I don't see any connections nor packets involving the above mentioned ports ...hmmmm
Yes, that is correct...and then on purpose I decided to disable and re-enable on the server side to see whether the link be established or not. It did. So the result is the same on either.
I understand, This is the only connection showing regarding the link when : /ip firewall connection print detail where protocol=udp dst-address~"public.ip.of.server"
The connection from Active peers disappears. I checked this one through WinBox, so I assume that nothing would show when: /ip ipsec active-peers print
Apr/07/2021 08:51:44 ipsec,debug 0.0.0.0[500] used as isakmp port (fd=25)
Apr/07/2021 08:51:44 ipsec,debug 0.0.0.0[4500] used as isakmp port with NAT-T (fd=27)
Apr/07/2021 08:51:47 ipsec,debug failed to bind to ::[500] Bad file descriptor
Apr/07/2021 08:51:53 ipsec,debug ===== received 432 bytes from ISP ADDRESS[4500] to 192.168.20.3[4500]
Apr/07/2021 08:51:53 ipsec -> ike2 request, exchange: SA_INIT:0 ISP ADDRESS[4500] cf2388996ec53c8a:0000000000000000
Apr/07/2021 08:51:53 ipsec ike2 respond
Apr/07/2021 08:51:53 ipsec payload seen: NOTIFY (8 bytes)
Apr/07/2021 08:51:53 ipsec payload seen: NOTIFY (28 bytes)
Apr/07/2021 08:51:53 ipsec payload seen: NOTIFY (28 bytes)
Apr/07/2021 08:51:53 ipsec payload seen: NONCE (28 bytes)
Apr/07/2021 08:51:53 ipsec payload seen: KE (264 bytes)
Apr/07/2021 08:51:53 ipsec payload seen: SA (48 bytes)
Apr/07/2021 08:51:53 ipsec processing payload: NONCE
Apr/07/2021 08:51:53 ipsec processing payload: SA
Apr/07/2021 08:51:53 ipsec IKE Protocol: IKE
Apr/07/2021 08:51:53 ipsec proposal #1
Apr/07/2021 08:51:53 ipsec enc: aes128-cbc
Apr/07/2021 08:51:53 ipsec prf: hmac-sha1
Apr/07/2021 08:51:53 ipsec auth: sha1
Apr/07/2021 08:51:53 ipsec dh: modp2048
Apr/07/2021 08:51:53 ipsec matched proposal:
Apr/07/2021 08:51:53 ipsec proposal #1
Apr/07/2021 08:51:53 ipsec enc: aes128-cbc
Apr/07/2021 08:51:53 ipsec prf: hmac-sha1
Apr/07/2021 08:51:53 ipsec auth: sha1
Apr/07/2021 08:51:53 ipsec dh: modp2048
Apr/07/2021 08:51:53 ipsec processing payload: KE
Apr/07/2021 08:51:54 ipsec,debug => shared secret (size 0x100)
Apr/07/2021 08:51:54 ipsec,debug fbbea5c3 690598f7 7b22bc7f db80fd84 40b6008b 42c1a953 63dcb7de de3dd2d3
Apr/07/2021 08:51:54 ipsec,debug 7475407a b232454a b6e45604 f680ba4a e4ad8bbe adb595fc 80edb70d 5773c98c
Apr/07/2021 08:51:54 ipsec,debug 46c9c706 f5419f22 c6605a84 7be44e89 6f239cd5 d5043c28 1e664eef a163c165
Apr/07/2021 08:51:54 ipsec,debug 9c756800 8912e03c ebe32d5b e371f3be caed00fe c2491e63 898f10d9 39252e24
Apr/07/2021 08:51:54 ipsec,debug e8e9eabf 3bf567b6 09b78a1d 70d62cdb ea22a14f 50efdce7 2af23131 4d336963
Apr/07/2021 08:51:54 ipsec,debug 35453ef9 b6619ce3 89713f0b 79ddf274 8ab3414c 6d1d8ca8 731dc68b 53253057
Apr/07/2021 08:51:54 ipsec,debug 22b9ebcc a607703f 81d05fb5 5cedf087 887f317b 7382ac0b 5579b029 dadd4fb6
Apr/07/2021 08:51:54 ipsec,debug f7dabf25 8b865ed4 183094d3 ba561cec 52f103fc 89ae2db4 83a18074 557a2bd0
Apr/07/2021 08:51:54 ipsec adding payload: SA
Apr/07/2021 08:51:54 ipsec,debug => (size 0x30)
Apr/07/2021 08:51:54 ipsec,debug 00000030 0000002c 01010004 0300000c 0100000c 800e0080 03000008 02000002
Apr/07/2021 08:51:54 ipsec,debug 03000008 03000002 00000008 0400000e
Apr/07/2021 08:51:54 ipsec adding payload: KE
Apr/07/2021 08:51:54 ipsec,debug => (first 0x100 of 0x108)
Apr/07/2021 08:51:54 ipsec,debug 00000108 000e0000 99ab7b83 028ba162 58adde7a d63bec0a 59ac5ea5 b4a2b2c4
Apr/07/2021 08:51:54 ipsec,debug e6c56d97 e4df19fc 35c8d338 46d34d7e d25ee21b aa01e252 048524f0 e84c456c
Apr/07/2021 08:51:54 ipsec,debug 3bf055d4 bdd425dc b31348a0 fdade619 fe6c409a 910bd0c5 303148df 4b0143e4
Apr/07/2021 08:51:54 ipsec,debug 7beae54f 1b0f48af 6b748ee2 17d1370e 134424d9 11866520 22b07c99 e32f7eb3
Apr/07/2021 08:51:54 ipsec,debug a260ca57 55e49888 de92b6fa 1bcb2f0e 71b7c26e 2275400e 3fc999e5 9cdfed1b
Apr/07/2021 08:51:54 ipsec,debug 21cde07c 4e893cb3 cf4f5359 50539d34 d17749d9 02b12cd2 e471572a ecf13d4f
Apr/07/2021 08:51:54 ipsec,debug da6f13f3 13aca002 fedf46cb 242b614e ac102de3 b80dc179 48a08a10 5de9f5c1
Apr/07/2021 08:51:54 ipsec,debug 9b3ea54c d8a09b99 1f2e2c57 9fbedd1d a1f23d65 a4fa9ad7 d3849873 991f24b6
Apr/07/2021 08:51:54 ipsec adding payload: NONCE
Apr/07/2021 08:51:54 ipsec,debug => (size 0x1c)
Apr/07/2021 08:51:54 ipsec,debug 0000001c c108e3c9 7fa42d45 684f6214 4acd454d cb06d295 1dfa74e5
Apr/07/2021 08:51:54 ipsec adding notify: NAT_DETECTION_SOURCE_IP
Apr/07/2021 08:51:54 ipsec,debug => (size 0x1c)
Apr/07/2021 08:51:54 ipsec,debug 0000001c 00004004 f0fb450b 3aa989bc 742164df 7ed913f1 c1f4da36
Apr/07/2021 08:51:54 ipsec adding notify: NAT_DETECTION_DESTINATION_IP
Apr/07/2021 08:51:54 ipsec,debug => (size 0x1c)
Apr/07/2021 08:51:54 ipsec,debug 0000001c 00004005 3a1fa3a4 ca13bd17 62af7251 d4d674df 6bbc7a09
Apr/07/2021 08:51:54 ipsec adding notify: IKEV2_FRAGMENTATION_SUPPORTED
Apr/07/2021 08:51:54 ipsec,debug => (size 0x8)
Apr/07/2021 08:51:54 ipsec,debug 00000008 0000402e
Apr/07/2021 08:51:54 ipsec adding payload: CERTREQ
Apr/07/2021 08:51:54 ipsec,debug => (size 0x5)
Apr/07/2021 08:51:54 ipsec,debug 00000005 04
Apr/07/2021 08:51:54 ipsec <- ike2 reply, exchange: SA_INIT:0 ISP ADDRESS[4500] cf2388996ec53c8a:4f23346ef367ea12
Apr/07/2021 08:51:54 ipsec,debug ===== sending 437 bytes from 192.168.20.3[4500] to ISP ADDRESS[4500]
Apr/07/2021 08:51:54 ipsec,debug 1 times of 441 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 08:51:54 ipsec,debug => skeyseed (size 0x14)
Apr/07/2021 08:51:54 ipsec,debug d5caaea5 e5123d5f 6d0aa187 a90ef54b 64bc1243
Apr/07/2021 08:51:54 ipsec,debug => keymat (size 0x14)
Apr/07/2021 08:51:54 ipsec,debug 3527ab70 7f4aac35 15cfd421 c9494925 d4ee14c2
Apr/07/2021 08:51:54 ipsec,debug => SK_ai (size 0x14)
Apr/07/2021 08:51:54 ipsec,debug e3a956ef c3cbd1f3 e9ac07a1 3d68fdf4 60c616d5
Apr/07/2021 08:51:54 ipsec,debug => SK_ar (size 0x14)
Apr/07/2021 08:51:54 ipsec,debug 90e8a49f 19c5fa3e dad22b1b 529e9890 33890c3f
Apr/07/2021 08:51:54 ipsec,debug => SK_ei (size 0x10)
Apr/07/2021 08:51:54 ipsec,debug 334f3e83 9e65ce19 bbeaf8b9 ef2d11f3
Apr/07/2021 08:51:54 ipsec,debug => SK_er (size 0x10)
Apr/07/2021 08:51:54 ipsec,debug 5b33286d 97c0c74b f55f8171 7eb11c39
Apr/07/2021 08:51:54 ipsec,debug => SK_pi (size 0x14)
Apr/07/2021 08:51:54 ipsec,debug c490e27a d8a73b03 2f2dac58 e48aa689 2cac87a8
Apr/07/2021 08:51:54 ipsec,debug => SK_pr (size 0x14)
Apr/07/2021 08:51:54 ipsec,debug d72e128e 7aee6ec2 88f83ee8 503d01e6 886443c6
Apr/07/2021 08:51:54 ipsec,info new ike2 SA (R): 192.168.20.3[4500]-ISP ADDRESS[4500] spi:4f23346ef367ea12:cf2388996ec53c8a
Apr/07/2021 08:51:54 ipsec processing payloads: VID (none found)
Apr/07/2021 08:51:54 ipsec processing payloads: NOTIFY
Apr/07/2021 08:51:54 ipsec notify: IKEV2_FRAGMENTATION_SUPPORTED
Apr/07/2021 08:51:54 ipsec notify: NAT_DETECTION_DESTINATION_IP
Apr/07/2021 08:51:54 ipsec notify: NAT_DETECTION_SOURCE_IP
Apr/07/2021 08:51:54 ipsec (NAT-T) REMOTE LOCAL
Apr/07/2021 08:51:54 ipsec KA list add: 192.168.20.3[4500]->ISP ADDRESS[4500]
Apr/07/2021 08:51:54 ipsec fragmentation negotiated
Apr/07/2021 08:51:55 ipsec,debug ===== received 428 bytes from ISP ADDRESS[4500] to 192.168.20.3[4500]
Apr/07/2021 08:51:55 ipsec -> ike2 request, exchange: AUTH:1 ISP ADDRESS[4500] cf2388996ec53c8a:4f23346ef367ea12
Apr/07/2021 08:51:55 ipsec payload seen: ENC (400 bytes)
Apr/07/2021 08:51:55 ipsec processing payload: ENC
Apr/07/2021 08:51:55 ipsec,debug => iv (size 0x10)
Apr/07/2021 08:51:55 ipsec,debug eefb701a 8f2434cb 46c5e449 c8a702ab
Apr/07/2021 08:51:55 ipsec,debug => decrypted and trimmed payload (size 0x94)
Apr/07/2021 08:51:55 ipsec,debug 2700000c 01000000 ac154599 2900001c 02000000 59dca605 554d9a83 f3e8d4dd
Apr/07/2021 08:51:55 ipsec,debug 2f449459 8c72e73f 21000008 00004000 2c00002c 00000028 01030403 03d0d156
Apr/07/2021 08:51:55 ipsec,debug 0300000c 0100000c 800e0080 03000008 03000002 00000008 05000000 2d000018
Apr/07/2021 08:51:55 ipsec,debug 01000000 07000010 0000ffff 00000000 ffffffff 29000018 01000000 07000010
