Hi folks,
left side is strongswan 5.3.5 on Debian, right side is a
road warrior macbook running MacOS 10.11.3. There is a
NAT gateway & firewall on both sides.
If the IPsec connection is activated and the mac is put to
sleep, then strongswan drops the connection after some
minutes. Problem: When the mac is woken up again, then quite
often IKEv1 seems to fail. After entering the screen lock
password the road warrior has to wait for a minute, then
he is authenticated using cached information. The mac shows
an error popup with "connection failed". The road warrior
has to explicitly click on [connect example IPsec] to get a
new connection.
Log file is attached. Please note that there are several
messages "received retransmit of request with ID 2615585018,
but no response to retransmit" near the end, before the mac
gives up. Google told me that this happened before, but it
was supposed to be fixed with strongswan 5.3.
Every helpful comment is highly appreciated
Harri
config setup
charondebug="dmn 2, mgr 2, ike 3, chd 2, cfg 3, net 2"
conn %default
left = gate1.example.com
leftcert = gate1.example.com.pem
leftsendcert = always
leftsubnet = 172.19.96.0/19
leftfirewall = yes
ikelifetime = 3h
lifetime = 1h
rekey = yes
dpdaction = hold
dpddelay = 30s
#
# IKEv2 using RSA authentication
conn IPSec-IKEv2
keyexchange = ikev2
ike =
aes256-sha256-modp2048,aes256-sha1-modp1024,aes128-sha1-modp1024!
esp =
aes256-sha256-modp2048,aes256-sha1-modp1024,aes128-sha1-modp1024,aes256-sha256,aes256-sha1,aes128-sha1!
right = %any
rightauth = pubkey
rightsendcert = ifasked
rightsourceip = %dhcp
# fragmentation = yes
auto = add
#
# IKEv1 using xauth (i.e. enter password)
conn CiscoIPSec
keyexchange = ikev1
ike = aes256-sha1-modp1536!
esp = aes256-sha1!
rightauth = pubkey
right = %any
rightsourceip = %dhcp
rightauth2 = xauth
auto = add
Mar 7 07:37:36 srvl047 ipsec[30549]: 18[CFG] 624: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
Mar 7 07:37:36 srvl047 ipsec[30549]: 18[CFG] 640: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
Mar 7 07:37:36 srvl047 ipsec[30549]: 18[CFG] 656: 00 00 ..
Mar 7 07:37:41 srvl047 charon: 11[MGR] checkout IKE_SA
Mar 7 07:37:46 srvl047 charon: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:37:46 srvl047 charon: 02[NET] waiting for data on sockets
Mar 7 07:37:46 srvl047 charon: 06[MGR] checkout IKE_SA by message
Mar 7 07:37:46 srvl047 charon: 06[MGR] created IKE_SA (unnamed)[9]
Mar 7 07:37:46 srvl047 charon: 06[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (668 bytes)
Mar 7 07:37:46 srvl047 charon: 06[ENC] parsed ID_PROT request 0 [ SA V V V V V V V V V V V V V V ]
Mar 7 07:37:46 srvl047 charon: 06[CFG] looking for an ike config for 10.0.0.17...10.0.0.13
Mar 7 07:37:46 srvl047 charon: 06[CFG] ike config match: 0 (10.0.0.17 10.0.0.13 IKEv1)
Mar 7 07:37:46 srvl047 charon: 06[CFG] ike config match: 0 (10.0.0.17 10.0.0.13 IKEv1)
Mar 7 07:37:46 srvl047 charon: 06[CFG] ike config match: 1052 (10.0.0.17 10.0.0.13 IKEv1)
Mar 7 07:37:46 srvl047 charon: 06[CFG] candidate: gate1.example.com...%any, prio 1052
Mar 7 07:37:46 srvl047 charon: 06[CFG] ike config match: 1052 (10.0.0.17 10.0.0.13 IKEv1)
Mar 7 07:37:46 srvl047 charon: 06[CFG] candidate: gate1.example.com...%any, prio 1052
Mar 7 07:37:46 srvl047 charon: 06[CFG] ike config match: 0 (10.0.0.17 10.0.0.13 IKEv1)
Mar 7 07:37:46 srvl047 charon: 06[CFG] found matching ike config: gate1.example.com...%any with prio 1052
Mar 7 07:37:46 srvl047 charon: 06[IKE] received NAT-T (RFC 3947) vendor ID
Mar 7 07:37:46 srvl047 charon: 06[IKE] received draft-ietf-ipsec-nat-t-ike vendor ID
Mar 7 07:37:46 srvl047 charon: 06[IKE] received draft-ietf-ipsec-nat-t-ike-08 vendor ID
Mar 7 07:37:46 srvl047 charon: 06[IKE] received draft-ietf-ipsec-nat-t-ike-07 vendor ID
Mar 7 07:37:46 srvl047 charon: 06[IKE] received draft-ietf-ipsec-nat-t-ike-06 vendor ID
Mar 7 07:37:46 srvl047 charon: 06[IKE] received draft-ietf-ipsec-nat-t-ike-05 vendor ID
Mar 7 07:37:46 srvl047 charon: 06[IKE] received draft-ietf-ipsec-nat-t-ike-04 vendor ID
Mar 7 07:37:46 srvl047 charon: 06[IKE] received draft-ietf-ipsec-nat-t-ike-03 vendor ID
Mar 7 07:37:46 srvl047 charon: 06[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor ID
Mar 7 07:37:46 srvl047 charon: 06[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
Mar 7 07:37:46 srvl047 charon: 06[IKE] received XAuth vendor ID
Mar 7 07:37:46 srvl047 charon: 06[IKE] received Cisco Unity vendor ID
Mar 7 07:37:46 srvl047 charon: 06[IKE] received FRAGMENTATION vendor ID
Mar 7 07:37:46 srvl047 charon: 06[IKE] received DPD vendor ID
Mar 7 07:37:46 srvl047 charon: 06[IKE] 10.0.0.13 is initiating a Main Mode IKE_SA
Mar 7 07:37:46 srvl047 charon: 06[IKE] IKE_SA (unnamed)[9] state change: CREATED => CONNECTING
Mar 7 07:37:46 srvl047 charon: 06[CFG] selecting proposal:
Mar 7 07:37:46 srvl047 charon: 06[CFG] proposal matches
Mar 7 07:37:46 srvl047 charon: 06[CFG] received proposals: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536, IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1536, IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024, IKE:AES_CBC_128/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024, IKE:DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024
Mar 7 07:37:46 srvl047 charon: 06[CFG] configured proposals: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536
Mar 7 07:37:46 srvl047 charon: 06[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536
Mar 7 07:37:46 srvl047 charon: 06[IKE] sending strongSwan vendor ID
Mar 7 07:37:46 srvl047 charon: 06[IKE] sending XAuth vendor ID
Mar 7 07:37:46 srvl047 charon: 06[IKE] sending DPD vendor ID
Mar 7 07:37:46 srvl047 charon: 06[IKE] sending NAT-T (RFC 3947) vendor ID
Mar 7 07:37:46 srvl047 charon: 06[ENC] generating ID_PROT response 0 [ SA V V V V ]
Mar 7 07:37:46 srvl047 charon: 06[NET] sending packet: from 10.0.0.17[4500] to 10.0.0.13[59979] (156 bytes)
Mar 7 07:37:46 srvl047 charon: 06[MGR] checkin IKE_SA (unnamed)[9]
Mar 7 07:37:46 srvl047 charon: 04[NET] sending packet: from 10.0.0.17[4500] to 10.0.0.13[59979]
Mar 7 07:37:46 srvl047 charon: 06[MGR] check-in of IKE_SA successful.
Mar 7 07:37:46 srvl047 ipsec[30549]: 18[CFG] proposing traffic selectors for us:
Mar 7 07:37:46 srvl047 ipsec[30549]: 18[CFG] 172.19.96.0/19
Mar 7 07:37:47 srvl047 ipsec[30549]: 18[CFG] proposing traffic selectors for other:
Mar 7 07:37:47 srvl047 ipsec[30549]: 18[CFG] dynamic
Mar 7 07:37:47 srvl047 ipsec[30549]: 18[CFG] proposing traffic selectors for us:
Mar 7 07:37:47 srvl047 ipsec[30549]: 18[CFG] 172.19.96.0/19
Mar 7 07:37:47 srvl047 ipsec[30549]: 18[CFG] proposing traffic selectors for other:
Mar 7 07:37:47 srvl047 ipsec[30549]: 18[CFG] dynamic
Mar 7 07:37:47 srvl047 ipsec[30549]: 18[CFG] proposing traffic selectors for us:
Mar 7 07:37:47 srvl047 ipsec[30549]: 18[CFG] 172.19.96.0/19
Mar 7 07:37:47 srvl047 ipsec[30549]: 18[CFG] proposing traffic selectors for other:
Mar 7 07:37:47 srvl047 ipsec[30549]: 18[CFG] dynamic
Mar 7 07:37:47 srvl047 ipsec[30549]: 18[CFG] proposing traffic selectors for us:
Mar 7 07:37:47 srvl047 ipsec[30549]: 18[CFG] 172.19.96.0/19
Mar 7 07:37:47 srvl047 ipsec[30549]: 18[CFG] proposing traffic selectors for other:
Mar 7 07:37:47 srvl047 ipsec[30549]: 18[CFG] dynamic
Mar 7 07:37:47 srvl047 ipsec[30549]: 11[MGR] checkout IKE_SA
Mar 7 07:37:47 srvl047 ipsec[30549]: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:37:47 srvl047 ipsec[30549]: 02[NET] waiting for data on sockets
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[MGR] checkout IKE_SA by message
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[MGR] created IKE_SA (unnamed)[9]
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (668 bytes)
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[ENC] parsed ID_PROT request 0 [ SA V V V V V V V V V V V V V V ]
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[CFG] looking for an ike config for 10.0.0.17...10.0.0.13
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[CFG] ike config match: 0 (10.0.0.17 10.0.0.13 IKEv1)
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[CFG] ike config match: 0 (10.0.0.17 10.0.0.13 IKEv1)
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[CFG] ike config match: 1052 (10.0.0.17 10.0.0.13 IKEv1)
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[CFG] candidate: gate1.example.com...%any, prio 1052
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[CFG] ike config match: 1052 (10.0.0.17 10.0.0.13 IKEv1)
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[CFG] candidate: gate1.example.com...%any, prio 1052
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[CFG] ike config match: 0 (10.0.0.17 10.0.0.13 IKEv1)
Mar 7 07:37:47 srvl047 charon: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:37:47 srvl047 charon: 02[NET] waiting for data on sockets
Mar 7 07:37:47 srvl047 charon: 05[MGR] checkout IKE_SA by message
Mar 7 07:37:47 srvl047 charon: 05[MGR] IKE_SA (unnamed)[9] successfully checked out
Mar 7 07:37:47 srvl047 charon: 05[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (292 bytes)
Mar 7 07:37:47 srvl047 charon: 05[ENC] parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
Mar 7 07:37:47 srvl047 charon: 05[IKE] natd_chunk => 22 bytes @ 0x7f9adabb9b70
Mar 7 07:37:47 srvl047 charon: 05[IKE] 0: 71 B0 AF 52 48 A2 AB F0 11 20 DC B4 C4 08 97 C3 q..RH.... ......
Mar 7 07:37:47 srvl047 charon: 05[IKE] 16: 05 91 8E 11 11 94 ......
Mar 7 07:37:47 srvl047 charon: 05[IKE] natd_hash => 20 bytes @ 0x7f9aac003a60
Mar 7 07:37:47 srvl047 charon: 05[IKE] 0: 90 A7 84 EC 7D 4A 22 57 95 F4 FB 96 51 62 11 F8 ....}J"W....Qb..
Mar 7 07:37:47 srvl047 charon: 05[IKE] 16: 5C 12 6F 2A \.o*
Mar 7 07:37:47 srvl047 charon: 05[IKE] natd_chunk => 22 bytes @ 0x7f9adabb9b70
Mar 7 07:37:47 srvl047 charon: 05[IKE] 0: 71 B0 AF 52 48 A2 AB F0 11 20 DC B4 C4 08 97 C3 q..RH.... ......
Mar 7 07:37:47 srvl047 charon: 05[IKE] 16: 05 91 8E 0D EA 4B .....K
Mar 7 07:37:47 srvl047 charon: 05[IKE] natd_hash => 20 bytes @ 0x7f9aac003a80
Mar 7 07:37:47 srvl047 charon: 05[IKE] 0: FD D0 75 C9 4A 4B 05 2D 66 02 A3 47 59 EA E2 B2 ..u.JK.-f..GY...
Mar 7 07:37:47 srvl047 charon: 05[IKE] 16: D5 0E B1 E4 ....
Mar 7 07:37:47 srvl047 charon: 05[IKE] precalculated src_hash => 20 bytes @ 0x7f9aac003a80
Mar 7 07:37:47 srvl047 charon: 05[IKE] 0: FD D0 75 C9 4A 4B 05 2D 66 02 A3 47 59 EA E2 B2 ..u.JK.-f..GY...
Mar 7 07:37:47 srvl047 charon: 05[IKE] 16: D5 0E B1 E4 ....
Mar 7 07:37:47 srvl047 charon: 05[IKE] precalculated dst_hash => 20 bytes @ 0x7f9aac003a60
Mar 7 07:37:47 srvl047 charon: 05[IKE] 0: 90 A7 84 EC 7D 4A 22 57 95 F4 FB 96 51 62 11 F8 ....}J"W....Qb..
Mar 7 07:37:47 srvl047 charon: 05[IKE] 16: 5C 12 6F 2A \.o*
Mar 7 07:37:47 srvl047 charon: 05[IKE] received dst_hash => 20 bytes @ 0x7f9aac003d60
Mar 7 07:37:47 srvl047 charon: 05[IKE] 0: 90 A7 84 EC 7D 4A 22 57 95 F4 FB 96 51 62 11 F8 ....}J"W....Qb..
