (0x2e)
Jun 13 20:09:03.798536: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Jun 13 20:09:03.798541: |    exchange type: ISAKMP_v2_INFORMATIONAL (0x25)
Jun 13 20:09:03.798546: |    flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20)
Jun 13 20:09:03.798551: |    message ID:  00 00 00 28
Jun 13 20:09:03.798558: | next payload type: saving message location 'ISAKMP Message' 'next payload type'
Jun 13 20:09:03.798564: | ***emit IKEv2 Encryption Payload:
Jun 13 20:09:03.798570: |    next payload type: ISAKMP_NEXT_v2NONE (0x0)
Jun 13 20:09:03.798575: |    flags: none (0x0)
Jun 13 20:09:03.798581: | next payload type: previous 'ISAKMP Message' 'next payload type' matches 'IKEv2 Encryption Payload' (46:ISAKMP_NEXT_v2SK) Jun 13 20:09:03.798586: | next payload type: saving payload location 'IKEv2 Encryption Payload' 'next payload type' Jun 13 20:09:03.798602: | emitting 16 raw bytes of IV into IKEv2 Encryption Payload Jun 13 20:09:03.798608: | IV fa 21 c1 e1 0d e2 0a 38 c0 8f 11 20 41 b3 6c 1e Jun 13 20:09:03.798614: | emitting 16 raw bytes of padding and length into cleartext Jun 13 20:09:03.798619: | padding and length 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Jun 13 20:09:03.798625: | emitting 12 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload
Jun 13 20:09:03.798644: | emitting length of IKEv2 Encryption Payload: 48
Jun 13 20:09:03.798650: | emitting length of ISAKMP Message: 76
Jun 13 20:09:03.798700: | data being hmac: 68 40 cf 33 e4 13 6a 03 81 69 a2 ec 2c e3 e2 a2 Jun 13 20:09:03.798710: | data being hmac: 2e 20 25 20 00 00 00 28 00 00 00 4c 00 00 00 30 Jun 13 20:09:03.798715: | data being hmac: fa 21 c1 e1 0d e2 0a 38 c0 8f 11 20 41 b3 6c 1e Jun 13 20:09:03.798718: | data being hmac: f1 87 2c be f7 f7 81 6e c7 d6 c6 08 c7 34 4b 4e
Jun 13 20:09:03.798722: | out calculated auth:
Jun 13 20:09:03.798726: |   df a2 38 22  6e 0e ef 44  90 ed f3 64
Jun 13 20:09:03.798742: | sending 76 bytes for reply packet for process_encrypted_informational_ikev2 through eth0:500 to 2001:8004:1400:20c9:1863:feff:fea4:d208:500 (using #1) Jun 13 20:09:03.798747: | 68 40 cf 33 e4 13 6a 03 81 69 a2 ec 2c e3 e2 a2 Jun 13 20:09:03.798751: | 2e 20 25 20 00 00 00 28 00 00 00 4c 00 00 00 30 Jun 13 20:09:03.798756: | fa 21 c1 e1 0d e2 0a 38 c0 8f 11 20 41 b3 6c 1e Jun 13 20:09:03.798759: | f1 87 2c be f7 f7 81 6e c7 d6 c6 08 c7 34 4b 4e
Jun 13 20:09:03.798765: |   df a2 38 22  6e 0e ef 44  90 ed f3 64
Jun 13 20:09:03.798946: | message ID #1 STATE_PARENT_R2 router-2.reub.net-ipv6 pst #1 st_msgid_nextuse(before=36) 36 st_msgid_lastack 4294967295 st_msgid_lastrecv 40 md is a request Jun 13 20:09:03.798968: | processing: [RE]START state #1 connection "router-2.reub.net-ipv6"[1] 2001:8004:1400:20c9:1863:feff:fea4:d208 2001:8004:1400:20c9:1863:feff:fea4:d208:500 (in complete_v2_state_transition() at ikev2.c:2787) Jun 13 20:09:03.798976: | #1 complete v2 state transition from STATE_PARENT_R2 with STF_OK Jun 13 20:09:03.798983: | message ID #1 STATE_PARENT_R2 router-2.reub.net-ipv6 pst #1 st_msgid_nextuse(before=36) 36 st_msgid_lastack 4294967295 st_msgid_lastrecv 40 md is a request