Apr/07/2021 08:51:55 ipsec,debug 0000ffff b05ca33b b05ca33b 00000008 00004007
Apr/07/2021 08:51:55 ipsec,debug decrypted packet
Apr/07/2021 08:51:55 ipsec payload seen: ID_I (12 bytes)
Apr/07/2021 08:51:55 ipsec payload seen: AUTH (28 bytes)
Apr/07/2021 08:51:55 ipsec payload seen: NOTIFY (8 bytes)
Apr/07/2021 08:51:55 ipsec payload seen: SA (44 bytes)
Apr/07/2021 08:51:55 ipsec payload seen: TS_I (24 bytes)
Apr/07/2021 08:51:55 ipsec payload seen: TS_R (24 bytes)
Apr/07/2021 08:51:55 ipsec payload seen: NOTIFY (8 bytes)
Apr/07/2021 08:51:55 ipsec processing payloads: NOTIFY
Apr/07/2021 08:51:55 ipsec notify: INITIAL_CONTACT
Apr/07/2021 08:51:55 ipsec notify: USE_TRANSPORT_MODE
Apr/07/2021 08:51:55 ipsec ike auth: respond
Apr/07/2021 08:51:55 ipsec processing payload: ID_I
Apr/07/2021 08:51:55 ipsec ID_I (ADDR4): ISP CLIENT IP ADDRESS
Apr/07/2021 08:51:55 ipsec processing payload: ID_R (not found)
Apr/07/2021 08:51:55 ipsec processing payload: AUTH
Apr/07/2021 08:51:55 ipsec processing payloads: NOTIFY
Apr/07/2021 08:51:55 ipsec notify: INITIAL_CONTACT
Apr/07/2021 08:51:55 ipsec notify: USE_TRANSPORT_MODE
Apr/07/2021 08:51:55 ipsec processing payload: AUTH
Apr/07/2021 08:51:55 ipsec requested auth method: SKEY
Apr/07/2021 08:51:55 ipsec,debug => peer's auth (size 0x14)
Apr/07/2021 08:51:55 ipsec,debug 59dca605 554d9a83 f3e8d4dd 2f449459 8c72e73f
Apr/07/2021 08:51:55 ipsec,debug => auth nonce (size 0x18)
Apr/07/2021 08:51:55 ipsec,debug c108e3c9 7fa42d45 684f6214 4acd454d cb06d295 1dfa74e5
Apr/07/2021 08:51:55 ipsec,debug => SK_p (size 0x14)
Apr/07/2021 08:51:55 ipsec,debug c490e27a d8a73b03 2f2dac58 e48aa689 2cac87a8
Apr/07/2021 08:51:55 ipsec,debug => idhash (size 0x14)
Apr/07/2021 08:51:55 ipsec,debug b4924738 9ce41d89 262ffa90 28219cfc eb0832cd
Apr/07/2021 08:51:55 ipsec,debug => calculated peer's AUTH (size 0x14)
Apr/07/2021 08:51:55 ipsec,debug 59dca605 554d9a83 f3e8d4dd 2f449459 8c72e73f
Apr/07/2021 08:51:55 ipsec,info,account peer authorized: 192.168.20.3[4500]-ISP ADDRESS[4500] spi:4f23346ef367ea12:cf2388996ec53c8a
Apr/07/2021 08:51:55 ipsec initial contact
Apr/07/2021 08:51:55 ipsec processing payloads: NOTIFY
Apr/07/2021 08:51:55 ipsec notify: INITIAL_CONTACT
Apr/07/2021 08:51:55 ipsec notify: USE_TRANSPORT_MODE
Apr/07/2021 08:51:55 ipsec peer wants transport mode
Apr/07/2021 08:51:55 ipsec processing payload: CONFIG (not found)
Apr/07/2021 08:51:55 ipsec processing payload: SA
Apr/07/2021 08:51:55 ipsec IKE Protocol: ESP
Apr/07/2021 08:51:55 ipsec proposal #1
Apr/07/2021 08:51:55 ipsec enc: aes128-cbc
Apr/07/2021 08:51:55 ipsec auth: sha1
Apr/07/2021 08:51:55 ipsec processing payload: TS_I
Apr/07/2021 08:51:55 ipsec 0.0.0.0/0
Apr/07/2021 08:51:55 ipsec processing payload: TS_R
Apr/07/2021 08:51:55 ipsec ISP CLIENT IP ADDRESS
Apr/07/2021 08:51:55 ipsec skipping not specific selector in transport mode with NAT
Apr/07/2021 08:51:55 ipsec ID_R (ADDR4): 192.168.20.3
Apr/07/2021 08:51:55 ipsec,debug => auth nonce (size 0x18)
Apr/07/2021 08:51:55 ipsec,debug 6199a078 3b4739e6 992655c7 8fb2fd13 f3838df5 f5d4d1c9
Apr/07/2021 08:51:55 ipsec,debug => SK_p (size 0x14)
Apr/07/2021 08:51:55 ipsec,debug d72e128e 7aee6ec2 88f83ee8 503d01e6 886443c6
Apr/07/2021 08:51:55 ipsec,debug => idhash (size 0x14)
Apr/07/2021 08:51:55 ipsec,debug b883b197 28e81329 ed2725b2 6aa80e56 aba9accd
Apr/07/2021 08:51:55 ipsec,debug => my auth (size 0x14)
Apr/07/2021 08:51:55 ipsec,debug ac966e06 1f8a5992 53358c55 187e1399 e476e693
Apr/07/2021 08:51:55 ipsec adding payload: ID_R
Apr/07/2021 08:51:55 ipsec,debug => (size 0xc)
Apr/07/2021 08:51:55 ipsec,debug 0000000c 01000000 c0a81403
Apr/07/2021 08:51:55 ipsec adding payload: AUTH
Apr/07/2021 08:51:55 ipsec,debug => (size 0x1c)
Apr/07/2021 08:51:55 ipsec,debug 0000001c 02000000 ac966e06 1f8a5992 53358c55 187e1399 e476e693
Apr/07/2021 08:51:55 ipsec adding notify: TS_UNACCEPTABLE
Apr/07/2021 08:51:55 ipsec,debug => (size 0x8)
Apr/07/2021 08:51:55 ipsec,debug 00000008 00000026
Apr/07/2021 08:51:55 ipsec <- ike2 reply, exchange: AUTH:1 ISP ADDRESS[4500] cf2388996ec53c8a:4f23346ef367ea12
Apr/07/2021 08:51:55 ipsec,debug ===== sending 140 bytes from 192.168.20.3[4500] to ISP ADDRESS[4500]
Apr/07/2021 08:51:55 ipsec,debug 1 times of 144 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 08:51:56 ipsec acquire for policy: 192.168.20.3 <=> ISP ADDRESS
Apr/07/2021 08:51:56 ipsec connection found for peer: ISP ADDRESS[4500]
Apr/07/2021 08:51:56 ipsec init child for policy: 192.168.20.3 <=> ISP ADDRESS
Apr/07/2021 08:51:56 ipsec init child continue
Apr/07/2021 08:51:56 ipsec offering proto: 3
Apr/07/2021 08:51:56 ipsec proposal #1
Apr/07/2021 08:51:56 ipsec enc: aes128-cbc
Apr/07/2021 08:51:56 ipsec auth: sha1
Apr/07/2021 08:51:56 ipsec dh: modp2048
Apr/07/2021 08:51:57 ipsec adding payload: NONCE
Apr/07/2021 08:51:57 ipsec,debug => (size 0x1c)
Apr/07/2021 08:51:57 ipsec,debug 0000001c 17ce54f7 365e65fc b91e4144 8770920a 427c05ee 72c9cc99
Apr/07/2021 08:51:57 ipsec adding payload: KE
Apr/07/2021 08:51:57 ipsec,debug => (first 0x100 of 0x108)
Apr/07/2021 08:51:57 ipsec,debug 00000108 000e0000 20c61f2f e08f497c 54aa87ae 1ec6f462 3fc4e4b3 3cbb3a83
Apr/07/2021 08:51:57 ipsec,debug 98fca45a 764b8b67 04d3ff25 219f5b12 0a1b2e96 9f1b9ba4 28223354 823a5376
Apr/07/2021 08:51:57 ipsec,debug 027d7e59 6b4b2383 d1aaa817 5c110836 a2653084 fd591b9e efdd81b3 125f3509
Apr/07/2021 08:51:57 ipsec,debug ce4a13f9 07ccf2df b7c83028 ea683ee0 a157de3a 144d8f82 2f1c8e71 b02345c0
Apr/07/2021 08:51:57 ipsec,debug 9e6406f0 9365441c c67b3852 5e6c666c d4a38099 9c60b75b c170eb46 aa0d362c
Apr/07/2021 08:51:57 ipsec,debug 99ec6f9f fdc325f3 43ae9fb5 790ba927 c27225bb e145d9f6 5b68f6eb c24abded
Apr/07/2021 08:51:57 ipsec,debug cd4004c7 d7515c4a 8a1875ee 77d71888 01556e81 d20b2453 7f94d9af a0248588
Apr/07/2021 08:51:57 ipsec,debug 9eefa418 f19eabc8 eb06a972 51471800 e02f8f27 2715cb70 fce18333 0bb08f04
Apr/07/2021 08:51:57 ipsec adding payload: SA
Apr/07/2021 08:51:57 ipsec,debug => (size 0x34)
Apr/07/2021 08:51:57 ipsec,debug 00000034 00000030 01030404 04a9f5d4 0300000c 0100000c 800e0080 03000008
Apr/07/2021 08:51:57 ipsec,debug 03000002 03000008 0400000e 00000008 05000000
Apr/07/2021 08:51:57 ipsec initiator selector: 192.168.20.3
Apr/07/2021 08:51:57 ipsec adding payload: TS_I
Apr/07/2021 08:51:57 ipsec,debug => (size 0x18)
Apr/07/2021 08:51:57 ipsec,debug 00000018 01000000 07000010 0000ffff c0a81403 c0a81403
Apr/07/2021 08:51:57 ipsec responder selector: ISP ADDRESS
Apr/07/2021 08:51:57 ipsec adding payload: TS_R
Apr/07/2021 08:51:57 ipsec,debug => (size 0x18)
Apr/07/2021 08:51:57 ipsec,debug 00000018 01000000 07000010 0000ffff 4845becf 4845becf
Apr/07/2021 08:51:57 ipsec adding notify: USE_TRANSPORT_MODE
Apr/07/2021 08:51:57 ipsec,debug => (size 0x8)
Apr/07/2021 08:51:57 ipsec,debug 00000008 00004007
Apr/07/2021 08:51:57 ipsec <- ike2 request, exchange: CREATE_CHILD_SA:0 ISP ADDRESS[4500] cf2388996ec53c8a:4f23346ef367ea12
Apr/07/2021 08:51:57 ipsec,debug ===== sending 620 bytes from 192.168.20.3[4500] to ISP ADDRESS[4500]
Apr/07/2021 08:51:57 ipsec,debug 1 times of 624 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 08:51:58 ipsec,debug ===== received 620 bytes from ISP ADDRESS[4500] to 192.168.20.3[4500]
Apr/07/2021 08:51:58 ipsec -> ike2 reply, exchange: CREATE_CHILD_SA:0 ISP ADDRESS[4500] cf2388996ec53c8a:4f23346ef367ea12
Apr/07/2021 08:51:58 ipsec payload seen: ENC (592 bytes)
Apr/07/2021 08:51:58 ipsec processing payload: ENC
Apr/07/2021 08:51:58 ipsec,debug => iv (size 0x10)
Apr/07/2021 08:51:58 ipsec,debug 08e95fe6 e45aef3d ed1b976f 6c7b117c
Apr/07/2021 08:51:58 ipsec,debug => decrypted and trimmed payload (size 0x190)
Apr/07/2021 08:51:58 ipsec,debug 2200001c 991a33c1 ab6d10da 37ad2ada 7f8adad8 8da883bd 40a930d1 2c000108
Apr/07/2021 08:51:58 ipsec,debug 000e0000 2887e944 802653e7 4fb05d02 f8f7e30f 2296cf4a 99bde1be d0812ed9
Apr/07/2021 08:51:58 ipsec,debug fb4ca7ec 9d1a3b2c 4b00a22f 399e86f3 2922b5fb c3869ed1 afa44c48 8afcdc48