Mar 7 07:37:47 srvl047 charon: 05[IKE] 16: 5C 12 6F 2A \.o*
Mar 7 07:37:47 srvl047 charon: 05[IKE] received src_hash => 20 bytes @ 0x7f9aac003e20
Mar 7 07:37:47 srvl047 charon: 05[IKE] 0: 90 F9 15 7D 2F 14 3A A6 13 57 C5 E9 54 DA 78 74 ...}/.:..W..T.xt
Mar 7 07:37:47 srvl047 charon: 05[IKE] 16: CD 13 0A 6A ...j
Mar 7 07:37:47 srvl047 charon: 05[IKE] remote host is behind NAT
Mar 7 07:37:47 srvl047 charon: 05[IKE] sending cert request for "C=DE, O=example AG, OU=example Certificate Authority, CN=example Root CA"
Mar 7 07:37:47 srvl047 charon: 05[IKE] sending cert request for "C=DE, ST=NRW, L=Springfield, O=example AG, OU=TI, CN=IPsec_ca, [email protected]"
Mar 7 07:37:47 srvl047 charon: 05[IKE] sending cert request for "C=DE, O=example AG, OU=example Certificate Authority, CN=ws-example-CA"
Mar 7 07:37:47 srvl047 charon: 05[IKE] natd_chunk => 22 bytes @ 0x7f9adabb9b90
Mar 7 07:37:47 srvl047 charon: 05[IKE] 0: 71 B0 AF 52 48 A2 AB F0 11 20 DC B4 C4 08 97 C3 q..RH.... ......
Mar 7 07:37:47 srvl047 charon: 05[IKE] 16: 05 91 8E 0D EA 4B .....K
Mar 7 07:37:47 srvl047 charon: 05[IKE] natd_hash => 20 bytes @ 0x7f9aac003a80
Mar 7 07:37:47 srvl047 charon: 05[IKE] 0: FD D0 75 C9 4A 4B 05 2D 66 02 A3 47 59 EA E2 B2 ..u.JK.-f..GY...
Mar 7 07:37:47 srvl047 charon: 05[IKE] 16: D5 0E B1 E4 ....
Mar 7 07:37:47 srvl047 charon: 05[IKE] natd_chunk => 22 bytes @ 0x7f9adabb9b90
Mar 7 07:37:47 srvl047 charon: 05[IKE] 0: 71 B0 AF 52 48 A2 AB F0 11 20 DC B4 C4 08 97 C3 q..RH.... ......
Mar 7 07:37:47 srvl047 charon: 05[IKE] 16: 05 91 8E 11 11 94 ......
Mar 7 07:37:47 srvl047 charon: 05[IKE] natd_hash => 20 bytes @ 0x7f9aac0047f0
Mar 7 07:37:47 srvl047 charon: 05[IKE] 0: 90 A7 84 EC 7D 4A 22 57 95 F4 FB 96 51 62 11 F8 ....}J"W....Qb..
Mar 7 07:37:47 srvl047 charon: 05[IKE] 16: 5C 12 6F 2A \.o*
Mar 7 07:37:47 srvl047 charon: 05[ENC] generating ID_PROT response 0 [ KE No CERTREQ CERTREQ CERTREQ NAT-D NAT-D ]
Mar 7 07:37:47 srvl047 charon: 05[NET] sending packet: from 10.0.0.17[4500] to 10.0.0.13[59979] (653 bytes)
Mar 7 07:37:47 srvl047 charon: 05[MGR] checkin IKE_SA (unnamed)[9]
Mar 7 07:37:47 srvl047 charon: 04[NET] sending packet: from 10.0.0.17[4500] to 10.0.0.13[59979]
Mar 7 07:37:47 srvl047 charon: 05[MGR] check-in of IKE_SA successful.
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[CFG] found matching ike config: gate1.example.com...%any with prio 1052
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[IKE] received NAT-T (RFC 3947) vendor ID
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[IKE] received draft-ietf-ipsec-nat-t-ike vendor ID
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[IKE] received draft-ietf-ipsec-nat-t-ike-08 vendor ID
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[IKE] received draft-ietf-ipsec-nat-t-ike-07 vendor ID
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[IKE] received draft-ietf-ipsec-nat-t-ike-06 vendor ID
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[IKE] received draft-ietf-ipsec-nat-t-ike-05 vendor ID
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[IKE] received draft-ietf-ipsec-nat-t-ike-04 vendor ID
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[IKE] received draft-ietf-ipsec-nat-t-ike-03 vendor ID
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor ID
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[IKE] received XAuth vendor ID
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[IKE] received Cisco Unity vendor ID
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[IKE] received FRAGMENTATION vendor ID
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[IKE] received DPD vendor ID
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[IKE] 10.0.0.13 is initiating a Main Mode IKE_SA
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[IKE] IKE_SA (unnamed)[9] state change: CREATED => CONNECTING
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[CFG] selecting proposal:
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[CFG] proposal matches
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[CFG] received proposals: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536, IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1536, IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024, IKE:AES_CBC_128/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024, IKE:DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[CFG] configured proposals: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[IKE] sending strongSwan vendor ID
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[IKE] sending XAuth vendor ID
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[IKE] sending DPD vendor ID
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[IKE] sending NAT-T (RFC 3947) vendor ID
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[ENC] generating ID_PROT response 0 [ SA V V V V ]
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[NET] sending packet: from 10.0.0.17[4500] to 10.0.0.13[59979] (156 bytes)
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[MGR] checkin IKE_SA (unnamed)[9]
Mar 7 07:37:47 srvl047 ipsec[30549]: 04[NET] sending packet: from 10.0.0.17[4500] to 10.0.0.13[59979]
Mar 7 07:37:47 srvl047 ipsec[30549]: 06[MGR] check-in of IKE_SA successful.
Mar 7 07:37:47 srvl047 charon: 10[MGR] checkout IKE_SA
Mar 7 07:37:47 srvl047 charon: 10[MGR] IKE_SA CiscoIPSec[1] successfully checked out
Mar 7 07:37:47 srvl047 charon: 10[MGR] checkin IKE_SA CiscoIPSec[1]
Mar 7 07:37:47 srvl047 charon: 10[MGR] check-in of IKE_SA successful.
Mar 7 07:37:47 srvl047 charon: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:37:47 srvl047 charon: 02[NET] waiting for data on sockets
Mar 7 07:37:47 srvl047 charon: 09[MGR] checkout IKE_SA by message
Mar 7 07:37:47 srvl047 charon: 09[MGR] IKE_SA (unnamed)[9] successfully checked out
Mar 7 07:37:47 srvl047 charon: 09[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (2220 bytes)
Mar 7 07:37:47 srvl047 charon: 09[ENC] parsed ID_PROT request 0 [ ID CERT SIG CERTREQ ]
Mar 7 07:37:47 srvl047 charon: 09[IKE] ignoring certificate request without data
Mar 7 07:37:47 srvl047 charon: 09[IKE] received end entity cert "C=DE, O=example AG, OU=TI, CN=ppcm018.ws.example.com"
Mar 7 07:37:47 srvl047 charon: 09[CFG] looking for XAuthInitRSA peer configs matching 10.0.0.17...10.0.0.13[C=DE, O=example AG, OU=TI, CN=ppcm018.ws.example.com]
Mar 7 07:37:47 srvl047 charon: 09[CFG] peer config match local: 1 (ID_ANY)
Mar 7 07:37:47 srvl047 charon: 09[CFG] peer config match remote: 1 (ID_DER_ASN1_DN -> 30:4d:31:0b:30:09:06:03:55:04:06:13:02:44:45:31:12:30:10:06:03:55:04:0a:13:09:61:69:78:69:67:6f:20:41:47:31:0b:30:09:06:03:55:04:0b:13:02:54:49:31:1d:30:1b:06:03:55:04:03:13:14:70:70:63:6d:30:31:38:2e:77:73:2e:61:69:78:69:67:6f:2e:64:65)
Mar 7 07:37:47 srvl047 charon: 09[CFG] ike config match: 0 (10.0.0.17 10.0.0.13 IKEv1)
Mar 7 07:37:47 srvl047 charon: 09[CFG] peer config match local: 1 (ID_ANY)
Mar 7 07:37:47 srvl047 charon: 09[CFG] peer config match remote: 1 (ID_DER_ASN1_DN -> 30:4d:31:0b:30:09:06:03:55:04:06:13:02:44:45:31:12:30:10:06:03:55:04:0a:13:09:61:69:78:69:67:6f:20:41:47:31:0b:30:09:06:03:55:04:0b:13:02:54:49:31:1d:30:1b:06:03:55:04:03:13:14:70:70:63:6d:30:31:38:2e:77:73:2e:61:69:78:69:67:6f:2e:64:65)
Mar 7 07:37:47 srvl047 charon: 09[CFG] ike config match: 0 (10.0.0.17 10.0.0.13 IKEv1)
Mar 7 07:37:47 srvl047 charon: 09[CFG] peer config match local: 1 (ID_ANY)
Mar 7 07:37:47 srvl047 charon: 09[CFG] peer config match remote: 1 (ID_DER_ASN1_DN -> 30:4d:31:0b:30:09:06:03:55:04:06:13:02:44:45:31:12:30:10:06:03:55:04:0a:13:09:61:69:78:69:67:6f:20:41:47:31:0b:30:09:06:03:55:04:0b:13:02:54:49:31:1d:30:1b:06:03:55:04:03:13:14:70:70:63:6d:30:31:38:2e:77:73:2e:61:69:78:69:67:6f:2e:64:65)
Mar 7 07:37:47 srvl047 charon: 09[CFG] ike config match: 1052 (10.0.0.17 10.0.0.13 IKEv1)
Mar 7 07:37:47 srvl047 charon: 09[CFG] candidate "CiscoIPSec", match: 1/1/1052 (me/other/ike)
Mar 7 07:37:47 srvl047 charon: 09[CFG] peer config match local: 1 (ID_ANY)
Mar 7 07:37:47 srvl047 charon: 09[CFG] peer config match remote: 1 (ID_DER_ASN1_DN -> 30:4d:31:0b:30:09:06:03:55:04:06:13:02:44:45:31:12:30:10:06:03:55:04:0a:13:09:61:69:78:69:67:6f:20:41:47:31:0b:30:09:06:03:55:04:0b:13:02:54:49:31:1d:30:1b:06:03:55:04:03:13:14:70:70:63:6d:30:31:38:2e:77:73:2e:61:69:78:69:67:6f:2e:64:65)
Mar 7 07:37:47 srvl047 charon: 09[CFG] ike config match: 1052 (10.0.0.17 10.0.0.13 IKEv1)
Mar 7 07:37:47 srvl047 charon: 09[CFG] candidate "CiscoIPSec-pam", match: 1/1/1052 (me/other/ike)
Mar 7 07:37:47 srvl047 charon: 09[CFG] peer config match local: 1 (ID_ANY)
Mar 7 07:37:47 srvl047 charon: 09[CFG] peer config match remote: 0 (ID_DER_ASN1_DN -> 30:4d:31:0b:30:09:06:03:55:04:06:13:02:44:45:31:12:30:10:06:03:55:04:0a:13:09:61:69:78:69:67:6f:20:41:47:31:0b:30:09:06:03:55:04:0b:13:02:54:49:31:1d:30:1b:06:03:55:04:03:13:14:70:70:63:6d:30:31:38:2e:77:73:2e:61:69:78:69:67:6f:2e:64:65)
Mar 7 07:37:47 srvl047 charon: 09[CFG] ike config match: 0 (10.0.0.17 10.0.0.13 IKEv1)
Mar 7 07:37:47 srvl047 charon: 09[CFG] selected peer config "CiscoIPSec"
Mar 7 07:37:47 srvl047 charon: 09[IKE] HASH_I data => 843 bytes @ 0x7f9aa0004800
Mar 7 07:37:47 srvl047 charon: 09[IKE] 0: 1F A7 B2 68 F0 1D 7F 7B B6 CB 1C 1D 8C 1F 65 3C ...h...{......e<
Mar 7 07:37:47 srvl047 charon: 09[IKE] 16: 28 6A E1 DE 33 BB 0C 03 87 37 14 26 AF A1 85 EB (j..3....7.&....
Mar 7 07:37:47 srvl047 charon: 09[IKE] 32: 45 E8 82 C8 68 39 3E 9D EB 67 8C 62 8E 23 22 82 E...h9>..g.b.#".
Mar 7 07:37:47 srvl047 charon: 09[IKE] 48: 83 55 D4 D4 7E 34 34 0D 28 58 8B 73 F6 EF 56 CA .U..~44.(X.s..V.
Mar 7 07:37:47 srvl047 charon: 09[IKE] 64: 82 88 D1 41 F4 7E 40 9A A7 D5 D4 60 CA ED FF 29 ...A.~@....`...)
Mar 7 07:37:47 srvl047 charon: 09[IKE] 80: 1C 4F 63 85 C6 06 5E E3 12 4C 8A 92 FE 2E BA D8 .Oc...^..L......
Mar 7 07:37:47 srvl047 charon: 09[IKE] 96: 03 4F E8 5F 7C E9 0C D3 B2 CF 43 5F D4 EF 26 B8 .O._|.....C_..&.
Mar 7 07:37:47 srvl047 charon: 09[IKE] 112: 22 5A 5E 47 3E 40 FF C6 A9 52 31 09 B9 C0 A3 E6 "Z^G>@...R1.....
Mar 7 07:37:47 srvl047 charon: 09[IKE] 128: 4B D8 06 D4 78 6E 64 F2 77 01 4F 95 11 C6 79 B4 K...xnd.w.O...y.
Mar 7 07:37:47 srvl047 charon: 09[IKE] 144: 7C CA DB 4E ED 0A 7A C1 CD E3 AE 54 9F B0 D4 EE |..N..z....T....
Mar 7 07:37:47 srvl047 charon: 09[IKE] 160: 47 F4 82 0A F1 09 1B EE 6C A0 A0 85 45 20 69 FA G.......l...E i.
Mar 7 07:37:47 srvl047 charon: 09[IKE] 176: 82 C7 87 55 BB 25 34 06 A2 EB B0 97 06 B1 22 9F ...U.%4.......".
Mar 7 07:37:47 srvl047 charon: 09[IKE] 192: A2 34 AA E6 DF B0 51 27 2E 99 4D 7B 3D 60 95 12 .4....Q'..M{=`..
Mar 7 07:37:47 srvl047 charon: 09[IKE] 208: A8 21 EF 4B 71 70 DF 6C 33 44 92 CA 57 23 47 03 .!.Kqp.l3D..W#G.
Mar 7 07:37:47 srvl047 charon: 09[IKE] 224: 4C 43 2A 65 F2 6F 7B 8E 24 59 38 13 E3 21 7F AE LC*e.o{.$Y8..!..
Mar 7 07:37:47 srvl047 charon: 09[IKE] 240: D8 7E E6 CF B3 84 62 8D 2C 41 D5 71 6A 1E FB 6F .~....b.,A.qj..o
Mar 7 07:37:47 srvl047 charon: 09[IKE] 256: 29 B4 AB 65 06 F1 25 AE C6 68 F8 9C 7D 7B 2E 21 )..e..%..h..}{.!
Mar 7 07:37:47 srvl047 charon: 09[IKE] 272: F7 9A 66 63 0D 79 97 D8 1D 4C 82 AF 05 7B 50 11 ..fc.y...L...{P.
