Community discussions

MikroTik App
 
mankomal
Member Candidate
Member Candidate
Topic Author
Posts: 106
Joined: Fri Nov 24, 2006 8:56 am

Site-To-Site VPN AWS problem

Fri Jan 07, 2022 12:00 pm

Hello,

I have been trying for 2 days now and been unsuccessful in getting AWS VPN done, can someone share their experience or share what could be the issue. I am posting the configuration I am using and the debug logs
/ip ipsec profile
add dh-group=modp1024 dpd-interval=10s dpd-maximum-failures=3 enc-algorithm=\
    aes-128 lifetime=8h name=aws-profile nat-traversal=no
/ip ipsec peer
add address=34.198.222.127/32 local-address=164.52.192.253 name="Tunnel 1" \
    profile=aws-profile
/ip ipsec proposal
add enc-algorithms=aes-128-cbc lifetime=1h name=aws-proposal
/ip ipsec identity
add peer="Tunnel 1" secret=<secret>
/ip ipsec policy
add dst-address=169.254.116.213/32 peer="Tunnel 1" proposal=aws-proposal \
    src-address=0.0.0.0/0 tunnel=yes
add dst-address=172.31.0.0/16 peer="Tunnel 1" proposal=aws-proposal \
    src-address=0.0.0.0/0 tunnel=yes



09:05:29 ipsec,debug,packet begin encryption. 
09:05:29 ipsec,debug,packet encryption(aes) 
09:05:29 ipsec,debug,packet pad length = 8 
09:05:29 ipsec,debug,packet 0b000018 49559268 1c32c942 7fd62134 bb30ca33 a54f2041 
00000020 00000001 
09:05:29 ipsec,debug,packet 01108d28 6476e3f0 315d214f f95c9297 05f64ec7 00000e48 
e0e6ef8c 9d9d9107 
09:05:29 ipsec,debug,packet encryption(aes) 
09:05:29 ipsec,debug,packet with key: 
09:05:29 ipsec,debug,packet 51da1465 291942fb 3a1cd4e8 e7d7891c 
09:05:29 ipsec,debug,packet encrypted payload by IV: 
09:05:29 ipsec,debug,packet f80d373e 61b9d4a6 f847401e 502c8dc3 
09:05:29 ipsec,debug,packet save IV for next: 
09:05:29 ipsec,debug,packet da13c3f3 bce2c5bd 2e38a589 01506023 
09:05:29 ipsec,debug,packet encrypted. 
09:05:29 ipsec,debug 92 bytes from 164.52.192.253[4500] to 34.198.222.127[4500] 
09:05:29 ipsec,debug 1 times of 96 bytes message will be sent to 34.198.222.127[45
00] 
09:05:29 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 08100501 d59daca2 
0000005c b568d1f6 
09:05:29 ipsec,debug,packet 00b145f9 19e84e80 31e8769a 1369ffcb 344e2ebb 6da0f000 
71a2f9fd 70c3b952 
09:05:29 ipsec,debug,packet bf901018 a9cf5484 9395f9b9 da13c3f3 bce2c5bd 2e38a589 
01506023 
09:05:29 ipsec,debug sendto Information notify. 
09:05:29 ipsec,debug 34.198.222.127 DPD R-U-There sent (0) 
09:05:29 ipsec,debug 34.198.222.127 rescheduling send_r_u (5). 
09:05:29 ipsec,debug ===== received 92 bytes from 34.198.222.127[4500] to 164.52.1
92.253[4500] 
09:05:29 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 08100501 644b7afe 
0000005c 9e1d685d 
09:05:29 ipsec,debug,packet 46c6779e 7ceef9c1 018b4aad ad663193 896b18af a1504ea6 
8fc3286f 273e58cf 
09:05:29 ipsec,debug,packet 2f068cbb b0479928 2cdaf367 2203082d bd4d64cf 6c8daf3a 
31c6de8c 
09:05:29 ipsec,debug receive Information. 
09:05:29 ipsec,debug,packet compute IV for phase2 
09:05:29 ipsec,debug,packet phase1 last IV: 
09:05:29 ipsec,debug,packet dcefd78d 73070d50 b7d09ec3 dd4b9135 644b7afe 
09:05:29 ipsec,debug hash(sha1) 
09:05:29 ipsec,debug,packet encryption(aes) 
09:05:29 ipsec,debug,packet phase2 IV computed: 
09:05:29 ipsec,debug,packet c4841457 4bd531fb 2708c5f2 4bd81fff 
09:05:29 ipsec,debug,packet encryption(aes) 
09:05:29 ipsec,debug,packet IV was saved for next processing: 
09:05:29 ipsec,debug,packet 2203082d bd4d64cf 6c8daf3a 31c6de8c 
09:05:29 ipsec,debug,packet encryption(aes) 
09:05:29 ipsec,debug,packet with key: 
09:05:29 ipsec,debug,packet 51da1465 291942fb 3a1cd4e8 e7d7891c 
09:05:29 ipsec,debug,packet decrypted payload by IV: 
09:05:29 ipsec,debug,packet c4841457 4bd531fb 2708c5f2 4bd81fff 
09:05:29 ipsec,debug,packet decrypted payload, but not trimed. 
09:05:29 ipsec,debug,packet 0b000018 7a25e90b 17264673 812ad40e 9690b128 1242fb7c 
00000020 00000001 
09:05:29 ipsec,debug,packet 01108d29 6476e3f0 315d214f f95c9297 05f64ec7 00000e48 
00000000 00000000 
09:05:29 ipsec,debug,packet padding len=1 
09:05:29 ipsec,debug,packet skip to trim padding. 
09:05:29 ipsec,debug,packet decrypted. 
09:05:29 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 08100501 644b7afe 
0000005c 0b000018 
09:05:29 ipsec,debug,packet 7a25e90b 17264673 812ad40e 9690b128 1242fb7c 00000020 
00000001 01108d29 
09:05:29 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 00000e48 00000000 
00000000 
09:05:29 ipsec,debug,packet HASH with: 
09:05:29 ipsec,debug,packet 644b7afe 00000020 00000001 01108d29 6476e3f0 315d214f 
f95c9297 05f64ec7 
09:05:29 ipsec,debug,packet 00000e48 
09:05:29 ipsec,debug,packet hmac(hmac_sha1) 
09:05:29 ipsec,debug,packet HASH computed: 
09:05:29 ipsec,debug,packet 7a25e90b 17264673 812ad40e 9690b128 1242fb7c 
09:05:29 ipsec,debug hash validated. 
09:05:29 ipsec,debug begin. 
09:05:29 ipsec,debug seen nptype=8(hash) len=24 
09:05:29 ipsec,debug seen nptype=11(notify) len=32 
09:05:29 ipsec,debug succeed. 
09:05:29 ipsec,debug 34.198.222.127 notify: R_U_THERE_ACK 
09:05:29 ipsec,debug 34.198.222.127 DPD R-U-There-Ack received 
09:05:29 ipsec,debug received an R-U-THERE-ACK 
09:05:34 ipsec,debug KA: 164.52.192.253[4500]->34.198.222.127[4500] 
09:05:34 ipsec,debug 1 times of 1 bytes message will be sent to 34.198.222.127[450
0] 
09:05:34 ipsec,debug,packet ff 
09:05:39 ipsec,debug 34.198.222.127 DPD monitoring.... 
09:05:39 ipsec,debug,packet compute IV for phase2 
09:05:39 ipsec,debug,packet phase1 last IV: 
09:05:39 ipsec,debug,packet dcefd78d 73070d50 b7d09ec3 dd4b9135 95d0d287 
09:05:39 ipsec,debug hash(sha1) 
09:05:39 ipsec,debug,packet encryption(aes) 
09:05:39 ipsec,debug,packet phase2 IV computed: 
09:05:39 ipsec,debug,packet ac514358 be276541 309b5e43 37cee473 
09:05:39 ipsec,debug,packet HASH with: 
09:05:39 ipsec,debug,packet 95d0d287 00000020 00000001 01108d28 6476e3f0 315d214f 
f95c9297 05f64ec7 
09:05:39 ipsec,debug,packet 00000e49 
09:05:39 ipsec,debug,packet hmac(hmac_sha1) 
09:05:39 ipsec,debug,packet HASH computed: 
09:05:39 ipsec,debug,packet 72a13c3d 02c67e28 44cbb393 fd4b8751 8742bacb 
09:05:39 ipsec,debug,packet begin encryption. 
09:05:39 ipsec,debug,packet encryption(aes) 
09:05:39 ipsec,debug,packet pad length = 8 
09:05:39 ipsec,debug,packet 0b000018 72a13c3d 02c67e28 44cbb393 fd4b8751 8742bacb 
00000020 00000001 
09:05:39 ipsec,debug,packet 01108d28 6476e3f0 315d214f f95c9297 05f64ec7 00000e49 
97a98395 c0afaa07 
09:05:39 ipsec,debug,packet encryption(aes) 
09:05:39 ipsec,debug,packet with key: 
09:05:39 ipsec,debug,packet 51da1465 291942fb 3a1cd4e8 e7d7891c 
09:05:39 ipsec,debug,packet encrypted payload by IV: 
09:05:39 ipsec,debug,packet ac514358 be276541 309b5e43 37cee473 
09:05:39 ipsec,debug,packet save IV for next: 
09:05:39 ipsec,debug,packet 4d253b26 c0327aa4 f3f9af64 8a7c9129 
09:05:39 ipsec,debug,packet encrypted. 
09:05:39 ipsec,debug 92 bytes from 164.52.192.253[4500] to 34.198.222.127[4500] 
09:05:39 ipsec,debug 1 times of 96 bytes message will be sent to 34.198.222.127[45
00] 
09:05:39 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 08100501 95d0d287 
0000005c 42f1eecc 
09:05:39 ipsec,debug,packet a598842a 6bdbc62a 544da6c6 18247600 83f7d2b5 797b11f8 
fa62aa42 1bec52e6 
09:05:39 ipsec,debug,packet 1042e805 f1df41b0 2f91d209 4d253b26 c0327aa4 f3f9af64 
8a7c9129 
09:05:39 ipsec,debug sendto Information notify. 
09:05:39 ipsec,debug 34.198.222.127 DPD R-U-There sent (0) 
09:05:39 ipsec,debug 34.198.222.127 rescheduling send_r_u (5). 
09:05:39 ipsec,debug ===== received 92 bytes from 34.198.222.127[4500] to 164.52.1
92.253[4500] 
09:05:39 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 08100501 42463bba 
0000005c 67e5719d 
09:05:39 ipsec,debug,packet e45dd5e1 8d7f7cc6 8ff22ddb a2cb3f12 c5d4bc80 44f5413c 
a9c983c1 0a55c4d4 
09:05:39 ipsec,debug,packet 2233df2b 2e31f123 0ac5cac2 fe550a1f ae90489c 4453f10b 
e1dec5e2 
09:05:39 ipsec,debug receive Information. 
09:05:39 ipsec,debug,packet compute IV for phase2 
09:05:39 ipsec,debug,packet phase1 last IV: 
09:05:39 ipsec,debug,packet dcefd78d 73070d50 b7d09ec3 dd4b9135 42463bba 
09:05:39 ipsec,debug hash(sha1) 
09:05:39 ipsec,debug,packet encryption(aes) 
09:05:39 ipsec,debug,packet phase2 IV computed: 
09:05:39 ipsec,debug,packet fa6d310a 38ac26e6 e879afe8 fe82dc37 
09:05:39 ipsec,debug,packet encryption(aes) 
09:05:39 ipsec,debug,packet IV was saved for next processing: 
09:05:39 ipsec,debug,packet fe550a1f ae90489c 4453f10b e1dec5e2 
09:05:39 ipsec,debug,packet encryption(aes) 
09:05:39 ipsec,debug,packet with key: 
09:05:39 ipsec,debug,packet 51da1465 291942fb 3a1cd4e8 e7d7891c 
09:05:39 ipsec,debug,packet decrypted payload by IV: 
09:05:39 ipsec,debug,packet fa6d310a 38ac26e6 e879afe8 fe82dc37 
09:05:39 ipsec,debug,packet decrypted payload, but not trimed. 
09:05:39 ipsec,debug,packet 0b000018 f499e561 3a126911 f9d47f67 2c1b2ec5 de10a3f1 
00000020 00000001 
09:05:39 ipsec,debug,packet 01108d28 6476e3f0 315d214f f95c9297 05f64ec7 2122983c 
00000000 00000000 
09:05:39 ipsec,debug,packet padding len=1 
09:05:39 ipsec,debug,packet skip to trim padding. 
09:05:39 ipsec,debug,packet decrypted. 
09:05:39 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 08100501 42463bba 
0000005c 0b000018 
09:05:39 ipsec,debug,packet f499e561 3a126911 f9d47f67 2c1b2ec5 de10a3f1 00000020 
00000001 01108d28 
09:05:39 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 2122983c 00000000 
00000000 
09:05:39 ipsec,debug,packet HASH with: 
09:05:39 ipsec,debug,packet 42463bba 00000020 00000001 01108d28 6476e3f0 315d214f 
f95c9297 05f64ec7 
09:05:39 ipsec,debug,packet 2122983c 
09:05:39 ipsec,debug,packet hmac(hmac_sha1) 
09:05:39 ipsec,debug,packet HASH computed: 
09:05:39 ipsec,debug,packet f499e561 3a126911 f9d47f67 2c1b2ec5 de10a3f1 
09:05:39 ipsec,debug hash validated. 
09:05:39 ipsec,debug begin. 
09:05:39 ipsec,debug seen nptype=8(hash) len=24 
09:05:39 ipsec,debug seen nptype=11(notify) len=32 
09:05:39 ipsec,debug succeed. 
09:05:39 ipsec,debug 34.198.222.127 notify: R_U_THERE 
09:05:39 ipsec,debug 34.198.222.127 DPD R-U-There received 
09:05:39 ipsec,debug,packet compute IV for phase2 
09:05:39 ipsec,debug,packet phase1 last IV: 
09:05:39 ipsec,debug,packet dcefd78d 73070d50 b7d09ec3 dd4b9135 b7f7de36 
09:05:39 ipsec,debug hash(sha1) 
09:05:39 ipsec,debug,packet encryption(aes) 
09:05:39 ipsec,debug,packet phase2 IV computed: 
09:05:39 ipsec,debug,packet 9eab22de 916ab904 d508bb60 9bf6c09b 
09:05:39 ipsec,debug,packet HASH with: 
09:05:39 ipsec,debug,packet b7f7de36 00000020 00000001 01108d29 6476e3f0 315d214f 
f95c9297 05f64ec7 
09:05:39 ipsec,debug,packet 2122983c 
09:05:39 ipsec,debug,packet hmac(hmac_sha1) 
09:05:39 ipsec,debug,packet HASH computed: 
09:05:39 ipsec,debug,packet 5fac6a5b 68601291 4a45a8a0 b3ff7f55 35102a64 
09:05:39 ipsec,debug,packet begin encryption. 
09:05:39 ipsec,debug,packet encryption(aes) 
09:05:39 ipsec,debug,packet pad length = 8 
09:05:39 ipsec,debug,packet 0b000018 5fac6a5b 68601291 4a45a8a0 b3ff7f55 35102a64 
00000020 00000001 
09:05:39 ipsec,debug,packet 01108d29 6476e3f0 315d214f f95c9297 05f64ec7 2122983c 
8ffedbc2 aae3c007 
09:05:39 ipsec,debug,packet encryption(aes) 
09:05:39 ipsec,debug,packet with key: 
09:05:39 ipsec,debug,packet 51da1465 291942fb 3a1cd4e8 e7d7891c 
09:05:39 ipsec,debug,packet encrypted payload by IV: 
09:05:39 ipsec,debug,packet 9eab22de 916ab904 d508bb60 9bf6c09b 
09:05:39 ipsec,debug,packet save IV for next: 
09:05:39 ipsec,debug,packet 10003638 a3e590ea d758955c 1ae92833 
09:05:39 ipsec,debug,packet encrypted. 
09:05:39 ipsec,debug 92 bytes from 164.52.192.253[4500] to 34.198.222.127[4500] 
09:05:39 ipsec,debug 1 times of 96 bytes message will be sent to 34.198.222.127[45
00] 
09:05:39 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 08100501 b7f7de36 
0000005c cbc19856 
09:05:39 ipsec,debug,packet a56dbc6a e7b9894b b685685e 43751d72 97a6272f be61070a 
f2fde59f 7e0bc329 
09:05:39 ipsec,debug,packet 61568e76 a4c6d65d 2de47401 10003638 a3e590ea d758955c 
1ae92833 
09:05:39 ipsec,debug sendto Information notify. 
09:05:39 ipsec,debug received a valid R-U-THERE, ACK sent 
09:05:39 ipsec,debug ===== received 92 bytes from 34.198.222.127[4500] to 164.52.1
92.253[4500] 
09:05:39 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 08100501 b3a5d74b 
0000005c 931e7de0 
09:05:39 ipsec,debug,packet bd928448 b371989a d51bfe0e 9f695138 ea979fa4 e954bec6 
f6fc0787 92b34d30 
09:05:39 ipsec,debug,packet c0b89d4f 58beb061 cd245d14 c0f96696 d81b53f7 4e8f009c 
a5757632 
09:05:39 ipsec,debug receive Information. 
09:05:39 ipsec,debug,packet compute IV for phase2 
09:05:39 ipsec,debug,packet phase1 last IV: 
09:05:39 ipsec,debug,packet dcefd78d 73070d50 b7d09ec3 dd4b9135 b3a5d74b 
09:05:39 ipsec,debug hash(sha1) 
09:05:39 ipsec,debug,packet encryption(aes) 
09:05:39 ipsec,debug,packet phase2 IV computed: 
09:05:39 ipsec,debug,packet 387d380a 1b71ab4c 3b7906aa c82179d6 
09:05:39 ipsec,debug,packet encryption(aes) 
09:05:39 ipsec,debug,packet IV was saved for next processing: 
09:05:39 ipsec,debug,packet c0f96696 d81b53f7 4e8f009c a5757632 
09:05:39 ipsec,debug,packet encryption(aes) 
09:05:39 ipsec,debug,packet with key: 
09:05:39 ipsec,debug,packet 51da1465 291942fb 3a1cd4e8 e7d7891c 
09:05:39 ipsec,debug,packet decrypted payload by IV: 
09:05:39 ipsec,debug,packet 387d380a 1b71ab4c 3b7906aa c82179d6 
09:05:39 ipsec,debug,packet decrypted payload, but not trimed. 
09:05:39 ipsec,debug,packet 0b000018 d6c5bf7a 22362f92 ccea63b1 91b568c4 54767231 
00000020 00000001 
09:05:39 ipsec,debug,packet 01108d29 6476e3f0 315d214f f95c9297 05f64ec7 00000e49 
00000000 00000000 
09:05:39 ipsec,debug,packet padding len=1 
09:05:39 ipsec,debug,packet skip to trim padding. 
09:05:39 ipsec,debug,packet decrypted. 
09:05:39 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 08100501 b3a5d74b 
0000005c 0b000018 
09:05:39 ipsec,debug,packet d6c5bf7a 22362f92 ccea63b1 91b568c4 54767231 00000020 
00000001 01108d29 
09:05:39 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 00000e49 00000000 
00000000 
09:05:39 ipsec,debug,packet HASH with: 
09:05:39 ipsec,debug,packet b3a5d74b 00000020 00000001 01108d29 6476e3f0 315d214f 
f95c9297 05f64ec7 
09:05:39 ipsec,debug,packet 00000e49 
09:05:39 ipsec,debug,packet hmac(hmac_sha1) 
09:05:39 ipsec,debug,packet HASH computed: 
09:05:39 ipsec,debug,packet d6c5bf7a 22362f92 ccea63b1 91b568c4 54767231 
09:05:39 ipsec,debug hash validated. 
09:05:39 ipsec,debug begin. 
09:05:39 ipsec,debug seen nptype=8(hash) len=24 
09:05:39 ipsec,debug seen nptype=11(notify) len=32 
09:05:39 ipsec,debug succeed. 
09:05:39 ipsec,debug 34.198.222.127 notify: R_U_THERE_ACK 
09:05:39 ipsec,debug 34.198.222.127 DPD R-U-There-Ack received 
09:05:39 ipsec,debug received an R-U-THERE-ACK 
09:05:49 ipsec,debug ===== received 92 bytes from 34.198.222.127[4500] to 164.52.1
92.253[4500] 
09:05:49 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 08100501 abf4cdcf 
0000005c d0c8fced 
09:05:49 ipsec,debug,packet 94197488 6d4ffb06 348f239c cfc7a758 fee123b1 a6edb01a 
ae1d0f29 2b43f00a 
09:05:49 ipsec,debug,packet 6c263bbc ff1d1b02 5c16c365 8ca36a0e f70ff2da 267f634c 
a1cbf5d5 
09:05:49 ipsec,debug receive Information. 
09:05:49 ipsec,debug,packet compute IV for phase2 
09:05:49 ipsec,debug,packet phase1 last IV: 
09:05:49 ipsec,debug,packet dcefd78d 73070d50 b7d09ec3 dd4b9135 abf4cdcf 
09:05:49 ipsec,debug hash(sha1) 
09:05:49 ipsec,debug,packet encryption(aes) 
09:05:49 ipsec,debug,packet phase2 IV computed: 
09:05:49 ipsec,debug,packet f012a349 1b676c06 8fd98b56 dd769f72 
09:05:49 ipsec,debug,packet encryption(aes) 
09:05:49 ipsec,debug,packet IV was saved for next processing: 
09:05:49 ipsec,debug,packet 8ca36a0e f70ff2da 267f634c a1cbf5d5 
09:05:49 ipsec,debug,packet encryption(aes) 
09:05:49 ipsec,debug,packet with key: 
09:05:49 ipsec,debug,packet 51da1465 291942fb 3a1cd4e8 e7d7891c 
09:05:49 ipsec,debug,packet decrypted payload by IV: 
09:05:49 ipsec,debug,packet f012a349 1b676c06 8fd98b56 dd769f72 
09:05:49 ipsec,debug,packet decrypted payload, but not trimed. 
09:05:49 ipsec,debug,packet 0b000018 6e766646 9229ba2c 9fd5898c c2abdca1 11e16463 
00000020 00000001 
09:05:49 ipsec,debug,packet 01108d28 6476e3f0 315d214f f95c9297 05f64ec7 2122983d 
00000000 00000000 
09:05:49 ipsec,debug,packet padding len=1 
09:05:49 ipsec,debug,packet skip to trim padding. 
09:05:49 ipsec,debug,packet decrypted. 
09:05:49 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 08100501 abf4cdcf 
0000005c 0b000018 
09:05:49 ipsec,debug,packet 6e766646 9229ba2c 9fd5898c c2abdca1 11e16463 00000020 
00000001 01108d28 
09:05:49 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 2122983d 00000000 
00000000 
09:05:49 ipsec,debug,packet HASH with: 
09:05:49 ipsec,debug,packet abf4cdcf 00000020 00000001 01108d28 6476e3f0 315d214f 
f95c9297 05f64ec7 
09:05:49 ipsec,debug,packet 2122983d 
09:05:49 ipsec,debug,packet hmac(hmac_sha1) 
09:05:49 ipsec,debug,packet HASH computed: 
09:05:49 ipsec,debug,packet 6e766646 9229ba2c 9fd5898c c2abdca1 11e16463 
09:05:49 ipsec,debug hash validated. 
09:05:49 ipsec,debug begin. 
09:05:49 ipsec,debug seen nptype=8(hash) len=24 
09:05:49 ipsec,debug seen nptype=11(notify) len=32 
09:05:49 ipsec,debug succeed. 
09:05:49 ipsec,debug 34.198.222.127 notify: R_U_THERE 
09:05:49 ipsec,debug 34.198.222.127 DPD R-U-There received 
09:05:49 ipsec,debug,packet compute IV for phase2 
09:05:49 ipsec,debug,packet phase1 last IV: 
09:05:49 ipsec,debug,packet dcefd78d 73070d50 b7d09ec3 dd4b9135 91de07b2 
09:05:49 ipsec,debug hash(sha1) 
09:05:49 ipsec,debug,packet encryption(aes) 
09:05:49 ipsec,debug,packet phase2 IV computed: 
09:05:49 ipsec,debug,packet c7105f55 c1b99311 27770763 e2a0e3f7 
09:05:49 ipsec,debug,packet HASH with: 
09:05:49 ipsec,debug,packet 91de07b2 00000020 00000001 01108d29 6476e3f0 315d214f 
f95c9297 05f64ec7 
09:05:49 ipsec,debug,packet 2122983d 
09:05:49 ipsec,debug,packet hmac(hmac_sha1) 
09:05:49 ipsec,debug,packet HASH computed: 
09:05:49 ipsec,debug,packet fcb5b49d 77382fc1 19b72bd9 b6e78491 000c5f52 
09:05:49 ipsec,debug,packet begin encryption. 
09:05:49 ipsec,debug,packet encryption(aes) 
09:05:49 ipsec,debug,packet pad length = 8 
09:05:49 ipsec,debug,packet 0b000018 fcb5b49d 77382fc1 19b72bd9 b6e78491 000c5f52 
00000020 00000001 
09:05:49 ipsec,debug,packet 01108d29 6476e3f0 315d214f f95c9297 05f64ec7 2122983d 
fbb98081 b589ab07 
09:05:49 ipsec,debug,packet encryption(aes) 
09:05:49 ipsec,debug,packet with key: 
09:05:49 ipsec,debug,packet 51da1465 291942fb 3a1cd4e8 e7d7891c 
09:05:49 ipsec,debug,packet encrypted payload by IV: 
09:05:49 ipsec,debug,packet c7105f55 c1b99311 27770763 e2a0e3f7 
09:05:49 ipsec,debug,packet save IV for next: 
09:05:49 ipsec,debug,packet 5c6750b2 faca1765 3cab61f0 185eb670 
09:05:49 ipsec,debug,packet encrypted. 
09:05:49 ipsec,debug 92 bytes from 164.52.192.253[4500] to 34.198.222.127[4500] 
09:05:49 ipsec,debug 1 times of 96 bytes message will be sent to 34.198.222.127[45
00] 
09:05:49 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 08100501 91de07b2 
0000005c 8d54c87d 
09:05:49 ipsec,debug,packet bf715f3b 57ebf87d f2c2e5c9 db410a2d 5bfdc260 59f297ab 
d23da961 70b46b87 
09:05:49 ipsec,debug,packet 976dd5e9 53e40180 25160b34 5c6750b2 faca1765 3cab61f0 
185eb670 
09:05:49 ipsec,debug sendto Information notify. 
09:05:49 ipsec,debug received a valid R-U-THERE, ACK sent 
09:05:49 ipsec,debug 34.198.222.127 DPD monitoring.... 
09:05:49 ipsec,debug,packet compute IV for phase2 
09:05:49 ipsec,debug,packet phase1 last IV: 
09:05:49 ipsec,debug,packet dcefd78d 73070d50 b7d09ec3 dd4b9135 da0b60c9 
09:05:49 ipsec,debug hash(sha1) 
09:05:49 ipsec,debug,packet encryption(aes) 
09:05:49 ipsec,debug,packet phase2 IV computed: 
09:05:49 ipsec,debug,packet 24bcf4bb 917606a2 38edb03b 3ba9a004 
09:05:49 ipsec,debug,packet HASH with: 
09:05:49 ipsec,debug,packet da0b60c9 00000020 00000001 01108d28 6476e3f0 315d214f 
f95c9297 05f64ec7 
09:05:49 ipsec,debug,packet 00000e4a 
09:05:49 ipsec,debug,packet hmac(hmac_sha1) 
09:05:49 ipsec,debug,packet HASH computed: 
09:05:49 ipsec,debug,packet a1d73588 65c88ddf 309df8c3 5a88746d 45215d66 
09:05:49 ipsec,debug,packet begin encryption. 
09:05:49 ipsec,debug,packet encryption(aes) 
09:05:49 ipsec,debug,packet pad length = 8 
09:05:49 ipsec,debug,packet 0b000018 a1d73588 65c88ddf 309df8c3 5a88746d 45215d66 
00000020 00000001 
09:05:49 ipsec,debug,packet 01108d28 6476e3f0 315d214f f95c9297 05f64ec7 00000e4a 
db8dfe82 8ef7b607 
09:05:49 ipsec,debug,packet encryption(aes) 
09:05:49 ipsec,debug,packet with key: 
09:05:49 ipsec,debug,packet 51da1465 291942fb 3a1cd4e8 e7d7891c 
09:05:49 ipsec,debug,packet encrypted payload by IV: 
09:05:49 ipsec,debug,packet 24bcf4bb 917606a2 38edb03b 3ba9a004 
09:05:49 ipsec,debug,packet save IV for next: 
09:05:49 ipsec,debug,packet b72b4041 25a34a89 b64e9394 abc78664 
09:05:49 ipsec,debug,packet encrypted. 
09:05:49 ipsec,debug 92 bytes from 164.52.192.253[4500] to 34.198.222.127[4500] 
09:05:49 ipsec,debug 1 times of 96 bytes message will be sent to 34.198.222.127[45
00] 
09:05:49 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 08100501 da0b60c9 
0000005c 759e58d6 
09:05:49 ipsec,debug,packet ff673234 9982aca6 de367156 16df0526 f78dda3f 23b47ba9 
cedd907e 0ec29bad 
09:05:49 ipsec,debug,packet 6570dc6e 2383ec6f c88dd862 b72b4041 25a34a89 b64e9394 
abc78664 
09:05:49 ipsec,debug sendto Information notify. 
09:05:49 ipsec,debug 34.198.222.127 DPD R-U-There sent (0) 
09:05:49 ipsec,debug 34.198.222.127 rescheduling send_r_u (5). 
09:05:49 ipsec,debug ===== received 92 bytes from 34.198.222.127[4500] to 164.52.1
92.253[4500] 
09:05:49 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 08100501 371fc975 
0000005c 5b716bf4 
09:05:49 ipsec,debug,packet 32443d11 d1d47f76 306556c1 f23602ef 2a5d2423 e5226714 
19c019e6 aa34d79d 
09:05:49 ipsec,debug,packet eb66b9bf e72cc0ec b40f3e8a 9c5e5a45 fb2ab860 b6c20a43 
eda3758d 
09:05:49 ipsec,debug receive Information. 
09:05:49 ipsec,debug,packet compute IV for phase2 
09:05:49 ipsec,debug,packet phase1 last IV: 
09:05:49 ipsec,debug,packet dcefd78d 73070d50 b7d09ec3 dd4b9135 371fc975 
09:05:49 ipsec,debug hash(sha1) 
09:05:49 ipsec,debug,packet encryption(aes) 
09:05:49 ipsec,debug,packet phase2 IV computed: 
09:05:49 ipsec,debug,packet 0196323f c98d0bd9 fe68a352 2ce60349 
09:05:49 ipsec,debug,packet encryption(aes) 
09:05:49 ipsec,debug,packet IV was saved for next processing: 
09:05:49 ipsec,debug,packet 9c5e5a45 fb2ab860 b6c20a43 eda3758d 
09:05:49 ipsec,debug,packet encryption(aes) 
09:05:49 ipsec,debug,packet with key: 
09:05:49 ipsec,debug,packet 51da1465 291942fb 3a1cd4e8 e7d7891c 
09:05:49 ipsec,debug,packet decrypted payload by IV: 
09:05:49 ipsec,debug,packet 0196323f c98d0bd9 fe68a352 2ce60349 
09:05:49 ipsec,debug,packet decrypted payload, but not trimed. 
09:05:49 ipsec,debug,packet 0b000018 12d7afe5 ba619fb1 74b6d908 d41466b0 bf4b75b9 
00000020 00000001 
09:05:49 ipsec,debug,packet 01108d29 6476e3f0 315d214f f95c9297 05f64ec7 00000e4a 
00000000 00000000 
09:05:49 ipsec,debug,packet padding len=1 
09:05:49 ipsec,debug,packet skip to trim padding. 
09:05:49 ipsec,debug,packet decrypted. 
09:05:49 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 08100501 371fc975 
0000005c 0b000018 
09:05:49 ipsec,debug,packet 12d7afe5 ba619fb1 74b6d908 d41466b0 bf4b75b9 00000020 
00000001 01108d29 
09:05:49 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 00000e4a 00000000 
00000000 
09:05:49 ipsec,debug,packet HASH with: 
09:05:49 ipsec,debug,packet 371fc975 00000020 00000001 01108d29 6476e3f0 315d214f 
f95c9297 05f64ec7 
09:05:49 ipsec,debug,packet 00000e4a 
09:05:49 ipsec,debug,packet hmac(hmac_sha1) 
09:05:49 ipsec,debug,packet HASH computed: 
09:05:49 ipsec,debug,packet 12d7afe5 ba619fb1 74b6d908 d41466b0 bf4b75b9 
09:05:49 ipsec,debug hash validated. 
09:05:49 ipsec,debug begin. 
09:05:49 ipsec,debug seen nptype=8(hash) len=24 
09:05:49 ipsec,debug seen nptype=11(notify) len=32 
09:05:49 ipsec,debug succeed. 
09:05:49 ipsec,debug 34.198.222.127 notify: R_U_THERE_ACK 
09:05:49 ipsec,debug 34.198.222.127 DPD R-U-There-Ack received 
09:05:49 ipsec,debug received an R-U-THERE-ACK 
09:05:54 ipsec,debug KA: 164.52.192.253[4500]->34.198.222.127[4500] 
09:05:54 ipsec,debug 1 times of 1 bytes message will be sent to 34.198.222.127[450
0] 
09:05:54 ipsec,debug,packet ff 
09:05:55 system,info ipsec policy changed by mankomal 
09:05:56 ipsec policy installed for connected peer, creating ph2 
09:05:56 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=
Tunnel reqid=0:0) 
09:05:56 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
09:05:56 ipsec,debug begin QUICK mode. 
09:05:56 ipsec,debug === 
09:05:56 ipsec,debug begin QUICK mode. 
09:05:56 ipsec initiate new phase 2 negotiation: 164.52.192.253[4500]<=>34.198.222
.127[4500] 
09:05:56 ipsec,debug,packet compute IV for phase2 
09:05:56 ipsec,debug,packet phase1 last IV: 
09:05:56 ipsec,debug,packet dcefd78d 73070d50 b7d09ec3 dd4b9135 e01bf945 
09:05:56 ipsec,debug hash(sha1) 
09:05:56 ipsec,debug,packet encryption(aes) 
09:05:56 ipsec,debug,packet phase2 IV computed: 
09:05:56 ipsec,debug,packet 640aa97b c82822c2 47718797 6be893f1 
09:05:56 ipsec,debug call pfkey_send_getspi 8 
09:05:56 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 34.198.222.127[4500]->164.52.19
2.253[4500]  
09:05:56 ipsec,debug pfkey getspi sent. 
09:05:56 ipsec NAT detected -> UDP encapsulation (ENC_MODE 1->3). 
09:05:56 ipsec,debug dh(modp1024) 
09:05:56 ipsec,debug dh(modp1024) 
09:05:56 ipsec,debug dh(modp1024) 
09:05:56 ipsec,debug,packet compute DH's private. 
09:05:56 ipsec,debug,packet 47edc492 24b3adf3 ad2b12ff 0a12b149 90c238ab d5505d94 
a86404b8 e773bac7 
09:05:56 ipsec,debug,packet c7e23293 dfa52447 1405f51a b67eee07 439c8424 3ea7c963 
1d5ae09d 0054ab23 
09:05:56 ipsec,debug,packet c8e1b878 1028f0cc 795a5eec 8ab06a6e df9e9c54 64cca5dd 
66e99420 123413ac 
09:05:56 ipsec,debug,packet 971c5943 cbf283d4 7bf11ca4 91001266 0edf2abf 0c9b2769 
a9112584 11e81d44 
09:05:56 ipsec,debug,packet compute DH's public. 
09:05:56 ipsec,debug,packet 819777f6 ea9b2f4f 67a2cb61 fcbb7ad9 27add173 d93dcff5 
72d50cd1 b0130453 
09:05:56 ipsec,debug,packet 8a26d6a8 1ef85777 50fed464 61ca04f5 ff865295 3672d447 
720ffab6 de70acbf 
09:05:56 ipsec,debug,packet 6d0196c0 0b871ea2 43d28b2a 6a52c6b6 7b79b2f4 06381411 
cd716871 ddd83fc3 
09:05:56 ipsec,debug,packet df39dcd8 85c8a50e bd77f141 06df41b7 f6035dc4 455be561 
4c3c397f 2f241f5e 
09:05:56 ipsec,debug use local ID type IPv4_address 
09:05:56 ipsec,debug use remote ID type IPv4_address 
09:05:56 ipsec,debug IDci: 
09:05:56 ipsec,debug 01000000 a9fe74d6 
09:05:56 ipsec,debug IDcr: 
09:05:56 ipsec,debug 01000000 a9fe74d5 
09:05:56 ipsec,debug add payload of len 52, next type 10 
09:05:56 ipsec,debug add payload of len 24, next type 4 
09:05:56 ipsec,debug add payload of len 128, next type 5 
09:05:56 ipsec,debug add payload of len 8, next type 5 
09:05:56 ipsec,debug add payload of len 8, next type 0 
09:05:56 ipsec,debug,packet HASH with: 
09:05:56 ipsec,debug,packet e01bf945 0a000038 00000001 00000001 0000002c 01030401 
08491fb8 00000020 
09:05:56 ipsec,debug,packet 010c0000 80010001 80020e10 80040003 80060080 80050002 
80030002 0400001c 
09:05:56 ipsec,debug,packet a564dc92 141bfaca 915477c3 01dad4b7 ba443b87 09ab95ae 
05000084 819777f6 
09:05:56 ipsec,debug,packet ea9b2f4f 67a2cb61 fcbb7ad9 27add173 d93dcff5 72d50cd1 
b0130453 8a26d6a8 
09:05:56 ipsec,debug,packet 1ef85777 50fed464 61ca04f5 ff865295 3672d447 720ffab6 
de70acbf 6d0196c0 
09:05:56 ipsec,debug,packet 0b871ea2 43d28b2a 6a52c6b6 7b79b2f4 06381411 cd716871 
ddd83fc3 df39dcd8 
09:05:56 ipsec,debug,packet 85c8a50e bd77f141 06df41b7 f6035dc4 455be561 4c3c397f 
2f241f5e 0500000c 
09:05:56 ipsec,debug,packet 01000000 a9fe74d6 0000000c 01000000 a9fe74d5 
09:05:56 ipsec,debug,packet hmac(hmac_sha1) 
09:05:56 ipsec,debug,packet HASH computed: 
09:05:56 ipsec,debug,packet 3bc7474d a26a9098 f0a7b9f6 4840525c 7842f7b0 
09:05:56 ipsec,debug add payload of len 20, next type 1 
09:05:56 ipsec,debug,packet begin encryption. 
09:05:56 ipsec,debug,packet encryption(aes) 
09:05:56 ipsec,debug,packet pad length = 8 
09:05:56 ipsec,debug,packet 01000018 3bc7474d a26a9098 f0a7b9f6 4840525c 7842f7b0 
0a000038 00000001 
09:05:56 ipsec,debug,packet 00000001 0000002c 01030401 08491fb8 00000020 010c0000 
80010001 80020e10 
09:05:56 ipsec,debug,packet 80040003 80060080 80050002 80030002 0400001c a564dc92 
141bfaca 915477c3 
09:05:56 ipsec,debug,packet 01dad4b7 ba443b87 09ab95ae 05000084 819777f6 ea9b2f4f 
67a2cb61 fcbb7ad9 
09:05:56 ipsec,debug,packet 27add173 d93dcff5 72d50cd1 b0130453 8a26d6a8 1ef85777 
50fed464 61ca04f5 
09:05:56 ipsec,debug,packet ff865295 3672d447 720ffab6 de70acbf 6d0196c0 0b871ea2 
43d28b2a 6a52c6b6 
09:05:56 ipsec,debug,packet 7b79b2f4 06381411 cd716871 ddd83fc3 df39dcd8 85c8a50e 
bd77f141 06df41b7 
09:05:56 ipsec,debug,packet f6035dc4 455be561 4c3c397f 2f241f5e 0500000c 01000000 
a9fe74d6 0000000c 
09:05:56 ipsec,debug,packet 01000000 a9fe74d5 cd9aad97 e3839a07 
09:05:56 ipsec,debug,packet encryption(aes) 
09:05:56 ipsec,debug,packet with key: 
09:05:56 ipsec,debug,packet 51da1465 291942fb 3a1cd4e8 e7d7891c 
09:05:56 ipsec,debug,packet encrypted payload by IV: 
09:05:56 ipsec,debug,packet 640aa97b c82822c2 47718797 6be893f1 
09:05:56 ipsec,debug,packet save IV for next: 
09:05:56 ipsec,debug,packet 16f48eca 045d57e3 35013012 81e25042 
09:05:56 ipsec,debug,packet encrypted. 
09:05:56 ipsec,debug 300 bytes from 164.52.192.253[4500] to 34.198.222.127[4500] 
09:05:56 ipsec,debug 1 times of 304 bytes message will be sent to 34.198.222.127[4
500] 
09:05:56 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 08102001 e01bf945 
0000012c 682bbf84 
09:05:56 ipsec,debug,packet aa2855c3 4b25016f 368a1c7c 0f322f5c 3f5d00f0 80447048 
57f7ecd6 6607fbd3 
09:05:56 ipsec,debug,packet cdb5b758 cca18eb8 d8746ae0 fee70754 2302e7c5 185c12ad 
aba8fce8 9927da10 
09:05:56 ipsec,debug,packet 5c902fb8 bfea7071 48a162bd 057a848c ff1f7bae 9ebba780 
fdfe113a a1530fca 
09:05:56 ipsec,debug,packet 27c85a84 98d89b01 59d10135 5c6b54fd 170da0ef 590b5c53 
0da02703 a29651d9 
09:05:56 ipsec,debug,packet 3b52415e 0baf852b dcc51a0c 1d2409cc 2a29f3de a64f492d 
ed37c75c d325cbd2 
09:05:56 ipsec,debug,packet 9bb545f3 38fe5f9d df38c05c 5a85fe1b fa9bea90 2c9c45c1 
352f46bd 8643780d 
09:05:56 ipsec,debug,packet ef015b0b 2e973131 5f972074 297b781b 7167b473 6f3d43f7 
65b027ec f587fdd5 
09:05:56 ipsec,debug,packet 1108e5c3 17afc51d d1a9e0ac 3808b094 d98b8f7d 50241927 
ba112221 16f48eca 
09:05:56 ipsec,debug,packet 045d57e3 35013012 81e25042 
09:05:56 ipsec sent phase2 packet 164.52.192.253[4500]<=>34.198.222.127[4500] 6476
e3f0315d214f:f95c929705f64ec7:0000e01b 
09:05:56 system,info ipsec policy changed by mankomal 
09:05:57 ipsec,debug ===== received 76 bytes from 34.198.222.127[4500] to 164.52.1
92.253[4500] 
09:05:57 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 08100501 8341b5b5 
0000004c 0e475903 
09:05:57 ipsec,debug,packet 8abe6fb1 7c991c41 c7a8816d 6f7c531c 51828856 4c3b9832 
e39c9f10 94280beb 
09:05:57 ipsec,debug,packet c1465bdb 5a857c69 c0cb841a 
09:05:57 ipsec,debug receive Information. 
09:05:57 ipsec,debug,packet compute IV for phase2 
09:05:57 ipsec,debug,packet phase1 last IV: 
09:05:57 ipsec,debug,packet dcefd78d 73070d50 b7d09ec3 dd4b9135 8341b5b5 
09:05:57 ipsec,debug hash(sha1) 
09:05:57 ipsec,debug,packet encryption(aes) 
09:05:57 ipsec,debug,packet phase2 IV computed: 
09:05:57 ipsec,debug,packet 3983a713 6cb0b93c d5c2371f a316e7c9 
09:05:57 ipsec,debug,packet encryption(aes) 
09:05:57 ipsec,debug,packet IV was saved for next processing: 
09:05:57 ipsec,debug,packet 94280beb c1465bdb 5a857c69 c0cb841a 
09:05:57 ipsec,debug,packet encryption(aes) 
09:05:57 ipsec,debug,packet with key: 
09:05:57 ipsec,debug,packet 51da1465 291942fb 3a1cd4e8 e7d7891c 
09:05:57 ipsec,debug,packet decrypted payload by IV: 
09:05:57 ipsec,debug,packet 3983a713 6cb0b93c d5c2371f a316e7c9 
09:05:57 ipsec,debug,packet decrypted payload, but not trimed. 
09:05:57 ipsec,debug,packet 0b000018 be49ff8b 8d18964f 229e5d30 0ca6c971 877d5389 
00000010 00000001 
09:05:57 ipsec,debug,packet 03040012 00000000 00000000 00000000 
09:05:57 ipsec,debug,packet padding len=1 
09:05:57 ipsec,debug,packet skip to trim padding. 
09:05:57 ipsec,debug,packet decrypted. 
09:05:57 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 08100501 8341b5b5 
0000004c 0b000018 
09:05:57 ipsec,debug,packet be49ff8b 8d18964f 229e5d30 0ca6c971 877d5389 00000010 
00000001 03040012 
09:05:57 ipsec,debug,packet 00000000 00000000 00000000 
09:05:57 ipsec,debug,packet HASH with: 
09:05:57 ipsec,debug,packet 8341b5b5 00000010 00000001 03040012 00000000 
09:05:57 ipsec,debug,packet hmac(hmac_sha1) 
09:05:57 ipsec,debug,packet HASH computed: 
09:05:57 ipsec,debug,packet be49ff8b 8d18964f 229e5d30 0ca6c971 877d5389 
09:05:57 ipsec,debug hash validated. 
09:05:57 ipsec,debug begin. 
09:05:57 ipsec,debug seen nptype=8(hash) len=24 
09:05:57 ipsec,debug seen nptype=11(notify) len=16 
09:05:57 ipsec,debug succeed. 
09:05:57 ipsec,debug 34.198.222.127 notify: INVALID-ID-INFORMATION 
09:05:57 ipsec 34.198.222.127 fatal INVALID-ID-INFORMATION notify messsage, phase1
 should be deleted. 
09:05:57 ipsec,debug 34.198.222.127 notification message 18:INVALID-ID-INFORMATION
, doi=1 proto_id=3 spi=00000000\05(size=4). 
09:05:59 ipsec,debug 34.198.222.127 DPD monitoring.... 
09:05:59 ipsec,debug,packet compute IV for phase2 
09:05:59 ipsec,debug,packet phase1 last IV: 
09:05:59 ipsec,debug,packet dcefd78d 73070d50 b7d09ec3 dd4b9135 8dca7910 
09:05:59 ipsec,debug hash(sha1) 
09:05:59 ipsec,debug,packet encryption(aes) 
09:05:59 ipsec,debug,packet phase2 IV computed: 
09:05:59 ipsec,debug,packet 39e82c1f 2ef1d397 514dcda1 4cb3b012 
09:05:59 ipsec,debug,packet HASH with: 
09:05:59 ipsec,debug,packet 8dca7910 00000020 00000001 01108d28 6476e3f0 315d214f 
f95c9297 05f64ec7 
09:05:59 ipsec,debug,packet 00000e4b 
09:05:59 ipsec,debug,packet hmac(hmac_sha1) 
09:05:59 ipsec,debug,packet HASH computed: 
09:05:59 ipsec,debug,packet 98bfcb3c 7553fbbf 4ce6ef27 6a9bbf77 f54f7a78 
09:05:59 ipsec,debug,packet begin encryption. 
09:05:59 ipsec,debug,packet encryption(aes) 
09:05:59 ipsec,debug,packet pad length = 8 
09:05:59 ipsec,debug,packet 0b000018 98bfcb3c 7553fbbf 4ce6ef27 6a9bbf77 f54f7a78 
00000020 00000001 
09:05:59 ipsec,debug,packet 01108d28 6476e3f0 315d214f f95c9297 05f64ec7 00000e4b 
fb9ac4c6 bd92f807 
09:05:59 ipsec,debug,packet encryption(aes) 
09:05:59 ipsec,debug,packet with key: 
09:05:59 ipsec,debug,packet 51da1465 291942fb 3a1cd4e8 e7d7891c 
09:05:59 ipsec,debug,packet encrypted payload by IV: 
09:05:59 ipsec,debug,packet 39e82c1f 2ef1d397 514dcda1 4cb3b012 
09:05:59 ipsec,debug,packet save IV for next: 
09:05:59 ipsec,debug,packet 10ede20a 04c475b1 958b23aa 1ad6707d 
09:05:59 ipsec,debug,packet encrypted. 
09:05:59 ipsec,debug 92 bytes from 164.52.192.253[4500] to 34.198.222.127[4500] 
09:05:59 ipsec,debug 1 times of 96 bytes message will be sent to 34.198.222.127[45
00] 
09:05:59 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 08100501 8dca7910 
0000005c 5d5da47d 
09:05:59 ipsec,debug,packet 06bf99a5 86829ab1 cfedc234 ddd19b40 28c227f5 67978a19 
e42c8283 1028a952 
09:05:59 ipsec,debug,packet eb267f46 f6474881 41c4ee34 10ede20a 04c475b1 958b23aa 
1ad6707d 
09:05:59 ipsec,debug sendto Information notify. 
09:05:59 ipsec,debug 34.198.222.127 DPD R-U-There sent (0) 
09:05:59 ipsec,debug 34.198.222.127 rescheduling send_r_u (5). 
09:05:59 ipsec,debug ===== received 92 bytes from 34.198.222.127[4500] to 164.52.1
92.253[4500] 
09:05:59 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 08100501 a078e4a1 
0000005c 1f1a79c1 
09:05:59 ipsec,debug,packet b57e190b c29f7bc1 c53c4955 1f3e25a2 5fa1d222 15073202 
7328e858 76b9aa31 
09:05:59 ipsec,debug,packet 55ef41ba c1444387 a8f86717 f7cad5e0 0abbbbcb 94375a2e 
a3922bce 
09:05:59 ipsec,debug receive Information. 
09:05:59 ipsec,debug,packet compute IV for phase2 
09:05:59 ipsec,debug,packet phase1 last IV: 
09:05:59 ipsec,debug,packet dcefd78d 73070d50 b7d09ec3 dd4b9135 a078e4a1 
09:05:59 ipsec,debug hash(sha1) 
09:05:59 ipsec,debug,packet encryption(aes) 
09:05:59 ipsec,debug,packet phase2 IV computed: 
09:05:59 ipsec,debug,packet f28f8573 68c63e76 f5c7bca5 2858b9ec 
09:05:59 ipsec,debug,packet encryption(aes) 
09:05:59 ipsec,debug,packet IV was saved for next processing: 
09:05:59 ipsec,debug,packet f7cad5e0 0abbbbcb 94375a2e a3922bce 
09:05:59 ipsec,debug,packet encryption(aes) 
09:05:59 ipsec,debug,packet with key: 
09:05:59 ipsec,debug,packet 51da1465 291942fb 3a1cd4e8 e7d7891c 
09:05:59 ipsec,debug,packet decrypted payload by IV: 
09:05:59 ipsec,debug,packet f28f8573 68c63e76 f5c7bca5 2858b9ec 
09:05:59 ipsec,debug,packet decrypted payload, but not trimed. 
09:05:59 ipsec,debug,packet 0b000018 d86939b3 0ed1c848 ccc29124 1711aaad 18b72e03 
00000020 00000001 
09:05:59 ipsec,debug,packet 01108d29 6476e3f0 315d214f f95c9297 05f64ec7 00000e4b 
00000000 00000000 
09:05:59 ipsec,debug,packet padding len=1 
09:05:59 ipsec,debug,packet skip to trim padding. 
09:05:59 ipsec,debug,packet decrypted. 
09:05:59 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 08100501 a078e4a1 
0000005c 0b000018 
09:05:59 ipsec,debug,packet d86939b3 0ed1c848 ccc29124 1711aaad 18b72e03 00000020 
00000001 01108d29 
09:05:59 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 00000e4b 00000000 
00000000 
09:05:59 ipsec,debug,packet HASH with: 
09:05:59 ipsec,debug,packet a078e4a1 00000020 00000001 01108d29 6476e3f0 315d214f 
f95c9297 05f64ec7 
09:05:59 ipsec,debug,packet 00000e4b 
09:05:59 ipsec,debug,packet hmac(hmac_sha1) 
09:05:59 ipsec,debug,packet HASH computed: 
09:05:59 ipsec,debug,packet d86939b3 0ed1c848 ccc29124 1711aaad 18b72e03 
09:05:59 ipsec,debug hash validated. 
09:05:59 ipsec,debug begin. 
09:05:59 ipsec,debug seen nptype=8(hash) len=24 
09:05:59 ipsec,debug seen nptype=11(notify) len=32 
09:05:59 ipsec,debug succeed. 
09:05:59 ipsec,debug 34.198.222.127 notify: R_U_THERE_ACK 
09:05:59 ipsec,debug 34.198.222.127 DPD R-U-There-Ack received 
09:05:59 ipsec,debug received an R-U-THERE-ACK 
09:06:06 ipsec,debug 300 bytes from 164.52.192.253[4500] to 34.198.222.127[4500] 
09:06:06 ipsec,debug 1 times of 304 bytes message will be sent to 34.198.222.127[4
500] 
09:06:06 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 08102001 e01bf945 
0000012c 682bbf84 
09:06:06 ipsec,debug,packet aa2855c3 4b25016f 368a1c7c 0f322f5c 3f5d00f0 80447048 
57f7ecd6 6607fbd3 
09:06:06 ipsec,debug,packet cdb5b758 cca18eb8 d8746ae0 fee70754 2302e7c5 185c12ad 
aba8fce8 9927da10 
09:06:06 ipsec,debug,packet 5c902fb8 bfea7071 48a162bd 057a848c ff1f7bae 9ebba780 
fdfe113a a1530fca 
09:06:06 ipsec,debug,packet 27c85a84 98d89b01 59d10135 5c6b54fd 170da0ef 590b5c53 
0da02703 a29651d9 
09:06:06 ipsec,debug,packet 3b52415e 0baf852b dcc51a0c 1d2409cc 2a29f3de a64f492d 
ed37c75c d325cbd2 
09:06:06 ipsec,debug,packet 9bb545f3 38fe5f9d df38c05c 5a85fe1b fa9bea90 2c9c45c1 
352f46bd 8643780d 
09:06:06 ipsec,debug,packet ef015b0b 2e973131 5f972074 297b781b 7167b473 6f3d43f7 
65b027ec f587fdd5 
09:06:06 ipsec,debug,packet 1108e5c3 17afc51d d1a9e0ac 3808b094 d98b8f7d 50241927 
ba112221 16f48eca 
09:06:06 ipsec,debug,packet 045d57e3 35013012 81e25042 
09:06:06 ipsec resent phase2 packet 164.52.192.253[4500]<=>34.198.222.127[4500] 64
76e3f0315d214f:f95c929705f64ec7:0000e01b 
09:06:07 ipsec,debug ===== received 76 bytes from 34.198.222.127[4500] to 164.52.1
92.253[4500] 
09:06:07 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 08100501 69fb6407 
0000004c 791db29d 
09:06:07 ipsec,debug,packet 0848b7b6 c0e18fa6 12e5fa2a c3e2a723 86f87815 30e34a4a 
d00838b0 74e16802 
09:06:07 ipsec,debug,packet 1c6f5e63 d5034fa1 2969d498 
09:06:07 ipsec,debug receive Information. 
09:06:07 ipsec,debug,packet compute IV for phase2 
09:06:07 ipsec,debug,packet phase1 last IV: 
09:06:07 ipsec,debug,packet dcefd78d 73070d50 b7d09ec3 dd4b9135 69fb6407 
09:06:07 ipsec,debug hash(sha1) 
09:06:07 ipsec,debug,packet encryption(aes) 
09:06:07 ipsec,debug,packet phase2 IV computed: 
09:06:07 ipsec,debug,packet dc7d604c 1710d0eb e87756ea ecf0317e 
09:06:07 ipsec,debug,packet encryption(aes) 
09:06:07 ipsec,debug,packet IV was saved for next processing: 
09:06:07 ipsec,debug,packet 74e16802 1c6f5e63 d5034fa1 2969d498 
09:06:07 ipsec,debug,packet encryption(aes) 
09:06:07 ipsec,debug,packet with key: 
09:06:07 ipsec,debug,packet 51da1465 291942fb 3a1cd4e8 e7d7891c 
09:06:07 ipsec,debug,packet decrypted payload by IV: 
09:06:07 ipsec,debug,packet dc7d604c 1710d0eb e87756ea ecf0317e 
09:06:07 ipsec,debug,packet decrypted payload, but not trimed. 
09:06:07 ipsec,debug,packet 0b000018 e66b77e2 b41cf25c 243650db 322f7f18 2b4f063a 
0000000c 00000001 
09:06:07 ipsec,debug,packet 01000010 00000000 00000000 00000000 
09:06:07 ipsec,debug,packet padding len=1 
09:06:07 ipsec,debug,packet skip to trim padding. 
09:06:07 ipsec,debug,packet decrypted. 
09:06:07 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 08100501 69fb6407 
0000004c 0b000018 
09:06:07 ipsec,debug,packet e66b77e2 b41cf25c 243650db 322f7f18 2b4f063a 0000000c 
00000001 01000010 
09:06:07 ipsec,debug,packet 00000000 00000000 00000000 
09:06:07 ipsec,debug,packet HASH with: 
09:06:07 ipsec,debug,packet 69fb6407 0000000c 00000001 01000010 
09:06:07 ipsec,debug,packet hmac(hmac_sha1) 
09:06:07 ipsec,debug,packet HASH computed: 
09:06:07 ipsec,debug,packet e66b77e2 b41cf25c 243650db 322f7f18 2b4f063a 
09:06:07 ipsec,debug hash validated. 
09:06:07 ipsec,debug begin. 
09:06:07 ipsec,debug seen nptype=8(hash) len=24 
09:06:07 ipsec,debug seen nptype=11(notify) len=12 
09:06:07 ipsec,debug succeed. 
09:06:07 ipsec,debug 34.198.222.127 notify: PAYLOAD-MALFORMED 
09:06:07 ipsec 34.198.222.127 fatal PAYLOAD-MALFORMED notify messsage, phase1 shou
ld be deleted. 
09:06:09 ipsec,debug ===== received 92 bytes from 34.198.222.127[4500] to 164.52.1
92.253[4500] 
09:06:09 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 08100501 6fa37630 
0000005c 672b9b0d 
09:06:09 ipsec,debug,packet 79e9e368 8f1ed5c0 d29b445a 89217a64 ac49fc81 a4accf30 
82e35fb1 ccc38f2d 
09:06:09 ipsec,debug,packet b5cdd5f4 afdd68e7 62c5cd93 c5d0b042 fabac3d1 8ab73760 
ea7f1cd7 
09:06:09 ipsec,debug receive Information. 
09:06:09 ipsec,debug,packet compute IV for phase2 
09:06:09 ipsec,debug,packet phase1 last IV: 
09:06:09 ipsec,debug,packet dcefd78d 73070d50 b7d09ec3 dd4b9135 6fa37630 
09:06:09 ipsec,debug hash(sha1) 
09:06:09 ipsec,debug,packet encryption(aes) 
09:06:09 ipsec,debug,packet phase2 IV computed: 
09:06:09 ipsec,debug,packet 6478e1f5 56a50190 cd4b1dd5 821270ad 
09:06:09 ipsec,debug,packet encryption(aes) 
09:06:09 ipsec,debug,packet IV was saved for next processing: 
09:06:09 ipsec,debug,packet c5d0b042 fabac3d1 8ab73760 ea7f1cd7 
09:06:09 ipsec,debug,packet encryption(aes) 
09:06:09 ipsec,debug,packet with key: 
09:06:09 ipsec,debug,packet 51da1465 291942fb 3a1cd4e8 e7d7891c 
09:06:09 ipsec,debug,packet decrypted payload by IV: 
09:06:09 ipsec,debug,packet 6478e1f5 56a50190 cd4b1dd5 821270ad 
09:06:09 ipsec,debug,packet decrypted payload, but not trimed. 
09:06:09 ipsec,debug,packet 0b000018 6edec5a9 0f67dca2 98e9b610 b4181869 0c89ad0b 
00000020 00000001 
09:06:09 ipsec,debug,packet 01108d28 6476e3f0 315d214f f95c9297 05f64ec7 2122983e 
00000000 00000000 
09:06:09 ipsec,debug,packet padding len=1 
09:06:09 ipsec,debug,packet skip to trim padding. 
09:06:09 ipsec,debug,packet decrypted. 
09:06:09 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 08100501 6fa37630 
0000005c 0b000018 
09:06:09 ipsec,debug,packet 6edec5a9 0f67dca2 98e9b610 b4181869 0c89ad0b 00000020 
00000001 01108d28 
09:06:09 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 2122983e 00000000 
00000000 
09:06:09 ipsec,debug,packet HASH with: 
09:06:09 ipsec,debug,packet 6fa37630 00000020 00000001 01108d28 6476e3f0 315d214f 
f95c9297 05f64ec7 
09:06:09 ipsec,debug,packet 2122983e 
09:06:09 ipsec,debug,packet hmac(hmac_sha1) 
09:06:09 ipsec,debug,packet HASH computed: 
09:06:09 ipsec,debug,packet 6edec5a9 0f67dca2 98e9b610 b4181869 0c89ad0b 
09:06:09 ipsec,debug hash validated. 
09:06:09 ipsec,debug begin. 
09:06:09 ipsec,debug seen nptype=8(hash) len=24 
09:06:09 ipsec,debug seen nptype=11(notify) len=32 
09:06:09 ipsec,debug succeed. 
09:06:09 ipsec,debug 34.198.222.127 notify: R_U_THERE 
09:06:09 ipsec,debug 34.198.222.127 DPD R-U-There received 
09:06:09 ipsec,debug,packet compute IV for phase2 
09:06:09 ipsec,debug,packet phase1 last IV: 
09:06:09 ipsec,debug,packet dcefd78d 73070d50 b7d09ec3 dd4b9135 ab2aa04f 
09:06:09 ipsec,debug hash(sha1) 
09:06:09 ipsec,debug,packet encryption(aes) 
09:06:09 ipsec,debug,packet phase2 IV computed: 
09:06:09 ipsec,debug,packet 94b09c8f 899f3ace 8e5e7278 48cbd19b 
09:06:09 ipsec,debug,packet HASH with: 
09:06:09 ipsec,debug,packet ab2aa04f 00000020 00000001 01108d29 6476e3f0 315d214f 
f95c9297 05f64ec7 
09:06:09 ipsec,debug,packet 2122983e 
09:06:09 ipsec,debug,packet hmac(hmac_sha1) 
09:06:09 ipsec,debug,packet HASH computed: 
09:06:09 ipsec,debug,packet ae703dbd 8487044b 22748053 b0e708ac f10ae2bc 
09:06:09 ipsec,debug,packet begin encryption. 
09:06:09 ipsec,debug,packet encryption(aes) 
09:06:09 ipsec,debug,packet pad length = 8 
09:06:09 ipsec,debug,packet 0b000018 ae703dbd 8487044b 22748053 b0e708ac f10ae2bc 
00000020 00000001 
09:06:09 ipsec,debug,packet 01108d29 6476e3f0 315d214f f95c9297 05f64ec7 2122983e 
a5e1f4b0 ce9eed07 
09:06:09 ipsec,debug,packet encryption(aes) 
09:06:09 ipsec,debug,packet with key: 
09:06:09 ipsec,debug,packet 51da1465 291942fb 3a1cd4e8 e7d7891c 
09:06:09 ipsec,debug,packet encrypted payload by IV: 
09:06:09 ipsec,debug,packet 94b09c8f 899f3ace 8e5e7278 48cbd19b 
09:06:09 ipsec,debug,packet save IV for next: 
09:06:09 ipsec,debug,packet 861476cf 4d86d32e 88418a70 eedf23f8 
09:06:09 ipsec,debug,packet encrypted. 
09:06:09 ipsec,debug 92 bytes from 164.52.192.253[4500] to 34.198.222.127[4500] 
09:06:09 ipsec,debug 1 times of 96 bytes message will be sent to 34.198.222.127[45
00] 
09:06:09 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 08100501 ab2aa04f 
0000005c 72d56e0d 
09:06:09 ipsec,debug,packet eb8cd545 0babcd41 b34c3544 2d795721 2a5e5ec0 952df151 
7a675f27 cf07eca9 
09:06:09 ipsec,debug,packet c6aa584f 7d78b4f6 1720fb24 861476cf 4d86d32e 88418a70 
eedf23f8 
09:06:09 ipsec,debug sendto Information notify. 
09:06:09 ipsec,debug received a valid R-U-THERE, ACK sent 
09:06:09 ipsec,debug 34.198.222.127 DPD monitoring.... 
09:06:09 ipsec,debug,packet compute IV for phase2 
09:06:09 ipsec,debug,packet phase1 last IV: 
09:06:09 ipsec,debug,packet dcefd78d 73070d50 b7d09ec3 dd4b9135 acc47416 
09:06:09 ipsec,debug hash(sha1) 
09:06:09 ipsec,debug,packet encryption(aes) 
09:06:09 ipsec,debug,packet phase2 IV computed: 
09:06:09 ipsec,debug,packet edcbbcfd 0fcabb24 fd69e50c 3c1f04bc 
09:06:09 ipsec,debug,packet HASH with: 
09:06:09 ipsec,debug,packet acc47416 00000020 00000001 01108d28 6476e3f0 315d214f 
f95c9297 05f64ec7 
09:06:09 ipsec,debug,packet 00000e4c 
09:06:09 ipsec,debug,packet hmac(hmac_sha1) 
09:06:09 ipsec,debug,packet HASH computed: 
09:06:09 ipsec,debug,packet c8818bfc 2e7ed132 0c60f9b2 6bd8c093 bc7c56c8 
09:06:09 ipsec,debug,packet begin encryption. 
09:06:09 ipsec,debug,packet encryption(aes) 
09:06:09 ipsec,debug,packet pad length = 8 
09:06:09 ipsec,debug,packet 0b000018 c8818bfc 2e7ed132 0c60f9b2 6bd8c093 bc7c56c8 
00000020 00000001 
09:06:09 ipsec,debug,packet 01108d28 6476e3f0 315d214f f95c9297 05f64ec7 00000e4c 
eab4f2e1 d0f4da07 
09:06:09 ipsec,debug,packet encryption(aes) 
09:06:09 ipsec,debug,packet with key: 
09:06:09 ipsec,debug,packet 51da1465 291942fb 3a1cd4e8 e7d7891c 
09:06:09 ipsec,debug,packet encrypted payload by IV: 
09:06:09 ipsec,debug,packet edcbbcfd 0fcabb24 fd69e50c 3c1f04bc 
09:06:09 ipsec,debug,packet save IV for next: 
09:06:09 ipsec,debug,packet e6870a85 3d835c90 881823f2 426e88a8 
09:06:09 ipsec,debug,packet encrypted. 
09:06:09 ipsec,debug 92 bytes from 164.52.192.253[4500] to 34.198.222.127[4500] 
09:06:09 ipsec,debug 1 times of 96 bytes message will be sent to 34.198.222.127[45
00] 
09:06:09 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 08100501 acc47416 
0000005c c2c8d211 
09:06:09 ipsec,debug,packet 8e464a73 0287ea8a 3bff472a bb69ce3b d00411e8 2b2a54a3 
bc3dc7fa 0a33f374 
09:06:09 ipsec,debug,packet 2903f190 2f497418 394f2d5d e6870a85 3d835c90 881823f2 
426e88a8 
09:06:09 ipsec,debug sendto Information notify. 
09:06:09 ipsec,debug 34.198.222.127 DPD R-U-There sent (0) 
09:06:09 ipsec,debug 34.198.222.127 rescheduling send_r_u (5). 
09:06:10 ipsec,debug ===== received 92 bytes from 34.198.222.127[4500] to 164.52.1
92.253[4500] 
09:06:10 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 08100501 12a3317f 
0000005c 721ec78b 
09:06:10 ipsec,debug,packet 08a2e871 238da7b3 1d4311d7 9e62dace c00fd5bd ab08c1c7 
0186a0c5 a0b38361 
09:06:10 ipsec,debug,packet 47918a38 fb48692c d1980476 e19d6f29 723ac3fd e848e713 
4d0fad17 
09:06:10 ipsec,debug receive Information. 
09:06:10 ipsec,debug,packet compute IV for phase2 
09:06:10 ipsec,debug,packet phase1 last IV: 
09:06:10 ipsec,debug,packet dcefd78d 73070d50 b7d09ec3 dd4b9135 12a3317f 
09:06:10 ipsec,debug hash(sha1) 
09:06:10 ipsec,debug,packet encryption(aes) 
09:06:10 ipsec,debug,packet phase2 IV computed: 
09:06:10 ipsec,debug,packet 8cf21260 dd3174d6 1afb1de6 a70db36a 
09:06:10 ipsec,debug,packet encryption(aes) 
09:06:10 ipsec,debug,packet IV was saved for next processing: 
09:06:10 ipsec,debug,packet e19d6f29 723ac3fd e848e713 4d0fad17 
09:06:10 ipsec,debug,packet encryption(aes) 
09:06:10 ipsec,debug,packet with key: 
09:06:10 ipsec,debug,packet 51da1465 291942fb 3a1cd4e8 e7d7891c 
09:06:10 ipsec,debug,packet decrypted payload by IV: 
09:06:10 ipsec,debug,packet 8cf21260 dd3174d6 1afb1de6 a70db36a 
09:06:10 ipsec,debug,packet decrypted payload, but not trimed. 
09:06:10 ipsec,debug,packet 0b000018 16cf4a0a 25656c3b 67587103 1181799c b1000a20 
00000020 00000001 
09:06:10 ipsec,debug,packet 01108d29 6476e3f0 315d214f f95c9297 05f64ec7 00000e4c 
00000000 00000000 
09:06:10 ipsec,debug,packet padding len=1 
09:06:10 ipsec,debug,packet skip to trim padding. 
09:06:10 ipsec,debug,packet decrypted. 
09:06:10 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 08100501 12a3317f 
0000005c 0b000018 
09:06:10 ipsec,debug,packet 16cf4a0a 25656c3b 67587103 1181799c b1000a20 00000020 
00000001 01108d29 
09:06:10 ipsec,debug,packet 6476e3f0 315d214f f95c9297 05f64ec7 00000e4c 00000000 
00000000 
09:06:10 ipsec,debug,packet HASH with: 
09:06:10 ipsec,debug,packet 12a3317f 00000020 00000001 01108d29 6476e3f0 315d214f 
f95c9297 05f64ec7 
09:06:10 ipsec,debug,packet 00000e4c 
09:06:10 ipsec,debug,packet hmac(hmac_sha1) 
09:06:10 ipsec,debug,packet HASH computed: 
09:06:10 ipsec,debug,packet 16cf4a0a 25656c3b 67587103 1181799c b1000a20 
09:06:10 ipsec,debug hash validated. 
09:06:10 ipsec,debug begin. 
09:06:10 ipsec,debug seen nptype=8(hash) len=24 
09:06:10 ipsec,debug seen nptype=11(notify) len=32 
09:06:10 ipsec,debug succeed. 
09:06:10 ipsec,debug 34.198.222.127 notify: R_U_THERE_ACK 
09:06:10 ipsec,debug 34.198.222.127 DPD R-U-There-Ack received 
09:06:10 ipsec,debug received an R-U-THERE-ACK 
 
Sob
Forum Guru
Forum Guru
Posts: 9188
Joined: Mon Apr 20, 2009 9:11 pm

Re: Site-To-Site VPN AWS problem

Fri Jan 07, 2022 2:35 pm

I don't know, but maybe it's something with my-id in identity?
09:05:57 ipsec,debug 34.198.222.127 notify: INVALID-ID-INFORMATION 
09:05:57 ipsec 34.198.222.127 fatal INVALID-ID-INFORMATION notify messsage, phase1 should be deleted. 
09:05:57 ipsec,debug 34.198.222.127 notification message 18:INVALID-ID-INFORMATION, doi=1 proto_id=3 spi=00000000\05(size=4).
 
mankomal
Member Candidate
Member Candidate
Topic Author
Posts: 106
Joined: Fri Nov 24, 2006 8:56 am

Re: Site-To-Site VPN AWS problem

Fri Jan 07, 2022 3:30 pm

I don't know, but maybe it's something with my-id in identity?
09:05:57 ipsec,debug 34.198.222.127 notify: INVALID-ID-INFORMATION 
09:05:57 ipsec 34.198.222.127 fatal INVALID-ID-INFORMATION notify messsage, phase1 should be deleted. 
09:05:57 ipsec,debug 34.198.222.127 notification message 18:INVALID-ID-INFORMATION, doi=1 proto_id=3 spi=00000000\05(size=4).
I thought so too, so I tried with auto, then with address and tried with both the WAN and AWS provided private address ... but none worked
 
Sob
Forum Guru
Forum Guru
Posts: 9188
Joined: Mon Apr 20, 2009 9:11 pm

Re: Site-To-Site VPN AWS problem

Fri Jan 07, 2022 3:37 pm

One more thing, you have nat-traversal=no, but log says:
09:05:56 ipsec NAT detected -> UDP encapsulation (ENC_MODE 1->3).
 
mankomal
Member Candidate
Member Candidate
Topic Author
Posts: 106
Joined: Fri Nov 24, 2006 8:56 am

Re: Site-To-Site VPN AWS problem

Fri Jan 07, 2022 3:56 pm

One more thing, you have nat-traversal=no, but log says:
09:05:56 ipsec NAT detected -> UDP encapsulation (ENC_MODE 1->3).
nat-traversal is no
 
Sob
Forum Guru
Forum Guru
Posts: 9188
Joined: Mon Apr 20, 2009 9:11 pm

Re: Site-To-Site VPN AWS problem

Fri Jan 07, 2022 4:02 pm

Right, but it seems that IPSec thinks there is some NAT in the way.
 
mankomal
Member Candidate
Member Candidate
Topic Author
Posts: 106
Joined: Fri Nov 24, 2006 8:56 am

Re: Site-To-Site VPN AWS problem

Fri Jan 07, 2022 6:08 pm

Right, but it seems that IPSec thinks there is some NAT in the way.
rebooted the router
 
Sob
Forum Guru
Forum Guru
Posts: 9188
Joined: Mon Apr 20, 2009 9:11 pm

Re: Site-To-Site VPN AWS problem

Fri Jan 07, 2022 6:50 pm

I'd try to disable peer, set it to passive=yes (just for testing), then I'd enable it again and let the other side connect. Then I'd examine the conversation from beginning. Your log looks like routers are already chatting for a while. Someone who's better with IPSec than me could maybe see something in there, but I don't.
 