Jun 13 20:09:03.798993: | processing: stop from 2001:8004:1400:20c9:1863:feff:fea4:d208:500 (BACKGROUND) (in process_md() at demux.c:393) Jun 13 20:09:03.799005: | processing: stop state #1 connection "router-2.reub.net-ipv6"[1] 2001:8004:1400:20c9:1863:feff:fea4:d208 2001:8004:1400:20c9:1863:feff:fea4:d208:500 (in process_md() at demux.c:395) Jun 13 20:09:03.799012: | serialno table: hash serialno #0 to head 0x562410880980 Jun 13 20:09:03.799017: | serialno table: hash serialno #0 to head 0x562410880980 Jun 13 20:09:03.799024: | processing: resume connection "router-2.reub.net-ipv6"[1] 2001:8004:1400:20c9:1863:feff:fea4:d208 (in process_md() at demux.c:395) Jun 13 20:09:03.799032: | processing: stop connection "router-2.reub.net-ipv6"[1] 2001:8004:1400:20c9:1863:feff:fea4:d208 (in process_md() at demux.c:396)
Jun 13 20:09:04.113877: |  kernel_process_msg_cb process netlink message
Jun 13 20:09:04.115823: | netlink_get: XFRM_MSG_DELPOLICY message
Jun 13 20:09:04.115908: | xfrm netlink address change RTM_NEWADDR msg len 72
Jun 13 20:09:05.738698: | *received 76 bytes from 2001:8004:1400:20c9:1863:feff:fea4:d208:500 on eth0 (port=500) Jun 13 20:09:05.739344: | 68 40 cf 33 e4 13 6a 03 81 69 a2 ec 2c e3 e2 a2 Jun 13 20:09:05.739383: | 2e 20 25 08 00 00 00 28 00 00 00 4c 00 00 00 30 Jun 13 20:09:05.739398: | dd e2 a7 93 5c 22 4a 6a dd f8 8e a8 04 d1 16 28 Jun 13 20:09:05.739411: | 45 8c e3 3a 28 bf 0e 73 92 eb da 19 f7 1a 8e f2
Jun 13 20:09:05.739424: |   18 3c bd fa  e1 e1 2d c4  93 83 e7 3c
Jun 13 20:09:05.739450: | processing: start from 2001:8004:1400:20c9:1863:feff:fea4:d208:500 (in process_md() at demux.c:391)
Jun 13 20:09:05.739471: | **parse ISAKMP Message:
Jun 13 20:09:05.739487: |    initiator cookie:
Jun 13 20:09:05.739500: |   68 40 cf 33  e4 13 6a 03
Jun 13 20:09:05.739513: |    responder cookie:
Jun 13 20:09:05.739526: |   81 69 a2 ec  2c e3 e2 a2
Jun 13 20:09:05.739539: |    next payload type: ISAKMP_NEXT_v2SK (0x2e)
Jun 13 20:09:05.739553: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Jun 13 20:09:05.739566: |    exchange type: ISAKMP_v2_INFORMATIONAL (0x25)
Jun 13 20:09:05.739580: |    flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
Jun 13 20:09:05.739622: |    message ID:  00 00 00 28
Jun 13 20:09:05.739636: |    length: 76 (0x4c)
Jun 13 20:09:05.739650: | processing version=2.0 packet with exchange type=ISAKMP_v2_INFORMATIONAL (37) Jun 13 20:09:05.739666: | I am receiving an IKEv2 Request ISAKMP_v2_INFORMATIONAL
Jun 13 20:09:05.739679: | I am the IKE SA Original Responder
Jun 13 20:09:05.739702: | cookies table: hash icookie 68 40 cf 33 e4 13 6a 03 rcookie 81 69 a2 ec 2c e3 e2 a2 to 12656043768357558533 slot 0x56241087a9c0
Jun 13 20:09:05.739717: | parent v2 peer and cookies match on #1
Jun 13 20:09:05.739730: | v2 state object #1 found, in STATE_PARENT_R2
Jun 13 20:09:05.739753: | processing: start state #1 connection "router-2.reub.net-ipv6"[1] 2001:8004:1400:20c9:1863:feff:fea4:d208 2001:8004:1400:20c9:1863:feff:fea4:d208:500 (in processed_retransmit() at ikev2.c:1187)
Jun 13 20:09:05.739769: | #1 is idle