Mar 7 07:37:47 srvl047 charon: 09[IKE] 288: C4 D9 1E 4B 9D CE AE 77 2E D0 5B A8 B7 68 D4 71 ...K...w..[..h.q
Mar 7 07:37:47 srvl047 charon: 09[IKE] 304: 6A 70 CD A2 E5 BA 6F FF 76 D4 8A 6F 3F F0 21 07 jp....o.v..o?.!.
Mar 7 07:37:47 srvl047 charon: 09[IKE] 320: 0D 93 3F 4E 9C 0E D6 63 8B EA C2 20 6C A1 3B 62 ..?N...c... l.;b
Mar 7 07:37:47 srvl047 charon: 09[IKE] 336: 44 4A 04 35 F4 38 14 90 02 30 C7 0B 53 BC 5D 87 DJ.5.8...0..S.].
Mar 7 07:37:47 srvl047 charon: 09[IKE] 352: 92 B0 9B AF 48 88 F6 DD 57 4E A8 16 EB 56 0A FE ....H...WN...V..
Mar 7 07:37:47 srvl047 charon: 09[IKE] 368: CB 81 B1 53 17 E2 7B AB 85 D9 B6 32 25 80 16 31 ...S..{....2%..1
Mar 7 07:37:47 srvl047 charon: 09[IKE] 384: 71 B0 AF 52 48 A2 AB F0 11 20 DC B4 C4 08 97 C3 q..RH.... ......
Mar 7 07:37:47 srvl047 charon: 09[IKE] 400: 00 00 00 01 00 00 00 01 00 00 01 60 01 01 00 0A ...........`....
Mar 7 07:37:47 srvl047 charon: 09[IKE] 416: 03 00 00 24 01 01 00 00 80 0B 00 01 80 0C 0E 10 ...$............
Mar 7 07:37:47 srvl047 charon: 09[IKE] 432: 80 01 00 07 80 0E 01 00 80 03 FD ED 80 02 00 02 ................
Mar 7 07:37:47 srvl047 charon: 09[IKE] 448: 80 04 00 05 03 00 00 24 02 01 00 00 80 0B 00 01 .......$........
Mar 7 07:37:47 srvl047 charon: 09[IKE] 464: 80 0C 0E 10 80 01 00 07 80 0E 01 00 80 03 FD ED ................
Mar 7 07:37:47 srvl047 charon: 09[IKE] 480: 80 02 00 02 80 04 00 02 03 00 00 24 03 01 00 00 ...........$....
Mar 7 07:37:47 srvl047 charon: 09[IKE] 496: 80 0B 00 01 80 0C 0E 10 80 01 00 07 80 0E 00 80 ................
Mar 7 07:37:47 srvl047 charon: 09[IKE] 512: 80 03 FD ED 80 02 00 02 80 04 00 02 03 00 00 24 ...............$
Mar 7 07:37:47 srvl047 charon: 09[IKE] 528: 04 01 00 00 80 0B 00 01 80 0C 0E 10 80 01 00 07 ................
Mar 7 07:37:47 srvl047 charon: 09[IKE] 544: 80 0E 01 00 80 03 FD ED 80 02 00 01 80 04 00 05 ................
Mar 7 07:37:47 srvl047 charon: 09[IKE] 560: 03 00 00 24 05 01 00 00 80 0B 00 01 80 0C 0E 10 ...$............
Mar 7 07:37:47 srvl047 charon: 09[IKE] 576: 80 01 00 07 80 0E 01 00 80 03 FD ED 80 02 00 01 ................
Mar 7 07:37:47 srvl047 charon: 09[IKE] 592: 80 04 00 02 03 00 00 24 06 01 00 00 80 0B 00 01 .......$........
Mar 7 07:37:47 srvl047 charon: 09[IKE] 608: 80 0C 0E 10 80 01 00 07 80 0E 00 80 80 03 FD ED ................
Mar 7 07:37:47 srvl047 charon: 09[IKE] 624: 80 02 00 01 80 04 00 02 03 00 00 20 07 01 00 00 ........... ....
Mar 7 07:37:47 srvl047 charon: 09[IKE] 640: 80 0B 00 01 80 0C 0E 10 80 01 00 05 80 03 FD ED ................
Mar 7 07:37:47 srvl047 charon: 09[IKE] 656: 80 02 00 02 80 04 00 02 03 00 00 20 08 01 00 00 ........... ....
Mar 7 07:37:47 srvl047 charon: 09[IKE] 672: 80 0B 00 01 80 0C 0E 10 80 01 00 05 80 03 FD ED ................
Mar 7 07:37:47 srvl047 charon: 09[IKE] 688: 80 02 00 01 80 04 00 02 03 00 00 20 09 01 00 00 ........... ....
Mar 7 07:37:47 srvl047 charon: 09[IKE] 704: 80 0B 00 01 80 0C 0E 10 80 01 00 01 80 03 FD ED ................
Mar 7 07:37:47 srvl047 charon: 09[IKE] 720: 80 02 00 02 80 04 00 02 00 00 00 20 0A 01 00 00 ........... ....
Mar 7 07:37:47 srvl047 charon: 09[IKE] 736: 80 0B 00 01 80 0C 0E 10 80 01 00 01 80 03 FD ED ................
Mar 7 07:37:47 srvl047 charon: 09[IKE] 752: 80 02 00 01 80 04 00 02 09 00 00 00 30 4D 31 0B ............0M1.
Mar 7 07:37:47 srvl047 charon: 09[IKE] 768: 30 09 06 03 55 04 06 13 02 44 45 31 12 30 10 06 0...U....DE1.0..
Mar 7 07:37:47 srvl047 charon: 09[IKE] 784: 03 55 04 0A 13 09 61 69 78 69 67 6F 20 41 47 31 .U....example AG1
Mar 7 07:37:47 srvl047 charon: 09[IKE] 800: 0B 30 09 06 03 55 04 0B 13 02 54 49 31 1D 30 1B .0...U....TI1.0.
Mar 7 07:37:47 srvl047 charon: 09[IKE] 816: 06 03 55 04 03 13 14 70 70 63 6D 30 31 38 2E 77 ..U....ppcm018.w
Mar 7 07:37:47 srvl047 charon: 09[IKE] 832: 73 2E 61 69 78 69 67 6F 2E 64 65 s.example.com
Mar 7 07:37:47 srvl047 charon: 09[IKE] HASH_I => 20 bytes @ 0x7f9aa0002780
Mar 7 07:37:47 srvl047 charon: 09[IKE] 0: 4E 80 87 89 EC 3B 80 4C B8 0C 72 18 00 55 52 DD N....;.L..r..UR.
Mar 7 07:37:47 srvl047 charon: 09[IKE] 16: 66 C2 A0 AF f...
Mar 7 07:37:47 srvl047 charon: 09[CFG] using certificate "C=DE, O=example AG, OU=TI, CN=ppcm018.ws.example.com"
Mar 7 07:37:47 srvl047 charon: 09[CFG] certificate "C=DE, O=example AG, OU=TI, CN=ppcm018.ws.example.com" key: 2048 bit RSA
Mar 7 07:37:47 srvl047 charon: 09[CFG] using trusted intermediate ca certificate "C=DE, O=example AG, OU=example Certificate Authority, CN=ws-example-CA"
Mar 7 07:37:47 srvl047 charon: 09[CFG] checking certificate status of "C=DE, O=example AG, OU=TI, CN=ppcm018.ws.example.com"
Mar 7 07:37:47 srvl047 charon: 09[CFG] ocsp check skipped, no ocsp found
Mar 7 07:37:47 srvl047 charon: 09[CFG] certificate "C=DE, O=example AG, OU=example Certificate Authority, CN=ws-example-CA" key: 4096 bit RSA
Mar 7 07:37:47 srvl047 charon: 09[CFG] using trusted ca certificate "C=DE, O=example AG, OU=example Certificate Authority, CN=example Root CA"
Mar 7 07:37:47 srvl047 charon: 09[CFG] certificate "C=DE, O=example AG, OU=example Certificate Authority, CN=example Root CA" key: 4096 bit RSA
Mar 7 07:37:47 srvl047 charon: 09[CFG] reached self-signed root ca with a path length of 0
Mar 7 07:37:47 srvl047 charon: 09[CFG] using trusted certificate "C=DE, O=example AG, OU=example Certificate Authority, CN=ws-example-CA"
Mar 7 07:37:47 srvl047 charon: 09[CFG] crl correctly signed by "C=DE, O=example AG, OU=example Certificate Authority, CN=ws-example-CA"
Mar 7 07:37:47 srvl047 charon: 09[CFG] crl is valid: until Mar 08 08:42:47 2016
Mar 7 07:37:47 srvl047 charon: 09[CFG] using cached crl
Mar 7 07:37:47 srvl047 charon: 09[CFG] certificate "C=DE, O=example AG, OU=example Certificate Authority, CN=ws-example-CA" key: 4096 bit RSA
Mar 7 07:37:47 srvl047 charon: 09[CFG] using trusted ca certificate "C=DE, O=example AG, OU=example Certificate Authority, CN=example Root CA"
Mar 7 07:37:47 srvl047 charon: 09[CFG] certificate "C=DE, O=example AG, OU=example Certificate Authority, CN=example Root CA" key: 4096 bit RSA
Mar 7 07:37:47 srvl047 charon: 09[CFG] reached self-signed root ca with a path length of 0
Mar 7 07:37:47 srvl047 charon: 09[CFG] using trusted certificate "C=DE, O=example AG, OU=example Certificate Authority, CN=ws-example-CA"
Mar 7 07:37:47 srvl047 charon: 09[CFG] crl correctly signed by "C=DE, O=example AG, OU=example Certificate Authority, CN=ws-example-CA"
Mar 7 07:37:47 srvl047 charon: 09[CFG] crl is valid: until Mar 08 08:42:47 2016
Mar 7 07:37:47 srvl047 charon: 09[CFG] using cached crl
Mar 7 07:37:47 srvl047 charon: 09[CFG] certificate status is good
Mar 7 07:37:47 srvl047 charon: 09[CFG] certificate "C=DE, O=example AG, OU=example Certificate Authority, CN=ws-example-CA" key: 4096 bit RSA
Mar 7 07:37:47 srvl047 charon: 09[CFG] using trusted ca certificate "C=DE, O=example AG, OU=example Certificate Authority, CN=example Root CA"
Mar 7 07:37:47 srvl047 charon: 09[CFG] checking certificate status of "C=DE, O=example AG, OU=example Certificate Authority, CN=ws-example-CA"
Mar 7 07:37:47 srvl047 charon: 09[CFG] ocsp check skipped, no ocsp found
Mar 7 07:37:47 srvl047 charon: 09[CFG] using trusted certificate "C=DE, O=example AG, OU=example Certificate Authority, CN=example Root CA"
Mar 7 07:37:47 srvl047 charon: 09[CFG] crl correctly signed by "C=DE, O=example AG, OU=example Certificate Authority, CN=example Root CA"
Mar 7 07:37:47 srvl047 charon: 09[CFG] crl is valid: until Dec 20 11:33:09 2045
Mar 7 07:37:47 srvl047 charon: 09[CFG] using cached crl
Mar 7 07:37:47 srvl047 charon: 09[CFG] certificate status is good
Mar 7 07:37:47 srvl047 charon: 09[CFG] certificate "C=DE, O=example AG, OU=example Certificate Authority, CN=example Root CA" key: 4096 bit RSA
Mar 7 07:37:47 srvl047 charon: 09[CFG] reached self-signed root ca with a path length of 1
Mar 7 07:37:47 srvl047 charon: 09[IKE] authentication of 'C=DE, O=example AG, OU=TI, CN=ppcm018.ws.example.com' with RSA successful
Mar 7 07:37:47 srvl047 charon: 09[IKE] HASH_R data => 783 bytes @ 0x7f9aa00051e0
Mar 7 07:37:47 srvl047 charon: 09[IKE] 0: A2 34 AA E6 DF B0 51 27 2E 99 4D 7B 3D 60 95 12 .4....Q'..M{=`..
Mar 7 07:37:47 srvl047 charon: 09[IKE] 16: A8 21 EF 4B 71 70 DF 6C 33 44 92 CA 57 23 47 03 .!.Kqp.l3D..W#G.
Mar 7 07:37:47 srvl047 charon: 09[IKE] 32: 4C 43 2A 65 F2 6F 7B 8E 24 59 38 13 E3 21 7F AE LC*e.o{.$Y8..!..
Mar 7 07:37:47 srvl047 charon: 09[IKE] 48: D8 7E E6 CF B3 84 62 8D 2C 41 D5 71 6A 1E FB 6F .~....b.,A.qj..o
Mar 7 07:37:47 srvl047 charon: 09[IKE] 64: 29 B4 AB 65 06 F1 25 AE C6 68 F8 9C 7D 7B 2E 21 )..e..%..h..}{.!
Mar 7 07:37:47 srvl047 charon: 09[IKE] 80: F7 9A 66 63 0D 79 97 D8 1D 4C 82 AF 05 7B 50 11 ..fc.y...L...{P.
Mar 7 07:37:47 srvl047 charon: 09[IKE] 96: C4 D9 1E 4B 9D CE AE 77 2E D0 5B A8 B7 68 D4 71 ...K...w..[..h.q
Mar 7 07:37:47 srvl047 charon: 09[IKE] 112: 6A 70 CD A2 E5 BA 6F FF 76 D4 8A 6F 3F F0 21 07 jp....o.v..o?.!.
Mar 7 07:37:47 srvl047 charon: 09[IKE] 128: 0D 93 3F 4E 9C 0E D6 63 8B EA C2 20 6C A1 3B 62 ..?N...c... l.;b
Mar 7 07:37:47 srvl047 charon: 09[IKE] 144: 44 4A 04 35 F4 38 14 90 02 30 C7 0B 53 BC 5D 87 DJ.5.8...0..S.].
Mar 7 07:37:47 srvl047 charon: 09[IKE] 160: 92 B0 9B AF 48 88 F6 DD 57 4E A8 16 EB 56 0A FE ....H...WN...V..
Mar 7 07:37:47 srvl047 charon: 09[IKE] 176: CB 81 B1 53 17 E2 7B AB 85 D9 B6 32 25 80 16 31 ...S..{....2%..1
Mar 7 07:37:47 srvl047 charon: 09[IKE] 192: 1F A7 B2 68 F0 1D 7F 7B B6 CB 1C 1D 8C 1F 65 3C ...h...{......e<
Mar 7 07:37:47 srvl047 charon: 09[IKE] 208: 28 6A E1 DE 33 BB 0C 03 87 37 14 26 AF A1 85 EB (j..3....7.&....