User avatar
sindy
Forum Guru
Forum Guru
Posts: 11126
Joined: Mon Dec 04, 2017 9:19 pm

Re: Site-To-Site VPN AWS problem

Fri Jan 07, 2022 9:01 pm

Someone who's better with IPSec than me could maybe see something in there, but I don't.
If this is a hint, I can only say that I would also ask for the log from the startup phase.

Regarding the NAT - I can see there is a local-address set on the peer, so if the IPsec traffic is actually sent out via an interface with another address and src-nat/masquerade is set, it explains why the peers think there is NAT - because it really is, despite the fact that the local-address is a public one.
 
Sob
Forum Guru
Forum Guru
Posts: 9188
Joined: Mon Apr 20, 2009 9:11 pm

Re: Site-To-Site VPN AWS problem

Fri Jan 07, 2022 9:36 pm

Telepathy works! :D
 
mankomal
Member Candidate
Member Candidate
Topic Author
Posts: 106
Joined: Fri Nov 24, 2006 8:56 am

Re: Site-To-Site VPN AWS problem

Sat Jan 08, 2022 8:36 am

Log from starting:
Jan/08/2022 06:07:04 ipsec,debug ===
Jan/08/2022 06:07:04 ipsec,info initiate new phase 1 (Identity Protection): 164.52.192.253[500]<=>34.198.222.127[500]
Jan/08/2022 06:07:04 ipsec,debug new cookie:
Jan/08/2022 06:07:04 ipsec,debug 0a4f2796630f5f1d
Jan/08/2022 06:07:04 ipsec,debug add payload of len 52, next type 13
Jan/08/2022 06:07:04 ipsec,debug add payload of len 16, next type 13
Jan/08/2022 06:07:04 ipsec,debug add payload of len 16, next type 0
Jan/08/2022 06:07:04 ipsec,debug 124 bytes from 164.52.192.253[500] to 34.198.222.127[500]
Jan/08/2022 06:07:04 ipsec,debug 1 times of 124 bytes message will be sent to 34.198.222.127[500]
Jan/08/2022 06:07:04 ipsec,debug,packet 0a4f2796 630f5f1d 00000000 00000000 01100200 00000000 0000007c 0d000038
Jan/08/2022 06:07:04 ipsec,debug,packet 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c7080
Jan/08/2022 06:07:04 ipsec,debug,packet 80010007 800e0080 80030001 80020002 80040002 0d000014 12f5f28c 457168a9
Jan/08/2022 06:07:04 ipsec,debug,packet 702d9fe2 74cc0100 00000014 afcad713 68a1f1c9 6b8696fc 77570100
Jan/08/2022 06:07:04 ipsec sent phase1 packet 164.52.192.253[500]<=>34.198.222.127[500] 0a4f2796630f5f1d:0000000000000000
Jan/08/2022 06:07:05 ipsec,debug ===== received 104 bytes from 34.198.222.127[500] to 164.52.192.253[500]
Jan/08/2022 06:07:05 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 01100200 00000000 00000068 0d000038
Jan/08/2022 06:07:05 ipsec,debug,packet 00000001 00000001 0000002c 01010001 00000024 01010000 80010007 800e0080
Jan/08/2022 06:07:05 ipsec,debug,packet 80020002 80040002 80030001 800b0001 800c7080 00000014 afcad713 68a1f1c9
Jan/08/2022 06:07:05 ipsec,debug,packet 6b8696fc 77570100
Jan/08/2022 06:07:05 ipsec,debug begin.
Jan/08/2022 06:07:05 ipsec,debug seen nptype=1(sa) len=56
Jan/08/2022 06:07:05 ipsec,debug seen nptype=13(vid) len=20
Jan/08/2022 06:07:05 ipsec,debug succeed.
Jan/08/2022 06:07:05 ipsec received Vendor ID: DPD
Jan/08/2022 06:07:05 ipsec,debug remote supports DPD
Jan/08/2022 06:07:05 ipsec,debug total SA len=52
Jan/08/2022 06:07:05 ipsec,debug 00000001 00000001 0000002c 01010001 00000024 01010000 80010007 800e0080
Jan/08/2022 06:07:05 ipsec,debug 80020002 80040002 80030001 800b0001 800c7080
Jan/08/2022 06:07:05 ipsec,debug begin.
Jan/08/2022 06:07:05 ipsec,debug seen nptype=2(prop) len=44
Jan/08/2022 06:07:05 ipsec,debug succeed.
Jan/08/2022 06:07:05 ipsec,debug proposal #1 len=44
Jan/08/2022 06:07:05 ipsec,debug begin.
Jan/08/2022 06:07:05 ipsec,debug seen nptype=3(trns) len=36
Jan/08/2022 06:07:05 ipsec,debug succeed.
Jan/08/2022 06:07:05 ipsec,debug transform #1 len=36
Jan/08/2022 06:07:05 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
Jan/08/2022 06:07:05 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:05 ipsec,debug type=Key Length, flag=0x8000, lorv=128
Jan/08/2022 06:07:05 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
Jan/08/2022 06:07:05 ipsec,debug hash(sha1)
Jan/08/2022 06:07:05 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
Jan/08/2022 06:07:05 ipsec,debug dh(modp1024)
Jan/08/2022 06:07:05 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
Jan/08/2022 06:07:05 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
Jan/08/2022 06:07:05 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800
Jan/08/2022 06:07:05 ipsec,debug pair 1:
Jan/08/2022 06:07:05 ipsec,debug  0x80d0198: next=(nil) tnext=(nil)
Jan/08/2022 06:07:05 ipsec,debug proposal #1: 1 transform
Jan/08/2022 06:07:05 ipsec,debug -checking with pre-shared key auth-
Jan/08/2022 06:07:05 ipsec,debug prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1
Jan/08/2022 06:07:05 ipsec,debug trns#=1, trns-id=IKE
Jan/08/2022 06:07:05 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
Jan/08/2022 06:07:05 ipsec,debug type=Key Length, flag=0x8000, lorv=128
Jan/08/2022 06:07:05 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
Jan/08/2022 06:07:05 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
Jan/08/2022 06:07:05 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
Jan/08/2022 06:07:05 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
Jan/08/2022 06:07:05 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800
Jan/08/2022 06:07:05 ipsec,debug -compare proposal #1: Local:Peer
Jan/08/2022 06:07:05 ipsec,debug (lifetime = 28800:28800)
Jan/08/2022 06:07:05 ipsec,debug (lifebyte = 0:0)
Jan/08/2022 06:07:05 ipsec,debug enctype = AES-CBC:AES-CBC
Jan/08/2022 06:07:05 ipsec,debug (encklen = 128:128)
Jan/08/2022 06:07:05 ipsec,debug hashtype = SHA:SHA
Jan/08/2022 06:07:05 ipsec,debug authmethod = pre-shared key:pre-shared key
Jan/08/2022 06:07:05 ipsec,debug dh_group = 1024-bit MODP group:1024-bit MODP group
Jan/08/2022 06:07:05 ipsec,debug -an acceptable proposal found-
Jan/08/2022 06:07:05 ipsec,debug dh(modp1024)
Jan/08/2022 06:07:05 ipsec,debug -agreed on pre-shared key auth-
Jan/08/2022 06:07:05 ipsec,debug ===
Jan/08/2022 06:07:05 ipsec,debug dh(modp1024)
Jan/08/2022 06:07:05 ipsec,debug,packet compute DH's private.
Jan/08/2022 06:07:05 ipsec,debug,packet 5a654bc7 08ca0ea0 baf3f78b b4717afd 18eef5b4 d19405e7 ee4b05aa de93caba
Jan/08/2022 06:07:05 ipsec,debug,packet 15954131 f5beead8 b0995e17 68929370 d74af54a c6d6923a fa787781 c23e78ba
Jan/08/2022 06:07:05 ipsec,debug,packet 4f48cabf d4f69538 c91cd482 d7ce4822 660cc942 22a76319 f80db74e a4dd5a43
Jan/08/2022 06:07:05 ipsec,debug,packet 97ce6d2a 4335b536 43e8f0b5 dc435072 d4af41c8 ab63e317 07ab6ca9 b4ac3814
Jan/08/2022 06:07:05 ipsec,debug,packet compute DH's public.
Jan/08/2022 06:07:05 ipsec,debug,packet 074259ca 342a0a3e 9d7037a4 a6e00687 8b579764 89597927 d6b9f532 008e5c58
Jan/08/2022 06:07:05 ipsec,debug,packet a5c9cb42 a16d25c8 9e3a6323 c30cb550 d21c6a7c 00a1d59f 5c631203 0c433005
Jan/08/2022 06:07:05 ipsec,debug,packet 343fe62b 1625af99 4a81fb43 d048f4ab 449d5d29 22f24a33 182ba657 545043b3
Jan/08/2022 06:07:05 ipsec,debug,packet 14a0f4a8 243e1b22 a835d2e5 6ab417bf 8a6f8eb1 a63f89c1 f22b3173 3fed0e26
Jan/08/2022 06:07:05 ipsec,debug add payload of len 128, next type 10
Jan/08/2022 06:07:05 ipsec,debug add payload of len 24, next type 0
Jan/08/2022 06:07:05 ipsec,debug 188 bytes from 164.52.192.253[500] to 34.198.222.127[500]
Jan/08/2022 06:07:05 ipsec,debug 1 times of 188 bytes message will be sent to 34.198.222.127[500]
Jan/08/2022 06:07:05 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 04100200 00000000 000000bc 0a000084
Jan/08/2022 06:07:05 ipsec,debug,packet 074259ca 342a0a3e 9d7037a4 a6e00687 8b579764 89597927 d6b9f532 008e5c58
Jan/08/2022 06:07:05 ipsec,debug,packet a5c9cb42 a16d25c8 9e3a6323 c30cb550 d21c6a7c 00a1d59f 5c631203 0c433005
Jan/08/2022 06:07:05 ipsec,debug,packet 343fe62b 1625af99 4a81fb43 d048f4ab 449d5d29 22f24a33 182ba657 545043b3
Jan/08/2022 06:07:05 ipsec,debug,packet 14a0f4a8 243e1b22 a835d2e5 6ab417bf 8a6f8eb1 a63f89c1 f22b3173 3fed0e26
Jan/08/2022 06:07:05 ipsec,debug,packet 0000001c f074e23c 7b5cb666 bd429af3 f453abe6 12fd196a fab469d6
Jan/08/2022 06:07:05 ipsec sent phase1 packet 164.52.192.253[500]<=>34.198.222.127[500] 0a4f2796630f5f1d:e68afe8cdac5f1e2
Jan/08/2022 06:07:05 ipsec,debug ===== received 196 bytes from 34.198.222.127[500] to 164.52.192.253[500]
Jan/08/2022 06:07:05 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 04100200 00000000 000000c4 0a000084
Jan/08/2022 06:07:05 ipsec,debug,packet abb56723 2d345f76 a84e05d8 e1cc54fa ea8aef14 e9377540 74432e34 fc0b8aa2
Jan/08/2022 06:07:05 ipsec,debug,packet f80b8e69 dff55f19 f0b7e8d0 7800070d 5b5e233d 81445ad4 1544d695 d88e9ea9
Jan/08/2022 06:07:05 ipsec,debug,packet 1ce3f075 421e427b f3a7116c 1fc752dc 9b0f7262 34f9648f 88b65d59 1e1575d7
Jan/08/2022 06:07:05 ipsec,debug,packet b44889e6 ef2e60a5 0ee07532 cb45c131 d1582160 c65af3e2 ccfb4311 222d3146
Jan/08/2022 06:07:05 ipsec,debug,packet 00000024 0e3ced66 56f87c0f 119e2453 941a9f39 918bc0a7 e242e513 03dec1c2
Jan/08/2022 06:07:05 ipsec,debug,packet 614d6d4c
Jan/08/2022 06:07:05 ipsec,debug begin.
Jan/08/2022 06:07:05 ipsec,debug seen nptype=4(ke) len=132
Jan/08/2022 06:07:05 ipsec,debug seen nptype=10(nonce) len=36
Jan/08/2022 06:07:05 ipsec,debug succeed.
Jan/08/2022 06:07:05 ipsec,debug ===
Jan/08/2022 06:07:05 ipsec,debug dh(modp1024)
Jan/08/2022 06:07:05 ipsec,debug,packet compute DH's shared.
Jan/08/2022 06:07:05 ipsec,debug,packet 
Jan/08/2022 06:07:05 ipsec,debug,packet a2829aad af59f4d1 e3d38cbc de97a7c2 aba67a9b bfa25ad5 f9c1a4aa f415769f
Jan/08/2022 06:07:05 ipsec,debug,packet d4defb34 c3459301 5cb58125 e53d7758 0048141a b5300868 d14cf00f 3f667f15
Jan/08/2022 06:07:05 ipsec,debug,packet 270fa620 91c816f9 744e0280 f9fe1cf2 58604626 5be0c18e 6fc1e4c9 b67f9877
Jan/08/2022 06:07:05 ipsec,debug,packet 4f77928d eda2f444 d3b2e732 222b3103 c1bd763d f4933b10 d7c3ce9c 760e012c
Jan/08/2022 06:07:05 ipsec,debug nonce 1: 
Jan/08/2022 06:07:05 ipsec,debug f074e23c 7b5cb666 bd429af3 f453abe6 12fd196a fab469d6
Jan/08/2022 06:07:05 ipsec,debug nonce 2: 
Jan/08/2022 06:07:05 ipsec,debug 0e3ced66 56f87c0f 119e2453 941a9f39 918bc0a7 e242e513 03dec1c2 614d6d4c
Jan/08/2022 06:07:05 ipsec,debug,packet hmac(hmac_sha1)
Jan/08/2022 06:07:05 ipsec,debug SKEYID computed:
Jan/08/2022 06:07:05 ipsec,debug 187734d8 b84768d9 98f1368c 2621bacb e8f4f2f6
Jan/08/2022 06:07:05 ipsec,debug,packet hmac(hmac_sha1)
Jan/08/2022 06:07:05 ipsec,debug SKEYID_d computed:
Jan/08/2022 06:07:05 ipsec,debug 7c7a0de3 65d3346b defa61c8 47f5655d b1c235c6
Jan/08/2022 06:07:05 ipsec,debug,packet hmac(hmac_sha1)
Jan/08/2022 06:07:05 ipsec,debug SKEYID_a computed:
Jan/08/2022 06:07:05 ipsec,debug 7cdfeaf9 22e66177 27679179 998f4ddd 387be4da
Jan/08/2022 06:07:05 ipsec,debug,packet hmac(hmac_sha1)
Jan/08/2022 06:07:05 ipsec,debug SKEYID_e computed:
Jan/08/2022 06:07:05 ipsec,debug adb77da3 1daf700b b0320069 ba4a1b22 c706d730
Jan/08/2022 06:07:05 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:05 ipsec,debug hash(sha1)
Jan/08/2022 06:07:05 ipsec,debug final encryption key computed:
Jan/08/2022 06:07:05 ipsec,debug adb77da3 1daf700b b0320069 ba4a1b22
Jan/08/2022 06:07:05 ipsec,debug hash(sha1)
Jan/08/2022 06:07:05 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:05 ipsec,debug IV computed:
Jan/08/2022 06:07:05 ipsec,debug 00abaec8 7b1ac7b3 d4db6f73 a59ca028
Jan/08/2022 06:07:05 ipsec,debug use ID type of IPv4_address
Jan/08/2022 06:07:05 ipsec,debug,packet HASH with:
Jan/08/2022 06:07:05 ipsec,debug,packet 074259ca 342a0a3e 9d7037a4 a6e00687 8b579764 89597927 d6b9f532 008e5c58
Jan/08/2022 06:07:05 ipsec,debug,packet a5c9cb42 a16d25c8 9e3a6323 c30cb550 d21c6a7c 00a1d59f 5c631203 0c433005
Jan/08/2022 06:07:05 ipsec,debug,packet 343fe62b 1625af99 4a81fb43 d048f4ab 449d5d29 22f24a33 182ba657 545043b3
Jan/08/2022 06:07:05 ipsec,debug,packet 14a0f4a8 243e1b22 a835d2e5 6ab417bf 8a6f8eb1 a63f89c1 f22b3173 3fed0e26
Jan/08/2022 06:07:05 ipsec,debug,packet abb56723 2d345f76 a84e05d8 e1cc54fa ea8aef14 e9377540 74432e34 fc0b8aa2
Jan/08/2022 06:07:05 ipsec,debug,packet f80b8e69 dff55f19 f0b7e8d0 7800070d 5b5e233d 81445ad4 1544d695 d88e9ea9
Jan/08/2022 06:07:05 ipsec,debug,packet 1ce3f075 421e427b f3a7116c 1fc752dc 9b0f7262 34f9648f 88b65d59 1e1575d7
Jan/08/2022 06:07:05 ipsec,debug,packet b44889e6 ef2e60a5 0ee07532 cb45c131 d1582160 c65af3e2 ccfb4311 222d3146
Jan/08/2022 06:07:05 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 00000001 00000001 0000002c 01010001
Jan/08/2022 06:07:05 ipsec,debug,packet 00000024 01010000 800b0001 800c7080 80010007 800e0080 80030001 80020002
Jan/08/2022 06:07:05 ipsec,debug,packet 80040002 011101f4 a434c0fd
Jan/08/2022 06:07:05 ipsec,debug,packet hmac(hmac_sha1)
Jan/08/2022 06:07:05 ipsec,debug,packet HASH computed:
Jan/08/2022 06:07:05 ipsec,debug,packet dc17b0dd a54ff03f ec009980 08f6ecf9 90afe924
Jan/08/2022 06:07:05 ipsec,debug add payload of len 8, next type 8
Jan/08/2022 06:07:05 ipsec,debug add payload of len 20, next type 0
Jan/08/2022 06:07:05 ipsec,debug,packet begin encryption.
Jan/08/2022 06:07:05 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:05 ipsec,debug,packet pad length = 12
Jan/08/2022 06:07:05 ipsec,debug,packet 0800000c 011101f4 a434c0fd 00000018 dc17b0dd a54ff03f ec009980 08f6ecf9
Jan/08/2022 06:07:05 ipsec,debug,packet 90afe924 daa7f7ad e886ecac e2b8a30b
Jan/08/2022 06:07:05 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:05 ipsec,debug,packet with key:
Jan/08/2022 06:07:05 ipsec,debug,packet adb77da3 1daf700b b0320069 ba4a1b22
Jan/08/2022 06:07:05 ipsec,debug,packet encrypted payload by IV:
Jan/08/2022 06:07:05 ipsec,debug,packet 00abaec8 7b1ac7b3 d4db6f73 a59ca028
Jan/08/2022 06:07:05 ipsec,debug,packet save IV for next:
Jan/08/2022 06:07:05 ipsec,debug,packet e861136b 5a22cc40 2244ed0c 9e7ef8f1
Jan/08/2022 06:07:05 ipsec,debug,packet encrypted.
Jan/08/2022 06:07:05 ipsec,debug 76 bytes from 164.52.192.253[500] to 34.198.222.127[500]
Jan/08/2022 06:07:05 ipsec,debug 1 times of 76 bytes message will be sent to 34.198.222.127[500]
Jan/08/2022 06:07:05 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 05100201 00000000 0000004c 2a6f43ed
Jan/08/2022 06:07:05 ipsec,debug,packet aeb078e5 9dc02ea9 f30eb784 d0de3c6c 4953511d 53e90255 98a4965d e861136b
Jan/08/2022 06:07:05 ipsec,debug,packet 5a22cc40 2244ed0c 9e7ef8f1
Jan/08/2022 06:07:05 ipsec sent phase1 packet 164.52.192.253[500]<=>34.198.222.127[500] 0a4f2796630f5f1d:e68afe8cdac5f1e2
Jan/08/2022 06:07:05 ipsec,debug ===== received 76 bytes from 34.198.222.127[500] to 164.52.192.253[500]
Jan/08/2022 06:07:05 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 05100201 00000000 0000004c 1c3741f9
Jan/08/2022 06:07:05 ipsec,debug,packet 4d0a6074 93d41011 c3529423 ccb73771 24764d0d ab13c376 c7077e45 0489b789
Jan/08/2022 06:07:05 ipsec,debug,packet b05c2a7b af9a0be2 16ea3782
Jan/08/2022 06:07:05 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:05 ipsec,debug,packet IV was saved for next processing:
Jan/08/2022 06:07:05 ipsec,debug,packet 0489b789 b05c2a7b af9a0be2 16ea3782
Jan/08/2022 06:07:05 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:05 ipsec,debug,packet with key:
Jan/08/2022 06:07:05 ipsec,debug,packet adb77da3 1daf700b b0320069 ba4a1b22
Jan/08/2022 06:07:05 ipsec,debug,packet decrypted payload by IV:
Jan/08/2022 06:07:05 ipsec,debug,packet e861136b 5a22cc40 2244ed0c 9e7ef8f1
Jan/08/2022 06:07:05 ipsec,debug,packet decrypted payload, but not trimed.
Jan/08/2022 06:07:05 ipsec,debug,packet 0800000c 01000000 22c6de7f 00000018 735fb903 e9c40f71 bc904ad4 a385e007
Jan/08/2022 06:07:05 ipsec,debug,packet ebf57833 00000000 00000000 00000000
Jan/08/2022 06:07:05 ipsec,debug,packet padding len=1
Jan/08/2022 06:07:05 ipsec,debug,packet skip to trim padding.
Jan/08/2022 06:07:05 ipsec,debug,packet decrypted.
Jan/08/2022 06:07:05 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 05100201 00000000 0000004c 0800000c
Jan/08/2022 06:07:05 ipsec,debug,packet 01000000 22c6de7f 00000018 735fb903 e9c40f71 bc904ad4 a385e007 ebf57833
Jan/08/2022 06:07:05 ipsec,debug,packet 00000000 00000000 00000000
Jan/08/2022 06:07:05 ipsec,debug begin.
Jan/08/2022 06:07:05 ipsec,debug seen nptype=5(id) len=12
Jan/08/2022 06:07:05 ipsec,debug seen nptype=8(hash) len=24
Jan/08/2022 06:07:05 ipsec,debug succeed.
Jan/08/2022 06:07:05 ipsec,debug HASH received:
Jan/08/2022 06:07:05 ipsec,debug 735fb903 e9c40f71 bc904ad4 a385e007 ebf57833
Jan/08/2022 06:07:05 ipsec,debug,packet HASH with:
Jan/08/2022 06:07:05 ipsec,debug,packet abb56723 2d345f76 a84e05d8 e1cc54fa ea8aef14 e9377540 74432e34 fc0b8aa2
Jan/08/2022 06:07:05 ipsec,debug,packet f80b8e69 dff55f19 f0b7e8d0 7800070d 5b5e233d 81445ad4 1544d695 d88e9ea9
Jan/08/2022 06:07:05 ipsec,debug,packet 1ce3f075 421e427b f3a7116c 1fc752dc 9b0f7262 34f9648f 88b65d59 1e1575d7
Jan/08/2022 06:07:05 ipsec,debug,packet b44889e6 ef2e60a5 0ee07532 cb45c131 d1582160 c65af3e2 ccfb4311 222d3146
Jan/08/2022 06:07:05 ipsec,debug,packet 074259ca 342a0a3e 9d7037a4 a6e00687 8b579764 89597927 d6b9f532 008e5c58
Jan/08/2022 06:07:05 ipsec,debug,packet a5c9cb42 a16d25c8 9e3a6323 c30cb550 d21c6a7c 00a1d59f 5c631203 0c433005
Jan/08/2022 06:07:05 ipsec,debug,packet 343fe62b 1625af99 4a81fb43 d048f4ab 449d5d29 22f24a33 182ba657 545043b3
Jan/08/2022 06:07:05 ipsec,debug,packet 14a0f4a8 243e1b22 a835d2e5 6ab417bf 8a6f8eb1 a63f89c1 f22b3173 3fed0e26
Jan/08/2022 06:07:05 ipsec,debug,packet e68afe8c dac5f1e2 0a4f2796 630f5f1d 00000001 00000001 0000002c 01010001
Jan/08/2022 06:07:05 ipsec,debug,packet 00000024 01010000 800b0001 800c7080 80010007 800e0080 80030001 80020002
Jan/08/2022 06:07:05 ipsec,debug,packet 80040002 01000000 22c6de7f
Jan/08/2022 06:07:05 ipsec,debug,packet hmac(hmac_sha1)
Jan/08/2022 06:07:05 ipsec,debug,packet HASH computed:
Jan/08/2022 06:07:05 ipsec,debug,packet 735fb903 e9c40f71 bc904ad4 a385e007 ebf57833
Jan/08/2022 06:07:05 ipsec,debug HASH for PSK validated.
Jan/08/2022 06:07:05 ipsec,debug 34.198.222.127 peer's ID:
Jan/08/2022 06:07:05 ipsec,debug 01000000 22c6de7f
Jan/08/2022 06:07:05 ipsec,debug ===
Jan/08/2022 06:07:05 ipsec ph2 possible after ph1 creation
Jan/08/2022 06:07:05 ipsec,debug  (proto_id=AH spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=0:0)
Jan/08/2022 06:07:05 ipsec,debug   (trns_id=SHA authtype=hmac-sha1)
Jan/08/2022 06:07:05 ipsec,debug begin QUICK mode.
Jan/08/2022 06:07:05 ipsec,debug ===
Jan/08/2022 06:07:05 ipsec,debug begin QUICK mode.
Jan/08/2022 06:07:05 ipsec initiate new phase 2 negotiation: 164.52.192.253[500]<=>34.198.222.127[500]
Jan/08/2022 06:07:05 ipsec,debug,packet compute IV for phase2
Jan/08/2022 06:07:05 ipsec,debug,packet phase1 last IV:
Jan/08/2022 06:07:05 ipsec,debug,packet 0489b789 b05c2a7b af9a0be2 16ea3782 afad3f71
Jan/08/2022 06:07:05 ipsec,debug hash(sha1)
Jan/08/2022 06:07:05 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:05 ipsec,debug,packet phase2 IV computed:
Jan/08/2022 06:07:05 ipsec,debug,packet e44e57b6 3bce5db0 d8ccb959 3aabfcfb
Jan/08/2022 06:07:05 ipsec,debug call pfkey_send_getspi a6
Jan/08/2022 06:07:05 ipsec,debug pfkey GETSPI sent: AH/Tunnel 34.198.222.127[500]->164.52.192.253[500] 
Jan/08/2022 06:07:05 ipsec,debug pfkey getspi sent.
Jan/08/2022 06:07:05 ipsec,info ISAKMP-SA established 164.52.192.253[500]-34.198.222.127[500] spi:0a4f2796630f5f1d:e68afe8cdac5f1e2
Jan/08/2022 06:07:05 ipsec,debug ===
Jan/08/2022 06:07:05 ipsec,debug dh(modp1024)
Jan/08/2022 06:07:05 ipsec,debug dh(modp1024)
Jan/08/2022 06:07:05 ipsec,debug dh(modp1024)
Jan/08/2022 06:07:05 ipsec,debug,packet compute DH's private.
Jan/08/2022 06:07:05 ipsec,debug,packet 4a316ee6 da4b57ac 59884b1b 7ad813be a8285fe0 1117f3a6 53331d0d 67c0f029
Jan/08/2022 06:07:05 ipsec,debug,packet c50a40b7 e4e1ef97 ac9ecf50 cb911e9e ad839380 b8f07325 11d197df a8b1b965
Jan/08/2022 06:07:05 ipsec,debug,packet f51daa8a 8db047f2 be812a38 7d322c1f 492a6c54 0090266e b26aba7a 662c6d8e
Jan/08/2022 06:07:05 ipsec,debug,packet 06a737bf c07a1f1a be64e379 54e13e57 546ae427 d8e35826 8fc8a8af 5730369a
Jan/08/2022 06:07:05 ipsec,debug,packet compute DH's public.
Jan/08/2022 06:07:05 ipsec,debug,packet 163762a3 11a3391c 36522039 a5effe99 29bc5e69 2686db9a c03af8b6 282acadf
Jan/08/2022 06:07:05 ipsec,debug,packet a49a7946 fa028149 a25c02b7 ebcb6f9c 964d9372 db960e89 3f79e3fb 33f9ea3e
Jan/08/2022 06:07:05 ipsec,debug,packet 2223572c dfa477a0 b520e9e8 fd6de0ea cc918667 8e0788ba 1dbb59f9 5718fd10
Jan/08/2022 06:07:05 ipsec,debug,packet 417f621f 9e3f2925 5b9600df 3264431f 294dbdb1 0e586170 3627c121 af296b17
Jan/08/2022 06:07:05 ipsec,debug use local ID type IPv4_subnet
Jan/08/2022 06:07:05 ipsec,debug use remote ID type IPv4_subnet
Jan/08/2022 06:07:05 ipsec,debug IDci:
Jan/08/2022 06:07:05 ipsec,debug 04000000 00000000 00000000
Jan/08/2022 06:07:05 ipsec,debug IDcr:
Jan/08/2022 06:07:05 ipsec,debug 04000000 ac1f0000 ffff0000
Jan/08/2022 06:07:05 ipsec,debug add payload of len 48, next type 10
Jan/08/2022 06:07:05 ipsec,debug add payload of len 24, next type 4
Jan/08/2022 06:07:05 ipsec,debug add payload of len 128, next type 5
Jan/08/2022 06:07:05 ipsec,debug add payload of len 12, next type 5
Jan/08/2022 06:07:05 ipsec,debug add payload of len 12, next type 0
Jan/08/2022 06:07:05 ipsec,debug,packet HASH with:
Jan/08/2022 06:07:05 ipsec,debug,packet afad3f71 0a000034 00000001 00000001 00000028 01020401 02544156 0000001c
Jan/08/2022 06:07:05 ipsec,debug,packet 01030000 80010001 80020e10 80040001 80050002 80030002 0400001c a5298f80
Jan/08/2022 06:07:05 ipsec,debug,packet 77f3b6f5 cd73e9b1 930e405a a9dbf849 0f9dd7a5 05000084 163762a3 11a3391c
Jan/08/2022 06:07:05 ipsec,debug,packet 36522039 a5effe99 29bc5e69 2686db9a c03af8b6 282acadf a49a7946 fa028149
Jan/08/2022 06:07:05 ipsec,debug,packet a25c02b7 ebcb6f9c 964d9372 db960e89 3f79e3fb 33f9ea3e 2223572c dfa477a0
Jan/08/2022 06:07:05 ipsec,debug,packet b520e9e8 fd6de0ea cc918667 8e0788ba 1dbb59f9 5718fd10 417f621f 9e3f2925
Jan/08/2022 06:07:05 ipsec,debug,packet 5b9600df 3264431f 294dbdb1 0e586170 3627c121 af296b17 05000010 04000000
Jan/08/2022 06:07:05 ipsec,debug,packet 00000000 00000000 00000010 04000000 ac1f0000 ffff0000
Jan/08/2022 06:07:05 ipsec,debug,packet hmac(hmac_sha1)
Jan/08/2022 06:07:05 ipsec,debug,packet HASH computed:
Jan/08/2022 06:07:05 ipsec,debug,packet c3e35196 a135dce1 92cbc344 9ce3eca5 c82b4cd2
Jan/08/2022 06:07:05 ipsec,debug add payload of len 20, next type 1
Jan/08/2022 06:07:05 ipsec,debug,packet begin encryption.
Jan/08/2022 06:07:05 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:05 ipsec,debug,packet pad length = 4
Jan/08/2022 06:07:05 ipsec,debug,packet 01000018 c3e35196 a135dce1 92cbc344 9ce3eca5 c82b4cd2 0a000034 00000001
Jan/08/2022 06:07:05 ipsec,debug,packet 00000001 00000028 01020401 02544156 0000001c 01030000 80010001 80020e10
Jan/08/2022 06:07:05 ipsec,debug,packet 80040001 80050002 80030002 0400001c a5298f80 77f3b6f5 cd73e9b1 930e405a
Jan/08/2022 06:07:05 ipsec,debug,packet a9dbf849 0f9dd7a5 05000084 163762a3 11a3391c 36522039 a5effe99 29bc5e69
Jan/08/2022 06:07:05 ipsec,debug,packet 2686db9a c03af8b6 282acadf a49a7946 fa028149 a25c02b7 ebcb6f9c 964d9372
Jan/08/2022 06:07:05 ipsec,debug,packet db960e89 3f79e3fb 33f9ea3e 2223572c dfa477a0 b520e9e8 fd6de0ea cc918667
Jan/08/2022 06:07:05 ipsec,debug,packet 8e0788ba 1dbb59f9 5718fd10 417f621f 9e3f2925 5b9600df 3264431f 294dbdb1
Jan/08/2022 06:07:05 ipsec,debug,packet 0e586170 3627c121 af296b17 05000010 04000000 00000000 00000000 00000010
Jan/08/2022 06:07:05 ipsec,debug,packet 04000000 ac1f0000 ffff0000 c4898d03
Jan/08/2022 06:07:05 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:05 ipsec,debug,packet with key:
Jan/08/2022 06:07:05 ipsec,debug,packet adb77da3 1daf700b b0320069 ba4a1b22
Jan/08/2022 06:07:05 ipsec,debug,packet encrypted payload by IV:
Jan/08/2022 06:07:05 ipsec,debug,packet e44e57b6 3bce5db0 d8ccb959 3aabfcfb
Jan/08/2022 06:07:05 ipsec,debug,packet save IV for next:
Jan/08/2022 06:07:05 ipsec,debug,packet 461ab2cf 6d8be4f5 a6f1563b dfe11dd9
Jan/08/2022 06:07:05 ipsec,debug,packet encrypted.
Jan/08/2022 06:07:05 ipsec,debug 300 bytes from 164.52.192.253[500] to 34.198.222.127[500]
Jan/08/2022 06:07:05 ipsec,debug 1 times of 300 bytes message will be sent to 34.198.222.127[500]
Jan/08/2022 06:07:05 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 08102001 afad3f71 0000012c 0c5b91c4
Jan/08/2022 06:07:05 ipsec,debug,packet 105d27fe 1fd83e58 352ee86a 8bdcd214 35d25f32 ca3e1d33 4584be26 c4befb7d
Jan/08/2022 06:07:05 ipsec,debug,packet 23dfa5b2 8f0988c3 56b79da6 bae060f0 07e97f49 07585173 ba63cd86 544b27fb
Jan/08/2022 06:07:05 ipsec,debug,packet 291e9755 64f908ff b0a5dbb6 2f9f24d4 75316031 71cf1af9 d2143b12 f5224045
Jan/08/2022 06:07:05 ipsec,debug,packet 167a15d3 51a517a8 8a848c3b f63b3194 92b3ca05 55b5a196 bbf332f7 6b64a3ff
Jan/08/2022 06:07:05 ipsec,debug,packet ce916007 cfac9147 5352dfe2 a948718a 970e401c df48c510 c842c142 69f4e70d
Jan/08/2022 06:07:05 ipsec,debug,packet 81372cff 87c1e6e6 9cd6c120 13495520 59799b98 188f769e d6231dec 1c3b28a4
Jan/08/2022 06:07:05 ipsec,debug,packet 323e124a 2274f41c 35c9d6ef a5f21148 bb0ec68b b634ccba 994f341b e9e3cd3f
Jan/08/2022 06:07:05 ipsec,debug,packet bed4c304 3aa18ca6 e4166f55 1765e922 952b79ab c4ff6a7c b50ab3e4 461ab2cf
Jan/08/2022 06:07:05 ipsec,debug,packet 6d8be4f5 a6f1563b dfe11dd9
Jan/08/2022 06:07:05 ipsec sent phase2 packet 164.52.192.253[500]<=>34.198.222.127[500] 0a4f2796630f5f1d:e68afe8cdac5f1e2:0000afad
Jan/08/2022 06:07:05 ipsec,debug ===== received 76 bytes from 34.198.222.127[500] to 164.52.192.253[500]
Jan/08/2022 06:07:05 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 08100501 7ef4bba8 0000004c 450f8de4
Jan/08/2022 06:07:05 ipsec,debug,packet 248d958d 41eb9810 63cd4abd b6173736 3cb119de 1b8a558f 4ea001d8 cd033fb2
Jan/08/2022 06:07:05 ipsec,debug,packet 259502b5 efa46832 0d502a28
Jan/08/2022 06:07:05 ipsec,debug receive Information.
Jan/08/2022 06:07:05 ipsec,debug,packet compute IV for phase2
Jan/08/2022 06:07:05 ipsec,debug,packet phase1 last IV:
Jan/08/2022 06:07:05 ipsec,debug,packet 0489b789 b05c2a7b af9a0be2 16ea3782 7ef4bba8
Jan/08/2022 06:07:05 ipsec,debug hash(sha1)
Jan/08/2022 06:07:05 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:05 ipsec,debug,packet phase2 IV computed:
Jan/08/2022 06:07:05 ipsec,debug,packet d5e80517 9ece1f0d 94e9510d a2c18720
Jan/08/2022 06:07:05 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:05 ipsec,debug,packet IV was saved for next processing:
Jan/08/2022 06:07:05 ipsec,debug,packet cd033fb2 259502b5 efa46832 0d502a28
Jan/08/2022 06:07:05 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:05 ipsec,debug,packet with key:
Jan/08/2022 06:07:05 ipsec,debug,packet adb77da3 1daf700b b0320069 ba4a1b22
Jan/08/2022 06:07:05 ipsec,debug,packet decrypted payload by IV:
Jan/08/2022 06:07:05 ipsec,debug,packet d5e80517 9ece1f0d 94e9510d a2c18720
Jan/08/2022 06:07:05 ipsec,debug,packet decrypted payload, but not trimed.
Jan/08/2022 06:07:05 ipsec,debug,packet 0b000018 c6fa58f4 eb15c568 62311ad6 d31d2361 930cf152 00000010 00000001
Jan/08/2022 06:07:05 ipsec,debug,packet 03040012 00000000 00000000 00000000
Jan/08/2022 06:07:05 ipsec,debug,packet padding len=1
Jan/08/2022 06:07:05 ipsec,debug,packet skip to trim padding.
Jan/08/2022 06:07:05 ipsec,debug,packet decrypted.
Jan/08/2022 06:07:05 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 08100501 7ef4bba8 0000004c 0b000018
Jan/08/2022 06:07:05 ipsec,debug,packet c6fa58f4 eb15c568 62311ad6 d31d2361 930cf152 00000010 00000001 03040012
Jan/08/2022 06:07:05 ipsec,debug,packet 00000000 00000000 00000000
Jan/08/2022 06:07:05 ipsec,debug,packet HASH with:
Jan/08/2022 06:07:05 ipsec,debug,packet 7ef4bba8 00000010 00000001 03040012 00000000
Jan/08/2022 06:07:05 ipsec,debug,packet hmac(hmac_sha1)
Jan/08/2022 06:07:05 ipsec,debug,packet HASH computed:
Jan/08/2022 06:07:05 ipsec,debug,packet c6fa58f4 eb15c568 62311ad6 d31d2361 930cf152
Jan/08/2022 06:07:05 ipsec,debug hash validated.
Jan/08/2022 06:07:05 ipsec,debug begin.
Jan/08/2022 06:07:05 ipsec,debug seen nptype=8(hash) len=24
Jan/08/2022 06:07:05 ipsec,debug seen nptype=11(notify) len=16
Jan/08/2022 06:07:05 ipsec,debug succeed.
Jan/08/2022 06:07:05 ipsec,debug 34.198.222.127 notify: INVALID-ID-INFORMATION
Jan/08/2022 06:07:05 ipsec 34.198.222.127 fatal INVALID-ID-INFORMATION notify messsage, phase1 should be deleted.
Jan/08/2022 06:07:05 ipsec,debug 34.198.222.127 notification message 18:INVALID-ID-INFORMATION, doi=1 proto_id=3 spi=00000000ˆò(size=4).
Jan/08/2022 06:07:15 ipsec,debug 34.198.222.127 DPD monitoring....
Jan/08/2022 06:07:15 ipsec,debug,packet compute IV for phase2
Jan/08/2022 06:07:15 ipsec,debug,packet phase1 last IV:
Jan/08/2022 06:07:15 ipsec,debug,packet 0489b789 b05c2a7b af9a0be2 16ea3782 96dc41a4
Jan/08/2022 06:07:15 ipsec,debug hash(sha1)
Jan/08/2022 06:07:15 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:15 ipsec,debug,packet phase2 IV computed:
Jan/08/2022 06:07:15 ipsec,debug,packet 8032e630 b80686f2 2ddd810d 583ed821
Jan/08/2022 06:07:15 ipsec,debug,packet HASH with:
Jan/08/2022 06:07:15 ipsec,debug,packet 96dc41a4 00000020 00000001 01108d28 0a4f2796 630f5f1d e68afe8c dac5f1e2
Jan/08/2022 06:07:15 ipsec,debug,packet 00000ecd
Jan/08/2022 06:07:15 ipsec,debug,packet hmac(hmac_sha1)
Jan/08/2022 06:07:15 ipsec,debug,packet HASH computed:
Jan/08/2022 06:07:15 ipsec,debug,packet df54656e f9cec360 385a165c 6ddc8af9 386f8376
Jan/08/2022 06:07:15 ipsec,debug,packet begin encryption.
Jan/08/2022 06:07:15 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:15 ipsec,debug,packet pad length = 8
Jan/08/2022 06:07:15 ipsec,debug,packet 0b000018 df54656e f9cec360 385a165c 6ddc8af9 386f8376 00000020 00000001
Jan/08/2022 06:07:15 ipsec,debug,packet 01108d28 0a4f2796 630f5f1d e68afe8c dac5f1e2 00000ecd 86b7d4a2 83b9c507
Jan/08/2022 06:07:15 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:15 ipsec,debug,packet with key:
Jan/08/2022 06:07:15 ipsec,debug,packet adb77da3 1daf700b b0320069 ba4a1b22
Jan/08/2022 06:07:15 ipsec,debug,packet encrypted payload by IV:
Jan/08/2022 06:07:15 ipsec,debug,packet 8032e630 b80686f2 2ddd810d 583ed821
Jan/08/2022 06:07:15 ipsec,debug,packet save IV for next:
Jan/08/2022 06:07:15 ipsec,debug,packet e420bfad da751e77 f1b9d6fe b48cff08
Jan/08/2022 06:07:15 ipsec,debug,packet encrypted.
Jan/08/2022 06:07:15 ipsec,debug 92 bytes from 164.52.192.253[500] to 34.198.222.127[500]
Jan/08/2022 06:07:15 ipsec,debug 1 times of 92 bytes message will be sent to 34.198.222.127[500]
Jan/08/2022 06:07:15 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 08100501 96dc41a4 0000005c e9f5b694
Jan/08/2022 06:07:15 ipsec,debug,packet 2ac682d9 0374f41e 51a56ec4 cd70a557 f0547c8c d1d88e9c 1ff9a565 b6509dcd
Jan/08/2022 06:07:15 ipsec,debug,packet 3bc3ecbd 2b4476a9 5583dca0 e420bfad da751e77 f1b9d6fe b48cff08
Jan/08/2022 06:07:15 ipsec,debug sendto Information notify.
Jan/08/2022 06:07:15 ipsec,debug 34.198.222.127 DPD R-U-There sent (0)
Jan/08/2022 06:07:15 ipsec,debug 34.198.222.127 rescheduling send_r_u (5).
Jan/08/2022 06:07:15 ipsec,debug ===== received 92 bytes from 34.198.222.127[500] to 164.52.192.253[500]
Jan/08/2022 06:07:15 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 08100501 62ab00c0 0000005c ed734316
Jan/08/2022 06:07:15 ipsec,debug,packet eeafb064 e34eeab4 12cd84a7 6c93e594 e19a7573 c6a91916 16692777 c546c53d
Jan/08/2022 06:07:15 ipsec,debug,packet 3da7a0d8 0e166e49 4868eb1f f9854e58 edca9d20 d4ecede9 b0716289
Jan/08/2022 06:07:15 ipsec,debug receive Information.
Jan/08/2022 06:07:15 ipsec,debug,packet compute IV for phase2
Jan/08/2022 06:07:15 ipsec,debug,packet phase1 last IV:
Jan/08/2022 06:07:15 ipsec,debug,packet 0489b789 b05c2a7b af9a0be2 16ea3782 62ab00c0
Jan/08/2022 06:07:15 ipsec,debug hash(sha1)
Jan/08/2022 06:07:15 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:15 ipsec,debug,packet phase2 IV computed:
Jan/08/2022 06:07:15 ipsec,debug,packet f150d495 115ea9f0 0d3ccfa3 2d918815
Jan/08/2022 06:07:15 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:15 ipsec,debug,packet IV was saved for next processing:
Jan/08/2022 06:07:15 ipsec,debug,packet f9854e58 edca9d20 d4ecede9 b0716289
Jan/08/2022 06:07:15 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:15 ipsec,debug,packet with key:
Jan/08/2022 06:07:15 ipsec,debug,packet adb77da3 1daf700b b0320069 ba4a1b22
Jan/08/2022 06:07:15 ipsec,debug,packet decrypted payload by IV:
Jan/08/2022 06:07:15 ipsec,debug,packet f150d495 115ea9f0 0d3ccfa3 2d918815
Jan/08/2022 06:07:15 ipsec,debug,packet decrypted payload, but not trimed.
Jan/08/2022 06:07:15 ipsec,debug,packet 0b000018 44d30793 20fc5390 d91732d1 b6f48ae6 08664d3a 00000020 00000001
Jan/08/2022 06:07:15 ipsec,debug,packet 01108d28 0a4f2796 630f5f1d e68afe8c dac5f1e2 59c20f08 00000000 00000000
Jan/08/2022 06:07:15 ipsec,debug,packet padding len=1
Jan/08/2022 06:07:15 ipsec,debug,packet skip to trim padding.
Jan/08/2022 06:07:15 ipsec,debug,packet decrypted.
Jan/08/2022 06:07:15 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 08100501 62ab00c0 0000005c 0b000018
Jan/08/2022 06:07:15 ipsec,debug,packet 44d30793 20fc5390 d91732d1 b6f48ae6 08664d3a 00000020 00000001 01108d28
Jan/08/2022 06:07:15 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 59c20f08 00000000 00000000
Jan/08/2022 06:07:15 ipsec,debug,packet HASH with:
Jan/08/2022 06:07:15 ipsec,debug,packet 62ab00c0 00000020 00000001 01108d28 0a4f2796 630f5f1d e68afe8c dac5f1e2
Jan/08/2022 06:07:15 ipsec,debug,packet 59c20f08
Jan/08/2022 06:07:15 ipsec,debug,packet hmac(hmac_sha1)
Jan/08/2022 06:07:15 ipsec,debug,packet HASH computed:
Jan/08/2022 06:07:15 ipsec,debug,packet 44d30793 20fc5390 d91732d1 b6f48ae6 08664d3a
Jan/08/2022 06:07:15 ipsec,debug hash validated.
Jan/08/2022 06:07:15 ipsec,debug begin.
Jan/08/2022 06:07:15 ipsec,debug seen nptype=8(hash) len=24
Jan/08/2022 06:07:15 ipsec,debug seen nptype=11(notify) len=32
Jan/08/2022 06:07:15 ipsec,debug succeed.
Jan/08/2022 06:07:15 ipsec,debug 34.198.222.127 notify: R_U_THERE
Jan/08/2022 06:07:15 ipsec,debug 34.198.222.127 DPD R-U-There received
Jan/08/2022 06:07:15 ipsec,debug,packet compute IV for phase2
Jan/08/2022 06:07:15 ipsec,debug,packet phase1 last IV:
Jan/08/2022 06:07:15 ipsec,debug,packet 0489b789 b05c2a7b af9a0be2 16ea3782 ce6c52bc
Jan/08/2022 06:07:15 ipsec,debug hash(sha1)
Jan/08/2022 06:07:15 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:15 ipsec,debug,packet phase2 IV computed:
Jan/08/2022 06:07:15 ipsec,debug,packet a0fce4db 24c2a849 18cc9ca7 550e4e7e
Jan/08/2022 06:07:15 ipsec,debug,packet HASH with:
Jan/08/2022 06:07:15 ipsec,debug,packet ce6c52bc 00000020 00000001 01108d29 0a4f2796 630f5f1d e68afe8c dac5f1e2
Jan/08/2022 06:07:15 ipsec,debug,packet 59c20f08
Jan/08/2022 06:07:15 ipsec,debug,packet hmac(hmac_sha1)
Jan/08/2022 06:07:15 ipsec,debug,packet HASH computed:
Jan/08/2022 06:07:15 ipsec,debug,packet 6d9adc25 d10f2273 a56fec7c b9023aba 168af9ce
Jan/08/2022 06:07:15 ipsec,debug,packet begin encryption.
Jan/08/2022 06:07:15 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:15 ipsec,debug,packet pad length = 8
Jan/08/2022 06:07:15 ipsec,debug,packet 0b000018 6d9adc25 d10f2273 a56fec7c b9023aba 168af9ce 00000020 00000001
Jan/08/2022 06:07:15 ipsec,debug,packet 01108d29 0a4f2796 630f5f1d e68afe8c dac5f1e2 59c20f08 c0d2b3b5 8ad5c607
Jan/08/2022 06:07:15 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:15 ipsec,debug,packet with key:
Jan/08/2022 06:07:15 ipsec,debug,packet adb77da3 1daf700b b0320069 ba4a1b22
Jan/08/2022 06:07:15 ipsec,debug,packet encrypted payload by IV:
Jan/08/2022 06:07:15 ipsec,debug,packet a0fce4db 24c2a849 18cc9ca7 550e4e7e
Jan/08/2022 06:07:15 ipsec,debug,packet save IV for next:
Jan/08/2022 06:07:15 ipsec,debug,packet e7d9b6c1 634900bf 4d212272 2d775e3c
Jan/08/2022 06:07:15 ipsec,debug,packet encrypted.
Jan/08/2022 06:07:15 ipsec,debug 92 bytes from 164.52.192.253[500] to 34.198.222.127[500]
Jan/08/2022 06:07:15 ipsec,debug 1 times of 92 bytes message will be sent to 34.198.222.127[500]
Jan/08/2022 06:07:15 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 08100501 ce6c52bc 0000005c 27078f93
Jan/08/2022 06:07:15 ipsec,debug,packet 48a6a938 6d8b21c3 f828809b 37c4e562 6082045b c031621f 9048a4d5 dad11a11
Jan/08/2022 06:07:15 ipsec,debug,packet e7bf56c5 6d6f689f 027d1018 e7d9b6c1 634900bf 4d212272 2d775e3c
Jan/08/2022 06:07:15 ipsec,debug sendto Information notify.
Jan/08/2022 06:07:15 ipsec,debug received a valid R-U-THERE, ACK sent
Jan/08/2022 06:07:15 ipsec,debug 300 bytes from 164.52.192.253[500] to 34.198.222.127[500]
Jan/08/2022 06:07:15 ipsec,debug 1 times of 300 bytes message will be sent to 34.198.222.127[500]
Jan/08/2022 06:07:15 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 08102001 afad3f71 0000012c 0c5b91c4
Jan/08/2022 06:07:15 ipsec,debug,packet 105d27fe 1fd83e58 352ee86a 8bdcd214 35d25f32 ca3e1d33 4584be26 c4befb7d
Jan/08/2022 06:07:15 ipsec,debug,packet 23dfa5b2 8f0988c3 56b79da6 bae060f0 07e97f49 07585173 ba63cd86 544b27fb
Jan/08/2022 06:07:15 ipsec,debug,packet 291e9755 64f908ff b0a5dbb6 2f9f24d4 75316031 71cf1af9 d2143b12 f5224045
Jan/08/2022 06:07:15 ipsec,debug,packet 167a15d3 51a517a8 8a848c3b f63b3194 92b3ca05 55b5a196 bbf332f7 6b64a3ff
Jan/08/2022 06:07:15 ipsec,debug,packet ce916007 cfac9147 5352dfe2 a948718a 970e401c df48c510 c842c142 69f4e70d
Jan/08/2022 06:07:15 ipsec,debug,packet 81372cff 87c1e6e6 9cd6c120 13495520 59799b98 188f769e d6231dec 1c3b28a4
Jan/08/2022 06:07:15 ipsec,debug,packet 323e124a 2274f41c 35c9d6ef a5f21148 bb0ec68b b634ccba 994f341b e9e3cd3f
Jan/08/2022 06:07:15 ipsec,debug,packet bed4c304 3aa18ca6 e4166f55 1765e922 952b79ab c4ff6a7c b50ab3e4 461ab2cf
Jan/08/2022 06:07:15 ipsec,debug,packet 6d8be4f5 a6f1563b dfe11dd9
Jan/08/2022 06:07:15 ipsec resent phase2 packet 164.52.192.253[500]<=>34.198.222.127[500] 0a4f2796630f5f1d:e68afe8cdac5f1e2:0000afad
Jan/08/2022 06:07:15 ipsec,debug ===== received 92 bytes from 34.198.222.127[500] to 164.52.192.253[500]
Jan/08/2022 06:07:15 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 08100501 4d6eae3a 0000005c aa49c83d
Jan/08/2022 06:07:15 ipsec,debug,packet 4fcf2cbf d49063e6 59896029 dc2a413b 4d5e6ee8 4bcc490c 7c2b5070 4ccb04b5
Jan/08/2022 06:07:15 ipsec,debug,packet 0b9b5733 df9b47df bb733978 f50237df e42dcd3e 14e5beb3 3969c452
Jan/08/2022 06:07:15 ipsec,debug receive Information.
Jan/08/2022 06:07:15 ipsec,debug,packet compute IV for phase2
Jan/08/2022 06:07:15 ipsec,debug,packet phase1 last IV:
Jan/08/2022 06:07:15 ipsec,debug,packet 0489b789 b05c2a7b af9a0be2 16ea3782 4d6eae3a
Jan/08/2022 06:07:15 ipsec,debug hash(sha1)
Jan/08/2022 06:07:15 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:15 ipsec,debug,packet phase2 IV computed:
Jan/08/2022 06:07:15 ipsec,debug,packet 7455526b deabb5cd bad05ce1 9b21a248
Jan/08/2022 06:07:15 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:15 ipsec,debug,packet IV was saved for next processing:
Jan/08/2022 06:07:15 ipsec,debug,packet f50237df e42dcd3e 14e5beb3 3969c452
Jan/08/2022 06:07:15 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:15 ipsec,debug,packet with key:
Jan/08/2022 06:07:15 ipsec,debug,packet adb77da3 1daf700b b0320069 ba4a1b22
Jan/08/2022 06:07:15 ipsec,debug,packet decrypted payload by IV:
Jan/08/2022 06:07:15 ipsec,debug,packet 7455526b deabb5cd bad05ce1 9b21a248
Jan/08/2022 06:07:15 ipsec,debug,packet decrypted payload, but not trimed.
Jan/08/2022 06:07:15 ipsec,debug,packet 0b000018 a9fa7324 b5972fbe 7327ecea fa708a3f b4ddb698 00000020 00000001
Jan/08/2022 06:07:15 ipsec,debug,packet 01108d29 0a4f2796 630f5f1d e68afe8c dac5f1e2 00000ecd 00000000 00000000
Jan/08/2022 06:07:15 ipsec,debug,packet padding len=1
Jan/08/2022 06:07:15 ipsec,debug,packet skip to trim padding.
Jan/08/2022 06:07:15 ipsec,debug,packet decrypted.
Jan/08/2022 06:07:15 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 08100501 4d6eae3a 0000005c 0b000018
Jan/08/2022 06:07:15 ipsec,debug,packet a9fa7324 b5972fbe 7327ecea fa708a3f b4ddb698 00000020 00000001 01108d29
Jan/08/2022 06:07:15 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 00000ecd 00000000 00000000
Jan/08/2022 06:07:15 ipsec,debug,packet HASH with:
Jan/08/2022 06:07:15 ipsec,debug,packet 4d6eae3a 00000020 00000001 01108d29 0a4f2796 630f5f1d e68afe8c dac5f1e2
Jan/08/2022 06:07:15 ipsec,debug,packet 00000ecd
Jan/08/2022 06:07:15 ipsec,debug,packet hmac(hmac_sha1)
Jan/08/2022 06:07:15 ipsec,debug,packet HASH computed:
Jan/08/2022 06:07:15 ipsec,debug,packet a9fa7324 b5972fbe 7327ecea fa708a3f b4ddb698
Jan/08/2022 06:07:15 ipsec,debug hash validated.
Jan/08/2022 06:07:15 ipsec,debug begin.
Jan/08/2022 06:07:15 ipsec,debug seen nptype=8(hash) len=24
Jan/08/2022 06:07:15 ipsec,debug seen nptype=11(notify) len=32
Jan/08/2022 06:07:15 ipsec,debug succeed.
Jan/08/2022 06:07:15 ipsec,debug 34.198.222.127 notify: R_U_THERE_ACK
Jan/08/2022 06:07:15 ipsec,debug 34.198.222.127 DPD R-U-There-Ack received
Jan/08/2022 06:07:15 ipsec,debug received an R-U-THERE-ACK
Jan/08/2022 06:07:15 ipsec,debug ===== received 76 bytes from 34.198.222.127[500] to 164.52.192.253[500]
Jan/08/2022 06:07:15 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 08100501 8603c82a 0000004c 78d905c7
Jan/08/2022 06:07:15 ipsec,debug,packet 1f198186 e36a2e7d c93edd8d 5c52f5fe c08840e3 b11512fa 01d10203 1188aca3
Jan/08/2022 06:07:15 ipsec,debug,packet af09cb0e 1c662fcf d0dbab31
Jan/08/2022 06:07:15 ipsec,debug receive Information.
Jan/08/2022 06:07:15 ipsec,debug,packet compute IV for phase2
Jan/08/2022 06:07:15 ipsec,debug,packet phase1 last IV:
Jan/08/2022 06:07:15 ipsec,debug,packet 0489b789 b05c2a7b af9a0be2 16ea3782 8603c82a
Jan/08/2022 06:07:15 ipsec,debug hash(sha1)
Jan/08/2022 06:07:15 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:15 ipsec,debug,packet phase2 IV computed:
Jan/08/2022 06:07:15 ipsec,debug,packet 99c777a6 adbdfdec 8b704d04 40e7ce86
Jan/08/2022 06:07:15 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:15 ipsec,debug,packet IV was saved for next processing:
Jan/08/2022 06:07:15 ipsec,debug,packet 1188aca3 af09cb0e 1c662fcf d0dbab31
Jan/08/2022 06:07:15 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:15 ipsec,debug,packet with key:
Jan/08/2022 06:07:15 ipsec,debug,packet adb77da3 1daf700b b0320069 ba4a1b22
Jan/08/2022 06:07:15 ipsec,debug,packet decrypted payload by IV:
Jan/08/2022 06:07:15 ipsec,debug,packet 99c777a6 adbdfdec 8b704d04 40e7ce86
Jan/08/2022 06:07:15 ipsec,debug,packet decrypted payload, but not trimed.
Jan/08/2022 06:07:15 ipsec,debug,packet 0b000018 9ba7d52a 5b9be61f 01b122e9 290e0b3b b636b2da 0000000c 00000001
Jan/08/2022 06:07:15 ipsec,debug,packet 01000010 00000000 00000000 00000000
Jan/08/2022 06:07:15 ipsec,debug,packet padding len=1
Jan/08/2022 06:07:15 ipsec,debug,packet skip to trim padding.
Jan/08/2022 06:07:15 ipsec,debug,packet decrypted.
Jan/08/2022 06:07:15 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 08100501 8603c82a 0000004c 0b000018
Jan/08/2022 06:07:15 ipsec,debug,packet 9ba7d52a 5b9be61f 01b122e9 290e0b3b b636b2da 0000000c 00000001 01000010
Jan/08/2022 06:07:15 ipsec,debug,packet 00000000 00000000 00000000
Jan/08/2022 06:07:15 ipsec,debug,packet HASH with:
Jan/08/2022 06:07:15 ipsec,debug,packet 8603c82a 0000000c 00000001 01000010
Jan/08/2022 06:07:15 ipsec,debug,packet hmac(hmac_sha1)
Jan/08/2022 06:07:15 ipsec,debug,packet HASH computed:
Jan/08/2022 06:07:15 ipsec,debug,packet 9ba7d52a 5b9be61f 01b122e9 290e0b3b b636b2da
Jan/08/2022 06:07:15 ipsec,debug hash validated.
Jan/08/2022 06:07:15 ipsec,debug begin.
Jan/08/2022 06:07:15 ipsec,debug seen nptype=8(hash) len=24
Jan/08/2022 06:07:15 ipsec,debug seen nptype=11(notify) len=12
Jan/08/2022 06:07:15 ipsec,debug succeed.
Jan/08/2022 06:07:15 ipsec,debug 34.198.222.127 notify: PAYLOAD-MALFORMED
Jan/08/2022 06:07:15 ipsec 34.198.222.127 fatal PAYLOAD-MALFORMED notify messsage, phase1 should be deleted.
Jan/08/2022 06:07:25 ipsec,debug ===== received 92 bytes from 34.198.222.127[500] to 164.52.192.253[500]
Jan/08/2022 06:07:25 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 08100501 632cf288 0000005c 7414e125
Jan/08/2022 06:07:25 ipsec,debug,packet 8912613a d76a349d 1b5b9aec 9282af8b 19a1351f d3f7a97a 56a87ef0 ac53736a
Jan/08/2022 06:07:25 ipsec,debug,packet 9c6a98b6 4d57da45 a77fd129 766f3c2c 7396a6b3 d072989e 63d1a225
Jan/08/2022 06:07:25 ipsec,debug receive Information.
Jan/08/2022 06:07:25 ipsec,debug,packet compute IV for phase2
Jan/08/2022 06:07:25 ipsec,debug,packet phase1 last IV:
Jan/08/2022 06:07:25 ipsec,debug,packet 0489b789 b05c2a7b af9a0be2 16ea3782 632cf288
Jan/08/2022 06:07:25 ipsec,debug hash(sha1)
Jan/08/2022 06:07:25 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:25 ipsec,debug,packet phase2 IV computed:
Jan/08/2022 06:07:25 ipsec,debug,packet 2151aa3f 28d91c01 4034f9dd c41436ed
Jan/08/2022 06:07:25 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:25 ipsec,debug,packet IV was saved for next processing:
Jan/08/2022 06:07:25 ipsec,debug,packet 766f3c2c 7396a6b3 d072989e 63d1a225
Jan/08/2022 06:07:25 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:25 ipsec,debug,packet with key:
Jan/08/2022 06:07:25 ipsec,debug,packet adb77da3 1daf700b b0320069 ba4a1b22
Jan/08/2022 06:07:25 ipsec,debug,packet decrypted payload by IV:
Jan/08/2022 06:07:25 ipsec,debug,packet 2151aa3f 28d91c01 4034f9dd c41436ed
Jan/08/2022 06:07:25 ipsec,debug,packet decrypted payload, but not trimed.
Jan/08/2022 06:07:25 ipsec,debug,packet 0b000018 805a4e56 4176a642 64f14f3d 72f0ec9a 50aa6a82 00000020 00000001
Jan/08/2022 06:07:25 ipsec,debug,packet 01108d28 0a4f2796 630f5f1d e68afe8c dac5f1e2 59c20f09 00000000 00000000
Jan/08/2022 06:07:25 ipsec,debug,packet padding len=1
Jan/08/2022 06:07:25 ipsec,debug,packet skip to trim padding.
Jan/08/2022 06:07:25 ipsec,debug,packet decrypted.
Jan/08/2022 06:07:25 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 08100501 632cf288 0000005c 0b000018
Jan/08/2022 06:07:25 ipsec,debug,packet 805a4e56 4176a642 64f14f3d 72f0ec9a 50aa6a82 00000020 00000001 01108d28
Jan/08/2022 06:07:25 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 59c20f09 00000000 00000000
Jan/08/2022 06:07:25 ipsec,debug,packet HASH with:
Jan/08/2022 06:07:25 ipsec,debug,packet 632cf288 00000020 00000001 01108d28 0a4f2796 630f5f1d e68afe8c dac5f1e2
Jan/08/2022 06:07:25 ipsec,debug,packet 59c20f09
Jan/08/2022 06:07:25 ipsec,debug,packet hmac(hmac_sha1)
Jan/08/2022 06:07:25 ipsec,debug,packet HASH computed:
Jan/08/2022 06:07:25 ipsec,debug,packet 805a4e56 4176a642 64f14f3d 72f0ec9a 50aa6a82
Jan/08/2022 06:07:25 ipsec,debug hash validated.
Jan/08/2022 06:07:25 ipsec,debug begin.
Jan/08/2022 06:07:25 ipsec,debug seen nptype=8(hash) len=24
Jan/08/2022 06:07:25 ipsec,debug seen nptype=11(notify) len=32
Jan/08/2022 06:07:25 ipsec,debug succeed.
Jan/08/2022 06:07:25 ipsec,debug 34.198.222.127 notify: R_U_THERE
Jan/08/2022 06:07:25 ipsec,debug 34.198.222.127 DPD R-U-There received
Jan/08/2022 06:07:25 ipsec,debug,packet compute IV for phase2
Jan/08/2022 06:07:25 ipsec,debug,packet phase1 last IV:
Jan/08/2022 06:07:25 ipsec,debug,packet 0489b789 b05c2a7b af9a0be2 16ea3782 bb338716
Jan/08/2022 06:07:25 ipsec,debug hash(sha1)
Jan/08/2022 06:07:25 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:25 ipsec,debug,packet phase2 IV computed:
Jan/08/2022 06:07:25 ipsec,debug,packet 5a6385ea 628bc4d1 13f0692b edf50505
Jan/08/2022 06:07:25 ipsec,debug,packet HASH with:
Jan/08/2022 06:07:25 ipsec,debug,packet bb338716 00000020 00000001 01108d29 0a4f2796 630f5f1d e68afe8c dac5f1e2
Jan/08/2022 06:07:25 ipsec,debug,packet 59c20f09
Jan/08/2022 06:07:25 ipsec,debug,packet hmac(hmac_sha1)
Jan/08/2022 06:07:25 ipsec,debug,packet HASH computed:
Jan/08/2022 06:07:25 ipsec,debug,packet aad58b9b 644819ee 77e3e294 e5fac8f9 40f60613
Jan/08/2022 06:07:25 ipsec,debug,packet begin encryption.
Jan/08/2022 06:07:25 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:25 ipsec,debug,packet pad length = 8
Jan/08/2022 06:07:25 ipsec,debug,packet 0b000018 aad58b9b 644819ee 77e3e294 e5fac8f9 40f60613 00000020 00000001
Jan/08/2022 06:07:25 ipsec,debug,packet 01108d29 0a4f2796 630f5f1d e68afe8c dac5f1e2 59c20f09 dfc7daab d882ad07
Jan/08/2022 06:07:25 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:25 ipsec,debug,packet with key:
Jan/08/2022 06:07:25 ipsec,debug,packet adb77da3 1daf700b b0320069 ba4a1b22
Jan/08/2022 06:07:25 ipsec,debug,packet encrypted payload by IV:
Jan/08/2022 06:07:25 ipsec,debug,packet 5a6385ea 628bc4d1 13f0692b edf50505
Jan/08/2022 06:07:25 ipsec,debug,packet save IV for next:
Jan/08/2022 06:07:25 ipsec,debug,packet 942fdea3 c598391c ff82a656 a1fe3f8e
Jan/08/2022 06:07:25 ipsec,debug,packet encrypted.
Jan/08/2022 06:07:25 ipsec,debug 92 bytes from 164.52.192.253[500] to 34.198.222.127[500]
Jan/08/2022 06:07:25 ipsec,debug 1 times of 92 bytes message will be sent to 34.198.222.127[500]
Jan/08/2022 06:07:25 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 08100501 bb338716 0000005c 957c7ee6
Jan/08/2022 06:07:25 ipsec,debug,packet 59345c6f 40dd5211 f28762af 5d24db36 7de0bde2 9e32f97d 7158b672 76862fee
Jan/08/2022 06:07:25 ipsec,debug,packet b43cd4d7 ac697411 24c69951 942fdea3 c598391c ff82a656 a1fe3f8e
Jan/08/2022 06:07:25 ipsec,debug sendto Information notify.
Jan/08/2022 06:07:25 ipsec,debug received a valid R-U-THERE, ACK sent
Jan/08/2022 06:07:25 ipsec,debug 300 bytes from 164.52.192.253[500] to 34.198.222.127[500]
Jan/08/2022 06:07:25 ipsec,debug 1 times of 300 bytes message will be sent to 34.198.222.127[500]
Jan/08/2022 06:07:25 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 08102001 afad3f71 0000012c 0c5b91c4
Jan/08/2022 06:07:25 ipsec,debug,packet 105d27fe 1fd83e58 352ee86a 8bdcd214 35d25f32 ca3e1d33 4584be26 c4befb7d
Jan/08/2022 06:07:25 ipsec,debug,packet 23dfa5b2 8f0988c3 56b79da6 bae060f0 07e97f49 07585173 ba63cd86 544b27fb
Jan/08/2022 06:07:25 ipsec,debug,packet 291e9755 64f908ff b0a5dbb6 2f9f24d4 75316031 71cf1af9 d2143b12 f5224045
Jan/08/2022 06:07:25 ipsec,debug,packet 167a15d3 51a517a8 8a848c3b f63b3194 92b3ca05 55b5a196 bbf332f7 6b64a3ff
Jan/08/2022 06:07:25 ipsec,debug,packet ce916007 cfac9147 5352dfe2 a948718a 970e401c df48c510 c842c142 69f4e70d
Jan/08/2022 06:07:25 ipsec,debug,packet 81372cff 87c1e6e6 9cd6c120 13495520 59799b98 188f769e d6231dec 1c3b28a4
Jan/08/2022 06:07:25 ipsec,debug,packet 323e124a 2274f41c 35c9d6ef a5f21148 bb0ec68b b634ccba 994f341b e9e3cd3f
Jan/08/2022 06:07:25 ipsec,debug,packet bed4c304 3aa18ca6 e4166f55 1765e922 952b79ab c4ff6a7c b50ab3e4 461ab2cf
Jan/08/2022 06:07:25 ipsec,debug,packet 6d8be4f5 a6f1563b dfe11dd9
Jan/08/2022 06:07:25 ipsec resent phase2 packet 164.52.192.253[500]<=>34.198.222.127[500] 0a4f2796630f5f1d:e68afe8cdac5f1e2:0000afad
Jan/08/2022 06:07:25 ipsec,debug 34.198.222.127 DPD monitoring....
Jan/08/2022 06:07:25 ipsec,debug,packet compute IV for phase2
Jan/08/2022 06:07:25 ipsec,debug,packet phase1 last IV:
Jan/08/2022 06:07:25 ipsec,debug,packet 0489b789 b05c2a7b af9a0be2 16ea3782 ab93a27b
Jan/08/2022 06:07:25 ipsec,debug hash(sha1)
Jan/08/2022 06:07:25 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:25 ipsec,debug,packet phase2 IV computed:
Jan/08/2022 06:07:25 ipsec,debug,packet 74fec82f ee7611f2 f35904bb 40b6f32d
Jan/08/2022 06:07:25 ipsec,debug,packet HASH with:
Jan/08/2022 06:07:25 ipsec,debug,packet ab93a27b 00000020 00000001 01108d28 0a4f2796 630f5f1d e68afe8c dac5f1e2
Jan/08/2022 06:07:25 ipsec,debug,packet 00000ece
Jan/08/2022 06:07:25 ipsec,debug,packet hmac(hmac_sha1)
Jan/08/2022 06:07:25 ipsec,debug,packet HASH computed:
Jan/08/2022 06:07:25 ipsec,debug,packet 919bb04f 1d694575 a297d76f e7e364ac 2e016438
Jan/08/2022 06:07:25 ipsec,debug,packet begin encryption.
Jan/08/2022 06:07:25 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:25 ipsec,debug,packet pad length = 8
Jan/08/2022 06:07:25 ipsec,debug,packet 0b000018 919bb04f 1d694575 a297d76f e7e364ac 2e016438 00000020 00000001
Jan/08/2022 06:07:25 ipsec,debug,packet 01108d28 0a4f2796 630f5f1d e68afe8c dac5f1e2 00000ece dcf6d595 eab4c507
Jan/08/2022 06:07:25 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:25 ipsec,debug,packet with key:
Jan/08/2022 06:07:25 ipsec,debug,packet adb77da3 1daf700b b0320069 ba4a1b22
Jan/08/2022 06:07:25 ipsec,debug,packet encrypted payload by IV:
Jan/08/2022 06:07:25 ipsec,debug,packet 74fec82f ee7611f2 f35904bb 40b6f32d
Jan/08/2022 06:07:25 ipsec,debug,packet save IV for next:
Jan/08/2022 06:07:25 ipsec,debug,packet 68fe0c11 ca8b61aa 81ee10a5 68530b94
Jan/08/2022 06:07:25 ipsec,debug,packet encrypted.
Jan/08/2022 06:07:25 ipsec,debug 92 bytes from 164.52.192.253[500] to 34.198.222.127[500]
Jan/08/2022 06:07:25 ipsec,debug 1 times of 92 bytes message will be sent to 34.198.222.127[500]
Jan/08/2022 06:07:25 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 08100501 ab93a27b 0000005c 140f68a0
Jan/08/2022 06:07:25 ipsec,debug,packet 455f2aad 1530563e 320b4ae5 dfe33308 d88526e1 1399bbdb df6a8fbb d3cb66a6
Jan/08/2022 06:07:25 ipsec,debug,packet 9ae63c16 8f689db0 f2010688 68fe0c11 ca8b61aa 81ee10a5 68530b94
Jan/08/2022 06:07:25 ipsec,debug sendto Information notify.
Jan/08/2022 06:07:25 ipsec,debug 34.198.222.127 DPD R-U-There sent (0)
Jan/08/2022 06:07:25 ipsec,debug 34.198.222.127 rescheduling send_r_u (5).
Jan/08/2022 06:07:25 ipsec,debug ===== received 76 bytes from 34.198.222.127[500] to 164.52.192.253[500]
Jan/08/2022 06:07:25 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 08100501 b99f656f 0000004c 41893b9d
Jan/08/2022 06:07:25 ipsec,debug,packet df1c66e9 494a313d cb7c7d05 0b5fee4a 03652bbf f10ad074 8328d427 66b5e050
Jan/08/2022 06:07:25 ipsec,debug,packet c9cb7472 74e77721 cf1a5317
Jan/08/2022 06:07:25 ipsec,debug receive Information.
Jan/08/2022 06:07:25 ipsec,debug,packet compute IV for phase2
Jan/08/2022 06:07:25 ipsec,debug,packet phase1 last IV:
Jan/08/2022 06:07:25 ipsec,debug,packet 0489b789 b05c2a7b af9a0be2 16ea3782 b99f656f
Jan/08/2022 06:07:25 ipsec,debug hash(sha1)
Jan/08/2022 06:07:25 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:25 ipsec,debug,packet phase2 IV computed:
Jan/08/2022 06:07:25 ipsec,debug,packet f5d21d44 15a2d266 8c02f94d b6258885
Jan/08/2022 06:07:25 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:25 ipsec,debug,packet IV was saved for next processing:
Jan/08/2022 06:07:25 ipsec,debug,packet 66b5e050 c9cb7472 74e77721 cf1a5317
Jan/08/2022 06:07:25 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:25 ipsec,debug,packet with key:
Jan/08/2022 06:07:25 ipsec,debug,packet adb77da3 1daf700b b0320069 ba4a1b22
Jan/08/2022 06:07:25 ipsec,debug,packet decrypted payload by IV:
Jan/08/2022 06:07:25 ipsec,debug,packet f5d21d44 15a2d266 8c02f94d b6258885
Jan/08/2022 06:07:25 ipsec,debug,packet decrypted payload, but not trimed.
Jan/08/2022 06:07:25 ipsec,debug,packet 0b000018 e809df98 41b0ca18 f3210707 c9442ec1 fca24f60 0000000c 00000001
Jan/08/2022 06:07:25 ipsec,debug,packet 01000010 00000000 00000000 00000000
Jan/08/2022 06:07:25 ipsec,debug,packet padding len=1
Jan/08/2022 06:07:25 ipsec,debug,packet skip to trim padding.
Jan/08/2022 06:07:25 ipsec,debug,packet decrypted.
Jan/08/2022 06:07:25 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 08100501 b99f656f 0000004c 0b000018
Jan/08/2022 06:07:25 ipsec,debug,packet e809df98 41b0ca18 f3210707 c9442ec1 fca24f60 0000000c 00000001 01000010
Jan/08/2022 06:07:25 ipsec,debug,packet 00000000 00000000 00000000
Jan/08/2022 06:07:25 ipsec,debug,packet HASH with:
Jan/08/2022 06:07:25 ipsec,debug,packet b99f656f 0000000c 00000001 01000010
Jan/08/2022 06:07:25 ipsec,debug,packet hmac(hmac_sha1)
Jan/08/2022 06:07:25 ipsec,debug,packet HASH computed:
Jan/08/2022 06:07:25 ipsec,debug,packet e809df98 41b0ca18 f3210707 c9442ec1 fca24f60
Jan/08/2022 06:07:25 ipsec,debug hash validated.
Jan/08/2022 06:07:25 ipsec,debug begin.
Jan/08/2022 06:07:25 ipsec,debug seen nptype=8(hash) len=24
Jan/08/2022 06:07:25 ipsec,debug seen nptype=11(notify) len=12
Jan/08/2022 06:07:25 ipsec,debug succeed.
Jan/08/2022 06:07:25 ipsec,debug 34.198.222.127 notify: PAYLOAD-MALFORMED
Jan/08/2022 06:07:25 ipsec 34.198.222.127 fatal PAYLOAD-MALFORMED notify messsage, phase1 should be deleted.
Jan/08/2022 06:07:25 ipsec,debug ===== received 92 bytes from 34.198.222.127[500] to 164.52.192.253[500]
Jan/08/2022 06:07:25 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 08100501 215822d0 0000005c af7c3fb9
Jan/08/2022 06:07:25 ipsec,debug,packet 3d99236f 1de074ac e0e96bd9 846b9cc0 9ae4ac01 ae7ebb01 638d9a1c 651cd2e3
Jan/08/2022 06:07:25 ipsec,debug,packet dab057d8 f123d312 728f096b 4bfa923a 7ad9b8b1 8f84035f bb108dc5
Jan/08/2022 06:07:25 ipsec,debug receive Information.
Jan/08/2022 06:07:25 ipsec,debug,packet compute IV for phase2
Jan/08/2022 06:07:25 ipsec,debug,packet phase1 last IV:
Jan/08/2022 06:07:25 ipsec,debug,packet 0489b789 b05c2a7b af9a0be2 16ea3782 215822d0
Jan/08/2022 06:07:25 ipsec,debug hash(sha1)
Jan/08/2022 06:07:25 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:25 ipsec,debug,packet phase2 IV computed:
Jan/08/2022 06:07:25 ipsec,debug,packet ad4ecda6 d1e475c1 c0897d8a 81a856e8
Jan/08/2022 06:07:25 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:25 ipsec,debug,packet IV was saved for next processing:
Jan/08/2022 06:07:25 ipsec,debug,packet 4bfa923a 7ad9b8b1 8f84035f bb108dc5
Jan/08/2022 06:07:25 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:25 ipsec,debug,packet with key:
Jan/08/2022 06:07:25 ipsec,debug,packet adb77da3 1daf700b b0320069 ba4a1b22
Jan/08/2022 06:07:25 ipsec,debug,packet decrypted payload by IV:
Jan/08/2022 06:07:25 ipsec,debug,packet ad4ecda6 d1e475c1 c0897d8a 81a856e8
Jan/08/2022 06:07:25 ipsec,debug,packet decrypted payload, but not trimed.
Jan/08/2022 06:07:25 ipsec,debug,packet 0b000018 df41c39a 21177138 0d4f19b0 13c9a7b5 8b5686f2 00000020 00000001
Jan/08/2022 06:07:25 ipsec,debug,packet 01108d29 0a4f2796 630f5f1d e68afe8c dac5f1e2 00000ece 00000000 00000000
Jan/08/2022 06:07:25 ipsec,debug,packet padding len=1
Jan/08/2022 06:07:25 ipsec,debug,packet skip to trim padding.
Jan/08/2022 06:07:25 ipsec,debug,packet decrypted.
Jan/08/2022 06:07:25 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 08100501 215822d0 0000005c 0b000018
Jan/08/2022 06:07:25 ipsec,debug,packet df41c39a 21177138 0d4f19b0 13c9a7b5 8b5686f2 00000020 00000001 01108d29
Jan/08/2022 06:07:25 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 00000ece 00000000 00000000
Jan/08/2022 06:07:25 ipsec,debug,packet HASH with:
Jan/08/2022 06:07:25 ipsec,debug,packet 215822d0 00000020 00000001 01108d29 0a4f2796 630f5f1d e68afe8c dac5f1e2
Jan/08/2022 06:07:25 ipsec,debug,packet 00000ece
Jan/08/2022 06:07:25 ipsec,debug,packet hmac(hmac_sha1)
Jan/08/2022 06:07:25 ipsec,debug,packet HASH computed:
Jan/08/2022 06:07:25 ipsec,debug,packet df41c39a 21177138 0d4f19b0 13c9a7b5 8b5686f2
Jan/08/2022 06:07:25 ipsec,debug hash validated.
Jan/08/2022 06:07:25 ipsec,debug begin.
Jan/08/2022 06:07:25 ipsec,debug seen nptype=8(hash) len=24
Jan/08/2022 06:07:25 ipsec,debug seen nptype=11(notify) len=32
Jan/08/2022 06:07:25 ipsec,debug succeed.
Jan/08/2022 06:07:25 ipsec,debug 34.198.222.127 notify: R_U_THERE_ACK
Jan/08/2022 06:07:25 ipsec,debug 34.198.222.127 DPD R-U-There-Ack received
Jan/08/2022 06:07:25 ipsec,debug received an R-U-THERE-ACK
Jan/08/2022 06:07:35 ipsec 34.198.222.127 give up to get IPsec-SA due to time up to wait.
Jan/08/2022 06:07:35 ipsec,debug ===== received 92 bytes from 34.198.222.127[500] to 164.52.192.253[500]
Jan/08/2022 06:07:35 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 08100501 c5ed3965 0000005c 48d1600d
Jan/08/2022 06:07:35 ipsec,debug,packet ed4ec685 6a3a3048 12d6281a dafb00dc 89d2dfb4 cbe32ab2 eb5fea44 7ca6dbd8
Jan/08/2022 06:07:35 ipsec,debug,packet 7c0b71b1 73db4359 c5684511 03613a41 b1f067e8 7cee8400 d7bd468b
Jan/08/2022 06:07:35 ipsec,debug receive Information.
Jan/08/2022 06:07:35 ipsec,debug,packet compute IV for phase2
Jan/08/2022 06:07:35 ipsec,debug,packet phase1 last IV:
Jan/08/2022 06:07:35 ipsec,debug,packet 0489b789 b05c2a7b af9a0be2 16ea3782 c5ed3965
Jan/08/2022 06:07:35 ipsec,debug hash(sha1)
Jan/08/2022 06:07:35 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:35 ipsec,debug,packet phase2 IV computed:
Jan/08/2022 06:07:35 ipsec,debug,packet b57a21b4 9be6489e 13bc264b 86b26bed
Jan/08/2022 06:07:35 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:35 ipsec,debug,packet IV was saved for next processing:
Jan/08/2022 06:07:35 ipsec,debug,packet 03613a41 b1f067e8 7cee8400 d7bd468b
Jan/08/2022 06:07:35 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:35 ipsec,debug,packet with key:
Jan/08/2022 06:07:35 ipsec,debug,packet adb77da3 1daf700b b0320069 ba4a1b22
Jan/08/2022 06:07:35 ipsec,debug,packet decrypted payload by IV:
Jan/08/2022 06:07:35 ipsec,debug,packet b57a21b4 9be6489e 13bc264b 86b26bed
Jan/08/2022 06:07:35 ipsec,debug,packet decrypted payload, but not trimed.
Jan/08/2022 06:07:35 ipsec,debug,packet 0b000018 192f1267 0622ad3c 5d585ec1 2115f062 cf5e4f09 00000020 00000001
Jan/08/2022 06:07:35 ipsec,debug,packet 01108d28 0a4f2796 630f5f1d e68afe8c dac5f1e2 59c20f0a 00000000 00000000
Jan/08/2022 06:07:35 ipsec,debug,packet padding len=1
Jan/08/2022 06:07:35 ipsec,debug,packet skip to trim padding.
Jan/08/2022 06:07:35 ipsec,debug,packet decrypted.
Jan/08/2022 06:07:35 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 08100501 c5ed3965 0000005c 0b000018
Jan/08/2022 06:07:35 ipsec,debug,packet 192f1267 0622ad3c 5d585ec1 2115f062 cf5e4f09 00000020 00000001 01108d28
Jan/08/2022 06:07:35 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 59c20f0a 00000000 00000000
Jan/08/2022 06:07:35 ipsec,debug,packet HASH with:
Jan/08/2022 06:07:35 ipsec,debug,packet c5ed3965 00000020 00000001 01108d28 0a4f2796 630f5f1d e68afe8c dac5f1e2
Jan/08/2022 06:07:35 ipsec,debug,packet 59c20f0a
Jan/08/2022 06:07:35 ipsec,debug,packet hmac(hmac_sha1)
Jan/08/2022 06:07:35 ipsec,debug,packet HASH computed:
Jan/08/2022 06:07:35 ipsec,debug,packet 192f1267 0622ad3c 5d585ec1 2115f062 cf5e4f09
Jan/08/2022 06:07:35 ipsec,debug hash validated.
Jan/08/2022 06:07:35 ipsec,debug begin.
Jan/08/2022 06:07:35 ipsec,debug seen nptype=8(hash) len=24
Jan/08/2022 06:07:35 ipsec,debug seen nptype=11(notify) len=32
Jan/08/2022 06:07:35 ipsec,debug succeed.
Jan/08/2022 06:07:35 ipsec,debug 34.198.222.127 notify: R_U_THERE
Jan/08/2022 06:07:35 ipsec,debug 34.198.222.127 DPD R-U-There received
Jan/08/2022 06:07:35 ipsec,debug,packet compute IV for phase2
Jan/08/2022 06:07:35 ipsec,debug,packet phase1 last IV:
Jan/08/2022 06:07:35 ipsec,debug,packet 0489b789 b05c2a7b af9a0be2 16ea3782 f3aa8c85
Jan/08/2022 06:07:35 ipsec,debug hash(sha1)
Jan/08/2022 06:07:35 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:35 ipsec,debug,packet phase2 IV computed:
Jan/08/2022 06:07:35 ipsec,debug,packet 0561caa6 e315a0c1 72fc4f0e ed173388
Jan/08/2022 06:07:35 ipsec,debug,packet HASH with:
Jan/08/2022 06:07:35 ipsec,debug,packet f3aa8c85 00000020 00000001 01108d29 0a4f2796 630f5f1d e68afe8c dac5f1e2
Jan/08/2022 06:07:35 ipsec,debug,packet 59c20f0a
Jan/08/2022 06:07:35 ipsec,debug,packet hmac(hmac_sha1)
Jan/08/2022 06:07:35 ipsec,debug,packet HASH computed:
Jan/08/2022 06:07:35 ipsec,debug,packet 34d1f694 25833c59 f631cc3e d3e90db3 fdd5f59f
Jan/08/2022 06:07:35 ipsec,debug,packet begin encryption.
Jan/08/2022 06:07:35 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:35 ipsec,debug,packet pad length = 8
Jan/08/2022 06:07:35 ipsec,debug,packet 0b000018 34d1f694 25833c59 f631cc3e d3e90db3 fdd5f59f 00000020 00000001
Jan/08/2022 06:07:35 ipsec,debug,packet 01108d29 0a4f2796 630f5f1d e68afe8c dac5f1e2 59c20f0a c0b7ebd5 f2dcb907
Jan/08/2022 06:07:35 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:35 ipsec,debug,packet with key:
Jan/08/2022 06:07:35 ipsec,debug,packet adb77da3 1daf700b b0320069 ba4a1b22
Jan/08/2022 06:07:35 ipsec,debug,packet encrypted payload by IV:
Jan/08/2022 06:07:35 ipsec,debug,packet 0561caa6 e315a0c1 72fc4f0e ed173388
Jan/08/2022 06:07:35 ipsec,debug,packet save IV for next:
Jan/08/2022 06:07:35 ipsec,debug,packet 84681d5b 0e32e93d cd8d5f0b e225bb0d
Jan/08/2022 06:07:35 ipsec,debug,packet encrypted.
Jan/08/2022 06:07:35 ipsec,debug 92 bytes from 164.52.192.253[500] to 34.198.222.127[500]
Jan/08/2022 06:07:35 ipsec,debug 1 times of 92 bytes message will be sent to 34.198.222.127[500]
Jan/08/2022 06:07:35 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 08100501 f3aa8c85 0000005c cea66272
Jan/08/2022 06:07:35 ipsec,debug,packet af8ad9ee 99ff516a 95c36d6e 682b0a2f aee0c006 4c4d9d6b a41b7e0e a9b9f52e
Jan/08/2022 06:07:35 ipsec,debug,packet d722633a 20662057 d13ffe6e 84681d5b 0e32e93d cd8d5f0b e225bb0d
Jan/08/2022 06:07:35 ipsec,debug sendto Information notify.
Jan/08/2022 06:07:35 ipsec,debug received a valid R-U-THERE, ACK sent
Jan/08/2022 06:07:35 ipsec IPsec-SA expired: AH/Tunnel 34.198.222.127[500]->164.52.192.253[500] spi=0x2544156
Jan/08/2022 06:07:35 ipsec,debug 34.198.222.127 DPD monitoring....
Jan/08/2022 06:07:35 ipsec,debug,packet compute IV for phase2
Jan/08/2022 06:07:35 ipsec,debug,packet phase1 last IV:
Jan/08/2022 06:07:35 ipsec,debug,packet 0489b789 b05c2a7b af9a0be2 16ea3782 8b8de951
Jan/08/2022 06:07:35 ipsec,debug hash(sha1)
Jan/08/2022 06:07:35 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:35 ipsec,debug,packet phase2 IV computed:
Jan/08/2022 06:07:35 ipsec,debug,packet f5c6354f b1142034 705ff111 f17dd4d1
Jan/08/2022 06:07:35 ipsec,debug,packet HASH with:
Jan/08/2022 06:07:35 ipsec,debug,packet 8b8de951 00000020 00000001 01108d28 0a4f2796 630f5f1d e68afe8c dac5f1e2
Jan/08/2022 06:07:35 ipsec,debug,packet 00000ecf
Jan/08/2022 06:07:35 ipsec,debug,packet hmac(hmac_sha1)
Jan/08/2022 06:07:35 ipsec,debug,packet HASH computed:
Jan/08/2022 06:07:35 ipsec,debug,packet c52490e0 0eac3cd0 42eed636 5bfcc09c f00e08bf
Jan/08/2022 06:07:35 ipsec,debug,packet begin encryption.
Jan/08/2022 06:07:35 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:35 ipsec,debug,packet pad length = 8
Jan/08/2022 06:07:35 ipsec,debug,packet 0b000018 c52490e0 0eac3cd0 42eed636 5bfcc09c f00e08bf 00000020 00000001
Jan/08/2022 06:07:35 ipsec,debug,packet 01108d28 0a4f2796 630f5f1d e68afe8c dac5f1e2 00000ecf e6fe8af8 e6e69407
Jan/08/2022 06:07:35 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:35 ipsec,debug,packet with key:
Jan/08/2022 06:07:35 ipsec,debug,packet adb77da3 1daf700b b0320069 ba4a1b22
Jan/08/2022 06:07:35 ipsec,debug,packet encrypted payload by IV:
Jan/08/2022 06:07:35 ipsec,debug,packet f5c6354f b1142034 705ff111 f17dd4d1
Jan/08/2022 06:07:35 ipsec,debug,packet save IV for next:
Jan/08/2022 06:07:35 ipsec,debug,packet ae2e4f6b 960dfd1e 6d593c0a c1c5641e
Jan/08/2022 06:07:35 ipsec,debug,packet encrypted.
Jan/08/2022 06:07:35 ipsec,debug 92 bytes from 164.52.192.253[500] to 34.198.222.127[500]
Jan/08/2022 06:07:35 ipsec,debug 1 times of 92 bytes message will be sent to 34.198.222.127[500]
Jan/08/2022 06:07:35 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 08100501 8b8de951 0000005c 50c13143
Jan/08/2022 06:07:35 ipsec,debug,packet 1ee72e53 5cd1ced6 97c02370 f8678f76 7a29d529 0b445780 c73c44c5 08fcc4fb
Jan/08/2022 06:07:35 ipsec,debug,packet 07948e8c f92b1546 1bd21dd7 ae2e4f6b 960dfd1e 6d593c0a c1c5641e
Jan/08/2022 06:07:35 ipsec,debug sendto Information notify.
Jan/08/2022 06:07:35 ipsec,debug 34.198.222.127 DPD R-U-There sent (0)
Jan/08/2022 06:07:35 ipsec,debug 34.198.222.127 rescheduling send_r_u (5).
Jan/08/2022 06:07:36 ipsec,debug ===== received 92 bytes from 34.198.222.127[500] to 164.52.192.253[500]
Jan/08/2022 06:07:36 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 08100501 ceb10de6 0000005c 114220d1
Jan/08/2022 06:07:36 ipsec,debug,packet 8362e2b3 a2ebd224 11a748b3 d31b5d12 e75e1b2e 1185c600 4746406a 47d7aab8
Jan/08/2022 06:07:36 ipsec,debug,packet 84475d86 3760dcba c413b9f0 12e18a6b 30579ad3 621d2165 f206f3cc
Jan/08/2022 06:07:36 ipsec,debug receive Information.
Jan/08/2022 06:07:36 ipsec,debug,packet compute IV for phase2
Jan/08/2022 06:07:36 ipsec,debug,packet phase1 last IV:
Jan/08/2022 06:07:36 ipsec,debug,packet 0489b789 b05c2a7b af9a0be2 16ea3782 ceb10de6
Jan/08/2022 06:07:36 ipsec,debug hash(sha1)
Jan/08/2022 06:07:36 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:36 ipsec,debug,packet phase2 IV computed:
Jan/08/2022 06:07:36 ipsec,debug,packet 35ffe886 4609ac56 a40d249d 47f10891
Jan/08/2022 06:07:36 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:36 ipsec,debug,packet IV was saved for next processing:
Jan/08/2022 06:07:36 ipsec,debug,packet 12e18a6b 30579ad3 621d2165 f206f3cc
Jan/08/2022 06:07:36 ipsec,debug,packet encryption(aes)
Jan/08/2022 06:07:36 ipsec,debug,packet with key:
Jan/08/2022 06:07:36 ipsec,debug,packet adb77da3 1daf700b b0320069 ba4a1b22
Jan/08/2022 06:07:36 ipsec,debug,packet decrypted payload by IV:
Jan/08/2022 06:07:36 ipsec,debug,packet 35ffe886 4609ac56 a40d249d 47f10891
Jan/08/2022 06:07:36 ipsec,debug,packet decrypted payload, but not trimed.
Jan/08/2022 06:07:36 ipsec,debug,packet 0b000018 365637a3 feafb1d3 cde664ab e0248772 e215a8c2 00000020 00000001
Jan/08/2022 06:07:36 ipsec,debug,packet 01108d29 0a4f2796 630f5f1d e68afe8c dac5f1e2 00000ecf 00000000 00000000
Jan/08/2022 06:07:36 ipsec,debug,packet padding len=1
Jan/08/2022 06:07:36 ipsec,debug,packet skip to trim padding.
Jan/08/2022 06:07:36 ipsec,debug,packet decrypted.
Jan/08/2022 06:07:36 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 08100501 ceb10de6 0000005c 0b000018
Jan/08/2022 06:07:36 ipsec,debug,packet 365637a3 feafb1d3 cde664ab e0248772 e215a8c2 00000020 00000001 01108d29
Jan/08/2022 06:07:36 ipsec,debug,packet 0a4f2796 630f5f1d e68afe8c dac5f1e2 00000ecf 00000000 00000000
Jan/08/2022 06:07:36 ipsec,debug,packet HASH with:
Jan/08/2022 06:07:36 ipsec,debug,packet ceb10de6 00000020 00000001 01108d29 0a4f2796 630f5f1d e68afe8c dac5f1e2
Jan/08/2022 06:07:36 ipsec,debug,packet 00000ecf
Jan/08/2022 06:07:36 ipsec,debug,packet hmac(hmac_sha1)
Jan/08/2022 06:07:36 ipsec,debug,packet HASH computed:
Jan/08/2022 06:07:36 ipsec,debug,packet 365637a3 feafb1d3 cde664ab e0248772 e215a8c2
Jan/08/2022 06:07:36 ipsec,debug hash validated.
Jan/08/2022 06:07:36 ipsec,debug begin.
Jan/08/2022 06:07:36 ipsec,debug seen nptype=8(hash) len=24
Jan/08/2022 06:07:36 ipsec,debug seen nptype=11(notify) len=32
Jan/08/2022 06:07:36 ipsec,debug succeed.
Jan/08/2022 06:07:36 ipsec,debug 34.198.222.127 notify: R_U_THERE_ACK
Jan/08/2022 06:07:36 ipsec,debug 34.198.222.127 DPD R-U-There-Ack received
Jan/08/2022 06:07:36 ipsec,debug received an R-U-THERE-ACK
 