Jun 13 20:09:05.739785: | #1 STATE_PARENT_R2: retransmits: retransmit response for message ID: 40 exchange ISAKMP_v2_INFORMATIONAL Jun 13 20:09:05.739804: | sending 76 bytes for ikev2-responder-retransmit through eth0:500 to 2001:8004:1400:20c9:1863:feff:fea4:d208:500 (using #1) Jun 13 20:09:05.739819: | 68 40 cf 33 e4 13 6a 03 81 69 a2 ec 2c e3 e2 a2 Jun 13 20:09:05.739832: | 2e 20 25 20 00 00 00 28 00 00 00 4c 00 00 00 30 Jun 13 20:09:05.739845: | fa 21 c1 e1 0d e2 0a 38 c0 8f 11 20 41 b3 6c 1e Jun 13 20:09:05.739857: | f1 87 2c be f7 f7 81 6e c7 d6 c6 08 c7 34 4b 4e
Jun 13 20:09:05.739869: |   df a2 38 22  6e 0e ef 44  90 ed f3 64
Jun 13 20:09:05.739964: | processing: stop from 2001:8004:1400:20c9:1863:feff:fea4:d208:500 (BACKGROUND) (in process_md() at demux.c:393) Jun 13 20:09:05.739998: | processing: stop state #1 connection "router-2.reub.net-ipv6"[1] 2001:8004:1400:20c9:1863:feff:fea4:d208 2001:8004:1400:20c9:1863:feff:fea4:d208:500 (in process_md() at demux.c:395) Jun 13 20:09:05.740014: | serialno table: hash serialno #0 to head 0x562410880980 Jun 13 20:09:05.740028: | serialno table: hash serialno #0 to head 0x562410880980 Jun 13 20:09:05.740042: | processing: STOP connection NULL (in process_md() at demux.c:396)
Jun 13 20:09:09.139826: |  kernel_process_msg_cb process netlink message
Jun 13 20:09:09.140242: | netlink_get: XFRM_MSG_DELPOLICY message
Jun 13 20:09:09.140358: | xfrm netlink address change RTM_NEWADDR msg len 72
Jun 13 20:09:12.399906: | timer_event_cb: processing event@0x562411ee3540
Jun 13 20:09:12.400286: | handling event EVENT_SHUNT_SCAN
Jun 13 20:09:12.400371: | expiring aged bare shunts from shunt table
Jun 13 20:09:12.400440: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x562411ecb210 Jun 13 20:09:12.400507: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jun 13 20:09:12.400581: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x562411ee3540
Jun 13 20:09:12.400647: | timer_event_cb: processing event@0x562411eeaf60
Jun 13 20:09:12.400713: | handling event EVENT_v2_LIVENESS for child state #2 Jun 13 20:09:12.400826: | processing: start state #2 connection "router-2.reub.net-ipv6"[1] 2001:8004:1400:20c9:1863:feff:fea4:d208 2001:8004:1400:20c9:1863:feff:fea4:d208:500 (in timer_event_cb() at timer.c:296) Jun 13 20:09:12.400914: | processing: [RE]START state #2 connection "router-2.reub.net-ipv6"[1] 2001:8004:1400:20c9:1863:feff:fea4:d208 2001:8004:1400:20c9:1863:feff:fea4:d208:500 (in liveness_check() at timer.c:114) Jun 13 20:09:12.400997: | serialno table: hash serialno #1 to head 0x5624108809a0 Jun 13 20:09:12.401072: | serialno table: hash serialno #1 to head 0x5624108809a0 Jun 13 20:09:12.401136: | serialno table: hash serialno #1 to head 0x5624108809a0 Jun 13 20:09:12.401201: | serialno table: hash serialno #1 to head 0x5624108809a0 Jun 13 20:09:12.401266: | get_sa_info esp:1d6f43e9@2400:8901::f03c:91ff:fe6e:9dc Jun 13 20:09:12.401362: | #2 liveness_check - peer 2001:8004:1400:20c9:1863:feff:fea4:d208 is ok schedule new Jun 13 20:09:12.401422: | event_schedule: new EVENT_v2_LIVENESS-pe@0x562411ee3540 Jun 13 20:09:12.401477: | inserting event EVENT_v2_LIVENESS, timeout