Mar 7 07:37:47 srvl047 charon: 09[IKE] 224: 45 E8 82 C8 68 39 3E 9D EB 67 8C 62 8E 23 22 82 E...h9>..g.b.#".
Mar 7 07:37:47 srvl047 charon: 09[IKE] 240: 83 55 D4 D4 7E 34 34 0D 28 58 8B 73 F6 EF 56 CA .U..~44.(X.s..V.
Mar 7 07:37:47 srvl047 charon: 09[IKE] 256: 82 88 D1 41 F4 7E 40 9A A7 D5 D4 60 CA ED FF 29 ...A.~@....`...)
Mar 7 07:37:47 srvl047 charon: 09[IKE] 272: 1C 4F 63 85 C6 06 5E E3 12 4C 8A 92 FE 2E BA D8 .Oc...^..L......
Mar 7 07:37:47 srvl047 charon: 09[IKE] 288: 03 4F E8 5F 7C E9 0C D3 B2 CF 43 5F D4 EF 26 B8 .O._|.....C_..&.
Mar 7 07:37:47 srvl047 charon: 09[IKE] 304: 22 5A 5E 47 3E 40 FF C6 A9 52 31 09 B9 C0 A3 E6 "Z^G>@...R1.....
Mar 7 07:37:47 srvl047 charon: 09[IKE] 320: 4B D8 06 D4 78 6E 64 F2 77 01 4F 95 11 C6 79 B4 K...xnd.w.O...y.
Mar 7 07:37:47 srvl047 charon: 09[IKE] 336: 7C CA DB 4E ED 0A 7A C1 CD E3 AE 54 9F B0 D4 EE |..N..z....T....
Mar 7 07:37:47 srvl047 charon: 09[IKE] 352: 47 F4 82 0A F1 09 1B EE 6C A0 A0 85 45 20 69 FA G.......l...E i.
Mar 7 07:37:47 srvl047 charon: 09[IKE] 368: 82 C7 87 55 BB 25 34 06 A2 EB B0 97 06 B1 22 9F ...U.%4.......".
Mar 7 07:37:47 srvl047 charon: 09[IKE] 384: 11 20 DC B4 C4 08 97 C3 71 B0 AF 52 48 A2 AB F0 . ......q..RH...
Mar 7 07:37:47 srvl047 charon: 09[IKE] 400: 00 00 00 01 00 00 00 01 00 00 01 60 01 01 00 0A ...........`....
Mar 7 07:37:47 srvl047 charon: 09[IKE] 416: 03 00 00 24 01 01 00 00 80 0B 00 01 80 0C 0E 10 ...$............
Mar 7 07:37:47 srvl047 charon: 09[IKE] 432: 80 01 00 07 80 0E 01 00 80 03 FD ED 80 02 00 02 ................
Mar 7 07:37:47 srvl047 charon: 09[IKE] 448: 80 04 00 05 03 00 00 24 02 01 00 00 80 0B 00 01 .......$........
Mar 7 07:37:47 srvl047 charon: 09[IKE] 464: 80 0C 0E 10 80 01 00 07 80 0E 01 00 80 03 FD ED ................
Mar 7 07:37:47 srvl047 charon: 09[IKE] 480: 80 02 00 02 80 04 00 02 03 00 00 24 03 01 00 00 ...........$....
Mar 7 07:37:47 srvl047 charon: 09[IKE] 496: 80 0B 00 01 80 0C 0E 10 80 01 00 07 80 0E 00 80 ................
Mar 7 07:37:47 srvl047 charon: 09[IKE] 512: 80 03 FD ED 80 02 00 02 80 04 00 02 03 00 00 24 ...............$
Mar 7 07:37:47 srvl047 charon: 09[IKE] 528: 04 01 00 00 80 0B 00 01 80 0C 0E 10 80 01 00 07 ................
Mar 7 07:37:47 srvl047 charon: 09[IKE] 544: 80 0E 01 00 80 03 FD ED 80 02 00 01 80 04 00 05 ................
Mar 7 07:37:47 srvl047 charon: 09[IKE] 560: 03 00 00 24 05 01 00 00 80 0B 00 01 80 0C 0E 10 ...$............
Mar 7 07:37:47 srvl047 charon: 09[IKE] 576: 80 01 00 07 80 0E 01 00 80 03 FD ED 80 02 00 01 ................
Mar 7 07:37:47 srvl047 charon: 09[IKE] 592: 80 04 00 02 03 00 00 24 06 01 00 00 80 0B 00 01 .......$........
Mar 7 07:37:47 srvl047 charon: 09[IKE] 608: 80 0C 0E 10 80 01 00 07 80 0E 00 80 80 03 FD ED ................
Mar 7 07:37:47 srvl047 charon: 09[IKE] 624: 80 02 00 01 80 04 00 02 03 00 00 20 07 01 00 00 ........... ....
Mar 7 07:37:47 srvl047 charon: 09[IKE] 640: 80 0B 00 01 80 0C 0E 10 80 01 00 05 80 03 FD ED ................
Mar 7 07:37:47 srvl047 charon: 09[IKE] 656: 80 02 00 02 80 04 00 02 03 00 00 20 08 01 00 00 ........... ....
Mar 7 07:37:47 srvl047 charon: 09[IKE] 672: 80 0B 00 01 80 0C 0E 10 80 01 00 05 80 03 FD ED ................
Mar 7 07:37:47 srvl047 charon: 09[IKE] 688: 80 02 00 01 80 04 00 02 03 00 00 20 09 01 00 00 ........... ....
Mar 7 07:37:47 srvl047 charon: 09[IKE] 704: 80 0B 00 01 80 0C 0E 10 80 01 00 01 80 03 FD ED ................
Mar 7 07:37:47 srvl047 charon: 09[IKE] 720: 80 02 00 02 80 04 00 02 00 00 00 20 0A 01 00 00 ........... ....
Mar 7 07:37:47 srvl047 charon: 09[IKE] 736: 80 0B 00 01 80 0C 0E 10 80 01 00 01 80 03 FD ED ................
Mar 7 07:37:47 srvl047 charon: 09[IKE] 752: 80 02 00 01 80 04 00 02 02 00 00 00 73 74 61 72 ............star
Mar 7 07:37:47 srvl047 charon: 09[IKE] 768: 67 61 74 65 2E 61 69 78 69 67 6F 2E 63 6F 6D gate.example.com
Mar 7 07:37:47 srvl047 charon: 09[IKE] HASH_R => 20 bytes @ 0x7f9aa0002780
Mar 7 07:37:47 srvl047 charon: 09[IKE] 0: E6 6B 45 A7 D1 65 02 D6 62 CF 8B FD 6A B7 AE F5 .kE..e..b...j...
Mar 7 07:37:47 srvl047 charon: 09[IKE] 16: 8D E1 ED 17 ....
Mar 7 07:37:47 srvl047 ipsec[30549]: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:37:47 srvl047 ipsec[30549]: 02[NET] waiting for data on sockets
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[MGR] checkout IKE_SA by message
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[MGR] IKE_SA (unnamed)[9] successfully checked out
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (292 bytes)
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[ENC] parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] natd_chunk => 22 bytes @ 0x7f9adabb9b70
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] 0: 71 B0 AF 52 48 A2 AB F0 11 20 DC B4 C4 08 97 C3 q..RH.... ......
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] 16: 05 91 8E 11 11 94 ......
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] natd_hash => 20 bytes @ 0x7f9aac003a60
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] 0: 90 A7 84 EC 7D 4A 22 57 95 F4 FB 96 51 62 11 F8 ....}J"W....Qb..
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] 16: 5C 12 6F 2A \.o*
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] natd_chunk => 22 bytes @ 0x7f9adabb9b70
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] 0: 71 B0 AF 52 48 A2 AB F0 11 20 DC B4 C4 08 97 C3 q..RH.... ......
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] 16: 05 91 8E 0D EA 4B .....K
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] natd_hash => 20 bytes @ 0x7f9aac003a80
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] 0: FD D0 75 C9 4A 4B 05 2D 66 02 A3 47 59 EA E2 B2 ..u.JK.-f..GY...
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] 16: D5 0E B1 E4 ....
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] precalculated src_hash => 20 bytes @ 0x7f9aac003a80
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] 0: FD D0 75 C9 4A 4B 05 2D 66 02 A3 47 59 EA E2 B2 ..u.JK.-f..GY...
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] 16: D5 0E B1 E4 ....
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] precalculated dst_hash => 20 bytes @ 0x7f9aac003a60
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] 0: 90 A7 84 EC 7D 4A 22 57 95 F4 FB 96 51 62 11 F8 ....}J"W....Qb..
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] 16: 5C 12 6F 2A \.o*
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] received dst_hash => 20 bytes @ 0x7f9aac003d60
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] 0: 90 A7 84 EC 7D 4A 22 57 95 F4 FB 96 51 62 11 F8 ....}J"W....Qb..
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] 16: 5C 12 6F 2A \.o*
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] received src_hash => 20 bytes @ 0x7f9aac003e20
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] 0: 90 F9 15 7D 2F 14 3A A6 13 57 C5 E9 54 DA 78 74 ...}/.:..W..T.xt
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] 16: CD 13 0A 6A ...j
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] remote host is behind NAT
Mar 7 07:37:47 srvl047 charon: 09[IKE] authentication of 'gate1.example.com' (myself) successful
Mar 7 07:37:47 srvl047 charon: 09[IKE] queueing XAUTH task
Mar 7 07:37:47 srvl047 charon: 09[IKE] sending end entity cert "C=DE, ST=NRW, L=Springfield, O=example AG, CN=gate1.example.com/[email protected]"
Mar 7 07:37:47 srvl047 charon: 09[IKE] sending issuer cert "C=DE, O=example AG, OU=example Certificate Authority, CN=ws-example-CA"
Mar 7 07:37:47 srvl047 charon: 09[ENC] generating ID_PROT response 0 [ ID CERT CERT SIG ]
Mar 7 07:37:47 srvl047 charon: 09[NET] sending packet: from 10.0.0.17[4500] to 10.0.0.13[59979] (3708 bytes)
Mar 7 07:37:47 srvl047 charon: 09[IKE] activating new tasks
Mar 7 07:37:47 srvl047 charon: 09[IKE] activating XAUTH task
Mar 7 07:37:47 srvl047 charon: 04[NET] sending packet: from 10.0.0.17[4500] to 10.0.0.13[59979]
Mar 7 07:37:47 srvl047 charon: 09[IKE] Hash => 20 bytes @ 0x7f9aa0006810
Mar 7 07:37:47 srvl047 charon: 09[IKE] 0: FB 35 FD E8 A3 9C 74 1C 92 C7 11 26 3B 99 A6 4C .5....t....&;..L
Mar 7 07:37:47 srvl047 charon: 09[IKE] 16: D7 34 5F 1A .4_.
Mar 7 07:37:47 srvl047 charon: 09[ENC] generating TRANSACTION request 823180791 [ HASH CPRQ(X_USER X_PWD) ]
Mar 7 07:37:47 srvl047 charon: 09[NET] sending packet: from 10.0.0.17[4500] to 10.0.0.13[59979] (76 bytes)
Mar 7 07:37:47 srvl047 charon: 09[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:37:47 srvl047 charon: 04[NET] sending packet: from 10.0.0.17[4500] to 10.0.0.13[59979]
Mar 7 07:37:47 srvl047 charon: 09[MGR] check-in of IKE_SA successful.
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] sending cert request for "C=DE, O=example AG, OU=example Certificate Authority, CN=example Root CA"
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] sending cert request for "C=DE, ST=NRW, L=Springfield, O=example AG, OU=TI, CN=IPsec_ca, [email protected]"
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] sending cert request for "C=DE, O=example AG, OU=example Certificate Authority, CN=ws-example-CA"
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] natd_chunk => 22 bytes @ 0x7f9adabb9b90
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] 0: 71 B0 AF 52 48 A2 AB F0 11 20 DC B4 C4 08 97 C3 q..RH.... ......
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] 16: 05 91 8E 0D EA 4B .....K
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] natd_hash => 20 bytes @ 0x7f9aac003a80
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] 0: FD D0 75 C9 4A 4B 05 2D 66 02 A3 47 59 EA E2 B2 ..u.JK.-f..GY...
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] 16: D5 0E B1 E4 ....
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] natd_chunk => 22 bytes @ 0x7f9adabb9b90
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] 0: 71 B0 AF 52 48 A2 AB F0 11 20 DC B4 C4 08 97 C3 q..RH.... ......
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] 16: 05 91 8E 11 11 94 ......
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] natd_hash => 20 bytes @ 0x7f9aac0047f0
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] 0: 90 A7 84 EC 7D 4A 22 57 95 F4 FB 96 51 62 11 F8 ....}J"W....Qb..
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[IKE] 16: 5C 12 6F 2A \.o*
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[ENC] generating ID_PROT response 0 [ KE No CERTREQ CERTREQ CERTREQ NAT-D NAT-D ]
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[NET] sending packet: from 10.0.0.17[4500] to 10.0.0.13[59979] (653 bytes)
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[MGR] checkin IKE_SA (unnamed)[9]
Mar 7 07:37:47 srvl047 ipsec[30549]: 04[NET] sending packet: from 10.0.0.17[4500] to 10.0.0.13[59979]
Mar 7 07:37:47 srvl047 ipsec[30549]: 05[MGR] check-in of IKE_SA successful.
Mar 7 07:37:47 srvl047 ipsec[30549]: 10[MGR] checkout IKE_SA
Mar 7 07:37:47 srvl047 ipsec[30549]: 10[MGR] IKE_SA CiscoIPSec[1] successfully checked out
Mar 7 07:37:47 srvl047 ipsec[30549]: 10[MGR] checkin IKE_SA CiscoIPSec[1]
Mar 7 07:37:47 srvl047 ipsec[30549]: 10[MGR] check-in of IKE_SA successful.