Sob
Forum Guru
Forum Guru
Posts: 9188
Joined: Mon Apr 20, 2009 9:11 pm

Re: Site-To-Site VPN AWS problem

Sat Jan 08, 2022 3:10 pm

It looks like different config. I see ESP in old log, but AH in new one. Old has ID type IPv4_address, new one has IPv4_subnet.

What is the exact info you got from them, i.e. pameters for tunnel that you're supposed to use?
 
mankomal
Member Candidate
Member Candidate
Topic Author
Posts: 106
Joined: Fri Nov 24, 2006 8:56 am

Re: Site-To-Site VPN AWS problem

Sun Jan 09, 2022 8:31 am

It looks like different config. I see ESP in old log, but AH in new one. Old has ID type IPv4_address, new one has IPv4_subnet.

What is the exact info you got from them, i.e. pameters for tunnel that you're supposed to use?
sorry, I think I had been trying different configurations, below is the config and log. AWS has given config for 6.47 but not for new 6.49.1

/ip ipsec profile
add dh-group=modp1024 dpd-interval=10s dpd-maximum-failures=3 enc-algorithm=\
    aes-128 lifetime=8h name=aws-profile nat-traversal=no
/ip ipsec peer
add address=34.198.222.127/32 local-address=164.52.192.253 name=cgw profile=\
    aws-profile
/ip ipsec proposal
add enc-algorithms=aes-128-cbc lifetime=1h name=awsproposal
/ip ipsec identity
add peer=cgw secret=<secret>
/ip ipsec policy
add dst-address=172.31.0.0/16 peer=cgw proposal=awsproposal src-address=\
    0.0.0.0/0 tunnel=yes
add dst-address=169.254.116.213/32 peer=cgw proposal=awsproposal src-address=\
    0.0.0.0/0 tunnel=yes
add action=none disabled=yes dst-address=164.52.192.253/32 src-address=\
    0.0.0.0/0
add action=none disabled=yes dst-address=172.16.96.0/19 src-address=0.0.0.0/0
add disabled=yes dst-address=0.0.0.0/0 peer=cgw proposal=awsproposal \
    src-address=0.0.0.0/0 tunnel=yes