in 15.000 seconds for #2 Jun 13 20:09:12.401567: | free_event_entry: release EVENT_v2_LIVENESS-pe@0x562411eeaf60 Jun 13 20:09:12.401628: | processing: stop state #2 connection "router-2.reub.net-ipv6"[1] 2001:8004:1400:20c9:1863:feff:fea4:d208 2001:8004:1400:20c9:1863:feff:fea4:d208:500 (in timer_event_cb() at timer.c:641) Jun 13 20:09:12.401682: | serialno table: hash serialno #0 to head 0x562410880980 Jun 13 20:09:12.401733: | serialno table: hash serialno #0 to head 0x562410880980 Jun 13 20:09:12.490503: | NAT-T keep-alive (boggus ?) should not reach this point. Ignored. Sender: 2001:8004:1400:20c9:1863:feff:fea4:d208:500
Jun 13 20:09:14.155455: |  kernel_process_msg_cb process netlink message
Jun 13 20:09:14.155831: | netlink_get: XFRM_MSG_DELPOLICY message
Jun 13 20:09:14.161263: | xfrm netlink address change RTM_NEWADDR msg len 72
Jun 13 20:09:19.167250: |  kernel_process_msg_cb process netlink message
Jun 13 20:09:19.167502: | netlink_get: XFRM_MSG_DELPOLICY message
Jun 13 20:09:19.181616: | xfrm netlink address change RTM_NEWADDR msg len 72
Jun 13 20:09:20.997768: | *received 76 bytes from 2001:8004:1400:20c9:1863:feff:fea4:d208:500 on eth0 (port=500) Jun 13 20:09:20.998119: | 68 40 cf 33 e4 13 6a 03 81 69 a2 ec 2c e3 e2 a2 Jun 13 20:09:20.998202: | 2e 20 25 08 00 00 00 29 00 00 00 4c 00 00 00 30 Jun 13 20:09:20.998260: | e7 7f a7 57 a8 12 9f d7 60 8a 1f 10 7b 45 74 6a Jun 13 20:09:20.998344: | f2 3d 5e 5e fe 87 83 20 e3 f7 8f f2 d9 ef c3 f6
Jun 13 20:09:20.998404: |   f3 71 5d f4  61 c7 08 49  b6 de 1c 5b
Jun 13 20:09:20.998469: | processing: start from 2001:8004:1400:20c9:1863:feff:fea4:d208:500 (in process_md() at demux.c:391)
Jun 13 20:09:20.998530: | **parse ISAKMP Message:
Jun 13 20:09:20.998587: |    initiator cookie:
Jun 13 20:09:20.998640: |   68 40 cf 33  e4 13 6a 03
Jun 13 20:09:20.998692: |    responder cookie:
Jun 13 20:09:20.998740: |   81 69 a2 ec  2c e3 e2 a2
Jun 13 20:09:20.998800: |    next payload type: ISAKMP_NEXT_v2SK (0x2e)
Jun 13 20:09:20.998916: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Jun 13 20:09:20.998982: |    exchange type: ISAKMP_v2_INFORMATIONAL (0x25)
Jun 13 20:09:20.999044: |    flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
Jun 13 20:09:20.999096: |    message ID:  00 00 00 29
Jun 13 20:09:20.999146: |    length: 76 (0x4c)
Jun 13 20:09:20.999196: | processing version=2.0 packet with exchange type=ISAKMP_v2_INFORMATIONAL (37) Jun 13 20:09:20.999250: | I am receiving an IKEv2 Request ISAKMP_v2_INFORMATIONAL
Jun 13 20:09:20.999300: | I am the IKE SA Original Responder
Jun 13 20:09:20.999358: | cookies table: hash icookie 68 40 cf 33 e4 13 6a 03 rcookie 81 69 a2 ec 2c e3 e2 a2 to 12656043768357558533 slot 0x56241087a9c0
Jun 13 20:09:20.999410: | parent v2 peer and cookies match on #1
Jun 13 20:09:20.999459: | v2 state object #1 found, in STATE_PARENT_R2
Jun 13 20:09:20.999520: | processing: start state #1 connection "router-2.reub.net-ipv6"[1] 2001:8004:1400:20c9:1863:feff:fea4:d208 2001:8004:1400:20c9:1863:feff:fea4:d208:500 (in processed_retransmit() at ikev2.c:1187)
Jun 13 20:09:20.999575: | found state #1
