Hello misc@

Found. The ping request generated by the first client get a ping reply
routed by iked to the second host.

Reversing the flow selector in iked.conf do the job correctly.
inet from y.y.y.y/24 to 0.0.0.0/0, where y.y.y.y/24 is the range of the
internal LAN.

Thanks a lot for your help.

== find below the iked.conf which works

# cat /etc/iked.conf
ikev2 "XXX" quick passive esp \
        inet from y.y.y.y/24 to 0.0.0.0/0 \
        ikesa enc aes-256 prf hmac-sha2-256 auth hmac-sha2-256 group
modp2048 \
        childsa enc aes-256 auth hmac-sha2-256 group modp2048 \
        local a.a.a.a peer any \
        srcid b.b.b.b \
        config address x.x.x.x/27



regards.
C.

On 07/14/2015 10:02 AM, Christophe Ternat wrote:
> Hello @misc
>
> I've set up a remote access with iked on OpenBSD 5.7-stable and several
> MS clients. When a second client connects the remote access, the flow of
> the first one is dropped (something like 1 packet of 100 comes to enc0).
> Clients are on windows 8.1 with the default VPN client.
>
> Any idea on how to troubleshoot this?
>
> suspect something around flow replacement (here is logs of iked):
> [...]
> ikev2_childsa_enable: loaded CHILD SA spi 0x9d5e19c4
> ikev2_childsa_enable: replaced old flow 0x8fe6dc86400 with 0x8fefa32ec00
> ikev2_childsa_enable: loaded flow 0x8fefa32ec00
> ikev2_childsa_enable: replaced old flow 0x8ff01226c00 with 0x8ff01223800
> ikev2_childsa_enable: loaded flow 0x8ff01223800
> [...]
>
> Please find below several configuration files and logs.
> ===
> # cat /etc/iked.conf
> ikev2 "XXX" quick passive esp \
>         inet from 0.0.0.0/0 to x.x.x.x/24 \
>         ikesa enc aes-256 prf hmac-sha2-256 auth hmac-sha2-256 group
> modp2048 \
>         childsa enc aes-256 auth hmac-sha2-256 group modp2048 \
>         local a.a.a.a peer any \
>         srcid b.b.b.b \
>         config address x.x.x.x/27
> ===
> cat /etc/pf.conf
> set block-policy drop
> set loginterface egress
> set state-policy if-bound
> set fingerprints "/etc/pf.os"
> set reassemble yes
> set skip on { lo, enc }
> match in all scrub (no-df random-id max-mss 1440)
>
> pass  in quick on egress proto udp to egress port {isakmp, ipsec-nat-t}
> modulate state
> pass  in quick on egress proto {ah, esp} to egress modulate state
> pass out quick on egress proto {icmp,tcp,udp} from x.x.x.x/24 modulate state
>
> block  in log quick all
> block out log quick all
>
> ===
> # sysctl -a
> [...]
> net.inet.ip.forwarding=1
> net.inet.ipcomp.enable=1
> net.inet.esp.enable=1
> net.inet.ah.enable=1
> [...]
>
> ===
> # ipsecctl -sa
> FLOWS:
> flow esp in from x.x.x.x/24 to 0.0.0.0/0 peer c.c.c.c srcid IPV4/b.b.b.b
> type use
> flow esp out from 0.0.0.0/0 to x.x.x.x/24 peer c.c.c.c srcid
> IPV4/b.b.b.b type require
> flow esp out from ::/0 to ::/0 type deny
>
> SAD:
> esp tunnel from c.c.c.c to a.a.a.a spi 0x468a14be auth hmac-sha2-256 enc
> aes-256
> esp tunnel from a.a.a.a to c.c.c.c spi 0x9ddf6c16 auth hmac-sha2-256 enc
> aes-256
> esp tunnel from a.a.a.a to c.c.c.c spi 0xd5b9f060 auth hmac-sha2-256 enc
> aes-256
> esp tunnel from c.c.c.c to a.a.a.a spi 0xf4cdc4f2 auth hmac-sha2-256 enc
> aes-256
>
>
> ===
> # /sbin/iked -dvv
> /etc/iked.conf: loaded 1 configuration rules
> config_getpolicy: received policy
> ikev2 "XXXX" quick passive esp inet from 0.0.0.0/0 to x.x.x.x/24 local
> a.a.a.a peer any ikesa enc aes-256 prf hmac-sha2-256 auth hmac-sha2-256
> group modp2048 childsa enc aes-256 auth hmac-sha2-256 group modp2048
> srcid b.b.b.b lifetime 10800 bytes 536870912 rsa config address x.x.x.x
> ca_reload: loaded ca file ca.crt
> config_getpfkey: received pfkey fd 3
> config_getcompile: compilation done
> config_getsocket: received socket fd 4
> config_getsocket: received socket fd 5
> ca_reload: loaded crl file ca.crl
> config_getsocket: received socket fd 7
> ca_reload:
> /C=FR/ST=somewhere/L=somewhere/O=something/OU=something/CN=VPN
> CA/emailAddress=email
> config_getsocket: received socket fd 8
> ca_reload: loaded 1 ca certificate
> ca_reload: loaded cert file a.a.a.a.crt
> ca_reload: loaded cert file b.b.b.b.crt
> ca_validate_cert:
> /C=FR/ST=somewhere/L=somewhere/O=something/OU=something/CN=a.a.a.a/emailAddress=email
> ok
> ca_validate_cert:
> /C=FR/ST=somewhere/L=somewhere/O=something/OU=something/CN=b.b.b.b/emailAddress=email
> ok
> ca_reload: local cert type X509_CERT
> config_getocsp: ocsp_url none
> ikev2_dispatch_cert: updated local CERTREQ type X509_CERT length 20
> ikev2_dispatch_cert: updated local CERTREQ type X509_CERT length 20
> ikev2_recv: INFORMATIONAL request from initiator c.c.c.c:61646 to
> a.a.a.a:4500 policy 'XXXX' id 6, 80 bytes
> ikev2_recv: ispi 0x6ad134a575f00a4d rspi 0x2e3cb2094bf70da2
> ikev2_recv: INFORMATIONAL request from initiator c.c.c.c:61646 to
> a.a.a.a:4500 policy 'XXXX' id 6, 80 bytes
> ikev2_recv: ispi 0x6ad134a575f00a4d rspi 0x2e3cb2094bf70da2
> ikev2_recv: IKE_SA_INIT request from initiator c.c.c.c:50701 to
> a.a.a.a:500 policy 'XXXX' id 0, 536 bytes
> ikev2_recv: ispi 0xba258ebbe9a1f1cd rspi 0x0000000000000000
> ikev2_policy2id: srcid IPV4/b.b.b.b length 8
> ikev2_pld_parse: header ispi 0xba258ebbe9a1f1cd rspi 0x0000000000000000
> nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x08 msgid 0
> length 536 response 0
> ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 48
> ikev2_pld_sa: more 0 reserved 0 length 44 proposal #1 protoid IKE
> spisize 0 xforms 4 spi 0
> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256
> ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048
> ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 264
> ikev2_pld_ke: dh group MODP_2048 reserved 0
> ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 52
> ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00
> length 28
> ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP
> ikev2_nat_detection: peer source 0xba258ebbe9a1f1cd 0x0000000000000000
> c.c.c.c:50701
> ikev2_pld_notify: NAT_DETECTION_SOURCE_IP detected NAT, enabling UDP
> encapsulation
> ikev2_pld_payloads: payload NOTIFY nextpayload VENDOR critical 0x00
> length 28
> ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP
> ikev2_nat_detection: peer destination 0xba258ebbe9a1f1cd
> 0x0000000000000000 a.a.a.a:500
> ikev2_pld_notify: NAT_DETECTION_DESTINATION_IP detected NAT, enabling
> UDP encapsulation
> ikev2_pld_payloads: payload VENDOR nextpayload VENDOR critical 0x00
> length 24
> ikev2_pld_payloads: payload VENDOR nextpayload VENDOR critical 0x00
> length 20
> ikev2_pld_payloads: payload VENDOR nextpayload VENDOR critical 0x00
> length 20
> ikev2_pld_payloads: payload VENDOR nextpayload NONE critical 0x00 length 24
> sa_state: INIT -> SA_INIT
> ikev2_sa_negotiate: score 4
> sa_stateok: SA_INIT flags 0x00, require 0x00
> sa_stateflags: 0x00 -> 0x10 sa (required 0x00 )
> ikev2_sa_keys: SKEYSEED with 32 bytes
> ikev2_sa_keys: S with 96 bytes
> ikev2_prfplus: T1 with 32 bytes
> ikev2_prfplus: T2 with 32 bytes
> ikev2_prfplus: T3 with 32 bytes
> ikev2_prfplus: T4 with 32 bytes
> ikev2_prfplus: T5 with 32 bytes
> ikev2_prfplus: T6 with 32 bytes
> ikev2_prfplus: T7 with 32 bytes
> ikev2_prfplus: Tn with 224 bytes
> ikev2_sa_keys: SK_d with 32 bytes
> ikev2_sa_keys: SK_ai with 32 bytes
> ikev2_sa_keys: SK_ar with 32 bytes
> ikev2_sa_keys: SK_ei with 32 bytes
> ikev2_sa_keys: SK_er with 32 bytes
> ikev2_sa_keys: SK_pi with 32 bytes
> ikev2_sa_keys: SK_pr with 32 bytes
> ikev2_add_proposals: length 44
> ikev2_next_payload: length 48 nextpayload KE
> ikev2_next_payload: length 264 nextpayload NONCE
> ikev2_next_payload: length 36 nextpayload NOTIFY
> ikev2_nat_detection: local source 0xba258ebbe9a1f1cd 0xa320d35dbe67c24b
> a.a.a.a:500
> ikev2_next_payload: length 28 nextpayload NOTIFY
> ikev2_nat_detection: local destination 0xba258ebbe9a1f1cd
> 0xa320d35dbe67c24b c.c.c.c:50701
> ikev2_next_payload: length 28 nextpayload CERTREQ
> ikev2_add_certreq: type X509_CERT length 21
> ikev2_next_payload: length 25 nextpayload NONE
> ikev2_pld_parse: header ispi 0xba258ebbe9a1f1cd rspi 0xa320d35dbe67c24b
> nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x20 msgid 0
> length 457 response 1
> ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 48
> ikev2_pld_sa: more 0 reserved 0 length 44 proposal #1 protoid IKE
> spisize 0 xforms 4 spi 0
> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256
> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
> ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048
> ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 264