Mar 7 07:37:47 srvl047 ipsec[30549]: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:37:47 srvl047 ipsec[30549]: 02[NET] waiting for data on sockets
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[MGR] checkout IKE_SA by message
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[MGR] IKE_SA (unnamed)[9] successfully checked out
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (2220 bytes)
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[ENC] parsed ID_PROT request 0 [ ID CERT SIG CERTREQ ]
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] ignoring certificate request without data
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] received end entity cert "C=DE, O=example AG, OU=TI, CN=ppcm018.ws.example.com"
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] looking for XAuthInitRSA peer configs matching 10.0.0.17...10.0.0.13[C=DE, O=example AG, OU=TI, CN=ppcm018.ws.example.com]
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] peer config match local: 1 (ID_ANY)
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] peer config match remote: 1 (ID_DER_ASN1_DN -> 30:4d:31:0b:30:09:06:03:55:04:06:13:02:44:45:31:12:30:10:06:03:55:04:0a:13:09:61:69:78:69:67:6f:20:41:47:31:0b:30:09:06:03:55:04:0b:13:02:54:49:31:1d:30:1b:06:03:55:04:03:13:14:70:70:63:6d:30:31:38:2e:77:73:2e:61:69:78:69:67:6f:2e:64:65)
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] ike config match: 0 (10.0.0.17 10.0.0.13 IKEv1)
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] peer config match local: 1 (ID_ANY)
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] peer config match remote: 1 (ID_DER_ASN1_DN -> 30:4d:31:0b:30:09:06:03:55:04:06:13:02:44:45:31:12:30:10:06:03:55:04:0a:13:09:61:69:78:69:67:6f:20:41:47:31:0b:30:09:06:03:55:04:0b:13:02:54:49:31:1d:30:1b:06:03:55:04:03:13:14:70:70:63:6d:30:31:38:2e:77:73:2e:61:69:78:69:67:6f:2e:64:65)
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] ike config match: 0 (10.0.0.17 10.0.0.13 IKEv1)
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] peer config match local: 1 (ID_ANY)
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] peer config match remote: 1 (ID_DER_ASN1_DN -> 30:4d:31:0b:30:09:06:03:55:04:06:13:02:44:45:31:12:30:10:06:03:55:04:0a:13:09:61:69:78:69:67:6f:20:41:47:31:0b:30:09:06:03:55:04:0b:13:02:54:49:31:1d:30:1b:06:03:55:04:03:13:14:70:70:63:6d:30:31:38:2e:77:73:2e:61:69:78:69:67:6f:2e:64:65)
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] ike config match: 1052 (10.0.0.17 10.0.0.13 IKEv1)
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] candidate "CiscoIPSec", match: 1/1/1052 (me/other/ike)
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] peer config match local: 1 (ID_ANY)
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] peer config match remote: 1 (ID_DER_ASN1_DN -> 30:4d:31:0b:30:09:06:03:55:04:06:13:02:44:45:31:12:30:10:06:03:55:04:0a:13:09:61:69:78:69:67:6f:20:41:47:31:0b:30:09:06:03:55:04:0b:13:02:54:49:31:1d:30:1b:06:03:55:04:03:13:14:70:70:63:6d:30:31:38:2e:77:73:2e:61:69:78:69:67:6f:2e:64:65)
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] ike config match: 1052 (10.0.0.17 10.0.0.13 IKEv1)
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] candidate "CiscoIPSec-pam", match: 1/1/1052 (me/other/ike)
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] peer config match local: 1 (ID_ANY)
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] peer config match remote: 0 (ID_DER_ASN1_DN -> 30:4d:31:0b:30:09:06:03:55:04:06:13:02:44:45:31:12:30:10:06:03:55:04:0a:13:09:61:69:78:69:67:6f:20:41:47:31:0b:30:09:06:03:55:04:0b:13:02:54:49:31:1d:30:1b:06:03:55:04:03:13:14:70:70:63:6d:30:31:38:2e:77:73:2e:61:69:78:69:67:6f:2e:64:65)
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] ike config match: 0 (10.0.0.17 10.0.0.13 IKEv1)
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] selected peer config "CiscoIPSec"
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] HASH_I data => 843 bytes @ 0x7f9aa0004800
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 0: 1F A7 B2 68 F0 1D 7F 7B B6 CB 1C 1D 8C 1F 65 3C ...h...{......e<
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 16: 28 6A E1 DE 33 BB 0C 03 87 37 14 26 AF A1 85 EB (j..3....7.&....
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 32: 45 E8 82 C8 68 39 3E 9D EB 67 8C 62 8E 23 22 82 E...h9>..g.b.#".
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 48: 83 55 D4 D4 7E 34 34 0D 28 58 8B 73 F6 EF 56 CA .U..~44.(X.s..V.
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 64: 82 88 D1 41 F4 7E 40 9A A7 D5 D4 60 CA ED FF 29 ...A.~@....`...)
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 80: 1C 4F 63 85 C6 06 5E E3 12 4C 8A 92 FE 2E BA D8 .Oc...^..L......
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 96: 03 4F E8 5F 7C E9 0C D3 B2 CF 43 5F D4 EF 26 B8 .O._|.....C_..&.
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 112: 22 5A 5E 47 3E 40 FF C6 A9 52 31 09 B9 C0 A3 E6 "Z^G>@...R1.....
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 128: 4B D8 06 D4 78 6E 64 F2 77 01 4F 95 11 C6 79 B4 K...xnd.w.O...y.
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 144: 7C CA DB 4E ED 0A 7A C1 CD E3 AE 54 9F B0 D4 EE |..N..z....T....
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 160: 47 F4 82 0A F1 09 1B EE 6C A0 A0 85 45 20 69 FA G.......l...E i.
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 176: 82 C7 87 55 BB 25 34 06 A2 EB B0 97 06 B1 22 9F ...U.%4.......".
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 192: A2 34 AA E6 DF B0 51 27 2E 99 4D 7B 3D 60 95 12 .4....Q'..M{=`..
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 208: A8 21 EF 4B 71 70 DF 6C 33 44 92 CA 57 23 47 03 .!.Kqp.l3D..W#G.
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 224: 4C 43 2A 65 F2 6F 7B 8E 24 59 38 13 E3 21 7F AE LC*e.o{.$Y8..!..
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 240: D8 7E E6 CF B3 84 62 8D 2C 41 D5 71 6A 1E FB 6F .~....b.,A.qj..o
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 256: 29 B4 AB 65 06 F1 25 AE C6 68 F8 9C 7D 7B 2E 21 )..e..%..h..}{.!
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 272: F7 9A 66 63 0D 79 97 D8 1D 4C 82 AF 05 7B 50 11 ..fc.y...L...{P.
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 288: C4 D9 1E 4B 9D CE AE 77 2E D0 5B A8 B7 68 D4 71 ...K...w..[..h.q
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 304: 6A 70 CD A2 E5 BA 6F FF 76 D4 8A 6F 3F F0 21 07 jp....o.v..o?.!.
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 320: 0D 93 3F 4E 9C 0E D6 63 8B EA C2 20 6C A1 3B 62 ..?N...c... l.;b
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 336: 44 4A 04 35 F4 38 14 90 02 30 C7 0B 53 BC 5D 87 DJ.5.8...0..S.].
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 352: 92 B0 9B AF 48 88 F6 DD 57 4E A8 16 EB 56 0A FE ....H...WN...V..
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 368: CB 81 B1 53 17 E2 7B AB 85 D9 B6 32 25 80 16 31 ...S..{....2%..1
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 384: 71 B0 AF 52 48 A2 AB F0 11 20 DC B4 C4 08 97 C3 q..RH.... ......
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 400: 00 00 00 01 00 00 00 01 00 00 01 60 01 01 00 0A ...........`....
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 416: 03 00 00 24 01 01 00 00 80 0B 00 01 80 0C 0E 10 ...$............
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 432: 80 01 00 07 80 0E 01 00 80 03 FD ED 80 02 00 02 ................
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 448: 80 04 00 05 03 00 00 24 02 01 00 00 80 0B 00 01 .......$........
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 464: 80 0C 0E 10 80 01 00 07 80 0E 01 00 80 03 FD ED ................
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 480: 80 02 00 02 80 04 00 02 03 00 00 24 03 01 00 00 ...........$....
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 496: 80 0B 00 01 80 0C 0E 10 80 01 00 07 80 0E 00 80 ................
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 512: 80 03 FD ED 80 02 00 02 80 04 00 02 03 00 00 24 ...............$
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 528: 04 01 00 00 80 0B 00 01 80 0C 0E 10 80 01 00 07 ................
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 544: 80 0E 01 00 80 03 FD ED 80 02 00 01 80 04 00 05 ................
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 560: 03 00 00 24 05 01 00 00 80 0B 00 01 80 0C 0E 10 ...$............
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 576: 80 01 00 07 80 0E 01 00 80 03 FD ED 80 02 00 01 ................
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 592: 80 04 00 02 03 00 00 24 06 01 00 00 80 0B 00 01 .......$........
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 608: 80 0C 0E 10 80 01 00 07 80 0E 00 80 80 03 FD ED ................
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 624: 80 02 00 01 80 04 00 02 03 00 00 20 07 01 00 00 ........... ....
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 640: 80 0B 00 01 80 0C 0E 10 80 01 00 05 80 03 FD ED ................
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 656: 80 02 00 02 80 04 00 02 03 00 00 20 08 01 00 00 ........... ....
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 672: 80 0B 00 01 80 0C 0E 10 80 01 00 05 80 03 FD ED ................
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 688: 80 02 00 01 80 04 00 02 03 00 00 20 09 01 00 00 ........... ....
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 704: 80 0B 00 01 80 0C 0E 10 80 01 00 01 80 03 FD ED ................
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 720: 80 02 00 02 80 04 00 02 00 00 00 20 0A 01 00 00 ........... ....
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 736: 80 0B 00 01 80 0C 0E 10 80 01 00 01 80 03 FD ED ................
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 752: 80 02 00 01 80 04 00 02 09 00 00 00 30 4D 31 0B ............0M1.
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 768: 30 09 06 03 55 04 06 13 02 44 45 31 12 30 10 06 0...U....DE1.0..
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 784: 03 55 04 0A 13 09 61 69 78 69 67 6F 20 41 47 31 .U....example AG1
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 800: 0B 30 09 06 03 55 04 0B 13 02 54 49 31 1D 30 1B .0...U....TI1.0.
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 816: 06 03 55 04 03 13 14 70 70 63 6D 30 31 38 2E 77 ..U....ppcm018.w
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 832: 73 2E 61 69 78 69 67 6F 2E 64 65 s.example.com
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] HASH_I => 20 bytes @ 0x7f9aa0002780
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 0: 4E 80 87 89 EC 3B 80 4C B8 0C 72 18 00 55 52 DD N....;.L..r..UR.
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 16: 66 C2 A0 AF f...
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] using certificate "C=DE, O=example AG, OU=TI, CN=ppcm018.ws.example.com"
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] certificate "C=DE, O=example AG, OU=TI, CN=ppcm018.ws.example.com" key: 2048 bit RSA
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] using trusted intermediate ca certificate "C=DE, O=example AG, OU=example Certificate Authority, CN=ws-example-CA"
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] checking certificate status of "C=DE, O=example AG, OU=TI, CN=ppcm018.ws.example.com"
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] ocsp check skipped, no ocsp found
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] certificate "C=DE, O=example AG, OU=example Certificate Authority, CN=ws-example-CA" key: 4096 bit RSA
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] using trusted ca certificate "C=DE, O=example AG, OU=example Certificate Authority, CN=example Root CA"
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] certificate "C=DE, O=example AG, OU=example Certificate Authority, CN=example Root CA" key: 4096 bit RSA
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] reached self-signed root ca with a path length of 0
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] using trusted certificate "C=DE, O=example AG, OU=example Certificate Authority, CN=ws-example-CA"
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] crl correctly signed by "C=DE, O=example AG, OU=example Certificate Authority, CN=ws-example-CA"
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] crl is valid: until Mar 08 08:42:47 2016
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] using cached crl
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] certificate "C=DE, O=example AG, OU=example Certificate Authority, CN=ws-example-CA" key: 4096 bit RSA
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] using trusted ca certificate "C=DE, O=example AG, OU=example Certificate Authority, CN=example Root CA"
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] certificate "C=DE, O=example AG, OU=example Certificate Authority, CN=example Root CA" key: 4096 bit RSA
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] reached self-signed root ca with a path length of 0
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] using trusted certificate "C=DE, O=example AG, OU=example Certificate Authority, CN=ws-example-CA"
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] crl correctly signed by "C=DE, O=example AG, OU=example Certificate Authority, CN=ws-example-CA"
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] crl is valid: until Mar 08 08:42:47 2016
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] using cached crl
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] certificate status is good
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] certificate "C=DE, O=example AG, OU=example Certificate Authority, CN=ws-example-CA" key: 4096 bit RSA
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] using trusted ca certificate "C=DE, O=example AG, OU=example Certificate Authority, CN=example Root CA"
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] checking certificate status of "C=DE, O=example AG, OU=example Certificate Authority, CN=ws-example-CA"
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] ocsp check skipped, no ocsp found
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] using trusted certificate "C=DE, O=example AG, OU=example Certificate Authority, CN=example Root CA"
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] crl correctly signed by "C=DE, O=example AG, OU=example Certificate Authority, CN=example Root CA"
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] crl is valid: until Dec 20 11:33:09 2045
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] using cached crl
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] certificate status is good
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] certificate "C=DE, O=example AG, OU=example Certificate Authority, CN=example Root CA" key: 4096 bit RSA
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[CFG] reached self-signed root ca with a path length of 1
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] authentication of 'C=DE, O=example AG, OU=TI, CN=ppcm018.ws.example.com' with RSA successful
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] HASH_R data => 783 bytes @ 0x7f9aa00051e0
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 0: A2 34 AA E6 DF B0 51 27 2E 99 4D 7B 3D 60 95 12 .4....Q'..M{=`..
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 16: A8 21 EF 4B 71 70 DF 6C 33 44 92 CA 57 23 47 03 .!.Kqp.l3D..W#G.
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 32: 4C 43 2A 65 F2 6F 7B 8E 24 59 38 13 E3 21 7F AE LC*e.o{.$Y8..!..
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 48: D8 7E E6 CF B3 84 62 8D 2C 41 D5 71 6A 1E FB 6F .~....b.,A.qj..o
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 64: 29 B4 AB 65 06 F1 25 AE C6 68 F8 9C 7D 7B 2E 21 )..e..%..h..}{.!
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 80: F7 9A 66 63 0D 79 97 D8 1D 4C 82 AF 05 7B 50 11 ..fc.y...L...{P.
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 96: C4 D9 1E 4B 9D CE AE 77 2E D0 5B A8 B7 68 D4 71 ...K...w..[..h.q
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 112: 6A 70 CD A2 E5 BA 6F FF 76 D4 8A 6F 3F F0 21 07 jp....o.v..o?.!.
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 128: 0D 93 3F 4E 9C 0E D6 63 8B EA C2 20 6C A1 3B 62 ..?N...c... l.;b
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 144: 44 4A 04 35 F4 38 14 90 02 30 C7 0B 53 BC 5D 87 DJ.5.8...0..S.].
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 160: 92 B0 9B AF 48 88 F6 DD 57 4E A8 16 EB 56 0A FE ....H...WN...V..
