On Mon, Feb 21, 2022 at 09:12:27AM -0600, rea...@catastrophe.net wrote:
> On Mon, Feb 21, 2022 at 02:55:39PM +0100, Tobias Heider wrote:
> >On Sat, Feb 19, 2022 at 12:28:15AM -0600, rea...@catastrophe.net wrote:
> >> IKE is failing when I connect using a simple password defined in
> >> /etc/iked.conf. I'm connecting from a native Mac client...is 
> >> mschap-v2 on MacOS broken or are my configs wrong? Thanks in advance.
> >> 
> [..]
> >> /etc/iked.conf - fails with username/password
> >> ##############################################
> >> user "testuser" "testpassword"
> >> ikev2 "ROAD_WARRIOR" esp \
> >>    from 0.0.0.0/0 to 10.1.255.0/24 \
> >>    peer any local vpn.company.com \
> >>         srcid vpn.company.com \
> >>         dstid mac-laptop \
> >>     eap "mschap-v2" \
> >>    config address 10.1.255.0/24 \
> >>     config name-server 10.1.255.1 \
> >>    tag "$name-$id"
> >> 
> >Hard to tell what's going wrong here. Looks like the mac ignores the IKE_AUTH
> >response and restarts the handshake.  I haven't seen any other reports about
> >problems with the mac implementation and i don't have one to test.
> >You could try enabling verbose logging with 'iked -dvvv' or
> >'ikectl log verbose' and see if that gives us any clues.
> 
> Here is the output of iked -dvvv

Looks all ok.  Is there any way to get logs from the mac?
It still looks like the other side just drops the AUTH response
for no obvious reason.

> 
> bash-5.1# iked -dvvv                         
> create_ike: using signature for peer mac-laptop
> ikev2 "ROAD_WARRIOR" passive tunnel esp inet from 0.0.0.0/0 to 10.1.255.0/24 
> local 192.168.110.50 peer any ikesa enc aes-128-gcm enc aes-256-gcm prf 
> hmac-sha2-256 prf hmac-sha2-384 prf hmac-sha2-512 prf hmac-sha1 group 
> curve25519 group ecp521 group ecp384 group ecp256 group modp4096 group 
> modp3072 group modp2048 group modp1536 group modp1024 ikesa enc aes-256 enc 
> aes-192 enc aes-128 enc 3des prf hmac-sha2-256 prf hmac-sha2-384 prf 
> hmac-sha2-512 prf hmac-sha1 auth hmac-sha2-256 auth hmac-sha2-384 auth 
> hmac-sha2-512 auth hmac-sha1 group curve25519 group ecp521 group ecp384 group 
> ecp256 group modp4096 group modp3072 group modp2048 group modp1536 group 
> modp1024 childsa enc aes-128-gcm enc aes-256-gcm group none esn noesn childsa 
> enc aes-256 enc aes-192 enc aes-128 auth hmac-sha2-256 auth hmac-sha2-384 
> auth hmac-sha2-512 auth hmac-sha1 group none esn noesn srcid vpn.company.com 
> dstid mac-laptop lifetime 10800 bytes 4294967296 eap "MSCHAP_V2" config 
> address 10.1.255.0 config name-server 10.1.255.1 tag "$name-$id"
> /etc/iked.conf: loaded 2 configuration rules
> ca_privkey_serialize: type RSA_KEY length 1192
> ca_pubkey_serialize: type RSA_KEY length 270
> ca_privkey_to_method: type RSA_KEY method RSA_SIG
> ca_getkey: received private key type RSA_KEY length 1192
> ca_getkey: received public key type RSA_KEY length 270
> ca_dispatch_parent: config reset
> ca_reload: loaded cert file vpn.company.com.crt
> ca_validate_cert: /C=US/ST=Anystate/L=Anytown/O=Company.COM/OU=Remote Network 
> Services/CN=vpn.company.com/emailAddress=r...@company.com unable to get local 
> issuer certificate
> ca_reload: local cert type RSA_KEY
> config_getocsp: ocsp_url none tolerate 0 maxage -1
> config_new_user: inserting new user testuser
> user "testuser" "testpassword"
> ikev2_dispatch_cert: updated local CERTREQ type RSA_KEY length 0
> config_getpolicy: received policy
> config_getpfkey: received pfkey fd 3
> config_getcompile: compilation done
> config_getsocket: received socket fd 4
> config_getsocket: received socket fd 5
> config_getsocket: received socket fd 6
> config_getsocket: received socket fd 7
> config_getstatic: dpd_check_interval 60
> config_getstatic: no enforcesingleikesa
> config_getstatic: no fragmentation
> config_getstatic: mobike
> config_getstatic: nattport 4500
> config_getstatic: no stickyaddress
> policy_lookup: setting policy 'ROAD_WARRIOR'
> spi=0x2cb46a467283eb2e: recv IKE_SA_INIT req 0 peer 172.20.20.11:62336 local 
> 192.168.110.50:500, 604 bytes, policy 'ROAD_WARRIOR'
> ikev2_recv: ispi 0x2cb46a467283eb2e rspi 0x0000000000000000
> ikev2_policy2id: srcid FQDN/vpn.company.com length 23