> ikev2_pld_ke: dh group MODP_2048 reserved 0
> ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 36
> ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00
> length 28
> ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP
> ikev2_pld_payloads: payload NOTIFY nextpayload CERTREQ critical 0x00
> length 28
> ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP
> ikev2_pld_payloads: payload CERTREQ nextpayload NONE critical 0x00 length 25
> ikev2_pld_certreq: type X509_CERT length 20
> ikev2_msg_send: IKE_SA_INIT response from a.a.a.a:500 to c.c.c.c:50701
> msgid 0, 457 bytes
> config_free_proposals: free 0x8fedb02a300
> ikev2_recv: IKE_AUTH request from initiator c.c.c.c:61646 to
> a.a.a.a:4500 policy 'XXXX' id 1, 1984 bytes
> ikev2_recv: ispi 0xba258ebbe9a1f1cd rspi 0xa320d35dbe67c24b
> ikev2_recv: updated SA to peer c.c.c.c:61646 local a.a.a.a:4500
> ikev2_pld_parse: header ispi 0xba258ebbe9a1f1cd rspi 0xa320d35dbe67c24b
> nextpayload SK version 0x20 exchange IKE_AUTH flags 0x08 msgid 1 length
> 1984 response 0
> ikev2_pld_payloads: payload SK nextpayload IDi critical 0x00 length 1956
> ikev2_msg_decrypt: IV length 16
> ikev2_msg_decrypt: encrypted payload length 1920
> ikev2_msg_decrypt: integrity checksum length 16
> ikev2_msg_decrypt: integrity check succeeded
> ikev2_msg_decrypt: decrypted payload length 1920/1920 padding 8
> ikev2_pld_payloads: decrypted payload IDi nextpayload CERT critical 0x00
> length 150
> ikev2_pld_id: id
> ASN1_DN//C=FR/ST=somewhere/L=somewhere/O=something/OU=something/CN=w8/emailAddress=email
> length 146
> ikev2_pld_payloads: decrypted payload CERT nextpayload CERTREQ critical
> 0x00 length 1016
> ikev2_pld_cert: type X509_CERT length 1011
> ikev2_pld_payloads: decrypted payload CERTREQ nextpayload AUTH critical
> 0x00 length 265
> ikev2_pld_certreq: type X509_CERT length 260
> ikev2_policy2id: srcid IPV4/b.b.b.b length 8
> ikev2_pld_payloads: decrypted payload AUTH nextpayload NOTIFY critical
> 0x00 length 264
> ikev2_pld_auth: method RSA_SIG length 256
> sa_state: SA_INIT -> AUTH_REQUEST
> ikev2_pld_payloads: decrypted payload NOTIFY nextpayload CP critical
> 0x00 length 8
> ikev2_pld_notify: protoid NONE spisize 0 type MOBIKE_SUPPORTED
> ikev2_pld_payloads: decrypted payload CP nextpayload SA critical 0x00
> length 36
> ikev2_pld_cp: type REQUEST length 28
> ikev2_pld_cp: INTERNAL_IP4_ADDRESS 0x0001 length 0
> ikev2_pld_cp: INTERNAL_IP4_DNS 0x0003 length 0
> ikev2_pld_cp: INTERNAL_IP4_NBNS 0x0004 length 0
> ikev2_pld_cp: INTERNAL_IP4_SERVER 0x5ba0 length 0
> ikev2_pld_cp: INTERNAL_IP6_ADDRESS 0x0008 length 0
> ikev2_pld_cp: INTERNAL_IP6_DNS 0x000a length 0
> ikev2_pld_cp: INTERNAL_IP6_SERVER 0x5ba1 length 0
> ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00
> length 44
> ikev2_pld_sa: more 0 reserved 0 length 40 proposal #1 protoid ESP
> spisize 4 xforms 3 spi 0x65829f20
> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
> ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE
> ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00
> length 64
> ikev2_pld_ts: count 2 length 56
> ikev2_pld_ts: type IPV6_ADDR_RANGE protoid 0 length 40 startport 0
> endport 65535
> ikev2_pld_ts: start :: end ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
> ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0
> endport 65535
> ikev2_pld_ts: start 0.0.0.0 end 255.255.255.255
> ikev2_pld_payloads: decrypted payload TSr nextpayload NONE critical 0x00
> length 64
> ikev2_pld_ts: count 2 length 56
> ikev2_pld_ts: type IPV6_ADDR_RANGE protoid 0 length 40 startport 0
> endport 65535
> ikev2_pld_ts: start :: end ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
> ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0
> endport 65535
> ikev2_pld_ts: start 0.0.0.0 end 255.255.255.255
> ikev2_resp_recv: NAT-T message received, updated SA
> sa_stateok: SA_INIT flags 0x00, require 0x00
> policy_lookup: peerid
> '/C=FR/ST=somewhere/L=somewhere/O=something/OU=something/CN=w8/emailAddress=email'
> ikev2_msg_auth: responder auth data length 537
> ca_setauth: auth length 537
> ikev2_msg_auth: initiator auth data length 600
> ikev2_msg_authverify: method RSA_SIG keylen 1011 type X509_CERT
> ikev2_msg_authverify: authentication successful