Jan/09/2022 05:59:13 ipsec IPsec-SA expired: ESP/Tunnel 34.198.222.127[500]->164.52.192.253[500] spi=0xcb64c06
Jan/09/2022 05:59:16 ipsec,debug ===
Jan/09/2022 05:59:16 ipsec,info initiate new phase 1 (Identity Protection): 164.52.192.253[500]<=>34.198.222.127[500]
Jan/09/2022 05:59:16 ipsec,debug new cookie:
Jan/09/2022 05:59:16 ipsec,debug 277e638f3335741e
Jan/09/2022 05:59:16 ipsec,debug add payload of len 52, next type 13
Jan/09/2022 05:59:16 ipsec,debug add payload of len 16, next type 13
Jan/09/2022 05:59:16 ipsec,debug add payload of len 16, next type 0
Jan/09/2022 05:59:16 ipsec,debug 124 bytes from 164.52.192.253[500] to 34.198.222.127[500]
Jan/09/2022 05:59:16 ipsec,debug 1 times of 124 bytes message will be sent to 34.198.222.127[500]
Jan/09/2022 05:59:16 ipsec,debug,packet 277e638f 3335741e 00000000 00000000 01100200 00000000 0000007c 0d000038
Jan/09/2022 05:59:16 ipsec,debug,packet 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c7080
Jan/09/2022 05:59:16 ipsec,debug,packet 80010007 800e0080 80030001 80020002 80040002 0d000014 12f5f28c 457168a9
Jan/09/2022 05:59:16 ipsec,debug,packet 702d9fe2 74cc0100 00000014 afcad713 68a1f1c9 6b8696fc 77570100
Jan/09/2022 05:59:16 ipsec sent phase1 packet 164.52.192.253[500]<=>34.198.222.127[500] 277e638f3335741e:0000000000000000
Jan/09/2022 05:59:17 ipsec,debug ===== received 104 bytes from 34.198.222.127[500] to 164.52.192.253[500]
Jan/09/2022 05:59:17 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 01100200 00000000 00000068 0d000038
Jan/09/2022 05:59:17 ipsec,debug,packet 00000001 00000001 0000002c 01010001 00000024 01010000 80010007 800e0080
Jan/09/2022 05:59:17 ipsec,debug,packet 80020002 80040002 80030001 800b0001 800c7080 00000014 afcad713 68a1f1c9
Jan/09/2022 05:59:17 ipsec,debug,packet 6b8696fc 77570100
Jan/09/2022 05:59:17 ipsec,debug begin.
Jan/09/2022 05:59:17 ipsec,debug seen nptype=1(sa) len=56
Jan/09/2022 05:59:17 ipsec,debug seen nptype=13(vid) len=20
Jan/09/2022 05:59:17 ipsec,debug succeed.
Jan/09/2022 05:59:17 ipsec received Vendor ID: DPD
Jan/09/2022 05:59:17 ipsec,debug remote supports DPD
Jan/09/2022 05:59:17 ipsec,debug total SA len=52
Jan/09/2022 05:59:17 ipsec,debug 00000001 00000001 0000002c 01010001 00000024 01010000 80010007 800e0080
Jan/09/2022 05:59:17 ipsec,debug 80020002 80040002 80030001 800b0001 800c7080
Jan/09/2022 05:59:17 ipsec,debug begin.
Jan/09/2022 05:59:17 ipsec,debug seen nptype=2(prop) len=44
Jan/09/2022 05:59:17 ipsec,debug succeed.
Jan/09/2022 05:59:17 ipsec,debug proposal #1 len=44
Jan/09/2022 05:59:17 ipsec,debug begin.
Jan/09/2022 05:59:17 ipsec,debug seen nptype=3(trns) len=36
Jan/09/2022 05:59:17 ipsec,debug succeed.
Jan/09/2022 05:59:17 ipsec,debug transform #1 len=36
Jan/09/2022 05:59:17 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
Jan/09/2022 05:59:17 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:17 ipsec,debug type=Key Length, flag=0x8000, lorv=128
Jan/09/2022 05:59:17 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
Jan/09/2022 05:59:17 ipsec,debug hash(sha1)
Jan/09/2022 05:59:17 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
Jan/09/2022 05:59:17 ipsec,debug dh(modp1024)
Jan/09/2022 05:59:17 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
Jan/09/2022 05:59:17 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
Jan/09/2022 05:59:17 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800
Jan/09/2022 05:59:17 ipsec,debug pair 1:
Jan/09/2022 05:59:17 ipsec,debug  0x80cee80: next=(nil) tnext=(nil)
Jan/09/2022 05:59:17 ipsec,debug proposal #1: 1 transform
Jan/09/2022 05:59:17 ipsec,debug -checking with pre-shared key auth-
Jan/09/2022 05:59:17 ipsec,debug prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1
Jan/09/2022 05:59:17 ipsec,debug trns#=1, trns-id=IKE
Jan/09/2022 05:59:17 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
Jan/09/2022 05:59:17 ipsec,debug type=Key Length, flag=0x8000, lorv=128
Jan/09/2022 05:59:17 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
Jan/09/2022 05:59:17 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
Jan/09/2022 05:59:17 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
Jan/09/2022 05:59:17 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
Jan/09/2022 05:59:17 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800
Jan/09/2022 05:59:17 ipsec,debug -compare proposal #1: Local:Peer
Jan/09/2022 05:59:17 ipsec,debug (lifetime = 28800:28800)
Jan/09/2022 05:59:17 ipsec,debug (lifebyte = 0:0)
Jan/09/2022 05:59:17 ipsec,debug enctype = AES-CBC:AES-CBC
Jan/09/2022 05:59:17 ipsec,debug (encklen = 128:128)
Jan/09/2022 05:59:17 ipsec,debug hashtype = SHA:SHA
Jan/09/2022 05:59:17 ipsec,debug authmethod = pre-shared key:pre-shared key
Jan/09/2022 05:59:17 ipsec,debug dh_group = 1024-bit MODP group:1024-bit MODP group
Jan/09/2022 05:59:17 ipsec,debug -an acceptable proposal found-
Jan/09/2022 05:59:17 ipsec,debug dh(modp1024)
Jan/09/2022 05:59:17 ipsec,debug -agreed on pre-shared key auth-
Jan/09/2022 05:59:17 ipsec,debug ===
Jan/09/2022 05:59:17 ipsec,debug dh(modp1024)
Jan/09/2022 05:59:17 ipsec,debug,packet compute DH's private.
Jan/09/2022 05:59:17 ipsec,debug,packet 64a2a3a3 d6de8f4b 28fa5df3 e449dc2c 10fa2d72 60b787b7 4f0c2549 84f8475d
Jan/09/2022 05:59:17 ipsec,debug,packet 7458cc6b 490b9af9 5867c3bf a70370ae 5c78c9af 9fe15112 5638679d f7b79c84
Jan/09/2022 05:59:17 ipsec,debug,packet 75b5270b c35a73ea 381a6261 b18f5a9b 0a9d8b91 96192d52 dd8c8d5a bf53bf2c
Jan/09/2022 05:59:17 ipsec,debug,packet ae340420 e1f84279 e0c6514f a9d5893b f6f95b5b 8fd37fc1 0ac6fe23 7bf1b20b
Jan/09/2022 05:59:17 ipsec,debug,packet compute DH's public.
Jan/09/2022 05:59:17 ipsec,debug,packet aa31e06a ee1351fe 55cdba32 0f840350 3bdc25b0 28639d8b 3e32909d e5c290bf
Jan/09/2022 05:59:17 ipsec,debug,packet 06ca4535 060f8bd4 8876fb49 4733a9f0 97cc8f03 1c7a105d 2be5a70e 2112d934
Jan/09/2022 05:59:17 ipsec,debug,packet 05c2a343 948fb231 a739b1c6 4a35d848 9f715fae d5ec7b17 3891cc4d 1596a6de
Jan/09/2022 05:59:17 ipsec,debug,packet 5c461f52 1375b695 2405c4ff fb8f8559 fc71f1ae 7369cef7 5991205c 42a09cf9
Jan/09/2022 05:59:17 ipsec,debug add payload of len 128, next type 10
Jan/09/2022 05:59:17 ipsec,debug add payload of len 24, next type 0
Jan/09/2022 05:59:17 ipsec,debug 188 bytes from 164.52.192.253[500] to 34.198.222.127[500]
Jan/09/2022 05:59:17 ipsec,debug 1 times of 188 bytes message will be sent to 34.198.222.127[500]
Jan/09/2022 05:59:17 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 04100200 00000000 000000bc 0a000084
Jan/09/2022 05:59:17 ipsec,debug,packet aa31e06a ee1351fe 55cdba32 0f840350 3bdc25b0 28639d8b 3e32909d e5c290bf
Jan/09/2022 05:59:17 ipsec,debug,packet 06ca4535 060f8bd4 8876fb49 4733a9f0 97cc8f03 1c7a105d 2be5a70e 2112d934
Jan/09/2022 05:59:17 ipsec,debug,packet 05c2a343 948fb231 a739b1c6 4a35d848 9f715fae d5ec7b17 3891cc4d 1596a6de
Jan/09/2022 05:59:17 ipsec,debug,packet 5c461f52 1375b695 2405c4ff fb8f8559 fc71f1ae 7369cef7 5991205c 42a09cf9
Jan/09/2022 05:59:17 ipsec,debug,packet 0000001c d37e9d29 8851bdcf 5e6c6927 5ede44ec 9a10cd52 72993db7
Jan/09/2022 05:59:17 ipsec sent phase1 packet 164.52.192.253[500]<=>34.198.222.127[500] 277e638f3335741e:4ca28af1a26d85ef
Jan/09/2022 05:59:17 ipsec,debug ===== received 196 bytes from 34.198.222.127[500] to 164.52.192.253[500]
Jan/09/2022 05:59:17 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 04100200 00000000 000000c4 0a000084
Jan/09/2022 05:59:17 ipsec,debug,packet 5f57d485 4a2750ee 0990dfa2 2e7e194c ab1df946 9d2f8932 e31ab0e9 f3cad021
Jan/09/2022 05:59:17 ipsec,debug,packet f0407666 57c7d058 a65d0788 2cb40abc c1f8049d 988a922d 669c961c 365db442
Jan/09/2022 05:59:17 ipsec,debug,packet ef3d1d3c f3994e6d d77fbe63 5585bc28 05170bae 4f11d768 6c6d63e7 51cdc8aa
Jan/09/2022 05:59:17 ipsec,debug,packet fe2708c4 5e0d0eb3 81d1186f 4469d836 496f8f7b 2fa8f348 a9c05b77 11d87551
Jan/09/2022 05:59:17 ipsec,debug,packet 00000024 1021f2cc 99f9ad83 4987abb1 ddffc944 b9276d68 1c769854 27cc8c8f
Jan/09/2022 05:59:17 ipsec,debug,packet 320d38e9
Jan/09/2022 05:59:17 ipsec,debug begin.
Jan/09/2022 05:59:17 ipsec,debug seen nptype=4(ke) len=132
Jan/09/2022 05:59:17 ipsec,debug seen nptype=10(nonce) len=36
Jan/09/2022 05:59:17 ipsec,debug succeed.
Jan/09/2022 05:59:17 ipsec,debug ===
Jan/09/2022 05:59:17 ipsec,debug dh(modp1024)
Jan/09/2022 05:59:17 ipsec,debug,packet compute DH's shared.
Jan/09/2022 05:59:17 ipsec,debug,packet 
Jan/09/2022 05:59:17 ipsec,debug,packet b647231d 94c6a5d5 2644bc8a 2265bc9d 66f7edc0 8cd9d74f e254f4dc ef29cbf0
Jan/09/2022 05:59:17 ipsec,debug,packet ed0e9e84 396c1aa1 6f84187b 7967ae6c ba1b0b78 31f7e7d5 8dda00a8 f7381ab7
Jan/09/2022 05:59:17 ipsec,debug,packet b0b34a4a b9f27fbd be349969 d8ceea9a 5726c546 6e1dea1b f704e442 649e4cc4
Jan/09/2022 05:59:17 ipsec,debug,packet b721b7dc 87cbf856 da37b74e 4aec37a6 42e79470 7b7310cf 11717438 f005866e
Jan/09/2022 05:59:17 ipsec,debug nonce 1: 
Jan/09/2022 05:59:17 ipsec,debug d37e9d29 8851bdcf 5e6c6927 5ede44ec 9a10cd52 72993db7
Jan/09/2022 05:59:17 ipsec,debug nonce 2: 
Jan/09/2022 05:59:17 ipsec,debug 1021f2cc 99f9ad83 4987abb1 ddffc944 b9276d68 1c769854 27cc8c8f 320d38e9
Jan/09/2022 05:59:17 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 05:59:17 ipsec,debug SKEYID computed:
Jan/09/2022 05:59:17 ipsec,debug 66ab2066 f804dd59 88ff952e 1debbb86 4879b338
Jan/09/2022 05:59:17 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 05:59:17 ipsec,debug SKEYID_d computed:
Jan/09/2022 05:59:17 ipsec,debug b8e76239 2d527c4b 3450e942 3234e339 b1190a47
Jan/09/2022 05:59:17 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 05:59:17 ipsec,debug SKEYID_a computed:
Jan/09/2022 05:59:17 ipsec,debug 899abaa3 f48f77ac a8e16329 8dc5ab14 866fff55
Jan/09/2022 05:59:17 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 05:59:17 ipsec,debug SKEYID_e computed:
Jan/09/2022 05:59:17 ipsec,debug e05a602d 3b4b2498 2bfd28f2 4a0922ef 63e2a015
Jan/09/2022 05:59:17 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:17 ipsec,debug hash(sha1)
Jan/09/2022 05:59:17 ipsec,debug final encryption key computed:
Jan/09/2022 05:59:17 ipsec,debug e05a602d 3b4b2498 2bfd28f2 4a0922ef
Jan/09/2022 05:59:17 ipsec,debug hash(sha1)
Jan/09/2022 05:59:17 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:17 ipsec,debug IV computed:
Jan/09/2022 05:59:17 ipsec,debug c5324130 82116201 ed1b5bfc a20e9aaf
Jan/09/2022 05:59:17 ipsec,debug use ID type of IPv4_address
Jan/09/2022 05:59:17 ipsec,debug,packet HASH with:
Jan/09/2022 05:59:17 ipsec,debug,packet aa31e06a ee1351fe 55cdba32 0f840350 3bdc25b0 28639d8b 3e32909d e5c290bf
Jan/09/2022 05:59:17 ipsec,debug,packet 06ca4535 060f8bd4 8876fb49 4733a9f0 97cc8f03 1c7a105d 2be5a70e 2112d934
Jan/09/2022 05:59:17 ipsec,debug,packet 05c2a343 948fb231 a739b1c6 4a35d848 9f715fae d5ec7b17 3891cc4d 1596a6de
Jan/09/2022 05:59:17 ipsec,debug,packet 5c461f52 1375b695 2405c4ff fb8f8559 fc71f1ae 7369cef7 5991205c 42a09cf9
Jan/09/2022 05:59:17 ipsec,debug,packet 5f57d485 4a2750ee 0990dfa2 2e7e194c ab1df946 9d2f8932 e31ab0e9 f3cad021
Jan/09/2022 05:59:17 ipsec,debug,packet f0407666 57c7d058 a65d0788 2cb40abc c1f8049d 988a922d 669c961c 365db442
Jan/09/2022 05:59:17 ipsec,debug,packet ef3d1d3c f3994e6d d77fbe63 5585bc28 05170bae 4f11d768 6c6d63e7 51cdc8aa
Jan/09/2022 05:59:17 ipsec,debug,packet fe2708c4 5e0d0eb3 81d1186f 4469d836 496f8f7b 2fa8f348 a9c05b77 11d87551
Jan/09/2022 05:59:17 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 00000001 00000001 0000002c 01010001
Jan/09/2022 05:59:17 ipsec,debug,packet 00000024 01010000 800b0001 800c7080 80010007 800e0080 80030001 80020002
Jan/09/2022 05:59:17 ipsec,debug,packet 80040002 011101f4 a434c0fd
Jan/09/2022 05:59:17 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 05:59:17 ipsec,debug,packet HASH computed:
Jan/09/2022 05:59:17 ipsec,debug,packet 85cec8ac 4e357f77 f3d440fb 1c27e91a fa96ec0c
Jan/09/2022 05:59:17 ipsec,debug add payload of len 8, next type 8
Jan/09/2022 05:59:17 ipsec,debug add payload of len 20, next type 0
Jan/09/2022 05:59:17 ipsec,debug,packet begin encryption.
Jan/09/2022 05:59:17 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:17 ipsec,debug,packet pad length = 12
Jan/09/2022 05:59:17 ipsec,debug,packet 0800000c 011101f4 a434c0fd 00000018 85cec8ac 4e357f77 f3d440fb 1c27e91a
Jan/09/2022 05:59:17 ipsec,debug,packet fa96ec0c 8f80bd80 a0db93fc 8a88ee0b
Jan/09/2022 05:59:17 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:17 ipsec,debug,packet with key:
Jan/09/2022 05:59:17 ipsec,debug,packet e05a602d 3b4b2498 2bfd28f2 4a0922ef
Jan/09/2022 05:59:17 ipsec,debug,packet encrypted payload by IV:
Jan/09/2022 05:59:17 ipsec,debug,packet c5324130 82116201 ed1b5bfc a20e9aaf
Jan/09/2022 05:59:17 ipsec,debug,packet save IV for next:
Jan/09/2022 05:59:17 ipsec,debug,packet e05d81b5 bdd0a6b5 1786cfa7 5d5a9323
Jan/09/2022 05:59:17 ipsec,debug,packet encrypted.
Jan/09/2022 05:59:17 ipsec,debug 76 bytes from 164.52.192.253[500] to 34.198.222.127[500]
Jan/09/2022 05:59:17 ipsec,debug 1 times of 76 bytes message will be sent to 34.198.222.127[500]
Jan/09/2022 05:59:17 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 05100201 00000000 0000004c 3407cf71
Jan/09/2022 05:59:17 ipsec,debug,packet 423ef6d9 48da3813 d413261c 28035589 5d44e975 e81e899f 1b1bcabd e05d81b5
Jan/09/2022 05:59:17 ipsec,debug,packet bdd0a6b5 1786cfa7 5d5a9323
Jan/09/2022 05:59:17 ipsec sent phase1 packet 164.52.192.253[500]<=>34.198.222.127[500] 277e638f3335741e:4ca28af1a26d85ef
Jan/09/2022 05:59:17 ipsec,debug ===== received 76 bytes from 34.198.222.127[500] to 164.52.192.253[500]
Jan/09/2022 05:59:17 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 05100201 00000000 0000004c 6eb5e32c
Jan/09/2022 05:59:17 ipsec,debug,packet e5824851 bfa5834f 1e7d495a c068824d fceb1aa5 5e96fbe7 345703e3 8ab23710
Jan/09/2022 05:59:17 ipsec,debug,packet 6c8fefd7 dbc96101 adc7e88d
Jan/09/2022 05:59:17 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:17 ipsec,debug,packet IV was saved for next processing:
Jan/09/2022 05:59:17 ipsec,debug,packet 8ab23710 6c8fefd7 dbc96101 adc7e88d
Jan/09/2022 05:59:17 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:17 ipsec,debug,packet with key:
Jan/09/2022 05:59:17 ipsec,debug,packet e05a602d 3b4b2498 2bfd28f2 4a0922ef
Jan/09/2022 05:59:17 ipsec,debug,packet decrypted payload by IV:
Jan/09/2022 05:59:17 ipsec,debug,packet e05d81b5 bdd0a6b5 1786cfa7 5d5a9323
Jan/09/2022 05:59:17 ipsec,debug,packet decrypted payload, but not trimed.
Jan/09/2022 05:59:17 ipsec,debug,packet 0800000c 01000000 22c6de7f 00000018 06df4a56 9fe22683 64be07b7 5f928d50
Jan/09/2022 05:59:17 ipsec,debug,packet 8e06f1db 00000000 00000000 00000000
Jan/09/2022 05:59:17 ipsec,debug,packet padding len=1
Jan/09/2022 05:59:17 ipsec,debug,packet skip to trim padding.
Jan/09/2022 05:59:17 ipsec,debug,packet decrypted.
Jan/09/2022 05:59:17 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 05100201 00000000 0000004c 0800000c
Jan/09/2022 05:59:17 ipsec,debug,packet 01000000 22c6de7f 00000018 06df4a56 9fe22683 64be07b7 5f928d50 8e06f1db
Jan/09/2022 05:59:17 ipsec,debug,packet 00000000 00000000 00000000
Jan/09/2022 05:59:17 ipsec,debug begin.
Jan/09/2022 05:59:17 ipsec,debug seen nptype=5(id) len=12
Jan/09/2022 05:59:17 ipsec,debug seen nptype=8(hash) len=24
Jan/09/2022 05:59:17 ipsec,debug succeed.
Jan/09/2022 05:59:17 ipsec,debug HASH received:
Jan/09/2022 05:59:17 ipsec,debug 06df4a56 9fe22683 64be07b7 5f928d50 8e06f1db
Jan/09/2022 05:59:17 ipsec,debug,packet HASH with:
Jan/09/2022 05:59:17 ipsec,debug,packet 5f57d485 4a2750ee 0990dfa2 2e7e194c ab1df946 9d2f8932 e31ab0e9 f3cad021
Jan/09/2022 05:59:17 ipsec,debug,packet f0407666 57c7d058 a65d0788 2cb40abc c1f8049d 988a922d 669c961c 365db442
Jan/09/2022 05:59:17 ipsec,debug,packet ef3d1d3c f3994e6d d77fbe63 5585bc28 05170bae 4f11d768 6c6d63e7 51cdc8aa
Jan/09/2022 05:59:17 ipsec,debug,packet fe2708c4 5e0d0eb3 81d1186f 4469d836 496f8f7b 2fa8f348 a9c05b77 11d87551
Jan/09/2022 05:59:17 ipsec,debug,packet aa31e06a ee1351fe 55cdba32 0f840350 3bdc25b0 28639d8b 3e32909d e5c290bf
Jan/09/2022 05:59:17 ipsec,debug,packet 06ca4535 060f8bd4 8876fb49 4733a9f0 97cc8f03 1c7a105d 2be5a70e 2112d934
Jan/09/2022 05:59:17 ipsec,debug,packet 05c2a343 948fb231 a739b1c6 4a35d848 9f715fae d5ec7b17 3891cc4d 1596a6de
Jan/09/2022 05:59:17 ipsec,debug,packet 5c461f52 1375b695 2405c4ff fb8f8559 fc71f1ae 7369cef7 5991205c 42a09cf9
Jan/09/2022 05:59:17 ipsec,debug,packet 4ca28af1 a26d85ef 277e638f 3335741e 00000001 00000001 0000002c 01010001
Jan/09/2022 05:59:17 ipsec,debug,packet 00000024 01010000 800b0001 800c7080 80010007 800e0080 80030001 80020002
Jan/09/2022 05:59:17 ipsec,debug,packet 80040002 01000000 22c6de7f
Jan/09/2022 05:59:17 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 05:59:17 ipsec,debug,packet HASH computed:
Jan/09/2022 05:59:17 ipsec,debug,packet 06df4a56 9fe22683 64be07b7 5f928d50 8e06f1db
Jan/09/2022 05:59:17 ipsec,debug HASH for PSK validated.
Jan/09/2022 05:59:17 ipsec,debug 34.198.222.127 peer's ID:
Jan/09/2022 05:59:17 ipsec,debug 01000000 22c6de7f
Jan/09/2022 05:59:17 ipsec,debug ===
Jan/09/2022 05:59:17 ipsec ph2 possible after ph1 creation
Jan/09/2022 05:59:17 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=0:0)
Jan/09/2022 05:59:17 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
Jan/09/2022 05:59:17 ipsec,debug begin QUICK mode.
Jan/09/2022 05:59:17 ipsec,debug ===
Jan/09/2022 05:59:17 ipsec,debug begin QUICK mode.
Jan/09/2022 05:59:17 ipsec initiate new phase 2 negotiation: 164.52.192.253[500]<=>34.198.222.127[500]
Jan/09/2022 05:59:17 ipsec,debug,packet compute IV for phase2
Jan/09/2022 05:59:17 ipsec,debug,packet phase1 last IV:
Jan/09/2022 05:59:17 ipsec,debug,packet 8ab23710 6c8fefd7 dbc96101 adc7e88d dbfb5a75
Jan/09/2022 05:59:17 ipsec,debug hash(sha1)
Jan/09/2022 05:59:17 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:17 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 05:59:17 ipsec,debug,packet bc30c5b2 b22fb4a0 a0debd48 a2b5b547
Jan/09/2022 05:59:17 ipsec,debug call pfkey_send_getspi b6
Jan/09/2022 05:59:17 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 34.198.222.127[500]->164.52.192.253[500] 
Jan/09/2022 05:59:17 ipsec,debug pfkey getspi sent.
Jan/09/2022 05:59:17 ipsec,info ISAKMP-SA established 164.52.192.253[500]-34.198.222.127[500] spi:277e638f3335741e:4ca28af1a26d85ef
Jan/09/2022 05:59:17 ipsec,debug ===
Jan/09/2022 05:59:17 ipsec,debug dh(modp1024)
Jan/09/2022 05:59:17 ipsec,debug dh(modp1024)
Jan/09/2022 05:59:17 ipsec,debug dh(modp1024)
Jan/09/2022 05:59:17 ipsec,debug,packet compute DH's private.
Jan/09/2022 05:59:17 ipsec,debug,packet 610c9275 5ca87baa 7c09d202 89859f05 3023664e 9c3ce0f6 b01f30d0 aa7f8c86
Jan/09/2022 05:59:17 ipsec,debug,packet 8f1a711a 77f19694 33dd9746 db4a2122 af50fe7a c17d35be 1a9864fe 2e1117a0
Jan/09/2022 05:59:17 ipsec,debug,packet e6a7285e 10ec03d6 e6ce3ed2 1ee67ee6 45636187 ba50b95e 5af1b9b4 14b84bd8
Jan/09/2022 05:59:17 ipsec,debug,packet 0094cca5 43e2b132 65dff56e b90b69aa 51bb81ce cf0315fd 6a190b86 e79c255a
Jan/09/2022 05:59:17 ipsec,debug,packet compute DH's public.
Jan/09/2022 05:59:17 ipsec,debug,packet bb77962f 50df8be7 9f4e6935 de50f139 52414d52 0d748781 79e53c99 9e39690b
Jan/09/2022 05:59:17 ipsec,debug,packet fd0811dd 9e0b6276 579cc7b3 49a7b93a cead3aae 88754ed4 0a802932 9371d7f7
Jan/09/2022 05:59:17 ipsec,debug,packet 256ce393 ba4c5f3f 58558a6e c50b47d0 5b8b944e 4a2e80fc 8511334d 18b89d2b
Jan/09/2022 05:59:17 ipsec,debug,packet 0ffab434 d531a2ff 0b4aba84 1b77a97f 581373f9 05820b39 39483693 d3d77aa5
Jan/09/2022 05:59:17 ipsec,debug use local ID type IPv4_subnet
Jan/09/2022 05:59:17 ipsec,debug use remote ID type IPv4_subnet
Jan/09/2022 05:59:17 ipsec,debug IDci:
Jan/09/2022 05:59:17 ipsec,debug 04000000 00000000 00000000
Jan/09/2022 05:59:17 ipsec,debug IDcr:
Jan/09/2022 05:59:17 ipsec,debug 04000000 ac1f0000 ffff0000
Jan/09/2022 05:59:17 ipsec,debug add payload of len 52, next type 10
Jan/09/2022 05:59:17 ipsec,debug add payload of len 24, next type 4
Jan/09/2022 05:59:17 ipsec,debug add payload of len 128, next type 5
Jan/09/2022 05:59:17 ipsec,debug add payload of len 12, next type 5
Jan/09/2022 05:59:17 ipsec,debug add payload of len 12, next type 0
Jan/09/2022 05:59:17 ipsec,debug,packet HASH with:
Jan/09/2022 05:59:17 ipsec,debug,packet dbfb5a75 0a000038 00000001 00000001 0000002c 01030401 099e3b54 00000020
Jan/09/2022 05:59:17 ipsec,debug,packet 010c0000 80010001 80020e10 80040001 80060080 80050002 80030002 0400001c
Jan/09/2022 05:59:17 ipsec,debug,packet f26bac95 a9d4fee0 a684d910 63bd44ac b2ddf0d6 b9dddc90 05000084 bb77962f
Jan/09/2022 05:59:17 ipsec,debug,packet 50df8be7 9f4e6935 de50f139 52414d52 0d748781 79e53c99 9e39690b fd0811dd
Jan/09/2022 05:59:17 ipsec,debug,packet 9e0b6276 579cc7b3 49a7b93a cead3aae 88754ed4 0a802932 9371d7f7 256ce393
Jan/09/2022 05:59:17 ipsec,debug,packet ba4c5f3f 58558a6e c50b47d0 5b8b944e 4a2e80fc 8511334d 18b89d2b 0ffab434
Jan/09/2022 05:59:17 ipsec,debug,packet d531a2ff 0b4aba84 1b77a97f 581373f9 05820b39 39483693 d3d77aa5 05000010
Jan/09/2022 05:59:17 ipsec,debug,packet 04000000 00000000 00000000 00000010 04000000 ac1f0000 ffff0000
Jan/09/2022 05:59:17 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 05:59:17 ipsec,debug,packet HASH computed:
Jan/09/2022 05:59:17 ipsec,debug,packet d5ce967a 35cff39c fabcde1b 363d4ddd b0b65f65
Jan/09/2022 05:59:17 ipsec,debug add payload of len 20, next type 1
Jan/09/2022 05:59:17 ipsec,debug,packet begin encryption.
Jan/09/2022 05:59:17 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:17 ipsec,debug,packet pad length = 16
Jan/09/2022 05:59:17 ipsec,debug,packet 01000018 d5ce967a 35cff39c fabcde1b 363d4ddd b0b65f65 0a000038 00000001
Jan/09/2022 05:59:17 ipsec,debug,packet 00000001 0000002c 01030401 099e3b54 00000020 010c0000 80010001 80020e10
Jan/09/2022 05:59:17 ipsec,debug,packet 80040001 80060080 80050002 80030002 0400001c f26bac95 a9d4fee0 a684d910
Jan/09/2022 05:59:17 ipsec,debug,packet 63bd44ac b2ddf0d6 b9dddc90 05000084 bb77962f 50df8be7 9f4e6935 de50f139
Jan/09/2022 05:59:17 ipsec,debug,packet 52414d52 0d748781 79e53c99 9e39690b fd0811dd 9e0b6276 579cc7b3 49a7b93a
Jan/09/2022 05:59:17 ipsec,debug,packet cead3aae 88754ed4 0a802932 9371d7f7 256ce393 ba4c5f3f 58558a6e c50b47d0
Jan/09/2022 05:59:17 ipsec,debug,packet 5b8b944e 4a2e80fc 8511334d 18b89d2b 0ffab434 d531a2ff 0b4aba84 1b77a97f
Jan/09/2022 05:59:17 ipsec,debug,packet 581373f9 05820b39 39483693 d3d77aa5 05000010 04000000 00000000 00000000
Jan/09/2022 05:59:17 ipsec,debug,packet 00000010 04000000 ac1f0000 ffff0000 fed5fbc7 afced68a b6dbebfa a8cb8e0f
Jan/09/2022 05:59:17 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:17 ipsec,debug,packet with key:
Jan/09/2022 05:59:17 ipsec,debug,packet e05a602d 3b4b2498 2bfd28f2 4a0922ef
Jan/09/2022 05:59:17 ipsec,debug,packet encrypted payload by IV:
Jan/09/2022 05:59:17 ipsec,debug,packet bc30c5b2 b22fb4a0 a0debd48 a2b5b547
Jan/09/2022 05:59:17 ipsec,debug,packet save IV for next:
Jan/09/2022 05:59:17 ipsec,debug,packet 1f63d551 a3a6f97b 30f8f837 c2c0aca6
Jan/09/2022 05:59:17 ipsec,debug,packet encrypted.
Jan/09/2022 05:59:17 ipsec,debug 316 bytes from 164.52.192.253[500] to 34.198.222.127[500]
Jan/09/2022 05:59:17 ipsec,debug 1 times of 316 bytes message will be sent to 34.198.222.127[500]
Jan/09/2022 05:59:17 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 08102001 dbfb5a75 0000013c 1990e71c
Jan/09/2022 05:59:17 ipsec,debug,packet 910b9794 f2437839 8480705b 64baca45 dcb28dfa 736582fe 57009383 153265d0
Jan/09/2022 05:59:17 ipsec,debug,packet 2ee7f9c7 a0aa7f9a fe54a305 a68d170b e68d3fe6 8284131b a5044eaf c8c0c7cf
Jan/09/2022 05:59:17 ipsec,debug,packet a1a96dbc b4a02732 83545d55 9301c177 9c8a8494 27268b07 40044d1a d4369d2d
Jan/09/2022 05:59:17 ipsec,debug,packet 04332540 4b667778 7af7ea27 fcd2b5b4 200e6f64 3d4224d4 fc0b477b ecc3cc16
Jan/09/2022 05:59:17 ipsec,debug,packet 471d0dd2 7f3061dd a408e519 0ea1c3d0 8fdea519 a63f6400 2e37c68b f6c9afcd
Jan/09/2022 05:59:17 ipsec,debug,packet ecdae933 4b1130d4 b0b4c642 04999995 81b4e6a2 c48ecbd2 9a773a31 9f23cd32
Jan/09/2022 05:59:17 ipsec,debug,packet 5ac1775b 9443474c 4e6fb7a0 36e2ad4e 4e2d1ac1 15944196 35ea3b10 ffe0a402
Jan/09/2022 05:59:17 ipsec,debug,packet 98b4b009 ff03c872 b5c176c3 702408c6 aff50403 266b1d8b eef02159 95d734dd
Jan/09/2022 05:59:17 ipsec,debug,packet 5d5db35d d31e73a0 074f1e68 1f63d551 a3a6f97b 30f8f837 c2c0aca6
Jan/09/2022 05:59:17 ipsec sent phase2 packet 164.52.192.253[500]<=>34.198.222.127[500] 277e638f3335741e:4ca28af1a26d85ef:0000dbfb
Jan/09/2022 05:59:17 ipsec,debug ===== received 76 bytes from 34.198.222.127[500] to 164.52.192.253[500]
Jan/09/2022 05:59:17 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 08100501 a91d11f0 0000004c 09f0c060
Jan/09/2022 05:59:17 ipsec,debug,packet a0b9d873 bacb21ee 87ef3bb3 e08d7682 545353de b0acfc72 72e618ff 8c84759c
Jan/09/2022 05:59:17 ipsec,debug,packet eff2b26e 0032d874 86c07749
Jan/09/2022 05:59:17 ipsec,debug receive Information.
Jan/09/2022 05:59:17 ipsec,debug,packet compute IV for phase2
Jan/09/2022 05:59:17 ipsec,debug,packet phase1 last IV:
Jan/09/2022 05:59:17 ipsec,debug,packet 8ab23710 6c8fefd7 dbc96101 adc7e88d a91d11f0
Jan/09/2022 05:59:17 ipsec,debug hash(sha1)
Jan/09/2022 05:59:17 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:17 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 05:59:17 ipsec,debug,packet e274c899 d296c6c4 b5f5d8fa a2f3d93a
Jan/09/2022 05:59:17 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:17 ipsec,debug,packet IV was saved for next processing:
Jan/09/2022 05:59:17 ipsec,debug,packet 8c84759c eff2b26e 0032d874 86c07749
Jan/09/2022 05:59:17 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:17 ipsec,debug,packet with key:
Jan/09/2022 05:59:17 ipsec,debug,packet e05a602d 3b4b2498 2bfd28f2 4a0922ef
Jan/09/2022 05:59:17 ipsec,debug,packet decrypted payload by IV:
Jan/09/2022 05:59:17 ipsec,debug,packet e274c899 d296c6c4 b5f5d8fa a2f3d93a
Jan/09/2022 05:59:17 ipsec,debug,packet decrypted payload, but not trimed.
Jan/09/2022 05:59:17 ipsec,debug,packet 0b000018 8f96301f b058d7dd e031857c 5d0b5136 6b551535 00000010 00000001
Jan/09/2022 05:59:17 ipsec,debug,packet 03040012 00000000 00000000 00000000
Jan/09/2022 05:59:17 ipsec,debug,packet padding len=1
Jan/09/2022 05:59:17 ipsec,debug,packet skip to trim padding.
Jan/09/2022 05:59:17 ipsec,debug,packet decrypted.
Jan/09/2022 05:59:17 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 08100501 a91d11f0 0000004c 0b000018
Jan/09/2022 05:59:17 ipsec,debug,packet 8f96301f b058d7dd e031857c 5d0b5136 6b551535 00000010 00000001 03040012
Jan/09/2022 05:59:17 ipsec,debug,packet 00000000 00000000 00000000
Jan/09/2022 05:59:17 ipsec,debug,packet HASH with:
Jan/09/2022 05:59:17 ipsec,debug,packet a91d11f0 00000010 00000001 03040012 00000000
Jan/09/2022 05:59:17 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 05:59:17 ipsec,debug,packet HASH computed:
Jan/09/2022 05:59:17 ipsec,debug,packet 8f96301f b058d7dd e031857c 5d0b5136 6b551535
Jan/09/2022 05:59:17 ipsec,debug hash validated.
Jan/09/2022 05:59:17 ipsec,debug begin.
Jan/09/2022 05:59:17 ipsec,debug seen nptype=8(hash) len=24
Jan/09/2022 05:59:17 ipsec,debug seen nptype=11(notify) len=16
Jan/09/2022 05:59:17 ipsec,debug succeed.
Jan/09/2022 05:59:17 ipsec,debug 34.198.222.127 notify: INVALID-ID-INFORMATION
Jan/09/2022 05:59:17 ipsec 34.198.222.127 fatal INVALID-ID-INFORMATION notify messsage, phase1 should be deleted.
Jan/09/2022 05:59:17 ipsec,debug 34.198.222.127 notification message 18:INVALID-ID-INFORMATION, doi=1 proto_id=3 spi=00000000D_Uw(size=4).
Jan/09/2022 05:59:27 ipsec,debug 34.198.222.127 DPD monitoring....
Jan/09/2022 05:59:27 ipsec,debug,packet compute IV for phase2
Jan/09/2022 05:59:27 ipsec,debug,packet phase1 last IV:
Jan/09/2022 05:59:27 ipsec,debug,packet 8ab23710 6c8fefd7 dbc96101 adc7e88d 8b22e3de
Jan/09/2022 05:59:27 ipsec,debug hash(sha1)
Jan/09/2022 05:59:27 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:27 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 05:59:27 ipsec,debug,packet dd83edb3 b4b55664 bb5d058d c39e0911
Jan/09/2022 05:59:27 ipsec,debug,packet HASH with:
Jan/09/2022 05:59:27 ipsec,debug,packet 8b22e3de 00000020 00000001 01108d28 277e638f 3335741e 4ca28af1 a26d85ef
Jan/09/2022 05:59:27 ipsec,debug,packet 0000028b
Jan/09/2022 05:59:27 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 05:59:27 ipsec,debug,packet HASH computed:
Jan/09/2022 05:59:27 ipsec,debug,packet 3a5086eb 8d2071d1 12874fa6 537d291f 5bd6660b
Jan/09/2022 05:59:27 ipsec,debug,packet begin encryption.
Jan/09/2022 05:59:27 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:27 ipsec,debug,packet pad length = 8
Jan/09/2022 05:59:27 ipsec,debug,packet 0b000018 3a5086eb 8d2071d1 12874fa6 537d291f 5bd6660b 00000020 00000001
Jan/09/2022 05:59:27 ipsec,debug,packet 01108d28 277e638f 3335741e 4ca28af1 a26d85ef 0000028b d3b1c885 a1c3e907
Jan/09/2022 05:59:27 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:27 ipsec,debug,packet with key:
Jan/09/2022 05:59:27 ipsec,debug,packet e05a602d 3b4b2498 2bfd28f2 4a0922ef
Jan/09/2022 05:59:27 ipsec,debug,packet encrypted payload by IV:
Jan/09/2022 05:59:27 ipsec,debug,packet dd83edb3 b4b55664 bb5d058d c39e0911
Jan/09/2022 05:59:27 ipsec,debug,packet save IV for next:
Jan/09/2022 05:59:27 ipsec,debug,packet f5a48acd a4576ef9 42660c32 34028a23
Jan/09/2022 05:59:27 ipsec,debug,packet encrypted.
Jan/09/2022 05:59:27 ipsec,debug 92 bytes from 164.52.192.253[500] to 34.198.222.127[500]
Jan/09/2022 05:59:27 ipsec,debug 1 times of 92 bytes message will be sent to 34.198.222.127[500]
Jan/09/2022 05:59:27 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 08100501 8b22e3de 0000005c 3fbed5d1
Jan/09/2022 05:59:27 ipsec,debug,packet e345b0bd 55aac5fe 23ab599d 80bb4371 2b5f1571 1643091a 774cb8ad 54c37ec4
Jan/09/2022 05:59:27 ipsec,debug,packet 1f21a3a4 0d353b6e 01625c61 f5a48acd a4576ef9 42660c32 34028a23
Jan/09/2022 05:59:27 ipsec,debug sendto Information notify.
Jan/09/2022 05:59:27 ipsec,debug 34.198.222.127 DPD R-U-There sent (0)
Jan/09/2022 05:59:27 ipsec,debug 34.198.222.127 rescheduling send_r_u (5).
Jan/09/2022 05:59:27 ipsec,debug ===== received 92 bytes from 34.198.222.127[500] to 164.52.192.253[500]
Jan/09/2022 05:59:27 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 08100501 f7785907 0000005c deb4a0b4
Jan/09/2022 05:59:27 ipsec,debug,packet 636217ee decddd6e 33d2a537 44a8dd4a cf731e67 f82968cc bc5923d5 570841e9
Jan/09/2022 05:59:27 ipsec,debug,packet dc2c78cc a225f99b a289c1da 4f9a90a0 d22ef744 fd152dd3 a5dc5128
Jan/09/2022 05:59:27 ipsec,debug receive Information.
Jan/09/2022 05:59:27 ipsec,debug,packet compute IV for phase2
Jan/09/2022 05:59:27 ipsec,debug,packet phase1 last IV:
Jan/09/2022 05:59:27 ipsec,debug,packet 8ab23710 6c8fefd7 dbc96101 adc7e88d f7785907
Jan/09/2022 05:59:27 ipsec,debug hash(sha1)
Jan/09/2022 05:59:27 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:27 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 05:59:27 ipsec,debug,packet a585ef96 0b587392 0b122a3b 3c8292d4
Jan/09/2022 05:59:27 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:27 ipsec,debug,packet IV was saved for next processing:
Jan/09/2022 05:59:27 ipsec,debug,packet 4f9a90a0 d22ef744 fd152dd3 a5dc5128
Jan/09/2022 05:59:27 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:27 ipsec,debug,packet with key:
Jan/09/2022 05:59:27 ipsec,debug,packet e05a602d 3b4b2498 2bfd28f2 4a0922ef
Jan/09/2022 05:59:27 ipsec,debug,packet decrypted payload by IV:
Jan/09/2022 05:59:27 ipsec,debug,packet a585ef96 0b587392 0b122a3b 3c8292d4
Jan/09/2022 05:59:27 ipsec,debug,packet decrypted payload, but not trimed.
Jan/09/2022 05:59:27 ipsec,debug,packet 0b000018 68154b2e 048d4058 00022945 d7e66b15 c42db40c 00000020 00000001
Jan/09/2022 05:59:27 ipsec,debug,packet 01108d28 277e638f 3335741e 4ca28af1 a26d85ef 1eceef30 00000000 00000000
Jan/09/2022 05:59:27 ipsec,debug,packet padding len=1
Jan/09/2022 05:59:27 ipsec,debug,packet skip to trim padding.
Jan/09/2022 05:59:27 ipsec,debug,packet decrypted.
Jan/09/2022 05:59:27 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 08100501 f7785907 0000005c 0b000018
Jan/09/2022 05:59:27 ipsec,debug,packet 68154b2e 048d4058 00022945 d7e66b15 c42db40c 00000020 00000001 01108d28
Jan/09/2022 05:59:27 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 1eceef30 00000000 00000000
Jan/09/2022 05:59:27 ipsec,debug,packet HASH with:
Jan/09/2022 05:59:27 ipsec,debug,packet f7785907 00000020 00000001 01108d28 277e638f 3335741e 4ca28af1 a26d85ef
Jan/09/2022 05:59:27 ipsec,debug,packet 1eceef30
Jan/09/2022 05:59:27 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 05:59:27 ipsec,debug,packet HASH computed:
Jan/09/2022 05:59:27 ipsec,debug,packet 68154b2e 048d4058 00022945 d7e66b15 c42db40c
Jan/09/2022 05:59:27 ipsec,debug hash validated.
Jan/09/2022 05:59:27 ipsec,debug begin.
Jan/09/2022 05:59:27 ipsec,debug seen nptype=8(hash) len=24
Jan/09/2022 05:59:27 ipsec,debug seen nptype=11(notify) len=32
Jan/09/2022 05:59:27 ipsec,debug succeed.
Jan/09/2022 05:59:27 ipsec,debug 34.198.222.127 notify: R_U_THERE
Jan/09/2022 05:59:27 ipsec,debug 34.198.222.127 DPD R-U-There received
Jan/09/2022 05:59:27 ipsec,debug,packet compute IV for phase2
Jan/09/2022 05:59:27 ipsec,debug,packet phase1 last IV:
Jan/09/2022 05:59:27 ipsec,debug,packet 8ab23710 6c8fefd7 dbc96101 adc7e88d ffe1a642
Jan/09/2022 05:59:27 ipsec,debug hash(sha1)
Jan/09/2022 05:59:27 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:27 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 05:59:27 ipsec,debug,packet b0e9b1df 2b978c03 3f8f6baa 785228dc
Jan/09/2022 05:59:27 ipsec,debug,packet HASH with:
Jan/09/2022 05:59:27 ipsec,debug,packet ffe1a642 00000020 00000001 01108d29 277e638f 3335741e 4ca28af1 a26d85ef
Jan/09/2022 05:59:27 ipsec,debug,packet 1eceef30
Jan/09/2022 05:59:27 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 05:59:27 ipsec,debug,packet HASH computed:
Jan/09/2022 05:59:27 ipsec,debug,packet a83a01fb 3066e643 dd6ebb4a 4b7ebf0b a5374a10
Jan/09/2022 05:59:27 ipsec,debug,packet begin encryption.
Jan/09/2022 05:59:27 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:27 ipsec,debug,packet pad length = 8
Jan/09/2022 05:59:27 ipsec,debug,packet 0b000018 a83a01fb 3066e643 dd6ebb4a 4b7ebf0b a5374a10 00000020 00000001
Jan/09/2022 05:59:27 ipsec,debug,packet 01108d29 277e638f 3335741e 4ca28af1 a26d85ef 1eceef30 b1f3f9a9 d5b79207
Jan/09/2022 05:59:27 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:27 ipsec,debug,packet with key:
Jan/09/2022 05:59:27 ipsec,debug,packet e05a602d 3b4b2498 2bfd28f2 4a0922ef
Jan/09/2022 05:59:27 ipsec,debug,packet encrypted payload by IV:
Jan/09/2022 05:59:27 ipsec,debug,packet b0e9b1df 2b978c03 3f8f6baa 785228dc
Jan/09/2022 05:59:27 ipsec,debug,packet save IV for next:
Jan/09/2022 05:59:27 ipsec,debug,packet 5cc42581 8bd60474 13cc4f0d 3277dbba
Jan/09/2022 05:59:27 ipsec,debug,packet encrypted.
Jan/09/2022 05:59:27 ipsec,debug 92 bytes from 164.52.192.253[500] to 34.198.222.127[500]
Jan/09/2022 05:59:27 ipsec,debug 1 times of 92 bytes message will be sent to 34.198.222.127[500]
Jan/09/2022 05:59:27 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 08100501 ffe1a642 0000005c 7229ad73
Jan/09/2022 05:59:27 ipsec,debug,packet f8aee466 a69dc146 47f758b8 6287a1fd a424cea7 61ed3488 78c81225 e5286d6e
Jan/09/2022 05:59:27 ipsec,debug,packet 1bbacae6 5acbe268 35c10868 5cc42581 8bd60474 13cc4f0d 3277dbba
Jan/09/2022 05:59:27 ipsec,debug sendto Information notify.
Jan/09/2022 05:59:27 ipsec,debug received a valid R-U-THERE, ACK sent
Jan/09/2022 05:59:27 ipsec,debug 316 bytes from 164.52.192.253[500] to 34.198.222.127[500]
Jan/09/2022 05:59:27 ipsec,debug 1 times of 316 bytes message will be sent to 34.198.222.127[500]
Jan/09/2022 05:59:27 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 08102001 dbfb5a75 0000013c 1990e71c
Jan/09/2022 05:59:27 ipsec,debug,packet 910b9794 f2437839 8480705b 64baca45 dcb28dfa 736582fe 57009383 153265d0
Jan/09/2022 05:59:27 ipsec,debug,packet 2ee7f9c7 a0aa7f9a fe54a305 a68d170b e68d3fe6 8284131b a5044eaf c8c0c7cf
Jan/09/2022 05:59:27 ipsec,debug,packet a1a96dbc b4a02732 83545d55 9301c177 9c8a8494 27268b07 40044d1a d4369d2d
Jan/09/2022 05:59:27 ipsec,debug,packet 04332540 4b667778 7af7ea27 fcd2b5b4 200e6f64 3d4224d4 fc0b477b ecc3cc16
Jan/09/2022 05:59:27 ipsec,debug,packet 471d0dd2 7f3061dd a408e519 0ea1c3d0 8fdea519 a63f6400 2e37c68b f6c9afcd
Jan/09/2022 05:59:27 ipsec,debug,packet ecdae933 4b1130d4 b0b4c642 04999995 81b4e6a2 c48ecbd2 9a773a31 9f23cd32
Jan/09/2022 05:59:27 ipsec,debug,packet 5ac1775b 9443474c 4e6fb7a0 36e2ad4e 4e2d1ac1 15944196 35ea3b10 ffe0a402
Jan/09/2022 05:59:27 ipsec,debug,packet 98b4b009 ff03c872 b5c176c3 702408c6 aff50403 266b1d8b eef02159 95d734dd
Jan/09/2022 05:59:27 ipsec,debug,packet 5d5db35d d31e73a0 074f1e68 1f63d551 a3a6f97b 30f8f837 c2c0aca6
Jan/09/2022 05:59:27 ipsec resent phase2 packet 164.52.192.253[500]<=>34.198.222.127[500] 277e638f3335741e:4ca28af1a26d85ef:0000dbfb
Jan/09/2022 05:59:27 ipsec,debug ===== received 92 bytes from 34.198.222.127[500] to 164.52.192.253[500]
Jan/09/2022 05:59:27 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 08100501 f81811b1 0000005c a3f9eb9c
Jan/09/2022 05:59:27 ipsec,debug,packet bc8181c6 81f591f2 59fb6100 276ad96c 36ad3cda 70e410e4 d221585e 5a03641c
Jan/09/2022 05:59:27 ipsec,debug,packet c38f6c29 99e54a22 e1eef8eb b2ac5d6d c7110796 a41f41b6 a2a10a16
Jan/09/2022 05:59:27 ipsec,debug receive Information.
Jan/09/2022 05:59:27 ipsec,debug,packet compute IV for phase2
Jan/09/2022 05:59:27 ipsec,debug,packet phase1 last IV:
Jan/09/2022 05:59:27 ipsec,debug,packet 8ab23710 6c8fefd7 dbc96101 adc7e88d f81811b1
Jan/09/2022 05:59:27 ipsec,debug hash(sha1)
Jan/09/2022 05:59:27 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:27 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 05:59:27 ipsec,debug,packet 67cac5e7 57879a17 990e265f a6930863
Jan/09/2022 05:59:27 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:27 ipsec,debug,packet IV was saved for next processing:
Jan/09/2022 05:59:27 ipsec,debug,packet b2ac5d6d c7110796 a41f41b6 a2a10a16
Jan/09/2022 05:59:27 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:27 ipsec,debug,packet with key:
Jan/09/2022 05:59:27 ipsec,debug,packet e05a602d 3b4b2498 2bfd28f2 4a0922ef
Jan/09/2022 05:59:27 ipsec,debug,packet decrypted payload by IV:
Jan/09/2022 05:59:27 ipsec,debug,packet 67cac5e7 57879a17 990e265f a6930863
Jan/09/2022 05:59:27 ipsec,debug,packet decrypted payload, but not trimed.
Jan/09/2022 05:59:27 ipsec,debug,packet 0b000018 b98b2b85 8e2f7d8f 1d10f068 80c280e8 8902919e 00000020 00000001
Jan/09/2022 05:59:27 ipsec,debug,packet 01108d29 277e638f 3335741e 4ca28af1 a26d85ef 0000028b 00000000 00000000
Jan/09/2022 05:59:27 ipsec,debug,packet padding len=1
Jan/09/2022 05:59:27 ipsec,debug,packet skip to trim padding.
Jan/09/2022 05:59:27 ipsec,debug,packet decrypted.
Jan/09/2022 05:59:27 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 08100501 f81811b1 0000005c 0b000018
Jan/09/2022 05:59:27 ipsec,debug,packet b98b2b85 8e2f7d8f 1d10f068 80c280e8 8902919e 00000020 00000001 01108d29
Jan/09/2022 05:59:27 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 0000028b 00000000 00000000
Jan/09/2022 05:59:27 ipsec,debug,packet HASH with:
Jan/09/2022 05:59:27 ipsec,debug,packet f81811b1 00000020 00000001 01108d29 277e638f 3335741e 4ca28af1 a26d85ef
Jan/09/2022 05:59:27 ipsec,debug,packet 0000028b
Jan/09/2022 05:59:27 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 05:59:27 ipsec,debug,packet HASH computed:
Jan/09/2022 05:59:27 ipsec,debug,packet b98b2b85 8e2f7d8f 1d10f068 80c280e8 8902919e
Jan/09/2022 05:59:27 ipsec,debug hash validated.
Jan/09/2022 05:59:27 ipsec,debug begin.
Jan/09/2022 05:59:27 ipsec,debug seen nptype=8(hash) len=24
Jan/09/2022 05:59:27 ipsec,debug seen nptype=11(notify) len=32
Jan/09/2022 05:59:27 ipsec,debug succeed.
Jan/09/2022 05:59:27 ipsec,debug 34.198.222.127 notify: R_U_THERE_ACK
Jan/09/2022 05:59:27 ipsec,debug 34.198.222.127 DPD R-U-There-Ack received
Jan/09/2022 05:59:27 ipsec,debug received an R-U-THERE-ACK
Jan/09/2022 05:59:27 ipsec,debug ===== received 76 bytes from 34.198.222.127[500] to 164.52.192.253[500]
Jan/09/2022 05:59:27 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 08100501 b4167cbf 0000004c 16746f03
Jan/09/2022 05:59:27 ipsec,debug,packet c6f869f6 2e454ba9 53a9193b 1dcfed54 82c1ad59 17188762 056c16ee 95051934
Jan/09/2022 05:59:27 ipsec,debug,packet c7706636 5a1a7fe5 9cb6cd1d
Jan/09/2022 05:59:27 ipsec,debug receive Information.
Jan/09/2022 05:59:27 ipsec,debug,packet compute IV for phase2
Jan/09/2022 05:59:27 ipsec,debug,packet phase1 last IV:
Jan/09/2022 05:59:27 ipsec,debug,packet 8ab23710 6c8fefd7 dbc96101 adc7e88d b4167cbf
Jan/09/2022 05:59:27 ipsec,debug hash(sha1)
Jan/09/2022 05:59:27 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:27 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 05:59:27 ipsec,debug,packet 1c096805 0953be00 3e9740bb 36b36a9a
Jan/09/2022 05:59:27 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:27 ipsec,debug,packet IV was saved for next processing:
Jan/09/2022 05:59:27 ipsec,debug,packet 95051934 c7706636 5a1a7fe5 9cb6cd1d
Jan/09/2022 05:59:27 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:27 ipsec,debug,packet with key:
Jan/09/2022 05:59:27 ipsec,debug,packet e05a602d 3b4b2498 2bfd28f2 4a0922ef
Jan/09/2022 05:59:27 ipsec,debug,packet decrypted payload by IV:
Jan/09/2022 05:59:27 ipsec,debug,packet 1c096805 0953be00 3e9740bb 36b36a9a
Jan/09/2022 05:59:27 ipsec,debug,packet decrypted payload, but not trimed.
Jan/09/2022 05:59:27 ipsec,debug,packet 0b000018 7aa7c666 b827823e 9bdaf6ae bd6ea523 635aca2a 0000000c 00000001
Jan/09/2022 05:59:27 ipsec,debug,packet 01000010 00000000 00000000 00000000
Jan/09/2022 05:59:27 ipsec,debug,packet padding len=1
Jan/09/2022 05:59:27 ipsec,debug,packet skip to trim padding.
Jan/09/2022 05:59:27 ipsec,debug,packet decrypted.
Jan/09/2022 05:59:27 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 08100501 b4167cbf 0000004c 0b000018
Jan/09/2022 05:59:27 ipsec,debug,packet 7aa7c666 b827823e 9bdaf6ae bd6ea523 635aca2a 0000000c 00000001 01000010
Jan/09/2022 05:59:27 ipsec,debug,packet 00000000 00000000 00000000
Jan/09/2022 05:59:27 ipsec,debug,packet HASH with:
Jan/09/2022 05:59:27 ipsec,debug,packet b4167cbf 0000000c 00000001 01000010
Jan/09/2022 05:59:27 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 05:59:27 ipsec,debug,packet HASH computed:
Jan/09/2022 05:59:27 ipsec,debug,packet 7aa7c666 b827823e 9bdaf6ae bd6ea523 635aca2a
Jan/09/2022 05:59:27 ipsec,debug hash validated.
Jan/09/2022 05:59:27 ipsec,debug begin.
Jan/09/2022 05:59:27 ipsec,debug seen nptype=8(hash) len=24
Jan/09/2022 05:59:27 ipsec,debug seen nptype=11(notify) len=12
Jan/09/2022 05:59:27 ipsec,debug succeed.
Jan/09/2022 05:59:27 ipsec,debug 34.198.222.127 notify: PAYLOAD-MALFORMED
Jan/09/2022 05:59:27 ipsec 34.198.222.127 fatal PAYLOAD-MALFORMED notify messsage, phase1 should be deleted.
Jan/09/2022 05:59:37 ipsec,debug ===== received 92 bytes from 34.198.222.127[500] to 164.52.192.253[500]
Jan/09/2022 05:59:37 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 08100501 e5d8a764 0000005c 3b1db008
Jan/09/2022 05:59:37 ipsec,debug,packet ea89d56d 119dd999 fa8f1a7c cc9878e9 1ac8d943 cbe3c6aa cd0988fe ede8cb7e
Jan/09/2022 05:59:37 ipsec,debug,packet 69a9ec10 c2dfc0d8 713c8ae1 4a00a856 f7686130 dcf18a38 55de7c33
Jan/09/2022 05:59:37 ipsec,debug receive Information.
Jan/09/2022 05:59:37 ipsec,debug,packet compute IV for phase2
Jan/09/2022 05:59:37 ipsec,debug,packet phase1 last IV:
Jan/09/2022 05:59:37 ipsec,debug,packet 8ab23710 6c8fefd7 dbc96101 adc7e88d e5d8a764
Jan/09/2022 05:59:37 ipsec,debug hash(sha1)
Jan/09/2022 05:59:37 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:37 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 05:59:37 ipsec,debug,packet 6ac4ba3b 4dc9a1b8 0e6ad0eb 8a9ea6ce
Jan/09/2022 05:59:37 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:37 ipsec,debug,packet IV was saved for next processing:
Jan/09/2022 05:59:37 ipsec,debug,packet 4a00a856 f7686130 dcf18a38 55de7c33
Jan/09/2022 05:59:37 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:37 ipsec,debug,packet with key:
Jan/09/2022 05:59:37 ipsec,debug,packet e05a602d 3b4b2498 2bfd28f2 4a0922ef
Jan/09/2022 05:59:37 ipsec,debug,packet decrypted payload by IV:
Jan/09/2022 05:59:37 ipsec,debug,packet 6ac4ba3b 4dc9a1b8 0e6ad0eb 8a9ea6ce
Jan/09/2022 05:59:37 ipsec,debug,packet decrypted payload, but not trimed.
Jan/09/2022 05:59:37 ipsec,debug,packet 0b000018 f3630cfc 91387161 444ed80e 4ecb3c60 fe96e250 00000020 00000001
Jan/09/2022 05:59:37 ipsec,debug,packet 01108d28 277e638f 3335741e 4ca28af1 a26d85ef 1eceef31 00000000 00000000
Jan/09/2022 05:59:37 ipsec,debug,packet padding len=1
Jan/09/2022 05:59:37 ipsec,debug,packet skip to trim padding.
Jan/09/2022 05:59:37 ipsec,debug,packet decrypted.
Jan/09/2022 05:59:37 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 08100501 e5d8a764 0000005c 0b000018
Jan/09/2022 05:59:37 ipsec,debug,packet f3630cfc 91387161 444ed80e 4ecb3c60 fe96e250 00000020 00000001 01108d28
Jan/09/2022 05:59:37 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 1eceef31 00000000 00000000
Jan/09/2022 05:59:37 ipsec,debug,packet HASH with:
Jan/09/2022 05:59:37 ipsec,debug,packet e5d8a764 00000020 00000001 01108d28 277e638f 3335741e 4ca28af1 a26d85ef
Jan/09/2022 05:59:37 ipsec,debug,packet 1eceef31
Jan/09/2022 05:59:37 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 05:59:37 ipsec,debug,packet HASH computed:
Jan/09/2022 05:59:37 ipsec,debug,packet f3630cfc 91387161 444ed80e 4ecb3c60 fe96e250
Jan/09/2022 05:59:37 ipsec,debug hash validated.
Jan/09/2022 05:59:37 ipsec,debug begin.
Jan/09/2022 05:59:37 ipsec,debug seen nptype=8(hash) len=24
Jan/09/2022 05:59:37 ipsec,debug seen nptype=11(notify) len=32
Jan/09/2022 05:59:37 ipsec,debug succeed.
Jan/09/2022 05:59:37 ipsec,debug 34.198.222.127 notify: R_U_THERE
Jan/09/2022 05:59:37 ipsec,debug 34.198.222.127 DPD R-U-There received
Jan/09/2022 05:59:37 ipsec,debug,packet compute IV for phase2
Jan/09/2022 05:59:37 ipsec,debug,packet phase1 last IV:
Jan/09/2022 05:59:37 ipsec,debug,packet 8ab23710 6c8fefd7 dbc96101 adc7e88d decfb9d6
Jan/09/2022 05:59:37 ipsec,debug hash(sha1)
Jan/09/2022 05:59:37 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:37 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 05:59:37 ipsec,debug,packet f146580a 0967c78c 0842334a 337ee5c7
Jan/09/2022 05:59:37 ipsec,debug,packet HASH with:
Jan/09/2022 05:59:37 ipsec,debug,packet decfb9d6 00000020 00000001 01108d29 277e638f 3335741e 4ca28af1 a26d85ef
Jan/09/2022 05:59:37 ipsec,debug,packet 1eceef31
Jan/09/2022 05:59:37 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 05:59:37 ipsec,debug,packet HASH computed:
Jan/09/2022 05:59:37 ipsec,debug,packet b99909f8 8d2a8e09 de9b63c2 e6bc010f 38aff79a
Jan/09/2022 05:59:37 ipsec,debug,packet begin encryption.
Jan/09/2022 05:59:37 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:37 ipsec,debug,packet pad length = 8
Jan/09/2022 05:59:37 ipsec,debug,packet 0b000018 b99909f8 8d2a8e09 de9b63c2 e6bc010f 38aff79a 00000020 00000001
Jan/09/2022 05:59:37 ipsec,debug,packet 01108d29 277e638f 3335741e 4ca28af1 a26d85ef 1eceef31 cdb490ad e9888907
Jan/09/2022 05:59:37 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:37 ipsec,debug,packet with key:
Jan/09/2022 05:59:37 ipsec,debug,packet e05a602d 3b4b2498 2bfd28f2 4a0922ef
Jan/09/2022 05:59:37 ipsec,debug,packet encrypted payload by IV:
Jan/09/2022 05:59:37 ipsec,debug,packet f146580a 0967c78c 0842334a 337ee5c7
Jan/09/2022 05:59:37 ipsec,debug,packet save IV for next:
Jan/09/2022 05:59:37 ipsec,debug,packet fac458d5 8d3a00b0 1a6f2a43 fd632756
Jan/09/2022 05:59:37 ipsec,debug,packet encrypted.
Jan/09/2022 05:59:37 ipsec,debug 92 bytes from 164.52.192.253[500] to 34.198.222.127[500]
Jan/09/2022 05:59:37 ipsec,debug 1 times of 92 bytes message will be sent to 34.198.222.127[500]
Jan/09/2022 05:59:37 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 08100501 decfb9d6 0000005c 5a178ad9
Jan/09/2022 05:59:37 ipsec,debug,packet de06eaae c42ae8a5 9335f13a 7828cf1e 30bb56a5 b69496dd fe040ecc b010fea4
Jan/09/2022 05:59:37 ipsec,debug,packet 596f02e3 345e545a 1e114e55 fac458d5 8d3a00b0 1a6f2a43 fd632756
Jan/09/2022 05:59:37 ipsec,debug sendto Information notify.
Jan/09/2022 05:59:37 ipsec,debug received a valid R-U-THERE, ACK sent
Jan/09/2022 05:59:37 ipsec,debug 316 bytes from 164.52.192.253[500] to 34.198.222.127[500]
Jan/09/2022 05:59:37 ipsec,debug 1 times of 316 bytes message will be sent to 34.198.222.127[500]
Jan/09/2022 05:59:37 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 08102001 dbfb5a75 0000013c 1990e71c
Jan/09/2022 05:59:37 ipsec,debug,packet 910b9794 f2437839 8480705b 64baca45 dcb28dfa 736582fe 57009383 153265d0
Jan/09/2022 05:59:37 ipsec,debug,packet 2ee7f9c7 a0aa7f9a fe54a305 a68d170b e68d3fe6 8284131b a5044eaf c8c0c7cf
Jan/09/2022 05:59:37 ipsec,debug,packet a1a96dbc b4a02732 83545d55 9301c177 9c8a8494 27268b07 40044d1a d4369d2d
Jan/09/2022 05:59:37 ipsec,debug,packet 04332540 4b667778 7af7ea27 fcd2b5b4 200e6f64 3d4224d4 fc0b477b ecc3cc16
Jan/09/2022 05:59:37 ipsec,debug,packet 471d0dd2 7f3061dd a408e519 0ea1c3d0 8fdea519 a63f6400 2e37c68b f6c9afcd
Jan/09/2022 05:59:37 ipsec,debug,packet ecdae933 4b1130d4 b0b4c642 04999995 81b4e6a2 c48ecbd2 9a773a31 9f23cd32
Jan/09/2022 05:59:37 ipsec,debug,packet 5ac1775b 9443474c 4e6fb7a0 36e2ad4e 4e2d1ac1 15944196 35ea3b10 ffe0a402
Jan/09/2022 05:59:37 ipsec,debug,packet 98b4b009 ff03c872 b5c176c3 702408c6 aff50403 266b1d8b eef02159 95d734dd
Jan/09/2022 05:59:37 ipsec,debug,packet 5d5db35d d31e73a0 074f1e68 1f63d551 a3a6f97b 30f8f837 c2c0aca6
Jan/09/2022 05:59:37 ipsec resent phase2 packet 164.52.192.253[500]<=>34.198.222.127[500] 277e638f3335741e:4ca28af1a26d85ef:0000dbfb
Jan/09/2022 05:59:37 ipsec,debug 34.198.222.127 DPD monitoring....
Jan/09/2022 05:59:37 ipsec,debug,packet compute IV for phase2
Jan/09/2022 05:59:37 ipsec,debug,packet phase1 last IV:
Jan/09/2022 05:59:37 ipsec,debug,packet 8ab23710 6c8fefd7 dbc96101 adc7e88d 8241e3cb
Jan/09/2022 05:59:37 ipsec,debug hash(sha1)
Jan/09/2022 05:59:37 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:37 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 05:59:37 ipsec,debug,packet 292f88b8 6eb98123 e4d39050 6d243959
Jan/09/2022 05:59:37 ipsec,debug,packet HASH with:
Jan/09/2022 05:59:37 ipsec,debug,packet 8241e3cb 00000020 00000001 01108d28 277e638f 3335741e 4ca28af1 a26d85ef
Jan/09/2022 05:59:37 ipsec,debug,packet 0000028c
Jan/09/2022 05:59:37 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 05:59:37 ipsec,debug,packet HASH computed:
Jan/09/2022 05:59:37 ipsec,debug,packet acce6acd ff9f84a9 66642306 af4bce1f 6e1b9116
Jan/09/2022 05:59:37 ipsec,debug,packet begin encryption.
Jan/09/2022 05:59:37 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:37 ipsec,debug,packet pad length = 8
Jan/09/2022 05:59:37 ipsec,debug,packet 0b000018 acce6acd ff9f84a9 66642306 af4bce1f 6e1b9116 00000020 00000001
Jan/09/2022 05:59:37 ipsec,debug,packet 01108d28 277e638f 3335741e 4ca28af1 a26d85ef 0000028c d7888cdf 80dca807
Jan/09/2022 05:59:37 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:37 ipsec,debug,packet with key:
Jan/09/2022 05:59:37 ipsec,debug,packet e05a602d 3b4b2498 2bfd28f2 4a0922ef
Jan/09/2022 05:59:37 ipsec,debug,packet encrypted payload by IV:
Jan/09/2022 05:59:37 ipsec,debug,packet 292f88b8 6eb98123 e4d39050 6d243959
Jan/09/2022 05:59:37 ipsec,debug,packet save IV for next:
Jan/09/2022 05:59:37 ipsec,debug,packet 34163248 4c595d7e a9ed69e1 cf8aa354
Jan/09/2022 05:59:37 ipsec,debug,packet encrypted.
Jan/09/2022 05:59:37 ipsec,debug 92 bytes from 164.52.192.253[500] to 34.198.222.127[500]
Jan/09/2022 05:59:37 ipsec,debug 1 times of 92 bytes message will be sent to 34.198.222.127[500]
Jan/09/2022 05:59:37 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 08100501 8241e3cb 0000005c 98f5befe
Jan/09/2022 05:59:37 ipsec,debug,packet b3d38c1a 4378dade d8ba4069 4bc4c7ef e56739cc 4680cea0 bf0ae143 f866b744
Jan/09/2022 05:59:37 ipsec,debug,packet 51e685f1 9f90bff3 d06a3067 34163248 4c595d7e a9ed69e1 cf8aa354
Jan/09/2022 05:59:37 ipsec,debug sendto Information notify.
Jan/09/2022 05:59:37 ipsec,debug 34.198.222.127 DPD R-U-There sent (0)
Jan/09/2022 05:59:37 ipsec,debug 34.198.222.127 rescheduling send_r_u (5).
Jan/09/2022 05:59:37 ipsec,debug ===== received 76 bytes from 34.198.222.127[500] to 164.52.192.253[500]
Jan/09/2022 05:59:37 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 08100501 e5b46d41 0000004c ef219266
Jan/09/2022 05:59:37 ipsec,debug,packet fef17a1d a39b0e19 7c6f4c55 3ffa1b59 4974c078 4879ff2f 017bf218 37755e94
Jan/09/2022 05:59:37 ipsec,debug,packet e1173f75 4dad0a49 6db148e5
Jan/09/2022 05:59:37 ipsec,debug receive Information.
Jan/09/2022 05:59:37 ipsec,debug,packet compute IV for phase2
Jan/09/2022 05:59:37 ipsec,debug,packet phase1 last IV:
Jan/09/2022 05:59:37 ipsec,debug,packet 8ab23710 6c8fefd7 dbc96101 adc7e88d e5b46d41
Jan/09/2022 05:59:37 ipsec,debug hash(sha1)
Jan/09/2022 05:59:37 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:37 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 05:59:37 ipsec,debug,packet 4c9a0432 c77f83ab 4b1e98b7 4a4d2d2f
Jan/09/2022 05:59:37 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:37 ipsec,debug,packet IV was saved for next processing:
Jan/09/2022 05:59:37 ipsec,debug,packet 37755e94 e1173f75 4dad0a49 6db148e5
Jan/09/2022 05:59:37 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:37 ipsec,debug,packet with key:
Jan/09/2022 05:59:37 ipsec,debug,packet e05a602d 3b4b2498 2bfd28f2 4a0922ef
Jan/09/2022 05:59:37 ipsec,debug,packet decrypted payload by IV:
Jan/09/2022 05:59:37 ipsec,debug,packet 4c9a0432 c77f83ab 4b1e98b7 4a4d2d2f
Jan/09/2022 05:59:37 ipsec,debug,packet decrypted payload, but not trimed.
Jan/09/2022 05:59:37 ipsec,debug,packet 0b000018 b50ec3e3 de6384da 41d849b8 fa14c357 1553af1f 0000000c 00000001
Jan/09/2022 05:59:37 ipsec,debug,packet 01000010 00000000 00000000 00000000
Jan/09/2022 05:59:37 ipsec,debug,packet padding len=1
Jan/09/2022 05:59:37 ipsec,debug,packet skip to trim padding.
Jan/09/2022 05:59:37 ipsec,debug,packet decrypted.
Jan/09/2022 05:59:37 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 08100501 e5b46d41 0000004c 0b000018
Jan/09/2022 05:59:37 ipsec,debug,packet b50ec3e3 de6384da 41d849b8 fa14c357 1553af1f 0000000c 00000001 01000010
Jan/09/2022 05:59:37 ipsec,debug,packet 00000000 00000000 00000000
Jan/09/2022 05:59:37 ipsec,debug,packet HASH with:
Jan/09/2022 05:59:37 ipsec,debug,packet e5b46d41 0000000c 00000001 01000010
Jan/09/2022 05:59:37 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 05:59:37 ipsec,debug,packet HASH computed:
Jan/09/2022 05:59:37 ipsec,debug,packet b50ec3e3 de6384da 41d849b8 fa14c357 1553af1f
Jan/09/2022 05:59:37 ipsec,debug hash validated.
Jan/09/2022 05:59:37 ipsec,debug begin.
Jan/09/2022 05:59:37 ipsec,debug seen nptype=8(hash) len=24
Jan/09/2022 05:59:37 ipsec,debug seen nptype=11(notify) len=12
Jan/09/2022 05:59:37 ipsec,debug succeed.
Jan/09/2022 05:59:37 ipsec,debug 34.198.222.127 notify: PAYLOAD-MALFORMED
Jan/09/2022 05:59:37 ipsec 34.198.222.127 fatal PAYLOAD-MALFORMED notify messsage, phase1 should be deleted.
Jan/09/2022 05:59:37 ipsec,debug ===== received 92 bytes from 34.198.222.127[500] to 164.52.192.253[500]
Jan/09/2022 05:59:37 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 08100501 5f6f2e18 0000005c 10d023c5
Jan/09/2022 05:59:37 ipsec,debug,packet 2b5bfc03 f98fd62f 390885b3 9b094496 61b73bca 8e281a03 dd240d33 32154846
Jan/09/2022 05:59:37 ipsec,debug,packet 2f8bddc8 3df7ca3f 24df2077 dbadb5fb f02627ab c0507c93 916c8bf9
Jan/09/2022 05:59:37 ipsec,debug receive Information.
Jan/09/2022 05:59:37 ipsec,debug,packet compute IV for phase2
Jan/09/2022 05:59:37 ipsec,debug,packet phase1 last IV:
Jan/09/2022 05:59:37 ipsec,debug,packet 8ab23710 6c8fefd7 dbc96101 adc7e88d 5f6f2e18
Jan/09/2022 05:59:37 ipsec,debug hash(sha1)
Jan/09/2022 05:59:37 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:37 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 05:59:37 ipsec,debug,packet f156553f f416034b 0a45a9e6 a0b2b32d
Jan/09/2022 05:59:37 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:37 ipsec,debug,packet IV was saved for next processing:
Jan/09/2022 05:59:37 ipsec,debug,packet dbadb5fb f02627ab c0507c93 916c8bf9
Jan/09/2022 05:59:37 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:37 ipsec,debug,packet with key:
Jan/09/2022 05:59:37 ipsec,debug,packet e05a602d 3b4b2498 2bfd28f2 4a0922ef
Jan/09/2022 05:59:37 ipsec,debug,packet decrypted payload by IV:
Jan/09/2022 05:59:37 ipsec,debug,packet f156553f f416034b 0a45a9e6 a0b2b32d
Jan/09/2022 05:59:37 ipsec,debug,packet decrypted payload, but not trimed.
Jan/09/2022 05:59:37 ipsec,debug,packet 0b000018 1f111052 18d4f043 43a57da1 12b90987 5a7c3650 00000020 00000001
Jan/09/2022 05:59:37 ipsec,debug,packet 01108d29 277e638f 3335741e 4ca28af1 a26d85ef 0000028c 00000000 00000000
Jan/09/2022 05:59:37 ipsec,debug,packet padding len=1
Jan/09/2022 05:59:37 ipsec,debug,packet skip to trim padding.
Jan/09/2022 05:59:37 ipsec,debug,packet decrypted.
Jan/09/2022 05:59:37 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 08100501 5f6f2e18 0000005c 0b000018
Jan/09/2022 05:59:37 ipsec,debug,packet 1f111052 18d4f043 43a57da1 12b90987 5a7c3650 00000020 00000001 01108d29
Jan/09/2022 05:59:37 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 0000028c 00000000 00000000
Jan/09/2022 05:59:37 ipsec,debug,packet HASH with:
Jan/09/2022 05:59:37 ipsec,debug,packet 5f6f2e18 00000020 00000001 01108d29 277e638f 3335741e 4ca28af1 a26d85ef
Jan/09/2022 05:59:37 ipsec,debug,packet 0000028c
Jan/09/2022 05:59:37 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 05:59:37 ipsec,debug,packet HASH computed:
Jan/09/2022 05:59:37 ipsec,debug,packet 1f111052 18d4f043 43a57da1 12b90987 5a7c3650
Jan/09/2022 05:59:37 ipsec,debug hash validated.
Jan/09/2022 05:59:37 ipsec,debug begin.
Jan/09/2022 05:59:37 ipsec,debug seen nptype=8(hash) len=24
Jan/09/2022 05:59:37 ipsec,debug seen nptype=11(notify) len=32
Jan/09/2022 05:59:37 ipsec,debug succeed.
Jan/09/2022 05:59:37 ipsec,debug 34.198.222.127 notify: R_U_THERE_ACK
Jan/09/2022 05:59:37 ipsec,debug 34.198.222.127 DPD R-U-There-Ack received
Jan/09/2022 05:59:37 ipsec,debug received an R-U-THERE-ACK
Jan/09/2022 05:59:47 ipsec 34.198.222.127 give up to get IPsec-SA due to time up to wait.
Jan/09/2022 05:59:47 ipsec,debug ===== received 92 bytes from 34.198.222.127[500] to 164.52.192.253[500]
Jan/09/2022 05:59:47 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 08100501 387d3887 0000005c c2933000
Jan/09/2022 05:59:47 ipsec,debug,packet 7dbacf3a b54f1245 c0bb1b27 273875be f8fda267 65b1b6dd 6010ad9b c3bceb8b
Jan/09/2022 05:59:47 ipsec,debug,packet 92781012 9224f949 6807910c 675c5934 005654e8 7fb3ba53 1a2ec791
Jan/09/2022 05:59:47 ipsec,debug receive Information.
Jan/09/2022 05:59:47 ipsec,debug,packet compute IV for phase2
Jan/09/2022 05:59:47 ipsec,debug,packet phase1 last IV:
Jan/09/2022 05:59:47 ipsec,debug,packet 8ab23710 6c8fefd7 dbc96101 adc7e88d 387d3887
Jan/09/2022 05:59:47 ipsec,debug hash(sha1)
Jan/09/2022 05:59:47 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:47 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 05:59:47 ipsec,debug,packet 3addbf9a d5ce55ad 47732ad4 fc809f75
Jan/09/2022 05:59:47 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:47 ipsec,debug,packet IV was saved for next processing:
Jan/09/2022 05:59:47 ipsec,debug,packet 675c5934 005654e8 7fb3ba53 1a2ec791
Jan/09/2022 05:59:47 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:47 ipsec,debug,packet with key:
Jan/09/2022 05:59:47 ipsec,debug,packet e05a602d 3b4b2498 2bfd28f2 4a0922ef
Jan/09/2022 05:59:47 ipsec,debug,packet decrypted payload by IV:
Jan/09/2022 05:59:47 ipsec,debug,packet 3addbf9a d5ce55ad 47732ad4 fc809f75
Jan/09/2022 05:59:47 ipsec,debug,packet decrypted payload, but not trimed.
Jan/09/2022 05:59:47 ipsec,debug,packet 0b000018 0d84ec80 44be2cf6 47c3fb04 0e1d7cae e2b79d9c 00000020 00000001
Jan/09/2022 05:59:47 ipsec,debug,packet 01108d28 277e638f 3335741e 4ca28af1 a26d85ef 1eceef32 00000000 00000000
Jan/09/2022 05:59:47 ipsec,debug,packet padding len=1
Jan/09/2022 05:59:47 ipsec,debug,packet skip to trim padding.
Jan/09/2022 05:59:47 ipsec,debug,packet decrypted.
Jan/09/2022 05:59:47 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 08100501 387d3887 0000005c 0b000018
Jan/09/2022 05:59:47 ipsec,debug,packet 0d84ec80 44be2cf6 47c3fb04 0e1d7cae e2b79d9c 00000020 00000001 01108d28
Jan/09/2022 05:59:47 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 1eceef32 00000000 00000000
Jan/09/2022 05:59:47 ipsec,debug,packet HASH with:
Jan/09/2022 05:59:47 ipsec,debug,packet 387d3887 00000020 00000001 01108d28 277e638f 3335741e 4ca28af1 a26d85ef
Jan/09/2022 05:59:47 ipsec,debug,packet 1eceef32
Jan/09/2022 05:59:47 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 05:59:47 ipsec,debug,packet HASH computed:
Jan/09/2022 05:59:47 ipsec,debug,packet 0d84ec80 44be2cf6 47c3fb04 0e1d7cae e2b79d9c
Jan/09/2022 05:59:47 ipsec,debug hash validated.
Jan/09/2022 05:59:47 ipsec,debug begin.
Jan/09/2022 05:59:47 ipsec,debug seen nptype=8(hash) len=24
Jan/09/2022 05:59:47 ipsec,debug seen nptype=11(notify) len=32
Jan/09/2022 05:59:47 ipsec,debug succeed.
Jan/09/2022 05:59:47 ipsec,debug 34.198.222.127 notify: R_U_THERE
Jan/09/2022 05:59:47 ipsec,debug 34.198.222.127 DPD R-U-There received
Jan/09/2022 05:59:47 ipsec,debug,packet compute IV for phase2
Jan/09/2022 05:59:47 ipsec,debug,packet phase1 last IV:
Jan/09/2022 05:59:47 ipsec,debug,packet 8ab23710 6c8fefd7 dbc96101 adc7e88d 9c0f0746
Jan/09/2022 05:59:47 ipsec,debug hash(sha1)
Jan/09/2022 05:59:47 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:47 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 05:59:47 ipsec,debug,packet e02b3277 a403c70f ac1ad6b4 26885c7d
Jan/09/2022 05:59:47 ipsec,debug,packet HASH with:
Jan/09/2022 05:59:47 ipsec,debug,packet 9c0f0746 00000020 00000001 01108d29 277e638f 3335741e 4ca28af1 a26d85ef
Jan/09/2022 05:59:47 ipsec,debug,packet 1eceef32
Jan/09/2022 05:59:47 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 05:59:47 ipsec,debug,packet HASH computed:
Jan/09/2022 05:59:47 ipsec,debug,packet 303f888e 26564ce4 9a00ed3d 3b2ee9f8 c6e3cf06
Jan/09/2022 05:59:47 ipsec,debug,packet begin encryption.
Jan/09/2022 05:59:47 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:47 ipsec,debug,packet pad length = 8
Jan/09/2022 05:59:47 ipsec,debug,packet 0b000018 303f888e 26564ce4 9a00ed3d 3b2ee9f8 c6e3cf06 00000020 00000001
Jan/09/2022 05:59:47 ipsec,debug,packet 01108d29 277e638f 3335741e 4ca28af1 a26d85ef 1eceef32 b9e4a29a 93f39007
Jan/09/2022 05:59:47 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:47 ipsec,debug,packet with key:
Jan/09/2022 05:59:47 ipsec,debug,packet e05a602d 3b4b2498 2bfd28f2 4a0922ef
Jan/09/2022 05:59:47 ipsec,debug,packet encrypted payload by IV:
Jan/09/2022 05:59:47 ipsec,debug,packet e02b3277 a403c70f ac1ad6b4 26885c7d
Jan/09/2022 05:59:47 ipsec,debug,packet save IV for next:
Jan/09/2022 05:59:47 ipsec,debug,packet 4c02f346 53c0fc4c fb39dfe2 f3af6385
Jan/09/2022 05:59:47 ipsec,debug,packet encrypted.
Jan/09/2022 05:59:47 ipsec,debug 92 bytes from 164.52.192.253[500] to 34.198.222.127[500]
Jan/09/2022 05:59:47 ipsec,debug 1 times of 92 bytes message will be sent to 34.198.222.127[500]
Jan/09/2022 05:59:47 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 08100501 9c0f0746 0000005c beb2cdda
Jan/09/2022 05:59:47 ipsec,debug,packet 1531be5e b97423f9 90f3391f 3b2b428a caf80b1c 57075dfe 5a2d8ede 20f8970f
Jan/09/2022 05:59:47 ipsec,debug,packet 41a23a17 af30d8c1 c2579c6e 4c02f346 53c0fc4c fb39dfe2 f3af6385
Jan/09/2022 05:59:47 ipsec,debug sendto Information notify.
Jan/09/2022 05:59:47 ipsec,debug received a valid R-U-THERE, ACK sent
Jan/09/2022 05:59:47 ipsec IPsec-SA expired: ESP/Tunnel 34.198.222.127[500]->164.52.192.253[500] spi=0x99e3b54
Jan/09/2022 05:59:47 ipsec,debug 34.198.222.127 DPD monitoring....
Jan/09/2022 05:59:47 ipsec,debug,packet compute IV for phase2
Jan/09/2022 05:59:47 ipsec,debug,packet phase1 last IV:
Jan/09/2022 05:59:47 ipsec,debug,packet 8ab23710 6c8fefd7 dbc96101 adc7e88d 98e6ef9c
Jan/09/2022 05:59:47 ipsec,debug hash(sha1)
Jan/09/2022 05:59:47 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:47 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 05:59:47 ipsec,debug,packet f802400c 40dca286 f3c8e337 b20d3884
Jan/09/2022 05:59:47 ipsec,debug,packet HASH with:
Jan/09/2022 05:59:47 ipsec,debug,packet 98e6ef9c 00000020 00000001 01108d28 277e638f 3335741e 4ca28af1 a26d85ef
Jan/09/2022 05:59:47 ipsec,debug,packet 0000028d
Jan/09/2022 05:59:47 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 05:59:47 ipsec,debug,packet HASH computed:
Jan/09/2022 05:59:47 ipsec,debug,packet 808d3be4 f55fe104 cd1da781 370ae3bf 46688d0c
Jan/09/2022 05:59:47 ipsec,debug,packet begin encryption.
Jan/09/2022 05:59:47 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:47 ipsec,debug,packet pad length = 8
Jan/09/2022 05:59:47 ipsec,debug,packet 0b000018 808d3be4 f55fe104 cd1da781 370ae3bf 46688d0c 00000020 00000001
Jan/09/2022 05:59:47 ipsec,debug,packet 01108d28 277e638f 3335741e 4ca28af1 a26d85ef 0000028d baaef3bd ca959707
Jan/09/2022 05:59:47 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:47 ipsec,debug,packet with key:
Jan/09/2022 05:59:47 ipsec,debug,packet e05a602d 3b4b2498 2bfd28f2 4a0922ef
Jan/09/2022 05:59:47 ipsec,debug,packet encrypted payload by IV:
Jan/09/2022 05:59:47 ipsec,debug,packet f802400c 40dca286 f3c8e337 b20d3884
Jan/09/2022 05:59:47 ipsec,debug,packet save IV for next:
Jan/09/2022 05:59:47 ipsec,debug,packet 4da1cbdf 269f49d6 a47312bb e5861131
Jan/09/2022 05:59:47 ipsec,debug,packet encrypted.
Jan/09/2022 05:59:47 ipsec,debug 92 bytes from 164.52.192.253[500] to 34.198.222.127[500]
Jan/09/2022 05:59:47 ipsec,debug 1 times of 92 bytes message will be sent to 34.198.222.127[500]
Jan/09/2022 05:59:47 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 08100501 98e6ef9c 0000005c 62549f85
Jan/09/2022 05:59:47 ipsec,debug,packet 84dfacff 44ce4226 47565d1c beb7dea0 d25e5ebc c9bd6ee0 2afbc88d 3b31b3ed
Jan/09/2022 05:59:47 ipsec,debug,packet 32785511 834c62ed e383605f 4da1cbdf 269f49d6 a47312bb e5861131
Jan/09/2022 05:59:47 ipsec,debug sendto Information notify.
Jan/09/2022 05:59:47 ipsec,debug 34.198.222.127 DPD R-U-There sent (0)
Jan/09/2022 05:59:47 ipsec,debug 34.198.222.127 rescheduling send_r_u (5).
Jan/09/2022 05:59:48 ipsec,debug ===== received 92 bytes from 34.198.222.127[500] to 164.52.192.253[500]
Jan/09/2022 05:59:48 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 08100501 a4a50001 0000005c 4c81eaf0
Jan/09/2022 05:59:48 ipsec,debug,packet c1a1d12c b59b85d0 c089cefb 6ad4413c 20092b02 30749842 f6fb3994 5333ac00
Jan/09/2022 05:59:48 ipsec,debug,packet d5926acf 91163962 6bc510e9 44aab9dc 4b533753 6f2d83f8 2a724af7
Jan/09/2022 05:59:48 ipsec,debug receive Information.
Jan/09/2022 05:59:48 ipsec,debug,packet compute IV for phase2
Jan/09/2022 05:59:48 ipsec,debug,packet phase1 last IV:
Jan/09/2022 05:59:48 ipsec,debug,packet 8ab23710 6c8fefd7 dbc96101 adc7e88d a4a50001
Jan/09/2022 05:59:48 ipsec,debug hash(sha1)
Jan/09/2022 05:59:48 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:48 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 05:59:48 ipsec,debug,packet 13eaa1ec 43a45e23 ce424f9a 67e1b174
Jan/09/2022 05:59:48 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:48 ipsec,debug,packet IV was saved for next processing:
Jan/09/2022 05:59:48 ipsec,debug,packet 44aab9dc 4b533753 6f2d83f8 2a724af7
Jan/09/2022 05:59:48 ipsec,debug,packet encryption(aes)
Jan/09/2022 05:59:48 ipsec,debug,packet with key:
Jan/09/2022 05:59:48 ipsec,debug,packet e05a602d 3b4b2498 2bfd28f2 4a0922ef
Jan/09/2022 05:59:48 ipsec,debug,packet decrypted payload by IV:
Jan/09/2022 05:59:48 ipsec,debug,packet 13eaa1ec 43a45e23 ce424f9a 67e1b174
Jan/09/2022 05:59:48 ipsec,debug,packet decrypted payload, but not trimed.
Jan/09/2022 05:59:48 ipsec,debug,packet 0b000018 ab7cc65c 02bcb8de 7c538e2d 67503c56 f338d3dc 00000020 00000001
Jan/09/2022 05:59:48 ipsec,debug,packet 01108d29 277e638f 3335741e 4ca28af1 a26d85ef 0000028d 00000000 00000000
Jan/09/2022 05:59:48 ipsec,debug,packet padding len=1
Jan/09/2022 05:59:48 ipsec,debug,packet skip to trim padding.
Jan/09/2022 05:59:48 ipsec,debug,packet decrypted.
Jan/09/2022 05:59:48 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 08100501 a4a50001 0000005c 0b000018
Jan/09/2022 05:59:48 ipsec,debug,packet ab7cc65c 02bcb8de 7c538e2d 67503c56 f338d3dc 00000020 00000001 01108d29
Jan/09/2022 05:59:48 ipsec,debug,packet 277e638f 3335741e 4ca28af1 a26d85ef 0000028d 00000000 00000000
Jan/09/2022 05:59:48 ipsec,debug,packet HASH with:
Jan/09/2022 05:59:48 ipsec,debug,packet a4a50001 00000020 00000001 01108d29 277e638f 3335741e 4ca28af1 a26d85ef
Jan/09/2022 05:59:48 ipsec,debug,packet 0000028d
Jan/09/2022 05:59:48 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 05:59:48 ipsec,debug,packet HASH computed:
Jan/09/2022 05:59:48 ipsec,debug,packet ab7cc65c 02bcb8de 7c538e2d 67503c56 f338d3dc
Jan/09/2022 05:59:48 ipsec,debug hash validated.
Jan/09/2022 05:59:48 ipsec,debug begin.
Jan/09/2022 05:59:48 ipsec,debug seen nptype=8(hash) len=24
Jan/09/2022 05:59:48 ipsec,debug seen nptype=11(notify) len=32
Jan/09/2022 05:59:48 ipsec,debug succeed.
Jan/09/2022 05:59:48 ipsec,debug 34.198.222.127 notify: R_U_THERE_ACK
Jan/09/2022 05:59:48 ipsec,debug 34.198.222.127 DPD R-U-There-Ack received
Jan/09/2022 05:59:48 ipsec,debug received an R-U-THERE-ACK



 
mankomal
Member Candidate
Member Candidate
Topic Author
Posts: 106
Joined: Fri Nov 24, 2006 8:56 am

Re: Site-To-Site VPN AWS problem

Sun Jan 09, 2022 8:35 am

It looks like different config. I see ESP in old log, but AH in new one. Old has ID type IPv4_address, new one has IPv4_subnet.

What is the exact info you got from them, i.e. pameters for tunnel that you're supposed to use?
configuration given by AWS
==============================================================================
! IPSec Tunnel #1
==============================================================================

! #1: IPSec Proposal Configuration
!
! An IPsec proposal defines the IPsec parameters for encryption, authentication, Diffie-Hellman, and lifetime.
! Please note, these sample configurations are for the minimum requirement of AES128, SHA1, and DH Group 2.
! Category "VPN" connections in the GovCloud region have a minimum requirement of AES128, SHA2, and DH Group 14.
! You will need to modify these sample configuration files to take advantage of AES256, SHA256,  or other DH
! groups like 2, 14-18, 22, 23, and 24.
! Higher parameters are only available for VPNs of category "VPN," and not for "VPN-Classic".

Go to IP Tab --> IPsec --> Proposals

      a. Click on "+" button
      b. Name: ipsec-vpn-0fc6ef34022537a51-0
      c. Auth. Algorithms: sha1
      d. Encr. Algorithms: aes-128-cbc
      e. Lifetime: 01:00:00
      f. PFS Group: modp1024
      g. Select Apply and Ok
      
      !---------------------------------------------------------------------------------
! #2: Internet Key Exchange
!
! A policy is established for the supported ISAKMP encryption, authentication, Diffie-Hellman, lifetime,
! and key parameters. The IKE peer is configured with the supported IKE encryption,  authentication, Diffie-Hellman, lifetime, and key
! parameters.Please note, these sample configurations are for the minimum requirement of AES128, SHA1, and DH Group 2.
! Category "VPN" connections in the GovCloud region have a minimum requirement of AES128, SHA2, and DH Group 14.
! You will need to modify these sample configuration files to take advantage of AES256, SHA256,  or other DH
! groups like 2, 14-18, 22, 23, and 24.
! NOTE: If you customized tunnel options when creating or modifying your VPN connection, you may need to modify these sample configurations to match the custom settings for your tunnels.
!
! Higher parameters are only available for VPNs of category "VPN," and not for "VPN-Classic".
! The address of the external interface for your customer gateway must be a static address.
! Your customer gateway may reside behind a device performing network address translation (NAT). To
! ensure that NAT traversal (NAT-T) can function, you must use the corresponding IP as the "Local Address".

! Create an IKE policy permitting traffic from your local subnet to the VPC subnet.
! Also permitting traffic from the Inside IP associated with your Customer Gateway to the inside IP associated
! with the Virtual Private Gateway. For that, your IKE policy should propose any (0.0.0.0/0) to any (0.0.0.0/0)
! in traffic selector.