Apr/07/2021 08:51:58 ipsec,debug b16cb129 e68e17f5 29f0f77b 790618b3 944fec09 f56a6b3d 609b74fc 9ca1422f
Apr/07/2021 08:51:58 ipsec,debug 2725b189 52e5389b a8f4d303 d56dec4a 5e91b45a 67a88b58 29f01c81 86659d89
Apr/07/2021 08:51:58 ipsec,debug 698e5022 9c7104d8 34331e00 dc7ff1ca 3b2ccc3e b74b90b9 88bb3b85 c8cc69fa
Apr/07/2021 08:51:58 ipsec,debug 2fbeb007 2a1c1d0b b4e7403b 3a630b2a 5b28f93b 47b975f6 d67d3917 956d14cf
Apr/07/2021 08:51:58 ipsec,debug 86b3b10a f3601aaf 63196eeb a0729b39 5f6e9582 797e1464 d6cdaa94 fcc2cf02
Apr/07/2021 08:51:58 ipsec,debug
Apr/07/2021 08:51:58 ipsec,debug fa8b9bbb 2d7c5c9b 9bb99d55 2e2fde30 e680b2d8 bafa6739 abae2b45 29159905
Apr/07/2021 08:51:58 ipsec,debug 3bdb073c 2d000018 01000000 07000010 0000ffff b05ca33b b05ca33b 21000018
Apr/07/2021 08:51:58 ipsec,debug 01000000 07000010 0000ffff ac154599 ac154599 29000034 00000030 01030404
Apr/07/2021 08:51:58 ipsec,debug 01365d7f 0300000c 0100000c 800e0080 03000008 03000002 03000008 0400000e
Apr/07/2021 08:51:58 ipsec,debug 00000008 05000000 00000008 00004007
Apr/07/2021 08:51:58 ipsec,debug decrypted packet
Apr/07/2021 08:51:58 ipsec payload seen: NONCE (28 bytes)
Apr/07/2021 08:51:58 ipsec payload seen: KE (264 bytes)
Apr/07/2021 08:51:58 ipsec payload seen: TS_I (24 bytes)
Apr/07/2021 08:51:58 ipsec payload seen: TS_R (24 bytes)
Apr/07/2021 08:51:58 ipsec payload seen: SA (52 bytes)
Apr/07/2021 08:51:58 ipsec payload seen: NOTIFY (8 bytes)
Apr/07/2021 08:51:58 ipsec create child: initiator finish
Apr/07/2021 08:51:58 ipsec processing payloads: NOTIFY
Apr/07/2021 08:51:58 ipsec notify: USE_TRANSPORT_MODE
Apr/07/2021 08:51:58 ipsec peer selected transport mode
Apr/07/2021 08:51:58 ipsec processing payload: SA
Apr/07/2021 08:51:58 ipsec IKE Protocol: ESP
Apr/07/2021 08:51:58 ipsec proposal #1
Apr/07/2021 08:51:58 ipsec enc: aes128-cbc
Apr/07/2021 08:51:58 ipsec auth: sha1
Apr/07/2021 08:51:58 ipsec dh: modp2048
Apr/07/2021 08:51:58 ipsec can't agree on proposal
Apr/07/2021 08:51:58 ipsec send notify: NO_PROPOSAL_CHOSEN
Apr/07/2021 08:51:58 ipsec adding notify: NO_PROPOSAL_CHOSEN
Apr/07/2021 08:51:58 ipsec,debug => (size 0x8)
Apr/07/2021 08:51:58 ipsec,debug 00000008 0000000e
Apr/07/2021 08:51:58 ipsec <- ike2 request, exchange: INFORMATIONAL:1 ISP ADDRESS[4500] cf2388996ec53c8a:4f23346ef367ea12
Apr/07/2021 08:51:58 ipsec,debug ===== sending 236 bytes from 192.168.20.3[4500] to ISP ADDRESS[4500]
Apr/07/2021 08:51:58 ipsec,debug 1 times of 240 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 08:51:58 ipsec,info killing ike2 SA: 192.168.20.3[4500]-ISP ADDRESS[4500] spi:4f23346ef367ea12:cf2388996ec53c8a
Apr/07/2021 08:51:58 ipsec adding payload: DELETE
Apr/07/2021 08:51:58 ipsec,debug => (size 0x8)
Apr/07/2021 08:51:58 ipsec,debug 00000008 01000000
Apr/07/2021 08:51:58 ipsec <- ike2 request, exchange: INFORMATIONAL:2 ISP ADDRESS[4500] cf2388996ec53c8a:4f23346ef367ea12
Apr/07/2021 08:51:58 ipsec,debug ===== sending 220 bytes from 192.168.20.3[4500] to ISP ADDRESS[4500]
Apr/07/2021 08:51:58 ipsec,debug 1 times of 224 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 08:51:58 ipsec KA remove: 192.168.20.3[4500]->ISP ADDRESS[4500]
Apr/07/2021 08:51:58 ipsec,debug KA tree dump: 192.168.20.3[4500]->ISP ADDRESS[4500] (in_use=1)
Apr/07/2021 08:51:58 ipsec,debug KA removing this one...
Apr/07/2021 08:51:58 ipsec,debug ===== received 140 bytes from ISP ADDRESS[4500] to 192.168.20.3[4500]
Apr/07/2021 08:51:58 ipsec -> ike2 reply, exchange: INFORMATIONAL:1 ISP ADDRESS[4500] cf2388996ec53c8a:4f23346ef367ea12
Apr/07/2021 08:51:58 ipsec SPI 4f23346ef367ea12 not registered for ISP ADDRESS[4500]
Apr/07/2021 08:51:58 ipsec,debug ===== received 92 bytes from ISP ADDRESS[4500] to 192.168.20.3[4500]
Apr/07/2021 08:51:58 ipsec -> ike2 reply, exchange: INFORMATIONAL:2 ISP ADDRESS[4500] cf2388996ec53c8a:4f23346ef367ea12
Apr/07/2021 08:51:58 ipsec SPI 4f23346ef367ea12 not registered for ISP ADDRESS[4500]
Apr/07/2021 08:52:00 ipsec,debug ===== received 432 bytes from ISP ADDRESS[4500] to 192.168.20.3[4500]
Apr/07/2021 08:52:00 ipsec -> ike2 request, exchange: SA_INIT:0 ISP ADDRESS[4500] 0536c9b454b779f7:0000000000000000
Apr/07/2021 08:52:00 ipsec ike2 respond
Apr/07/2021 08:52:00 ipsec payload seen: NOTIFY (8 bytes)
Apr/07/2021 08:52:00 ipsec payload seen: NOTIFY (28 bytes)
Apr/07/2021 08:52:00 ipsec payload seen: NOTIFY (28 bytes)
Apr/07/2021 08:52:00 ipsec payload seen: NONCE (28 bytes)
Apr/07/2021 08:52:00 ipsec payload seen: KE (264 bytes)
Apr/07/2021 08:52:00 ipsec payload seen: SA (48 bytes)
Apr/07/2021 08:52:00 ipsec processing payload: NONCE
Apr/07/2021 08:52:00 ipsec processing payload: SA
Apr/07/2021 08:52:00 ipsec IKE Protocol: IKE
Apr/07/2021 08:52:00 ipsec proposal #1
Apr/07/2021 08:52:00 ipsec enc: aes128-cbc
Apr/07/2021 08:52:00 ipsec prf: hmac-sha1
Apr/07/2021 08:52:00 ipsec auth: sha1
Apr/07/2021 08:52:00 ipsec dh: modp2048
Apr/07/2021 08:52:00 ipsec matched proposal:
Apr/07/2021 08:52:00 ipsec proposal #1
Apr/07/2021 08:52:00 ipsec enc: aes128-cbc
Apr/07/2021 08:52:00 ipsec prf: hmac-sha1
Apr/07/2021 08:52:00 ipsec auth: sha1
Apr/07/2021 08:52:00 ipsec dh: modp2048
Apr/07/2021 08:52:00 ipsec processing payload: KE
Apr/07/2021 08:52:01 ipsec,debug => shared secret (size 0x100)
Apr/07/2021 08:52:01 ipsec,debug 0ded106f cbce211c 74037f12 3bcde2b1 317d9d02 49ef6ec1 cfc79b90 7d4d9dfd
Apr/07/2021 08:52:01 ipsec,debug d0a7a7b0 49d4304e dc65464d 3130e753 aa5cadf8 6e76f0e9 e086d31b 804b925a
Apr/07/2021 08:52:01 ipsec,debug 52d0d983 f4621dbf d6b900fe dfb6933a f2fa7eed b1d2541f 539ea0eb 80f9ff6f
Apr/07/2021 08:52:01 ipsec,debug bbd5a4c7 b2aea561 ef0e4d90 eadcaa6a 92052367 0ec63fe2 b18583b4 d2903e86
Apr/07/2021 08:52:01 ipsec,debug 35804855 a3e4dd43 c95af198 7888f2ce b122a67a 788c6341 e14c0305 84f37ede
Apr/07/2021 08:52:01 ipsec,debug def2f889 ebb4b136 665e80e5 17812598 62e32c39 f3706dcb 941fba6e ba2a7c52
Apr/07/2021 08:52:01 ipsec,debug a47b4c32 bc7389f3 7e6f0fe7 6876481b 1b70c895 886c3f3a 7b3d01ea 1d90cbd2
Apr/07/2021 08:52:01 ipsec,debug 6155b7d0 a24eda51 55bcbffc b1e04523 f14404b0 c0f52946 86b7110e cc10cd08
Apr/07/2021 08:52:01 ipsec adding payload: SA
Apr/07/2021 08:52:01 ipsec,debug => (size 0x30)
Apr/07/2021 08:52:01 ipsec,debug 00000030 0000002c 01010004 0300000c 0100000c 800e0080 03000008 02000002
Apr/07/2021 08:52:01 ipsec,debug 03000008 03000002 00000008 0400000e
Apr/07/2021 08:52:01 ipsec adding payload: KE
Apr/07/2021 08:52:01 ipsec,debug => (first 0x100 of 0x108)
Apr/07/2021 08:52:01 ipsec,debug 00000108 000e0000 0468f75b 043578de aad3ced2 0e711160 5ad1d37d b8fe02f7
Apr/07/2021 08:52:01 ipsec,debug 8e74f9a3 5e5a5f73 24b5b5bc f865e8cd 799ee834 225feb6f 5c6aa464 64a4c3a5
Apr/07/2021 08:52:01 ipsec,debug 5dbd982e 11331a1b 4155d920 c688ba06 d9a7cf6e 5ce8e5ec 612d73e9 1c07e310
Apr/07/2021 08:52:01 ipsec,debug 13508dc6 ca0f2ecb e5bbcbce 1804b270 3212950b c10f350c 001e71de f130166b
Apr/07/2021 08:52:01 ipsec,debug 119483ce 66dc2bf1 d6635ccd 0494d6f7 a40c4f46 89bcafed 4bc8d031 dbb07ed6
Apr/07/2021 08:52:01 ipsec,debug 4fbe2d84 31024742 177794df 9e772425 cffb20c0 4f9aa084 e241dc6f 3eeba166
Apr/07/2021 08:52:01 ipsec,debug 7547e7a8 8068e4ff 2e93d75e 8eb6e04b ecbd20e7 0cb683d0 3540d4fc fba2b6a0
Apr/07/2021 08:52:01 ipsec,debug dfc98c72 37eeef02 47f9d656 5a7de339 1016711e db02eefa 198aa7bc d9092c37
Apr/07/2021 08:52:01 ipsec adding payload: NONCE
Apr/07/2021 08:52:01 ipsec,debug => (size 0x1c)
Apr/07/2021 08:52:01 ipsec,debug 0000001c 7d9718fc 74402ada 8f9f886e b31142d4 d5da63fa d6f50df3
Apr/07/2021 08:52:01 ipsec adding notify: NAT_DETECTION_SOURCE_IP
Apr/07/2021 08:52:01 ipsec,debug => (size 0x1c)
Apr/07/2021 08:52:01 ipsec,debug 0000001c 00004004 84021957 0645682e d107353e 495eaec4 766c46aa
Apr/07/2021 08:52:01 ipsec adding notify: NAT_DETECTION_DESTINATION_IP
Apr/07/2021 08:52:01 ipsec,debug => (size 0x1c)
Apr/07/2021 08:52:01 ipsec,debug 0000001c 00004005 c21f1d7d 0918525e 6f035e3c 6f9a1ba1 fad81cd1
Apr/07/2021 08:52:01 ipsec adding notify: IKEV2_FRAGMENTATION_SUPPORTED
Apr/07/2021 08:52:01 ipsec,debug => (size 0x8)