> sa_state: AUTH_REQUEST -> AUTH_SUCCESS
> sa_stateflags: 0x10 -> 0x18 authvalid,sa (required 0x1f
> cert,certvalid,auth,authvalid,sa)
> ikev2_sa_negotiate: score 4
> sa_stateflags: 0x18 -> 0x18 authvalid,sa (required 0x1f
> cert,certvalid,auth,authvalid,sa)
> sa_stateok: VALID flags 0x18, require 0x1f cert,certvalid,auth,authvalid,sa
> sa_state: cannot switch: AUTH_SUCCESS -> VALID
> config_free_proposals: free 0x8ff4dd1e580
> ca_getreq: found CA
> /C=FR/ST=somewhere/L=somewhere/O=something/OU=something/CN=VPN
> CA/emailAddress=email
> ca_x509_subjectaltname: IPV4/a.a.a.a
> ca_x509_subjectaltname_cmp: IPV4/a.a.a.a mismatched
> ca_x509_subjectaltname: IPV4/b.b.b.b
> ca_getreq: found local certificate
> /C=FR/ST=somewhere/L=somewhere/O=something/OU=something/CN=b.b.b.b/emailAddress=email
> ca_setauth: auth length 256
> ca_validate_cert:
> /C=FR/ST=somewhere/L=somewhere/O=something/OU=something/CN=w8/emailAddress=email
> ok
> ikev2_getimsgdata: imsg 18 rspi 0xa320d35dbe67c24b ispi
> 0xba258ebbe9a1f1cd initiator 0 sa valid type 4 data length 1025
> ikev2_dispatch_cert: cert type X509_CERT length 1025, ok
> sa_stateflags: 0x18 -> 0x19 cert,authvalid,sa (required 0x1f
> cert,certvalid,auth,authvalid,sa)
> sa_stateok: VALID flags 0x19, require 0x1f cert,certvalid,auth,authvalid,sa
> sa_state: cannot switch: AUTH_SUCCESS -> VALID
> ikev2_getimsgdata: imsg 23 rspi 0xa320d35dbe67c24b ispi
> 0xba258ebbe9a1f1cd initiator 0 sa valid type 1 data length 256
> ikev2_dispatch_cert: AUTH type 1 len 256
> sa_stateflags: 0x19 -> 0x1d cert,auth,authvalid,sa (required 0x1f
> cert,certvalid,auth,authvalid,sa)
> sa_stateok: VALID flags 0x1d, require 0x1f cert,certvalid,auth,authvalid,sa
> sa_state: cannot switch: AUTH_SUCCESS -> VALID
> ikev2_dispatch_cert: peer certificate is valid
> sa_stateflags: 0x1d -> 0x1f cert,certvalid,auth,authvalid,sa (required
> 0x1f cert,certvalid,auth,authvalid,sa)
> sa_stateok: VALID flags 0x1f, require 0x1f cert,certvalid,auth,authvalid,sa
> sa_state: AUTH_SUCCESS -> VALID
> sa_stateok: VALID flags 0x1f, require 0x1f cert,certvalid,auth,authvalid,sa
> ikev2_cp_setaddr: mask e0ffffff start 5 lower 1 host 5 upper 1f
> sa_stateok: VALID flags 0x1f, require 0x1f cert,certvalid,auth,authvalid,sa
> ikev2_sa_tag: IKED (4)
> ikev2_childsa_negotiate: proposal 1
> ikev2_childsa_negotiate: key material length 128
> ikev2_prfplus: T1 with 32 bytes
> ikev2_prfplus: T2 with 32 bytes
> ikev2_prfplus: T3 with 32 bytes
> ikev2_prfplus: T4 with 32 bytes
> ikev2_prfplus: Tn with 128 bytes
> pfkey_sa_getspi: spi 0xdf4cbb16
> pfkey_sa_init: new spi 0xdf4cbb16
> sa_stateok: VALID flags 0x1f, require 0x1f cert,certvalid,auth,authvalid,sa
> ikev2_next_payload: length 12 nextpayload CERT
> ikev2_next_payload: length 1030 nextpayload AUTH
> ikev2_next_payload: length 264 nextpayload CP
> ikev2_next_payload: length 24 nextpayload SA
> ikev2_add_proposals: length 40
> ikev2_next_payload: length 44 nextpayload TSi
> ikev2_next_payload: length 24 nextpayload TSr
> ikev2_next_payload: length 24 nextpayload NONE
> ikev2_msg_encrypt: decrypted length 1422
> ikev2_msg_encrypt: padded length 1424
> ikev2_msg_encrypt: length 1423, padding 1, output length 1456
> ikev2_next_payload: length 1460 nextpayload IDr
> ikev2_msg_integr: message length 1488
> ikev2_msg_integr: integrity checksum length 16
> ikev2_pld_parse: header ispi 0xba258ebbe9a1f1cd rspi 0xa320d35dbe67c24b
> nextpayload SK version 0x20 exchange IKE_AUTH flags 0x20 msgid 1 length
> 1488 response 1
> ikev2_pld_payloads: payload SK nextpayload IDr critical 0x00 length 1460
> ikev2_msg_decrypt: IV length 16
> ikev2_msg_decrypt: encrypted payload length 1424
> ikev2_msg_decrypt: integrity checksum length 16
> ikev2_msg_decrypt: integrity check succeeded
> ikev2_msg_decrypt: decrypted payload length 1424/1424 padding 1
> ikev2_pld_payloads: decrypted payload IDr nextpayload CERT critical 0x00
> length 12
> ikev2_pld_id: id IPV4/b.b.b.b length 8
> ikev2_pld_payloads: decrypted payload CERT nextpayload AUTH critical
> 0x00 length 1030
> ikev2_pld_cert: type X509_CERT length 1025
> ikev2_pld_payloads: decrypted payload AUTH nextpayload CP critical 0x00
> length 264
> ikev2_pld_auth: method RSA_SIG length 256
> ikev2_pld_payloads: decrypted payload CP nextpayload SA critical 0x00