Go to IP Tab --> IPsec --> Policies

1) Click on "+" button and select the General Tab
      a. Src. Address: 0.0.0.0/0
      b. Dst. Address: 0.0.0.0/0

2) Click on Action Tab
      a. Select Tunnel
      b. SA Src. Address: 164.52.192.253
      c. SA Dst. Address: 34.198.222.127
      d. Proposal: ipsec-vpn-0fc6ef34022537a51-0
      e. Select Apply and Ok


Customer gateway inside IP Address: 169.254.116.214
Virtual Private gateway inside Address: 169.254.116.213


! However, in MikroTik router IPSec operates even below the routing table and hence, creating IKE policy with
! any (0.0.0.0/0) to any (0.0.0.0/0) causes internal routing issues. To overcome this create a second IPsec policy
! exempting local networks from encryption and move this policy to top with high priority:

Go to IP Tab --> IPsec --> Policies

3) Click on "+" button and select the General Tab
      a. Src. Address: 0.0.0.0/0
      b. Dst. Address: local subnet/mask
      c. Protocol all

4) Click on Action Tab

      a. Action: none
      b. Level: require
      c. IPsec Protocols: esp
      d. Select Tunnel
      e. SA Src. Address: 0.0.0.0
      f. SA Dst. Address: 0.0.0.0
      g. Proposal: default
      h. Select Apply and Ok

5). Move the second IKE policy to top using MikroTik command line
(Note: Winbox GUI doesn't have the option to prioritize policies)

Go to New Terminal Tab --> once command like window opens use following commands

-----------------------
/ip ipsec policy
print

! Let's assume you you have 2 policies, First IKE policy on slot 0 and the secondary IKE policy on slot 1. Type:

move 1 0
-----------------------


Go to IP Tab --> IPsec --> Profile

6) Click on "+" button
      a. Profile name: profile-vpn-0fc6ef34022537a51-0
      b. Hash Algorith: sha1
      c. Encryption Algorithm: aes-128
      d. DH Group: modp1024
      e. Lifetime: 08:00:00
      f. DPD Interval: 10
      g. DPD Maximum Failures: 3
      h. Select Apply and Ok

Go to IP Tab --> IPsec --> Peer

      a. Address: 34.198.222.127
      b. Local Address: 164.52.192.253
      c. Profile: profile-vpn-0fc6ef34022537a51-0
      d. Exchange Mode: IKE2
      e. Select Apply and Ok

Go to IP Tab --> IPsec --> Identities

      a. Auth Method: Pre-Shared key
      b. Secret: <secret>
      c. Select Apply and Ok
      
      ! ----------------------------------------------------------------------------
! #3: Tunnel Interface Configuration
!
! A tunnel interface is configured to be the logical interface associated
! with the tunnel. All traffic routed to the tunnel interface will be
! encrypted and transmitted to the VPC. Similarly, traffic from the VPC
! will be logically received on this interface.
! The address of the interface is configured with the setup for your
! Customer Gateway. If the address changes, the Customer Gateway and VPN
! Connection must be recreated with Amazon VPC.

Go to IP Tab --> Addresses

      a. Click on "+" button
      b. Address: 169.254.116.214/30
      b. Interface: Select the WAN/Outside interface
      c. Select Apply and Ok
      
After this there is BGP and NAT exemptions
 
User avatar
sindy
Forum Guru
Forum Guru
Posts: 11126
Joined: Mon Dec 04, 2017 9:19 pm

Re: Site-To-Site VPN AWS problem

Sun Jan 09, 2022 1:55 pm

OK, it starts making sense. The vernacular in the IPsec log when IKE (v1) is used is confusing, as it names the local and remote prefix of the Phase 2 traffic selector IDci and IDcr.

The AWS IPsec implementation uses the "Virtual Tunnel Interface" approach, so each IPsec Phase 2 SA is represented by a virtual interface and the choice of traffic to be sent to that SA is done using the regular routing. So the SA must accept any source address and any destination address. But the IPsec standard, which Mikrotik adheres to, requires that traffic for SAs is chosen by means of a "traffic selector", which is a set of rules specifying a source and destination prefix and possibly also IP protocol and ports. The traffic selectors are compared between the peers; if there is a difference, the SA is not established (in IKE, IKEv2 has a negotiation mechanism allowing to establish a SA for a common subset of the traffic selectors proposed by both peers).

So the workaround for this difference in approaches is that you use a "0.0.0.0/0->0.0.0.0/0" traffic selector in the very last policy on the Mikrotik, and exempt some traffic from getting caught by that one by defining policies matching on that traffic before (above) the "catch all" one. Unless you have other IPsec peers, these policies must only make sure that traffic among local LANs will not be intercepted, which is achieved by setting their action to none, which means that there is also no need to specify any peer for them.

The configuration you've posted contains multiple policies linked to peer cgw, with different traffic selectors than "0.0.0.0/0->0.0.0.0/0". So the Mikrotik offers the first such policy (172.31.0.0/16 -> 0.0.0.0/0) to the AWS peer, and the AWS peer rejects it as it doesn't match the expected 0.0.0.0/0->0.0.0.0/0 one.

So you have to disable, and later probably remove, all policies with action=encrypt except the "0.0.0.0/0->0.0.0.0/0" one, enable the action=none disabled=yes dst-address=172.16.96.0/19 src-address=0.0.0.0/0 one, and as the very last step, enable the "0.0.0.0/0->0.0.0.0/0" one. If you enable the "catch all" one before enabling the action=none one, you'll lose management access to the router via 172.16.96.0/19 - the policies intercept traffic even if their associated SAs are not active. If you manage the router via its public IP, you have to add also another action=none policy, src-address=164.52.192.253/32 dst-address=0.0.0.0/0 (a reverse one as compared to the one you have there now).

The instructions by AWS seem to be continuously updated to match the state of the art of RouterOS, but somehow not good enough - they still mention priority of the policy, which is a parameter that has been gone long before 6.47 and has been replaced by the ordering of the policies. It's also not true (at least in 6.47.10 and Winbox 3.20) that the order of policies cannot be manipulated using Winbox.
 
mankomal
Member Candidate
Member Candidate
Topic Author
Posts: 106
Joined: Fri Nov 24, 2006 8:56 am

Re: Site-To-Site VPN AWS problem

Sun Jan 09, 2022 2:00 pm

Well after lot of hit and trials I was finally able to get the VPN to UP status. Seems that there is a chronology of steps to follow and then only it seems to work. i.e. you need to make IPSEC policies before you make the IPSEC peer/Identities. Reboot doesnt seems to help in this case. Now the problem is I am able to reach the Inside IP of the AWS i.e. VPG on AWS side. But my EC2 instance doesn't seems to know this IP and there the problem of communication is happening. I have enabled inbound rules to allow all IPv4 traffic from Mikrotik subnet to the EC2 instance but that also doesn't helps any idea on this?
 
mankomal
Member Candidate
Member Candidate
Topic Author
Posts: 106
Joined: Fri Nov 24, 2006 8:56 am

Re: Site-To-Site VPN AWS problem

Sun Jan 09, 2022 2:02 pm

OK, it starts making sense. The vernacular in the IPsec log when IKE (v1) is used is confusing, as it names the local and remote prefix of the Phase 2 traffic selector IDci and IDcr.

The AWS IPsec implementation uses the "Virtual Tunnel Interface" approach, so each IPsec Phase 2 SA is represented by a virtual interface and the choice of traffic to be sent to that SA is done using the regular routing. So the SA must accept any source address and any destination address. But the IPsec standard, which Mikrotik adheres to, requires that traffic for SAs is chosen by means of a "traffic selector", which is a set of rules specifying a source and destination prefix and possibly also IP protocol and ports. The traffic selectors are compared between the peers; if there is a difference, the SA is not established (in IKE, IKEv2 has a negotiation mechanism allowing to establish a SA for a common subset of the traffic selectors proposed by both peers).

So the workaround for this difference in approaches is that you use a "0.0.0.0/0->0.0.0.0/0" traffic selector in the very last policy on the Mikrotik, and exempt some traffic from getting caught by that one by defining policies matching on that traffic before (above) the "catch all" one. Unless you have other IPsec peers, these policies must only make sure that traffic among local LANs will not be intercepted, which is achieved by setting their action to none, which means that there is also no need to specify any peer for them.

The configuration you've posted contains multiple policies linked to peer cgw, with different traffic selectors than "0.0.0.0/0->0.0.0.0/0". So the Mikrotik offers the first such policy (172.31.0.0/16 -> 0.0.0.0/0) to the AWS peer, and the AWS peer rejects it as it doesn't match the expected 0.0.0.0/0->0.0.0.0/0 one.

So you have to disable, and later probably remove, all policies with action=encrypt except the "0.0.0.0/0->0.0.0.0/0" one, enable the action=none disabled=yes dst-address=172.16.96.0/19 src-address=0.0.0.0/0 one, and as the very last step, enable the "0.0.0.0/0->0.0.0.0/0" one. If you enable the "catch all" one before enabling the action=none one, you'll lose management access to the router via 172.16.96.0/19 - the policies intercept traffic even if their associated SAs are not active. If you manage the router via its public IP, you have to add also another action=none policy, src-address=164.52.192.253/32 dst-address=0.0.0.0/0 (a reverse one as compared to the one you have there now).

The instructions by AWS seem to be continuously updated to match the state of the art of RouterOS, but somehow not good enough - they still mention priority of the policy, which is a parameter that has been gone long before 6.47 and has been replaced by the ordering of the policies. It's also not true (at least in 6.47.10 and Winbox 3.20) that the order of policies cannot be manipulated using Winbox.
Ok I will try this as I am not able to get the communication going as per the post I just posted. Seems this could be the issue. Amazingly whereever I read about this it said it can be done without that and actually I have been able to get it done without this.
Let me try with your suggestion again and see what happens.
 
mankomal
Member Candidate
Member Candidate
Topic Author
Posts: 106
Joined: Fri Nov 24, 2006 8:56 am

Re: Site-To-Site VPN AWS problem

Sun Jan 09, 2022 2:07 pm

OK, it starts making sense. The vernacular in the IPsec log when IKE (v1) is used is confusing, as it names the local and remote prefix of the Phase 2 traffic selector IDci and IDcr.

The AWS IPsec implementation uses the "Virtual Tunnel Interface" approach, so each IPsec Phase 2 SA is represented by a virtual interface and the choice of traffic to be sent to that SA is done using the regular routing. So the SA must accept any source address and any destination address. But the IPsec standard, which Mikrotik adheres to, requires that traffic for SAs is chosen by means of a "traffic selector", which is a set of rules specifying a source and destination prefix and possibly also IP protocol and ports. The traffic selectors are compared between the peers; if there is a difference, the SA is not established (in IKE, IKEv2 has a negotiation mechanism allowing to establish a SA for a common subset of the traffic selectors proposed by both peers).

So the workaround for this difference in approaches is that you use a "0.0.0.0/0->0.0.0.0/0" traffic selector in the very last policy on the Mikrotik, and exempt some traffic from getting caught by that one by defining policies matching on that traffic before (above) the "catch all" one. Unless you have other IPsec peers, these policies must only make sure that traffic among local LANs will not be intercepted, which is achieved by setting their action to none, which means that there is also no need to specify any peer for them.

The configuration you've posted contains multiple policies linked to peer cgw, with different traffic selectors than "0.0.0.0/0->0.0.0.0/0". So the Mikrotik offers the first such policy (172.31.0.0/16 -> 0.0.0.0/0) to the AWS peer, and the AWS peer rejects it as it doesn't match the expected 0.0.0.0/0->0.0.0.0/0 one.

So you have to disable, and later probably remove, all policies with action=encrypt except the "0.0.0.0/0->0.0.0.0/0" one, enable the action=none disabled=yes dst-address=172.16.96.0/19 src-address=0.0.0.0/0 one, and as the very last step, enable the "0.0.0.0/0->0.0.0.0/0" one. If you enable the "catch all" one before enabling the action=none one, you'll lose management access to the router via 172.16.96.0/19 - the policies intercept traffic even if their associated SAs are not active. If you manage the router via its public IP, you have to add also another action=none policy, src-address=164.52.192.253/32 dst-address=0.0.0.0/0 (a reverse one as compared to the one you have there now).

The instructions by AWS seem to be continuously updated to match the state of the art of RouterOS, but somehow not good enough - they still mention priority of the policy, which is a parameter that has been gone long before 6.47 and has been replaced by the ordering of the policies. It's also not true (at least in 6.47.10 and Winbox 3.20) that the order of policies cannot be manipulated using Winbox.
@Sindy

In initial none one you are suggesting SRC as 0.0.0.0/0 and DST as 172.16.96.0/19
and in the public one SRC as 164.52.192.253/32 and DST as 0.0.0.0/0

am I missing something or is this ok ?
 
mankomal
Member Candidate
Member Candidate
Topic Author
Posts: 106
Joined: Fri Nov 24, 2006 8:56 am

Re: Site-To-Site VPN AWS problem

Sun Jan 09, 2022 2:12 pm

OK, it starts making sense. The vernacular in the IPsec log when IKE (v1) is used is confusing, as it names the local and remote prefix of the Phase 2 traffic selector IDci and IDcr.

The AWS IPsec implementation uses the "Virtual Tunnel Interface" approach, so each IPsec Phase 2 SA is represented by a virtual interface and the choice of traffic to be sent to that SA is done using the regular routing. So the SA must accept any source address and any destination address. But the IPsec standard, which Mikrotik adheres to, requires that traffic for SAs is chosen by means of a "traffic selector", which is a set of rules specifying a source and destination prefix and possibly also IP protocol and ports. The traffic selectors are compared between the peers; if there is a difference, the SA is not established (in IKE, IKEv2 has a negotiation mechanism allowing to establish a SA for a common subset of the traffic selectors proposed by both peers).

So the workaround for this difference in approaches is that you use a "0.0.0.0/0->0.0.0.0/0" traffic selector in the very last policy on the Mikrotik, and exempt some traffic from getting caught by that one by defining policies matching on that traffic before (above) the "catch all" one. Unless you have other IPsec peers, these policies must only make sure that traffic among local LANs will not be intercepted, which is achieved by setting their action to none, which means that there is also no need to specify any peer for them.

The configuration you've posted contains multiple policies linked to peer cgw, with different traffic selectors than "0.0.0.0/0->0.0.0.0/0". So the Mikrotik offers the first such policy (172.31.0.0/16 -> 0.0.0.0/0) to the AWS peer, and the AWS peer rejects it as it doesn't match the expected 0.0.0.0/0->0.0.0.0/0 one.

So you have to disable, and later probably remove, all policies with action=encrypt except the "0.0.0.0/0->0.0.0.0/0" one, enable the action=none disabled=yes dst-address=172.16.96.0/19 src-address=0.0.0.0/0 one, and as the very last step, enable the "0.0.0.0/0->0.0.0.0/0" one. If you enable the "catch all" one before enabling the action=none one, you'll lose management access to the router via 172.16.96.0/19 - the policies intercept traffic even if their associated SAs are not active. If you manage the router via its public IP, you have to add also another action=none policy, src-address=164.52.192.253/32 dst-address=0.0.0.0/0 (a reverse one as compared to the one you have there now).

The instructions by AWS seem to be continuously updated to match the state of the art of RouterOS, but somehow not good enough - they still mention priority of the policy, which is a parameter that has been gone long before 6.47 and has been replaced by the ordering of the policies. It's also not true (at least in 6.47.10 and Winbox 3.20) that the order of policies cannot be manipulated using Winbox.
@Sindy

In initial none one you are suggesting SRC as 0.0.0.0/0 and DST as 172.16.96.0/19
and in the public one SRC as 164.52.192.253/32 and DST as 0.0.0.0/0

am I missing something or is this ok ?
So I just entered 4 more policies on top
SRC as 0.0.0.0/0 and DST as 172.16.96.0/19 and 164.52.192.253
SRC as 172.16.96.0/19 and 164.52.192.253 and DST as 0.0.0.0/0
The I entered the catch all policy in the end, but that broke my connection and still the tunnel is not communicating with the EC2 instance. Just FYI I changed the whole config and now have Dynamic routing, should I post the new config and logs?
 
mankomal
Member Candidate
Member Candidate
Topic Author
Posts: 106
Joined: Fri Nov 24, 2006 8:56 am

Re: Site-To-Site VPN AWS problem

Sun Jan 09, 2022 2:23 pm

/ip ipsec profile
add dh-group=modp1024 dpd-interval=10s dpd-maximum-failures=3 enc-algorithm=aes-128 lifetime=8h name=aws-profile nat-traversal=no
/ip ipsec peer
add address=3.226.95.68/32 local-address=164.52.192.253 name=AWS profile=aws-profile
/ip ipsec proposal
add enc-algorithms=aes-128-cbc lifetime=1h name=awsproposal
/ip ipsec identity
add peer=AWS secret=<secret>
/ip ipsec policy
add action=none disabled=yes dst-address=172.16.96.0/19 src-address=0.0.0.0/0
add action=none disabled=yes dst-address=164.52.192.253/32 src-address=0.0.0.0/0
add action=none disabled=yes dst-address=0.0.0.0/0 src-address=164.52.192.253/32
add action=none disabled=yes dst-address=0.0.0.0/0 src-address=172.16.96.0/19
add dst-address=169.254.128.216/30 peer=AWS src-address=169.254.128.218/32 tunnel=yes
add dst-address=172.31.0.0/16 peer=AWS proposal=awsproposal src-address=172.16.96.0/19 tunnel=yes
add disabled=yes dst-address=0.0.0.0/0 peer=AWS proposal=awsproposal src-address=0.0.0.0/0 tunnel=yes

/routing bgp instance
add as=65000 name=bgp1 router-id=169.254.128.218
/routing bgp network
add network=172.16.96.0/19
/routing bgp peer
add instance=bgp1 name=peer1 remote-address=169.254.128.217