Apr/07/2021 08:52:01 ipsec,debug 00000008 0000402e
Apr/07/2021 08:52:01 ipsec adding payload: CERTREQ
Apr/07/2021 08:52:01 ipsec,debug => (size 0x5)
Apr/07/2021 08:52:01 ipsec,debug 00000005 04
Apr/07/2021 08:52:01 ipsec <- ike2 reply, exchange: SA_INIT:0 ISP ADDRESS[4500] 0536c9b454b779f7:5554d89fdedaab65
Apr/07/2021 08:52:01 ipsec,debug ===== sending 437 bytes from 192.168.20.3[4500] to ISP ADDRESS[4500]
Apr/07/2021 08:52:01 ipsec,debug 1 times of 441 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 08:52:01 ipsec,debug => skeyseed (size 0x14)
Apr/07/2021 08:52:01 ipsec,debug 2960408e 015da77b 36b185cd 4bcb7c43 0643d314
Apr/07/2021 08:52:01 ipsec,debug => keymat (size 0x14)
Apr/07/2021 08:52:01 ipsec,debug 6f081aed fec462e5 9a272acb 6ec93ea8 c15843d2
Apr/07/2021 08:52:01 ipsec,debug => SK_ai (size 0x14)
Apr/07/2021 08:52:01 ipsec,debug bd23114b 8eedc230 de09e308 5766b132 db64850a
Apr/07/2021 08:52:01 ipsec,debug => SK_ar (size 0x14)
Apr/07/2021 08:52:01 ipsec,debug 8f99dc38 15e4d168 1e1f805d a646e99e abb5a3a1
Apr/07/2021 08:52:01 ipsec,debug => SK_ei (size 0x10)
Apr/07/2021 08:52:01 ipsec,debug 820f5dd1 34e984e1 3c482db9 dca24357
Apr/07/2021 08:52:01 ipsec,debug => SK_er (size 0x10)
Apr/07/2021 08:52:01 ipsec,debug db4b2822 f2df09de a709866d e9ee0e01
Apr/07/2021 08:52:01 ipsec,debug => SK_pi (size 0x14)
Apr/07/2021 08:52:01 ipsec,debug c3204228 2d23f613 b05d798d 84606b95 8d298512
Apr/07/2021 08:52:01 ipsec,debug => SK_pr (size 0x14)
Apr/07/2021 08:52:01 ipsec,debug 38513f47 8cb0260f 3aea150a 07ca23a0 c8420008
Apr/07/2021 08:52:01 ipsec,info new ike2 SA (R): 192.168.20.3[4500]-ISP ADDRESS[4500] spi:5554d89fdedaab65:0536c9b454b779f7
Apr/07/2021 08:52:01 ipsec processing payloads: VID (none found)
Apr/07/2021 08:52:01 ipsec processing payloads: NOTIFY
Apr/07/2021 08:52:01 ipsec notify: IKEV2_FRAGMENTATION_SUPPORTED
Apr/07/2021 08:52:01 ipsec notify: NAT_DETECTION_DESTINATION_IP
Apr/07/2021 08:52:01 ipsec notify: NAT_DETECTION_SOURCE_IP
Apr/07/2021 08:52:01 ipsec (NAT-T) REMOTE LOCAL
Apr/07/2021 08:52:01 ipsec KA list add: 192.168.20.3[4500]->ISP ADDRESS[4500]
Apr/07/2021 08:52:01 ipsec fragmentation negotiated
Apr/07/2021 08:52:02 ipsec,debug ===== received 412 bytes from ISP ADDRESS[4500] to 192.168.20.3[4500]
Apr/07/2021 08:52:02 ipsec -> ike2 request, exchange: AUTH:1 ISP ADDRESS[4500] 0536c9b454b779f7:5554d89fdedaab65
Apr/07/2021 08:52:02 ipsec payload seen: ENC (384 bytes)
Apr/07/2021 08:52:02 ipsec processing payload: ENC
Apr/07/2021 08:52:02 ipsec,debug => iv (size 0x10)
Apr/07/2021 08:52:02 ipsec,debug af060ec5 938b1187 66cbb0a9 0518576c
Apr/07/2021 08:52:02 ipsec,debug => decrypted and trimmed payload (size 0x94)
Apr/07/2021 08:52:02 ipsec,debug 2700000c 01000000 ac154599 2900001c 02000000 bb88aab0 2ad7555e 9f979817
Apr/07/2021 08:52:02 ipsec,debug 28ba25b6 36214504 21000008 00004000 2c00002c 00000028 01030403 0193cac7
Apr/07/2021 08:52:02 ipsec,debug 0300000c 0100000c 800e0080 03000008 03000002 00000008 05000000 2d000018
Apr/07/2021 08:52:02 ipsec,debug 01000000 07000010 0000ffff 00000000 ffffffff 29000018 01000000 07000010
Apr/07/2021 08:52:02 ipsec,debug 0000ffff b05ca33b b05ca33b 00000008 00004007
Apr/07/2021 08:52:02 ipsec,debug decrypted packet
Apr/07/2021 08:52:02 ipsec payload seen: ID_I (12 bytes)
Apr/07/2021 08:52:02 ipsec payload seen: AUTH (28 bytes)
Apr/07/2021 08:52:02 ipsec payload seen: NOTIFY (8 bytes)
Apr/07/2021 08:52:02 ipsec payload seen: SA (44 bytes)
Apr/07/2021 08:52:02 ipsec payload seen: TS_I (24 bytes)
Apr/07/2021 08:52:02 ipsec payload seen: TS_R (24 bytes)
Apr/07/2021 08:52:02 ipsec payload seen: NOTIFY (8 bytes)
Apr/07/2021 08:52:02 ipsec processing payloads: NOTIFY
Apr/07/2021 08:52:02 ipsec notify: INITIAL_CONTACT
Apr/07/2021 08:52:02 ipsec notify: USE_TRANSPORT_MODE
Apr/07/2021 08:52:02 ipsec ike auth: respond
Apr/07/2021 08:52:02 ipsec processing payload: ID_I
Apr/07/2021 08:52:02 ipsec ID_I (ADDR4): 172.21.69.153
Apr/07/2021 08:52:02 ipsec processing payload: ID_R (not found)
Apr/07/2021 08:52:02 ipsec processing payload: AUTH
Apr/07/2021 08:52:02 ipsec processing payloads: NOTIFY
Apr/07/2021 08:52:02 ipsec notify: INITIAL_CONTACT
Apr/07/2021 08:52:02 ipsec notify: USE_TRANSPORT_MODE
Apr/07/2021 08:52:02 ipsec processing payload: AUTH
Apr/07/2021 08:52:02 ipsec requested auth method: SKEY
Apr/07/2021 08:52:02 ipsec,debug => peer's auth (size 0x14)
Apr/07/2021 08:52:02 ipsec,debug bb88aab0 2ad7555e 9f979817 28ba25b6 36214504
Apr/07/2021 08:52:02 ipsec,debug => auth nonce (size 0x18)
Apr/07/2021 08:52:02 ipsec,debug 7d9718fc 74402ada 8f9f886e b31142d4 d5da63fa d6f50df3
Apr/07/2021 08:52:02 ipsec,debug => SK_p (size 0x14)
Apr/07/2021 08:52:02 ipsec,debug c3204228 2d23f613 b05d798d 84606b95 8d298512
Apr/07/2021 08:52:02 ipsec,debug => idhash (size 0x14)
Apr/07/2021 08:52:02 ipsec,debug a5b1f832 dceb7114 5dced26e de618f1c d0fdb445
Apr/07/2021 08:52:02 ipsec,debug => calculated peer's AUTH (size 0x14)
Apr/07/2021 08:52:02 ipsec,debug bb88aab0 2ad7555e 9f979817 28ba25b6 36214504
Apr/07/2021 08:52:02 ipsec,info,account peer authorized: 192.168.20.3[4500]-ISP ADDRESS[4500] spi:5554d89fdedaab65:0536c9b454b779f7
Apr/07/2021 08:52:02 ipsec initial contact
Apr/07/2021 08:52:02 ipsec processing payloads: NOTIFY
Apr/07/2021 08:52:02 ipsec notify: INITIAL_CONTACT
Apr/07/2021 08:52:02 ipsec notify: USE_TRANSPORT_MODE
Apr/07/2021 08:52:02 ipsec peer wants transport mode
Apr/07/2021 08:52:02 ipsec processing payload: CONFIG (not found)
Apr/07/2021 08:52:02 ipsec processing payload: SA
Apr/07/2021 08:52:02 ipsec IKE Protocol: ESP
Apr/07/2021 08:52:02 ipsec proposal #1
Apr/07/2021 08:52:02 ipsec enc: aes128-cbc
Apr/07/2021 08:52:02 ipsec auth: sha1
Apr/07/2021 08:52:02 ipsec processing payload: TS_I
Apr/07/2021 08:52:02 ipsec 0.0.0.0/0
Apr/07/2021 08:52:02 ipsec processing payload: TS_R
Apr/07/2021 08:52:02 ipsec ISP CLIENT IP ADDRESS
Apr/07/2021 08:52:02 ipsec skipping not specific selector in transport mode with NAT
Apr/07/2021 08:52:02 ipsec ID_R (ADDR4): 192.168.20.3
Apr/07/2021 08:52:02 ipsec,debug => auth nonce (size 0x18)
Apr/07/2021 08:52:02 ipsec,debug d4af488f cad96d62 8be774c8 123901e3 58e09cd4 c6e87866
Apr/07/2021 08:52:02 ipsec,debug => SK_p (size 0x14)
Apr/07/2021 08:52:02 ipsec,debug 38513f47 8cb0260f 3aea150a 07ca23a0 c8420008
Apr/07/2021 08:52:02 ipsec,debug => idhash (size 0x14)
Apr/07/2021 08:52:02 ipsec,debug 202ec285 129628d6 7c3f0f0f 37f23881 a3a7b305
Apr/07/2021 08:52:02 ipsec,debug => my auth (size 0x14)
Apr/07/2021 08:52:02 ipsec,debug 7f00a7d9 eefede7c 03b323e7 0df78eae 7ee285ab
Apr/07/2021 08:52:02 ipsec adding payload: ID_R
Apr/07/2021 08:52:02 ipsec,debug => (size 0xc)
Apr/07/2021 08:52:02 ipsec,debug 0000000c 01000000 c0a81403
Apr/07/2021 08:52:02 ipsec adding payload: AUTH
Apr/07/2021 08:52:02 ipsec,debug => (size 0x1c)
Apr/07/2021 08:52:02 ipsec,debug 0000001c 02000000 7f00a7d9 eefede7c 03b323e7 0df78eae 7ee285ab
Apr/07/2021 08:52:02 ipsec adding notify: TS_UNACCEPTABLE
Apr/07/2021 08:52:02 ipsec,debug => (size 0x8)
Apr/07/2021 08:52:02 ipsec,debug 00000008 00000026
Apr/07/2021 08:52:02 ipsec <- ike2 reply, exchange: AUTH:1 ISP ADDRESS[4500] 0536c9b454b779f7:5554d89fdedaab65
Apr/07/2021 08:52:02 ipsec,debug ===== sending 364 bytes from 192.168.20.3[4500] to ISP ADDRESS[4500]
Apr/07/2021 08:52:02 ipsec,debug 1 times of 368 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 08:52:03 ipsec,debug KA: 192.168.20.3[4500]->ISP ADDRESS[4500]
Apr/07/2021 08:52:03 ipsec,debug 1 times of 1 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 13:35:39 ipsec,debug KA: 192.168.20.3[4500]->ISP ADDRESS[4500]
Apr/07/2021 13:35:39 ipsec,debug 1 times of 1 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 13:35:46 ipsec acquire for policy: 192.168.20.3 <=> ISP ADDRESS
Apr/07/2021 13:35:46 ipsec connection found for peer: ISP ADDRESS[4500]
Apr/07/2021 13:35:46 ipsec init child for policy: 192.168.20.3 <=> ISP ADDRESS
Apr/07/2021 13:35:46 ipsec init child continue
Apr/07/2021 13:35:46 ipsec offering proto: 3