> length 24
> ikev2_pld_cp: type REPLY length 16
> ikev2_pld_cp: INTERNAL_IP4_ADDRESS 0x0001 length 4
> ikev2_pld_cp: INTERNAL_IP4_DNS 0x0003 length 4
> ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00
> length 44
> ikev2_pld_sa: more 0 reserved 0 length 40 proposal #1 protoid ESP
> spisize 4 xforms 3 spi 0xdf4cbb16
> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
> ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE
> ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00
> length 24
> ikev2_pld_ts: count 1 length 16
> ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0
> endport 65535
> ikev2_pld_ts: start x.x.x.x end x.x.x.255
> ikev2_pld_payloads: decrypted payload TSr nextpayload NONE critical 0x00
> length 24
> ikev2_pld_ts: count 1 length 16
> ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0
> endport 65535
> ikev2_pld_ts: start 0.0.0.0 end 255.255.255.255
> ikev2_msg_send: IKE_AUTH response from a.a.a.a:4500 to c.c.c.c:61646
> msgid 1, 1488 bytes, NAT-T
> pfkey_sa_add: update spi 0xdf4cbb16
> pfkey_sa: udpencap port 61646
> ikev2_childsa_enable: loaded CHILD SA spi 0xdf4cbb16
> pfkey_sa_add: add spi 0x65829f20
> pfkey_sa: udpencap port 61646
> ikev2_childsa_enable: loaded CHILD SA spi 0x65829f20
> ikev2_childsa_enable: loaded flow 0x8fe6dc86400
> ikev2_childsa_enable: loaded flow 0x8ff01226c00
> sa_state: VALID -> ESTABLISHED from c.c.c.c:61646 to a.a.a.a:4500 policy
> 'XXXX'
> ikev2_recv: INFORMATIONAL request from initiator c.c.c.c:61646 to
> a.a.a.a:4500 policy 'XXXX' id 6, 80 bytes
> ikev2_recv: ispi 0x6ad134a575f00a4d rspi 0x2e3cb2094bf70da2
> ikev2_recv: INFORMATIONAL request from initiator c.c.c.c:58838 to
> a.a.a.a:4500 policy 'XXXX' id 4, 80 bytes
> ikev2_recv: ispi 0x51ce221bd9f537ca rspi 0x69dad45d8cc67c17
> ikev2_recv: INFORMATIONAL request from initiator c.c.c.c:61646 to
> a.a.a.a:4500 policy 'XXXX' id 6, 80 bytes
> ikev2_recv: ispi 0x6ad134a575f00a4d rspi 0x2e3cb2094bf70da2
> ikev2_recv: INFORMATIONAL request from initiator c.c.c.c:58838 to
> a.a.a.a:4500 policy 'XXXX' id 4, 80 bytes
> ikev2_recv: ispi 0x51ce221bd9f537ca rspi 0x69dad45d8cc67c17
> ikev2_recv: INFORMATIONAL request from initiator c.c.c.c:58838 to
> a.a.a.a:4500 policy 'XXXX' id 4, 80 bytes
> ikev2_recv: ispi 0x51ce221bd9f537ca rspi 0x69dad45d8cc67c17
> ikev2_recv: INFORMATIONAL request from initiator c.c.c.c:58838 to
> a.a.a.a:4500 policy 'XXXX' id 4, 80 bytes
> ikev2_recv: ispi 0x51ce221bd9f537ca rspi 0x69dad45d8cc67c17
> ikev2_recv: IKE_SA_INIT request from initiator c.c.c.c:59846 to
> a.a.a.a:500 policy 'XXXX' id 0, 536 bytes
> ikev2_recv: ispi 0x562d03e53c773ab6 rspi 0x0000000000000000
> ikev2_policy2id: srcid IPV4/b.b.b.b length 8
> ikev2_pld_parse: header ispi 0x562d03e53c773ab6 rspi 0x0000000000000000
> nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x08 msgid 0
> length 536 response 0
> ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 48
> ikev2_pld_sa: more 0 reserved 0 length 44 proposal #1 protoid IKE
> spisize 0 xforms 4 spi 0
> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256
> ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048
> ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 264
> ikev2_pld_ke: dh group MODP_2048 reserved 0
> ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 52
> ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00
> length 28
> ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP
> ikev2_nat_detection: peer source 0x562d03e53c773ab6 0x0000000000000000
> c.c.c.c:59846
> ikev2_pld_notify: NAT_DETECTION_SOURCE_IP detected NAT, enabling UDP
> encapsulation
> ikev2_pld_payloads: payload NOTIFY nextpayload VENDOR critical 0x00
> length 28
> ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP
> ikev2_nat_detection: peer destination 0x562d03e53c773ab6
> 0x0000000000000000 a.a.a.a:500
> ikev2_pld_notify: NAT_DETECTION_DESTINATION_IP detected NAT, enabling
> UDP encapsulation
> ikev2_pld_payloads: payload VENDOR nextpayload VENDOR critical 0x00
> length 24
> ikev2_pld_payloads: payload VENDOR nextpayload VENDOR critical 0x00
> length 20
> ikev2_pld_payloads: payload VENDOR nextpayload VENDOR critical 0x00
> length 20
> ikev2_pld_payloads: payload VENDOR nextpayload NONE critical 0x00 length 24