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 176: CB 81 B1 53 17 E2 7B AB 85 D9 B6 32 25 80 16 31 ...S..{....2%..1
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 192: 1F A7 B2 68 F0 1D 7F 7B B6 CB 1C 1D 8C 1F 65 3C ...h...{......e<
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 208: 28 6A E1 DE 33 BB 0C 03 87 37 14 26 AF A1 85 EB (j..3....7.&....
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 224: 45 E8 82 C8 68 39 3E 9D EB 67 8C 62 8E 23 22 82 E...h9>..g.b.#".
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 240: 83 55 D4 D4 7E 34 34 0D 28 58 8B 73 F6 EF 56 CA .U..~44.(X.s..V.
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 256: 82 88 D1 41 F4 7E 40 9A A7 D5 D4 60 CA ED FF 29 ...A.~@....`...)
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 272: 1C 4F 63 85 C6 06 5E E3 12 4C 8A 92 FE 2E BA D8 .Oc...^..L......
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 288: 03 4F E8 5F 7C E9 0C D3 B2 CF 43 5F D4 EF 26 B8 .O._|.....C_..&.
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 304: 22 5A 5E 47 3E 40 FF C6 A9 52 31 09 B9 C0 A3 E6 "Z^G>@...R1.....
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 320: 4B D8 06 D4 78 6E 64 F2 77 01 4F 95 11 C6 79 B4 K...xnd.w.O...y.
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 336: 7C CA DB 4E ED 0A 7A C1 CD E3 AE 54 9F B0 D4 EE |..N..z....T....
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 352: 47 F4 82 0A F1 09 1B EE 6C A0 A0 85 45 20 69 FA G.......l...E i.
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 368: 82 C7 87 55 BB 25 34 06 A2 EB B0 97 06 B1 22 9F ...U.%4.......".
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 384: 11 20 DC B4 C4 08 97 C3 71 B0 AF 52 48 A2 AB F0 . ......q..RH...
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 400: 00 00 00 01 00 00 00 01 00 00 01 60 01 01 00 0A ...........`....
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 416: 03 00 00 24 01 01 00 00 80 0B 00 01 80 0C 0E 10 ...$............
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 432: 80 01 00 07 80 0E 01 00 80 03 FD ED 80 02 00 02 ................
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 448: 80 04 00 05 03 00 00 24 02 01 00 00 80 0B 00 01 .......$........
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 464: 80 0C 0E 10 80 01 00 07 80 0E 01 00 80 03 FD ED ................
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 480: 80 02 00 02 80 04 00 02 03 00 00 24 03 01 00 00 ...........$....
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 496: 80 0B 00 01 80 0C 0E 10 80 01 00 07 80 0E 00 80 ................
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 512: 80 03 FD ED 80 02 00 02 80 04 00 02 03 00 00 24 ...............$
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 528: 04 01 00 00 80 0B 00 01 80 0C 0E 10 80 01 00 07 ................
Mar 7 07:37:47 srvl047 charon: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:37:47 srvl047 charon: 02[NET] waiting for data on sockets
Mar 7 07:37:47 srvl047 charon: 13[MGR] checkout IKE_SA by message
Mar 7 07:37:47 srvl047 charon: 13[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:37:47 srvl047 charon: 13[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (92 bytes)
Mar 7 07:37:47 srvl047 charon: 13[ENC] parsed TRANSACTION response 823180791 [ HASH CPRP(X_USER X_PWD) ]
Mar 7 07:37:47 srvl047 charon: 13[IKE] Hash => 20 bytes @ 0x7f9a90002920
Mar 7 07:37:47 srvl047 charon: 13[IKE] 0: D0 CA FC 93 CD D3 AC 5E 2A A9 1F B7 99 BE D1 7D .......^*......}
Mar 7 07:37:47 srvl047 charon: 13[IKE] 16: CC 87 4C CE ..L.
Mar 7 07:37:47 srvl047 charon: 13[IKE] XAuth authentication of 'ppcm018' successful
Mar 7 07:37:47 srvl047 charon: 13[IKE] reinitiating already active tasks
Mar 7 07:37:47 srvl047 charon: 13[IKE] XAUTH task
Mar 7 07:37:47 srvl047 charon: 13[IKE] Hash => 20 bytes @ 0x7f9a900031a0
Mar 7 07:37:47 srvl047 charon: 13[IKE] 0: F9 6C 7D 4E 25 FD 84 F7 E5 58 1D 0D A1 10 AA EA .l}N%....X......
Mar 7 07:37:47 srvl047 charon: 13[IKE] 16: 02 20 51 C9 . Q.
Mar 7 07:37:47 srvl047 charon: 13[ENC] generating TRANSACTION request 1549094497 [ HASH CPS(X_STATUS) ]
Mar 7 07:37:47 srvl047 charon: 13[NET] sending packet: from 10.0.0.17[4500] to 10.0.0.13[59979] (76 bytes)
Mar 7 07:37:47 srvl047 charon: 13[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:37:47 srvl047 charon: 13[MGR] check-in of IKE_SA successful.
Mar 7 07:37:47 srvl047 charon: 04[NET] sending packet: from 10.0.0.17[4500] to 10.0.0.13[59979]
Mar 7 07:37:47 srvl047 charon: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:37:47 srvl047 charon: 02[NET] waiting for data on sockets
Mar 7 07:37:47 srvl047 charon: 12[MGR] checkout IKE_SA by message
Mar 7 07:37:47 srvl047 charon: 12[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:37:47 srvl047 charon: 12[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (76 bytes)
Mar 7 07:37:47 srvl047 charon: 12[ENC] parsed TRANSACTION response 1549094497 [ HASH CPA(X_STATUS) ]
Mar 7 07:37:47 srvl047 charon: 12[IKE] Hash => 20 bytes @ 0x7f9a98005b10
Mar 7 07:37:47 srvl047 charon: 12[IKE] 0: DD 5F 04 6D 10 D0 11 3F 3B 2A 57 29 1C 17 82 3D ._.m...?;*W)...=
Mar 7 07:37:47 srvl047 charon: 12[IKE] 16: E3 04 96 07 ....
Mar 7 07:37:47 srvl047 charon: 12[IKE] IKE_SA CiscoIPSec[9] established between 10.0.0.17[gate1.example.com]...10.0.0.13[C=DE, O=example AG, OU=TI, CN=ppcm018.ws.example.com]
Mar 7 07:37:47 srvl047 charon: 12[IKE] IKE_SA CiscoIPSec[9] state change: CONNECTING => ESTABLISHED
Mar 7 07:37:47 srvl047 charon: 12[IKE] scheduling reauthentication in 10172s
Mar 7 07:37:47 srvl047 charon: 12[IKE] maximum IKE_SA lifetime 10712s
Mar 7 07:37:47 srvl047 charon: 12[IKE] activating new tasks
Mar 7 07:37:47 srvl047 charon: 19[MGR] checkout IKE_SA
Mar 7 07:37:47 srvl047 charon: 12[IKE] nothing to initiate
Mar 7 07:37:47 srvl047 charon: 12[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:37:47 srvl047 charon: 12[MGR] check-in of IKE_SA successful.
Mar 7 07:37:47 srvl047 charon: 19[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:37:47 srvl047 charon: 19[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:37:47 srvl047 charon: 19[MGR] check-in of IKE_SA successful.
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 544: 80 0E 01 00 80 03 FD ED 80 02 00 01 80 04 00 05 ................
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 560: 03 00 00 24 05 01 00 00 80 0B 00 01 80 0C 0E 10 ...$............
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 576: 80 01 00 07 80 0E 01 00 80 03 FD ED 80 02 00 01 ................
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 592: 80 04 00 02 03 00 00 24 06 01 00 00 80 0B 00 01 .......$........
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 608: 80 0C 0E 10 80 01 00 07 80 0E 00 80 80 03 FD ED ................
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 624: 80 02 00 01 80 04 00 02 03 00 00 20 07 01 00 00 ........... ....
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 640: 80 0B 00 01 80 0C 0E 10 80 01 00 05 80 03 FD ED ................
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 656: 80 02 00 02 80 04 00 02 03 00 00 20 08 01 00 00 ........... ....
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 672: 80 0B 00 01 80 0C 0E 10 80 01 00 05 80 03 FD ED ................
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 688: 80 02 00 01 80 04 00 02 03 00 00 20 09 01 00 00 ........... ....
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 704: 80 0B 00 01 80 0C 0E 10 80 01 00 01 80 03 FD ED ................
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 720: 80 02 00 02 80 04 00 02 00 00 00 20 0A 01 00 00 ........... ....
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 736: 80 0B 00 01 80 0C 0E 10 80 01 00 01 80 03 FD ED ................
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 752: 80 02 00 01 80 04 00 02 02 00 00 00 73 74 61 72 ............star
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 768: 67 61 74 65 2E 61 69 78 69 67 6F 2E 63 6F 6D gate.example.com
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] HASH_R => 20 bytes @ 0x7f9aa0002780
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 0: E6 6B 45 A7 D1 65 02 D6 62 CF 8B FD 6A B7 AE F5 .kE..e..b...j...
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 16: 8D E1 ED 17 ....
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] authentication of 'gate1.example.com' (myself) successful
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] queueing XAUTH task
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] sending end entity cert "C=DE, ST=NRW, L=Springfield, O=example AG, CN=gate1.example.com/[email protected]"
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] sending issuer cert "C=DE, O=example AG, OU=example Certificate Authority, CN=ws-example-CA"
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[ENC] generating ID_PROT response 0 [ ID CERT CERT SIG ]
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[NET] sending packet: from 10.0.0.17[4500] to 10.0.0.13[59979] (3708 bytes)
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] activating new tasks
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] activating XAUTH task
Mar 7 07:37:47 srvl047 ipsec[30549]: 04[NET] sending packet: from 10.0.0.17[4500] to 10.0.0.13[59979]
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] Hash => 20 bytes @ 0x7f9aa0006810
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 0: FB 35 FD E8 A3 9C 74 1C 92 C7 11 26 3B 99 A6 4C .5....t....&;..L
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[IKE] 16: D7 34 5F 1A .4_.
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[ENC] generating TRANSACTION request 823180791 [ HASH CPRQ(X_USER X_PWD) ]
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[NET] sending packet: from 10.0.0.17[4500] to 10.0.0.13[59979] (76 bytes)
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:37:47 srvl047 ipsec[30549]: 04[NET] sending packet: from 10.0.0.17[4500] to 10.0.0.13[59979]
Mar 7 07:37:47 srvl047 ipsec[30549]: 09[MGR] check-in of IKE_SA successful.
Mar 7 07:37:47 srvl047 ipsec[30549]: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:37:47 srvl047 ipsec[30549]: 02[NET] waiting for data on sockets
Mar 7 07:37:47 srvl047 ipsec[30549]: 13[MGR] checkout IKE_SA by message
Mar 7 07:37:47 srvl047 ipsec[30549]: 13[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:37:47 srvl047 ipsec[30549]: 13[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (92 bytes)
Mar 7 07:37:47 srvl047 ipsec[30549]: 13[ENC] parsed TRANSACTION response 823180791 [ HASH CPRP(X_USER X_PWD) ]
Mar 7 07:37:47 srvl047 ipsec[30549]: 13[IKE] Hash => 20 bytes @ 0x7f9a90002920
Mar 7 07:37:47 srvl047 ipsec[30549]: 13[IKE] 0: D0 CA FC 93 CD D3 AC 5E 2A A9 1F B7 99 BE D1 7D .......^*......}
Mar 7 07:37:47 srvl047 ipsec[30549]: 13[IKE] 16: CC 87 4C CE ..L.
Mar 7 07:37:47 srvl047 ipsec[30549]: 13[IKE] XAuth authentication of 'ppcm018' successful
Mar 7 07:37:47 srvl047 ipsec[30549]: 13[IKE] reinitiating already active tasks
Mar 7 07:37:47 srvl047 ipsec[30549]: 13[IKE] XAUTH task
Mar 7 07:37:47 srvl047 ipsec[30549]: 13[IKE] Hash => 20 bytes @ 0x7f9a900031a0
Mar 7 07:37:47 srvl047 ipsec[30549]: 13[IKE] 0: F9 6C 7D 4E 25 FD 84 F7 E5 58 1D 0D A1 10 AA EA .l}N%....X......
Mar 7 07:37:47 srvl047 ipsec[30549]: 13[IKE] 16: 02 20 51 C9 . Q.
Mar 7 07:37:47 srvl047 ipsec[30549]: 13[ENC] generating TRANSACTION request 1549094497 [ HASH CPS(X_STATUS) ]
Mar 7 07:37:47 srvl047 ipsec[30549]: 13[NET] sending packet: from 10.0.0.17[4500] to 10.0.0.13[59979] (76 bytes)
Mar 7 07:37:47 srvl047 ipsec[30549]: 13[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:37:47 srvl047 ipsec[30549]: 04[NET] sending packet: from 10.0.0.17[4500] to 10.0.0.13[59979]
Mar 7 07:37:47 srvl047 ipsec[30549]: 13[MGR] check-in of IKE_SA successful.
Mar 7 07:37:47 srvl047 ipsec[30549]: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:37:47 srvl047 ipsec[30549]: 02[NET] waiting for data on sockets
Mar 7 07:37:47 srvl047 ipsec[30549]: 12[MGR] checkout IKE_SA by message
Mar 7 07:37:47 srvl047 ipsec[30549]: 12[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:37:47 srvl047 ipsec[30549]: 12[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (76 bytes)
Mar 7 07:37:47 srvl047 ipsec[30549]: 12[ENC] parsed TRANSACTION response 1549094497 [ HASH CPA(X_STATUS) ]
Mar 7 07:37:47 srvl047 ipsec[30549]: 12[IKE] Hash => 20 bytes @ 0x7f9a98005b10
Mar 7 07:37:47 srvl047 ipsec[30549]: 12[IKE] 0: DD 5F 04 6D 10 D0 11 3F 3B 2A 57 29 1C 17 82 3D ._.m...?;*W)...=
Mar 7 07:37:47 srvl047 charon: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:37:47 srvl047 charon: 02[NET] waiting for data on sockets
Mar 7 07:37:47 srvl047 charon: 15[MGR] checkout IKE_SA by message
Mar 7 07:37:47 srvl047 charon: 15[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:37:47 srvl047 charon: 15[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (300 bytes)
Mar 7 07:37:47 srvl047 charon: 15[ENC] parsed QUICK_MODE request 2615585018 [ HASH SA No ID ID ]
Mar 7 07:37:47 srvl047 charon: 15[IKE] Hash(1) => 20 bytes @ 0x7f9a84003460
Mar 7 07:37:47 srvl047 charon: 15[IKE] 0: 98 8A 2C 93 BB B5 24 1B C9 C6 B1 63 CA FC 81 FD ..,...$....c....