> ikev2_pld_parse: header ispi 0x2cb46a467283eb2e rspi 0x0000000000000000 
> nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x08 msgid 0 length 
> 604 response 0
> ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 220
> ikev2_pld_sa: more 2 reserved 0 length 44 proposal #1 protoid IKE spisize 0 
> xforms 4 spi 0
> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256
> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
> ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048
> ikev2_pld_sa: more 2 reserved 0 length 44 proposal #2 protoid IKE spisize 0 
> xforms 4 spi 0
> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256
> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
> ikev2_pld_xform: more 0 reserved 0 length 8 type DH id ECP_256
> ikev2_pld_sa: more 2 reserved 0 length 44 proposal #3 protoid IKE spisize 0 
> xforms 4 spi 0
> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256
> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
> ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_1536
> ikev2_pld_sa: more 2 reserved 0 length 44 proposal #4 protoid IKE spisize 0 
> xforms 4 spi 0
> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1
> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96
> ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_1024
> ikev2_pld_sa: more 0 reserved 0 length 40 proposal #5 protoid IKE spisize 0 
> xforms 4 spi 0
> ikev2_pld_xform: more 3 reserved 0 length 8 type ENCR id 3DES
> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1
> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96
> ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_1024
> ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 264
> ikev2_pld_ke: dh group MODP_2048 reserved 0
> f1adbc44 9431f98e fbaf500c d2f6b8ca d2082592 1b3e8ca0 174d67c1 90bf9fb4
> 5c76a67d 55040437 45034959 48509849 6666b033 1415c1ca 5904c8ef f41db23b
> 89a7efba f0b7995f 4ef3d492 60e8ca1d e7b5cc9d 040f2e1f 1a150a16 05b73244
> a4287c20 d2bbb2ff b0d51144 aa22136a 41b1350b f25de907 5d1c717b 078fd526
> 6eb67e46 214db63a 0963304e 943f9cd6 5a8e09ce 5aa8c12f cf05631e 3e673c89
> a2994584 69cb9dff d9e867fc 4655fbf3 7181b1a8 e4654651 b4a1d31f 8c168e7a
> 202949b6 be506df1 64362729 7160a118 4e37c8a1 03abb6ee 6543e4cb 7c5c578d
> d2a9afa3 90fb675a 1754d1bd 20a2b82e 2eb7dbfc c68300df f99cfca1 8ea4d13d
> ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 20
> cbc87c0b 2cdd22f5 e27d5728 293a1ed5
> ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 8
> ikev2_pld_notify: protoid NONE spisize 0 type REDIRECT_SUPPORTED
> ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28
> ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP
> 285c3347 02e18980 3a311319 c820a2b0 e672941a
> ikev2_nat_detection: peer source 0x2cb46a467283eb2e 0x0000000000000000 
> 172.20.20.11:62336
> ikev2_pld_notify: NAT_DETECTION_SOURCE_IP detected NAT
> 0d2d900b bca747f3 9b712d11 83aaa930 c7a76467
> ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28
> ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP
> 763f3eea 3095b3e5 1552866e b9233f03 aa9bc2b2
> ikev2_nat_detection: peer destination 0x2cb46a467283eb2e 0x0000000000000000 
> 192.168.110.50:500
> 763f3eea 3095b3e5 1552866e b9233f03 aa9bc2b2
> ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00 length 8
> ikev2_pld_notify: protoid NONE spisize 0 type FRAGMENTATION_SUPPORTED
> proposals_match: xform 1 <-> 1 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
> proposals_match: xform 1 <-> 1 (13): DH MODP_2048 (keylength 0 <-> 0)
> proposals_negotiate: score 0
> proposals_match: xform 2 <-> 1 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
> proposals_match: xform 2 <-> 1 (7): DH ECP_256 (keylength 0 <-> 0)
> proposals_negotiate: score 0
> proposals_match: xform 3 <-> 1 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
> proposals_match: xform 3 <-> 1 (15): DH MODP_1536 (keylength 0 <-> 0)
> proposals_negotiate: score 0
> proposals_match: xform 4 <-> 1 (4): PRF HMAC_SHA1 (keylength 0 <-> 0)
> proposals_match: xform 4 <-> 1 (17): DH MODP_1024 (keylength 0 <-> 0)
> proposals_negotiate: score 0
> proposals_match: xform 5 <-> 1 (4): PRF HMAC_SHA1 (keylength 0 <-> 0)
> proposals_match: xform 5 <-> 1 (17): DH MODP_1024 (keylength 0 <-> 0)