Jan/09/2022 11:54:14 ipsec acquire for policy: 169.254.128.218 <=> 169.254.128.216/30
Jan/09/2022 11:54:14 ipsec peer is IKEv1
Jan/09/2022 11:54:14 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=0:0)
Jan/09/2022 11:54:14 ipsec,debug   (trns_id=AES-CBC encklen=256 authtype=hmac-sha1)
Jan/09/2022 11:54:14 ipsec,debug   (trns_id=AES-CBC encklen=192 authtype=hmac-sha1)
Jan/09/2022 11:54:14 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
Jan/09/2022 11:54:14 ipsec IPsec-SA request for 3.226.95.68 queued due to no phase1 found.
Jan/09/2022 11:54:14 ipsec,debug ===
Jan/09/2022 11:54:14 ipsec,info initiate new phase 1 (Identity Protection): 164.52.192.253[500]<=>3.226.95.68[500]
Jan/09/2022 11:54:14 ipsec,debug new cookie:
Jan/09/2022 11:54:14 ipsec,debug e544d4cf83801af4
Jan/09/2022 11:54:14 ipsec,debug add payload of len 52, next type 13
Jan/09/2022 11:54:14 ipsec,debug add payload of len 16, next type 13
Jan/09/2022 11:54:14 ipsec,debug add payload of len 16, next type 0
Jan/09/2022 11:54:14 ipsec,debug 124 bytes from 164.52.192.253[500] to 3.226.95.68[500]
Jan/09/2022 11:54:14 ipsec,debug 1 times of 124 bytes message will be sent to 3.226.95.68[500]
Jan/09/2022 11:54:14 ipsec,debug,packet e544d4cf 83801af4 00000000 00000000 01100200 00000000 0000007c 0d000038
Jan/09/2022 11:54:14 ipsec,debug,packet 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c7080
Jan/09/2022 11:54:14 ipsec,debug,packet 80010007 800e0080 80030001 80020002 80040002 0d000014 12f5f28c 457168a9
Jan/09/2022 11:54:14 ipsec,debug,packet 702d9fe2 74cc0100 00000014 afcad713 68a1f1c9 6b8696fc 77570100
Jan/09/2022 11:54:14 ipsec sent phase1 packet 164.52.192.253[500]<=>3.226.95.68[500] e544d4cf83801af4:0000000000000000
Jan/09/2022 11:54:14 ipsec,debug ===== received 104 bytes from 3.226.95.68[500] to 164.52.192.253[500]
Jan/09/2022 11:54:14 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 01100200 00000000 00000068 0d000038
Jan/09/2022 11:54:14 ipsec,debug,packet 00000001 00000001 0000002c 01010001 00000024 01010000 80010007 800e0080
Jan/09/2022 11:54:14 ipsec,debug,packet 80020002 80040002 80030001 800b0001 800c7080 00000014 afcad713 68a1f1c9
Jan/09/2022 11:54:14 ipsec,debug,packet 6b8696fc 77570100
Jan/09/2022 11:54:14 ipsec,debug begin.
Jan/09/2022 11:54:14 ipsec,debug seen nptype=1(sa) len=56
Jan/09/2022 11:54:14 ipsec,debug seen nptype=13(vid) len=20
Jan/09/2022 11:54:14 ipsec,debug succeed.
Jan/09/2022 11:54:14 ipsec received Vendor ID: DPD
Jan/09/2022 11:54:14 ipsec,debug remote supports DPD
Jan/09/2022 11:54:14 ipsec,debug total SA len=52
Jan/09/2022 11:54:14 ipsec,debug 00000001 00000001 0000002c 01010001 00000024 01010000 80010007 800e0080
Jan/09/2022 11:54:14 ipsec,debug 80020002 80040002 80030001 800b0001 800c7080
Jan/09/2022 11:54:14 ipsec,debug begin.
Jan/09/2022 11:54:14 ipsec,debug seen nptype=2(prop) len=44
Jan/09/2022 11:54:14 ipsec,debug succeed.
Jan/09/2022 11:54:14 ipsec,debug proposal #1 len=44
Jan/09/2022 11:54:14 ipsec,debug begin.
Jan/09/2022 11:54:14 ipsec,debug seen nptype=3(trns) len=36
Jan/09/2022 11:54:14 ipsec,debug succeed.
Jan/09/2022 11:54:14 ipsec,debug transform #1 len=36
Jan/09/2022 11:54:14 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
Jan/09/2022 11:54:14 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:14 ipsec,debug type=Key Length, flag=0x8000, lorv=128
Jan/09/2022 11:54:14 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
Jan/09/2022 11:54:14 ipsec,debug hash(sha1)
Jan/09/2022 11:54:14 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
Jan/09/2022 11:54:14 ipsec,debug dh(modp1024)
Jan/09/2022 11:54:14 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
Jan/09/2022 11:54:14 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
Jan/09/2022 11:54:14 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800
Jan/09/2022 11:54:14 ipsec,debug pair 1:
Jan/09/2022 11:54:14 ipsec,debug  0x80ce460: next=(nil) tnext=(nil)
Jan/09/2022 11:54:14 ipsec,debug proposal #1: 1 transform
Jan/09/2022 11:54:14 ipsec,debug -checking with pre-shared key auth-
Jan/09/2022 11:54:14 ipsec,debug prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1
Jan/09/2022 11:54:14 ipsec,debug trns#=1, trns-id=IKE
Jan/09/2022 11:54:14 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
Jan/09/2022 11:54:14 ipsec,debug type=Key Length, flag=0x8000, lorv=128
Jan/09/2022 11:54:14 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
Jan/09/2022 11:54:14 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
Jan/09/2022 11:54:14 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
Jan/09/2022 11:54:14 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
Jan/09/2022 11:54:14 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800
Jan/09/2022 11:54:14 ipsec,debug -compare proposal #1: Local:Peer
Jan/09/2022 11:54:14 ipsec,debug (lifetime = 28800:28800)
Jan/09/2022 11:54:14 ipsec,debug (lifebyte = 0:0)
Jan/09/2022 11:54:14 ipsec,debug enctype = AES-CBC:AES-CBC
Jan/09/2022 11:54:14 ipsec,debug (encklen = 128:128)
Jan/09/2022 11:54:14 ipsec,debug hashtype = SHA:SHA
Jan/09/2022 11:54:14 ipsec,debug authmethod = pre-shared key:pre-shared key
Jan/09/2022 11:54:14 ipsec,debug dh_group = 1024-bit MODP group:1024-bit MODP group
Jan/09/2022 11:54:14 ipsec,debug -an acceptable proposal found-
Jan/09/2022 11:54:14 ipsec,debug dh(modp1024)
Jan/09/2022 11:54:14 ipsec,debug -agreed on pre-shared key auth-
Jan/09/2022 11:54:14 ipsec,debug ===
Jan/09/2022 11:54:14 ipsec,debug dh(modp1024)
Jan/09/2022 11:54:14 ipsec,debug,packet compute DH's private.
Jan/09/2022 11:54:14 ipsec,debug,packet 60acd1de 73a67c56 adf0510d db2938d9 3877a134 26d30cd4 19fcc2fd 3eb791d2
Jan/09/2022 11:54:14 ipsec,debug,packet edf52f24 f27e8db5 b84c70ee aade4f39 6476c581 254b11ed 6273b4a5 0eaf9c6d
Jan/09/2022 11:54:14 ipsec,debug,packet 8ee10ab5 d69eede9 d0b7c6dd 3122362b 257b9e99 ac921308 e71feba8 47decd0d
Jan/09/2022 11:54:14 ipsec,debug,packet ac1093d3 7be5e2f4 a70f581e ef58efc3 d43ff52a 3948e0b6 e254fe8c 0e32dac0
Jan/09/2022 11:54:14 ipsec,debug,packet compute DH's public.
Jan/09/2022 11:54:14 ipsec,debug,packet c70ccb7f a2f984be df888695 1cc1bccb 3d135367 f51e6c11 83abada2 0042b488
Jan/09/2022 11:54:14 ipsec,debug,packet 54eca15a 986898cc 3aa4bfdc b69da668 b6430e8a 33f7051d 1eac53cd 5a1123cd
Jan/09/2022 11:54:14 ipsec,debug,packet 0a808918 1e451a89 6bcfe77b 5aa8b3f5 96e27754 9f39cc17 68f2736f 2fc6d0e1
Jan/09/2022 11:54:14 ipsec,debug,packet b49f24c0 4ecab711 7e956c64 477f6b59 a341975a 46387d7e c1c140c8 9767eb79
Jan/09/2022 11:54:14 ipsec,debug add payload of len 128, next type 10
Jan/09/2022 11:54:14 ipsec,debug add payload of len 24, next type 0
Jan/09/2022 11:54:14 ipsec,debug 188 bytes from 164.52.192.253[500] to 3.226.95.68[500]
Jan/09/2022 11:54:14 ipsec,debug 1 times of 188 bytes message will be sent to 3.226.95.68[500]
Jan/09/2022 11:54:14 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 04100200 00000000 000000bc 0a000084
Jan/09/2022 11:54:14 ipsec,debug,packet c70ccb7f a2f984be df888695 1cc1bccb 3d135367 f51e6c11 83abada2 0042b488
Jan/09/2022 11:54:14 ipsec,debug,packet 54eca15a 986898cc 3aa4bfdc b69da668 b6430e8a 33f7051d 1eac53cd 5a1123cd
Jan/09/2022 11:54:14 ipsec,debug,packet 0a808918 1e451a89 6bcfe77b 5aa8b3f5 96e27754 9f39cc17 68f2736f 2fc6d0e1
Jan/09/2022 11:54:14 ipsec,debug,packet b49f24c0 4ecab711 7e956c64 477f6b59 a341975a 46387d7e c1c140c8 9767eb79
Jan/09/2022 11:54:14 ipsec,debug,packet 0000001c eabb5910 f97621f3 d23174a9 4b80e517 4ad0eba0 6f9d0a06
Jan/09/2022 11:54:14 ipsec sent phase1 packet 164.52.192.253[500]<=>3.226.95.68[500] e544d4cf83801af4:7a523bed653882b9
Jan/09/2022 11:54:14 ipsec,debug ===== received 196 bytes from 3.226.95.68[500] to 164.52.192.253[500]
Jan/09/2022 11:54:14 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 04100200 00000000 000000c4 0a000084
Jan/09/2022 11:54:14 ipsec,debug,packet d3a02366 0252d0d3 78a24fa7 d472f557 8cd50187 683d77e2 05be8090 1412deaf
Jan/09/2022 11:54:14 ipsec,debug,packet 811c9ffb 1c580ee5 470b52d3 223309c3 0de7aa7d f5a41a5a 1ca06c3e 65344e44
Jan/09/2022 11:54:14 ipsec,debug,packet 0d9855dd 099de439 6a583aba ee5cb8d9 7fa6df6b 4e192898 5545aae8 4d68a75d
Jan/09/2022 11:54:14 ipsec,debug,packet c1d32992 d695ce2b a136d0d1 8650143a 633f80ae b6f64d05 f37d2451 893761ef
Jan/09/2022 11:54:14 ipsec,debug,packet 00000024 ff511334 4cac8974 b7f3a5cb 8714101c 5d81c9cb 4ac5cdbe 7fb65815
Jan/09/2022 11:54:14 ipsec,debug,packet f860f85e
Jan/09/2022 11:54:14 ipsec,debug begin.
Jan/09/2022 11:54:14 ipsec,debug seen nptype=4(ke) len=132
Jan/09/2022 11:54:14 ipsec,debug seen nptype=10(nonce) len=36
Jan/09/2022 11:54:14 ipsec,debug succeed.
Jan/09/2022 11:54:14 ipsec,debug ===
Jan/09/2022 11:54:14 ipsec,debug dh(modp1024)
Jan/09/2022 11:54:14 ipsec,debug,packet compute DH's shared.
Jan/09/2022 11:54:14 ipsec,debug,packet 
Jan/09/2022 11:54:14 ipsec,debug,packet d5da0028 85991fde 7532827b ae194e6b b4dfd458 d155c3c1 c9287696 4dfcf2e1
Jan/09/2022 11:54:14 ipsec,debug,packet 42f56330 e2599274 75a695cc e5fc92e0 9ca98f0b 7436b3ad 9f90b4d3 de7855e2
Jan/09/2022 11:54:14 ipsec,debug,packet e76710b8 5d065c81 825a0934 77d81593 636c51c9 5d1b57bb 8baa017d 7fa45814
Jan/09/2022 11:54:14 ipsec,debug,packet a936fc25 a0b09e38 ba2a0437 fc87bfdc 0c936e2b 7cf18aed 98fc1ea6 bc99a536
Jan/09/2022 11:54:14 ipsec,debug nonce 1: 
Jan/09/2022 11:54:14 ipsec,debug eabb5910 f97621f3 d23174a9 4b80e517 4ad0eba0 6f9d0a06
Jan/09/2022 11:54:14 ipsec,debug nonce 2: 
Jan/09/2022 11:54:14 ipsec,debug ff511334 4cac8974 b7f3a5cb 8714101c 5d81c9cb 4ac5cdbe 7fb65815 f860f85e
Jan/09/2022 11:54:14 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:14 ipsec,debug SKEYID computed:
Jan/09/2022 11:54:14 ipsec,debug 17d687af b6e43819 e605f255 7697d4c8 0155bb75
Jan/09/2022 11:54:14 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:14 ipsec,debug SKEYID_d computed:
Jan/09/2022 11:54:14 ipsec,debug cd958586 b68b770b 8e9754ac b4ab76a8 f305255f
Jan/09/2022 11:54:14 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:14 ipsec,debug SKEYID_a computed:
Jan/09/2022 11:54:14 ipsec,debug 27274ab7 1dfee048 483a728f 255f340b 3b672666
Jan/09/2022 11:54:14 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:14 ipsec,debug SKEYID_e computed:
Jan/09/2022 11:54:14 ipsec,debug 925ffa84 dc60ed1c df18bbfd 052c9532 d670983d
Jan/09/2022 11:54:14 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:14 ipsec,debug hash(sha1)
Jan/09/2022 11:54:14 ipsec,debug final encryption key computed:
Jan/09/2022 11:54:14 ipsec,debug 925ffa84 dc60ed1c df18bbfd 052c9532
Jan/09/2022 11:54:14 ipsec,debug hash(sha1)
Jan/09/2022 11:54:14 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:14 ipsec,debug IV computed:
Jan/09/2022 11:54:14 ipsec,debug 68953f74 9f34c767 ea7322ac 81b0d3d2
Jan/09/2022 11:54:14 ipsec,debug use ID type of IPv4_address
Jan/09/2022 11:54:14 ipsec,debug,packet HASH with:
Jan/09/2022 11:54:14 ipsec,debug,packet c70ccb7f a2f984be df888695 1cc1bccb 3d135367 f51e6c11 83abada2 0042b488
Jan/09/2022 11:54:14 ipsec,debug,packet 54eca15a 986898cc 3aa4bfdc b69da668 b6430e8a 33f7051d 1eac53cd 5a1123cd
Jan/09/2022 11:54:14 ipsec,debug,packet 0a808918 1e451a89 6bcfe77b 5aa8b3f5 96e27754 9f39cc17 68f2736f 2fc6d0e1
Jan/09/2022 11:54:14 ipsec,debug,packet b49f24c0 4ecab711 7e956c64 477f6b59 a341975a 46387d7e c1c140c8 9767eb79
Jan/09/2022 11:54:14 ipsec,debug,packet d3a02366 0252d0d3 78a24fa7 d472f557 8cd50187 683d77e2 05be8090 1412deaf
Jan/09/2022 11:54:14 ipsec,debug,packet 811c9ffb 1c580ee5 470b52d3 223309c3 0de7aa7d f5a41a5a 1ca06c3e 65344e44
Jan/09/2022 11:54:14 ipsec,debug,packet 0d9855dd 099de439 6a583aba ee5cb8d9 7fa6df6b 4e192898 5545aae8 4d68a75d
Jan/09/2022 11:54:14 ipsec,debug,packet c1d32992 d695ce2b a136d0d1 8650143a 633f80ae b6f64d05 f37d2451 893761ef
Jan/09/2022 11:54:14 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 00000001 00000001 0000002c 01010001
Jan/09/2022 11:54:14 ipsec,debug,packet 00000024 01010000 800b0001 800c7080 80010007 800e0080 80030001 80020002
Jan/09/2022 11:54:14 ipsec,debug,packet 80040002 011101f4 a434c0fd
Jan/09/2022 11:54:14 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:14 ipsec,debug,packet HASH computed:
Jan/09/2022 11:54:14 ipsec,debug,packet 9bad0967 20ed31e9 f4743883 70add261 8785f8c2
Jan/09/2022 11:54:14 ipsec,debug add payload of len 8, next type 8
Jan/09/2022 11:54:14 ipsec,debug add payload of len 20, next type 0
Jan/09/2022 11:54:14 ipsec,debug,packet begin encryption.
Jan/09/2022 11:54:14 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:14 ipsec,debug,packet pad length = 12
Jan/09/2022 11:54:14 ipsec,debug,packet 0800000c 011101f4 a434c0fd 00000018 9bad0967 20ed31e9 f4743883 70add261
Jan/09/2022 11:54:14 ipsec,debug,packet 8785f8c2 d7e0b5e7 fbc5988b cbda890b
Jan/09/2022 11:54:14 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:14 ipsec,debug,packet with key:
Jan/09/2022 11:54:14 ipsec,debug,packet 925ffa84 dc60ed1c df18bbfd 052c9532
Jan/09/2022 11:54:14 ipsec,debug,packet encrypted payload by IV:
Jan/09/2022 11:54:14 ipsec,debug,packet 68953f74 9f34c767 ea7322ac 81b0d3d2
Jan/09/2022 11:54:14 ipsec,debug,packet save IV for next:
Jan/09/2022 11:54:14 ipsec,debug,packet fcb25b3c 6339a414 862d8b81 510bffa4
Jan/09/2022 11:54:14 ipsec,debug,packet encrypted.
Jan/09/2022 11:54:14 ipsec,debug 76 bytes from 164.52.192.253[500] to 3.226.95.68[500]
Jan/09/2022 11:54:14 ipsec,debug 1 times of 76 bytes message will be sent to 3.226.95.68[500]
Jan/09/2022 11:54:14 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 05100201 00000000 0000004c cabb7e98
Jan/09/2022 11:54:14 ipsec,debug,packet 63964d15 53d48cd5 5e84780d 72cdcd6e b01c916c 39b1d7ce 7b3dd45f fcb25b3c
Jan/09/2022 11:54:14 ipsec,debug,packet 6339a414 862d8b81 510bffa4
Jan/09/2022 11:54:14 ipsec sent phase1 packet 164.52.192.253[500]<=>3.226.95.68[500] e544d4cf83801af4:7a523bed653882b9
Jan/09/2022 11:54:14 ipsec,debug ===== received 76 bytes from 3.226.95.68[500] to 164.52.192.253[500]
Jan/09/2022 11:54:14 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 05100201 00000000 0000004c 45d9eb70
Jan/09/2022 11:54:14 ipsec,debug,packet a819b0f0 60b36640 ef920331 2ca77bb2 cc36ab52 1380612b c40d72fa 22afac16
Jan/09/2022 11:54:14 ipsec,debug,packet 8919b8bb b88a8ee0 704d4d10
Jan/09/2022 11:54:14 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:14 ipsec,debug,packet IV was saved for next processing:
Jan/09/2022 11:54:14 ipsec,debug,packet 22afac16 8919b8bb b88a8ee0 704d4d10
Jan/09/2022 11:54:14 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:14 ipsec,debug,packet with key:
Jan/09/2022 11:54:14 ipsec,debug,packet 925ffa84 dc60ed1c df18bbfd 052c9532
Jan/09/2022 11:54:14 ipsec,debug,packet decrypted payload by IV:
Jan/09/2022 11:54:14 ipsec,debug,packet fcb25b3c 6339a414 862d8b81 510bffa4
Jan/09/2022 11:54:14 ipsec,debug,packet decrypted payload, but not trimed.
Jan/09/2022 11:54:14 ipsec,debug,packet 0800000c 01000000 03e25f44 00000018 3b8e2b79 fd5fab87 978fdf1e aa280f4d
Jan/09/2022 11:54:14 ipsec,debug,packet 3776eaf1 00000000 00000000 00000000
Jan/09/2022 11:54:14 ipsec,debug,packet padding len=1
Jan/09/2022 11:54:14 ipsec,debug,packet skip to trim padding.
Jan/09/2022 11:54:14 ipsec,debug,packet decrypted.
Jan/09/2022 11:54:14 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 05100201 00000000 0000004c 0800000c
Jan/09/2022 11:54:14 ipsec,debug,packet 01000000 03e25f44 00000018 3b8e2b79 fd5fab87 978fdf1e aa280f4d 3776eaf1
Jan/09/2022 11:54:14 ipsec,debug,packet 00000000 00000000 00000000
Jan/09/2022 11:54:14 ipsec,debug begin.
Jan/09/2022 11:54:14 ipsec,debug seen nptype=5(id) len=12
Jan/09/2022 11:54:14 ipsec,debug seen nptype=8(hash) len=24
Jan/09/2022 11:54:14 ipsec,debug succeed.
Jan/09/2022 11:54:14 ipsec,debug HASH received:
Jan/09/2022 11:54:14 ipsec,debug 3b8e2b79 fd5fab87 978fdf1e aa280f4d 3776eaf1
Jan/09/2022 11:54:14 ipsec,debug,packet HASH with:
Jan/09/2022 11:54:14 ipsec,debug,packet d3a02366 0252d0d3 78a24fa7 d472f557 8cd50187 683d77e2 05be8090 1412deaf
Jan/09/2022 11:54:14 ipsec,debug,packet 811c9ffb 1c580ee5 470b52d3 223309c3 0de7aa7d f5a41a5a 1ca06c3e 65344e44
Jan/09/2022 11:54:14 ipsec,debug,packet 0d9855dd 099de439 6a583aba ee5cb8d9 7fa6df6b 4e192898 5545aae8 4d68a75d
Jan/09/2022 11:54:14 ipsec,debug,packet c1d32992 d695ce2b a136d0d1 8650143a 633f80ae b6f64d05 f37d2451 893761ef
Jan/09/2022 11:54:14 ipsec,debug,packet c70ccb7f a2f984be df888695 1cc1bccb 3d135367 f51e6c11 83abada2 0042b488
Jan/09/2022 11:54:14 ipsec,debug,packet 54eca15a 986898cc 3aa4bfdc b69da668 b6430e8a 33f7051d 1eac53cd 5a1123cd
Jan/09/2022 11:54:14 ipsec,debug,packet 0a808918 1e451a89 6bcfe77b 5aa8b3f5 96e27754 9f39cc17 68f2736f 2fc6d0e1
Jan/09/2022 11:54:14 ipsec,debug,packet b49f24c0 4ecab711 7e956c64 477f6b59 a341975a 46387d7e c1c140c8 9767eb79
Jan/09/2022 11:54:14 ipsec,debug,packet 7a523bed 653882b9 e544d4cf 83801af4 00000001 00000001 0000002c 01010001
Jan/09/2022 11:54:14 ipsec,debug,packet 00000024 01010000 800b0001 800c7080 80010007 800e0080 80030001 80020002
Jan/09/2022 11:54:14 ipsec,debug,packet 80040002 01000000 03e25f44
Jan/09/2022 11:54:14 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:14 ipsec,debug,packet HASH computed:
Jan/09/2022 11:54:14 ipsec,debug,packet 3b8e2b79 fd5fab87 978fdf1e aa280f4d 3776eaf1
Jan/09/2022 11:54:14 ipsec,debug HASH for PSK validated.
Jan/09/2022 11:54:14 ipsec,debug 3.226.95.68 peer's ID:
Jan/09/2022 11:54:14 ipsec,debug 01000000 03e25f44
Jan/09/2022 11:54:14 ipsec,debug ===
Jan/09/2022 11:54:14 ipsec ph2 possible after ph1 creation
Jan/09/2022 11:54:14 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=0:0)
Jan/09/2022 11:54:14 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
Jan/09/2022 11:54:14 ipsec,debug begin QUICK mode.
Jan/09/2022 11:54:14 ipsec,debug ===
Jan/09/2022 11:54:14 ipsec,debug begin QUICK mode.
Jan/09/2022 11:54:14 ipsec initiate new phase 2 negotiation: 164.52.192.253[500]<=>3.226.95.68[500]
Jan/09/2022 11:54:14 ipsec,debug,packet compute IV for phase2
Jan/09/2022 11:54:14 ipsec,debug,packet phase1 last IV:
Jan/09/2022 11:54:14 ipsec,debug,packet 22afac16 8919b8bb b88a8ee0 704d4d10 98594d1a
Jan/09/2022 11:54:14 ipsec,debug hash(sha1)
Jan/09/2022 11:54:14 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:14 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 11:54:14 ipsec,debug,packet 0df33d7d 51a2b1b7 84029aaf f316778a
Jan/09/2022 11:54:14 ipsec,debug call pfkey_send_getspi b
Jan/09/2022 11:54:14 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 3.226.95.68[500]->164.52.192.253[500] 
Jan/09/2022 11:54:14 ipsec,debug pfkey getspi sent.
Jan/09/2022 11:54:14 ipsec,info ISAKMP-SA established 164.52.192.253[500]-3.226.95.68[500] spi:e544d4cf83801af4:7a523bed653882b9
Jan/09/2022 11:54:14 ipsec,debug ===
Jan/09/2022 11:54:14 ipsec,debug dh(modp1024)
Jan/09/2022 11:54:14 ipsec,debug dh(modp1024)
Jan/09/2022 11:54:14 ipsec,debug dh(modp1024)
Jan/09/2022 11:54:14 ipsec,debug,packet compute DH's private.
Jan/09/2022 11:54:14 ipsec,debug,packet 68e1aaf6 5d2fae9a 458ebf5a 3d7a61b5 fb54cb2b fa1a9f05 1b0e2d6d 0f3d3721
Jan/09/2022 11:54:14 ipsec,debug,packet ca1dcab1 2c538226 83467cdb ac51d96f 07e5f8ce 25652f25 21099f58 21a03d45
Jan/09/2022 11:54:14 ipsec,debug,packet b77350a3 ef3a0975 3c9b2c6b b0c3e53c e4a092fe 4e278d37 1f6e4ab8 2188d9a7
Jan/09/2022 11:54:14 ipsec,debug,packet 1119bc55 2ac85ca8 968a28c4 dad5c2b9 f1adb201 6d216998 fd155ba1 33e3d27a
Jan/09/2022 11:54:14 ipsec,debug,packet compute DH's public.
Jan/09/2022 11:54:14 ipsec,debug,packet d96f670c e5f8be87 9f69a23c 13dac369 550eed53 1914d89f a07bfda7 b5ca3756
Jan/09/2022 11:54:14 ipsec,debug,packet 43c0912b b78b53ab 9e3563f1 c1787e85 e90f9748 b99f7aa2 daae4557 5386ab17
Jan/09/2022 11:54:14 ipsec,debug,packet 78b1806c db12423a 8b2a0141 34cd9af9 ef5ed8f0 eff764b9 b6abfacb 016ca55c
Jan/09/2022 11:54:14 ipsec,debug,packet a5a81a89 8d9ff584 3a36dda3 c4213474 af3769d6 900f232d 04c5a0b9 f21a5bf8
Jan/09/2022 11:54:14 ipsec,debug use local ID type IPv4_subnet
Jan/09/2022 11:54:14 ipsec,debug use remote ID type IPv4_subnet
Jan/09/2022 11:54:14 ipsec,debug IDci:
Jan/09/2022 11:54:14 ipsec,debug 04000000 ac106000 ffffe000
Jan/09/2022 11:54:14 ipsec,debug IDcr:
Jan/09/2022 11:54:14 ipsec,debug 04000000 ac1f0000 ffff0000
Jan/09/2022 11:54:14 ipsec,debug add payload of len 52, next type 10
Jan/09/2022 11:54:14 ipsec,debug add payload of len 24, next type 4
Jan/09/2022 11:54:14 ipsec,debug add payload of len 128, next type 5
Jan/09/2022 11:54:14 ipsec,debug add payload of len 12, next type 5
Jan/09/2022 11:54:14 ipsec,debug add payload of len 12, next type 0
Jan/09/2022 11:54:14 ipsec,debug,packet HASH with:
Jan/09/2022 11:54:14 ipsec,debug,packet 98594d1a 0a000038 00000001 00000001 0000002c 01030401 0d44aa06 00000020
Jan/09/2022 11:54:14 ipsec,debug,packet 010c0000 80010001 80020e10 80040001 80060080 80050002 80030002 0400001c
Jan/09/2022 11:54:14 ipsec,debug,packet c6771cca f48c7ba9 b8ce92de 68f29ea3 108335f2 65d3c8cd 05000084 d96f670c
Jan/09/2022 11:54:14 ipsec,debug,packet e5f8be87 9f69a23c 13dac369 550eed53 1914d89f a07bfda7 b5ca3756 43c0912b
Jan/09/2022 11:54:14 ipsec,debug,packet b78b53ab 9e3563f1 c1787e85 e90f9748 b99f7aa2 daae4557 5386ab17 78b1806c
Jan/09/2022 11:54:14 ipsec,debug,packet db12423a 8b2a0141 34cd9af9 ef5ed8f0 eff764b9 b6abfacb 016ca55c a5a81a89
Jan/09/2022 11:54:14 ipsec,debug,packet 8d9ff584 3a36dda3 c4213474 af3769d6 900f232d 04c5a0b9 f21a5bf8 05000010
Jan/09/2022 11:54:14 ipsec,debug,packet 04000000 ac106000 ffffe000 00000010 04000000 ac1f0000 ffff0000
Jan/09/2022 11:54:14 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:14 ipsec,debug,packet HASH computed:
Jan/09/2022 11:54:14 ipsec,debug,packet 0971e595 76867f4c 14368d2d 02f40b08 dfbd57fc
Jan/09/2022 11:54:14 ipsec,debug add payload of len 20, next type 1
Jan/09/2022 11:54:14 ipsec,debug,packet begin encryption.
Jan/09/2022 11:54:14 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:14 ipsec,debug,packet pad length = 16
Jan/09/2022 11:54:14 ipsec,debug,packet 01000018 0971e595 76867f4c 14368d2d 02f40b08 dfbd57fc 0a000038 00000001
Jan/09/2022 11:54:14 ipsec,debug,packet 00000001 0000002c 01030401 0d44aa06 00000020 010c0000 80010001 80020e10
Jan/09/2022 11:54:14 ipsec,debug,packet 80040001 80060080 80050002 80030002 0400001c c6771cca f48c7ba9 b8ce92de
Jan/09/2022 11:54:14 ipsec,debug,packet 68f29ea3 108335f2 65d3c8cd 05000084 d96f670c e5f8be87 9f69a23c 13dac369
Jan/09/2022 11:54:14 ipsec,debug,packet 550eed53 1914d89f a07bfda7 b5ca3756 43c0912b b78b53ab 9e3563f1 c1787e85
Jan/09/2022 11:54:14 ipsec,debug,packet e90f9748 b99f7aa2 daae4557 5386ab17 78b1806c db12423a 8b2a0141 34cd9af9
Jan/09/2022 11:54:14 ipsec,debug,packet ef5ed8f0 eff764b9 b6abfacb 016ca55c a5a81a89 8d9ff584 3a36dda3 c4213474
Jan/09/2022 11:54:14 ipsec,debug,packet af3769d6 900f232d 04c5a0b9 f21a5bf8 05000010 04000000 ac106000 ffffe000
Jan/09/2022 11:54:14 ipsec,debug,packet 00000010 04000000 ac1f0000 ffff0000 d2e7defa a0c496c1 e28aa5de bb9ddb0f
Jan/09/2022 11:54:14 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:14 ipsec,debug,packet with key:
Jan/09/2022 11:54:14 ipsec,debug,packet 925ffa84 dc60ed1c df18bbfd 052c9532
Jan/09/2022 11:54:14 ipsec,debug,packet encrypted payload by IV:
Jan/09/2022 11:54:14 ipsec,debug,packet 0df33d7d 51a2b1b7 84029aaf f316778a
Jan/09/2022 11:54:14 ipsec,debug,packet save IV for next:
Jan/09/2022 11:54:14 ipsec,debug,packet bf4040ad c48d35ad b828e805 a9495322
Jan/09/2022 11:54:14 ipsec,debug,packet encrypted.
Jan/09/2022 11:54:14 ipsec,debug 316 bytes from 164.52.192.253[500] to 3.226.95.68[500]
Jan/09/2022 11:54:14 ipsec,debug 1 times of 316 bytes message will be sent to 3.226.95.68[500]
Jan/09/2022 11:54:14 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08102001 98594d1a 0000013c 7dde2b7e
Jan/09/2022 11:54:14 ipsec,debug,packet c7e6015a 31ba04df 46602f0c dabfd078 6c1ba967 1334714f a7949bd5 501766b8
Jan/09/2022 11:54:14 ipsec,debug,packet 470994ef d21e1991 871a21bd 186d560b d7913058 ef648c71 1ff28e02 b5fabc07
Jan/09/2022 11:54:14 ipsec,debug,packet abbb5565 80aea8b5 66972769 5335c242 6ad108ae c4354f4e 522186d2 ca3ad200
Jan/09/2022 11:54:14 ipsec,debug,packet d4a72c34 6cd6b5b1 590c946c 768c807b 763be462 fd7e3dae 5abb900f 4373188f
Jan/09/2022 11:54:14 ipsec,debug,packet e0558c3e 0bb4cd94 3633ea68 bc0e3b79 4c0158ed c41dc614 44de552a ce752630
Jan/09/2022 11:54:14 ipsec,debug,packet 001bfae0 6282273a 9d6d2517 6b259c06 225f6efc 16064499 10ec3519 bb978e10
Jan/09/2022 11:54:14 ipsec,debug,packet 78d20e9e 726488de d55140ea 26f0d6f8 b8684b8f 1525be67 9d0c0dd3 d03014e9
Jan/09/2022 11:54:14 ipsec,debug,packet f8b24cd8 1a62f34b d68d95f9 5533e76b 79513dd8 7f86feca b8cb0078 b56af321
Jan/09/2022 11:54:14 ipsec,debug,packet a8e6d549 fad8e3f5 310efa53 bf4040ad c48d35ad b828e805 a9495322
Jan/09/2022 11:54:14 ipsec sent phase2 packet 164.52.192.253[500]<=>3.226.95.68[500] e544d4cf83801af4:7a523bed653882b9:00009859
Jan/09/2022 11:54:15 ipsec,debug ===== received 316 bytes from 3.226.95.68[500] to 164.52.192.253[500]
Jan/09/2022 11:54:15 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08102001 98594d1a 0000013c 674d0ea3
Jan/09/2022 11:54:15 ipsec,debug,packet fbd9522b 7d727590 95879db7 ffa593e1 49f131a2 9add8b3d 285e95c6 4445dff4
Jan/09/2022 11:54:15 ipsec,debug,packet 2dc01aa1 a425d156 4b9e866c 5d70ea0d a742f638 c366022a bfb27d0c 11b831ed
Jan/09/2022 11:54:15 ipsec,debug,packet 2de137c4 384c2f0d b3f37afc b23c2a7e bcdd7438 eb82b150 ac4cd1c7 d11d8d88
Jan/09/2022 11:54:15 ipsec,debug,packet d80001be 0e805af7 1cb63b77 b164100a 36f0d6b4 291d9294 8ca9c96e bef09352
Jan/09/2022 11:54:15 ipsec,debug,packet a5f80125 1fc700eb c1e86d4b 8922c62a c4595d93 851c85f5 a72fc56b 7b81921d
Jan/09/2022 11:54:15 ipsec,debug,packet e35a3ed4 28528013 77e27e4b 6f828b51 39e5f356 ad79f75e 06ddb1cb 2f8ff3d1
Jan/09/2022 11:54:15 ipsec,debug,packet ae999c27 aa273342 6dc014ed 47b54076 6e2c439d c199973f c1e10bcc 501fd1df
Jan/09/2022 11:54:15 ipsec,debug,packet d5ad8bfb bb15f1ea 6c0fe46c 5f66d182 4a8df74e 0403a39b abf6d50b 46d5d779
Jan/09/2022 11:54:15 ipsec,debug,packet 4323ea31 6cd7df8c d6506df0 6bf72ac1 c3ec78a0 a9642214 8d0385b4
Jan/09/2022 11:54:15 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:15 ipsec,debug,packet IV was saved for next processing:
Jan/09/2022 11:54:15 ipsec,debug,packet 6bf72ac1 c3ec78a0 a9642214 8d0385b4
Jan/09/2022 11:54:15 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:15 ipsec,debug,packet with key:
Jan/09/2022 11:54:15 ipsec,debug,packet 925ffa84 dc60ed1c df18bbfd 052c9532
Jan/09/2022 11:54:15 ipsec,debug,packet decrypted payload by IV:
Jan/09/2022 11:54:15 ipsec,debug,packet bf4040ad c48d35ad b828e805 a9495322
Jan/09/2022 11:54:15 ipsec,debug,packet decrypted payload, but not trimed.
Jan/09/2022 11:54:15 ipsec,debug,packet 01000018 9b319073 b0aa7144 2f6ecbe4 10a9d51e 9279690d 0a000038 00000001
Jan/09/2022 11:54:15 ipsec,debug,packet 00000001 0000002c 01030401 c5e5ad96 00000020 010c0000 80060080 80050002
Jan/09/2022 11:54:15 ipsec,debug,packet 80030002 80040001 80010001 80020e10 04000024 04bb256a 6632285e c9f6aef2
Jan/09/2022 11:54:15 ipsec,debug,packet 7680a388 a32443b5 76f15ced 39f52f8d 768032ea 05000084 4e8256d3 b214ccca
Jan/09/2022 11:54:15 ipsec,debug,packet 2cce3c76 ede5d26e 744c1f09 953c35a4 931c0e3d dcc33a8c a4fcab0f c0ccfe02
Jan/09/2022 11:54:15 ipsec,debug,packet 96a6ce86 db553b6f cb3d152d bd21d291 6e8887a8 699d061a 12d043b5 bf3ae7b8
Jan/09/2022 11:54:15 ipsec,debug,packet a0c53e71 b5453722 c8bc1065 58d6f6f7 5b9db9fd b0443272 ea4c4594 fe6a649d
Jan/09/2022 11:54:15 ipsec,debug,packet 3ddc99c2 d25786a8 b92c2e84 6c7a0626 6cc322c7 b6958e59 05000010 04000000
Jan/09/2022 11:54:15 ipsec,debug,packet ac106000 ffffe000 00000010 04000000 ac1f0000 ffff0000 00000000 00000000
Jan/09/2022 11:54:15 ipsec,debug,packet padding len=1
Jan/09/2022 11:54:15 ipsec,debug,packet skip to trim padding.
Jan/09/2022 11:54:15 ipsec,debug,packet decrypted.
Jan/09/2022 11:54:15 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08102001 98594d1a 0000013c 01000018
Jan/09/2022 11:54:15 ipsec,debug,packet 9b319073 b0aa7144 2f6ecbe4 10a9d51e 9279690d 0a000038 00000001 00000001
Jan/09/2022 11:54:15 ipsec,debug,packet 0000002c 01030401 c5e5ad96 00000020 010c0000 80060080 80050002 80030002
Jan/09/2022 11:54:15 ipsec,debug,packet 80040001 80010001 80020e10 04000024 04bb256a 6632285e c9f6aef2 7680a388
Jan/09/2022 11:54:15 ipsec,debug,packet a32443b5 76f15ced 39f52f8d 768032ea 05000084 4e8256d3 b214ccca 2cce3c76
Jan/09/2022 11:54:15 ipsec,debug,packet ede5d26e 744c1f09 953c35a4 931c0e3d dcc33a8c a4fcab0f c0ccfe02 96a6ce86
Jan/09/2022 11:54:15 ipsec,debug,packet db553b6f cb3d152d bd21d291 6e8887a8 699d061a 12d043b5 bf3ae7b8 a0c53e71
Jan/09/2022 11:54:15 ipsec,debug,packet b5453722 c8bc1065 58d6f6f7 5b9db9fd b0443272 ea4c4594 fe6a649d 3ddc99c2
Jan/09/2022 11:54:15 ipsec,debug,packet d25786a8 b92c2e84 6c7a0626 6cc322c7 b6958e59 05000010 04000000 ac106000
Jan/09/2022 11:54:15 ipsec,debug,packet ffffe000 00000010 04000000 ac1f0000 ffff0000 00000000 00000000
Jan/09/2022 11:54:15 ipsec,debug begin.
Jan/09/2022 11:54:15 ipsec,debug seen nptype=8(hash) len=24
Jan/09/2022 11:54:15 ipsec,debug seen nptype=1(sa) len=56
Jan/09/2022 11:54:15 ipsec,debug seen nptype=10(nonce) len=36
Jan/09/2022 11:54:15 ipsec,debug seen nptype=4(ke) len=132
Jan/09/2022 11:54:15 ipsec,debug seen nptype=5(id) len=16
Jan/09/2022 11:54:15 ipsec,debug seen nptype=5(id) len=16
Jan/09/2022 11:54:15 ipsec,debug succeed.
Jan/09/2022 11:54:15 ipsec,debug IDci matches proposal.
Jan/09/2022 11:54:15 ipsec,debug IDcr matches proposal.
Jan/09/2022 11:54:15 ipsec,debug HASH allocated:hbuf->l=312 actual:tlen=280
Jan/09/2022 11:54:15 ipsec,debug HASH(2) received:
Jan/09/2022 11:54:15 ipsec,debug 9b319073 b0aa7144 2f6ecbe4 10a9d51e 9279690d
Jan/09/2022 11:54:15 ipsec,debug,packet HASH with:
Jan/09/2022 11:54:15 ipsec,debug,packet 98594d1a c6771cca f48c7ba9 b8ce92de 68f29ea3 108335f2 65d3c8cd 0a000038
Jan/09/2022 11:54:15 ipsec,debug,packet 00000001 00000001 0000002c 01030401 c5e5ad96 00000020 010c0000 80060080
Jan/09/2022 11:54:15 ipsec,debug,packet 80050002 80030002 80040001 80010001 80020e10 04000024 04bb256a 6632285e
Jan/09/2022 11:54:15 ipsec,debug,packet c9f6aef2 7680a388 a32443b5 76f15ced 39f52f8d 768032ea 05000084 4e8256d3
Jan/09/2022 11:54:15 ipsec,debug,packet b214ccca 2cce3c76 ede5d26e 744c1f09 953c35a4 931c0e3d dcc33a8c a4fcab0f
Jan/09/2022 11:54:15 ipsec,debug,packet c0ccfe02 96a6ce86 db553b6f cb3d152d bd21d291 6e8887a8 699d061a 12d043b5
Jan/09/2022 11:54:15 ipsec,debug,packet bf3ae7b8 a0c53e71 b5453722 c8bc1065 58d6f6f7 5b9db9fd b0443272 ea4c4594
Jan/09/2022 11:54:15 ipsec,debug,packet fe6a649d 3ddc99c2 d25786a8 b92c2e84 6c7a0626 6cc322c7 b6958e59 05000010
Jan/09/2022 11:54:15 ipsec,debug,packet 04000000 ac106000 ffffe000 00000010 04000000 ac1f0000 ffff0000
Jan/09/2022 11:54:15 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:15 ipsec,debug,packet HASH computed:
Jan/09/2022 11:54:15 ipsec,debug,packet 9b319073 b0aa7144 2f6ecbe4 10a9d51e 9279690d
Jan/09/2022 11:54:15 ipsec,debug total SA len=52
Jan/09/2022 11:54:15 ipsec,debug 00000001 00000001 0000002c 01030401 0d44aa06 00000020 010c0000 80010001
Jan/09/2022 11:54:15 ipsec,debug 80020e10 80040001 80060080 80050002 80030002
Jan/09/2022 11:54:15 ipsec,debug begin.
Jan/09/2022 11:54:15 ipsec,debug seen nptype=2(prop) len=44
Jan/09/2022 11:54:15 ipsec,debug succeed.
Jan/09/2022 11:54:15 ipsec,debug proposal #1 len=44
Jan/09/2022 11:54:15 ipsec,debug begin.
Jan/09/2022 11:54:15 ipsec,debug seen nptype=3(trns) len=32
Jan/09/2022 11:54:15 ipsec,debug succeed.
Jan/09/2022 11:54:15 ipsec,debug transform #1 len=32
Jan/09/2022 11:54:15 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
Jan/09/2022 11:54:15 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
Jan/09/2022 11:54:15 ipsec,debug life duration was in TLV.
Jan/09/2022 11:54:15 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
Jan/09/2022 11:54:15 ipsec,debug type=Key Length, flag=0x8000, lorv=128
Jan/09/2022 11:54:15 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
Jan/09/2022 11:54:15 ipsec,debug type=Group Description, flag=0x8000, lorv=2
Jan/09/2022 11:54:15 ipsec,debug dh(modp1024)
Jan/09/2022 11:54:15 ipsec,debug pair 1:
Jan/09/2022 11:54:15 ipsec,debug  0x80d1098: next=(nil) tnext=(nil)
Jan/09/2022 11:54:15 ipsec,debug proposal #1: 1 transform
Jan/09/2022 11:54:15 ipsec,debug total SA len=52
Jan/09/2022 11:54:15 ipsec,debug 00000001 00000001 0000002c 01030401 c5e5ad96 00000020 010c0000 80060080
Jan/09/2022 11:54:15 ipsec,debug 80050002 80030002 80040001 80010001 80020e10
Jan/09/2022 11:54:15 ipsec,debug begin.
Jan/09/2022 11:54:15 ipsec,debug seen nptype=2(prop) len=44
Jan/09/2022 11:54:15 ipsec,debug succeed.
Jan/09/2022 11:54:15 ipsec,debug proposal #1 len=44
Jan/09/2022 11:54:15 ipsec,debug begin.
Jan/09/2022 11:54:15 ipsec,debug seen nptype=3(trns) len=32
Jan/09/2022 11:54:15 ipsec,debug succeed.
Jan/09/2022 11:54:15 ipsec,debug transform #1 len=32
Jan/09/2022 11:54:15 ipsec,debug type=Key Length, flag=0x8000, lorv=128
Jan/09/2022 11:54:15 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
Jan/09/2022 11:54:15 ipsec,debug type=Group Description, flag=0x8000, lorv=2
Jan/09/2022 11:54:15 ipsec,debug dh(modp1024)
Jan/09/2022 11:54:15 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
Jan/09/2022 11:54:15 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
Jan/09/2022 11:54:15 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
Jan/09/2022 11:54:15 ipsec,debug life duration was in TLV.
Jan/09/2022 11:54:15 ipsec,debug pair 1:
Jan/09/2022 11:54:15 ipsec,debug  0x80d1128: next=(nil) tnext=(nil)
Jan/09/2022 11:54:15 ipsec,debug proposal #1: 1 transform
Jan/09/2022 11:54:15 ipsec attribute has been modified.
Jan/09/2022 11:54:15 ipsec,debug begin compare proposals.
Jan/09/2022 11:54:15 ipsec,debug pair[1]: 0x80d1128
Jan/09/2022 11:54:15 ipsec,debug  0x80d1128: next=(nil) tnext=(nil)
Jan/09/2022 11:54:15 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=1 trns#=1 trns-id=AES-CBC
Jan/09/2022 11:54:15 ipsec,debug type=Key Length, flag=0x8000, lorv=128
Jan/09/2022 11:54:15 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
Jan/09/2022 11:54:15 ipsec,debug type=Group Description, flag=0x8000, lorv=2
Jan/09/2022 11:54:15 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
Jan/09/2022 11:54:15 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
Jan/09/2022 11:54:15 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
Jan/09/2022 11:54:15 ipsec,debug peer's single bundle:
Jan/09/2022 11:54:15 ipsec,debug  (proto_id=ESP spisize=4 spi=c5e5ad96 spi_p=00000000 encmode=Tunnel reqid=0:0)
Jan/09/2022 11:54:15 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
Jan/09/2022 11:54:15 ipsec,debug my single bundle:
Jan/09/2022 11:54:15 ipsec,debug  (proto_id=ESP spisize=4 spi=0d44aa06 spi_p=00000000 encmode=Tunnel reqid=0:0)
Jan/09/2022 11:54:15 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
Jan/09/2022 11:54:15 ipsec,debug matched
Jan/09/2022 11:54:15 ipsec,debug ===
Jan/09/2022 11:54:15 ipsec,debug HASH(3) generate
Jan/09/2022 11:54:15 ipsec,debug,packet HASH with: 
Jan/09/2022 11:54:15 ipsec,debug,packet 0098594d 1ac6771c caf48c7b a9b8ce92 de68f29e a3108335 f265d3c8 cd04bb25
Jan/09/2022 11:54:15 ipsec,debug,packet 6a663228 5ec9f6ae f27680a3 88a32443 b576f15c ed39f52f 8d768032 ea
Jan/09/2022 11:54:15 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:15 ipsec,debug,packet HASH computed:
Jan/09/2022 11:54:15 ipsec,debug,packet daf51425 dc0f027b 9b41cd1d 000b266c 30e9880d
Jan/09/2022 11:54:15 ipsec,debug add payload of len 20, next type 0
Jan/09/2022 11:54:15 ipsec,debug,packet begin encryption.
Jan/09/2022 11:54:15 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:15 ipsec,debug,packet pad length = 8
Jan/09/2022 11:54:15 ipsec,debug,packet 00000018 daf51425 dc0f027b 9b41cd1d 000b266c 30e9880d 819bced1 edfbad07
Jan/09/2022 11:54:15 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:15 ipsec,debug,packet with key:
Jan/09/2022 11:54:15 ipsec,debug,packet 925ffa84 dc60ed1c df18bbfd 052c9532
Jan/09/2022 11:54:15 ipsec,debug,packet encrypted payload by IV:
Jan/09/2022 11:54:15 ipsec,debug,packet 6bf72ac1 c3ec78a0 a9642214 8d0385b4
Jan/09/2022 11:54:15 ipsec,debug,packet save IV for next:
Jan/09/2022 11:54:15 ipsec,debug,packet 647d2974 fdd0a72b 9a9ebcde 352bbf00
Jan/09/2022 11:54:15 ipsec,debug,packet encrypted.
Jan/09/2022 11:54:15 ipsec,debug 60 bytes from 164.52.192.253[500] to 3.226.95.68[500]
Jan/09/2022 11:54:15 ipsec,debug 1 times of 60 bytes message will be sent to 3.226.95.68[500]
Jan/09/2022 11:54:15 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08102001 98594d1a 0000003c b91c6801
Jan/09/2022 11:54:15 ipsec,debug,packet 4c3e8224 c1c1c8f4 9fc60d36 647d2974 fdd0a72b 9a9ebcde 352bbf00
Jan/09/2022 11:54:15 ipsec,debug dh(modp1024)
Jan/09/2022 11:54:15 ipsec,debug,packet compute DH's shared.
Jan/09/2022 11:54:15 ipsec,debug,packet 
Jan/09/2022 11:54:15 ipsec,debug,packet 1326b55a 221a329d 6ab6821e a27a21ed ac341975 81aa5edf 5852f8a0 c1a48528
Jan/09/2022 11:54:15 ipsec,debug,packet 632861c4 e000af6d 8a3be5bc ce000aeb 88b8d07a 74b2f5e2 f0386215 07a65368
Jan/09/2022 11:54:15 ipsec,debug,packet 2a32d77c 15d4cda6 ca852774 185f296d 12acd990 819ee814 27a88b5a 8dd362fa
Jan/09/2022 11:54:15 ipsec,debug,packet 69282422 9e4d50bf 5a5e8790 016730bf ec542fc6 8d1b4104 c383f549 e96bf10a
Jan/09/2022 11:54:15 ipsec,debug,packet KEYMAT compute with
Jan/09/2022 11:54:15 ipsec,debug,packet 1326b55a 221a329d 6ab6821e a27a21ed ac341975 81aa5edf 5852f8a0 c1a48528
Jan/09/2022 11:54:15 ipsec,debug,packet 632861c4 e000af6d 8a3be5bc ce000aeb 88b8d07a 74b2f5e2 f0386215 07a65368
Jan/09/2022 11:54:15 ipsec,debug,packet 2a32d77c 15d4cda6 ca852774 185f296d 12acd990 819ee814 27a88b5a 8dd362fa
Jan/09/2022 11:54:15 ipsec,debug,packet 69282422 9e4d50bf 5a5e8790 016730bf ec542fc6 8d1b4104 c383f549 e96bf10a
Jan/09/2022 11:54:15 ipsec,debug,packet 030d44aa 06c6771c caf48c7b a9b8ce92 de68f29e a3108335 f265d3c8 cd04bb25
Jan/09/2022 11:54:15 ipsec,debug,packet 6a663228 5ec9f6ae f27680a3 88a32443 b576f15c ed39f52f 8d768032 ea
Jan/09/2022 11:54:15 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:15 ipsec,debug encryption(aes-cbc)
Jan/09/2022 11:54:15 ipsec,debug hmac(sha1)
Jan/09/2022 11:54:15 ipsec,debug encklen=128 authklen=160
Jan/09/2022 11:54:15 ipsec,debug generating 480 bits of key (dupkeymat=3)
Jan/09/2022 11:54:15 ipsec,debug generating K1...K3 for KEYMAT.
Jan/09/2022 11:54:15 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:15 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:15 ipsec,debug 63018636 adab14f8 738850b2 2e7458f6 40d63a97 7ee1530f 6c7a1be4 728cd3b8
Jan/09/2022 11:54:15 ipsec,debug f3c1be37 1125c8fc f752afa5 ae4f8f48 e1896334 238aa1ed d9e229ea
Jan/09/2022 11:54:15 ipsec,debug,packet KEYMAT compute with
Jan/09/2022 11:54:15 ipsec,debug,packet 1326b55a 221a329d 6ab6821e a27a21ed ac341975 81aa5edf 5852f8a0 c1a48528
Jan/09/2022 11:54:15 ipsec,debug,packet 632861c4 e000af6d 8a3be5bc ce000aeb 88b8d07a 74b2f5e2 f0386215 07a65368
Jan/09/2022 11:54:15 ipsec,debug,packet 2a32d77c 15d4cda6 ca852774 185f296d 12acd990 819ee814 27a88b5a 8dd362fa
Jan/09/2022 11:54:15 ipsec,debug,packet 69282422 9e4d50bf 5a5e8790 016730bf ec542fc6 8d1b4104 c383f549 e96bf10a
Jan/09/2022 11:54:15 ipsec,debug,packet 03c5e5ad 96c6771c caf48c7b a9b8ce92 de68f29e a3108335 f265d3c8 cd04bb25
Jan/09/2022 11:54:15 ipsec,debug,packet 6a663228 5ec9f6ae f27680a3 88a32443 b576f15c ed39f52f 8d768032 ea
Jan/09/2022 11:54:15 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:15 ipsec,debug encryption(aes-cbc)
Jan/09/2022 11:54:15 ipsec,debug hmac(sha1)
Jan/09/2022 11:54:15 ipsec,debug encklen=128 authklen=160
Jan/09/2022 11:54:15 ipsec,debug generating 480 bits of key (dupkeymat=3)
Jan/09/2022 11:54:15 ipsec,debug generating K1...K3 for KEYMAT.
Jan/09/2022 11:54:15 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:15 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:15 ipsec,debug 52d28eaf 7e0c76b2 575f8939 d5c60569 20e6d39f 11446a2f 7589b285 81c50a20
Jan/09/2022 11:54:15 ipsec,debug a970b704 9cc0da2d a8693ad0 24265e3d 66799345 cbe3ee3c fa3ad3f8
Jan/09/2022 11:54:15 ipsec,debug KEYMAT computed.
Jan/09/2022 11:54:15 ipsec,debug call pk_sendupdate
Jan/09/2022 11:54:15 ipsec,debug encryption(aes-cbc)
Jan/09/2022 11:54:15 ipsec,debug hmac(sha1)
Jan/09/2022 11:54:15 ipsec,debug call pfkey_send_update_nat
Jan/09/2022 11:54:15 ipsec IPsec-SA established: ESP/Tunnel 3.226.95.68[500]->164.52.192.253[500] spi=0xd44aa06
Jan/09/2022 11:54:15 ipsec,debug pfkey update sent.
Jan/09/2022 11:54:15 ipsec,debug encryption(aes-cbc)
Jan/09/2022 11:54:15 ipsec,debug hmac(sha1)
Jan/09/2022 11:54:15 ipsec,debug call pfkey_send_add_nat
Jan/09/2022 11:54:15 ipsec IPsec-SA established: ESP/Tunnel 164.52.192.253[500]->3.226.95.68[500] spi=0xc5e5ad96
Jan/09/2022 11:54:15 ipsec,debug pfkey add sent.
Jan/09/2022 11:54:15 ipsec,debug ===
Jan/09/2022 11:54:15 ipsec,debug begin QUICK mode.
Jan/09/2022 11:54:15 ipsec initiate new phase 2 negotiation: 164.52.192.253[500]<=>3.226.95.68[500]
Jan/09/2022 11:54:15 ipsec,debug,packet compute IV for phase2
Jan/09/2022 11:54:15 ipsec,debug,packet phase1 last IV:
Jan/09/2022 11:54:15 ipsec,debug,packet 22afac16 8919b8bb b88a8ee0 704d4d10 dd06a677
Jan/09/2022 11:54:15 ipsec,debug hash(sha1)
Jan/09/2022 11:54:15 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:15 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 11:54:15 ipsec,debug,packet 0de383f5 65848106 dec7e446 2953f930
Jan/09/2022 11:54:15 ipsec,debug call pfkey_send_getspi c
Jan/09/2022 11:54:15 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 3.226.95.68[500]->164.52.192.253[500] 
Jan/09/2022 11:54:15 ipsec,debug pfkey getspi sent.
Jan/09/2022 11:54:15 ipsec,debug dh(modp1024)
Jan/09/2022 11:54:15 ipsec,debug dh(modp1024)
Jan/09/2022 11:54:15 ipsec,debug dh(modp1024)
Jan/09/2022 11:54:15 ipsec,debug dh(modp1024)
Jan/09/2022 11:54:15 ipsec,debug dh(modp1024)
Jan/09/2022 11:54:15 ipsec,debug dh(modp1024)
Jan/09/2022 11:54:15 ipsec,debug dh(modp1024)
Jan/09/2022 11:54:15 ipsec,debug,packet compute DH's private.
Jan/09/2022 11:54:15 ipsec,debug,packet 7c2cd12e cd844934 218b9ed8 2ac4f541 9dec2d90 741951fe 180c198c bb2e8f08
Jan/09/2022 11:54:15 ipsec,debug,packet 72573ec6 eaf25d22 ea14f4c6 5be23916 7fb83a75 ebdc516e 0a965cd1 3212ce05
Jan/09/2022 11:54:15 ipsec,debug,packet 2a6a3d64 9d693161 361b1a9a dfdef8cd dba2d42f 5e0ac184 962bcb13 b9c8dbd7
Jan/09/2022 11:54:15 ipsec,debug,packet 63c9326d 9b5fdd84 7de12286 0c06ff38 975af092 445c2a2f d5aee569 9b69dc02
Jan/09/2022 11:54:15 ipsec,debug,packet compute DH's public.
Jan/09/2022 11:54:15 ipsec,debug,packet 493cd073 bb110ddd 00ec6420 64639d8e 1c142b4b 9e576fa1 ff50fa29 bed9abb5
Jan/09/2022 11:54:15 ipsec,debug,packet 6f45ffc3 1289502b f280a6e8 8d6959b1 a3b9be20 4845d3a8 d1bc2bde 90e94228
Jan/09/2022 11:54:15 ipsec,debug,packet d6618a72 92134378 9446fd36 99923caf f97c7c7e 986832d6 eba10f59 8c7ada84
Jan/09/2022 11:54:15 ipsec,debug,packet 110ed1fe 41283679 c053e6f5 04758465 68b3ea9b 4b829b6f 31b8dd96 5befe9ab
Jan/09/2022 11:54:15 ipsec,debug use local ID type IPv4_address
Jan/09/2022 11:54:15 ipsec,debug use remote ID type IPv4_subnet
Jan/09/2022 11:54:15 ipsec,debug IDci:
Jan/09/2022 11:54:15 ipsec,debug 01000000 a9fe80da
Jan/09/2022 11:54:15 ipsec,debug IDcr:
Jan/09/2022 11:54:15 ipsec,debug 04000000 a9fe80d8 fffffffc
Jan/09/2022 11:54:15 ipsec,debug add payload of len 116, next type 10
Jan/09/2022 11:54:15 ipsec,debug add payload of len 24, next type 4
Jan/09/2022 11:54:15 ipsec,debug add payload of len 128, next type 5
Jan/09/2022 11:54:15 ipsec,debug add payload of len 8, next type 5
Jan/09/2022 11:54:15 ipsec,debug add payload of len 12, next type 0
Jan/09/2022 11:54:15 ipsec,debug,packet HASH with:
Jan/09/2022 11:54:15 ipsec,debug,packet dd06a677 0a000078 00000001 00000001 0000006c 01030403 06165d21 03000020
Jan/09/2022 11:54:15 ipsec,debug,packet 010c0000 80010001 80020708 80040001 80060100 80050002 80030002 03000020
Jan/09/2022 11:54:15 ipsec,debug,packet 020c0000 80010001 80020708 80040001 800600c0 80050002 80030002 00000020
Jan/09/2022 11:54:15 ipsec,debug,packet 030c0000 80010001 80020708 80040001 80060080 80050002 80030002 0400001c
Jan/09/2022 11:54:15 ipsec,debug,packet f067f3c2 d44a4c74 a1c37511 4105053e 618fe64a 96972d10 05000084 493cd073
Jan/09/2022 11:54:15 ipsec,debug,packet bb110ddd 00ec6420 64639d8e 1c142b4b 9e576fa1 ff50fa29 bed9abb5 6f45ffc3
Jan/09/2022 11:54:15 ipsec,debug,packet 1289502b f280a6e8 8d6959b1 a3b9be20 4845d3a8 d1bc2bde 90e94228 d6618a72
Jan/09/2022 11:54:15 ipsec,debug,packet 92134378 9446fd36 99923caf f97c7c7e 986832d6 eba10f59 8c7ada84 110ed1fe
Jan/09/2022 11:54:15 ipsec,debug,packet 41283679 c053e6f5 04758465 68b3ea9b 4b829b6f 31b8dd96 5befe9ab 0500000c
Jan/09/2022 11:54:15 ipsec,debug,packet 01000000 a9fe80da 00000010 04000000 a9fe80d8 fffffffc
Jan/09/2022 11:54:15 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:15 ipsec,debug,packet HASH computed:
Jan/09/2022 11:54:15 ipsec,debug,packet d3fd2573 07755527 5ea3100c 891a6b83 81d6251f
Jan/09/2022 11:54:15 ipsec,debug add payload of len 20, next type 1
Jan/09/2022 11:54:15 ipsec,debug,packet begin encryption.
Jan/09/2022 11:54:15 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:15 ipsec,debug,packet pad length = 4
Jan/09/2022 11:54:15 ipsec,debug,packet 01000018 d3fd2573 07755527 5ea3100c 891a6b83 81d6251f 0a000078 00000001
Jan/09/2022 11:54:15 ipsec,debug,packet 00000001 0000006c 01030403 06165d21 03000020 010c0000 80010001 80020708
Jan/09/2022 11:54:15 ipsec,debug,packet 80040001 80060100 80050002 80030002 03000020 020c0000 80010001 80020708
Jan/09/2022 11:54:15 ipsec,debug,packet 80040001 800600c0 80050002 80030002 00000020 030c0000 80010001 80020708
Jan/09/2022 11:54:15 ipsec,debug,packet 80040001 80060080 80050002 80030002 0400001c f067f3c2 d44a4c74 a1c37511
Jan/09/2022 11:54:15 ipsec,debug,packet 4105053e 618fe64a 96972d10 05000084 493cd073 bb110ddd 00ec6420 64639d8e
Jan/09/2022 11:54:15 ipsec,debug,packet 1c142b4b 9e576fa1 ff50fa29 bed9abb5 6f45ffc3 1289502b f280a6e8 8d6959b1
Jan/09/2022 11:54:15 ipsec,debug,packet a3b9be20 4845d3a8 d1bc2bde 90e94228 d6618a72 92134378 9446fd36 99923caf
Jan/09/2022 11:54:15 ipsec,debug,packet f97c7c7e 986832d6 eba10f59 8c7ada84 110ed1fe 41283679 c053e6f5 04758465
Jan/09/2022 11:54:15 ipsec,debug,packet 68b3ea9b 4b829b6f 31b8dd96 5befe9ab 0500000c 01000000 a9fe80da 00000010
Jan/09/2022 11:54:15 ipsec,debug,packet 04000000 a9fe80d8 fffffffc a387c603
Jan/09/2022 11:54:15 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:15 ipsec,debug,packet with key:
Jan/09/2022 11:54:15 ipsec,debug,packet 925ffa84 dc60ed1c df18bbfd 052c9532
Jan/09/2022 11:54:15 ipsec,debug,packet encrypted payload by IV:
Jan/09/2022 11:54:15 ipsec,debug,packet 0de383f5 65848106 dec7e446 2953f930
Jan/09/2022 11:54:15 ipsec,debug,packet save IV for next:
Jan/09/2022 11:54:15 ipsec,debug,packet aa9801c9 0dad3d0f 922a110c a24566b3
Jan/09/2022 11:54:15 ipsec,debug,packet encrypted.
Jan/09/2022 11:54:15 ipsec,debug 364 bytes from 164.52.192.253[500] to 3.226.95.68[500]
Jan/09/2022 11:54:15 ipsec,debug 1 times of 364 bytes message will be sent to 3.226.95.68[500]
Jan/09/2022 11:54:15 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08102001 dd06a677 0000016c 7ff86077
Jan/09/2022 11:54:15 ipsec,debug,packet 1749061a 8d0edd9e c1fc6fb9 7a8fbcc1 a7e7f3f9 c65063ad 78d8448e 894fad1f
Jan/09/2022 11:54:15 ipsec,debug,packet cf1fc74f b55d5572 e4526bca 535a4eea 80bbff90 01e9dc15 4aba1215 2540ec15
Jan/09/2022 11:54:15 ipsec,debug,packet b6393d81 85948128 f0850e03 625a5186 f584f8ab 42ee89cb 0b7c44d6 30538f00
Jan/09/2022 11:54:15 ipsec,debug,packet fafe1d76 a2cbb4c7 e2544da6 ebc7a98f cfbb80f8 1c073f54 0a921bb2 cfcf520c
Jan/09/2022 11:54:15 ipsec,debug,packet e06e5a39 b5661ead f4338995 70edea13 21793cf3 5cdbe96a 2cb3daa5 73d3848e
Jan/09/2022 11:54:15 ipsec,debug,packet c951c248 1dd21948 6338bb91 bcf063b9 42f69935 3150128f f12ad593 d48623da
Jan/09/2022 11:54:15 ipsec,debug,packet e3c3f758 79e7663a df4f5121 049c232d 24575205 ec1d8c45 58ef428a 54ab0755
Jan/09/2022 11:54:15 ipsec,debug,packet 95dcb42f fb5701c0 d8697489 13d97e65 40389f42 aed91ff9 f59e735e 83796cd8
Jan/09/2022 11:54:15 ipsec,debug,packet b32d69a5 3128575e 5985cee1 74590cca 75eb0ffb fde22754 7d74a130 36bfb034
Jan/09/2022 11:54:15 ipsec,debug,packet 13dc864c d849c167 a12c5d5e 34767142 2e97f5cf eb515901 caa6a862 aa9801c9
Jan/09/2022 11:54:15 ipsec,debug,packet 0dad3d0f 922a110c a24566b3
Jan/09/2022 11:54:15 ipsec sent phase2 packet 164.52.192.253[500]<=>3.226.95.68[500] e544d4cf83801af4:7a523bed653882b9:0000dd06
Jan/09/2022 11:54:15 ipsec,debug ===== received 76 bytes from 3.226.95.68[500] to 164.52.192.253[500]
Jan/09/2022 11:54:15 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08100501 c13e1446 0000004c ccbfd36b
Jan/09/2022 11:54:15 ipsec,debug,packet 8bfdf764 c43514d9 104152dc 3f92324d 9195d6d5 503046a6 6b3c89f2 e80c08e5
Jan/09/2022 11:54:15 ipsec,debug,packet 67e88fd3 2b3694f9 75fa3d33
Jan/09/2022 11:54:15 ipsec,debug receive Information.
Jan/09/2022 11:54:15 ipsec,debug,packet compute IV for phase2
Jan/09/2022 11:54:15 ipsec,debug,packet phase1 last IV:
Jan/09/2022 11:54:15 ipsec,debug,packet 22afac16 8919b8bb b88a8ee0 704d4d10 c13e1446
Jan/09/2022 11:54:15 ipsec,debug hash(sha1)
Jan/09/2022 11:54:15 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:15 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 11:54:15 ipsec,debug,packet fe3a178a 9c646bd0 0199fc32 4e8b3ca6
Jan/09/2022 11:54:15 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:15 ipsec,debug,packet IV was saved for next processing:
Jan/09/2022 11:54:15 ipsec,debug,packet e80c08e5 67e88fd3 2b3694f9 75fa3d33
Jan/09/2022 11:54:15 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:15 ipsec,debug,packet with key:
Jan/09/2022 11:54:15 ipsec,debug,packet 925ffa84 dc60ed1c df18bbfd 052c9532
Jan/09/2022 11:54:15 ipsec,debug,packet decrypted payload by IV:
Jan/09/2022 11:54:15 ipsec,debug,packet fe3a178a 9c646bd0 0199fc32 4e8b3ca6
Jan/09/2022 11:54:15 ipsec,debug,packet decrypted payload, but not trimed.
Jan/09/2022 11:54:15 ipsec,debug,packet 0b000018 d294cb4b 208de3ea a26e0a98 5704bcfa e3dcb504 00000010 00000001
Jan/09/2022 11:54:15 ipsec,debug,packet 03040012 00000000 00000000 00000000
Jan/09/2022 11:54:15 ipsec,debug,packet padding len=1
Jan/09/2022 11:54:15 ipsec,debug,packet skip to trim padding.
Jan/09/2022 11:54:15 ipsec,debug,packet decrypted.
Jan/09/2022 11:54:15 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08100501 c13e1446 0000004c 0b000018
Jan/09/2022 11:54:15 ipsec,debug,packet d294cb4b 208de3ea a26e0a98 5704bcfa e3dcb504 00000010 00000001 03040012
Jan/09/2022 11:54:15 ipsec,debug,packet 00000000 00000000 00000000
Jan/09/2022 11:54:15 ipsec,debug,packet HASH with:
Jan/09/2022 11:54:15 ipsec,debug,packet c13e1446 00000010 00000001 03040012 00000000
Jan/09/2022 11:54:15 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:15 ipsec,debug,packet HASH computed:
Jan/09/2022 11:54:15 ipsec,debug,packet d294cb4b 208de3ea a26e0a98 5704bcfa e3dcb504
Jan/09/2022 11:54:15 ipsec,debug hash validated.
Jan/09/2022 11:54:15 ipsec,debug begin.
Jan/09/2022 11:54:15 ipsec,debug seen nptype=8(hash) len=24
Jan/09/2022 11:54:15 ipsec,debug seen nptype=11(notify) len=16
Jan/09/2022 11:54:15 ipsec,debug succeed.
Jan/09/2022 11:54:15 ipsec,debug 3.226.95.68 notify: INVALID-ID-INFORMATION
Jan/09/2022 11:54:15 ipsec 3.226.95.68 fatal INVALID-ID-INFORMATION notify messsage, phase1 should be deleted.
Jan/09/2022 11:54:15 ipsec,debug 3.226.95.68 notification message 18:INVALID-ID-INFORMATION, doi=1 proto_id=3 spi=00000000pû9(size=4).
Jan/09/2022 11:54:24 ipsec,debug 3.226.95.68 DPD monitoring....
Jan/09/2022 11:54:24 ipsec,debug,packet compute IV for phase2
Jan/09/2022 11:54:24 ipsec,debug,packet phase1 last IV:
Jan/09/2022 11:54:24 ipsec,debug,packet 22afac16 8919b8bb b88a8ee0 704d4d10 d5b5b928
Jan/09/2022 11:54:24 ipsec,debug hash(sha1)
Jan/09/2022 11:54:24 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:24 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 11:54:24 ipsec,debug,packet fe0b15f0 42e3bcda 68872d4b 10bc749a
Jan/09/2022 11:54:24 ipsec,debug,packet HASH with:
Jan/09/2022 11:54:24 ipsec,debug,packet d5b5b928 00000020 00000001 01108d28 e544d4cf 83801af4 7a523bed 653882b9
Jan/09/2022 11:54:24 ipsec,debug,packet 00000be5
Jan/09/2022 11:54:24 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:24 ipsec,debug,packet HASH computed:
Jan/09/2022 11:54:24 ipsec,debug,packet 46f678f8 2b4bcec8 da7ff9b0 07a02d42 f8ab9edf
Jan/09/2022 11:54:24 ipsec,debug,packet begin encryption.
Jan/09/2022 11:54:24 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:24 ipsec,debug,packet pad length = 8
Jan/09/2022 11:54:24 ipsec,debug,packet 0b000018 46f678f8 2b4bcec8 da7ff9b0 07a02d42 f8ab9edf 00000020 00000001
Jan/09/2022 11:54:24 ipsec,debug,packet 01108d28 e544d4cf 83801af4 7a523bed 653882b9 00000be5 c7df8983 89898307
Jan/09/2022 11:54:24 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:24 ipsec,debug,packet with key:
Jan/09/2022 11:54:24 ipsec,debug,packet 925ffa84 dc60ed1c df18bbfd 052c9532
Jan/09/2022 11:54:24 ipsec,debug,packet encrypted payload by IV:
Jan/09/2022 11:54:24 ipsec,debug,packet fe0b15f0 42e3bcda 68872d4b 10bc749a
Jan/09/2022 11:54:24 ipsec,debug,packet save IV for next:
Jan/09/2022 11:54:24 ipsec,debug,packet 19171e60 411adbbe 6e1c3e43 8151b5f2
Jan/09/2022 11:54:24 ipsec,debug,packet encrypted.
Jan/09/2022 11:54:24 ipsec,debug 92 bytes from 164.52.192.253[500] to 3.226.95.68[500]
Jan/09/2022 11:54:24 ipsec,debug 1 times of 92 bytes message will be sent to 3.226.95.68[500]
Jan/09/2022 11:54:24 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08100501 d5b5b928 0000005c d2b6d635
Jan/09/2022 11:54:24 ipsec,debug,packet d8184423 252a4092 aac0615e 33594c18 049b763f d8fa50e2 f7bcf2b0 526b26a6
Jan/09/2022 11:54:24 ipsec,debug,packet eafc09b1 b5c0b90c 31e9853e 19171e60 411adbbe 6e1c3e43 8151b5f2
Jan/09/2022 11:54:24 ipsec,debug sendto Information notify.
Jan/09/2022 11:54:24 ipsec,debug 3.226.95.68 DPD R-U-There sent (0)
Jan/09/2022 11:54:24 ipsec,debug 3.226.95.68 rescheduling send_r_u (5).
Jan/09/2022 11:54:24 ipsec,debug ===== received 92 bytes from 3.226.95.68[500] to 164.52.192.253[500]
Jan/09/2022 11:54:24 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08100501 6e01df7c 0000005c 4c029252
Jan/09/2022 11:54:24 ipsec,debug,packet eee0385a 8e6c012e d52c1e2e 41e45b3a 144598f2 7b466741 b38a9fc4 120ed452
Jan/09/2022 11:54:24 ipsec,debug,packet a95800ab 206dfda4 d7ff023f fa87a169 15013ced 9d52cc8c 1d7f819e
Jan/09/2022 11:54:24 ipsec,debug receive Information.
Jan/09/2022 11:54:24 ipsec,debug,packet compute IV for phase2
Jan/09/2022 11:54:24 ipsec,debug,packet phase1 last IV:
Jan/09/2022 11:54:24 ipsec,debug,packet 22afac16 8919b8bb b88a8ee0 704d4d10 6e01df7c
Jan/09/2022 11:54:24 ipsec,debug hash(sha1)
Jan/09/2022 11:54:24 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:24 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 11:54:24 ipsec,debug,packet 9e60f07d 2f6a104f 663b6aef 4bc18577
Jan/09/2022 11:54:24 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:24 ipsec,debug,packet IV was saved for next processing:
Jan/09/2022 11:54:24 ipsec,debug,packet fa87a169 15013ced 9d52cc8c 1d7f819e
Jan/09/2022 11:54:24 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:24 ipsec,debug,packet with key:
Jan/09/2022 11:54:24 ipsec,debug,packet 925ffa84 dc60ed1c df18bbfd 052c9532
Jan/09/2022 11:54:24 ipsec,debug,packet decrypted payload by IV:
Jan/09/2022 11:54:24 ipsec,debug,packet 9e60f07d 2f6a104f 663b6aef 4bc18577
Jan/09/2022 11:54:24 ipsec,debug,packet decrypted payload, but not trimed.
Jan/09/2022 11:54:24 ipsec,debug,packet 0b000018 14bb4127 aea66188 a9a0046e 1bb2d215 391cbc50 00000020 00000001
Jan/09/2022 11:54:24 ipsec,debug,packet 01108d28 e544d4cf 83801af4 7a523bed 653882b9 23097b3a 00000000 00000000
Jan/09/2022 11:54:24 ipsec,debug,packet padding len=1
Jan/09/2022 11:54:24 ipsec,debug,packet skip to trim padding.
Jan/09/2022 11:54:24 ipsec,debug,packet decrypted.
Jan/09/2022 11:54:24 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08100501 6e01df7c 0000005c 0b000018
Jan/09/2022 11:54:24 ipsec,debug,packet 14bb4127 aea66188 a9a0046e 1bb2d215 391cbc50 00000020 00000001 01108d28
Jan/09/2022 11:54:24 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 23097b3a 00000000 00000000
Jan/09/2022 11:54:24 ipsec,debug,packet HASH with:
Jan/09/2022 11:54:24 ipsec,debug,packet 6e01df7c 00000020 00000001 01108d28 e544d4cf 83801af4 7a523bed 653882b9
Jan/09/2022 11:54:24 ipsec,debug,packet 23097b3a
Jan/09/2022 11:54:24 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:24 ipsec,debug,packet HASH computed:
Jan/09/2022 11:54:24 ipsec,debug,packet 14bb4127 aea66188 a9a0046e 1bb2d215 391cbc50
Jan/09/2022 11:54:24 ipsec,debug hash validated.
Jan/09/2022 11:54:24 ipsec,debug begin.
Jan/09/2022 11:54:24 ipsec,debug seen nptype=8(hash) len=24
Jan/09/2022 11:54:24 ipsec,debug seen nptype=11(notify) len=32
Jan/09/2022 11:54:24 ipsec,debug succeed.
Jan/09/2022 11:54:24 ipsec,debug 3.226.95.68 notify: R_U_THERE
Jan/09/2022 11:54:24 ipsec,debug 3.226.95.68 DPD R-U-There received
Jan/09/2022 11:54:24 ipsec,debug,packet compute IV for phase2
Jan/09/2022 11:54:24 ipsec,debug,packet phase1 last IV:
Jan/09/2022 11:54:24 ipsec,debug,packet 22afac16 8919b8bb b88a8ee0 704d4d10 eacaef30
Jan/09/2022 11:54:24 ipsec,debug hash(sha1)
Jan/09/2022 11:54:24 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:24 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 11:54:24 ipsec,debug,packet 77440170 0a60a3a5 7c385e00 eca2a2bc
Jan/09/2022 11:54:24 ipsec,debug,packet HASH with:
Jan/09/2022 11:54:24 ipsec,debug,packet eacaef30 00000020 00000001 01108d29 e544d4cf 83801af4 7a523bed 653882b9
Jan/09/2022 11:54:24 ipsec,debug,packet 23097b3a
Jan/09/2022 11:54:24 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:24 ipsec,debug,packet HASH computed:
Jan/09/2022 11:54:24 ipsec,debug,packet d004aafc 8ddad7f8 cf724b58 eb644a3d 0ef7fdea
Jan/09/2022 11:54:24 ipsec,debug,packet begin encryption.
Jan/09/2022 11:54:24 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:24 ipsec,debug,packet pad length = 8
Jan/09/2022 11:54:24 ipsec,debug,packet 0b000018 d004aafc 8ddad7f8 cf724b58 eb644a3d 0ef7fdea 00000020 00000001
Jan/09/2022 11:54:24 ipsec,debug,packet 01108d29 e544d4cf 83801af4 7a523bed 653882b9 23097b3a abec84ed cea3ed07
Jan/09/2022 11:54:24 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:24 ipsec,debug,packet with key:
Jan/09/2022 11:54:24 ipsec,debug,packet 925ffa84 dc60ed1c df18bbfd 052c9532
Jan/09/2022 11:54:24 ipsec,debug,packet encrypted payload by IV:
Jan/09/2022 11:54:24 ipsec,debug,packet 77440170 0a60a3a5 7c385e00 eca2a2bc
Jan/09/2022 11:54:24 ipsec,debug,packet save IV for next:
Jan/09/2022 11:54:24 ipsec,debug,packet 4cd1020c 82b4212e 05f6f947 f39c6651
Jan/09/2022 11:54:24 ipsec,debug,packet encrypted.
Jan/09/2022 11:54:24 ipsec,debug 92 bytes from 164.52.192.253[500] to 3.226.95.68[500]
Jan/09/2022 11:54:24 ipsec,debug 1 times of 92 bytes message will be sent to 3.226.95.68[500]
Jan/09/2022 11:54:24 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08100501 eacaef30 0000005c f455c9d7
Jan/09/2022 11:54:24 ipsec,debug,packet c3e3bba5 6617c286 30f710ef e9ada702 84092424 9a369829 b9907894 1afd4c02
Jan/09/2022 11:54:24 ipsec,debug,packet caed942c bf9ee742 2d0ad9f9 4cd1020c 82b4212e 05f6f947 f39c6651
Jan/09/2022 11:54:24 ipsec,debug sendto Information notify.
Jan/09/2022 11:54:24 ipsec,debug received a valid R-U-THERE, ACK sent
Jan/09/2022 11:54:25 ipsec,debug ===== received 92 bytes from 3.226.95.68[500] to 164.52.192.253[500]
Jan/09/2022 11:54:25 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08100501 b7994818 0000005c 7f9bbc6c
Jan/09/2022 11:54:25 ipsec,debug,packet 81011728 65ce7bb3 ab6cbdc6 c2524a1e 65b96724 a85052e6 79b3bc86 1eed7302
Jan/09/2022 11:54:25 ipsec,debug,packet 8ee4b239 0fd776a4 778d1d1b f7bab4ef 8d8f4e09 dd3698d3 a39a6def
Jan/09/2022 11:54:25 ipsec,debug receive Information.
Jan/09/2022 11:54:25 ipsec,debug,packet compute IV for phase2
Jan/09/2022 11:54:25 ipsec,debug,packet phase1 last IV:
Jan/09/2022 11:54:25 ipsec,debug,packet 22afac16 8919b8bb b88a8ee0 704d4d10 b7994818
Jan/09/2022 11:54:25 ipsec,debug hash(sha1)
Jan/09/2022 11:54:25 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:25 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 11:54:25 ipsec,debug,packet 9338e4ec 4f12a7b9 ffe69a70 997b9618
Jan/09/2022 11:54:25 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:25 ipsec,debug,packet IV was saved for next processing:
Jan/09/2022 11:54:25 ipsec,debug,packet f7bab4ef 8d8f4e09 dd3698d3 a39a6def
Jan/09/2022 11:54:25 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:25 ipsec,debug,packet with key:
Jan/09/2022 11:54:25 ipsec,debug,packet 925ffa84 dc60ed1c df18bbfd 052c9532
Jan/09/2022 11:54:25 ipsec,debug,packet decrypted payload by IV:
Jan/09/2022 11:54:25 ipsec,debug,packet 9338e4ec 4f12a7b9 ffe69a70 997b9618
Jan/09/2022 11:54:25 ipsec,debug,packet decrypted payload, but not trimed.
Jan/09/2022 11:54:25 ipsec,debug,packet 0b000018 7ac8a915 7538a91a 52172125 d89b741c 68d6088b 00000020 00000001
Jan/09/2022 11:54:25 ipsec,debug,packet 01108d29 e544d4cf 83801af4 7a523bed 653882b9 00000be5 00000000 00000000
Jan/09/2022 11:54:25 ipsec,debug,packet padding len=1
Jan/09/2022 11:54:25 ipsec,debug,packet skip to trim padding.
Jan/09/2022 11:54:25 ipsec,debug,packet decrypted.
Jan/09/2022 11:54:25 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08100501 b7994818 0000005c 0b000018
Jan/09/2022 11:54:25 ipsec,debug,packet 7ac8a915 7538a91a 52172125 d89b741c 68d6088b 00000020 00000001 01108d29
Jan/09/2022 11:54:25 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 00000be5 00000000 00000000
Jan/09/2022 11:54:25 ipsec,debug,packet HASH with:
Jan/09/2022 11:54:25 ipsec,debug,packet b7994818 00000020 00000001 01108d29 e544d4cf 83801af4 7a523bed 653882b9
Jan/09/2022 11:54:25 ipsec,debug,packet 00000be5
Jan/09/2022 11:54:25 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:25 ipsec,debug,packet HASH computed:
Jan/09/2022 11:54:25 ipsec,debug,packet 7ac8a915 7538a91a 52172125 d89b741c 68d6088b
Jan/09/2022 11:54:25 ipsec,debug hash validated.
Jan/09/2022 11:54:25 ipsec,debug begin.
Jan/09/2022 11:54:25 ipsec,debug seen nptype=8(hash) len=24
Jan/09/2022 11:54:25 ipsec,debug seen nptype=11(notify) len=32
Jan/09/2022 11:54:25 ipsec,debug succeed.
Jan/09/2022 11:54:25 ipsec,debug 3.226.95.68 notify: R_U_THERE_ACK
Jan/09/2022 11:54:25 ipsec,debug 3.226.95.68 DPD R-U-There-Ack received
Jan/09/2022 11:54:25 ipsec,debug received an R-U-THERE-ACK
Jan/09/2022 11:54:25 ipsec,debug 364 bytes from 164.52.192.253[500] to 3.226.95.68[500]
Jan/09/2022 11:54:25 ipsec,debug 1 times of 364 bytes message will be sent to 3.226.95.68[500]
Jan/09/2022 11:54:25 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08102001 dd06a677 0000016c 7ff86077
Jan/09/2022 11:54:25 ipsec,debug,packet 1749061a 8d0edd9e c1fc6fb9 7a8fbcc1 a7e7f3f9 c65063ad 78d8448e 894fad1f
Jan/09/2022 11:54:25 ipsec,debug,packet cf1fc74f b55d5572 e4526bca 535a4eea 80bbff90 01e9dc15 4aba1215 2540ec15
Jan/09/2022 11:54:25 ipsec,debug,packet b6393d81 85948128 f0850e03 625a5186 f584f8ab 42ee89cb 0b7c44d6 30538f00
Jan/09/2022 11:54:25 ipsec,debug,packet fafe1d76 a2cbb4c7 e2544da6 ebc7a98f cfbb80f8 1c073f54 0a921bb2 cfcf520c
Jan/09/2022 11:54:25 ipsec,debug,packet e06e5a39 b5661ead f4338995 70edea13 21793cf3 5cdbe96a 2cb3daa5 73d3848e
Jan/09/2022 11:54:25 ipsec,debug,packet c951c248 1dd21948 6338bb91 bcf063b9 42f69935 3150128f f12ad593 d48623da
Jan/09/2022 11:54:25 ipsec,debug,packet e3c3f758 79e7663a df4f5121 049c232d 24575205 ec1d8c45 58ef428a 54ab0755
Jan/09/2022 11:54:25 ipsec,debug,packet 95dcb42f fb5701c0 d8697489 13d97e65 40389f42 aed91ff9 f59e735e 83796cd8
Jan/09/2022 11:54:25 ipsec,debug,packet b32d69a5 3128575e 5985cee1 74590cca 75eb0ffb fde22754 7d74a130 36bfb034
Jan/09/2022 11:54:25 ipsec,debug,packet 13dc864c d849c167 a12c5d5e 34767142 2e97f5cf eb515901 caa6a862 aa9801c9
Jan/09/2022 11:54:25 ipsec,debug,packet 0dad3d0f 922a110c a24566b3
Jan/09/2022 11:54:25 ipsec resent phase2 packet 164.52.192.253[500]<=>3.226.95.68[500] e544d4cf83801af4:7a523bed653882b9:0000dd06
Jan/09/2022 11:54:25 ipsec,debug ===== received 76 bytes from 3.226.95.68[500] to 164.52.192.253[500]
Jan/09/2022 11:54:25 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08100501 2ed909f0 0000004c 0f616841
Jan/09/2022 11:54:25 ipsec,debug,packet e134fca7 608f1c47 bec88caa 2fe3fa9f f1d3fb21 f7ff9710 dd5d10a5 2cccef01
Jan/09/2022 11:54:25 ipsec,debug,packet 96327cff 1b3fe355 a7202fb5
Jan/09/2022 11:54:25 ipsec,debug receive Information.
Jan/09/2022 11:54:25 ipsec,debug,packet compute IV for phase2
Jan/09/2022 11:54:25 ipsec,debug,packet phase1 last IV:
Jan/09/2022 11:54:25 ipsec,debug,packet 22afac16 8919b8bb b88a8ee0 704d4d10 2ed909f0
Jan/09/2022 11:54:25 ipsec,debug hash(sha1)
Jan/09/2022 11:54:25 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:25 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 11:54:25 ipsec,debug,packet eb7e0f59 adb734a2 5f756d47 00a65831
Jan/09/2022 11:54:25 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:25 ipsec,debug,packet IV was saved for next processing:
Jan/09/2022 11:54:25 ipsec,debug,packet 2cccef01 96327cff 1b3fe355 a7202fb5
Jan/09/2022 11:54:25 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:25 ipsec,debug,packet with key:
Jan/09/2022 11:54:25 ipsec,debug,packet 925ffa84 dc60ed1c df18bbfd 052c9532
Jan/09/2022 11:54:25 ipsec,debug,packet decrypted payload by IV:
Jan/09/2022 11:54:25 ipsec,debug,packet eb7e0f59 adb734a2 5f756d47 00a65831
Jan/09/2022 11:54:25 ipsec,debug,packet decrypted payload, but not trimed.
Jan/09/2022 11:54:25 ipsec,debug,packet 0b000018 329c47f7 59dbc320 2214ab1d f217eebe 2d445459 0000000c 00000001
Jan/09/2022 11:54:25 ipsec,debug,packet 01000010 00000000 00000000 00000000
Jan/09/2022 11:54:25 ipsec,debug,packet padding len=1
Jan/09/2022 11:54:25 ipsec,debug,packet skip to trim padding.
Jan/09/2022 11:54:25 ipsec,debug,packet decrypted.
Jan/09/2022 11:54:25 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08100501 2ed909f0 0000004c 0b000018
Jan/09/2022 11:54:25 ipsec,debug,packet 329c47f7 59dbc320 2214ab1d f217eebe 2d445459 0000000c 00000001 01000010
Jan/09/2022 11:54:25 ipsec,debug,packet 00000000 00000000 00000000
Jan/09/2022 11:54:25 ipsec,debug,packet HASH with:
Jan/09/2022 11:54:25 ipsec,debug,packet 2ed909f0 0000000c 00000001 01000010
Jan/09/2022 11:54:25 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:25 ipsec,debug,packet HASH computed:
Jan/09/2022 11:54:25 ipsec,debug,packet 329c47f7 59dbc320 2214ab1d f217eebe 2d445459
Jan/09/2022 11:54:25 ipsec,debug hash validated.
Jan/09/2022 11:54:25 ipsec,debug begin.
Jan/09/2022 11:54:25 ipsec,debug seen nptype=8(hash) len=24
Jan/09/2022 11:54:25 ipsec,debug seen nptype=11(notify) len=12
Jan/09/2022 11:54:25 ipsec,debug succeed.
Jan/09/2022 11:54:25 ipsec,debug 3.226.95.68 notify: PAYLOAD-MALFORMED
Jan/09/2022 11:54:25 ipsec 3.226.95.68 fatal PAYLOAD-MALFORMED notify messsage, phase1 should be deleted.
Jan/09/2022 11:54:34 ipsec,debug ===== received 92 bytes from 3.226.95.68[500] to 164.52.192.253[500]
Jan/09/2022 11:54:34 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08100501 2ff8a9db 0000005c ee894af5
Jan/09/2022 11:54:34 ipsec,debug,packet afd39aa7 236180d5 606ca923 e0ebe552 c99d09e1 96a0c763 2ccfa953 32a04ecd
Jan/09/2022 11:54:34 ipsec,debug,packet baec4875 3350bf93 c339e50c 1319aa4d e10b2fef 272a3ac5 629ec6c2
Jan/09/2022 11:54:34 ipsec,debug receive Information.
Jan/09/2022 11:54:34 ipsec,debug,packet compute IV for phase2
Jan/09/2022 11:54:34 ipsec,debug,packet phase1 last IV:
Jan/09/2022 11:54:34 ipsec,debug,packet 22afac16 8919b8bb b88a8ee0 704d4d10 2ff8a9db
Jan/09/2022 11:54:34 ipsec,debug hash(sha1)
Jan/09/2022 11:54:34 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:34 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 11:54:34 ipsec,debug,packet 3b5474a2 89afda43 59f9563e 2167c30d
Jan/09/2022 11:54:34 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:34 ipsec,debug,packet IV was saved for next processing:
Jan/09/2022 11:54:34 ipsec,debug,packet 1319aa4d e10b2fef 272a3ac5 629ec6c2
Jan/09/2022 11:54:34 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:34 ipsec,debug,packet with key:
Jan/09/2022 11:54:34 ipsec,debug,packet 925ffa84 dc60ed1c df18bbfd 052c9532
Jan/09/2022 11:54:34 ipsec,debug,packet decrypted payload by IV:
Jan/09/2022 11:54:34 ipsec,debug,packet 3b5474a2 89afda43 59f9563e 2167c30d
Jan/09/2022 11:54:34 ipsec,debug,packet decrypted payload, but not trimed.
Jan/09/2022 11:54:34 ipsec,debug,packet 0b000018 83936192 662d0b65 eb97e6f9 05660902 0510bb3d 00000020 00000001
Jan/09/2022 11:54:34 ipsec,debug,packet 01108d28 e544d4cf 83801af4 7a523bed 653882b9 23097b3b 00000000 00000000
Jan/09/2022 11:54:34 ipsec,debug,packet padding len=1
Jan/09/2022 11:54:34 ipsec,debug,packet skip to trim padding.
Jan/09/2022 11:54:34 ipsec,debug,packet decrypted.
Jan/09/2022 11:54:34 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08100501 2ff8a9db 0000005c 0b000018
Jan/09/2022 11:54:34 ipsec,debug,packet 83936192 662d0b65 eb97e6f9 05660902 0510bb3d 00000020 00000001 01108d28
Jan/09/2022 11:54:34 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 23097b3b 00000000 00000000
Jan/09/2022 11:54:34 ipsec,debug,packet HASH with:
Jan/09/2022 11:54:34 ipsec,debug,packet 2ff8a9db 00000020 00000001 01108d28 e544d4cf 83801af4 7a523bed 653882b9
Jan/09/2022 11:54:34 ipsec,debug,packet 23097b3b
Jan/09/2022 11:54:34 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:34 ipsec,debug,packet HASH computed:
Jan/09/2022 11:54:34 ipsec,debug,packet 83936192 662d0b65 eb97e6f9 05660902 0510bb3d
Jan/09/2022 11:54:34 ipsec,debug hash validated.
Jan/09/2022 11:54:34 ipsec,debug begin.
Jan/09/2022 11:54:34 ipsec,debug seen nptype=8(hash) len=24
Jan/09/2022 11:54:34 ipsec,debug seen nptype=11(notify) len=32
Jan/09/2022 11:54:34 ipsec,debug succeed.
Jan/09/2022 11:54:34 ipsec,debug 3.226.95.68 notify: R_U_THERE
Jan/09/2022 11:54:34 ipsec,debug 3.226.95.68 DPD R-U-There received
Jan/09/2022 11:54:34 ipsec,debug,packet compute IV for phase2
Jan/09/2022 11:54:34 ipsec,debug,packet phase1 last IV:
Jan/09/2022 11:54:34 ipsec,debug,packet 22afac16 8919b8bb b88a8ee0 704d4d10 fc759d83
Jan/09/2022 11:54:34 ipsec,debug hash(sha1)
Jan/09/2022 11:54:34 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:34 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 11:54:34 ipsec,debug,packet 632d8021 3854529f f9770dfc 9578a55c
Jan/09/2022 11:54:34 ipsec,debug,packet HASH with:
Jan/09/2022 11:54:34 ipsec,debug,packet fc759d83 00000020 00000001 01108d29 e544d4cf 83801af4 7a523bed 653882b9
Jan/09/2022 11:54:34 ipsec,debug,packet 23097b3b
Jan/09/2022 11:54:34 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:34 ipsec,debug,packet HASH computed:
Jan/09/2022 11:54:34 ipsec,debug,packet f75788e8 eaff56bb 2505fe9d f092a4c2 2a247948
Jan/09/2022 11:54:34 ipsec,debug,packet begin encryption.
Jan/09/2022 11:54:34 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:34 ipsec,debug,packet pad length = 8
Jan/09/2022 11:54:34 ipsec,debug,packet 0b000018 f75788e8 eaff56bb 2505fe9d f092a4c2 2a247948 00000020 00000001
Jan/09/2022 11:54:34 ipsec,debug,packet 01108d29 e544d4cf 83801af4 7a523bed 653882b9 23097b3b cade91e8 b7efb407
Jan/09/2022 11:54:34 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:34 ipsec,debug,packet with key:
Jan/09/2022 11:54:34 ipsec,debug,packet 925ffa84 dc60ed1c df18bbfd 052c9532
Jan/09/2022 11:54:34 ipsec,debug,packet encrypted payload by IV:
Jan/09/2022 11:54:34 ipsec,debug,packet 632d8021 3854529f f9770dfc 9578a55c
Jan/09/2022 11:54:34 ipsec,debug,packet save IV for next:
Jan/09/2022 11:54:34 ipsec,debug,packet 43dc89bb 34045d9a f4709bc1 7aa27ac2
Jan/09/2022 11:54:34 ipsec,debug,packet encrypted.
Jan/09/2022 11:54:34 ipsec,debug 92 bytes from 164.52.192.253[500] to 3.226.95.68[500]
Jan/09/2022 11:54:34 ipsec,debug 1 times of 92 bytes message will be sent to 3.226.95.68[500]
Jan/09/2022 11:54:34 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08100501 fc759d83 0000005c e80622e2
Jan/09/2022 11:54:34 ipsec,debug,packet 4a63dace 89bb2217 210ef8b5 479475ab 6a9dd9fc 3f909a4e 7e2c07e3 97aa50ef
Jan/09/2022 11:54:34 ipsec,debug,packet a7e23bc4 9ed39f94 078eff98 43dc89bb 34045d9a f4709bc1 7aa27ac2
Jan/09/2022 11:54:34 ipsec,debug sendto Information notify.
Jan/09/2022 11:54:34 ipsec,debug received a valid R-U-THERE, ACK sent
Jan/09/2022 11:54:35 ipsec,debug 3.226.95.68 DPD monitoring....
Jan/09/2022 11:54:35 ipsec,debug,packet compute IV for phase2
Jan/09/2022 11:54:35 ipsec,debug,packet phase1 last IV:
Jan/09/2022 11:54:35 ipsec,debug,packet 22afac16 8919b8bb b88a8ee0 704d4d10 e9147fd0
Jan/09/2022 11:54:35 ipsec,debug hash(sha1)
Jan/09/2022 11:54:35 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:35 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 11:54:35 ipsec,debug,packet e0934d24 1824eeea bb55b959 e031cf56
Jan/09/2022 11:54:35 ipsec,debug,packet HASH with:
Jan/09/2022 11:54:35 ipsec,debug,packet e9147fd0 00000020 00000001 01108d28 e544d4cf 83801af4 7a523bed 653882b9
Jan/09/2022 11:54:35 ipsec,debug,packet 00000be6
Jan/09/2022 11:54:35 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:35 ipsec,debug,packet HASH computed:
Jan/09/2022 11:54:35 ipsec,debug,packet d08f14b8 0bf4bb16 26bfa3aa 6d6ca18d bb9f7e61
Jan/09/2022 11:54:35 ipsec,debug,packet begin encryption.
Jan/09/2022 11:54:35 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:35 ipsec,debug,packet pad length = 8
Jan/09/2022 11:54:35 ipsec,debug,packet 0b000018 d08f14b8 0bf4bb16 26bfa3aa 6d6ca18d bb9f7e61 00000020 00000001
Jan/09/2022 11:54:35 ipsec,debug,packet 01108d28 e544d4cf 83801af4 7a523bed 653882b9 00000be6 9fc49ba5 addeb807
Jan/09/2022 11:54:35 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:35 ipsec,debug,packet with key:
Jan/09/2022 11:54:35 ipsec,debug,packet 925ffa84 dc60ed1c df18bbfd 052c9532
Jan/09/2022 11:54:35 ipsec,debug,packet encrypted payload by IV:
Jan/09/2022 11:54:35 ipsec,debug,packet e0934d24 1824eeea bb55b959 e031cf56
Jan/09/2022 11:54:35 ipsec,debug,packet save IV for next:
Jan/09/2022 11:54:35 ipsec,debug,packet f5689b56 6db12185 f64e4b4e 4aa97eaf
Jan/09/2022 11:54:35 ipsec,debug,packet encrypted.
Jan/09/2022 11:54:35 ipsec,debug 92 bytes from 164.52.192.253[500] to 3.226.95.68[500]
Jan/09/2022 11:54:35 ipsec,debug 1 times of 92 bytes message will be sent to 3.226.95.68[500]
Jan/09/2022 11:54:35 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08100501 e9147fd0 0000005c 64de1085
Jan/09/2022 11:54:35 ipsec,debug,packet 9dae4ded 19f6e851 1d350efd 1536abf4 3d84d620 86cb8eae 6b7b09a1 62eb3de2
Jan/09/2022 11:54:35 ipsec,debug,packet a607c0ae 6526d74c cd6b07c7 f5689b56 6db12185 f64e4b4e 4aa97eaf
Jan/09/2022 11:54:35 ipsec,debug sendto Information notify.
Jan/09/2022 11:54:35 ipsec,debug 3.226.95.68 DPD R-U-There sent (0)
Jan/09/2022 11:54:35 ipsec,debug 3.226.95.68 rescheduling send_r_u (5).
Jan/09/2022 11:54:35 ipsec,debug 364 bytes from 164.52.192.253[500] to 3.226.95.68[500]
Jan/09/2022 11:54:35 ipsec,debug 1 times of 364 bytes message will be sent to 3.226.95.68[500]
Jan/09/2022 11:54:35 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08102001 dd06a677 0000016c 7ff86077
Jan/09/2022 11:54:35 ipsec,debug,packet 1749061a 8d0edd9e c1fc6fb9 7a8fbcc1 a7e7f3f9 c65063ad 78d8448e 894fad1f
Jan/09/2022 11:54:35 ipsec,debug,packet cf1fc74f b55d5572 e4526bca 535a4eea 80bbff90 01e9dc15 4aba1215 2540ec15
Jan/09/2022 11:54:35 ipsec,debug,packet b6393d81 85948128 f0850e03 625a5186 f584f8ab 42ee89cb 0b7c44d6 30538f00
Jan/09/2022 11:54:35 ipsec,debug,packet fafe1d76 a2cbb4c7 e2544da6 ebc7a98f cfbb80f8 1c073f54 0a921bb2 cfcf520c
Jan/09/2022 11:54:35 ipsec,debug,packet e06e5a39 b5661ead f4338995 70edea13 21793cf3 5cdbe96a 2cb3daa5 73d3848e
Jan/09/2022 11:54:35 ipsec,debug,packet c951c248 1dd21948 6338bb91 bcf063b9 42f69935 3150128f f12ad593 d48623da
Jan/09/2022 11:54:35 ipsec,debug,packet e3c3f758 79e7663a df4f5121 049c232d 24575205 ec1d8c45 58ef428a 54ab0755
Jan/09/2022 11:54:35 ipsec,debug,packet 95dcb42f fb5701c0 d8697489 13d97e65 40389f42 aed91ff9 f59e735e 83796cd8
Jan/09/2022 11:54:35 ipsec,debug,packet b32d69a5 3128575e 5985cee1 74590cca 75eb0ffb fde22754 7d74a130 36bfb034
Jan/09/2022 11:54:35 ipsec,debug,packet 13dc864c d849c167 a12c5d5e 34767142 2e97f5cf eb515901 caa6a862 aa9801c9
Jan/09/2022 11:54:35 ipsec,debug,packet 0dad3d0f 922a110c a24566b3
Jan/09/2022 11:54:35 ipsec resent phase2 packet 164.52.192.253[500]<=>3.226.95.68[500] e544d4cf83801af4:7a523bed653882b9:0000dd06
Jan/09/2022 11:54:35 ipsec,debug ===== received 92 bytes from 3.226.95.68[500] to 164.52.192.253[500]
Jan/09/2022 11:54:35 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08100501 49f1546f 0000005c 9933541a
Jan/09/2022 11:54:35 ipsec,debug,packet c2f79c1c 5e65fc78 c0198289 67a4b147 d57ae636 dd7d52bf 3b46ea1b 253b2da6
Jan/09/2022 11:54:35 ipsec,debug,packet 567cd9cc 43f0ea61 09c1206b ec0bde1b 7ce0d714 7b4d5a82 d83e649e
Jan/09/2022 11:54:35 ipsec,debug receive Information.
Jan/09/2022 11:54:35 ipsec,debug,packet compute IV for phase2
Jan/09/2022 11:54:35 ipsec,debug,packet phase1 last IV:
Jan/09/2022 11:54:35 ipsec,debug,packet 22afac16 8919b8bb b88a8ee0 704d4d10 49f1546f
Jan/09/2022 11:54:35 ipsec,debug hash(sha1)
Jan/09/2022 11:54:35 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:35 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 11:54:35 ipsec,debug,packet 8db030a7 2d9787f9 90309949 9c56301a
Jan/09/2022 11:54:35 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:35 ipsec,debug,packet IV was saved for next processing:
Jan/09/2022 11:54:35 ipsec,debug,packet ec0bde1b 7ce0d714 7b4d5a82 d83e649e
Jan/09/2022 11:54:35 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:35 ipsec,debug,packet with key:
Jan/09/2022 11:54:35 ipsec,debug,packet 925ffa84 dc60ed1c df18bbfd 052c9532
Jan/09/2022 11:54:35 ipsec,debug,packet decrypted payload by IV:
Jan/09/2022 11:54:35 ipsec,debug,packet 8db030a7 2d9787f9 90309949 9c56301a
Jan/09/2022 11:54:35 ipsec,debug,packet decrypted payload, but not trimed.
Jan/09/2022 11:54:35 ipsec,debug,packet 0b000018 31d2c4bc 2432ca82 12a7a9f4 8d4033a6 8df9884d 00000020 00000001
Jan/09/2022 11:54:35 ipsec,debug,packet 01108d29 e544d4cf 83801af4 7a523bed 653882b9 00000be6 00000000 00000000
Jan/09/2022 11:54:35 ipsec,debug,packet padding len=1
Jan/09/2022 11:54:35 ipsec,debug,packet skip to trim padding.
Jan/09/2022 11:54:35 ipsec,debug,packet decrypted.
Jan/09/2022 11:54:35 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08100501 49f1546f 0000005c 0b000018
Jan/09/2022 11:54:35 ipsec,debug,packet 31d2c4bc 2432ca82 12a7a9f4 8d4033a6 8df9884d 00000020 00000001 01108d29
Jan/09/2022 11:54:35 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 00000be6 00000000 00000000
Jan/09/2022 11:54:35 ipsec,debug,packet HASH with:
Jan/09/2022 11:54:35 ipsec,debug,packet 49f1546f 00000020 00000001 01108d29 e544d4cf 83801af4 7a523bed 653882b9
Jan/09/2022 11:54:35 ipsec,debug,packet 00000be6
Jan/09/2022 11:54:35 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:35 ipsec,debug,packet HASH computed:
Jan/09/2022 11:54:35 ipsec,debug,packet 31d2c4bc 2432ca82 12a7a9f4 8d4033a6 8df9884d
Jan/09/2022 11:54:35 ipsec,debug hash validated.
Jan/09/2022 11:54:35 ipsec,debug begin.
Jan/09/2022 11:54:35 ipsec,debug seen nptype=8(hash) len=24
Jan/09/2022 11:54:35 ipsec,debug seen nptype=11(notify) len=32
Jan/09/2022 11:54:35 ipsec,debug succeed.
Jan/09/2022 11:54:35 ipsec,debug 3.226.95.68 notify: R_U_THERE_ACK
Jan/09/2022 11:54:35 ipsec,debug 3.226.95.68 DPD R-U-There-Ack received
Jan/09/2022 11:54:35 ipsec,debug received an R-U-THERE-ACK
Jan/09/2022 11:54:35 ipsec,debug ===== received 76 bytes from 3.226.95.68[500] to 164.52.192.253[500]
Jan/09/2022 11:54:35 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08100501 768ddbad 0000004c 6174e54b
Jan/09/2022 11:54:35 ipsec,debug,packet 02cc16e0 eafa5a97 2e82cbfa 1ee10385 024cc4c2 3baa8106 3c867e21 248bdbc1
Jan/09/2022 11:54:35 ipsec,debug,packet 0785b826 00ab1187 ac756b9e
Jan/09/2022 11:54:35 ipsec,debug receive Information.
Jan/09/2022 11:54:35 ipsec,debug,packet compute IV for phase2
Jan/09/2022 11:54:35 ipsec,debug,packet phase1 last IV:
Jan/09/2022 11:54:35 ipsec,debug,packet 22afac16 8919b8bb b88a8ee0 704d4d10 768ddbad
Jan/09/2022 11:54:35 ipsec,debug hash(sha1)
Jan/09/2022 11:54:35 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:35 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 11:54:35 ipsec,debug,packet feeab0a9 c37d83cc 6436e5d0 ff647a9f
Jan/09/2022 11:54:35 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:35 ipsec,debug,packet IV was saved for next processing:
Jan/09/2022 11:54:35 ipsec,debug,packet 248bdbc1 0785b826 00ab1187 ac756b9e
Jan/09/2022 11:54:35 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:35 ipsec,debug,packet with key:
Jan/09/2022 11:54:35 ipsec,debug,packet 925ffa84 dc60ed1c df18bbfd 052c9532
Jan/09/2022 11:54:35 ipsec,debug,packet decrypted payload by IV:
Jan/09/2022 11:54:35 ipsec,debug,packet feeab0a9 c37d83cc 6436e5d0 ff647a9f
Jan/09/2022 11:54:35 ipsec,debug,packet decrypted payload, but not trimed.
Jan/09/2022 11:54:35 ipsec,debug,packet 0b000018 2f3c4802 b4e858f7 cb4be916 48df04a8 8915c25a 0000000c 00000001
Jan/09/2022 11:54:35 ipsec,debug,packet 01000010 00000000 00000000 00000000
Jan/09/2022 11:54:35 ipsec,debug,packet padding len=1
Jan/09/2022 11:54:35 ipsec,debug,packet skip to trim padding.
Jan/09/2022 11:54:35 ipsec,debug,packet decrypted.
Jan/09/2022 11:54:35 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08100501 768ddbad 0000004c 0b000018
Jan/09/2022 11:54:35 ipsec,debug,packet 2f3c4802 b4e858f7 cb4be916 48df04a8 8915c25a 0000000c 00000001 01000010
Jan/09/2022 11:54:35 ipsec,debug,packet 00000000 00000000 00000000
Jan/09/2022 11:54:35 ipsec,debug,packet HASH with:
Jan/09/2022 11:54:35 ipsec,debug,packet 768ddbad 0000000c 00000001 01000010
Jan/09/2022 11:54:35 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:35 ipsec,debug,packet HASH computed:
Jan/09/2022 11:54:35 ipsec,debug,packet 2f3c4802 b4e858f7 cb4be916 48df04a8 8915c25a
Jan/09/2022 11:54:35 ipsec,debug hash validated.
Jan/09/2022 11:54:35 ipsec,debug begin.
Jan/09/2022 11:54:35 ipsec,debug seen nptype=8(hash) len=24
Jan/09/2022 11:54:35 ipsec,debug seen nptype=11(notify) len=12
Jan/09/2022 11:54:35 ipsec,debug succeed.
Jan/09/2022 11:54:35 ipsec,debug 3.226.95.68 notify: PAYLOAD-MALFORMED
Jan/09/2022 11:54:35 ipsec 3.226.95.68 fatal PAYLOAD-MALFORMED notify messsage, phase1 should be deleted.
Jan/09/2022 11:54:44 ipsec,debug ===== received 92 bytes from 3.226.95.68[500] to 164.52.192.253[500]
Jan/09/2022 11:54:44 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08100501 8eabfb11 0000005c 8b02b339
Jan/09/2022 11:54:44 ipsec,debug,packet 7b8876a2 639a02ee 3064f33c 02fb60c3 7cb80513 7cab5b22 082439b7 efd536b1
Jan/09/2022 11:54:44 ipsec,debug,packet 0e10d499 b2e94520 607a6a4c 45a7d572 bd468c30 50b5068d 2236194a
Jan/09/2022 11:54:44 ipsec,debug receive Information.
Jan/09/2022 11:54:44 ipsec,debug,packet compute IV for phase2
Jan/09/2022 11:54:44 ipsec,debug,packet phase1 last IV:
Jan/09/2022 11:54:44 ipsec,debug,packet 22afac16 8919b8bb b88a8ee0 704d4d10 8eabfb11
Jan/09/2022 11:54:44 ipsec,debug hash(sha1)
Jan/09/2022 11:54:44 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:44 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 11:54:44 ipsec,debug,packet f3830cfd 813ba59e 80a3fd6c 94ee8b03
Jan/09/2022 11:54:44 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:44 ipsec,debug,packet IV was saved for next processing:
Jan/09/2022 11:54:44 ipsec,debug,packet 45a7d572 bd468c30 50b5068d 2236194a
Jan/09/2022 11:54:44 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:44 ipsec,debug,packet with key:
Jan/09/2022 11:54:44 ipsec,debug,packet 925ffa84 dc60ed1c df18bbfd 052c9532
Jan/09/2022 11:54:44 ipsec,debug,packet decrypted payload by IV:
Jan/09/2022 11:54:44 ipsec,debug,packet f3830cfd 813ba59e 80a3fd6c 94ee8b03
Jan/09/2022 11:54:44 ipsec,debug,packet decrypted payload, but not trimed.
Jan/09/2022 11:54:44 ipsec,debug,packet 0b000018 23ea89cb cd5eeb01 06e662ab 4147f812 092119ed 00000020 00000001
Jan/09/2022 11:54:44 ipsec,debug,packet 01108d28 e544d4cf 83801af4 7a523bed 653882b9 23097b3c 00000000 00000000
Jan/09/2022 11:54:44 ipsec,debug,packet padding len=1
Jan/09/2022 11:54:44 ipsec,debug,packet skip to trim padding.
Jan/09/2022 11:54:44 ipsec,debug,packet decrypted.
Jan/09/2022 11:54:44 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08100501 8eabfb11 0000005c 0b000018
Jan/09/2022 11:54:44 ipsec,debug,packet 23ea89cb cd5eeb01 06e662ab 4147f812 092119ed 00000020 00000001 01108d28
Jan/09/2022 11:54:44 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 23097b3c 00000000 00000000
Jan/09/2022 11:54:44 ipsec,debug,packet HASH with:
Jan/09/2022 11:54:44 ipsec,debug,packet 8eabfb11 00000020 00000001 01108d28 e544d4cf 83801af4 7a523bed 653882b9
Jan/09/2022 11:54:44 ipsec,debug,packet 23097b3c
Jan/09/2022 11:54:44 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:44 ipsec,debug,packet HASH computed:
Jan/09/2022 11:54:44 ipsec,debug,packet 23ea89cb cd5eeb01 06e662ab 4147f812 092119ed
Jan/09/2022 11:54:44 ipsec,debug hash validated.
Jan/09/2022 11:54:44 ipsec,debug begin.
Jan/09/2022 11:54:44 ipsec,debug seen nptype=8(hash) len=24
Jan/09/2022 11:54:44 ipsec,debug seen nptype=11(notify) len=32
Jan/09/2022 11:54:44 ipsec,debug succeed.
Jan/09/2022 11:54:44 ipsec,debug 3.226.95.68 notify: R_U_THERE
Jan/09/2022 11:54:44 ipsec,debug 3.226.95.68 DPD R-U-There received
Jan/09/2022 11:54:44 ipsec,debug,packet compute IV for phase2
Jan/09/2022 11:54:44 ipsec,debug,packet phase1 last IV:
Jan/09/2022 11:54:44 ipsec,debug,packet 22afac16 8919b8bb b88a8ee0 704d4d10 8837a84a
Jan/09/2022 11:54:44 ipsec,debug hash(sha1)
Jan/09/2022 11:54:44 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:44 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 11:54:44 ipsec,debug,packet 1104deaa c7754327 9f697c09 8becade4
Jan/09/2022 11:54:44 ipsec,debug,packet HASH with:
Jan/09/2022 11:54:44 ipsec,debug,packet 8837a84a 00000020 00000001 01108d29 e544d4cf 83801af4 7a523bed 653882b9
Jan/09/2022 11:54:44 ipsec,debug,packet 23097b3c
Jan/09/2022 11:54:44 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:44 ipsec,debug,packet HASH computed:
Jan/09/2022 11:54:44 ipsec,debug,packet c1c955ef 2d5735ff 3969a08e d6ca10f8 9e039db6
Jan/09/2022 11:54:44 ipsec,debug,packet begin encryption.
Jan/09/2022 11:54:44 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:44 ipsec,debug,packet pad length = 8
Jan/09/2022 11:54:44 ipsec,debug,packet 0b000018 c1c955ef 2d5735ff 3969a08e d6ca10f8 9e039db6 00000020 00000001
Jan/09/2022 11:54:44 ipsec,debug,packet 01108d29 e544d4cf 83801af4 7a523bed 653882b9 23097b3c d2d88b83 c7a7e307
Jan/09/2022 11:54:44 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:44 ipsec,debug,packet with key:
Jan/09/2022 11:54:44 ipsec,debug,packet 925ffa84 dc60ed1c df18bbfd 052c9532
Jan/09/2022 11:54:44 ipsec,debug,packet encrypted payload by IV:
Jan/09/2022 11:54:44 ipsec,debug,packet 1104deaa c7754327 9f697c09 8becade4
Jan/09/2022 11:54:44 ipsec,debug,packet save IV for next:
Jan/09/2022 11:54:44 ipsec,debug,packet 09e61a24 c7b0c865 c1572576 73b6475c
Jan/09/2022 11:54:44 ipsec,debug,packet encrypted.
Jan/09/2022 11:54:44 ipsec,debug 92 bytes from 164.52.192.253[500] to 3.226.95.68[500]
Jan/09/2022 11:54:44 ipsec,debug 1 times of 92 bytes message will be sent to 3.226.95.68[500]
Jan/09/2022 11:54:44 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08100501 8837a84a 0000005c 3667e85a
Jan/09/2022 11:54:44 ipsec,debug,packet afbd939c 271e0c3a 94b8ba17 e8b958e7 fd472dc1 8e439b9e 6ea6780e b6a67f50
Jan/09/2022 11:54:44 ipsec,debug,packet a7f38671 cba1ad87 9cfea3bb 09e61a24 c7b0c865 c1572576 73b6475c
Jan/09/2022 11:54:44 ipsec,debug sendto Information notify.
Jan/09/2022 11:54:44 ipsec,debug received a valid R-U-THERE, ACK sent
Jan/09/2022 11:54:45 ipsec 3.226.95.68 give up to get IPsec-SA due to time up to wait.
Jan/09/2022 11:54:45 ipsec IPsec-SA expired: ESP/Tunnel 3.226.95.68[500]->164.52.192.253[500] spi=0x6165d21
Jan/09/2022 11:54:45 ipsec,debug 3.226.95.68 DPD monitoring....
Jan/09/2022 11:54:45 ipsec,debug,packet compute IV for phase2
Jan/09/2022 11:54:45 ipsec,debug,packet phase1 last IV:
Jan/09/2022 11:54:45 ipsec,debug,packet 22afac16 8919b8bb b88a8ee0 704d4d10 933cbce8
Jan/09/2022 11:54:45 ipsec,debug hash(sha1)
Jan/09/2022 11:54:45 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:45 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 11:54:45 ipsec,debug,packet 06150c30 ed9cc939 550c1ee6 b13941d5
Jan/09/2022 11:54:45 ipsec,debug,packet HASH with:
Jan/09/2022 11:54:45 ipsec,debug,packet 933cbce8 00000020 00000001 01108d28 e544d4cf 83801af4 7a523bed 653882b9
Jan/09/2022 11:54:45 ipsec,debug,packet 00000be7
Jan/09/2022 11:54:45 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:45 ipsec,debug,packet HASH computed:
Jan/09/2022 11:54:45 ipsec,debug,packet 820a708a 7cfcd06e 4851fee8 dd9c104d de58f03c
Jan/09/2022 11:54:45 ipsec,debug,packet begin encryption.
Jan/09/2022 11:54:45 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:45 ipsec,debug,packet pad length = 8
Jan/09/2022 11:54:45 ipsec,debug,packet 0b000018 820a708a 7cfcd06e 4851fee8 dd9c104d de58f03c 00000020 00000001
Jan/09/2022 11:54:45 ipsec,debug,packet 01108d28 e544d4cf 83801af4 7a523bed 653882b9 00000be7 e1dbd7d4 c8a2dd07
Jan/09/2022 11:54:45 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:45 ipsec,debug,packet with key:
Jan/09/2022 11:54:45 ipsec,debug,packet 925ffa84 dc60ed1c df18bbfd 052c9532
Jan/09/2022 11:54:45 ipsec,debug,packet encrypted payload by IV:
Jan/09/2022 11:54:45 ipsec,debug,packet 06150c30 ed9cc939 550c1ee6 b13941d5
Jan/09/2022 11:54:45 ipsec,debug,packet save IV for next:
Jan/09/2022 11:54:45 ipsec,debug,packet 78325877 0233b52d 8ca5a9df 54b15beb
Jan/09/2022 11:54:45 ipsec,debug,packet encrypted.
Jan/09/2022 11:54:45 ipsec,debug 92 bytes from 164.52.192.253[500] to 3.226.95.68[500]
Jan/09/2022 11:54:45 ipsec,debug 1 times of 92 bytes message will be sent to 3.226.95.68[500]
Jan/09/2022 11:54:45 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08100501 933cbce8 0000005c 679d0aa3
Jan/09/2022 11:54:45 ipsec,debug,packet 3b6c9bdd bb8bf904 7c255b93 5e05b9a5 ab828f3e 622d0f16 87200d29 d47348ad
Jan/09/2022 11:54:45 ipsec,debug,packet a39d3622 38377138 72713e14 78325877 0233b52d 8ca5a9df 54b15beb
Jan/09/2022 11:54:45 ipsec,debug sendto Information notify.
Jan/09/2022 11:54:45 ipsec,debug 3.226.95.68 DPD R-U-There sent (0)
Jan/09/2022 11:54:45 ipsec,debug 3.226.95.68 rescheduling send_r_u (5).
Jan/09/2022 11:54:45 ipsec,debug ===== received 92 bytes from 3.226.95.68[500] to 164.52.192.253[500]
Jan/09/2022 11:54:45 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08100501 484b5201 0000005c 19088fab
Jan/09/2022 11:54:45 ipsec,debug,packet 3757cc36 7f2e4d79 de29ffe6 1cccb7b0 ec52dc81 19c670c3 1f4ce784 a4710177
Jan/09/2022 11:54:45 ipsec,debug,packet 92b2391e 61d34c6d 870bce15 0e2225a7 e5f27060 4cf68238 6184d5b3
Jan/09/2022 11:54:45 ipsec,debug receive Information.
Jan/09/2022 11:54:45 ipsec,debug,packet compute IV for phase2
Jan/09/2022 11:54:45 ipsec,debug,packet phase1 last IV:
Jan/09/2022 11:54:45 ipsec,debug,packet 22afac16 8919b8bb b88a8ee0 704d4d10 484b5201
Jan/09/2022 11:54:45 ipsec,debug hash(sha1)
Jan/09/2022 11:54:45 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:45 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 11:54:45 ipsec,debug,packet 28b2f3d8 2480e1e8 cfd94904 bee1927e
Jan/09/2022 11:54:45 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:45 ipsec,debug,packet IV was saved for next processing:
Jan/09/2022 11:54:45 ipsec,debug,packet 0e2225a7 e5f27060 4cf68238 6184d5b3
Jan/09/2022 11:54:45 ipsec,debug,packet encryption(aes)
Jan/09/2022 11:54:45 ipsec,debug,packet with key:
Jan/09/2022 11:54:45 ipsec,debug,packet 925ffa84 dc60ed1c df18bbfd 052c9532
Jan/09/2022 11:54:45 ipsec,debug,packet decrypted payload by IV:
Jan/09/2022 11:54:45 ipsec,debug,packet 28b2f3d8 2480e1e8 cfd94904 bee1927e
Jan/09/2022 11:54:45 ipsec,debug,packet decrypted payload, but not trimed.
Jan/09/2022 11:54:45 ipsec,debug,packet 0b000018 c204c155 3c9f6b36 2ccf5c6e 6cee972c bc56480f 00000020 00000001
Jan/09/2022 11:54:45 ipsec,debug,packet 01108d29 e544d4cf 83801af4 7a523bed 653882b9 00000be7 00000000 00000000
Jan/09/2022 11:54:45 ipsec,debug,packet padding len=1
Jan/09/2022 11:54:45 ipsec,debug,packet skip to trim padding.
Jan/09/2022 11:54:45 ipsec,debug,packet decrypted.
Jan/09/2022 11:54:45 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 08100501 484b5201 0000005c 0b000018
Jan/09/2022 11:54:45 ipsec,debug,packet c204c155 3c9f6b36 2ccf5c6e 6cee972c bc56480f 00000020 00000001 01108d29
Jan/09/2022 11:54:45 ipsec,debug,packet e544d4cf 83801af4 7a523bed 653882b9 00000be7 00000000 00000000
Jan/09/2022 11:54:45 ipsec,debug,packet HASH with:
Jan/09/2022 11:54:45 ipsec,debug,packet 484b5201 00000020 00000001 01108d29 e544d4cf 83801af4 7a523bed 653882b9
Jan/09/2022 11:54:45 ipsec,debug,packet 00000be7
Jan/09/2022 11:54:45 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 11:54:45 ipsec,debug,packet HASH computed:
Jan/09/2022 11:54:45 ipsec,debug,packet c204c155 3c9f6b36 2ccf5c6e 6cee972c bc56480f
Jan/09/2022 11:54:45 ipsec,debug hash validated.
Jan/09/2022 11:54:45 ipsec,debug begin.
Jan/09/2022 11:54:45 ipsec,debug seen nptype=8(hash) len=24
Jan/09/2022 11:54:45 ipsec,debug seen nptype=11(notify) len=32
Jan/09/2022 11:54:45 ipsec,debug succeed.
Jan/09/2022 11:54:45 ipsec,debug 3.226.95.68 notify: R_U_THERE_ACK
Jan/09/2022 11:54:45 ipsec,debug 3.226.95.68 DPD R-U-There-Ack received
Jan/09/2022 11:54:45 ipsec,debug received an R-U-THERE-ACK

 
Sob
Forum Guru
Forum Guru
Posts: 9188
Joined: Mon Apr 20, 2009 9:11 pm

Re: Site-To-Site VPN AWS problem

Sun Jan 09, 2022 2:27 pm

You missed a bit:
d. Exchange Mode: IKE2
So:
/ip ipsec peer
add ... exchange-mode=ike2
 
User avatar
sindy
Forum Guru
Forum Guru
Posts: 11126
Joined: Mon Dec 04, 2017 9:19 pm

Re: Site-To-Site VPN AWS problem

Sun Jan 09, 2022 2:30 pm

Out of all your policies, you need to enable all the ones in green, and disable all the ones in red. The order is correct (here, it only matters that the last one was last).