Apr/07/2021 13:35:46 ipsec proposal #1
Apr/07/2021 13:35:46 ipsec enc: aes128-cbc
Apr/07/2021 13:35:46 ipsec auth: sha1
Apr/07/2021 13:35:46 ipsec dh: modp2048
Apr/07/2021 13:35:47 ipsec adding payload: NONCE
Apr/07/2021 13:35:47 ipsec,debug => (size 0x1c)
Apr/07/2021 13:35:47 ipsec,debug 0000001c 0af36dc6 1207b4fa f9f1205a 2b445e29 65c25d02 32600b42
Apr/07/2021 13:35:47 ipsec adding payload: KE
Apr/07/2021 13:35:47 ipsec,debug => (first 0x100 of 0x108)
Apr/07/2021 13:35:47 ipsec,debug 00000108 000e0000 4e77b09d 6f936632 eae614dc 16eb4064 b19e13e1 d7f79d83
Apr/07/2021 13:35:47 ipsec,debug 8290a0aa 63149161 9b09df59 319e2e47 f5d0a505 6559c831 1f7bbca5 f2a014cc
Apr/07/2021 13:35:47 ipsec,debug 81206fd0 4db7227c 0931a63d 58ca8d53 c3aace7e b655d72b 3324fb9f a0aa8be3
Apr/07/2021 13:35:47 ipsec,debug 1cf6f749 cddef5ac e428a76a 48b09bdb 6ba25279 97ac2b0f e9b09587 27f271e6
Apr/07/2021 13:35:47 ipsec,debug 10212786 cbc2dab6 45ad16bb 55929bc3 7b16baa8 d8af1b0d 8dff09fe b88cfd50
Apr/07/2021 13:35:47 ipsec,debug 3df7e88c 9fc6096c b5e0307f f28498b1 b4abf3ef 90f89488 6426b1d8 7feb3935
Apr/07/2021 13:35:47 ipsec,debug b0a2ab78 af1b5c27 0be7eba9 033418ac ab27d2c2 76bab16e cbd4b3f4 5c0ca0f9
Apr/07/2021 13:35:47 ipsec,debug 9b8a8273 bc76d5f5 7def9b3e 799d9d40 862ee392 8a307e9b 445b6fe5 5c8948d8
Apr/07/2021 13:35:47 ipsec adding payload: SA
Apr/07/2021 13:35:47 ipsec,debug => (size 0x34)
Apr/07/2021 13:35:47 ipsec,debug 00000034 00000030 01030404 01921624 0300000c 0100000c 800e0080 03000008
Apr/07/2021 13:35:47 ipsec,debug 03000002 03000008 0400000e 00000008 05000000
Apr/07/2021 13:35:47 ipsec initiator selector: 192.168.20.3
Apr/07/2021 13:35:47 ipsec adding payload: TS_I
Apr/07/2021 13:35:47 ipsec,debug => (size 0x18)
Apr/07/2021 13:35:47 ipsec,debug 00000018 01000000 07000010 0000ffff c0a81403 c0a81403
Apr/07/2021 13:35:47 ipsec responder selector: ISP ADDRESS
Apr/07/2021 13:35:47 ipsec adding payload: TS_R
Apr/07/2021 13:35:47 ipsec,debug => (size 0x18)
Apr/07/2021 13:35:47 ipsec,debug 00000018 01000000 07000010 0000ffff 4845becf 4845becf
Apr/07/2021 13:35:47 ipsec adding notify: USE_TRANSPORT_MODE
Apr/07/2021 13:35:47 ipsec,debug => (size 0x8)
Apr/07/2021 13:35:47 ipsec,debug 00000008 00004007
Apr/07/2021 13:35:47 ipsec <- ike2 request, exchange: CREATE_CHILD_SA:0 ISP ADDRESS[4500] 0536c9b454b779f7:5554d89fdedaab65
Apr/07/2021 13:35:47 ipsec,debug ===== sending 604 bytes from 192.168.20.3[4500] to ISP ADDRESS[4500]
Apr/07/2021 13:35:47 ipsec,debug 1 times of 608 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 13:35:47 ipsec child negitiation timeout in state 4
Apr/07/2021 13:35:47 ipsec,info killing ike2 SA: 192.168.20.3[4500]-ISP ADDRESS[4500] spi:5554d89fdedaab65:0536c9b454b779f7
Apr/07/2021 13:35:47 ipsec adding payload: DELETE
Apr/07/2021 13:35:47 ipsec,debug => (size 0x8)
Apr/07/2021 13:35:47 ipsec,debug 00000008 01000000
Apr/07/2021 13:35:47 ipsec <- ike2 request, exchange: INFORMATIONAL:1 ISP ADDRESS[4500] 0536c9b454b779f7:5554d89fdedaab65
Apr/07/2021 13:35:47 ipsec,debug ===== sending 284 bytes from 192.168.20.3[4500] to ISP ADDRESS[4500]
Apr/07/2021 13:35:47 ipsec,debug 1 times of 288 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 13:35:47 ipsec KA remove: 192.168.20.3[4500]->ISP ADDRESS[4500]
Apr/07/2021 13:35:47 ipsec,debug KA tree dump: 192.168.20.3[4500]->ISP ADDRESS[4500] (in_use=1)
Apr/07/2021 13:35:47 ipsec,debug KA removing this one...
Apr/07/2021 13:35:48 ipsec,debug ===== received 108 bytes from ISP ADDRESS[4500] to 192.168.20.3[4500]
Apr/07/2021 13:35:48 ipsec -> ike2 reply, exchange: INFORMATIONAL:1 ISP ADDRESS[4500] 0536c9b454b779f7:5554d89fdedaab65
Apr/07/2021 13:35:48 ipsec SPI 5554d89fdedaab65 not registered for ISP ADDRESS[4500]
Apr/07/2021 13:35:50 ipsec,debug ===== received 432 bytes from ISP ADDRESS[4500] to 192.168.20.3[4500]
Apr/07/2021 13:35:50 ipsec -> ike2 request, exchange: SA_INIT:0 ISP ADDRESS[4500] fbc83897ab43a555:0000000000000000
Apr/07/2021 13:35:50 ipsec ike2 respond
Apr/07/2021 13:35:50 ipsec payload seen: NOTIFY (8 bytes)
Apr/07/2021 13:35:50 ipsec payload seen: NOTIFY (28 bytes)
Apr/07/2021 13:35:50 ipsec payload seen: NOTIFY (28 bytes)
Apr/07/2021 13:35:50 ipsec payload seen: NONCE (28 bytes)
Apr/07/2021 13:35:50 ipsec payload seen: KE (264 bytes)
Apr/07/2021 13:35:50 ipsec payload seen: SA (48 bytes)
Apr/07/2021 13:35:50 ipsec processing payload: NONCE
Apr/07/2021 13:35:50 ipsec processing payload: SA
Apr/07/2021 13:35:50 ipsec IKE Protocol: IKE
Apr/07/2021 13:35:50 ipsec proposal #1
Apr/07/2021 13:35:50 ipsec enc: aes128-cbc
Apr/07/2021 13:35:50 ipsec prf: hmac-sha1
Apr/07/2021 13:35:50 ipsec auth: sha1
Apr/07/2021 13:35:50 ipsec dh: modp2048
Apr/07/2021 13:35:50 ipsec matched proposal:
Apr/07/2021 13:35:50 ipsec proposal #1
Apr/07/2021 13:35:50 ipsec enc: aes128-cbc
Apr/07/2021 13:35:50 ipsec prf: hmac-sha1
Apr/07/2021 13:35:50 ipsec auth: sha1
Apr/07/2021 13:35:50 ipsec dh: modp2048
Apr/07/2021 13:35:50 ipsec processing payload: KE
Apr/07/2021 13:35:51 ipsec,debug => shared secret (size 0x100)
Apr/07/2021 13:35:51 ipsec,debug aeba70f9 1a94284b f5f02784 3cb9da0e 33266280 7d241c0c 6d8b43a4 daea7c97
Apr/07/2021 13:35:51 ipsec,debug 62c19cf5 05c8a269 8e1f393e a3f19e30 2415b145 fceb4ec4 2fff3f0b 2debcbc9
Apr/07/2021 13:35:51 ipsec,debug 2ea4bf3b 8649e97c 036ecd1d 963a606f 3217e153 e544e5f8 da39bef1 482f1aa2
Apr/07/2021 13:35:51 ipsec,debug 9f5a32e3 9802a9ba a215b82f 8f0a4316 381012eb ee3da9a7 4b5b5880 40518a1a
Apr/07/2021 13:35:51 ipsec,debug 28cf575c 9b539f63 4bd91134 148a0f6f 802c40bf c08ceef5 25911815 1e29639d
Apr/07/2021 13:35:51 ipsec,debug ec37cf01 a021c781 2ee41173 7cb28944 ba0a7ed6 16e49d84 ba373cd8 cec0973f
Apr/07/2021 13:35:51 ipsec,debug 8f16929e 92a2be24 3e16b614 269c2a69 be9ffb36 d8264726 91aa6a6a 5fe1fca7
Apr/07/2021 13:35:51 ipsec,debug 9c269706 5a288aed 598c1520 6d94b8aa 29929aa1 9b0d63a9 8b419d79 aef88dc6
Apr/07/2021 13:35:51 ipsec adding payload: SA
Apr/07/2021 13:35:51 ipsec,debug => (size 0x30)
Apr/07/2021 13:35:51 ipsec,debug 00000030 0000002c 01010004 0300000c 0100000c 800e0080 03000008 02000002
Apr/07/2021 13:35:51 ipsec,debug 03000008 03000002 00000008 0400000e
Apr/07/2021 13:35:51 ipsec adding payload: KE
Apr/07/2021 13:35:51 ipsec,debug => (first 0x100 of 0x108)
Apr/07/2021 13:35:51 ipsec,debug 00000108 000e0000 d8176f70 63e173d9 3ad28d07 56f18dda 061169c3 82d2b57b
Apr/07/2021 13:35:51 ipsec,debug 12834e5f 2a603514 b6689e6e 741125a6 80c72c76 5b582402 4a03424e 7d8c2557
Apr/07/2021 13:35:51 ipsec,debug 101708cf e2960b6b ccc53570 58cd7f81 04919f83 ba2c6ca6 4b6653ce e0e7b858
Apr/07/2021 13:35:51 ipsec,debug 2df5eeab 956fa028 9301bda6 e15a2a68 7cec8117 35e6c1b3 c116275f 1b828a05
Apr/07/2021 13:35:51 ipsec,debug 45127fa9 2a688549 9d3eca41 e61563f5 d8d9c27e 7d969605 448e38c1 141c5ddd
Apr/07/2021 13:35:51 ipsec,debug 0dbba72a db87f38b f98dcd67 bd34fb61 936bbfdb 9891c554 9f10319f 7b3779cc
Apr/07/2021 13:35:51 ipsec,debug 855e338c 07d9cdff 242dd6b1 71ccfb27 3e1173f3 442db1d8 9dac4061 a0a9eedd
Apr/07/2021 13:35:51 ipsec,debug 27d643d4 d9963cdd 7f1bed3f c82bea4a 4cef3418 1b4c5e95 8fe5a0a7 42fb4d77
Apr/07/2021 13:35:51 ipsec adding payload: NONCE
Apr/07/2021 13:35:51 ipsec,debug => (size 0x1c)
Apr/07/2021 13:35:51 ipsec,debug 0000001c b63de5f1 f0be987e ed3ddd72 8aad48c1 bdc8ea07 f16841fa
Apr/07/2021 13:35:51 ipsec adding notify: NAT_DETECTION_SOURCE_IP
Apr/07/2021 13:35:51 ipsec,debug => (size 0x1c)
Apr/07/2021 13:35:51 ipsec,debug 0000001c 00004004 070c0eb8 94ef2487 5547b50a c72e5c56 0372e162
Apr/07/2021 13:35:51 ipsec adding notify: NAT_DETECTION_DESTINATION_IP
Apr/07/2021 13:35:51 ipsec,debug => (size 0x1c)
Apr/07/2021 13:35:51 ipsec,debug 0000001c 00004005 35095469 88d9f906 0f9861e4 6868cdcd 4f501a44
Apr/07/2021 13:35:51 ipsec adding notify: IKEV2_FRAGMENTATION_SUPPORTED
Apr/07/2021 13:35:51 ipsec,debug => (size 0x8)
Apr/07/2021 13:35:51 ipsec,debug 00000008 0000402e
Apr/07/2021 13:35:51 ipsec adding payload: CERTREQ
Apr/07/2021 13:35:51 ipsec,debug => (size 0x5)
Apr/07/2021 13:35:51 ipsec,debug 00000005 04