> sa_state: INIT -> SA_INIT
> ikev2_sa_negotiate: score 4
> sa_stateok: SA_INIT flags 0x00, require 0x00
> sa_stateflags: 0x00 -> 0x10 sa (required 0x00 )
> ikev2_sa_keys: SKEYSEED with 32 bytes
> ikev2_sa_keys: S with 96 bytes
> ikev2_prfplus: T1 with 32 bytes
> ikev2_prfplus: T2 with 32 bytes
> ikev2_prfplus: T3 with 32 bytes
> ikev2_prfplus: T4 with 32 bytes
> ikev2_prfplus: T5 with 32 bytes
> ikev2_prfplus: T6 with 32 bytes
> ikev2_prfplus: T7 with 32 bytes
> ikev2_prfplus: Tn with 224 bytes
> ikev2_sa_keys: SK_d with 32 bytes
> ikev2_sa_keys: SK_ai with 32 bytes
> ikev2_sa_keys: SK_ar with 32 bytes
> ikev2_sa_keys: SK_ei with 32 bytes
> ikev2_sa_keys: SK_er with 32 bytes
> ikev2_sa_keys: SK_pi with 32 bytes
> ikev2_sa_keys: SK_pr with 32 bytes
> ikev2_add_proposals: length 44
> ikev2_next_payload: length 48 nextpayload KE
> ikev2_next_payload: length 264 nextpayload NONCE
> ikev2_next_payload: length 36 nextpayload NOTIFY
> ikev2_nat_detection: local source 0x562d03e53c773ab6 0xe05591f1cc45d3d7
> a.a.a.a:500
> ikev2_next_payload: length 28 nextpayload NOTIFY
> ikev2_nat_detection: local destination 0x562d03e53c773ab6
> 0xe05591f1cc45d3d7 c.c.c.c:59846
> ikev2_next_payload: length 28 nextpayload CERTREQ
> ikev2_add_certreq: type X509_CERT length 21
> ikev2_next_payload: length 25 nextpayload NONE
> ikev2_pld_parse: header ispi 0x562d03e53c773ab6 rspi 0xe05591f1cc45d3d7
> nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x20 msgid 0
> length 457 response 1
> ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 48
> ikev2_pld_sa: more 0 reserved 0 length 44 proposal #1 protoid IKE
> spisize 0 xforms 4 spi 0
> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256
> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
> ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048
> ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 264
> ikev2_pld_ke: dh group MODP_2048 reserved 0
> ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 36
> ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00
> length 28
> ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP
> ikev2_pld_payloads: payload NOTIFY nextpayload CERTREQ critical 0x00
> length 28
> ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP
> ikev2_pld_payloads: payload CERTREQ nextpayload NONE critical 0x00 length 25
> ikev2_pld_certreq: type X509_CERT length 20
> ikev2_msg_send: IKE_SA_INIT response from a.a.a.a:500 to c.c.c.c:59846
> msgid 0, 457 bytes
> config_free_proposals: free 0x8fedb02a400
> ikev2_recv: IKE_AUTH request from initiator c.c.c.c:58838 to
> a.a.a.a:4500 policy 'XXXX' id 1, 1984 bytes
> ikev2_recv: ispi 0x562d03e53c773ab6 rspi 0xe05591f1cc45d3d7
> ikev2_recv: updated SA to peer c.c.c.c:58838 local a.a.a.a:4500
> ikev2_pld_parse: header ispi 0x562d03e53c773ab6 rspi 0xe05591f1cc45d3d7
> nextpayload SK version 0x20 exchange IKE_AUTH flags 0x08 msgid 1 length
> 1984 response 0
> ikev2_pld_payloads: payload SK nextpayload IDi critical 0x00 length 1956
> ikev2_msg_decrypt: IV length 16
> ikev2_msg_decrypt: encrypted payload length 1920
> ikev2_msg_decrypt: integrity checksum length 16
> ikev2_msg_decrypt: integrity check succeeded
> ikev2_msg_decrypt: decrypted payload length 1920/1920 padding 2
> ikev2_pld_payloads: decrypted payload IDi nextpayload CERT critical 0x00
> length 152
> ikev2_pld_id: id
> ASN1_DN//C=FR/ST=somewhere/L=somewhere/O=something/OU=something/CN=w8-2/emailAddress=email
> length 148
> ikev2_pld_payloads: decrypted payload CERT nextpayload CERTREQ critical
> 0x00 length 1020
> ikev2_pld_cert: type X509_CERT length 1015
> ikev2_pld_payloads: decrypted payload CERTREQ nextpayload AUTH critical
> 0x00 length 265
> ikev2_pld_certreq: type X509_CERT length 260
> ikev2_policy2id: srcid IPV4/b.b.b.b length 8
> ikev2_pld_payloads: decrypted payload AUTH nextpayload NOTIFY critical
> 0x00 length 264
> ikev2_pld_auth: method RSA_SIG length 256
> sa_state: SA_INIT -> AUTH_REQUEST
> ikev2_pld_payloads: decrypted payload NOTIFY nextpayload CP critical
> 0x00 length 8
> ikev2_pld_notify: protoid NONE spisize 0 type MOBIKE_SUPPORTED
> ikev2_pld_payloads: decrypted payload CP nextpayload SA critical 0x00
> length 36
> ikev2_pld_cp: type REQUEST length 28