/ip ipsec policy
add action=none disabled=yes dst-address=172.16.96.0/19 src-address=0.0.0.0/0
add action=none disabled=yes dst-address=164.52.192.253/32 src-address=0.0.0.0/0
add action=none disabled=yes dst-address=0.0.0.0/0 src-address=164.52.192.253/32
add action=none disabled=yes dst-address=0.0.0.0/0 src-address=172.16.96.0/19
add dst-address=169.254.128.216/30 peer=AWS src-address=169.254.128.218/32 tunnel=yes
add dst-address=172.31.0.0/16 peer=AWS proposal=awsproposal src-address=172.16.96.0/19 tunnel=yes

add disabled=yes dst-address=0.0.0.0/0 peer=AWS proposal=awsproposal src-address=0.0.0.0/0 tunnel=yes
 
mankomal
Member Candidate
Member Candidate
Topic Author
Posts: 106
Joined: Fri Nov 24, 2006 8:56 am

Re: Site-To-Site VPN AWS problem

Sun Jan 09, 2022 3:29 pm

You missed a bit:
d. Exchange Mode: IKE2
So:
/ip ipsec peer
add ... exchange-mode=ike2

Using IKEv1, IKEv2 is not working out don't know why will be testing once this setup works
 
mankomal
Member Candidate
Member Candidate
Topic Author
Posts: 106
Joined: Fri Nov 24, 2006 8:56 am

Re: Site-To-Site VPN AWS problem

Sun Jan 09, 2022 3:38 pm

Out of all your policies, you need to enable all the ones in green, and disable all the ones in red. The order is correct (here, it only matters that the last one was last).

/ip ipsec policy
add action=none disabled=yes dst-address=172.16.96.0/19 src-address=0.0.0.0/0
add action=none disabled=yes dst-address=164.52.192.253/32 src-address=0.0.0.0/0
add action=none disabled=yes dst-address=0.0.0.0/0 src-address=164.52.192.253/32
add action=none disabled=yes dst-address=0.0.0.0/0 src-address=172.16.96.0/19
add dst-address=169.254.128.216/30 peer=AWS src-address=169.254.128.218/32 tunnel=yes
add dst-address=172.31.0.0/16 peer=AWS proposal=awsproposal src-address=172.16.96.0/19 tunnel=yes

add disabled=yes dst-address=0.0.0.0/0 peer=AWS proposal=awsproposal src-address=0.0.0.0/0 tunnel=yes
This does not work
But this works:
/ip ipsec policy
add dst-address=169.254.128.216/30 peer=AWS src-address=169.254.128.218/32 tunnel=yes
add dst-address=172.31.0.0/16 peer=AWS proposal=awsproposal src-address=172.16.96.0/19 tunnel=yes


LOG of fail:
Jan/09/2022 13:09:08 ipsec,debug ===
Jan/09/2022 13:09:08 ipsec,info initiate new phase 1 (Identity Protection): 164.52.192.253[500]<=>3.226.95.68[500]
Jan/09/2022 13:09:08 ipsec,debug new cookie:
Jan/09/2022 13:09:08 ipsec,debug 9d7e4e14c9051c95
Jan/09/2022 13:09:08 ipsec,debug add payload of len 52, next type 13
Jan/09/2022 13:09:08 ipsec,debug add payload of len 16, next type 13
Jan/09/2022 13:09:08 ipsec,debug add payload of len 16, next type 0
Jan/09/2022 13:09:08 ipsec,debug 124 bytes from 164.52.192.253[500] to 3.226.95.68[500]
Jan/09/2022 13:09:08 ipsec,debug 1 times of 124 bytes message will be sent to 3.226.95.68[500]
Jan/09/2022 13:09:08 ipsec,debug,packet 9d7e4e14 c9051c95 00000000 00000000 01100200 00000000 0000007c 0d000038
Jan/09/2022 13:09:08 ipsec,debug,packet 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c7080
Jan/09/2022 13:09:08 ipsec,debug,packet 80010007 800e0080 80030001 80020002 80040002 0d000014 12f5f28c 457168a9
Jan/09/2022 13:09:08 ipsec,debug,packet 702d9fe2 74cc0100 00000014 afcad713 68a1f1c9 6b8696fc 77570100
Jan/09/2022 13:09:08 ipsec sent phase1 packet 164.52.192.253[500]<=>3.226.95.68[500] 9d7e4e14c9051c95:0000000000000000
Jan/09/2022 13:09:08 ipsec,debug ===== received 104 bytes from 3.226.95.68[500] to 164.52.192.253[500]
Jan/09/2022 13:09:08 ipsec,debug,packet 9d7e4e14 c9051c95 8e3100d9 54d41224 01100200 00000000 00000068 0d000038
Jan/09/2022 13:09:08 ipsec,debug,packet 00000001 00000001 0000002c 01010001 00000024 01010000 80010007 800e0080
Jan/09/2022 13:09:08 ipsec,debug,packet 80020002 80040002 80030001 800b0001 800c7080 00000014 afcad713 68a1f1c9
Jan/09/2022 13:09:08 ipsec,debug,packet 6b8696fc 77570100
Jan/09/2022 13:09:08 ipsec,debug begin.
Jan/09/2022 13:09:08 ipsec,debug seen nptype=1(sa) len=56
Jan/09/2022 13:09:08 ipsec,debug seen nptype=13(vid) len=20
Jan/09/2022 13:09:08 ipsec,debug succeed.
Jan/09/2022 13:09:08 ipsec received Vendor ID: DPD
Jan/09/2022 13:09:08 ipsec,debug remote supports DPD
Jan/09/2022 13:09:08 ipsec,debug total SA len=52
Jan/09/2022 13:09:08 ipsec,debug 00000001 00000001 0000002c 01010001 00000024 01010000 80010007 800e0080
Jan/09/2022 13:09:08 ipsec,debug 80020002 80040002 80030001 800b0001 800c7080
Jan/09/2022 13:09:08 ipsec,debug begin.
Jan/09/2022 13:09:08 ipsec,debug seen nptype=2(prop) len=44
Jan/09/2022 13:09:08 ipsec,debug succeed.
Jan/09/2022 13:09:08 ipsec,debug proposal #1 len=44
Jan/09/2022 13:09:08 ipsec,debug begin.
Jan/09/2022 13:09:08 ipsec,debug seen nptype=3(trns) len=36
Jan/09/2022 13:09:08 ipsec,debug succeed.
Jan/09/2022 13:09:08 ipsec,debug transform #1 len=36
Jan/09/2022 13:09:08 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
Jan/09/2022 13:09:08 ipsec,debug,packet encryption(aes)
Jan/09/2022 13:09:08 ipsec,debug type=Key Length, flag=0x8000, lorv=128
Jan/09/2022 13:09:08 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
Jan/09/2022 13:09:08 ipsec,debug hash(sha1)
Jan/09/2022 13:09:08 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
Jan/09/2022 13:09:08 ipsec,debug dh(modp1024)
Jan/09/2022 13:09:08 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
Jan/09/2022 13:09:08 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
Jan/09/2022 13:09:08 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800
Jan/09/2022 13:09:08 ipsec,debug pair 1:
Jan/09/2022 13:09:08 ipsec,debug  0x80cf280: next=(nil) tnext=(nil)
Jan/09/2022 13:09:08 ipsec,debug proposal #1: 1 transform
Jan/09/2022 13:09:08 ipsec,debug -checking with pre-shared key auth-
Jan/09/2022 13:09:08 ipsec,debug prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1
Jan/09/2022 13:09:08 ipsec,debug trns#=1, trns-id=IKE
Jan/09/2022 13:09:08 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
Jan/09/2022 13:09:08 ipsec,debug type=Key Length, flag=0x8000, lorv=128
Jan/09/2022 13:09:08 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
Jan/09/2022 13:09:08 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
Jan/09/2022 13:09:08 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
Jan/09/2022 13:09:08 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
Jan/09/2022 13:09:08 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800
Jan/09/2022 13:09:08 ipsec,debug -compare proposal #1: Local:Peer
Jan/09/2022 13:09:08 ipsec,debug (lifetime = 28800:28800)
Jan/09/2022 13:09:08 ipsec,debug (lifebyte = 0:0)
Jan/09/2022 13:09:08 ipsec,debug enctype = AES-CBC:AES-CBC
Jan/09/2022 13:09:08 ipsec,debug (encklen = 128:128)
Jan/09/2022 13:09:08 ipsec,debug hashtype = SHA:SHA
Jan/09/2022 13:09:08 ipsec,debug authmethod = pre-shared key:pre-shared key
Jan/09/2022 13:09:08 ipsec,debug dh_group = 1024-bit MODP group:1024-bit MODP group
Jan/09/2022 13:09:08 ipsec,debug -an acceptable proposal found-
Jan/09/2022 13:09:08 ipsec,debug dh(modp1024)
Jan/09/2022 13:09:08 ipsec,debug -agreed on pre-shared key auth-
Jan/09/2022 13:09:08 ipsec,debug ===
Jan/09/2022 13:09:08 ipsec,debug dh(modp1024)
Jan/09/2022 13:09:08 ipsec,debug,packet compute DH's private.
Jan/09/2022 13:09:08 ipsec,debug,packet 763827db c634dd91 3d9d1312 44e1e83a 22c1d85f 024edcb0 c1a25f00 0f2499cf
Jan/09/2022 13:09:08 ipsec,debug,packet 753d58ef 8a27dc7c 7a98f4b0 9b0e387f 6a3560f4 8381597d a026600d c728443a
Jan/09/2022 13:09:08 ipsec,debug,packet d2afe292 3c67abc5 43178bb6 d69abcc1 bb3282e4 fe937334 977168fd ce1fec16
Jan/09/2022 13:09:08 ipsec,debug,packet ed8f3868 0e5d71cb 3b7114b8 5784b9c0 7afaedd6 0d26d6c7 3b66f7bd 59d9f60e
Jan/09/2022 13:09:08 ipsec,debug,packet compute DH's public.
Jan/09/2022 13:09:08 ipsec,debug,packet 63e1a48c 4b7fc966 ce83c5f8 69d2ffdd a58dd39f db050094 80a54f0f 98ef39f2
Jan/09/2022 13:09:08 ipsec,debug,packet b6485613 060fd712 f9d4b263 51a70e73 d056985e c2589766 05f62c3a 41ed8e77
Jan/09/2022 13:09:08 ipsec,debug,packet b68ec562 ad786919 26280450 153b2393 fe3b7325 d49f8693 7d7b4298 87689f81
Jan/09/2022 13:09:08 ipsec,debug,packet 44f934f5 ec47f3ea 70edbfa7 b44927e9 e7fb5d2a 0d9a70b5 ac1a58a7 fb6dd8ae
Jan/09/2022 13:09:08 ipsec,debug add payload of len 128, next type 10
Jan/09/2022 13:09:08 ipsec,debug add payload of len 24, next type 0
Jan/09/2022 13:09:08 ipsec,debug 188 bytes from 164.52.192.253[500] to 3.226.95.68[500]
Jan/09/2022 13:09:08 ipsec,debug 1 times of 188 bytes message will be sent to 3.226.95.68[500]
Jan/09/2022 13:09:08 ipsec,debug,packet 9d7e4e14 c9051c95 8e3100d9 54d41224 04100200 00000000 000000bc 0a000084
Jan/09/2022 13:09:08 ipsec,debug,packet 63e1a48c 4b7fc966 ce83c5f8 69d2ffdd a58dd39f db050094 80a54f0f 98ef39f2
Jan/09/2022 13:09:08 ipsec,debug,packet b6485613 060fd712 f9d4b263 51a70e73 d056985e c2589766 05f62c3a 41ed8e77
Jan/09/2022 13:09:08 ipsec,debug,packet b68ec562 ad786919 26280450 153b2393 fe3b7325 d49f8693 7d7b4298 87689f81
Jan/09/2022 13:09:08 ipsec,debug,packet 44f934f5 ec47f3ea 70edbfa7 b44927e9 e7fb5d2a 0d9a70b5 ac1a58a7 fb6dd8ae
Jan/09/2022 13:09:08 ipsec,debug,packet 0000001c 8f194492 e24a3f75 3ed3661a 92cf8373 877bfcb9 ed9e3d48
Jan/09/2022 13:09:08 ipsec sent phase1 packet 164.52.192.253[500]<=>3.226.95.68[500] 9d7e4e14c9051c95:8e3100d954d41224
Jan/09/2022 13:09:08 ipsec,debug ===== received 196 bytes from 3.226.95.68[500] to 164.52.192.253[500]
Jan/09/2022 13:09:08 ipsec,debug,packet 9d7e4e14 c9051c95 8e3100d9 54d41224 04100200 00000000 000000c4 0a000084
Jan/09/2022 13:09:08 ipsec,debug,packet 772793c1 244d0a8d 30b8c0ef 8a607f26 5738de82 2766e147 60927140 2d8b5fd4
Jan/09/2022 13:09:08 ipsec,debug,packet ab4015b5 7d8e54c9 60803c60 ddaeea47 c4d00a99 b76048b7 664a7e15 4c49c16c
Jan/09/2022 13:09:08 ipsec,debug,packet 2a39d808 3b3bded8 7bc797ca 964af05c 1c82060a e5c5b447 f402ee24 01f13078
Jan/09/2022 13:09:08 ipsec,debug,packet 1da95824 730f2ea5 25643b2d 5f197c06 d6ba2c07 0caeecd8 cbfaefee ade2d526
Jan/09/2022 13:09:08 ipsec,debug,packet 00000024 b8f5f0cb 85bed21b f767d913 c6ae5e5a beb6a5df a8ae8bc7 48b70168
Jan/09/2022 13:09:08 ipsec,debug,packet 2ea6d561
Jan/09/2022 13:09:08 ipsec,debug begin.
Jan/09/2022 13:09:08 ipsec,debug seen nptype=4(ke) len=132
Jan/09/2022 13:09:08 ipsec,debug seen nptype=10(nonce) len=36
Jan/09/2022 13:09:08 ipsec,debug succeed.
Jan/09/2022 13:09:08 ipsec,debug ===
Jan/09/2022 13:09:08 ipsec,debug dh(modp1024)
Jan/09/2022 13:09:08 ipsec,debug,packet compute DH's shared.
Jan/09/2022 13:09:08 ipsec,debug,packet 
Jan/09/2022 13:09:08 ipsec,debug,packet cf6afb1e 869a381a ecb845c0 ad97da9f e16fe630 6c1f97d6 2cc25889 7a972c9a
Jan/09/2022 13:09:08 ipsec,debug,packet f8f9e5b0 66c9b225 87b17558 f938c181 92f44b3a 518aacc2 a5a946f0 aab04689
Jan/09/2022 13:09:08 ipsec,debug,packet 7574e3fd 1c395eaf dd5a93e2 afbbeef3 3e4e1b81 983e994c f39ed619 6a677fc2
Jan/09/2022 13:09:08 ipsec,debug,packet 617efdec 6e21c158 6d129b47 cd2ad397 309065c6 d069a930 36555e01 d16edca8
Jan/09/2022 13:09:08 ipsec,debug nonce 1: 
Jan/09/2022 13:09:08 ipsec,debug 8f194492 e24a3f75 3ed3661a 92cf8373 877bfcb9 ed9e3d48
Jan/09/2022 13:09:08 ipsec,debug nonce 2: 
Jan/09/2022 13:09:08 ipsec,debug b8f5f0cb 85bed21b f767d913 c6ae5e5a beb6a5df a8ae8bc7 48b70168 2ea6d561
Jan/09/2022 13:09:08 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 13:09:08 ipsec,debug SKEYID computed:
Jan/09/2022 13:09:08 ipsec,debug 94647f6f 9decbb82 c6f81081 40633c9a 40c3241b
Jan/09/2022 13:09:08 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 13:09:08 ipsec,debug SKEYID_d computed:
Jan/09/2022 13:09:08 ipsec,debug 6663e350 c35cde6a f67e822b 8e7e167c 6f1205ec
Jan/09/2022 13:09:08 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 13:09:08 ipsec,debug SKEYID_a computed:
Jan/09/2022 13:09:08 ipsec,debug 7584ab38 65400458 5b15dedb 424528bd b0810e07
Jan/09/2022 13:09:08 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 13:09:08 ipsec,debug SKEYID_e computed:
Jan/09/2022 13:09:08 ipsec,debug 11c4a816 d5022947 74324bed 77d64f8a 95d32075
Jan/09/2022 13:09:08 ipsec,debug,packet encryption(aes)
Jan/09/2022 13:09:08 ipsec,debug hash(sha1)
Jan/09/2022 13:09:08 ipsec,debug final encryption key computed:
Jan/09/2022 13:09:08 ipsec,debug 11c4a816 d5022947 74324bed 77d64f8a
Jan/09/2022 13:09:08 ipsec,debug hash(sha1)
Jan/09/2022 13:09:08 ipsec,debug,packet encryption(aes)
Jan/09/2022 13:09:08 ipsec,debug IV computed:
Jan/09/2022 13:09:08 ipsec,debug 711289c7 00585446 e6bbf3ec 4f7676a4
Jan/09/2022 13:09:08 ipsec,debug use ID type of IPv4_address
Jan/09/2022 13:09:08 ipsec,debug,packet HASH with:
Jan/09/2022 13:09:08 ipsec,debug,packet 63e1a48c 4b7fc966 ce83c5f8 69d2ffdd a58dd39f db050094 80a54f0f 98ef39f2
Jan/09/2022 13:09:08 ipsec,debug,packet b6485613 060fd712 f9d4b263 51a70e73 d056985e c2589766 05f62c3a 41ed8e77
Jan/09/2022 13:09:08 ipsec,debug,packet b68ec562 ad786919 26280450 153b2393 fe3b7325 d49f8693 7d7b4298 87689f81
Jan/09/2022 13:09:08 ipsec,debug,packet 44f934f5 ec47f3ea 70edbfa7 b44927e9 e7fb5d2a 0d9a70b5 ac1a58a7 fb6dd8ae
Jan/09/2022 13:09:08 ipsec,debug,packet 772793c1 244d0a8d 30b8c0ef 8a607f26 5738de82 2766e147 60927140 2d8b5fd4
Jan/09/2022 13:09:08 ipsec,debug,packet ab4015b5 7d8e54c9 60803c60 ddaeea47 c4d00a99 b76048b7 664a7e15 4c49c16c
Jan/09/2022 13:09:08 ipsec,debug,packet 2a39d808 3b3bded8 7bc797ca 964af05c 1c82060a e5c5b447 f402ee24 01f13078
Jan/09/2022 13:09:08 ipsec,debug,packet 1da95824 730f2ea5 25643b2d 5f197c06 d6ba2c07 0caeecd8 cbfaefee ade2d526
Jan/09/2022 13:09:08 ipsec,debug,packet 9d7e4e14 c9051c95 8e3100d9 54d41224 00000001 00000001 0000002c 01010001
Jan/09/2022 13:09:08 ipsec,debug,packet 00000024 01010000 800b0001 800c7080 80010007 800e0080 80030001 80020002
Jan/09/2022 13:09:08 ipsec,debug,packet 80040002 011101f4 a434c0fd
Jan/09/2022 13:09:08 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 13:09:08 ipsec,debug,packet HASH computed:
Jan/09/2022 13:09:08 ipsec,debug,packet 18803786 fc6884b3 61fe7c6b 9c475c95 a3dfa0e4
Jan/09/2022 13:09:08 ipsec,debug add payload of len 8, next type 8
Jan/09/2022 13:09:08 ipsec,debug add payload of len 20, next type 0
Jan/09/2022 13:09:08 ipsec,debug,packet begin encryption.
Jan/09/2022 13:09:08 ipsec,debug,packet encryption(aes)
Jan/09/2022 13:09:08 ipsec,debug,packet pad length = 12
Jan/09/2022 13:09:08 ipsec,debug,packet 0800000c 011101f4 a434c0fd 00000018 18803786 fc6884b3 61fe7c6b 9c475c95
Jan/09/2022 13:09:08 ipsec,debug,packet a3dfa0e4 a8aec6b7 e2dc8dac ebdcf50b
Jan/09/2022 13:09:08 ipsec,debug,packet encryption(aes)
Jan/09/2022 13:09:08 ipsec,debug,packet with key:
Jan/09/2022 13:09:08 ipsec,debug,packet 11c4a816 d5022947 74324bed 77d64f8a
Jan/09/2022 13:09:08 ipsec,debug,packet encrypted payload by IV:
Jan/09/2022 13:09:08 ipsec,debug,packet 711289c7 00585446 e6bbf3ec 4f7676a4
Jan/09/2022 13:09:08 ipsec,debug,packet save IV for next:
Jan/09/2022 13:09:08 ipsec,debug,packet 6fb0b4e0 d4169565 a5effea7 b3b46584
Jan/09/2022 13:09:08 ipsec,debug,packet encrypted.
Jan/09/2022 13:09:08 ipsec,debug 76 bytes from 164.52.192.253[500] to 3.226.95.68[500]
Jan/09/2022 13:09:08 ipsec,debug 1 times of 76 bytes message will be sent to 3.226.95.68[500]
Jan/09/2022 13:09:08 ipsec,debug,packet 9d7e4e14 c9051c95 8e3100d9 54d41224 05100201 00000000 0000004c eec8831d
Jan/09/2022 13:09:08 ipsec,debug,packet 20c4d703 f0b9cd73 85d7acbe c3acb61f 46d1d4dc d205e41b d4356040 6fb0b4e0
Jan/09/2022 13:09:08 ipsec,debug,packet d4169565 a5effea7 b3b46584
Jan/09/2022 13:09:08 ipsec sent phase1 packet 164.52.192.253[500]<=>3.226.95.68[500] 9d7e4e14c9051c95:8e3100d954d41224
Jan/09/2022 13:09:08 ipsec,debug ===== received 76 bytes from 3.226.95.68[500] to 164.52.192.253[500]
Jan/09/2022 13:09:08 ipsec,debug,packet 9d7e4e14 c9051c95 8e3100d9 54d41224 05100201 00000000 0000004c 51f406e8
Jan/09/2022 13:09:08 ipsec,debug,packet fbbec8e4 5e965d9e ac49832c d2c29b24 19a55431 0c19221e 698da9e5 e815c820
Jan/09/2022 13:09:08 ipsec,debug,packet c7a8e91c 6b1df911 ef083099
Jan/09/2022 13:09:08 ipsec,debug,packet encryption(aes)
Jan/09/2022 13:09:08 ipsec,debug,packet IV was saved for next processing:
Jan/09/2022 13:09:08 ipsec,debug,packet e815c820 c7a8e91c 6b1df911 ef083099
Jan/09/2022 13:09:08 ipsec,debug,packet encryption(aes)
Jan/09/2022 13:09:08 ipsec,debug,packet with key:
Jan/09/2022 13:09:08 ipsec,debug,packet 11c4a816 d5022947 74324bed 77d64f8a
Jan/09/2022 13:09:08 ipsec,debug,packet decrypted payload by IV:
Jan/09/2022 13:09:08 ipsec,debug,packet 6fb0b4e0 d4169565 a5effea7 b3b46584
Jan/09/2022 13:09:08 ipsec,debug,packet decrypted payload, but not trimed.
Jan/09/2022 13:09:08 ipsec,debug,packet 0800000c 01000000 03e25f44 00000018 38db8d9d cbffb108 b68fbefc af790fcd
Jan/09/2022 13:09:08 ipsec,debug,packet aab5a8cc 00000000 00000000 00000000
Jan/09/2022 13:09:08 ipsec,debug,packet padding len=1
Jan/09/2022 13:09:08 ipsec,debug,packet skip to trim padding.
Jan/09/2022 13:09:08 ipsec,debug,packet decrypted.
Jan/09/2022 13:09:08 ipsec,debug,packet 9d7e4e14 c9051c95 8e3100d9 54d41224 05100201 00000000 0000004c 0800000c
Jan/09/2022 13:09:08 ipsec,debug,packet 01000000 03e25f44 00000018 38db8d9d cbffb108 b68fbefc af790fcd aab5a8cc
Jan/09/2022 13:09:08 ipsec,debug,packet 00000000 00000000 00000000
Jan/09/2022 13:09:08 ipsec,debug begin.
Jan/09/2022 13:09:08 ipsec,debug seen nptype=5(id) len=12
Jan/09/2022 13:09:08 ipsec,debug seen nptype=8(hash) len=24
Jan/09/2022 13:09:08 ipsec,debug succeed.
Jan/09/2022 13:09:08 ipsec,debug HASH received:
Jan/09/2022 13:09:08 ipsec,debug 38db8d9d cbffb108 b68fbefc af790fcd aab5a8cc
Jan/09/2022 13:09:08 ipsec,debug,packet HASH with:
Jan/09/2022 13:09:08 ipsec,debug,packet 772793c1 244d0a8d 30b8c0ef 8a607f26 5738de82 2766e147 60927140 2d8b5fd4
Jan/09/2022 13:09:08 ipsec,debug,packet ab4015b5 7d8e54c9 60803c60 ddaeea47 c4d00a99 b76048b7 664a7e15 4c49c16c
Jan/09/2022 13:09:08 ipsec,debug,packet 2a39d808 3b3bded8 7bc797ca 964af05c 1c82060a e5c5b447 f402ee24 01f13078
Jan/09/2022 13:09:08 ipsec,debug,packet 1da95824 730f2ea5 25643b2d 5f197c06 d6ba2c07 0caeecd8 cbfaefee ade2d526
Jan/09/2022 13:09:08 ipsec,debug,packet 63e1a48c 4b7fc966 ce83c5f8 69d2ffdd a58dd39f db050094 80a54f0f 98ef39f2
Jan/09/2022 13:09:08 ipsec,debug,packet b6485613 060fd712 f9d4b263 51a70e73 d056985e c2589766 05f62c3a 41ed8e77
Jan/09/2022 13:09:08 ipsec,debug,packet b68ec562 ad786919 26280450 153b2393 fe3b7325 d49f8693 7d7b4298 87689f81
Jan/09/2022 13:09:08 ipsec,debug,packet 44f934f5 ec47f3ea 70edbfa7 b44927e9 e7fb5d2a 0d9a70b5 ac1a58a7 fb6dd8ae
Jan/09/2022 13:09:08 ipsec,debug,packet 8e3100d9 54d41224 9d7e4e14 c9051c95 00000001 00000001 0000002c 01010001
Jan/09/2022 13:09:08 ipsec,debug,packet 00000024 01010000 800b0001 800c7080 80010007 800e0080 80030001 80020002
Jan/09/2022 13:09:08 ipsec,debug,packet 80040002 01000000 03e25f44
Jan/09/2022 13:09:08 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 13:09:08 ipsec,debug,packet HASH computed:
Jan/09/2022 13:09:08 ipsec,debug,packet 38db8d9d cbffb108 b68fbefc af790fcd aab5a8cc
Jan/09/2022 13:09:08 ipsec,debug HASH for PSK validated.
Jan/09/2022 13:09:08 ipsec,debug 3.226.95.68 peer's ID:
Jan/09/2022 13:09:08 ipsec,debug 01000000 03e25f44
Jan/09/2022 13:09:08 ipsec,debug ===
Jan/09/2022 13:09:08 ipsec ph2 possible after ph1 creation
Jan/09/2022 13:09:08 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=0:0)
Jan/09/2022 13:09:08 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
Jan/09/2022 13:09:08 ipsec,debug begin QUICK mode.
Jan/09/2022 13:09:08 ipsec,debug ===
Jan/09/2022 13:09:08 ipsec,debug begin QUICK mode.
Jan/09/2022 13:09:08 ipsec initiate new phase 2 negotiation: 164.52.192.253[500]<=>3.226.95.68[500]
Jan/09/2022 13:09:08 ipsec,debug,packet compute IV for phase2
Jan/09/2022 13:09:08 ipsec,debug,packet phase1 last IV:
Jan/09/2022 13:09:08 ipsec,debug,packet e815c820 c7a8e91c 6b1df911 ef083099 a73e8dbb
Jan/09/2022 13:09:08 ipsec,debug hash(sha1)
Jan/09/2022 13:09:08 ipsec,debug,packet encryption(aes)
Jan/09/2022 13:09:08 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 13:09:08 ipsec,debug,packet c2c0ae93 0785d025 d9b14351 571e1397
Jan/09/2022 13:09:08 ipsec,debug call pfkey_send_getspi 8
Jan/09/2022 13:09:08 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 3.226.95.68[500]->164.52.192.253[500] 
Jan/09/2022 13:09:08 ipsec,debug pfkey getspi sent.
Jan/09/2022 13:09:08 ipsec,info ISAKMP-SA established 164.52.192.253[500]-3.226.95.68[500] spi:9d7e4e14c9051c95:8e3100d954d41224
Jan/09/2022 13:09:08 ipsec,debug ===
Jan/09/2022 13:09:08 ipsec,debug dh(modp1024)
Jan/09/2022 13:09:08 ipsec,debug dh(modp1024)
Jan/09/2022 13:09:08 ipsec,debug dh(modp1024)
Jan/09/2022 13:09:08 ipsec,debug,packet compute DH's private.
Jan/09/2022 13:09:08 ipsec,debug,packet 5ccf9c24 58d8a8e5 0e7a90e2 037cafcb 416e291b 47fb0838 1e346cb5 e03326f3
Jan/09/2022 13:09:08 ipsec,debug,packet 7343b32b e73954c3 dea1dfa2 49329ff9 ef3d46f4 0667a3dd 0ed1aace 43da3b25
Jan/09/2022 13:09:08 ipsec,debug,packet 3768a7cc c6e42c75 36e54198 be203d36 5255485d 3b27b65d f5e15ef9 dd08d93b
Jan/09/2022 13:09:08 ipsec,debug,packet 439e73b6 4fcfd57e 471e8458 cf0b8b46 2176a8dc a786b5dd 9650f93a 9254d6ac
Jan/09/2022 13:09:08 ipsec,debug,packet compute DH's public.
Jan/09/2022 13:09:08 ipsec,debug,packet 517664ad 8e04fcda 1f68d46a 0738e8cc 594c7ac8 24c45a37 83daaac5 f2dee427
Jan/09/2022 13:09:08 ipsec,debug,packet 6fc49268 1ec5bb08 c8d4d1f4 9f155944 04e063fe 89db5a9d 1b6fbb2a 70820de3
Jan/09/2022 13:09:08 ipsec,debug,packet 237ace42 abe35ea8 049fbf1e dcac56ec 72608216 114f8128 cc3371eb 5cbe2241
Jan/09/2022 13:09:08 ipsec,debug,packet a3611bd3 d8eaa491 f4af8ae1 de8b8b7d 7c769c7e d82a80b4 039a8b3b 95967403
Jan/09/2022 13:09:08 ipsec,debug use local ID type IPv4_subnet
Jan/09/2022 13:09:08 ipsec,debug use remote ID type IPv4_subnet
Jan/09/2022 13:09:08 ipsec,debug IDci:
Jan/09/2022 13:09:08 ipsec,debug 04000000 00000000 00000000
Jan/09/2022 13:09:08 ipsec,debug IDcr:
Jan/09/2022 13:09:08 ipsec,debug 04000000 00000000 00000000
Jan/09/2022 13:09:08 ipsec,debug add payload of len 52, next type 10
Jan/09/2022 13:09:08 ipsec,debug add payload of len 24, next type 4
Jan/09/2022 13:09:08 ipsec,debug add payload of len 128, next type 5
Jan/09/2022 13:09:08 ipsec,debug add payload of len 12, next type 5
Jan/09/2022 13:09:08 ipsec,debug add payload of len 12, next type 0
Jan/09/2022 13:09:08 ipsec,debug,packet HASH with:
Jan/09/2022 13:09:08 ipsec,debug,packet a73e8dbb 0a000038 00000001 00000001 0000002c 01030401 036004f5 00000020
Jan/09/2022 13:09:08 ipsec,debug,packet 010c0000 80010001 80020e10 80040001 80060080 80050002 80030002 0400001c
Jan/09/2022 13:09:08 ipsec,debug,packet aca951c7 fdac4329 9fc16c7f 1ae59bf4 9bf97e12 e4979573 05000084 517664ad
Jan/09/2022 13:09:08 ipsec,debug,packet 8e04fcda 1f68d46a 0738e8cc 594c7ac8 24c45a37 83daaac5 f2dee427 6fc49268
Jan/09/2022 13:09:08 ipsec,debug,packet 1ec5bb08 c8d4d1f4 9f155944 04e063fe 89db5a9d 1b6fbb2a 70820de3 237ace42
Jan/09/2022 13:09:08 ipsec,debug,packet abe35ea8 049fbf1e dcac56ec 72608216 114f8128 cc3371eb 5cbe2241 a3611bd3
Jan/09/2022 13:09:08 ipsec,debug,packet d8eaa491 f4af8ae1 de8b8b7d 7c769c7e d82a80b4 039a8b3b 95967403 05000010
Jan/09/2022 13:09:08 ipsec,debug,packet 04000000 00000000 00000000 00000010 04000000 00000000 00000000
Jan/09/2022 13:09:08 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 13:09:08 ipsec,debug,packet HASH computed:
Jan/09/2022 13:09:08 ipsec,debug,packet 1aca0b7a 987783c4 5637eae5 0a8f5595 80b90fdf
Jan/09/2022 13:09:08 ipsec,debug add payload of len 20, next type 1
Jan/09/2022 13:09:08 ipsec,debug,packet begin encryption.
Jan/09/2022 13:09:08 ipsec,debug,packet encryption(aes)
Jan/09/2022 13:09:08 ipsec,debug,packet pad length = 16
Jan/09/2022 13:09:08 ipsec,debug,packet 01000018 1aca0b7a 987783c4 5637eae5 0a8f5595 80b90fdf 0a000038 00000001
Jan/09/2022 13:09:08 ipsec,debug,packet 00000001 0000002c 01030401 036004f5 00000020 010c0000 80010001 80020e10
Jan/09/2022 13:09:08 ipsec,debug,packet 80040001 80060080 80050002 80030002 0400001c aca951c7 fdac4329 9fc16c7f
Jan/09/2022 13:09:08 ipsec,debug,packet 1ae59bf4 9bf97e12 e4979573 05000084 517664ad 8e04fcda 1f68d46a 0738e8cc
Jan/09/2022 13:09:08 ipsec,debug,packet 594c7ac8 24c45a37 83daaac5 f2dee427 6fc49268 1ec5bb08 c8d4d1f4 9f155944
Jan/09/2022 13:09:08 ipsec,debug,packet 04e063fe 89db5a9d 1b6fbb2a 70820de3 237ace42 abe35ea8 049fbf1e dcac56ec
Jan/09/2022 13:09:08 ipsec,debug,packet 72608216 114f8128 cc3371eb 5cbe2241 a3611bd3 d8eaa491 f4af8ae1 de8b8b7d
Jan/09/2022 13:09:08 ipsec,debug,packet 7c769c7e d82a80b4 039a8b3b 95967403 05000010 04000000 00000000 00000000
Jan/09/2022 13:09:08 ipsec,debug,packet 00000010 04000000 00000000 00000000 eac0f2c9 8197e29c c4fe8bad b6dba80f
Jan/09/2022 13:09:08 ipsec,debug,packet encryption(aes)
Jan/09/2022 13:09:08 ipsec,debug,packet with key:
Jan/09/2022 13:09:08 ipsec,debug,packet 11c4a816 d5022947 74324bed 77d64f8a
Jan/09/2022 13:09:08 ipsec,debug,packet encrypted payload by IV:
Jan/09/2022 13:09:08 ipsec,debug,packet c2c0ae93 0785d025 d9b14351 571e1397
Jan/09/2022 13:09:08 ipsec,debug,packet save IV for next:
Jan/09/2022 13:09:08 ipsec,debug,packet fcfa34e6 13ec1a5e 1852212d 33a8b0a4
Jan/09/2022 13:09:08 ipsec,debug,packet encrypted.
Jan/09/2022 13:09:08 ipsec,debug 316 bytes from 164.52.192.253[500] to 3.226.95.68[500]
Jan/09/2022 13:09:08 ipsec,debug 1 times of 316 bytes message will be sent to 3.226.95.68[500]
Jan/09/2022 13:09:08 ipsec,debug,packet 9d7e4e14 c9051c95 8e3100d9 54d41224 08102001 a73e8dbb 0000013c 2f88a7d4
Jan/09/2022 13:09:08 ipsec,debug,packet 0c4b3e5e 0b05a0ab c0712ea5 c688d94a ae0e4ca0 96b492cb 0680644f 54edd0bf
Jan/09/2022 13:09:08 ipsec,debug,packet 0d9758ca 587485b5 a7dfdd51 e878ca75 325f9a30 770a0fd3 62a25cdf 2c60ef48
Jan/09/2022 13:09:08 ipsec,debug,packet ac7c4010 d8698c1e f6b665e8 184e65f3 69885b60 aa8459bb cf2b9cf9 67638e3b
Jan/09/2022 13:09:08 ipsec,debug,packet cef17809 343f32ea 38159e19 4907e378 0b2d905c 78aa354a 03869fd7 0d5a83ac
Jan/09/2022 13:09:08 ipsec,debug,packet 0f2a002b 746e135e b5038345 8a7c73a2 c8b2d393 c67b851e 24e70647 69565460
Jan/09/2022 13:09:08 ipsec,debug,packet e4a8a731 5803d896 0129927f 3a1fd147 997d766e 704565ac 4e938e00 99d4f78b
Jan/09/2022 13:09:08 ipsec,debug,packet 7a5cbc11 63e93c39 49cc4dcc 6d0d30d7 3e8bf018 434ed715 99e335ff 6473cae5
Jan/09/2022 13:09:08 ipsec,debug,packet a729a17e 7c297a8c 49593a8d 29b56681 6615e8e8 78a11aed 0210e83b 0b4e61c2
Jan/09/2022 13:09:08 ipsec,debug,packet ddab7614 cabf1503 6ca8ec02 fcfa34e6 13ec1a5e 1852212d 33a8b0a4
Jan/09/2022 13:09:08 ipsec sent phase2 packet 164.52.192.253[500]<=>3.226.95.68[500] 9d7e4e14c9051c95:8e3100d954d41224:0000a73e
Jan/09/2022 13:09:09 ipsec,debug ===== received 316 bytes from 3.226.95.68[500] to 164.52.192.253[500]
Jan/09/2022 13:09:09 ipsec,debug,packet 9d7e4e14 c9051c95 8e3100d9 54d41224 08102001 a73e8dbb 0000013c 72b5763d
Jan/09/2022 13:09:09 ipsec,debug,packet bb3f2c37 c67707f7 c7697888 ede45945 cf1d13bc e382bd1d 61d1afeb 4c129b82
Jan/09/2022 13:09:09 ipsec,debug,packet 7ea1b382 d1361a81 fd25553e 51441e68 f58f7364 0da43296 28ecee8e 9a1a27b5
Jan/09/2022 13:09:09 ipsec,debug,packet 57b70068 bebc41e4 405c6cf5 3d4f415e 6eca804e a9da356b 2e5f828d 9ac2044e
Jan/09/2022 13:09:09 ipsec,debug,packet fefd0a8a d51e70c1 8e088f7a ea359393 0445c6fe c4c68e4a a953e70a 71a4e3c0
Jan/09/2022 13:09:09 ipsec,debug,packet 2d50fa1b 56b5b1aa 0fd86529 e8578d83 c1be6563 95baabe1 f779a2a1 291fcf58
Jan/09/2022 13:09:09 ipsec,debug,packet 84413dfa 9164c43f 74898c9d d1cd59c0 2568f504 08bf9346 7792fe51 e6c1f548
Jan/09/2022 13:09:09 ipsec,debug,packet 191ca7e4 51d9e5b5 20ba44a3 06b3320c 29ebe6f6 f14e8f9d abb2305e 2979d521
Jan/09/2022 13:09:09 ipsec,debug,packet 08a95c41 45c068e7 0774d40a a8659102 9571b624 e768051a cc70e242 199f195c
Jan/09/2022 13:09:09 ipsec,debug,packet 3c09d5dd c08ab018 99936678 e58d553e 0b536535 0d329a88 06e0570d
Jan/09/2022 13:09:09 ipsec,debug,packet encryption(aes)
Jan/09/2022 13:09:09 ipsec,debug,packet IV was saved for next processing:
Jan/09/2022 13:09:09 ipsec,debug,packet e58d553e 0b536535 0d329a88 06e0570d
Jan/09/2022 13:09:09 ipsec,debug,packet encryption(aes)
Jan/09/2022 13:09:09 ipsec,debug,packet with key:
Jan/09/2022 13:09:09 ipsec,debug,packet 11c4a816 d5022947 74324bed 77d64f8a
Jan/09/2022 13:09:09 ipsec,debug,packet decrypted payload by IV:
Jan/09/2022 13:09:09 ipsec,debug,packet fcfa34e6 13ec1a5e 1852212d 33a8b0a4
Jan/09/2022 13:09:09 ipsec,debug,packet decrypted payload, but not trimed.
Jan/09/2022 13:09:09 ipsec,debug,packet 01000018 d1a3236e 1b1d6819 3f6eb30d be86a61c fa9a46c2 0a000038 00000001
Jan/09/2022 13:09:09 ipsec,debug,packet 00000001 0000002c 01030401 c9aa34e8 00000020 010c0000 80060080 80050002
Jan/09/2022 13:09:09 ipsec,debug,packet 80030002 80040001 80010001 80020e10 04000024 17545989 e56715b7 4ec60630
Jan/09/2022 13:09:09 ipsec,debug,packet 7b72c5b1 b040f4f7 036feaae 3bb8ba15 9961528d 05000084 11f73033 8c460b52
Jan/09/2022 13:09:09 ipsec,debug,packet a83a5f9d b533164f 14c901b3 938d5197 5b3c9f11 100b6c23 cd610784 8f1f4de0
Jan/09/2022 13:09:09 ipsec,debug,packet 8cfb9ce8 5cd21fad 67142722 3adf903f f125b0da 3b71a3ad 5beea7be f7f60e9b
Jan/09/2022 13:09:09 ipsec,debug,packet 054d5f4e 1c5a6628 94de1427 d723ed75 24b8c6d3 6e66eb0e cddf0f38 4dadd386
Jan/09/2022 13:09:09 ipsec,debug,packet fd727c85 f19272bc 6dda9430 95aa227e d4a0def1 6bbabd6b 05000010 04000000
Jan/09/2022 13:09:09 ipsec,debug,packet ac106000 ffffe000 00000010 04000000 ac1f0000 ffff0000 00000000 00000000
Jan/09/2022 13:09:09 ipsec,debug,packet padding len=1
Jan/09/2022 13:09:09 ipsec,debug,packet skip to trim padding.
Jan/09/2022 13:09:09 ipsec,debug,packet decrypted.
Jan/09/2022 13:09:09 ipsec,debug,packet 9d7e4e14 c9051c95 8e3100d9 54d41224 08102001 a73e8dbb 0000013c 01000018
Jan/09/2022 13:09:09 ipsec,debug,packet d1a3236e 1b1d6819 3f6eb30d be86a61c fa9a46c2 0a000038 00000001 00000001
Jan/09/2022 13:09:09 ipsec,debug,packet 0000002c 01030401 c9aa34e8 00000020 010c0000 80060080 80050002 80030002
Jan/09/2022 13:09:09 ipsec,debug,packet 80040001 80010001 80020e10 04000024 17545989 e56715b7 4ec60630 7b72c5b1
Jan/09/2022 13:09:09 ipsec,debug,packet b040f4f7 036feaae 3bb8ba15 9961528d 05000084 11f73033 8c460b52 a83a5f9d
Jan/09/2022 13:09:09 ipsec,debug,packet b533164f 14c901b3 938d5197 5b3c9f11 100b6c23 cd610784 8f1f4de0 8cfb9ce8
Jan/09/2022 13:09:09 ipsec,debug,packet 5cd21fad 67142722 3adf903f f125b0da 3b71a3ad 5beea7be f7f60e9b 054d5f4e
Jan/09/2022 13:09:09 ipsec,debug,packet 1c5a6628 94de1427 d723ed75 24b8c6d3 6e66eb0e cddf0f38 4dadd386 fd727c85
Jan/09/2022 13:09:09 ipsec,debug,packet f19272bc 6dda9430 95aa227e d4a0def1 6bbabd6b 05000010 04000000 ac106000
Jan/09/2022 13:09:09 ipsec,debug,packet ffffe000 00000010 04000000 ac1f0000 ffff0000 00000000 00000000
Jan/09/2022 13:09:09 ipsec,debug begin.
Jan/09/2022 13:09:09 ipsec,debug seen nptype=8(hash) len=24
Jan/09/2022 13:09:09 ipsec,debug seen nptype=1(sa) len=56
Jan/09/2022 13:09:09 ipsec,debug seen nptype=10(nonce) len=36
Jan/09/2022 13:09:09 ipsec,debug seen nptype=4(ke) len=132
Jan/09/2022 13:09:09 ipsec,debug seen nptype=5(id) len=16
Jan/09/2022 13:09:09 ipsec,debug seen nptype=5(id) len=16
Jan/09/2022 13:09:09 ipsec,debug succeed.
Jan/09/2022 13:09:09 ipsec,debug IDci prefix: 19/ulproto: 255 does not match proposal.
Jan/09/2022 13:09:09 ipsec,error 3.226.95.68 failed to pre-process ph2 packet.
Jan/09/2022 13:09:09 ipsec,debug,packet compute IV for phase2
Jan/09/2022 13:09:09 ipsec,debug,packet phase1 last IV:
Jan/09/2022 13:09:09 ipsec,debug,packet e815c820 c7a8e91c 6b1df911 ef083099 e0384469
Jan/09/2022 13:09:09 ipsec,debug hash(sha1)
Jan/09/2022 13:09:09 ipsec,debug,packet encryption(aes)
Jan/09/2022 13:09:09 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 13:09:09 ipsec,debug,packet f3bd8b64 09db7dd5 2cca78ad 3d94519d
Jan/09/2022 13:09:09 ipsec,debug,packet HASH with:
Jan/09/2022 13:09:09 ipsec,debug,packet e0384469 0000000c 00000001 0100000d
Jan/09/2022 13:09:09 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 13:09:09 ipsec,debug,packet HASH computed:
Jan/09/2022 13:09:09 ipsec,debug,packet 383b494b 15245169 46d1c692 2f08e9af 1a65068e
Jan/09/2022 13:09:09 ipsec,debug,packet begin encryption.
Jan/09/2022 13:09:09 ipsec,debug,packet encryption(aes)
Jan/09/2022 13:09:09 ipsec,debug,packet pad length = 12
Jan/09/2022 13:09:09 ipsec,debug,packet 0b000018 383b494b 15245169 46d1c692 2f08e9af 1a65068e 0000000c 00000001
Jan/09/2022 13:09:09 ipsec,debug,packet 0100000d f2f9a8c9 f2f6ed9e eacddd0b
Jan/09/2022 13:09:09 ipsec,debug,packet encryption(aes)
Jan/09/2022 13:09:09 ipsec,debug,packet with key:
Jan/09/2022 13:09:09 ipsec,debug,packet 11c4a816 d5022947 74324bed 77d64f8a
Jan/09/2022 13:09:09 ipsec,debug,packet encrypted payload by IV:
Jan/09/2022 13:09:09 ipsec,debug,packet f3bd8b64 09db7dd5 2cca78ad 3d94519d
Jan/09/2022 13:09:09 ipsec,debug,packet save IV for next:
Jan/09/2022 13:09:09 ipsec,debug,packet ce45a4e5 33a4b231 495351d9 f5bb33d1
Jan/09/2022 13:09:09 ipsec,debug,packet encrypted.
Jan/09/2022 13:09:09 ipsec,debug 76 bytes from 164.52.192.253[500] to 3.226.95.68[500]
Jan/09/2022 13:09:09 ipsec,debug 1 times of 76 bytes message will be sent to 3.226.95.68[500]
Jan/09/2022 13:09:09 ipsec,debug,packet 9d7e4e14 c9051c95 8e3100d9 54d41224 08100501 e0384469 0000004c 05eb678b
Jan/09/2022 13:09:09 ipsec,debug,packet c0a09548 4b3ca9c8 bfe9ad23 01560415 1e220e17 da460e10 18c2920a ce45a4e5
Jan/09/2022 13:09:09 ipsec,debug,packet 33a4b231 495351d9 f5bb33d1
Jan/09/2022 13:09:09 ipsec,debug sendto Information notify.
Jan/09/2022 13:09:09 ipsec 3.226.95.68 phase2 negotiation failed.
Jan/09/2022 13:09:14 ipsec IPsec-SA expired: ESP/Tunnel 3.226.95.68[500]->164.52.192.253[500] spi=0x42bd358
Jan/09/2022 13:09:15 ipsec acquire for policy: 0.0.0.0/0 <=> 0.0.0.0/0
Jan/09/2022 13:09:15 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=0:0)
Jan/09/2022 13:09:15 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
Jan/09/2022 13:09:15 ipsec,debug begin QUICK mode.
Jan/09/2022 13:09:15 ipsec,debug ===
Jan/09/2022 13:09:15 ipsec,debug begin QUICK mode.
Jan/09/2022 13:09:15 ipsec initiate new phase 2 negotiation: 164.52.192.253[500]<=>3.226.95.68[500]
Jan/09/2022 13:09:15 ipsec,debug,packet compute IV for phase2
Jan/09/2022 13:09:15 ipsec,debug,packet phase1 last IV:
Jan/09/2022 13:09:15 ipsec,debug,packet e815c820 c7a8e91c 6b1df911 ef083099 cdf3d2e6
Jan/09/2022 13:09:15 ipsec,debug hash(sha1)
Jan/09/2022 13:09:15 ipsec,debug,packet encryption(aes)
Jan/09/2022 13:09:15 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 13:09:15 ipsec,debug,packet ad9fd59b 9ac7f3d1 85202fe4 b86de12a
Jan/09/2022 13:09:15 ipsec,debug call pfkey_send_getspi 9
Jan/09/2022 13:09:15 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 3.226.95.68[500]->164.52.192.253[500] 
Jan/09/2022 13:09:15 ipsec,debug pfkey getspi sent.
Jan/09/2022 13:09:15 ipsec,debug dh(modp1024)
Jan/09/2022 13:09:15 ipsec,debug dh(modp1024)
Jan/09/2022 13:09:15 ipsec,debug dh(modp1024)
Jan/09/2022 13:09:15 ipsec,debug,packet compute DH's private.
Jan/09/2022 13:09:15 ipsec,debug,packet 5462cc77 cef51f6f f50cf0a0 4e663d4b 6ad24d50 3f867adf 6831dc5b ad0c6a02
Jan/09/2022 13:09:15 ipsec,debug,packet 11517af2 3bac6286 6c42e257 30c22a6d a0921ed6 2630ff73 3e98226d 81b006c0
Jan/09/2022 13:09:15 ipsec,debug,packet 8d847350 0a7d2f6c 4ab19d48 96739815 3fb3c8ea e04bbc78 ecd3837d f5655bdc
Jan/09/2022 13:09:15 ipsec,debug,packet 27a3f2d0 ebfeccb9 17947d5b c76b0e70 1a2b484a c4cf2cd2 0b73cdd4 04daf666
Jan/09/2022 13:09:15 ipsec,debug,packet compute DH's public.
Jan/09/2022 13:09:15 ipsec,debug,packet 31780de9 1150fdd5 fd1a80aa 46d1f65b f1ad3cfd 40409139 314cc9f2 40cb6e88
Jan/09/2022 13:09:15 ipsec,debug,packet e0e0d2f3 24cfe663 f730a220 34dee4cc c5a9d5d4 464e0717 960d820e afbc1147
Jan/09/2022 13:09:15 ipsec,debug,packet 134aa5ba d6fbd48f 2d47638e 038a575c 2afaa3e8 9771cf68 bef0ec79 33c304f8
Jan/09/2022 13:09:15 ipsec,debug,packet 92648793 32864966 451b40f6 7a4ba2a6 7a7e6b08 2e4d5cd3 0a7bb52d f4cd53b9
Jan/09/2022 13:09:15 ipsec,debug use local ID type IPv4_subnet
Jan/09/2022 13:09:15 ipsec,debug use remote ID type IPv4_subnet
Jan/09/2022 13:09:15 ipsec,debug IDci:
Jan/09/2022 13:09:15 ipsec,debug 04000000 00000000 00000000
Jan/09/2022 13:09:15 ipsec,debug IDcr:
Jan/09/2022 13:09:15 ipsec,debug 04000000 00000000 00000000
Jan/09/2022 13:09:15 ipsec,debug add payload of len 52, next type 10
Jan/09/2022 13:09:15 ipsec,debug add payload of len 24, next type 4
Jan/09/2022 13:09:15 ipsec,debug add payload of len 128, next type 5
Jan/09/2022 13:09:15 ipsec,debug add payload of len 12, next type 5
Jan/09/2022 13:09:15 ipsec,debug add payload of len 12, next type 0
Jan/09/2022 13:09:15 ipsec,debug,packet HASH with:
Jan/09/2022 13:09:15 ipsec,debug,packet cdf3d2e6 0a000038 00000001 00000001 0000002c 01030401 01c365e9 00000020
Jan/09/2022 13:09:15 ipsec,debug,packet 010c0000 80010001 80020e10 80040001 80060080 80050002 80030002 0400001c
Jan/09/2022 13:09:15 ipsec,debug,packet aa9d94aa d4799713 e7493dd3 29895b86 cff9a860 7d05f546 05000084 31780de9
Jan/09/2022 13:09:15 ipsec,debug,packet 1150fdd5 fd1a80aa 46d1f65b f1ad3cfd 40409139 314cc9f2 40cb6e88 e0e0d2f3
Jan/09/2022 13:09:15 ipsec,debug,packet 24cfe663 f730a220 34dee4cc c5a9d5d4 464e0717 960d820e afbc1147 134aa5ba
Jan/09/2022 13:09:15 ipsec,debug,packet d6fbd48f 2d47638e 038a575c 2afaa3e8 9771cf68 bef0ec79 33c304f8 92648793
Jan/09/2022 13:09:15 ipsec,debug,packet 32864966 451b40f6 7a4ba2a6 7a7e6b08 2e4d5cd3 0a7bb52d f4cd53b9 05000010
Jan/09/2022 13:09:15 ipsec,debug,packet 04000000 00000000 00000000 00000010 04000000 00000000 00000000
Jan/09/2022 13:09:15 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 13:09:15 ipsec,debug,packet HASH computed:
Jan/09/2022 13:09:15 ipsec,debug,packet 15df3e2c 6ef46454 5a333294 89253eee e7e797f4
Jan/09/2022 13:09:15 ipsec,debug add payload of len 20, next type 1
Jan/09/2022 13:09:15 ipsec,debug,packet begin encryption.
Jan/09/2022 13:09:15 ipsec,debug,packet encryption(aes)
Jan/09/2022 13:09:15 ipsec,debug,packet pad length = 16
Jan/09/2022 13:09:15 ipsec,debug,packet 01000018 15df3e2c 6ef46454 5a333294 89253eee e7e797f4 0a000038 00000001
Jan/09/2022 13:09:15 ipsec,debug,packet 00000001 0000002c 01030401 01c365e9 00000020 010c0000 80010001 80020e10
Jan/09/2022 13:09:15 ipsec,debug,packet 80040001 80060080 80050002 80030002 0400001c aa9d94aa d4799713 e7493dd3
Jan/09/2022 13:09:15 ipsec,debug,packet 29895b86 cff9a860 7d05f546 05000084 31780de9 1150fdd5 fd1a80aa 46d1f65b
Jan/09/2022 13:09:15 ipsec,debug,packet f1ad3cfd 40409139 314cc9f2 40cb6e88 e0e0d2f3 24cfe663 f730a220 34dee4cc
Jan/09/2022 13:09:15 ipsec,debug,packet c5a9d5d4 464e0717 960d820e afbc1147 134aa5ba d6fbd48f 2d47638e 038a575c
Jan/09/2022 13:09:15 ipsec,debug,packet 2afaa3e8 9771cf68 bef0ec79 33c304f8 92648793 32864966 451b40f6 7a4ba2a6
Jan/09/2022 13:09:15 ipsec,debug,packet 7a7e6b08 2e4d5cd3 0a7bb52d f4cd53b9 05000010 04000000 00000000 00000000
Jan/09/2022 13:09:15 ipsec,debug,packet 00000010 04000000 00000000 00000000 9da4c687 ae93dcc7 c0f4eae3 fef4c80f
Jan/09/2022 13:09:15 ipsec,debug,packet encryption(aes)
Jan/09/2022 13:09:15 ipsec,debug,packet with key:
Jan/09/2022 13:09:15 ipsec,debug,packet 11c4a816 d5022947 74324bed 77d64f8a
Jan/09/2022 13:09:15 ipsec,debug,packet encrypted payload by IV:
Jan/09/2022 13:09:15 ipsec,debug,packet ad9fd59b 9ac7f3d1 85202fe4 b86de12a
Jan/09/2022 13:09:15 ipsec,debug,packet save IV for next:
Jan/09/2022 13:09:15 ipsec,debug,packet 621171d0 ba3385db 736d6835 bc1240d7
Jan/09/2022 13:09:15 ipsec,debug,packet encrypted.
Jan/09/2022 13:09:15 ipsec,debug 316 bytes from 164.52.192.253[500] to 3.226.95.68[500]
Jan/09/2022 13:09:15 ipsec,debug 1 times of 316 bytes message will be sent to 3.226.95.68[500]
Jan/09/2022 13:09:15 ipsec,debug,packet 9d7e4e14 c9051c95 8e3100d9 54d41224 08102001 cdf3d2e6 0000013c 56530745
Jan/09/2022 13:09:15 ipsec,debug,packet 75967807 1f9fbbaf 0ff0443f 796ac141 a8a4696d c0fc93e7 e6ca7fef 3c06796a
Jan/09/2022 13:09:15 ipsec,debug,packet 99495603 319e02ce 36a19ae2 e8e6c3f6 4f892317 b1dc82bf 5dcf15b2 90a388c4
Jan/09/2022 13:09:15 ipsec,debug,packet 132eb84e 7bf0c7b8 01ed2c19 c0b4d6d9 66fd8264 475a903e 34c4fdec fa7bb93a
Jan/09/2022 13:09:15 ipsec,debug,packet f422ba3a 1bb5d679 11244193 6f67c7af 91a13681 eda9fb03 bf5263a8 01e160e1
Jan/09/2022 13:09:15 ipsec,debug,packet 0d0da12c 07b7c44a 0aadeb7d 5fab7cb5 2feceaff d7dd4b64 89a4150e 24427284
Jan/09/2022 13:09:15 ipsec,debug,packet 256966f2 343f0728 e6b92e7b 7ca0b079 08886355 713df2fc 69456453 8be30729
Jan/09/2022 13:09:15 ipsec,debug,packet 3ca7e642 ca93d272 bf22901b 406b8fd2 4b1b02a0 0f24d174 4e35ba47 d046a0d2
Jan/09/2022 13:09:15 ipsec,debug,packet cb135086 87590e0e 9cbf1465 bf77f2e1 18be5e46 4f822f95 cb7a85eb 5743ab40
Jan/09/2022 13:09:15 ipsec,debug,packet 41774907 76379117 8907338c 621171d0 ba3385db 736d6835 bc1240d7
Jan/09/2022 13:09:15 ipsec sent phase2 packet 164.52.192.253[500]<=>3.226.95.68[500] 9d7e4e14c9051c95:8e3100d954d41224:0000cdf3
Jan/09/2022 13:09:15 ipsec,debug ===== received 316 bytes from 3.226.95.68[500] to 164.52.192.253[500]
Jan/09/2022 13:09:15 ipsec,debug,packet 9d7e4e14 c9051c95 8e3100d9 54d41224 08102001 cdf3d2e6 0000013c 99dcfc88
Jan/09/2022 13:09:15 ipsec,debug,packet 32468b24 37883958 9c750da0 52de8db2 d08e1d9a 8f674e67 9fe75917 3308efbf
Jan/09/2022 13:09:15 ipsec,debug,packet 09140686 34ad51bb aa98f4e5 1c4ad19a 212bc0ca a064505e 706c1b73 9aa98976
Jan/09/2022 13:09:15 ipsec,debug,packet 43610df7 4d64d9d5 e495e8db 99b53e98 f84ddb8c 0556f842 2e5c7659 fddb71bd
Jan/09/2022 13:09:15 ipsec,debug,packet 975c1069 20583fab 18dbdc63 58bd7f43 316af5d5 a26e33b0 c6014002 7ed6e8c4
Jan/09/2022 13:09:15 ipsec,debug,packet 563c7674 b36a84f8 598ec42f d5c95736 f607bae8 53bc88a9 19fb6d33 1594d068
Jan/09/2022 13:09:15 ipsec,debug,packet 9c6cf56c 54771c56 37b0a73c da477995 af03db45 20aa80ee da0ad329 89e6cda6
Jan/09/2022 13:09:15 ipsec,debug,packet 761364e7 35d89b99 a8d137f8 9e1945ac 91bccbfb 91061758 8ee66402 d4ada503
Jan/09/2022 13:09:15 ipsec,debug,packet a625d906 825cabe8 cf12be8c e4cf8c63 62e388dd 9941cee8 90271e63 49736190
Jan/09/2022 13:09:15 ipsec,debug,packet 22896897 4389fa6a 5fccaed8 548e186f 0ae96ad3 e14655b7 f2603bb2
Jan/09/2022 13:09:15 ipsec,debug,packet encryption(aes)
Jan/09/2022 13:09:15 ipsec,debug,packet IV was saved for next processing:
Jan/09/2022 13:09:15 ipsec,debug,packet 548e186f 0ae96ad3 e14655b7 f2603bb2
Jan/09/2022 13:09:15 ipsec,debug,packet encryption(aes)
Jan/09/2022 13:09:15 ipsec,debug,packet with key:
Jan/09/2022 13:09:15 ipsec,debug,packet 11c4a816 d5022947 74324bed 77d64f8a
Jan/09/2022 13:09:15 ipsec,debug,packet decrypted payload by IV:
Jan/09/2022 13:09:15 ipsec,debug,packet 621171d0 ba3385db 736d6835 bc1240d7
Jan/09/2022 13:09:15 ipsec,debug,packet decrypted payload, but not trimed.
Jan/09/2022 13:09:15 ipsec,debug,packet 01000018 05e6a178 7b36bb18 6549c01b 92e6975a 80741dd0 0a000038 00000001
Jan/09/2022 13:09:15 ipsec,debug,packet 00000001 0000002c 01030401 c737b72d 00000020 010c0000 80060080 80050002
Jan/09/2022 13:09:15 ipsec,debug,packet 80030002 80040001 80010001 80020e10 04000024 9d0c35b4 dd95f598 5f8fb75a
Jan/09/2022 13:09:15 ipsec,debug,packet 50d7d17c 40397b66 77bb6c09 403a9e3e 9c2f1f54 05000084 5fc96969 e6617ed1
Jan/09/2022 13:09:15 ipsec,debug,packet 047f809a bb754ec5 d93a3d25 6a96b899 de3aab28 1ab43a65 40dc478e 56fd4ad2
Jan/09/2022 13:09:15 ipsec,debug,packet fcf1f459 115a2057 dc6f654f 261a1a66 f5172f7f cbc14817 aec022dc 4ce1fb66
Jan/09/2022 13:09:15 ipsec,debug,packet e92e9cb5 702ff0cc b23d658a d562d8a1 e3c725cc 366deb94 2dcba0b6 5510b763
Jan/09/2022 13:09:15 ipsec,debug,packet 8710341b c321c913 71c33790 e20e7791 913ae5d9 943323b9 05000010 04000000
Jan/09/2022 13:09:15 ipsec,debug,packet ac106000 ffffe000 00000010 04000000 ac1f0000 ffff0000 00000000 00000000
Jan/09/2022 13:09:15 ipsec,debug,packet padding len=1
Jan/09/2022 13:09:15 ipsec,debug,packet skip to trim padding.
Jan/09/2022 13:09:15 ipsec,debug,packet decrypted.
Jan/09/2022 13:09:15 ipsec,debug,packet 9d7e4e14 c9051c95 8e3100d9 54d41224 08102001 cdf3d2e6 0000013c 01000018
Jan/09/2022 13:09:15 ipsec,debug,packet 05e6a178 7b36bb18 6549c01b 92e6975a 80741dd0 0a000038 00000001 00000001
Jan/09/2022 13:09:15 ipsec,debug,packet 0000002c 01030401 c737b72d 00000020 010c0000 80060080 80050002 80030002
Jan/09/2022 13:09:15 ipsec,debug,packet 80040001 80010001 80020e10 04000024 9d0c35b4 dd95f598 5f8fb75a 50d7d17c
Jan/09/2022 13:09:15 ipsec,debug,packet 40397b66 77bb6c09 403a9e3e 9c2f1f54 05000084 5fc96969 e6617ed1 047f809a
Jan/09/2022 13:09:15 ipsec,debug,packet bb754ec5 d93a3d25 6a96b899 de3aab28 1ab43a65 40dc478e 56fd4ad2 fcf1f459
Jan/09/2022 13:09:15 ipsec,debug,packet 115a2057 dc6f654f 261a1a66 f5172f7f cbc14817 aec022dc 4ce1fb66 e92e9cb5
Jan/09/2022 13:09:15 ipsec,debug,packet 702ff0cc b23d658a d562d8a1 e3c725cc 366deb94 2dcba0b6 5510b763 8710341b
Jan/09/2022 13:09:15 ipsec,debug,packet c321c913 71c33790 e20e7791 913ae5d9 943323b9 05000010 04000000 ac106000
Jan/09/2022 13:09:15 ipsec,debug,packet ffffe000 00000010 04000000 ac1f0000 ffff0000 00000000 00000000
Jan/09/2022 13:09:15 ipsec,debug begin.
Jan/09/2022 13:09:15 ipsec,debug seen nptype=8(hash) len=24
Jan/09/2022 13:09:15 ipsec,debug seen nptype=1(sa) len=56
Jan/09/2022 13:09:15 ipsec,debug seen nptype=10(nonce) len=36
Jan/09/2022 13:09:15 ipsec,debug seen nptype=4(ke) len=132
Jan/09/2022 13:09:15 ipsec,debug seen nptype=5(id) len=16
Jan/09/2022 13:09:15 ipsec,debug seen nptype=5(id) len=16
Jan/09/2022 13:09:15 ipsec,debug succeed.
Jan/09/2022 13:09:15 ipsec,debug IDci prefix: 19/ulproto: 255 does not match proposal.
Jan/09/2022 13:09:15 ipsec,error 3.226.95.68 failed to pre-process ph2 packet.
Jan/09/2022 13:09:15 ipsec,debug,packet compute IV for phase2
Jan/09/2022 13:09:15 ipsec,debug,packet phase1 last IV:
Jan/09/2022 13:09:15 ipsec,debug,packet e815c820 c7a8e91c 6b1df911 ef083099 b1eed516
Jan/09/2022 13:09:15 ipsec,debug hash(sha1)
Jan/09/2022 13:09:15 ipsec,debug,packet encryption(aes)
Jan/09/2022 13:09:15 ipsec,debug,packet phase2 IV computed:
Jan/09/2022 13:09:15 ipsec,debug,packet 4b7f01f0 90e4c047 9178808b 2be3b9a5
Jan/09/2022 13:09:15 ipsec,debug,packet HASH with:
Jan/09/2022 13:09:15 ipsec,debug,packet b1eed516 0000000c 00000001 0100000d
Jan/09/2022 13:09:15 ipsec,debug,packet hmac(hmac_sha1)
Jan/09/2022 13:09:15 ipsec,debug,packet HASH computed:
Jan/09/2022 13:09:15 ipsec,debug,packet 411b3b2c fca22b03 4d47d458 6463890c 47667482
Jan/09/2022 13:09:15 ipsec,debug,packet begin encryption.
Jan/09/2022 13:09:15 ipsec,debug,packet encryption(aes)
Jan/09/2022 13:09:15 ipsec,debug,packet pad length = 12
Jan/09/2022 13:09:15 ipsec,debug,packet 0b000018 411b3b2c fca22b03 4d47d458 6463890c 47667482 0000000c 00000001
Jan/09/2022 13:09:15 ipsec,debug,packet 0100000d d2f7cbac d5d2a7f5 fbb1b70b
Jan/09/2022 13:09:15 ipsec,debug,packet encryption(aes)
Jan/09/2022 13:09:15 ipsec,debug,packet with key:
Jan/09/2022 13:09:15 ipsec,debug,packet 11c4a816 d5022947 74324bed 77d64f8a
Jan/09/2022 13:09:15 ipsec,debug,packet encrypted payload by IV:
Jan/09/2022 13:09:15 ipsec,debug,packet 4b7f01f0 90e4c047 9178808b 2be3b9a5
Jan/09/2022 13:09:15 ipsec,debug,packet save IV for next:
Jan/09/2022 13:09:15 ipsec,debug,packet 5db5d693 1862487d 7c020860 62b74dd6
Jan/09/2022 13:09:15 ipsec,debug,packet encrypted.
Jan/09/2022 13:09:15 ipsec,debug 76 bytes from 164.52.192.253[500] to 3.226.95.68[500]
Jan/09/2022 13:09:15 ipsec,debug 1 times of 76 bytes message will be sent to 3.226.95.68[500]
Jan/09/2022 13:09:15 ipsec,debug,packet 9d7e4e14 c9051c95 8e3100d9 54d41224 08100501 b1eed516 0000004c d0b85f2f
Jan/09/2022 13:09:15 ipsec,debug,packet 38cf68a8 8beeaf7a 20cba499 0458d44a 141a8647 41d077b4 b192ab16 5db5d693
Jan/09/2022 13:09:15 ipsec,debug,packet 1862487d 7c020860 62b74dd6
Jan/09/2022 13:09:15 ipsec,debug sendto Information notify.
Jan/09/2022 13:09:15 ipsec 3.226.95.68 phase2 negotiation failed.