Apr/07/2021 13:35:51 ipsec <- ike2 reply, exchange: SA_INIT:0 ISP ADDRESS[4500] fbc83897ab43a555:a5eaa91b237c8515
Apr/07/2021 13:35:51 ipsec,debug ===== sending 437 bytes from 192.168.20.3[4500] to ISP ADDRESS[4500]
Apr/07/2021 13:35:51 ipsec,debug 1 times of 441 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 13:35:51 ipsec,debug => skeyseed (size 0x14)
Apr/07/2021 13:35:51 ipsec,debug f6709fd4 cefdcb7a 128fd4d3 ae41072a 804db9fa
Apr/07/2021 13:35:51 ipsec,debug => keymat (size 0x14)
Apr/07/2021 13:35:51 ipsec,debug 38c73286 dbbc608b 89bbd3e2 f4d5879a 7e96bed4
Apr/07/2021 13:35:51 ipsec,debug => SK_ai (size 0x14)
Apr/07/2021 13:35:51 ipsec,debug a2852e3f f710fb91 fae7ff5b c9b188cc 3a8e027c
Apr/07/2021 13:35:51 ipsec,debug => SK_ar (size 0x14)
Apr/07/2021 13:35:51 ipsec,debug 8015a9c3 9fc6e3c2 321daa74 fec26d1c 112dd7c1
Apr/07/2021 13:35:51 ipsec,debug => SK_ei (size 0x10)
Apr/07/2021 13:35:51 ipsec,debug 2fff8836 d55426ba 1769abf2 bb7300fe
Apr/07/2021 13:35:51 ipsec,debug => SK_er (size 0x10)
Apr/07/2021 13:35:51 ipsec,debug 05994acf f05e05ea 42120222 002599f7
Apr/07/2021 13:35:51 ipsec,debug => SK_pi (size 0x14)
Apr/07/2021 13:35:51 ipsec,debug 46c89d5e 516dba61 3cd5de99 81537e41 f269e214
Apr/07/2021 13:35:51 ipsec,debug => SK_pr (size 0x14)
Apr/07/2021 13:35:51 ipsec,debug f4bcb433 72451997 54ee8176 cfbf2de4 437ebf0d
Apr/07/2021 13:35:51 ipsec,info new ike2 SA (R): 192.168.20.3[4500]-ISP ADDRESS[4500] spi:a5eaa91b237c8515:fbc83897ab43a555
Apr/07/2021 13:35:51 ipsec processing payloads: VID (none found)
Apr/07/2021 13:35:51 ipsec processing payloads: NOTIFY
Apr/07/2021 13:35:51 ipsec notify: IKEV2_FRAGMENTATION_SUPPORTED
Apr/07/2021 13:35:51 ipsec notify: NAT_DETECTION_DESTINATION_IP
Apr/07/2021 13:35:51 ipsec notify: NAT_DETECTION_SOURCE_IP
Apr/07/2021 13:35:51 ipsec (NAT-T) REMOTE LOCAL
Apr/07/2021 13:35:51 ipsec KA list add: 192.168.20.3[4500]->ISP ADDRESS[4500]
Apr/07/2021 13:35:51 ipsec fragmentation negotiated
Apr/07/2021 13:35:51 ipsec,debug ===== received 460 bytes from ISP ADDRESS[4500] to 192.168.20.3[4500]
Apr/07/2021 13:35:51 ipsec -> ike2 request, exchange: AUTH:1 ISP ADDRESS[4500] fbc83897ab43a555:a5eaa91b237c8515
Apr/07/2021 13:35:51 ipsec payload seen: ENC (432 bytes)
Apr/07/2021 13:35:51 ipsec processing payload: ENC
Apr/07/2021 13:35:51 ipsec,debug => iv (size 0x10)
Apr/07/2021 13:35:51 ipsec,debug 5aef4a93 377cc7ed 89d3b0eb cc23e65b
Apr/07/2021 13:35:51 ipsec,debug => decrypted and trimmed payload (size 0x94)
Apr/07/2021 13:35:51 ipsec,debug 2700000c 01000000 ac154599 2900001c 02000000 546d02f7 1e06b4b3 abbef540
Apr/07/2021 13:35:51 ipsec,debug 31cb6060 a7d19249 21000008 00004000 2c00002c 00000028 01030403 00457966
Apr/07/2021 13:35:51 ipsec,debug 0300000c 0100000c 800e0080 03000008 03000002 00000008 05000000 2d000018
Apr/07/2021 13:35:51 ipsec,debug 01000000 07000010 0000ffff 00000000 ffffffff 29000018 01000000 07000010
Apr/07/2021 13:35:51 ipsec,debug 0000ffff b05ca33b b05ca33b 00000008 00004007
Apr/07/2021 13:35:51 ipsec,debug decrypted packet
Apr/07/2021 13:35:51 ipsec payload seen: ID_I (12 bytes)
Apr/07/2021 13:35:51 ipsec payload seen: AUTH (28 bytes)
Apr/07/2021 13:35:51 ipsec payload seen: NOTIFY (8 bytes)
Apr/07/2021 13:35:51 ipsec payload seen: SA (44 bytes)
Apr/07/2021 13:35:51 ipsec payload seen: TS_I (24 bytes)
Apr/07/2021 13:35:51 ipsec payload seen: TS_R (24 bytes)
Apr/07/2021 13:35:51 ipsec payload seen: NOTIFY (8 bytes)
Apr/07/2021 13:35:51 ipsec processing payloads: NOTIFY
Apr/07/2021 13:35:51 ipsec notify: INITIAL_CONTACT
Apr/07/2021 13:35:51 ipsec notify: USE_TRANSPORT_MODE
Apr/07/2021 13:35:51 ipsec ike auth: respond
Apr/07/2021 13:35:51 ipsec processing payload: ID_I
Apr/07/2021 13:35:51 ipsec ID_I (ADDR4): 172.21.69.153
Apr/07/2021 13:35:51 ipsec processing payload: ID_R (not found)
Apr/07/2021 13:35:51 ipsec processing payload: AUTH
Apr/07/2021 13:35:51 ipsec processing payloads: NOTIFY
Apr/07/2021 13:35:51 ipsec notify: INITIAL_CONTACT
Apr/07/2021 13:35:51 ipsec notify: USE_TRANSPORT_MODE
Apr/07/2021 13:35:51 ipsec processing payload: AUTH
Apr/07/2021 13:35:51 ipsec requested auth method: SKEY
Apr/07/2021 13:35:51 ipsec,debug => peer's auth (size 0x14)
Apr/07/2021 13:35:51 ipsec,debug 546d02f7 1e06b4b3 abbef540 31cb6060 a7d19249
Apr/07/2021 13:35:51 ipsec,debug => auth nonce (size 0x18)
Apr/07/2021 13:35:51 ipsec,debug b63de5f1 f0be987e ed3ddd72 8aad48c1 bdc8ea07 f16841fa
Apr/07/2021 13:35:51 ipsec,debug => SK_p (size 0x14)
Apr/07/2021 13:35:51 ipsec,debug 46c89d5e 516dba61 3cd5de99 81537e41 f269e214
Apr/07/2021 13:35:51 ipsec,debug => idhash (size 0x14)
Apr/07/2021 13:35:51 ipsec,debug c75bf466 a81b3aa9 4db72031 6beab7bd ea2af14a
Apr/07/2021 13:35:51 ipsec,debug => calculated peer's AUTH (size 0x14)
Apr/07/2021 13:35:51 ipsec,debug 546d02f7 1e06b4b3 abbef540 31cb6060 a7d19249
Apr/07/2021 13:35:51 ipsec,info,account peer authorized: 192.168.20.3[4500]-ISP ADDRESS[4500] spi:a5eaa91b237c8515:fbc83897ab43a555
Apr/07/2021 13:35:51 ipsec initial contact
Apr/07/2021 13:35:51 ipsec processing payloads: NOTIFY
Apr/07/2021 13:35:51 ipsec notify: INITIAL_CONTACT
Apr/07/2021 13:35:51 ipsec notify: USE_TRANSPORT_MODE
Apr/07/2021 13:35:51 ipsec peer wants transport mode
Apr/07/2021 13:35:51 ipsec processing payload: CONFIG (not found)
Apr/07/2021 13:35:51 ipsec processing payload: SA
Apr/07/2021 13:35:51 ipsec IKE Protocol: ESP
Apr/07/2021 13:35:51 ipsec proposal #1
Apr/07/2021 13:35:51 ipsec enc: aes128-cbc
Apr/07/2021 13:35:51 ipsec auth: sha1
Apr/07/2021 13:35:51 ipsec processing payload: TS_I
Apr/07/2021 13:35:51 ipsec 0.0.0.0/0
Apr/07/2021 13:35:51 ipsec processing payload: TS_R
Apr/07/2021 13:35:51 ipsec ISP CLIENT IP ADDRESS
Apr/07/2021 13:35:51 ipsec skipping not specific selector in transport mode with NAT
Apr/07/2021 13:35:51 ipsec ID_R (ADDR4): 192.168.20.3
Apr/07/2021 13:35:51 ipsec,debug => auth nonce (size 0x18)
Apr/07/2021 13:35:51 ipsec,debug 5959863a e51c4d10 23bfa014 159c6889 c75d7572 0d0b26ae
Apr/07/2021 13:35:51 ipsec,debug => SK_p (size 0x14)
Apr/07/2021 13:35:51 ipsec,debug f4bcb433 72451997 54ee8176 cfbf2de4 437ebf0d
Apr/07/2021 13:35:51 ipsec,debug => idhash (size 0x14)
Apr/07/2021 13:35:51 ipsec,debug 32fcc29c 9044c1f7 fd57d487 d23b5e23 73a61790
Apr/07/2021 13:35:51 ipsec,debug => my auth (size 0x14)
Apr/07/2021 13:35:51 ipsec,debug ed34b106 5b7f5ca6 cc9e2fd2 ee78b9a1 eae7f478
Apr/07/2021 13:35:51 ipsec adding payload: ID_R
Apr/07/2021 13:35:51 ipsec,debug => (size 0xc)
Apr/07/2021 13:35:51 ipsec,debug 0000000c 01000000 c0a81403
Apr/07/2021 13:35:51 ipsec adding payload: AUTH
Apr/07/2021 13:35:51 ipsec,debug => (size 0x1c)
Apr/07/2021 13:35:51 ipsec,debug 0000001c 02000000 ed34b106 5b7f5ca6 cc9e2fd2 ee78b9a1 eae7f478
Apr/07/2021 13:35:51 ipsec adding notify: TS_UNACCEPTABLE
Apr/07/2021 13:35:51 ipsec,debug => (size 0x8)
Apr/07/2021 13:35:51 ipsec,debug 00000008 00000026
Apr/07/2021 13:35:51 ipsec <- ike2 reply, exchange: AUTH:1 ISP ADDRESS[4500] fbc83897ab43a555:a5eaa91b237c8515
Apr/07/2021 13:35:51 ipsec,debug ===== sending 348 bytes from 192.168.20.3[4500] to ISP ADDRESS[4500]
Apr/07/2021 13:35:51 ipsec,debug 1 times of 352 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 13:35:59 ipsec,debug KA: 192.168.20.3[4500]->ISP ADDRESS[4500]
Apr/07/2021 13:35:59 ipsec,debug 1 times of 1 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 13:36:19 ipsec,debug KA: 192.168.20.3[4500]->ISP ADDRESS[4500]
Apr/07/2021 13:36:19 ipsec,debug 1 times of 1 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 13:36:20 ipsec acquire for policy: 192.168.20.3 <=> ISP ADDRESS
Apr/07/2021 13:36:20 ipsec connection found for peer: ISP ADDRESS[4500]
Apr/07/2021 13:36:20 ipsec init child for policy: 192.168.20.3 <=> ISP ADDRESS
Apr/07/2021 13:36:20 ipsec init child continue
Apr/07/2021 13:36:20 ipsec offering proto: 3
Apr/07/2021 13:36:20 ipsec proposal #1
Apr/07/2021 13:36:20 ipsec enc: aes128-cbc
Apr/07/2021 13:36:20 ipsec auth: sha1
Apr/07/2021 13:36:20 ipsec dh: modp2048
Apr/07/2021 13:36:21 ipsec adding payload: NONCE