Jun 13 20:09:20.999630: | processing: [RE]START state #1 connection "router-2.reub.net-ipv6"[1] 2001:8004:1400:20c9:1863:feff:fea4:d208 2001:8004:1400:20c9:1863:feff:fea4:d208:500 (in ikev2_process_packet() at ikev2.c:1538) Jun 13 20:09:20.999686: | processing: start connection "router-2.reub.net-ipv6"[1] 2001:8004:1400:20c9:1863:feff:fea4:d208 (BACKGROUND) (in ikev2_process_packet() at ikev2.c:1543)
Jun 13 20:09:20.999739: | #1 is idle
Jun 13 20:09:20.999788: | #1 idle
Jun 13 20:09:20.999836: | #1 in state PARENT_R2: received v2I2, PARENT SA established Jun 13 20:09:20.999899: | Unpacking clear payload for svm: R2: process INFORMATIONAL Request
Jun 13 20:09:20.999956: | Now let's proceed with payload (ISAKMP_NEXT_v2SK)
Jun 13 20:09:21.000008: | ***parse IKEv2 Encryption Payload:
Jun 13 20:09:21.000059: |    next payload type: ISAKMP_NEXT_v2NONE (0x0)
Jun 13 20:09:21.000109: |    flags: none (0x0)
Jun 13 20:09:21.000159: |    length: 48 (0x30)
Jun 13 20:09:21.000238: | processing payload: ISAKMP_NEXT_v2SK (len=48)
Jun 13 20:09:21.000387: | data for hmac: 68 40 cf 33 e4 13 6a 03 81 69 a2 ec 2c e3 e2 a2 Jun 13 20:09:21.000447: | data for hmac: 2e 20 25 08 00 00 00 29 00 00 00 4c 00 00 00 30 Jun 13 20:09:21.000497: | data for hmac: e7 7f a7 57 a8 12 9f d7 60 8a 1f 10 7b 45 74 6a Jun 13 20:09:21.000547: | data for hmac: f2 3d 5e 5e fe 87 83 20 e3 f7 8f f2 d9 ef c3 f6 Jun 13 20:09:21.000596: | calculated auth: f3 71 5d f4 61 c7 08 49 b6 de 1c 5b Jun 13 20:09:21.000645: | provided auth: f3 71 5d f4 61 c7 08 49 b6 de 1c 5b
Jun 13 20:09:21.000694: | authenticator matched
Jun 13 20:09:21.000802: | #1 ikev2 ISAKMP_v2_INFORMATIONAL decrypt success
Jun 13 20:09:21.000856: | selected state microcode R2: process INFORMATIONAL Request
Jun 13 20:09:21.000912: | Now lets proceed with state specific processing
Jun 13 20:09:21.000958: | calling processor R2: process INFORMATIONAL Request
Jun 13 20:09:21.001002: | an informational request should send a response
Jun 13 20:09:21.001046: | MOBIKE request: not updating IPsec SA
Jun 13 20:09:21.001108: | Received an INFORMATIONAL response, updating st_last_liveness, no pending_liveness
Jun 13 20:09:21.001156: | **emit ISAKMP Message:
Jun 13 20:09:21.001202: |    initiator cookie:
Jun 13 20:09:21.001251: |   68 40 cf 33  e4 13 6a 03
Jun 13 20:09:21.001303: |    responder cookie:
Jun 13 20:09:21.001367: |   81 69 a2 ec  2c e3 e2 a2
Jun 13 20:09:21.001425: |    next payload type: ISAKMP_NEXT_v2SK (0x2e)
Jun 13 20:09:21.001489: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Jun 13 20:09:21.001552: |    exchange type: ISAKMP_v2_INFORMATIONAL (0x25)
Jun 13 20:09:21.001614: |    flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20)
Jun 13 20:09:21.001675: |    message ID:  00 00 00 29
Jun 13 20:09:21.001747: | next payload type: saving message location 'ISAKMP Message' 'next payload type'
Jun 13 20:09:21.001809: | ***emit IKEv2 Encryption Payload:
Jun 13 20:09:21.001865: |    next payload type: ISAKMP_NEXT_v2NONE (0x0)
Jun 13 20:09:21.001940: |    flags: none (0x0)