 
mankomal
Member Candidate
Member Candidate
Topic Author
Posts: 106
Joined: Fri Nov 24, 2006 8:56 am

Re: Site-To-Site VPN AWS problem

Sun Jan 09, 2022 3:51 pm

Image
 
User avatar
sindy
Forum Guru
Forum Guru
Posts: 11126
Joined: Mon Dec 04, 2017 9:19 pm

Re: Site-To-Site VPN AWS problem

Sun Jan 09, 2022 3:53 pm

This does not work
But this works:
If so, their instruction does not match their actual requirements. Or maybe you should indeed use exchange-mode=ike2 as the instruction refers to that, so the handling of Phase 2 may differ at their side depending on what IKE type is used.
 
User avatar
sindy
Forum Guru
Forum Guru
Posts: 11126
Joined: Mon Dec 04, 2017 9:19 pm

Re: Site-To-Site VPN AWS problem

Sun Jan 09, 2022 3:54 pm

Also, your sceenshot shows that only one policy has succeeded, the other one states "no phase 2" which means it has failed to establish.
 
mankomal
Member Candidate
Member Candidate
Topic Author
Posts: 106
Joined: Fri Nov 24, 2006 8:56 am

Re: Site-To-Site VPN AWS problem

Sun Jan 09, 2022 3:58 pm

Also, your sceenshot shows that only one policy has succeeded, the other one states "no phase 2" which means it has failed to establish.
So That failed policy actually allows the ping to go thru (beats my thought process also)
Also, if the "established" policy is not on then the ping doesn't goes thru (again beats my thought process)
 
mankomal
Member Candidate
Member Candidate
Topic Author
Posts: 106
Joined: Fri Nov 24, 2006 8:56 am

Re: Site-To-Site VPN AWS problem

Sun Jan 09, 2022 3:59 pm

This does not work
But this works:
If so, their instruction does not match their actual requirements. Or maybe you should indeed use exchange-mode=ike2 as the instruction refers to that, so the handling of Phase 2 may differ at their side depending on what IKE type is used.
I made new tunnel with IKEv1 as IKEv2 was failing and I read something about IKEv2 compatibility issue with MikroTik and AWS
 
mankomal
Member Candidate
Member Candidate
Topic Author
Posts: 106
Joined: Fri Nov 24, 2006 8:56 am

Re: Site-To-Site VPN AWS problem

Sun Jan 09, 2022 4:25 pm

WOOT WOOT! GOT IT!
AWS side VPG needed to be attached to VPC
and Route propagation was needed to be added.
Thanks a lot Sindy and Sob for providing all the inputs.

Will be posting a write up anyone else also doing this don't face this issue with the new version.
 
User avatar
sindy
Forum Guru
Forum Guru
Posts: 11126
Joined: Mon Dec 04, 2017 9:19 pm

Re: Site-To-Site VPN AWS problem

Sun Jan 09, 2022 4:38 pm

Congratulations.
I read something about IKEv2 compatibility issue with MikroTik and AWS
Any chance you could dig the link? Uncle Google doesn't show anything related to me...
 
mankomal
Member Candidate
Member Candidate
Topic Author
Posts: 106
Joined: Fri Nov 24, 2006 8:56 am

Re: Site-To-Site VPN AWS problem

Thu Feb 10, 2022 9:07 am

Congratulations.
I read something about IKEv2 compatibility issue with MikroTik and AWS
Any chance you could dig the link? Uncle Google doesn't show anything related to me...
Hey Sindy,

Sorry for the late reply I have been working on you r suggestions and this is the result
1. I got one of the IPSECs to work with what you guided me
Image

2. But at the same time I did one more config and the result was that there was an error
Image

The log stated it was looking for prefix entered in the Site-to-Site VPN setup
 
User avatar
sindy
Forum Guru
Forum Guru
Posts: 11126
Joined: Mon Dec 04, 2017 9:19 pm

Re: Site-To-Site VPN AWS problem

Thu Feb 10, 2022 1:32 pm

A lot of infomation is missing - that "one more config" is at the same Mikrotik device like the working one? And is it a tunnel to another AWS instance, to some completely other IPsec peer, or a modification of the existing one?
 
mankomal
Member Candidate
Member Candidate
Topic Author
Posts: 106
Joined: Fri Nov 24, 2006 8:56 am

Re: Site-To-Site VPN AWS problem

Thu Feb 10, 2022 1:49 pm

A lot of infomation is missing - that "one more config" is at the same Mikrotik device like the working one? And is it a tunnel to another AWS instance, to some completely other IPsec peer, or a modification of the existing one?
My Bad so that is a parallel setup I have created
Just over the top can different regions have different VPN endpoints (make) and that could cause the problem?
The working setup is In India region o AWS and the non-working has N America(Virginia)
 
User avatar
sindy
Forum Guru
Forum Guru
Posts: 11126
Joined: Mon Dec 04, 2017 9:19 pm

Re: Site-To-Site VPN AWS problem

Thu Feb 10, 2022 2:00 pm

My Bad so that is a parallel setup I have created
To me, "parallel" to me may still mean either, i.e. another AWS peer on the same Mikrotik or another Mikrotik.

Just over the top can different regions have different VPN endpoints (make) and that could cause the problem?
The working setup is In India region o AWS and the non-working has N America(Virginia)
That's a question for AWS forum, not for a Mikrotik one :)


As for the actual issue, I'd have to see the detailed log (/system logging add topics=ipsec,!packet) and a configuration export.
 
mankomal
Member Candidate
Member Candidate
Topic Author
Posts: 106
Joined: Fri Nov 24, 2006 8:56 am

Re: Site-To-Site VPN AWS problem

Thu Feb 10, 2022 2:14 pm

My Bad so that is a parallel setup I have created
To me, "parallel" to me may still mean either, i.e. another AWS peer on the same Mikrotik or another Mikrotik.

Just over the top can different regions have different VPN endpoints (make) and that could cause the problem?
The working setup is In India region o AWS and the non-working has N America(Virginia)
That's a question for AWS forum, not for a Mikrotik one :)



As for the actual issue, I'd have to see the detailed log (/system logging add topics=ipsec,!packet) and a configuration export.
Completely separate setup

I will share logs with you in next 2~3 hours setting up the stuff now
 
mankomal
Member Candidate
Member Candidate
Topic Author
Posts: 106
Joined: Fri Nov 24, 2006 8:56 am

Re: Site-To-Site VPN AWS problem

Mon Feb 14, 2022 11:10 am

Feb/14/2022 09:09:44 ipsec,debug ===== received 348 bytes from 43.254.32.5[500] to 103.54.222.93[500]
Feb/14/2022 09:09:44 ipsec no IKEv1 peer config for 43.254.32.5
Feb/14/2022 09:09:46 ipsec ike2 starting for: 34.204.157.120
Feb/14/2022 09:09:46 ipsec adding notify: IKEV2_FRAGMENTATION_SUPPORTED
Feb/14/2022 09:09:46 ipsec,debug => (size 0x8)
Feb/14/2022 09:09:46 ipsec,debug 00000008 0000402e
Feb/14/2022 09:09:46 ipsec adding notify: NAT_DETECTION_DESTINATION_IP
Feb/14/2022 09:09:46 ipsec,debug => (size 0x1c)
Feb/14/2022 09:09:46 ipsec,debug 0000001c 00004005 f57de113 6527d407 037aefd4 c6399037 ceb4a7dc
Feb/14/2022 09:09:46 ipsec adding notify: NAT_DETECTION_SOURCE_IP
Feb/14/2022 09:09:46 ipsec,debug => (size 0x1c)
Feb/14/2022 09:09:46 ipsec,debug 0000001c 00004004 bc6f0d9f 72e72f35 e75cc8df 8880c54c 71383df2
Feb/14/2022 09:09:46 ipsec adding payload: NONCE
Feb/14/2022 09:09:46 ipsec,debug => (size 0x1c)
Feb/14/2022 09:09:46 ipsec,debug 0000001c 35fece10 3b48054c ebe1f48b 81bd083d bafd9907 3995f2b3
Feb/14/2022 09:09:46 ipsec adding payload: KE
Feb/14/2022 09:09:46 ipsec,debug => (size 0x88)
Feb/14/2022 09:09:46 ipsec,debug 00000088 00020000 5339a21d 7319ec3c bcb67aa7 d22c5031 970b5d7c e26e7e1c
Feb/14/2022 09:09:46 ipsec,debug 14438282 93f91017 6961eb11 02674a20 22c875d4 336e60f0 f25d1a0d e15bca6b
Feb/14/2022 09:09:46 ipsec,debug 44634286 aec7e77e be15f14a cb5ffe80 c8e28cbf e8029dec 0b3d09f4 4811a10b
Feb/14/2022 09:09:46 ipsec,debug ea45b606 d013ef41 aff4f7c7 5ed25f9e 0b66bff4 0a879f2a 17f1d5a5 ac13055d
Feb/14/2022 09:09:46 ipsec,debug aec5295d 54c76477
Feb/14/2022 09:09:46 ipsec adding payload: SA
Feb/14/2022 09:09:46 ipsec,debug => (size 0x30)
Feb/14/2022 09:09:46 ipsec,debug 00000030 0000002c 01010004 0300000c 0100000c 800e0080 03000008 02000002
Feb/14/2022 09:09:46 ipsec,debug 03000008 03000002 00000008 04000002
Feb/14/2022 09:09:46 ipsec <- ike2 request, exchange: SA_INIT:0 34.204.157.120[4500] b9e62bbc9dd576a1:0000000000000000
Feb/14/2022 09:09:46 ipsec,debug ===== sending 304 bytes from 103.54.222.93[4500] to 34.204.157.120[4500]
Feb/14/2022 09:09:46 ipsec,debug 1 times of 308 bytes message will be sent to 34.204.157.120[4500]
Feb/14/2022 09:09:46 ipsec,debug ===== received 320 bytes from 34.204.157.120[4500] to 103.54.222.93[4500]
Feb/14/2022 09:09:46 ipsec -> ike2 reply, exchange: SA_INIT:0 34.204.157.120[4500] b9e62bbc9dd576a1:122292e0bde85c72
Feb/14/2022 09:09:46 ipsec ike2 initialize recv
Feb/14/2022 09:09:46 ipsec payload seen: SA (48 bytes)
Feb/14/2022 09:09:46 ipsec payload seen: KE (136 bytes)
Feb/14/2022 09:09:46 ipsec payload seen: NONCE (36 bytes)
Feb/14/2022 09:09:46 ipsec payload seen: NOTIFY (28 bytes)
Feb/14/2022 09:09:46 ipsec payload seen: NOTIFY (28 bytes)
Feb/14/2022 09:09:46 ipsec payload seen: NOTIFY (8 bytes)
Feb/14/2022 09:09:46 ipsec payload seen: NOTIFY (8 bytes)
Feb/14/2022 09:09:46 ipsec processing payload: NONCE
Feb/14/2022 09:09:46 ipsec processing payload: SA
Feb/14/2022 09:09:46 ipsec IKE Protocol: IKE
Feb/14/2022 09:09:46 ipsec  proposal #1
Feb/14/2022 09:09:46 ipsec   enc: aes128-cbc
Feb/14/2022 09:09:46 ipsec   prf: hmac-sha1
Feb/14/2022 09:09:46 ipsec   auth: sha1
Feb/14/2022 09:09:46 ipsec   dh: modp1024
Feb/14/2022 09:09:46 ipsec matched proposal:
Feb/14/2022 09:09:46 ipsec  proposal #1
Feb/14/2022 09:09:46 ipsec   enc: aes128-cbc
Feb/14/2022 09:09:46 ipsec   prf: hmac-sha1
Feb/14/2022 09:09:46 ipsec   auth: sha1
Feb/14/2022 09:09:46 ipsec   dh: modp1024
Feb/14/2022 09:09:46 ipsec processing payload: KE
Feb/14/2022 09:09:46 ipsec,debug => shared secret (size 0x80)
Feb/14/2022 09:09:46 ipsec,debug b6ec8440 89e76276 c43e9882 afe5c0f0 c2cdfa4f 31b25660 4dd8c031 982ab742
Feb/14/2022 09:09:46 ipsec,debug 2dc9db75 259cdc61 5ae2f816 9eaa916f bba3f025 0eb770ac 0c539922 d087c785
Feb/14/2022 09:09:46 ipsec,debug ef5e1f37 4f2e82da 3d6b0585 18298749 c4e8e5e1 38f4772a 30b7b832 c938112e
Feb/14/2022 09:09:46 ipsec,debug c1d368e9 527c9b03 c25634c5 eb9d185d 66ba1493 c5a0c6c5 b3256802 8c763849
Feb/14/2022 09:09:46 ipsec,debug => skeyseed (size 0x14)
Feb/14/2022 09:09:46 ipsec,debug bf2b66d5 554d10d7 1e8a792c 438306ef 17890821
Feb/14/2022 09:09:46 ipsec,debug => keymat (size 0x14)
Feb/14/2022 09:09:46 ipsec,debug 14f16141 30ea31e1 c6da097f f3c4d4c4 2d37e534
Feb/14/2022 09:09:46 ipsec,debug => SK_ai (size 0x14)
Feb/14/2022 09:09:46 ipsec,debug 5d1a9d78 af12be30 21796531 4e45a692 005b2589
Feb/14/2022 09:09:46 ipsec,debug => SK_ar (size 0x14)
Feb/14/2022 09:09:46 ipsec,debug 16917181 e73d3e7f f076eafc f2088de9 ee53a592
Feb/14/2022 09:09:46 ipsec,debug => SK_ei (size 0x10)
Feb/14/2022 09:09:46 ipsec,debug dfc63d47 6384f218 52a07701 53a4d665
Feb/14/2022 09:09:46 ipsec,debug => SK_er (size 0x10)
Feb/14/2022 09:09:46 ipsec,debug 06ec4a4d a2f38bd3 62639367 89f3a6fe
Feb/14/2022 09:09:46 ipsec,debug => SK_pi (size 0x14)
Feb/14/2022 09:09:46 ipsec,debug 3f45eb6e db6c9e11 5565e17e b13e287f 88b38069
Feb/14/2022 09:09:46 ipsec,debug => SK_pr (size 0x14)
Feb/14/2022 09:09:46 ipsec,debug 5a4dee74 14644482 662e5902 03d9bd6a 9903cf6a
Feb/14/2022 09:09:46 ipsec,info new ike2 SA (I): AWS 103.54.222.93[4500]-34.204.157.120[4500] spi:b9e62bbc9dd576a1:122292e0bde85c72
Feb/14/2022 09:09:46 ipsec processing payloads: NOTIFY
Feb/14/2022 09:09:46 ipsec   notify: NAT_DETECTION_SOURCE_IP
Feb/14/2022 09:09:46 ipsec   notify: NAT_DETECTION_DESTINATION_IP
Feb/14/2022 09:09:46 ipsec   notify: IKEV2_FRAGMENTATION_SUPPORTED
Feb/14/2022 09:09:46 ipsec   notify: MULTIPLE_AUTH_SUPPORTED
Feb/14/2022 09:09:46 ipsec (NAT-T) REMOTE 
Feb/14/2022 09:09:46 ipsec KA list add: 103.54.222.93[4500]->34.204.157.120[4500]
Feb/14/2022 09:09:46 ipsec fragmentation negotiated
Feb/14/2022 09:09:46 ipsec init child for policy: 0.0.0.0/0 <=> 0.0.0.0/0
Feb/14/2022 09:09:46 ipsec init child continue
Feb/14/2022 09:09:46 ipsec offering proto: 3
Feb/14/2022 09:09:46 ipsec  proposal #1
Feb/14/2022 09:09:46 ipsec   enc: aes128-cbc
Feb/14/2022 09:09:46 ipsec   auth: sha1
Feb/14/2022 09:09:46 ipsec ID_I (ADDR4): 103.54.222.93
Feb/14/2022 09:09:46 ipsec adding payload: ID_I
Feb/14/2022 09:09:46 ipsec,debug => (size 0xc)
Feb/14/2022 09:09:46 ipsec,debug 0000000c 01000000 6736de5d
Feb/14/2022 09:09:46 ipsec,debug => auth nonce (size 0x20)
Feb/14/2022 09:09:46 ipsec,debug 029ea58b 95893c01 2dac83f1 654c9e6c 71112961 84c933f1 c8820e62 8dd68b26
Feb/14/2022 09:09:46 ipsec,debug => SK_p (size 0x14)
Feb/14/2022 09:09:46 ipsec,debug 3f45eb6e db6c9e11 5565e17e b13e287f 88b38069
Feb/14/2022 09:09:46 ipsec,debug => idhash (size 0x14)
Feb/14/2022 09:09:46 ipsec,debug f4a2ac3f 172d294c ce5c4e34 78205e93 22a7fe98
Feb/14/2022 09:09:46 ipsec,debug => my auth (size 0x14)
Feb/14/2022 09:09:46 ipsec,debug 9f2f7bc2 2b3fd909 be13403f 9269b4ed ed709119
Feb/14/2022 09:09:46 ipsec adding payload: AUTH
Feb/14/2022 09:09:46 ipsec,debug => (size 0x1c)
Feb/14/2022 09:09:46 ipsec,debug 0000001c 02000000 9f2f7bc2 2b3fd909 be13403f 9269b4ed ed709119
Feb/14/2022 09:09:46 ipsec adding notify: INITIAL_CONTACT
Feb/14/2022 09:09:46 ipsec,debug => (size 0x8)
Feb/14/2022 09:09:46 ipsec,debug 00000008 00004000
Feb/14/2022 09:09:46 ipsec adding payload: SA
Feb/14/2022 09:09:46 ipsec,debug => (size 0x2c)
Feb/14/2022 09:09:46 ipsec,debug 0000002c 00000028 01030403 030b0247 0300000c 0100000c 800e0080 03000008
Feb/14/2022 09:09:46 ipsec,debug 03000002 00000008 05000000
Feb/14/2022 09:09:46 ipsec initiator selector: 0.0.0.0/0 
Feb/14/2022 09:09:46 ipsec adding payload: TS_I
Feb/14/2022 09:09:46 ipsec,debug => (size 0x18)
Feb/14/2022 09:09:46 ipsec,debug 00000018 01000000 07000010 0000ffff 00000000 ffffffff
Feb/14/2022 09:09:46 ipsec responder selector: 0.0.0.0/0 
Feb/14/2022 09:09:46 ipsec adding payload: TS_R
Feb/14/2022 09:09:46 ipsec,debug => (size 0x18)
Feb/14/2022 09:09:46 ipsec,debug 00000018 01000000 07000010 0000ffff 00000000 ffffffff
Feb/14/2022 09:09:46 ipsec <- ike2 request, exchange: AUTH:1 34.204.157.120[4500] b9e62bbc9dd576a1:122292e0bde85c72
Feb/14/2022 09:09:46 ipsec,debug ===== sending 332 bytes from 103.54.222.93[4500] to 34.204.157.120[4500]
Feb/14/2022 09:09:46 ipsec,debug 1 times of 336 bytes message will be sent to 34.204.157.120[4500]
Feb/14/2022 09:09:46 ipsec,debug ===== received 204 bytes from 34.204.157.120[4500] to 103.54.222.93[4500]
Feb/14/2022 09:09:46 ipsec -> ike2 reply, exchange: AUTH:1 34.204.157.120[4500] b9e62bbc9dd576a1:122292e0bde85c72
Feb/14/2022 09:09:46 ipsec payload seen: ENC (176 bytes)
Feb/14/2022 09:09:46 ipsec processing payload: ENC
Feb/14/2022 09:09:46 ipsec,debug => iv (size 0x10)
Feb/14/2022 09:09:46 ipsec,debug 2672b2d3 239604ee cded176b 5efa18e8
Feb/14/2022 09:09:46 ipsec,debug => decrypted and trimmed payload (size 0x84)
Feb/14/2022 09:09:46 ipsec,debug 2700000c 01000000 22cc9d78 2100001c 02000000 51e2ea8b d5aa1377 bb59ccb2
Feb/14/2022 09:09:46 ipsec,debug 7493f41f b1690508 2c00002c 00000028 01030403 c9848272 0300000c 0100000c
Feb/14/2022 09:09:46 ipsec,debug 800e0080 03000008 03000002 00000008 05000000 2d000018 01000000 07000010
Feb/14/2022 09:09:46 ipsec,debug 0000ffff ac1f0000 ac1fffff 00000018 01000000 07000010 0000ffff 0a0a0a00
Feb/14/2022 09:09:46 ipsec,debug 0a0a0aff
Feb/14/2022 09:09:46 ipsec,debug decrypted packet
Feb/14/2022 09:09:46 ipsec payload seen: ID_R (12 bytes)
Feb/14/2022 09:09:46 ipsec payload seen: AUTH (28 bytes)
Feb/14/2022 09:09:46 ipsec payload seen: SA (44 bytes)
Feb/14/2022 09:09:46 ipsec payload seen: TS_I (24 bytes)
Feb/14/2022 09:09:46 ipsec payload seen: TS_R (24 bytes)
Feb/14/2022 09:09:46 ipsec processing payloads: NOTIFY (none found)
Feb/14/2022 09:09:46 ipsec ike auth: initiator finish
Feb/14/2022 09:09:46 ipsec processing payload: ID_R
Feb/14/2022 09:09:46 ipsec ID_R (ADDR4): 34.204.157.120
Feb/14/2022 09:09:46 ipsec processing payload: AUTH
Feb/14/2022 09:09:46 ipsec requested auth method: SKEY
Feb/14/2022 09:09:46 ipsec,debug => peer's auth (size 0x14)
Feb/14/2022 09:09:46 ipsec,debug 51e2ea8b d5aa1377 bb59ccb2 7493f41f b1690508
Feb/14/2022 09:09:46 ipsec,debug => auth nonce (size 0x18)
Feb/14/2022 09:09:46 ipsec,debug 35fece10 3b48054c ebe1f48b 81bd083d bafd9907 3995f2b3
Feb/14/2022 09:09:46 ipsec,debug => SK_p (size 0x14)
Feb/14/2022 09:09:46 ipsec,debug 5a4dee74 14644482 662e5902 03d9bd6a 9903cf6a
Feb/14/2022 09:09:46 ipsec,debug => idhash (size 0x14)
Feb/14/2022 09:09:46 ipsec,debug 9a8541ce b50ece12 fe80e457 aee7060d b695d1de
Feb/14/2022 09:09:46 ipsec,debug => calculated peer's AUTH (size 0x14)
Feb/14/2022 09:09:46 ipsec,debug 51e2ea8b d5aa1377 bb59ccb2 7493f41f b1690508
Feb/14/2022 09:09:46 ipsec,info,account peer authorized: AWS 103.54.222.93[4500]-34.204.157.120[4500] spi:b9e62bbc9dd576a1:122292e0bde85c72
Feb/14/2022 09:09:46 ipsec processing payloads: NOTIFY (none found)
Feb/14/2022 09:09:46 ipsec peer selected tunnel mode
Feb/14/2022 09:09:46 ipsec processing payload: SA
Feb/14/2022 09:09:46 ipsec IKE Protocol: ESP
Feb/14/2022 09:09:46 ipsec  proposal #1
Feb/14/2022 09:09:46 ipsec   enc: aes128-cbc
Feb/14/2022 09:09:46 ipsec   auth: sha1
Feb/14/2022 09:09:46 ipsec matched proposal:
Feb/14/2022 09:09:46 ipsec  proposal #1
Feb/14/2022 09:09:46 ipsec   enc: aes128-cbc
Feb/14/2022 09:09:46 ipsec   auth: sha1
Feb/14/2022 09:09:46 ipsec processing payload: TS_I
Feb/14/2022 09:09:46 ipsec 172.31.0.0/16
Feb/14/2022 09:09:46 ipsec processing payload: TS_R
Feb/14/2022 09:09:46 ipsec 10.10.10.0/24
Feb/14/2022 09:09:46 ipsec my vs peer's selectors:
Feb/14/2022 09:09:46 ipsec 0.0.0.0/0 vs 172.31.0.0/16
Feb/14/2022 09:09:46 ipsec 0.0.0.0/0 vs 10.10.10.0/24
Feb/14/2022 09:09:46 ipsec,error responder selectors does not match my policy
Feb/14/2022 09:09:46 ipsec send notify: TS_UNACCEPTABLE
Feb/14/2022 09:09:46 ipsec adding notify: TS_UNACCEPTABLE
Feb/14/2022 09:09:46 ipsec,debug => (size 0x8)
Feb/14/2022 09:09:46 ipsec,debug 00000008 00000026
Feb/14/2022 09:09:46 ipsec <- ike2 request, exchange: INFORMATIONAL:2 34.204.157.120[4500] b9e62bbc9dd576a1:122292e0bde85c72
Feb/14/2022 09:09:46 ipsec,debug ===== sending 268 bytes from 103.54.222.93[4500] to 34.204.157.120[4500]
Feb/14/2022 09:09:46 ipsec,debug 1 times of 272 bytes message will be sent to 34.204.157.120[4500]
Feb/14/2022 09:09:46 ipsec,info killing ike2 SA: AWS 103.54.222.93[4500]-34.204.157.120[4500] spi:b9e62bbc9dd576a1:122292e0bde85c72
Feb/14/2022 09:09:46 ipsec adding payload: DELETE
Feb/14/2022 09:09:46 ipsec,debug => (size 0x8)
Feb/14/2022 09:09:46 ipsec,debug 00000008 01000000
Feb/14/2022 09:09:46 ipsec <- ike2 request, exchange: INFORMATIONAL:3 34.204.157.120[4500] b9e62bbc9dd576a1:122292e0bde85c72
Feb/14/2022 09:09:46 ipsec,debug ===== sending 284 bytes from 103.54.222.93[4500] to 34.204.157.120[4500]
Feb/14/2022 09:09:46 ipsec,debug 1 times of 288 bytes message will be sent to 34.204.157.120[4500]
Feb/14/2022 09:09:46 ipsec KA remove: 103.54.222.93[4500]->34.204.157.120[4500]
Feb/14/2022 09:09:46 ipsec,debug KA tree dump: 103.54.222.93[4500]->34.204.157.120[4500] (in_use=1)
Feb/14/2022 09:09:46 ipsec,debug KA removing this one...
This is the debug
My policy is:

 1      peer="" src-address=0.0.0.0/0 src-port=any dst-address=10.10.10.0/24 dst-port=any protocol=all action=none 

 2      peer="" src-address=103.54.222.93/32 src-port=any dst-address=0.0.0.0/0 dst-port=any protocol=all action=none 

 3   I  peer=AWS tunnel=yes src-address=0.0.0.0/0 src-port=any dst-address=0.0.0.0/0 dst-port=any protocol=all action=encrypt level=require ipsec-protocols=esp sa-src-address=103.54.222.93 sa-dst-address=:: proposal=AWS-proposal ph2-count=0 

 
User avatar
sindy
Forum Guru
Forum Guru
Posts: 11126
Joined: Mon Dec 04, 2017 9:19 pm

Re: Site-To-Site VPN AWS problem

Mon Feb 14, 2022 12:00 pm

The answer is in this part:

Feb/14/2022 09:09:46 ipsec processing payload: TS_I
Feb/14/2022 09:09:46 ipsec 172.31.0.0/16
Feb/14/2022 09:09:46 ipsec processing payload: TS_R
Feb/14/2022 09:09:46 ipsec 10.10.10.0/24
Feb/14/2022 09:09:46 ipsec my vs peer's selectors:
Feb/14/2022 09:09:46 ipsec 0.0.0.0/0 vs 172.31.0.0/16
Feb/14/2022 09:09:46 ipsec 0.0.0.0/0 vs 10.10.10.0/24
Feb/14/2022 09:09:46 ipsec,error responder selectors does not match my policy
Feb/14/2022 09:09:46 ipsec send notify: TS_UNACCEPTABLE


Your policy is a static one, not a template:
peer=AWS tunnel=yes src-address=0.0.0.0/0 src-port=any dst-address=0.0.0.0/0 dst-port=any protocol=all action=encrypt level=require ipsec-protocols=esp sa-src-address=103.54.222.93 sa-dst-address=:: proposal=AWS-proposal

So even though IKEv2 is used, the policy at your side cannot accommodate to the one suggested by the AWS side.

If the suggestion by AWG is what you actually need, i.e. of these are the subnets you actually want to link, just accommodate your policy to that, set src-address=10.10.10.0/24 dst-address=172.31.0.0/16 in your policy, and you should be good.
 
mankomal
Member Candidate
Member Candidate
Topic Author
Posts: 106
Joined: Fri Nov 24, 2006 8:56 am

Re: Site-To-Site VPN AWS problem

Mon Feb 14, 2022 1:13 pm

The answer is in this part:

Feb/14/2022 09:09:46 ipsec processing payload: TS_I
Feb/14/2022 09:09:46 ipsec 172.31.0.0/16
Feb/14/2022 09:09:46 ipsec processing payload: TS_R
Feb/14/2022 09:09:46 ipsec 10.10.10.0/24
Feb/14/2022 09:09:46 ipsec my vs peer's selectors:
Feb/14/2022 09:09:46 ipsec 0.0.0.0/0 vs 172.31.0.0/16
Feb/14/2022 09:09:46 ipsec 0.0.0.0/0 vs 10.10.10.0/24
Feb/14/2022 09:09:46 ipsec,error responder selectors does not match my policy
Feb/14/2022 09:09:46 ipsec send notify: TS_UNACCEPTABLE


Your policy is a static one, not a template:
peer=AWS tunnel=yes src-address=0.0.0.0/0 src-port=any dst-address=0.0.0.0/0 dst-port=any protocol=all action=encrypt level=require ipsec-protocols=esp sa-src-address=103.54.222.93 sa-dst-address=:: proposal=AWS-proposal

So even though IKEv2 is used, the policy at your side cannot accommodate to the one suggested by the AWS side.

If the suggestion by AWG is what you actually need, i.e. of these are the subnets you actually want to link, just accommodate your policy to that, set src-address=10.10.10.0/24 dst-address=172.31.0.0/16 in your policy, and you should be good.

That does not work, below is a log for reference

Feb/14/2022 16:44:45 ipsec ph2 possible after ph1 creation
Feb/14/2022 16:44:45 ipsec init child for policy: 10.10.10.0/24 <=> 172.31.0.0/16
Feb/14/2022 16:44:45 ipsec init child continue
Feb/14/2022 16:44:45 ipsec offering proto: 3
Feb/14/2022 16:44:45 ipsec  proposal #1
Feb/14/2022 16:44:45 ipsec   enc: aes128-cbc
Feb/14/2022 16:44:45 ipsec   auth: sha1
Feb/14/2022 16:44:45 ipsec   dh: modp1024
Feb/14/2022 16:44:45 ipsec adding payload: NONCE
Feb/14/2022 16:44:45 ipsec,debug => (size 0x1c)
Feb/14/2022 16:44:45 ipsec,debug 0000001c 922d8c11 fa262c85 3765ede7 3784624f 221a33c0 64bb1f88
Feb/14/2022 16:44:45 ipsec adding payload: KE
Feb/14/2022 16:44:45 ipsec,debug => (size 0x88)
Feb/14/2022 16:44:45 ipsec,debug 00000088 00020000 9c97bb83 37140c79 6b965092 7b830ee8 68cd3f87 9f7bf3c6
Feb/14/2022 16:44:45 ipsec,debug c3c56d85 b47eee77 0b7561d3 1a3f6ae7 4ae5781e 814e68eb 88aa9d7f e0e04adc
Feb/14/2022 16:44:45 ipsec,debug 962e6756 e3728f19 d30d7cae 34b0fe3b 00549ae3 87c27e06 12b9df01 274745a2
Feb/14/2022 16:44:45 ipsec,debug a4800655 0951b273 4751e537 65d1055f 0e22e9d0 330009d9 687ed13a 03f5d776
Feb/14/2022 16:44:45 ipsec,debug 874ba04b 686a6d09
Feb/14/2022 16:44:45 ipsec adding payload: SA
Feb/14/2022 16:44:45 ipsec,debug => (size 0x34)
Feb/14/2022 16:44:45 ipsec,debug 00000034 00000030 01030404 01a7ec14 0300000c 0100000c 800e0080 03000008
Feb/14/2022 16:44:45 ipsec,debug 03000002 03000008 04000002 00000008 05000000
Feb/14/2022 16:44:45 ipsec initiator selector: 10.10.10.0/24 
Feb/14/2022 16:44:45 ipsec adding payload: TS_I
Feb/14/2022 16:44:45 ipsec,debug => (size 0x18)
Feb/14/2022 16:44:45 ipsec,debug 00000018 01000000 07000010 0000ffff 0a0a0a00 0a0a0aff
Feb/14/2022 16:44:45 ipsec responder selector: 172.31.0.0/16 
Feb/14/2022 16:44:45 ipsec adding payload: TS_R
Feb/14/2022 16:44:45 ipsec,debug => (size 0x18)
Feb/14/2022 16:44:45 ipsec,debug 00000018 01000000 07000010 0000ffff ac1f0000 ac1fffff
Feb/14/2022 16:44:45 ipsec <- ike2 request, exchange: CREATE_CHILD_SA:2 3.219.43.131[4500] 68ff03252a9d997d:08d4613eceee417c
Feb/14/2022 16:44:45 ipsec,debug ===== sending 476 bytes from 103.54.222.93[4500] to 3.219.43.131[4500]
Feb/14/2022 16:44:45 ipsec,debug 1 times of 480 bytes message will be sent to 3.219.43.131[4500]
Feb/14/2022 16:44:45 ipsec,debug ===== received 76 bytes from 3.219.43.131[4500] to 103.54.222.93[4500]
Feb/14/2022 16:44:45 ipsec -> ike2 reply, exchange: CREATE_CHILD_SA:2 3.219.43.131[4500] 68ff03252a9d997d:08d4613eceee417c
Feb/14/2022 16:44:45 ipsec payload seen: ENC (48 bytes)
Feb/14/2022 16:44:45 ipsec processing payload: ENC
Feb/14/2022 16:44:45 ipsec,debug => iv (size 0x10)
Feb/14/2022 16:44:45 ipsec,debug 38432b8d a2aefa40 888db897 e6a4be33
Feb/14/2022 16:44:45 ipsec,debug decrypted packet
Feb/14/2022 16:44:45 ipsec payload seen: NOTIFY (8 bytes)
Feb/14/2022 16:44:45 ipsec create child: initiator finish
Feb/14/2022 16:44:45 ipsec processing payloads: NOTIFY
Feb/14/2022 16:44:45 ipsec   notify: TS_UNACCEPTABLE
Feb/14/2022 16:44:45 ipsec got error: TS_UNACCEPTABLE
 
User avatar
sindy
Forum Guru
Forum Guru
Posts: 11126
Joined: Mon Dec 04, 2017 9:19 pm

Re: Site-To-Site VPN AWS problem

Mon Feb 14, 2022 1:47 pm

Strange, so try the following:

/ip ipsec policy disable [find peer=AWS]
/ip ipsec policy group add name=AWS
/ip ipsec policy add template=yes group=AWS proposal=AWS-proposal
/ip ipsec identity set [find peer=AWS] policy-template-group=AWS generate-policy=port-strict


and see what happens. Because in your previous log, the TS offer came from the AWS side; in the last one, it was sent from the Mikrotik side. By using the template, the Mikrotik won't actively attempt to establish the SA. If it turns out to work this way, you'll be able to restrict the template policy to what you want to actually permit.
 
mankomal
Member Candidate
Member Candidate
Topic Author
Posts: 106
Joined: Fri Nov 24, 2006 8:56 am

Re: Site-To-Site VPN AWS problem

Mon Feb 14, 2022 3:11 pm

Strange, so try the following:

/ip ipsec policy disable [find peer=AWS]
/ip ipsec policy group add name=AWS
/ip ipsec policy add template=yes group=AWS proposal=AWS-proposal
/ip ipsec identity set [find peer=AWS] policy-template-group=AWS generate-policy=port-strict


and see what happens. Because in your previous log, the TS offer came from the AWS side; in the last one, it was sent from the Mikrotik side. By using the template, the Mikrotik won't actively attempt to establish the SA. If it turns out to work this way, you'll be able to restrict the template policy to what you want to actually permit.
This is the log
in template src-address and dst-address should not be changed?
Feb/14/2022 18:40:56 ipsec,debug ===== received 320 bytes from 3.219.43.131[4500] to 103.54.222.93[4500]
Feb/14/2022 18:40:56 ipsec -> ike2 reply, exchange: SA_INIT:0 3.219.43.131[4500] ca41ef2335817273:bfeb85fecca95f29
Feb/14/2022 18:40:56 ipsec ike2 initialize recv
Feb/14/2022 18:40:56 ipsec payload seen: SA (48 bytes)
Feb/14/2022 18:40:56 ipsec payload seen: KE (136 bytes)
Feb/14/2022 18:40:56 ipsec payload seen: NONCE (36 bytes)
Feb/14/2022 18:40:56 ipsec payload seen: NOTIFY (28 bytes)
Feb/14/2022 18:40:56 ipsec payload seen: NOTIFY (28 bytes)
Feb/14/2022 18:40:56 ipsec payload seen: NOTIFY (8 bytes)
Feb/14/2022 18:40:56 ipsec payload seen: NOTIFY (8 bytes)
Feb/14/2022 18:40:56 ipsec processing payload: NONCE
Feb/14/2022 18:40:56 ipsec processing payload: SA
Feb/14/2022 18:40:56 ipsec IKE Protocol: IKE
Feb/14/2022 18:40:56 ipsec  proposal #1
Feb/14/2022 18:40:56 ipsec   enc: aes128-cbc
Feb/14/2022 18:40:56 ipsec   prf: hmac-sha1
Feb/14/2022 18:40:56 ipsec   auth: sha1
Feb/14/2022 18:40:56 ipsec   dh: modp1024
Feb/14/2022 18:40:56 ipsec matched proposal:
Feb/14/2022 18:40:56 ipsec  proposal #1
Feb/14/2022 18:40:56 ipsec   enc: aes128-cbc
Feb/14/2022 18:40:56 ipsec   prf: hmac-sha1
Feb/14/2022 18:40:56 ipsec   auth: sha1
Feb/14/2022 18:40:56 ipsec   dh: modp1024
Feb/14/2022 18:40:56 ipsec processing payload: KE
Feb/14/2022 18:40:56 ipsec,debug => shared secret (size 0x80)
Feb/14/2022 18:40:56 ipsec,debug 433299d1 e2e2315d 0a6fc44b 3af4f6f5 6d10fbd8 b4a8c396 9dc3e50b f216c748
Feb/14/2022 18:40:56 ipsec,debug 59a5562d 58bf9045 efb54f6a 8319de24 a011649d bc8e67fe e3d41035 c33add57
Feb/14/2022 18:40:56 ipsec,debug e6a4b4e2 1db147c6 83c22f31 726546fc 93a95d5b 397053dd f37c9f6f 689317aa
Feb/14/2022 18:40:56 ipsec,debug e5848842 96675e76 b84147a8 7075f0d5 7a944b26 adfdd82d 3c8b9259 c011151b
Feb/14/2022 18:40:56 ipsec,debug => skeyseed (size 0x14)
Feb/14/2022 18:40:56 ipsec,debug 04f66bee e33278ab 5efcd9d3 ce5eafa0 440d45d0
Feb/14/2022 18:40:56 ipsec,debug => keymat (size 0x14)
Feb/14/2022 18:40:56 ipsec,debug 467576a5 d745825a dea2f09c d3e7e151 b339216c
Feb/14/2022 18:40:56 ipsec,debug => SK_ai (size 0x14)
Feb/14/2022 18:40:56 ipsec,debug 8203d0e8 c6a22259 08f2bf1c 46a2b34b c7a20e96
Feb/14/2022 18:40:56 ipsec,debug => SK_ar (size 0x14)
Feb/14/2022 18:40:56 ipsec,debug e9ffacd0 42243f92 9e1e12db 97ac44a9 f78aba2d
Feb/14/2022 18:40:56 ipsec,debug => SK_ei (size 0x10)
Feb/14/2022 18:40:56 ipsec,debug 2e9f049e 048b9760 d1241fbd 086ef136
Feb/14/2022 18:40:56 ipsec,debug => SK_er (size 0x10)
Feb/14/2022 18:40:56 ipsec,debug e6ba4810 0d202c4f ecb8c8a9 c4bc5daa
Feb/14/2022 18:40:56 ipsec,debug => SK_pi (size 0x14)
Feb/14/2022 18:40:56 ipsec,debug fdaf22f6 bdb1a239 c197a61b 2370a086 764dc8d0
Feb/14/2022 18:40:56 ipsec,debug => SK_pr (size 0x14)
Feb/14/2022 18:40:56 ipsec,debug b7eb4393 a7c3b113 7b0b4d48 c34e3a42 1e7f3e16
Feb/14/2022 18:40:56 ipsec,info new ike2 SA (I): AWS 103.54.222.93[4500]-3.219.43.131[4500] spi:ca41ef2335817273:bfeb85fecca95f29
Feb/14/2022 18:40:56 ipsec processing payloads: NOTIFY
Feb/14/2022 18:40:56 ipsec   notify: NAT_DETECTION_SOURCE_IP
Feb/14/2022 18:40:56 ipsec   notify: NAT_DETECTION_DESTINATION_IP
Feb/14/2022 18:40:56 ipsec   notify: IKEV2_FRAGMENTATION_SUPPORTED
Feb/14/2022 18:40:56 ipsec   notify: MULTIPLE_AUTH_SUPPORTED
Feb/14/2022 18:40:56 ipsec (NAT-T) REMOTE 
Feb/14/2022 18:40:56 ipsec KA list add: 103.54.222.93[4500]->3.219.43.131[4500]
Feb/14/2022 18:40:56 ipsec fragmentation negotiated
Feb/14/2022 18:40:56 ipsec init child continue
Feb/14/2022 18:40:56 ipsec offering proto: 3
Feb/14/2022 18:40:56 ipsec  proposal #1
Feb/14/2022 18:40:56 ipsec   enc: aes128-cbc
Feb/14/2022 18:40:56 ipsec   auth: sha1
Feb/14/2022 18:40:56 ipsec ID_I (ADDR4): 103.54.222.93
Feb/14/2022 18:40:56 ipsec adding payload: ID_I
Feb/14/2022 18:40:56 ipsec,debug => (size 0xc)
Feb/14/2022 18:40:56 ipsec,debug 0000000c 01000000 6736de5d
Feb/14/2022 18:40:56 ipsec,debug => auth nonce (size 0x20)
Feb/14/2022 18:40:56 ipsec,debug 9c58d573 f87a7aee 5b53b385 0549e95b 03c46765 81b700c8 c8293889 8f8ff222
Feb/14/2022 18:40:56 ipsec,debug => SK_p (size 0x14)
Feb/14/2022 18:40:56 ipsec,debug fdaf22f6 bdb1a239 c197a61b 2370a086 764dc8d0
Feb/14/2022 18:40:56 ipsec,debug => idhash (size 0x14)
Feb/14/2022 18:40:56 ipsec,debug 756718dc 2b74270d 7a07423d 62742ee1 76ef4195
Feb/14/2022 18:40:56 ipsec,debug => my auth (size 0x14)
Feb/14/2022 18:40:56 ipsec,debug 757d9fb6 f5c33c67 0fb4e084 91508ed7 a9e1115d
Feb/14/2022 18:40:56 ipsec adding payload: AUTH
Feb/14/2022 18:40:56 ipsec,debug => (size 0x1c)
Feb/14/2022 18:40:56 ipsec,debug 0000001c 02000000 757d9fb6 f5c33c67 0fb4e084 91508ed7 a9e1115d
Feb/14/2022 18:40:56 ipsec adding notify: INITIAL_CONTACT
Feb/14/2022 18:40:56 ipsec,debug => (size 0x8)
Feb/14/2022 18:40:56 ipsec,debug 00000008 00004000
Feb/14/2022 18:40:56 ipsec adding payload: SA
Feb/14/2022 18:40:56 ipsec,debug => (size 0x2c)
Feb/14/2022 18:40:56 ipsec,debug 0000002c 00000028 01030403 075fddf2 0300000c 0100000c 800e0080 03000008
Feb/14/2022 18:40:56 ipsec,debug 03000002 00000008 05000000
Feb/14/2022 18:40:56 ipsec initiator selector: 103.54.222.93 
Feb/14/2022 18:40:56 ipsec adding payload: TS_I
Feb/14/2022 18:40:56 ipsec,debug => (size 0x18)
Feb/14/2022 18:40:56 ipsec,debug 00000018 01000000 07000010 0000ffff 6736de5d 6736de5d
Feb/14/2022 18:40:56 ipsec responder selector: 3.219.43.131 
Feb/14/2022 18:40:56 ipsec adding payload: TS_R
Feb/14/2022 18:40:56 ipsec,debug => (size 0x18)
Feb/14/2022 18:40:56 ipsec,debug 00000018 01000000 07000010 0000ffff 03db2b83 03db2b83
Feb/14/2022 18:40:56 ipsec adding notify: USE_TRANSPORT_MODE
Feb/14/2022 18:40:56 ipsec,debug => (size 0x8)
Feb/14/2022 18:40:56 ipsec,debug 00000008 00004007
Feb/14/2022 18:40:56 ipsec <- ike2 request, exchange: AUTH:1 3.219.43.131[4500] ca41ef2335817273:bfeb85fecca95f29
Feb/14/2022 18:40:56 ipsec,debug ===== sending 460 bytes from 103.54.222.93[4500] to 3.219.43.131[4500]
Feb/14/2022 18:40:56 ipsec,debug 1 times of 464 bytes message will be sent to 3.219.43.131[4500]
Feb/14/2022 18:40:56 ipsec,debug ===== received 124 bytes from 3.219.43.131[4500] to 103.54.222.93[4500]
Feb/14/2022 18:40:56 ipsec -> ike2 reply, exchange: AUTH:1 3.219.43.131[4500] ca41ef2335817273:bfeb85fecca95f29
Feb/14/2022 18:40:56 ipsec payload seen: ENC (96 bytes)
Feb/14/2022 18:40:56 ipsec processing payload: ENC
Feb/14/2022 18:40:56 ipsec,debug => iv (size 0x10)
Feb/14/2022 18:40:56 ipsec,debug 5e5e018e 0c60355f 49788f31 a9af6d6e
Feb/14/2022 18:40:56 ipsec,debug decrypted packet
Feb/14/2022 18:40:56 ipsec payload seen: ID_R (12 bytes)
Feb/14/2022 18:40:56 ipsec payload seen: AUTH (28 bytes)
Feb/14/2022 18:40:56 ipsec payload seen: NOTIFY (8 bytes)
Feb/14/2022 18:40:56 ipsec processing payloads: NOTIFY
Feb/14/2022 18:40:56 ipsec   notify: TS_UNACCEPTABLE
Feb/14/2022 18:40:56 ipsec ike auth: initiator finish
Feb/14/2022 18:40:56 ipsec processing payload: ID_R
Feb/14/2022 18:40:56 ipsec ID_R (ADDR4): 3.219.43.131
Feb/14/2022 18:40:56 ipsec processing payload: AUTH
Feb/14/2022 18:40:56 ipsec requested auth method: SKEY
Feb/14/2022 18:40:56 ipsec,debug => peer's auth (size 0x14)
Feb/14/2022 18:40:56 ipsec,debug ce7109e1 7742d991 94fa745b 20d3a3eb 5f109a2d
Feb/14/2022 18:40:56 ipsec,debug => auth nonce (size 0x18)
Feb/14/2022 18:40:56 ipsec,debug 13f956a6 061a9941 bedb64d0 dc0e01a7 cc4f33e1 4967a3de
Feb/14/2022 18:40:56 ipsec,debug => SK_p (size 0x14)
Feb/14/2022 18:40:56 ipsec,debug b7eb4393 a7c3b113 7b0b4d48 c34e3a42 1e7f3e16
Feb/14/2022 18:40:56 ipsec,debug => idhash (size 0x14)
Feb/14/2022 18:40:56 ipsec,debug c18f68c9 051320f1 a20d5e89 c670e6e9 48fc4ff0
Feb/14/2022 18:40:56 ipsec,debug => calculated peer's AUTH (size 0x14)
Feb/14/2022 18:40:56 ipsec,debug ce7109e1 7742d991 94fa745b 20d3a3eb 5f109a2d
Feb/14/2022 18:40:56 ipsec,info,account peer authorized: AWS 103.54.222.93[4500]-3.219.43.131[4500] spi:ca41ef2335817273:bfeb85fecca95f29
Feb/14/2022 18:40:56 ipsec processing payloads: NOTIFY
Feb/14/2022 18:40:56 ipsec   notify: TS_UNACCEPTABLE
Feb/14/2022 18:40:56 ipsec got error: TS_UNACCEPTABLE
Feb/14/2022 18:41:00 ipsec,debug KA: 103.54.222.93[4500]->3.219.43.131[4500]
Feb/14/2022 18:41:00 ipsec,debug 1 times of 1 bytes message will be sent to 3.219.43.131[4500]
Feb/14/2022 18:41:06 ipsec,debug ===== received 76 bytes from 3.219.43.131[4500] to 103.54.222.93[4500]
Feb/14/2022 18:41:06 ipsec -> ike2 request, exchange: INFORMATIONAL:0 3.219.43.131[4500] ca41ef2335817273:bfeb85fecca95f29
Feb/14/2022 18:41:06 ipsec payload seen: ENC (48 bytes)
Feb/14/2022 18:41:06 ipsec processing payload: ENC
Feb/14/2022 18:41:06 ipsec,debug => iv (size 0x10)
Feb/14/2022 18:41:06 ipsec,debug 63043e3b 12ebd2e2 2235cff4 6505af21
Feb/14/2022 18:41:06 ipsec,debug decrypted packet
Feb/14/2022 18:41:06 ipsec respond: info
Feb/14/2022 18:41:06 ipsec,debug sending empty reply
Feb/14/2022 18:41:06 ipsec <- ike2 reply, exchange: INFORMATIONAL:0 3.219.43.131[4500] ca41ef2335817273:bfeb85fecca95f29
Feb/14/2022 18:41:06 ipsec,debug ===== sending 108 bytes from 103.54.222.93[4500] to 3.219.43.131[4500]
Feb/14/2022 18:41:06 ipsec,debug 1 times of 112 bytes message will be sent to 3.219.43.131[4500]
Feb/14/2022 18:41:17 ipsec,debug ===== received 76 bytes from 3.219.43.131[4500] to 103.54.222.93[4500]
Feb/14/2022 18:41:17 ipsec -> ike2 request, exchange: INFORMATIONAL:1 3.219.43.131[4500] ca41ef2335817273:bfeb85fecca95f29
Feb/14/2022 18:41:17 ipsec payload seen: ENC (48 bytes)
Feb/14/2022 18:41:17 ipsec processing payload: ENC
Feb/14/2022 18:41:17 ipsec,debug => iv (size 0x10)
Feb/14/2022 18:41:17 ipsec,debug 7b5fbae2 7582ceed 86c7b754 4d666d60
Feb/14/2022 18:41:17 ipsec,debug decrypted packet
Feb/14/2022 18:41:17 ipsec respond: info
Feb/14/2022 18:41:17 ipsec,debug sending empty reply
Feb/14/2022 18:41:17 ipsec <- ike2 reply, exchange: INFORMATIONAL:1 3.219.43.131[4500] ca41ef2335817273:bfeb85fecca95f29
Feb/14/2022 18:41:17 ipsec,debug ===== sending 156 bytes from 103.54.222.93[4500] to 3.219.43.131[4500]
Feb/14/2022 18:41:17 ipsec,debug 1 times of 160 bytes message will be sent to 3.219.43.131[4500]
Feb/14/2022 18:41:20 ipsec,debug KA: 103.54.222.93[4500]->3.219.43.131[4500]
Feb/14/2022 18:41:20 ipsec,debug 1 times of 1 bytes message will be sent to 3.219.43.131[4500]
Feb/14/2022 18:41:28 ipsec,debug ===== received 76 bytes from 3.219.43.131[4500] to 103.54.222.93[4500]
Feb/14/2022 18:41:28 ipsec -> ike2 request, exchange: INFORMATIONAL:2 3.219.43.131[4500] ca41ef2335817273:bfeb85fecca95f29
Feb/14/2022 18:41:28 ipsec payload seen: ENC (48 bytes)
Feb/14/2022 18:41:28 ipsec processing payload: ENC
Feb/14/2022 18:41:28 ipsec,debug => iv (size 0x10)
Feb/14/2022 18:41:28 ipsec,debug 9be42f0f df3fa13f 45025f1c 3d85e4a7
Feb/14/2022 18:41:28 ipsec,debug decrypted packet
Feb/14/2022 18:41:28 ipsec respond: info
Feb/14/2022 18:41:28 ipsec,debug sending empty reply
Feb/14/2022 18:41:28 ipsec <- ike2 reply, exchange: INFORMATIONAL:2 3.219.43.131[4500] ca41ef2335817273:bfeb85fecca95f29
Feb/14/2022 18:41:28 ipsec,debug ===== sending 124 bytes from 103.54.222.93[4500] to 3.219.43.131[4500]
Feb/14/2022 18:41:28 ipsec,debug 1 times of 128 bytes message will be sent to 3.219.43.131[4500]
Feb/14/2022 18:41:30 ipsec,info killing ike2 SA: AWS 103.54.222.93[4500]-3.219.43.131[4500] spi:ca41ef2335817273:bfeb85fecca95f29
Feb/14/2022 18:41:30 ipsec adding payload: DELETE
Feb/14/2022 18:41:30 ipsec,debug => (size 0x8)
Feb/14/2022 18:41:30 ipsec,debug 00000008 01000000
Feb/14/2022 18:41:30 ipsec <- ike2 request, exchange: INFORMATIONAL:2 3.219.43.131[4500] ca41ef2335817273:bfeb85fecca95f29
Feb/14/2022 18:41:30 ipsec,debug ===== sending 284 bytes from 103.54.222.93[4500] to 3.219.43.131[4500]
Feb/14/2022 18:41:30 ipsec,debug 1 times of 288 bytes message will be sent to 3.219.43.131[4500]
Feb/14/2022 18:41:30 ipsec KA remove: 103.54.222.93[4500]->3.219.43.131[4500]
Feb/14/2022 18:41:30 ipsec,debug KA tree dump: 103.54.222.93[4500]->3.219.43.131[4500] (in_use=1)
Feb/14/2022 18:41:30 ipsec,debug KA removing this one...
 
User avatar
sindy
Forum Guru
Forum Guru
Posts: 11126
Joined: Mon Dec 04, 2017 9:19 pm

Re: Site-To-Site VPN AWS problem

Mon Feb 14, 2022 3:21 pm

in template src-address and dst-address should not be changed?
Not in the template, but maybe in the static policy after all - I have missed that in the original log, the highlighted part was a response from AWS to our suggestion for 0.0.0.0/0<->0.0.0.0/0, so the meaning of the TS_I and TS_R fields was reverse. So set generate-policy on the identity row back to no, swap the subnets in dst-address and src-address of the manually configured policy, and enable it again.
 
mankomal
Member Candidate
Member Candidate
Topic Author
Posts: 106
Joined: Fri Nov 24, 2006 8:56 am

Re: Site-To-Site VPN AWS problem

Tue Feb 15, 2022 3:19 pm

in template src-address and dst-address should not be changed?
Not in the template, but maybe in the static policy after all - I have missed that in the original log, the highlighted part was a response from AWS to our suggestion for 0.0.0.0/0<->0.0.0.0/0, so the meaning of the TS_I and TS_R fields was reverse. So set generate-policy on the identity row back to no, swap the subnets in dst-address and src-address of the manually configured policy, and enable it again.
So when you say swap the subnets that means a fresh policy at MT end will be:
SRC - 172.31.0.0/16 (AWS Subnet) and DST - 10.10.10.0/24 (MT Subnet)
 
User avatar
sindy
Forum Guru
Forum Guru
Posts: 11126
Joined: Mon Dec 04, 2017 9:19 pm

Re: Site-To-Site VPN AWS problem

Tue Feb 15, 2022 3:20 pm

If so, that would be wrong. DST at Mikrotik must be the AWS subnet and SRC at Mikrotik must be the remote subnet.
 
mankomal
Member Candidate
Member Candidate
Topic Author
Posts: 106
Joined: Fri Nov 24, 2006 8:56 am

Re: Site-To-Site VPN AWS problem

Tue Feb 15, 2022 4:28 pm

If so, that would be wrong. DST at Mikrotik must be the AWS subnet and SRC at Mikrotik must be the remote subnet.
Yea I thought so but your last post said invert src and dst so reconfirming if I understood correctly

Ok I will try with proper src and dst and post config and logs
 
User avatar
sindy
Forum Guru
Forum Guru
Posts: 11126
Joined: Mon Dec 04, 2017 9:19 pm

Re: Site-To-Site VPN AWS problem

Tue Feb 15, 2022 4:30 pm

your last post said invert src and dst so reconfirming if I understood correctly
It only said so because you've apparently already tried with the correct src and dst and it failed, and you haven't given any details regarding which of the subnets is at which end until the previous post, so I wasn't sure.
 
mankomal
Member Candidate
Member Candidate
Topic Author
Posts: 106
Joined: Fri Nov 24, 2006 8:56 am

Re: Site-To-Site VPN AWS problem

Tue Feb 15, 2022 4:34 pm

your last post said invert src and dst so reconfirming if I understood correctly
It only said so because you've apparently already tried with the correct src and dst and it failed, and you haven't given any details regarding which of the subnets is at which end until the previous post, so I wasn't sure.
Ok i will post the whole thing config and logs

Who is online

Users browsing this forum: BartoszP, bugacha, Elvis1991 and 35 guests