Apr/07/2021 13:36:21 ipsec,debug => (size 0x1c)
Apr/07/2021 13:36:21 ipsec,debug 0000001c 91141652 b4c48d3f 3483a233 73a0588c d5df0c65 0d4e0f06
Apr/07/2021 13:36:21 ipsec adding payload: KE
Apr/07/2021 13:36:21 ipsec,debug => (first 0x100 of 0x108)
Apr/07/2021 13:36:21 ipsec,debug 00000108 000e0000 bada2529 1e0245f2 e44228bb dbd2d0fb a9b83813 dbdf4f32
Apr/07/2021 13:36:21 ipsec,debug c5ab35e8 ff8caf12 eeb7ee87 06a178de 014edbda 70dbde77 26282e69 8a2de677
Apr/07/2021 13:36:21 ipsec,debug 428f0d48 38ea0e3c 2270f400 1487c9b3 6ae17b6d 6e10b4c6 f0e5a705 f4ca4744
Apr/07/2021 13:36:21 ipsec,debug d2b79c2a a487337d 75fbd994 7c78c8e2 e56996a9 ae8694d6 ff6dc113 4f345645
Apr/07/2021 13:36:21 ipsec,debug 44db7b33 8050bf04 6cbbcddc d4782dba 66049d5f 489e85a4 2bc9dd45 3cbd5246
Apr/07/2021 13:36:21 ipsec,debug 30425260 09f61a69 a4d799fe a339fa48 5aea0fce a0adeda0 e8082dc3 f1550513
Apr/07/2021 13:36:21 ipsec,debug 24991025 da17f558 29d5bbe6 3030437a 0051dd0c 133f42f7 fb3085ca 35b845e3
Apr/07/2021 13:36:21 ipsec,debug 0a29f03a 4dbf3662 1f847ecd b0fbd69c d245c672 a1f2f3e1 313fe865 aa3abac4
Apr/07/2021 13:36:21 ipsec adding payload: SA
Apr/07/2021 13:36:21 ipsec,debug => (size 0x34)
Apr/07/2021 13:36:21 ipsec,debug 00000034 00000030 01030404 02bd80b1 0300000c 0100000c 800e0080 03000008
Apr/07/2021 13:36:21 ipsec,debug 03000002 03000008 0400000e 00000008 05000000
Apr/07/2021 13:36:21 ipsec initiator selector: 192.168.20.3
Apr/07/2021 13:36:21 ipsec adding payload: TS_I
Apr/07/2021 13:36:21 ipsec,debug => (size 0x18)
Apr/07/2021 13:36:21 ipsec,debug 00000018 01000000 07000010 0000ffff c0a81403 c0a81403
Apr/07/2021 13:36:21 ipsec responder selector: ISP ADDRESS
Apr/07/2021 13:36:21 ipsec adding payload: TS_R
Apr/07/2021 13:36:21 ipsec,debug => (size 0x18)
Apr/07/2021 13:36:21 ipsec,debug 00000018 01000000 07000010 0000ffff 4845becf 4845becf
Apr/07/2021 13:36:21 ipsec adding notify: USE_TRANSPORT_MODE
Apr/07/2021 13:36:21 ipsec,debug => (size 0x8)
Apr/07/2021 13:36:21 ipsec,debug 00000008 00004007
Apr/07/2021 13:36:21 ipsec <- ike2 request, exchange: CREATE_CHILD_SA:0 ISP ADDRESS[4500] fbc83897ab43a555:a5eaa91b237c8515
Apr/07/2021 13:36:21 ipsec,debug ===== sending 620 bytes from 192.168.20.3[4500] to ISP ADDRESS[4500]
Apr/07/2021 13:36:21 ipsec,debug 1 times of 624 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 13:36:21 ipsec child negitiation timeout in state 4
Apr/07/2021 13:36:21 ipsec,info killing ike2 SA: 192.168.20.3[4500]-ISP ADDRESS[4500] spi:a5eaa91b237c8515:fbc83897ab43a555
Apr/07/2021 13:36:21 ipsec adding payload: DELETE
Apr/07/2021 13:36:21 ipsec,debug => (size 0x8)
Apr/07/2021 13:36:21 ipsec,debug 00000008 01000000
Apr/07/2021 13:36:21 ipsec <- ike2 request, exchange: INFORMATIONAL:1 ISP ADDRESS[4500] fbc83897ab43a555:a5eaa91b237c8515
Apr/07/2021 13:36:21 ipsec,debug ===== sending 252 bytes from 192.168.20.3[4500] to ISP ADDRESS[4500]
Apr/07/2021 13:36:21 ipsec,debug 1 times of 256 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 13:36:21 ipsec KA remove: 192.168.20.3[4500]->ISP ADDRESS[4500]
Apr/07/2021 13:36:21 ipsec,debug KA tree dump: 192.168.20.3[4500]->ISP ADDRESS[4500] (in_use=1)
Apr/07/2021 13:36:21 ipsec,debug KA removing this one...
Apr/07/2021 13:36:22 ipsec,debug ===== received 92 bytes from ISP ADDRESS[4500] to 192.168.20.3[4500]
Apr/07/2021 13:36:22 ipsec -> ike2 reply, exchange: INFORMATIONAL:1 ISP ADDRESS[4500] fbc83897ab43a555:a5eaa91b237c8515
Apr/07/2021 13:36:22 ipsec SPI a5eaa91b237c8515 not registered for ISP ADDRESS[4500]
Apr/07/2021 13:36:24 ipsec,debug ===== received 432 bytes from ISP ADDRESS[4500] to 192.168.20.3[4500]
Apr/07/2021 13:36:24 ipsec -> ike2 request, exchange: SA_INIT:0 ISP ADDRESS[4500] 89bce8d0d7a745ef:0000000000000000
Apr/07/2021 13:36:24 ipsec ike2 respond
Apr/07/2021 13:36:24 ipsec payload seen: NOTIFY (8 bytes)
Apr/07/2021 13:36:24 ipsec payload seen: NOTIFY (28 bytes)
Apr/07/2021 13:36:24 ipsec payload seen: NOTIFY (28 bytes)
Apr/07/2021 13:36:24 ipsec payload seen: NONCE (28 bytes)
Apr/07/2021 13:36:24 ipsec payload seen: KE (264 bytes)
Apr/07/2021 13:36:24 ipsec payload seen: SA (48 bytes)
Apr/07/2021 13:36:24 ipsec processing payload: NONCE
Apr/07/2021 13:36:24 ipsec processing payload: SA
Apr/07/2021 13:36:24 ipsec IKE Protocol: IKE
Apr/07/2021 13:36:24 ipsec proposal #1
Apr/07/2021 13:36:24 ipsec enc: aes128-cbc
Apr/07/2021 13:36:24 ipsec prf: hmac-sha1
Apr/07/2021 13:36:24 ipsec auth: sha1
Apr/07/2021 13:36:24 ipsec dh: modp2048
Apr/07/2021 13:36:24 ipsec matched proposal:
Apr/07/2021 13:36:24 ipsec proposal #1
Apr/07/2021 13:36:24 ipsec enc: aes128-cbc
Apr/07/2021 13:36:24 ipsec prf: hmac-sha1
Apr/07/2021 13:36:24 ipsec auth: sha1
Apr/07/2021 13:36:24 ipsec dh: modp2048
Apr/07/2021 13:36:24 ipsec processing payload: KE
Apr/07/2021 13:36:25 ipsec,debug => shared secret (size 0x100)
Apr/07/2021 13:36:25 ipsec,debug 6c7516d9 9c9670be 0b16d419 4f2cac91 e5cda6cc 96428d3e 8b78237e f4594ced
Apr/07/2021 13:36:25 ipsec,debug 8711d24d ef2d90e9 b7f4bc5e a6c4ef9b 1bc328b7 c588ca9c 45e8fc5e ef786dae
Apr/07/2021 13:36:25 ipsec,debug 432666f9 688f385c 50a96296 08467135 0bddf82c 815c1771 2e45592c 2851f6ae
Apr/07/2021 13:36:25 ipsec,debug 74faa4c2 80d4cdc3 5692962a 25a1625a 43ccfa6f 8609f3f6 b83dac57 eacd7ea6
Apr/07/2021 13:36:25 ipsec,debug d925610c 253f7c6b 1575f444 653c83e3 704d983e 96c8d85a 2b8b6611 0073f181
Apr/07/2021 13:36:25 ipsec,debug d8496d2c b5016787 6a9fad0b 1170525a 176f9452 dd73618f af85f3b9 b6c779f5
Apr/07/2021 13:36:25 ipsec,debug 20396aea 76331ddd ba132fef 5a57f301 9e7d9d39 69bdea18 ceb7f8da 881e4849
Apr/07/2021 13:36:25 ipsec,debug f38c096f 1aea4e21 1934930f eedfc070 0aa41011 0681bb5e 4f90e8e3 717bbbb1
Apr/07/2021 13:36:25 ipsec adding payload: SA
Apr/07/2021 13:36:25 ipsec,debug => (size 0x30)
Apr/07/2021 13:36:25 ipsec,debug 00000030 0000002c 01010004 0300000c 0100000c 800e0080 03000008 02000002
Apr/07/2021 13:36:25 ipsec,debug 03000008 03000002 00000008 0400000e
Apr/07/2021 13:36:25 ipsec adding payload: KE
Apr/07/2021 13:36:25 ipsec,debug => (first 0x100 of 0x108)
Apr/07/2021 13:36:25 ipsec,debug 00000108 000e0000 25c6d76a 9cb6b6ad df0025a7 b9f964e2 58724d5c 19d284b8
Apr/07/2021 13:36:25 ipsec,debug 11324f6d f87da5fd 85f5d384 cc183a74 4d81195b 0344d8d4 bcc15d2b 9ba5a60f
Apr/07/2021 13:36:25 ipsec,debug e0d94b49 0af44735 fa526402 060a7c80 d03ca682 f2a1f138 ef580def cfdaa543
Apr/07/2021 13:36:25 ipsec,debug 01252718 734bb05d 3671dead d2fabf5f 0edc4594 92901ac9 ec3975fc 565743f5
Apr/07/2021 13:36:25 ipsec,debug 44899795 7fc3f93d b625d78b 234da447 9f86a42c da2ded2e 3776d498 193130ea
Apr/07/2021 13:36:25 ipsec,debug 3f243f1e 407fcbea b6584139 9cff0490 f143394d 0e5a65a7 e135ac28 96a70761
Apr/07/2021 13:36:25 ipsec,debug dbf427fc db37663c f074064a 25aee4c5 ebfd4f23 086be101 37e93a1b c2dc2825
Apr/07/2021 13:36:25 ipsec,debug d66eeb23 5cbd77ee e0eed07d bc4ce2f6 96aed9b1 008984a8 b8574446 4d1fa2c5
Apr/07/2021 13:36:25 ipsec adding payload: NONCE
Apr/07/2021 13:36:25 ipsec,debug => (size 0x1c)
Apr/07/2021 13:36:25 ipsec,debug 0000001c 48697613 6ec67da6 af5b6a52 a86ad848 7365c010 bd6a2478
Apr/07/2021 13:36:25 ipsec adding notify: NAT_DETECTION_SOURCE_IP
Apr/07/2021 13:36:25 ipsec,debug => (size 0x1c)
Apr/07/2021 13:36:25 ipsec,debug 0000001c 00004004 3c242328 b661c2f6 89789793 adee08f9 4726520d
Apr/07/2021 13:36:25 ipsec adding notify: NAT_DETECTION_DESTINATION_IP
Apr/07/2021 13:36:25 ipsec,debug => (size 0x1c)
Apr/07/2021 13:36:25 ipsec,debug 0000001c 00004005 82b66212 131c2e89 607b30ce c2971d58 0eb7388a
Apr/07/2021 13:36:25 ipsec adding notify: IKEV2_FRAGMENTATION_SUPPORTED
Apr/07/2021 13:36:25 ipsec,debug => (size 0x8)
Apr/07/2021 13:36:25 ipsec,debug 00000008 0000402e
Apr/07/2021 13:36:25 ipsec adding payload: CERTREQ
Apr/07/2021 13:36:25 ipsec,debug => (size 0x5)
Apr/07/2021 13:36:25 ipsec,debug 00000005 04
Apr/07/2021 13:36:25 ipsec <- ike2 reply, exchange: SA_INIT:0 ISP ADDRESS[4500] 89bce8d0d7a745ef:e6dc5476d3cf5126
Apr/07/2021 13:36:25 ipsec,debug ===== sending 437 bytes from 192.168.20.3[4500] to ISP ADDRESS[4500]