Mar 7 07:37:47 srvl047 charon: 15[IKE] 16: 1B CD 4D FF ..M.
Mar 7 07:37:47 srvl047 charon: 15[CFG] looking for a child config for 172.19.96.0/19 === 172.19.97.68/32
Mar 7 07:37:47 srvl047 charon: 15[CFG] proposing traffic selectors for us:
Mar 7 07:37:47 srvl047 charon: 15[CFG] 172.19.96.0/19
Mar 7 07:37:47 srvl047 charon: 15[CFG] proposing traffic selectors for other:
Mar 7 07:37:47 srvl047 charon: 15[CFG] dynamic
Mar 7 07:37:47 srvl047 charon: 15[IKE] no matching CHILD_SA config found
Mar 7 07:37:47 srvl047 charon: 15[IKE] queueing INFORMATIONAL task
Mar 7 07:37:47 srvl047 charon: 15[IKE] activating new tasks
Mar 7 07:37:47 srvl047 charon: 15[IKE] activating INFORMATIONAL task
Mar 7 07:37:47 srvl047 charon: 15[IKE] Hash => 20 bytes @ 0x7f9a84003ea0
Mar 7 07:37:47 srvl047 charon: 15[IKE] 0: 06 64 39 47 2C FD 0E 0A A8 C4 E3 16 D5 12 50 A5 .d9G,.........P.
Mar 7 07:37:47 srvl047 charon: 15[IKE] 16: E1 83 EC 2F .../
Mar 7 07:37:47 srvl047 charon: 15[ENC] generating INFORMATIONAL_V1 request 1544773732 [ HASH N(INVAL_ID) ]
Mar 7 07:37:47 srvl047 charon: 15[NET] sending packet: from 10.0.0.17[4500] to 10.0.0.13[59979] (76 bytes)
Mar 7 07:37:47 srvl047 charon: 15[IKE] activating new tasks
Mar 7 07:37:47 srvl047 charon: 04[NET] sending packet: from 10.0.0.17[4500] to 10.0.0.13[59979]
Mar 7 07:37:47 srvl047 charon: 15[IKE] nothing to initiate
Mar 7 07:37:47 srvl047 charon: 15[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:37:47 srvl047 charon: 15[MGR] check-in of IKE_SA successful.
Mar 7 07:37:51 srvl047 charon: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:37:51 srvl047 charon: 02[NET] waiting for data on sockets
Mar 7 07:37:51 srvl047 charon: 20[MGR] checkout IKE_SA by message
Mar 7 07:37:51 srvl047 charon: 20[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:37:51 srvl047 charon: 20[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (300 bytes)
Mar 7 07:37:51 srvl047 charon: 20[IKE] received retransmit of request with ID 2615585018, but no response to retransmit
Mar 7 07:37:51 srvl047 charon: 20[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:37:51 srvl047 charon: 20[MGR] check-in of IKE_SA successful.
Mar 7 07:37:51 srvl047 charon: 11[MGR] checkout IKE_SA
Mar 7 07:37:51 srvl047 charon: 11[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:37:51 srvl047 charon: 11[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:37:51 srvl047 charon: 11[MGR] check-in of IKE_SA successful.
Mar 7 07:37:51 srvl047 charon: 06[MGR] checkout IKE_SA
Mar 7 07:37:51 srvl047 charon: 06[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:37:51 srvl047 charon: 06[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:37:51 srvl047 charon: 06[MGR] check-in of IKE_SA successful.
Mar 7 07:37:54 srvl047 charon: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:37:54 srvl047 charon: 02[NET] waiting for data on sockets
Mar 7 07:37:54 srvl047 charon: 08[MGR] checkout IKE_SA by message
Mar 7 07:37:54 srvl047 charon: 08[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:37:54 srvl047 charon: 08[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (300 bytes)
Mar 7 07:37:54 srvl047 charon: 08[IKE] received retransmit of request with ID 2615585018, but no response to retransmit
Mar 7 07:37:54 srvl047 charon: 08[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:37:54 srvl047 charon: 08[MGR] check-in of IKE_SA successful.
Mar 7 07:37:57 srvl047 charon: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:37:57 srvl047 charon: 02[NET] waiting for data on sockets
Mar 7 07:37:57 srvl047 charon: 25[MGR] checkout IKE_SA by message
Mar 7 07:37:57 srvl047 charon: 25[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:37:57 srvl047 charon: 25[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (300 bytes)
Mar 7 07:37:57 srvl047 charon: 25[IKE] received retransmit of request with ID 2615585018, but no response to retransmit
Mar 7 07:37:57 srvl047 charon: 25[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:37:57 srvl047 charon: 25[MGR] check-in of IKE_SA successful.
Mar 7 07:37:59 srvl047 charon: 27[MGR] checkout IKE_SA
Mar 7 07:37:59 srvl047 charon: 27[MGR] IKE_SA CiscoIPSec[5] successfully checked out
Mar 7 07:37:59 srvl047 charon: 27[MGR] checkin IKE_SA CiscoIPSec[5]
Mar 7 07:37:59 srvl047 charon: 27[MGR] check-in of IKE_SA successful.
Mar 7 07:38:00 srvl047 charon: 10[MGR] checkout IKE_SA
Mar 7 07:38:00 srvl047 charon: 10[MGR] IKE_SA CiscoIPSec[8] successfully checked out
Mar 7 07:38:00 srvl047 charon: 10[MGR] checkin IKE_SA CiscoIPSec[8]
Mar 7 07:38:00 srvl047 charon: 10[MGR] check-in of IKE_SA successful.
Mar 7 07:38:00 srvl047 charon: 09[MGR] checkout IKE_SA
Mar 7 07:38:00 srvl047 charon: 09[MGR] IKE_SA CiscoIPSec[8] successfully checked out
Mar 7 07:38:00 srvl047 charon: 09[MGR] checkin IKE_SA CiscoIPSec[8]
Mar 7 07:38:00 srvl047 charon: 09[MGR] check-in of IKE_SA successful.
Mar 7 07:38:00 srvl047 ipsec[30549]: 12[IKE] 16: E3 04 96 07 ....
Mar 7 07:38:00 srvl047 ipsec[30549]: 12[IKE] IKE_SA CiscoIPSec[9] established between 10.0.0.17[gate1.example.com]...10.0.0.13[C=DE, O=example AG, OU=TI, CN=ppcm018.ws.example.com]
Mar 7 07:38:00 srvl047 ipsec[30549]: 12[IKE] IKE_SA CiscoIPSec[9] state change: CONNECTING => ESTABLISHED
Mar 7 07:38:00 srvl047 ipsec[30549]: 12[IKE] scheduling reauthentication in 10172s
Mar 7 07:38:00 srvl047 ipsec[30549]: 12[IKE] maximum IKE_SA lifetime 10712s
Mar 7 07:38:00 srvl047 ipsec[30549]: 12[IKE] activating new tasks
Mar 7 07:38:00 srvl047 ipsec[30549]: 19[MGR] checkout IKE_SA
Mar 7 07:38:00 srvl047 ipsec[30549]: 12[IKE] nothing to initiate
Mar 7 07:38:00 srvl047 ipsec[30549]: 12[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:38:00 srvl047 ipsec[30549]: 12[MGR] check-in of IKE_SA successful.
Mar 7 07:38:00 srvl047 ipsec[30549]: 19[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:38:00 srvl047 ipsec[30549]: 19[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:38:00 srvl047 ipsec[30549]: 19[MGR] check-in of IKE_SA successful.
Mar 7 07:38:00 srvl047 ipsec[30549]: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:38:00 srvl047 ipsec[30549]: 02[NET] waiting for data on sockets
Mar 7 07:38:00 srvl047 ipsec[30549]: 15[MGR] checkout IKE_SA by message
Mar 7 07:38:00 srvl047 ipsec[30549]: 15[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:38:00 srvl047 ipsec[30549]: 15[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (300 bytes)
Mar 7 07:38:00 srvl047 ipsec[30549]: 15[ENC] parsed QUICK_MODE request 2615585018 [ HASH SA No ID ID ]
Mar 7 07:38:00 srvl047 ipsec[30549]: 15[IKE] Hash(1) => 20 bytes @ 0x7f9a84003460
Mar 7 07:38:00 srvl047 ipsec[30549]: 15[IKE] 0: 98 8A 2C 93 BB B5 24 1B C9 C6 B1 63 CA FC 81 FD ..,...$....c....
Mar 7 07:38:00 srvl047 ipsec[30549]: 15[IKE] 16: 1B CD 4D FF ..M.
Mar 7 07:38:00 srvl047 ipsec[30549]: 15[CFG] looking for a child config for 172.19.96.0/19 === 172.19.97.68/32
Mar 7 07:38:00 srvl047 ipsec[30549]: 15[CFG] proposing traffic selectors for us:
Mar 7 07:38:00 srvl047 ipsec[30549]: 15[CFG] 172.19.96.0/19
Mar 7 07:38:00 srvl047 ipsec[30549]: 15[CFG] proposing traffic selectors for other:
Mar 7 07:38:00 srvl047 ipsec[30549]: 15[CFG] dynamic
Mar 7 07:38:00 srvl047 ipsec[30549]: 15[IKE] no matching CHILD_SA config found
Mar 7 07:38:00 srvl047 ipsec[30549]: 15[IKE] queueing INFORMATIONAL task
Mar 7 07:38:00 srvl047 ipsec[30549]: 15[IKE] activating new tasks
Mar 7 07:38:00 srvl047 ipsec[30549]: 15[IKE] activating INFORMATIONAL task
Mar 7 07:38:00 srvl047 ipsec[30549]: 15[IKE] Hash => 20 bytes @ 0x7f9a84003ea0
Mar 7 07:38:00 srvl047 ipsec[30549]: 15[IKE] 0: 06 64 39 47 2C FD 0E 0A A8 C4 E3 16 D5 12 50 A5 .d9G,.........P.
Mar 7 07:38:00 srvl047 ipsec[30549]: 15[IKE] 16: E1 83 EC 2F .../
Mar 7 07:38:00 srvl047 ipsec[30549]: 15[ENC] generating INFORMATIONAL_V1 request 1544773732 [ HASH N(INVAL_ID) ]
Mar 7 07:38:00 srvl047 ipsec[30549]: 15[NET] sending packet: from 10.0.0.17[4500] to 10.0.0.13[59979] (76 bytes)
Mar 7 07:38:00 srvl047 ipsec[30549]: 15[IKE] activating new tasks
Mar 7 07:38:00 srvl047 ipsec[30549]: 04[NET] sending packet: from 10.0.0.17[4500] to 10.0.0.13[59979]
Mar 7 07:38:00 srvl047 ipsec[30549]: 15[IKE] nothing to initiate
Mar 7 07:38:00 srvl047 ipsec[30549]: 15[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:38:00 srvl047 ipsec[30549]: 15[MGR] check-in of IKE_SA successful.
Mar 7 07:38:00 srvl047 ipsec[30549]: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:38:00 srvl047 ipsec[30549]: 02[NET] waiting for data on sockets
Mar 7 07:38:00 srvl047 ipsec[30549]: 20[MGR] checkout IKE_SA by message
Mar 7 07:38:00 srvl047 ipsec[30549]: 20[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:38:00 srvl047 ipsec[30549]: 20[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (300 bytes)
Mar 7 07:38:00 srvl047 ipsec[30549]: 20[IKE] received retransmit of request with ID 2615585018, but no response to retransmit
Mar 7 07:38:00 srvl047 ipsec[30549]: 20[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:38:00 srvl047 ipsec[30549]: 20[MGR] check-in of IKE_SA successful.
Mar 7 07:38:00 srvl047 ipsec[30549]: 11[MGR] checkout IKE_SA
Mar 7 07:38:00 srvl047 ipsec[30549]: 11[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:38:00 srvl047 ipsec[30549]: 11[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:38:00 srvl047 ipsec[30549]: 11[MGR] check-in of IKE_SA successful.
Mar 7 07:38:00 srvl047 ipsec[30549]: 06[MGR] checkout IKE_SA
Mar 7 07:38:00 srvl047 ipsec[30549]: 06[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:38:00 srvl047 ipsec[30549]: 06[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:38:00 srvl047 ipsec[30549]: 06[MGR] check-in of IKE_SA successful.
Mar 7 07:38:00 srvl047 ipsec[30549]: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:38:00 srvl047 ipsec[30549]: 02[NET] waiting for data on sockets
Mar 7 07:38:00 srvl047 ipsec[30549]: 08[MGR] checkout IKE_SA by message
Mar 7 07:38:00 srvl047 ipsec[30549]: 08[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:38:00 srvl047 ipsec[30549]: 08[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (300 bytes)
Mar 7 07:38:00 srvl047 ipsec[30549]: 08[IKE] received retransmit of request with ID 2615585018, but no response to retransmit
Mar 7 07:38:00 srvl047 ipsec[30549]: 08[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:38:00 srvl047 ipsec[30549]: 08[MGR] check-in of IKE_SA successful.
Mar 7 07:38:00 srvl047 ipsec[30549]: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:38:00 srvl047 ipsec[30549]: 02[NET] waiting for data on sockets
Mar 7 07:38:00 srvl047 ipsec[30549]: 25[MGR] checkout IKE_SA by message
Mar 7 07:38:00 srvl047 ipsec[30549]: 25[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:38:00 srvl047 ipsec[30549]: 25[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (300 bytes)
Mar 7 07:38:00 srvl047 ipsec[30549]: 25[IKE] received retransmit of request with ID 2615585018, but no response to retransmit
Mar 7 07:38:00 srvl047 ipsec[30549]: 25[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:38:00 srvl047 ipsec[30549]: 25[MGR] check-in of IKE_SA successful.
Mar 7 07:38:00 srvl047 ipsec[30549]: 27[MGR] checkout IKE_SA
Mar 7 07:38:00 srvl047 ipsec[30549]: 27[MGR] IKE_SA CiscoIPSec[5] successfully checked out
Mar 7 07:38:00 srvl047 ipsec[30549]: 27[MGR] checkin IKE_SA CiscoIPSec[5]
Mar 7 07:38:00 srvl047 ipsec[30549]: 27[MGR] check-in of IKE_SA successful.