Jun 13 20:09:21.001992: | next payload type: previous 'ISAKMP Message' 'next payload type' matches 'IKEv2 Encryption Payload' (46:ISAKMP_NEXT_v2SK) Jun 13 20:09:21.002038: | next payload type: saving payload location 'IKEv2 Encryption Payload' 'next payload type' Jun 13 20:09:21.002107: | emitting 16 raw bytes of IV into IKEv2 Encryption Payload Jun 13 20:09:21.002155: | IV 58 6e 1c db 0e 93 a6 26 64 a4 3e ac e4 b7 e4 4d Jun 13 20:09:21.002243: | emitting 16 raw bytes of padding and length into cleartext Jun 13 20:09:21.002290: | padding and length 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Jun 13 20:09:21.002336: | emitting 12 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload
Jun 13 20:09:21.002381: | emitting length of IKEv2 Encryption Payload: 48
Jun 13 20:09:21.002424: | emitting length of ISAKMP Message: 76
Jun 13 20:09:21.002555: | data being hmac: 68 40 cf 33 e4 13 6a 03 81 69 a2 ec 2c e3 e2 a2 Jun 13 20:09:21.002613: | data being hmac: 2e 20 25 20 00 00 00 29 00 00 00 4c 00 00 00 30 Jun 13 20:09:21.002667: | data being hmac: 58 6e 1c db 0e 93 a6 26 64 a4 3e ac e4 b7 e4 4d Jun 13 20:09:21.002724: | data being hmac: f0 92 79 4c 9c 3a 58 ac 47 84 2c 4a f0 0b fe 0e
Jun 13 20:09:21.002776: | out calculated auth:
Jun 13 20:09:21.002830: |   f2 7e 93 f5  7c b7 bd 05  53 90 1a 0a
Jun 13 20:09:21.002922: | sending 76 bytes for reply packet for process_encrypted_informational_ikev2 through eth0:500 to 2001:8004:1400:20c9:1863:feff:fea4:d208:500 (using #1) Jun 13 20:09:21.002984: | 68 40 cf 33 e4 13 6a 03 81 69 a2 ec 2c e3 e2 a2 Jun 13 20:09:21.003038: | 2e 20 25 20 00 00 00 29 00 00 00 4c 00 00 00 30 Jun 13 20:09:21.003099: | 58 6e 1c db 0e 93 a6 26 64 a4 3e ac e4 b7 e4 4d Jun 13 20:09:21.003159: | f0 92 79 4c 9c 3a 58 ac 47 84 2c 4a f0 0b fe 0e
Jun 13 20:09:21.003216: |   f2 7e 93 f5  7c b7 bd 05  53 90 1a 0a
Jun 13 20:09:21.003481: | message ID #1 STATE_PARENT_R2 router-2.reub.net-ipv6 pst #1 st_msgid_nextuse(before=36) 36 st_msgid_lastack 4294967295 st_msgid_lastrecv 41 md is a request Jun 13 20:09:21.003595: | processing: [RE]START state #1 connection "router-2.reub.net-ipv6"[1] 2001:8004:1400:20c9:1863:feff:fea4:d208 2001:8004:1400:20c9:1863:feff:fea4:d208:500 (in complete_v2_state_transition() at ikev2.c:2787) Jun 13 20:09:21.003655: | #1 complete v2 state transition from STATE_PARENT_R2 with STF_OK Jun 13 20:09:21.003720: | message ID #1 STATE_PARENT_R2 router-2.reub.net-ipv6 pst #1 st_msgid_nextuse(before=36) 36 st_msgid_lastack 4294967295 st_msgid_lastrecv 41 md is a request Jun 13 20:09:21.003783: | processing: stop from 2001:8004:1400:20c9:1863:feff:fea4:d208:500 (BACKGROUND) (in process_md() at demux.c:393) Jun 13 20:09:21.003847: | processing: stop state #1 connection "router-2.reub.net-ipv6"[1] 2001:8004:1400:20c9:1863:feff:fea4:d208 2001:8004:1400:20c9:1863:feff:fea4:d208:500 (in process_md() at demux.c:395) Jun 13 20:09:21.003922: | serialno table: hash serialno #0 to head 0x562410880980 Jun 13 20:09:21.003979: | serialno table: hash serialno #0 to head 0x562410880980

Thanks,
Reuben

_______________________________________________
Swan-dev mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan-dev

Reply via email to