Apr/07/2021 13:36:25 ipsec,debug 1 times of 441 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 13:36:25 ipsec,debug => skeyseed (size 0x14)
Apr/07/2021 13:36:25 ipsec,debug a0f06947 136a13d4 64d0e53a 33500aa0 165dcc2c
Apr/07/2021 13:36:25 ipsec,debug => keymat (size 0x14)
Apr/07/2021 13:36:25 ipsec,debug 8bdbb31a fe167d65 49b7f268 b621a557 db3df7ec
Apr/07/2021 13:36:25 ipsec,debug => SK_ai (size 0x14)
Apr/07/2021 13:36:25 ipsec,debug b3323d93 a0deb0e6 08701ea1 2e21fff0 797d8ea7
Apr/07/2021 13:36:25 ipsec,debug => SK_ar (size 0x14)
Apr/07/2021 13:36:25 ipsec,debug 47095869 df53da5e 1e6cb375 1c8beb14 70a3528c
Apr/07/2021 13:36:25 ipsec,debug => SK_ei (size 0x10)
Apr/07/2021 13:36:25 ipsec,debug 5278f724 977d2976 f79113fb f29c9b3e
Apr/07/2021 13:36:25 ipsec,debug => SK_er (size 0x10)
Apr/07/2021 13:36:25 ipsec,debug 676c6d85 13f0e1b4 9c24fd3b 9d17a3f7
Apr/07/2021 13:36:25 ipsec,debug => SK_pi (size 0x14)
Apr/07/2021 13:36:25 ipsec,debug e2941106 3fda3383 2caf51a8 0ac1ccc0 bcac654f
Apr/07/2021 13:36:25 ipsec,debug => SK_pr (size 0x14)
Apr/07/2021 13:36:25 ipsec,debug 2bae0a16 e06e146c 2af58435 659b2343 25731708
Apr/07/2021 13:36:25 ipsec,info new ike2 SA (R): 192.168.20.3[4500]-ISP ADDRESS[4500] spi:e6dc5476d3cf5126:89bce8d0d7a745ef
Apr/07/2021 13:36:25 ipsec processing payloads: VID (none found)
Apr/07/2021 13:36:25 ipsec processing payloads: NOTIFY
Apr/07/2021 13:36:25 ipsec notify: IKEV2_FRAGMENTATION_SUPPORTED
Apr/07/2021 13:36:25 ipsec notify: NAT_DETECTION_DESTINATION_IP
Apr/07/2021 13:36:25 ipsec notify: NAT_DETECTION_SOURCE_IP
Apr/07/2021 13:36:25 ipsec (NAT-T) REMOTE LOCAL
Apr/07/2021 13:36:25 ipsec KA list add: 192.168.20.3[4500]->ISP ADDRESS[4500]
Apr/07/2021 13:36:25 ipsec fragmentation negotiated
Apr/07/2021 13:36:26 ipsec,debug ===== received 428 bytes from ISP ADDRESS[4500] to 192.168.20.3[4500]
Apr/07/2021 13:36:26 ipsec -> ike2 request, exchange: AUTH:1 ISP ADDRESS[4500] 89bce8d0d7a745ef:e6dc5476d3cf5126
Apr/07/2021 13:36:26 ipsec payload seen: ENC (400 bytes)
Apr/07/2021 13:36:26 ipsec processing payload: ENC
Apr/07/2021 13:36:26 ipsec,debug => iv (size 0x10)
Apr/07/2021 13:36:26 ipsec,debug 2089ddd1 4dd0028a 43f44c7d 48bf5247
Apr/07/2021 13:36:26 ipsec,debug => decrypted and trimmed payload (size 0x94)
Apr/07/2021 13:36:26 ipsec,debug 2700000c 01000000 ac154599 2900001c 02000000 c3278863 4bfea4ec ceafc452
Apr/07/2021 13:36:26 ipsec,debug ab7e1cb4 ac9174ed 21000008 00004000 2c00002c 00000028 01030403 02ed1eb0
Apr/07/2021 13:36:26 ipsec,debug 0300000c 0100000c 800e0080 03000008 03000002 00000008 05000000 2d000018
Apr/07/2021 13:36:26 ipsec,debug 01000000 07000010 0000ffff 00000000 ffffffff 29000018 01000000 07000010
Apr/07/2021 13:36:26 ipsec,debug 0000ffff b05ca33b b05ca33b 00000008 00004007
Apr/07/2021 13:36:26 ipsec,debug decrypted packet
Apr/07/2021 13:36:26 ipsec payload seen: ID_I (12 bytes)
Apr/07/2021 13:36:26 ipsec payload seen: AUTH (28 bytes)
Apr/07/2021 13:36:26 ipsec payload seen: NOTIFY (8 bytes)
Apr/07/2021 13:36:26 ipsec payload seen: SA (44 bytes)
Apr/07/2021 13:36:26 ipsec payload seen: TS_I (24 bytes)
Apr/07/2021 13:36:26 ipsec payload seen: TS_R (24 bytes)
Apr/07/2021 13:36:26 ipsec payload seen: NOTIFY (8 bytes)
Apr/07/2021 13:36:26 ipsec processing payloads: NOTIFY
Apr/07/2021 13:36:26 ipsec notify: INITIAL_CONTACT
Apr/07/2021 13:36:26 ipsec notify: USE_TRANSPORT_MODE
Apr/07/2021 13:36:26 ipsec ike auth: respond
Apr/07/2021 13:36:26 ipsec processing payload: ID_I
Apr/07/2021 13:36:26 ipsec ID_I (ADDR4): 172.21.69.153
Apr/07/2021 13:36:26 ipsec processing payload: ID_R (not found)
Apr/07/2021 13:36:26 ipsec processing payload: AUTH
Apr/07/2021 13:36:26 ipsec processing payloads: NOTIFY
Apr/07/2021 13:36:26 ipsec notify: INITIAL_CONTACT
Apr/07/2021 13:36:26 ipsec notify: USE_TRANSPORT_MODE
Apr/07/2021 13:36:26 ipsec processing payload: AUTH
Apr/07/2021 13:36:26 ipsec requested auth method: SKEY
Apr/07/2021 13:36:26 ipsec,debug => peer's auth (size 0x14)
Apr/07/2021 13:36:26 ipsec,debug c3278863 4bfea4ec ceafc452 ab7e1cb4 ac9174ed
Apr/07/2021 13:36:26 ipsec,debug => auth nonce (size 0x18)
Apr/07/2021 13:36:26 ipsec,debug 48697613 6ec67da6 af5b6a52 a86ad848 7365c010 bd6a2478
Apr/07/2021 13:36:26 ipsec,debug => SK_p (size 0x14)
Apr/07/2021 13:36:26 ipsec,debug e2941106 3fda3383 2caf51a8 0ac1ccc0 bcac654f
Apr/07/2021 13:36:26 ipsec,debug => idhash (size 0x14)
Apr/07/2021 13:36:26 ipsec,debug def86bc2 0e9c5c7a 0b1ea216 d0218a44 47b6a7cd
Apr/07/2021 13:36:26 ipsec,debug => calculated peer's AUTH (size 0x14)
Apr/07/2021 13:36:26 ipsec,debug c3278863 4bfea4ec ceafc452 ab7e1cb4 ac9174ed
Apr/07/2021 13:36:26 ipsec,info,account peer authorized: 192.168.20.3[4500]-ISP ADDRESS[4500] spi:e6dc5476d3cf5126:89bce8d0d7a745ef
Apr/07/2021 13:36:26 ipsec initial contact
Apr/07/2021 13:36:26 ipsec processing payloads: NOTIFY
Apr/07/2021 13:36:26 ipsec notify: INITIAL_CONTACT
Apr/07/2021 13:36:26 ipsec notify: USE_TRANSPORT_MODE
Apr/07/2021 13:36:26 ipsec peer wants transport mode
Apr/07/2021 13:36:26 ipsec processing payload: CONFIG (not found)
Apr/07/2021 13:36:26 ipsec processing payload: SA
Apr/07/2021 13:36:26 ipsec IKE Protocol: ESP
Apr/07/2021 13:36:26 ipsec proposal #1
Apr/07/2021 13:36:26 ipsec enc: aes128-cbc
Apr/07/2021 13:36:26 ipsec auth: sha1
Apr/07/2021 13:36:26 ipsec processing payload: TS_I
Apr/07/2021 13:36:26 ipsec 0.0.0.0/0
Apr/07/2021 13:36:26 ipsec processing payload: TS_R
Apr/07/2021 13:36:26 ipsec ISP CLIENT IP ADDRESS
Apr/07/2021 13:36:26 ipsec skipping not specific selector in transport mode with NAT
Apr/07/2021 13:36:26 ipsec ID_R (ADDR4): 192.168.20.3
Apr/07/2021 13:36:26 ipsec,debug => auth nonce (size 0x18)
Apr/07/2021 13:36:26 ipsec,debug 1a7282db 6c7c55b5 9cc3462f a05029ae e8697751 bc576a8e
Apr/07/2021 13:36:26 ipsec,debug => SK_p (size 0x14)
Apr/07/2021 13:36:26 ipsec,debug 2bae0a16 e06e146c 2af58435 659b2343 25731708
Apr/07/2021 13:36:26 ipsec,debug => idhash (size 0x14)
Apr/07/2021 13:36:26 ipsec,debug a4912301 4695b4ab a9dcf6f3 4f5c9771 9115697c
Apr/07/2021 13:36:26 ipsec,debug => my auth (size 0x14)
Apr/07/2021 13:36:26 ipsec,debug 04f8d6c8 63253661 f10cd15a 265d269d 6c959dc3
Apr/07/2021 13:36:26 ipsec adding payload: ID_R
Apr/07/2021 13:36:26 ipsec,debug => (size 0xc)
Apr/07/2021 13:36:26 ipsec,debug 0000000c 01000000 c0a81403
Apr/07/2021 13:36:26 ipsec adding payload: AUTH
Apr/07/2021 13:36:26 ipsec,debug => (size 0x1c)
Apr/07/2021 13:36:26 ipsec,debug 0000001c 02000000 04f8d6c8 63253661 f10cd15a 265d269d 6c959dc3
Apr/07/2021 13:36:26 ipsec adding notify: TS_UNACCEPTABLE
Apr/07/2021 13:36:26 ipsec,debug => (size 0x8)
Apr/07/2021 13:36:26 ipsec,debug 00000008 00000026
Apr/07/2021 13:36:26 ipsec <- ike2 reply, exchange: AUTH:1 ISP ADDRESS[4500] 89bce8d0d7a745ef:e6dc5476d3cf5126
Apr/07/2021 13:36:26 ipsec,debug ===== sending 364 bytes from 192.168.20.3[4500] to ISP ADDRESS[4500]
Apr/07/2021 13:36:26 ipsec,debug 1 times of 368 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 13:36:39 ipsec,debug KA: 192.168.20.3[4500]->ISP ADDRESS[4500]
Apr/07/2021 13:36:39 ipsec,debug 1 times of 1 bytes message will be sent to ISP ADDRESS[4500]
Without most making any sense to me, I have a feeling that there is a NAT issue causing it? Then again, why without changing anything, and by disabling-enabling the peer, it comes back on-line? I vaguely remember that during some tests if I unplugged and then powered back the client before the 10-minute DPD check (5 times every 120 seconds), the link would be established automatically...just in case it matters.
Let me work on the firewall rules and get back to you...all three MT clients + Server MT (and the rest clients in the future) are/will be behind regular ISP modems (modems take care of firewall rules, in the sense that they are not in bridge mode). Was looking/hoping to keep a very simple firewall rule table in the MT's, under the understanding that MT firewall works in the opposite way than "commercial modems", meaning allowing everything-unless-blocking-it ...