Mar 7 07:38:00 srvl047 ipsec[30549]: 10[MGR] checkout IKE_SA
Mar 7 07:38:00 srvl047 ipsec[30549]: 10[MGR] IKE_SA CiscoIPSec[8] successfully checked out
Mar 7 07:38:00 srvl047 charon: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:38:00 srvl047 charon: 02[NET] waiting for data on sockets
Mar 7 07:38:00 srvl047 charon: 17[MGR] checkout IKE_SA by message
Mar 7 07:38:00 srvl047 charon: 17[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:38:00 srvl047 charon: 17[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (300 bytes)
Mar 7 07:38:00 srvl047 charon: 17[IKE] received retransmit of request with ID 2615585018, but no response to retransmit
Mar 7 07:38:00 srvl047 charon: 17[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:38:00 srvl047 charon: 17[MGR] check-in of IKE_SA successful.
Mar 7 07:38:04 srvl047 charon: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:38:04 srvl047 charon: 02[NET] waiting for data on sockets
Mar 7 07:38:04 srvl047 charon: 22[MGR] checkout IKE_SA by message
Mar 7 07:38:04 srvl047 charon: 22[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:38:04 srvl047 charon: 22[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (300 bytes)
Mar 7 07:38:04 srvl047 charon: 22[IKE] received retransmit of request with ID 2615585018, but no response to retransmit
Mar 7 07:38:04 srvl047 charon: 22[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:38:04 srvl047 charon: 22[MGR] check-in of IKE_SA successful.
Mar 7 07:38:07 srvl047 charon: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:38:07 srvl047 charon: 02[NET] waiting for data on sockets
Mar 7 07:38:07 srvl047 charon: 11[MGR] checkout IKE_SA by message
Mar 7 07:38:07 srvl047 charon: 11[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:38:07 srvl047 charon: 11[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (300 bytes)
Mar 7 07:38:07 srvl047 charon: 11[IKE] received retransmit of request with ID 2615585018, but no response to retransmit
Mar 7 07:38:07 srvl047 charon: 11[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:38:07 srvl047 charon: 11[MGR] check-in of IKE_SA successful.
Mar 7 07:38:10 srvl047 charon: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:38:10 srvl047 charon: 02[NET] waiting for data on sockets
Mar 7 07:38:10 srvl047 charon: 31[MGR] checkout IKE_SA by message
Mar 7 07:38:10 srvl047 charon: 31[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:38:10 srvl047 charon: 31[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (300 bytes)
Mar 7 07:38:10 srvl047 charon: 31[IKE] received retransmit of request with ID 2615585018, but no response to retransmit
Mar 7 07:38:10 srvl047 charon: 31[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:38:10 srvl047 charon: 31[MGR] check-in of IKE_SA successful.
Mar 7 07:38:11 srvl047 charon: 28[MGR] checkout IKE_SA
Mar 7 07:38:11 srvl047 charon: 28[MGR] IKE_SA CiscoIPSec[1] successfully checked out
Mar 7 07:38:11 srvl047 charon: 28[MGR] checkin IKE_SA CiscoIPSec[1]
Mar 7 07:38:11 srvl047 charon: 28[MGR] check-in of IKE_SA successful.
Mar 7 07:38:11 srvl047 charon: 16[MGR] checkout IKE_SA
Mar 7 07:38:13 srvl047 charon: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:38:13 srvl047 charon: 02[NET] waiting for data on sockets
Mar 7 07:38:13 srvl047 charon: 29[MGR] checkout IKE_SA by message
Mar 7 07:38:13 srvl047 charon: 29[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:38:13 srvl047 charon: 29[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (300 bytes)
Mar 7 07:38:13 srvl047 charon: 29[IKE] received retransmit of request with ID 2615585018, but no response to retransmit
Mar 7 07:38:13 srvl047 charon: 29[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:38:13 srvl047 charon: 29[MGR] check-in of IKE_SA successful.
Mar 7 07:38:16 srvl047 charon: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:38:16 srvl047 charon: 02[NET] waiting for data on sockets
Mar 7 07:38:16 srvl047 charon: 13[MGR] checkout IKE_SA by message
Mar 7 07:38:16 srvl047 charon: 13[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:38:16 srvl047 charon: 13[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (300 bytes)
Mar 7 07:38:16 srvl047 charon: 13[IKE] received retransmit of request with ID 2615585018, but no response to retransmit
Mar 7 07:38:16 srvl047 charon: 13[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:38:16 srvl047 charon: 13[MGR] check-in of IKE_SA successful.
Mar 7 07:38:16 srvl047 charon: 12[MGR] checkout IKE_SA
Mar 7 07:38:16 srvl047 charon: 12[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:38:16 srvl047 charon: 12[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:38:16 srvl047 charon: 12[MGR] check-in of IKE_SA successful.
Mar 7 07:38:16 srvl047 charon: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:38:16 srvl047 charon: 02[NET] waiting for data on sockets
Mar 7 07:38:16 srvl047 charon: 19[MGR] checkout IKE_SA by message
Mar 7 07:38:16 srvl047 charon: 19[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:38:16 srvl047 charon: 19[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (92 bytes)
Mar 7 07:38:16 srvl047 charon: 19[ENC] parsed INFORMATIONAL_V1 request 4123846013 [ HASH D ]
Mar 7 07:38:16 srvl047 charon: 19[IKE] Hash => 20 bytes @ 0x7f9a80000d10
Mar 7 07:38:16 srvl047 charon: 19[IKE] 0: CE FF 24 8C EA C9 27 43 F7 88 1E E9 A6 21 41 54 ..$...'C.....!AT
Mar 7 07:38:16 srvl047 charon: 19[IKE] 16: 45 3A 03 26 E:.&
Mar 7 07:38:16 srvl047 charon: 19[IKE] received DELETE for IKE_SA CiscoIPSec[9]
Mar 7 07:38:16 srvl047 charon: 19[IKE] deleting IKE_SA CiscoIPSec[9] between 10.0.0.17[gate1.example.com]...10.0.0.13[C=DE, O=example AG, OU=TI, CN=ppcm018.ws.example.com]
Mar 7 07:38:16 srvl047 charon: 19[IKE] IKE_SA CiscoIPSec[9] state change: ESTABLISHED => DELETING
Mar 7 07:38:16 srvl047 charon: 19[IKE] IKE_SA CiscoIPSec[9] state change: DELETING => DELETING
Mar 7 07:38:16 srvl047 charon: 19[MGR] checkin and destroy IKE_SA CiscoIPSec[9]
Mar 7 07:38:16 srvl047 charon: 19[IKE] IKE_SA CiscoIPSec[9] state change: DELETING => DESTROYING
Mar 7 07:38:16 srvl047 charon: 19[MGR] check-in and destroy of IKE_SA successful
Mar 7 07:38:16 srvl047 ipsec[30549]: 10[MGR] checkin IKE_SA CiscoIPSec[8]
Mar 7 07:38:16 srvl047 ipsec[30549]: 10[MGR] check-in of IKE_SA successful.
Mar 7 07:38:16 srvl047 ipsec[30549]: 09[MGR] checkout IKE_SA
Mar 7 07:38:16 srvl047 ipsec[30549]: 09[MGR] IKE_SA CiscoIPSec[8] successfully checked out
Mar 7 07:38:16 srvl047 ipsec[30549]: 09[MGR] checkin IKE_SA CiscoIPSec[8]
Mar 7 07:38:16 srvl047 ipsec[30549]: 09[MGR] check-in of IKE_SA successful.
Mar 7 07:38:16 srvl047 ipsec[30549]: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:38:16 srvl047 ipsec[30549]: 02[NET] waiting for data on sockets
Mar 7 07:38:16 srvl047 ipsec[30549]: 17[MGR] checkout IKE_SA by message
Mar 7 07:38:16 srvl047 ipsec[30549]: 17[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:38:16 srvl047 ipsec[30549]: 17[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (300 bytes)
Mar 7 07:38:16 srvl047 ipsec[30549]: 17[IKE] received retransmit of request with ID 2615585018, but no response to retransmit
Mar 7 07:38:16 srvl047 ipsec[30549]: 17[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:38:16 srvl047 ipsec[30549]: 17[MGR] check-in of IKE_SA successful.
Mar 7 07:38:16 srvl047 ipsec[30549]: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:38:16 srvl047 ipsec[30549]: 02[NET] waiting for data on sockets
Mar 7 07:38:16 srvl047 ipsec[30549]: 22[MGR] checkout IKE_SA by message
Mar 7 07:38:16 srvl047 ipsec[30549]: 22[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:38:16 srvl047 ipsec[30549]: 22[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (300 bytes)
Mar 7 07:38:16 srvl047 ipsec[30549]: 22[IKE] received retransmit of request with ID 2615585018, but no response to retransmit
Mar 7 07:38:16 srvl047 ipsec[30549]: 22[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:38:16 srvl047 ipsec[30549]: 22[MGR] check-in of IKE_SA successful.
Mar 7 07:38:16 srvl047 ipsec[30549]: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:38:16 srvl047 ipsec[30549]: 02[NET] waiting for data on sockets
Mar 7 07:38:16 srvl047 ipsec[30549]: 11[MGR] checkout IKE_SA by message
Mar 7 07:38:16 srvl047 ipsec[30549]: 11[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:38:16 srvl047 ipsec[30549]: 11[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (300 bytes)
Mar 7 07:38:16 srvl047 ipsec[30549]: 11[IKE] received retransmit of request with ID 2615585018, but no response to retransmit
Mar 7 07:38:16 srvl047 ipsec[30549]: 11[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:38:16 srvl047 ipsec[30549]: 11[MGR] check-in of IKE_SA successful.
Mar 7 07:38:16 srvl047 ipsec[30549]: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:38:16 srvl047 ipsec[30549]: 02[NET] waiting for data on sockets
Mar 7 07:38:16 srvl047 ipsec[30549]: 31[MGR] checkout IKE_SA by message
Mar 7 07:38:16 srvl047 ipsec[30549]: 31[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:38:16 srvl047 ipsec[30549]: 31[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (300 bytes)
Mar 7 07:38:16 srvl047 ipsec[30549]: 31[IKE] received retransmit of request with ID 2615585018, but no response to retransmit
Mar 7 07:38:16 srvl047 ipsec[30549]: 31[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:38:16 srvl047 ipsec[30549]: 31[MGR] check-in of IKE_SA successful.
Mar 7 07:38:16 srvl047 ipsec[30549]: 28[MGR] checkout IKE_SA
Mar 7 07:38:16 srvl047 ipsec[30549]: 28[MGR] IKE_SA CiscoIPSec[1] successfully checked out
Mar 7 07:38:16 srvl047 ipsec[30549]: 28[MGR] checkin IKE_SA CiscoIPSec[1]
Mar 7 07:38:16 srvl047 ipsec[30549]: 28[MGR] check-in of IKE_SA successful.
Mar 7 07:38:16 srvl047 ipsec[30549]: 16[MGR] checkout IKE_SA
Mar 7 07:38:16 srvl047 ipsec[30549]: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:38:16 srvl047 ipsec[30549]: 02[NET] waiting for data on sockets
Mar 7 07:38:16 srvl047 ipsec[30549]: 29[MGR] checkout IKE_SA by message
Mar 7 07:38:16 srvl047 ipsec[30549]: 29[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:38:16 srvl047 ipsec[30549]: 29[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (300 bytes)
Mar 7 07:38:16 srvl047 ipsec[30549]: 29[IKE] received retransmit of request with ID 2615585018, but no response to retransmit
Mar 7 07:38:16 srvl047 ipsec[30549]: 29[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:38:16 srvl047 ipsec[30549]: 29[MGR] check-in of IKE_SA successful.
Mar 7 07:38:16 srvl047 ipsec[30549]: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:38:16 srvl047 ipsec[30549]: 02[NET] waiting for data on sockets
Mar 7 07:38:16 srvl047 ipsec[30549]: 13[MGR] checkout IKE_SA by message
Mar 7 07:38:16 srvl047 ipsec[30549]: 13[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:38:16 srvl047 ipsec[30549]: 13[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (300 bytes)
Mar 7 07:38:16 srvl047 ipsec[30549]: 13[IKE] received retransmit of request with ID 2615585018, but no response to retransmit
Mar 7 07:38:16 srvl047 ipsec[30549]: 13[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:38:16 srvl047 ipsec[30549]: 13[MGR] check-in of IKE_SA successful.
Mar 7 07:38:16 srvl047 ipsec[30549]: 12[MGR] checkout IKE_SA
Mar 7 07:38:16 srvl047 ipsec[30549]: 12[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:38:16 srvl047 ipsec[30549]: 12[MGR] checkin IKE_SA CiscoIPSec[9]
Mar 7 07:38:16 srvl047 ipsec[30549]: 12[MGR] check-in of IKE_SA successful.
Mar 7 07:38:16 srvl047 ipsec[30549]: 02[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500]
Mar 7 07:38:16 srvl047 ipsec[30549]: 02[NET] waiting for data on sockets
Mar 7 07:38:16 srvl047 ipsec[30549]: 19[MGR] checkout IKE_SA by message
Mar 7 07:38:16 srvl047 ipsec[30549]: 19[MGR] IKE_SA CiscoIPSec[9] successfully checked out
Mar 7 07:38:16 srvl047 ipsec[30549]: 19[NET] received packet: from 10.0.0.13[59979] to 10.0.0.17[4500] (92 bytes)
Mar 7 07:38:16 srvl047 ipsec[30549]: 19[ENC] parsed INFORMATIONAL_V1 request 4123846013 [ HASH D ]
Mar 7 07:38:16 srvl047 ipsec[30549]: 19[IKE] Hash => 20 bytes @ 0x7f9a80000d10
Mar 7 07:38:16 srvl047 ipsec[30549]: 19[IKE] 0: CE FF 24 8C EA C9 27 43 F7 88 1E E9 A6 21 41 54 ..$...'C.....!AT
Mar 7 07:38:16 srvl047 ipsec[30549]: 19[IKE] 16: 45 3A 03 26 E:.&
Mar 7 07:38:16 srvl047 ipsec[30549]: 19[IKE] received DELETE for IKE_SA CiscoIPSec[9]
Mar 7 07:38:16 srvl047 ipsec[30549]: 19[IKE] deleting IKE_SA CiscoIPSec[9] between 10.0.0.17[gate1.example.com]...10.0.0.13[C=DE, O=example AG, OU=TI, CN=ppcm018.ws.example.com]
Mar 7 07:38:16 srvl047 ipsec[30549]: 19[IKE] IKE_SA CiscoIPSec[9] state change: ESTABLISHED => DELETING
Mar 7 07:38:16 srvl047 ipsec[30549]: 19[IKE] IKE_SA CiscoIPSec[9] state change: DELETING => DELETING
Mar 7 07:38:17 srvl047 charon: 30[MGR] checkout IKE_SA
_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users