> ikev2_pld_cp: INTERNAL_IP4_ADDRESS 0x0001 length 0
> ikev2_pld_cp: INTERNAL_IP4_DNS 0x0003 length 0
> ikev2_pld_cp: INTERNAL_IP4_NBNS 0x0004 length 0
> ikev2_pld_cp: INTERNAL_IP4_SERVER 0x5ba0 length 0
> ikev2_pld_cp: INTERNAL_IP6_ADDRESS 0x0008 length 0
> ikev2_pld_cp: INTERNAL_IP6_DNS 0x000a length 0
> ikev2_pld_cp: INTERNAL_IP6_SERVER 0x5ba1 length 0
> ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00
> length 44
> ikev2_pld_sa: more 0 reserved 0 length 40 proposal #1 protoid ESP
> spisize 4 xforms 3 spi 0x9d5e19c4
> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
> ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE
> ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00
> length 64
> ikev2_pld_ts: count 2 length 56
> ikev2_pld_ts: type IPV6_ADDR_RANGE protoid 0 length 40 startport 0
> endport 65535
> ikev2_pld_ts: start :: end ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
> ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0
> endport 65535
> ikev2_pld_ts: start 0.0.0.0 end 255.255.255.255
> ikev2_pld_payloads: decrypted payload TSr nextpayload NONE critical 0x00
> length 64
> ikev2_pld_ts: count 2 length 56
> ikev2_pld_ts: type IPV6_ADDR_RANGE protoid 0 length 40 startport 0
> endport 65535
> ikev2_pld_ts: start :: end ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
> ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0
> endport 65535
> ikev2_pld_ts: start 0.0.0.0 end 255.255.255.255
> ikev2_resp_recv: NAT-T message received, updated SA
> sa_stateok: SA_INIT flags 0x00, require 0x00
> policy_lookup: peerid
> '/C=FR/ST=somewhere/L=somewhere/O=something/OU=something/CN=w8-2/emailAddress=email'
> ikev2_msg_auth: responder auth data length 537
> ca_setauth: auth length 537
> ikev2_msg_auth: initiator auth data length 600
> ikev2_msg_authverify: method RSA_SIG keylen 1015 type X509_CERT
> ikev2_msg_authverify: authentication successful
> sa_state: AUTH_REQUEST -> AUTH_SUCCESS
> sa_stateflags: 0x10 -> 0x18 authvalid,sa (required 0x1f
> cert,certvalid,auth,authvalid,sa)
> ikev2_sa_negotiate: score 4
> sa_stateflags: 0x18 -> 0x18 authvalid,sa (required 0x1f
> cert,certvalid,auth,authvalid,sa)
> sa_stateok: VALID flags 0x18, require 0x1f cert,certvalid,auth,authvalid,sa
> sa_state: cannot switch: AUTH_SUCCESS -> VALID
> config_free_proposals: free 0x8ff4dd1e400
> ca_getreq: found CA
> /C=FR/ST=somewhere/L=somewhere/O=something/OU=something/CN=VPN
> CA/emailAddress=email
> ca_x509_subjectaltname: IPV4/a.a.a.a
> ca_x509_subjectaltname_cmp: IPV4/a.a.a.a mismatched
> ca_x509_subjectaltname: IPV4/b.b.b.b
> ca_getreq: found local certificate
> /C=FR/ST=somewhere/L=somewhere/O=something/OU=something/CN=b.b.b.b/emailAddress=email
> ca_setauth: auth length 256
> ca_validate_cert:
> /C=FR/ST=somewhere/L=somewhere/O=something/OU=something/CN=w8-2/emailAddress=email
> ok
> ikev2_getimsgdata: imsg 18 rspi 0xe05591f1cc45d3d7 ispi
> 0x562d03e53c773ab6 initiator 0 sa valid type 4 data length 1025
> ikev2_dispatch_cert: cert type X509_CERT length 1025, ok
> sa_stateflags: 0x18 -> 0x19 cert,authvalid,sa (required 0x1f
> cert,certvalid,auth,authvalid,sa)
> sa_stateok: VALID flags 0x19, require 0x1f cert,certvalid,auth,authvalid,sa
> sa_state: cannot switch: AUTH_SUCCESS -> VALID
> ikev2_getimsgdata: imsg 23 rspi 0xe05591f1cc45d3d7 ispi
> 0x562d03e53c773ab6 initiator 0 sa valid type 1 data length 256
> ikev2_dispatch_cert: AUTH type 1 len 256
> sa_stateflags: 0x19 -> 0x1d cert,auth,authvalid,sa (required 0x1f
> cert,certvalid,auth,authvalid,sa)
> sa_stateok: VALID flags 0x1d, require 0x1f cert,certvalid,auth,authvalid,sa
> sa_state: cannot switch: AUTH_SUCCESS -> VALID
> ikev2_dispatch_cert: peer certificate is valid
> sa_stateflags: 0x1d -> 0x1f cert,certvalid,auth,authvalid,sa (required
> 0x1f cert,certvalid,auth,authvalid,sa)
> sa_stateok: VALID flags 0x1f, require 0x1f cert,certvalid,auth,authvalid,sa
> sa_state: AUTH_SUCCESS -> VALID
> sa_stateok: VALID flags 0x1f, require 0x1f cert,certvalid,auth,authvalid,sa
> ikev2_cp_setaddr: mask e0ffffff start 4 lower 1 host 4 upper 1f
> sa_stateok: VALID flags 0x1f, require 0x1f cert,certvalid,auth,authvalid,sa
> ikev2_sa_tag: IKED (4)
> ikev2_childsa_negotiate: proposal 1
> ikev2_childsa_negotiate: key material length 128
> ikev2_prfplus: T1 with 32 bytes
> ikev2_prfplus: T2 with 32 bytes
> ikev2_prfplus: T3 with 32 bytes
> ikev2_prfplus: T4 with 32 bytes
> ikev2_prfplus: Tn with 128 bytes
> pfkey_sa_getspi: spi 0x5e371164
> pfkey_sa_init: new spi 0x5e371164
> sa_stateok: VALID flags 0x1f, require 0x1f cert,certvalid,auth,authvalid,sa
> ikev2_next_payload: length 12 nextpayload CERT
> ikev2_next_payload: length 1030 nextpayload AUTH
> ikev2_next_payload: length 264 nextpayload CP
> ikev2_next_payload: length 24 nextpayload SA
> ikev2_add_proposals: length 40
> ikev2_next_payload: length 44 nextpayload TSi
> ikev2_next_payload: length 24 nextpayload TSr
> ikev2_next_payload: length 24 nextpayload NONE
> ikev2_msg_encrypt: decrypted length 1422
> ikev2_msg_encrypt: padded length 1424
> ikev2_msg_encrypt: length 1423, padding 1, output length 1456
> ikev2_next_payload: length 1460 nextpayload IDr
> ikev2_msg_integr: message length 1488
> ikev2_msg_integr: integrity checksum length 16
> ikev2_pld_parse: header ispi 0x562d03e53c773ab6 rspi 0xe05591f1cc45d3d7
> nextpayload SK version 0x20 exchange IKE_AUTH flags 0x20 msgid 1 length
> 1488 response 1
> ikev2_pld_payloads: payload SK nextpayload IDr critical 0x00 length 1460
> ikev2_msg_decrypt: IV length 16
> ikev2_msg_decrypt: encrypted payload length 1424
> ikev2_msg_decrypt: integrity checksum length 16
> ikev2_msg_decrypt: integrity check succeeded
> ikev2_msg_decrypt: decrypted payload length 1424/1424 padding 1
> ikev2_pld_payloads: decrypted payload IDr nextpayload CERT critical 0x00
> length 12
> ikev2_pld_id: id IPV4/b.b.b.b length 8
> ikev2_pld_payloads: decrypted payload CERT nextpayload AUTH critical
> 0x00 length 1030
> ikev2_pld_cert: type X509_CERT length 1025
> ikev2_pld_payloads: decrypted payload AUTH nextpayload CP critical 0x00
> length 264
> ikev2_pld_auth: method RSA_SIG length 256
> ikev2_pld_payloads: decrypted payload CP nextpayload SA critical 0x00
> length 24
> ikev2_pld_cp: type REPLY length 16
> ikev2_pld_cp: INTERNAL_IP4_ADDRESS 0x0001 length 4
> ikev2_pld_cp: INTERNAL_IP4_DNS 0x0003 length 4
> ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00
> length 44
> ikev2_pld_sa: more 0 reserved 0 length 40 proposal #1 protoid ESP
> spisize 4 xforms 3 spi 0x5e371164
> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
> ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE
> ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00
> length 24
> ikev2_pld_ts: count 1 length 16
> ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0
> endport 65535
> ikev2_pld_ts: start x.x.x.x end x.x.x.255
> ikev2_pld_payloads: decrypted payload TSr nextpayload NONE critical 0x00
> length 24
> ikev2_pld_ts: count 1 length 16
> ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0
> endport 65535
> ikev2_pld_ts: start 0.0.0.0 end 255.255.255.255
> ikev2_msg_send: IKE_AUTH response from a.a.a.a:4500 to c.c.c.c:58838
> msgid 1, 1488 bytes, NAT-T
> pfkey_sa_add: update spi 0x5e371164
> pfkey_sa: udpencap port 58838
> ikev2_childsa_enable: loaded CHILD SA spi 0x5e371164
> pfkey_sa_add: add spi 0x9d5e19c4
> pfkey_sa: udpencap port 58838
> ikev2_childsa_enable: loaded CHILD SA spi 0x9d5e19c4
> ikev2_childsa_enable: replaced old flow 0x8fe6dc86400 with 0x8fefa32ec00
> ikev2_childsa_enable: loaded flow 0x8fefa32ec00
> ikev2_childsa_enable: replaced old flow 0x8ff01226c00 with 0x8ff01223800
> ikev2_childsa_enable: loaded flow 0x8ff01223800
> sa_state: VALID -> ESTABLISHED from c.c.c.c:58838 to a.a.a.a:4500 policy
> 'XXXX'
> ikev2_recv: INFORMATIONAL request from initiator c.c.c.c:61646 to
> a.a.a.a:4500 policy 'XXXX' id 6, 80 bytes
> ikev2_recv: ispi 0x6ad134a575f00a4d rspi 0x2e3cb2094bf70da2
> ikev2_recv: INFORMATIONAL request from initiator c.c.c.c:58838 to
> a.a.a.a:4500 policy 'XXXX' id 4, 80 bytes
> ikev2_recv: ispi 0x51ce221bd9f537ca rspi 0x69dad45d8cc67c17
> ikev2_recv: INFORMATIONAL request from initiator c.c.c.c:61646 to
> a.a.a.a:4500 policy 'XXXX' id 6, 80 bytes
> ikev2_recv: ispi 0x6ad134a575f00a4d rspi 0x2e3cb2094bf70da2
> ikev2_recv: INFORMATIONAL request from initiator c.c.c.c:58838 to
> a.a.a.a:4500 policy 'XXXX' id 4, 80 bytes
> ikev2_recv: ispi 0x51ce221bd9f537ca rspi 0x69dad45d8cc67c17
>
> any help appreciated.
>
> Regards,
> C.

Reply via email to