> proposals_negotiate: score 0
> proposals_match: xform 1 <-> 2 (1): ENCR AES_CBC (keylength 256 <-> 0) 256
> proposals_match: xform 1 <-> 2 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
> proposals_match: xform 1 <-> 2 (1): INTEGR HMAC_SHA2_256_128 (keylength 0 <-> 
> 0)
> proposals_match: xform 1 <-> 2 (13): DH MODP_2048 (keylength 0 <-> 0)
> proposals_negotiate: score 16
> proposals_match: xform 2 <-> 2 (1): ENCR AES_CBC (keylength 256 <-> 0) 256
> proposals_match: xform 2 <-> 2 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
> proposals_match: xform 2 <-> 2 (1): INTEGR HMAC_SHA2_256_128 (keylength 0 <-> 
> 0)
> proposals_match: xform 2 <-> 2 (7): DH ECP_256 (keylength 0 <-> 0)
> proposals_negotiate: score 10
> proposals_match: xform 3 <-> 2 (1): ENCR AES_CBC (keylength 256 <-> 0) 256
> proposals_match: xform 3 <-> 2 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
> proposals_match: xform 3 <-> 2 (1): INTEGR HMAC_SHA2_256_128 (keylength 0 <-> 
> 0)
> proposals_match: xform 3 <-> 2 (15): DH MODP_1536 (keylength 0 <-> 0)
> proposals_negotiate: score 18
> proposals_match: xform 4 <-> 2 (7): ENCR AES_CBC (keylength 128 <-> 0) 128
> proposals_match: xform 4 <-> 2 (4): PRF HMAC_SHA1 (keylength 0 <-> 0)
> proposals_match: xform 4 <-> 2 (10): INTEGR HMAC_SHA1_96 (keylength 0 <-> 0)
> proposals_match: xform 4 <-> 2 (17): DH MODP_1024 (keylength 0 <-> 0)
> proposals_negotiate: score 38
> proposals_match: xform 5 <-> 2 (10): ENCR 3DES (keylength 0 <-> 0)
> proposals_match: xform 5 <-> 2 (4): PRF HMAC_SHA1 (keylength 0 <-> 0)
> proposals_match: xform 5 <-> 2 (10): INTEGR HMAC_SHA1_96 (keylength 0 <-> 0)
> proposals_match: xform 5 <-> 2 (17): DH MODP_1024 (keylength 0 <-> 0)
> proposals_negotiate: score 41
> policy_lookup: setting policy 'ROAD_WARRIOR'
> spi=0x2cb46a467283eb2e: sa_state: INIT -> SA_INIT
> proposals_match: xform 1 <-> 1 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
> proposals_match: xform 1 <-> 1 (13): DH MODP_2048 (keylength 0 <-> 0)
> proposals_negotiate: score 0
> proposals_match: xform 2 <-> 1 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
> proposals_match: xform 2 <-> 1 (7): DH ECP_256 (keylength 0 <-> 0)
> proposals_negotiate: score 0
> proposals_match: xform 3 <-> 1 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
> proposals_match: xform 3 <-> 1 (15): DH MODP_1536 (keylength 0 <-> 0)
> proposals_negotiate: score 0
> proposals_match: xform 4 <-> 1 (4): PRF HMAC_SHA1 (keylength 0 <-> 0)
> proposals_match: xform 4 <-> 1 (17): DH MODP_1024 (keylength 0 <-> 0)
> proposals_negotiate: score 0
> proposals_match: xform 5 <-> 1 (4): PRF HMAC_SHA1 (keylength 0 <-> 0)
> proposals_match: xform 5 <-> 1 (17): DH MODP_1024 (keylength 0 <-> 0)
> proposals_negotiate: score 0
> proposals_match: xform 1 <-> 2 (1): ENCR AES_CBC (keylength 256 <-> 0) 256
> proposals_match: xform 1 <-> 2 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
> proposals_match: xform 1 <-> 2 (1): INTEGR HMAC_SHA2_256_128 (keylength 0 <-> 
> 0)
> proposals_match: xform 1 <-> 2 (13): DH MODP_2048 (keylength 0 <-> 0)
> proposals_negotiate: score 16
> proposals_match: xform 2 <-> 2 (1): ENCR AES_CBC (keylength 256 <-> 0) 256
> proposals_match: xform 2 <-> 2 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
> proposals_match: xform 2 <-> 2 (1): INTEGR HMAC_SHA2_256_128 (keylength 0 <-> 
> 0)
> proposals_match: xform 2 <-> 2 (7): DH ECP_256 (keylength 0 <-> 0)
> proposals_negotiate: score 10
> proposals_match: xform 3 <-> 2 (1): ENCR AES_CBC (keylength 256 <-> 0) 256
> proposals_match: xform 3 <-> 2 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
> proposals_match: xform 3 <-> 2 (1): INTEGR HMAC_SHA2_256_128 (keylength 0 <-> 
> 0)
> proposals_match: xform 3 <-> 2 (15): DH MODP_1536 (keylength 0 <-> 0)
> proposals_negotiate: score 18
> proposals_match: xform 4 <-> 2 (7): ENCR AES_CBC (keylength 128 <-> 0) 128
> proposals_match: xform 4 <-> 2 (4): PRF HMAC_SHA1 (keylength 0 <-> 0)
> proposals_match: xform 4 <-> 2 (10): INTEGR HMAC_SHA1_96 (keylength 0 <-> 0)
> proposals_match: xform 4 <-> 2 (17): DH MODP_1024 (keylength 0 <-> 0)
> proposals_negotiate: score 38
> proposals_match: xform 5 <-> 2 (10): ENCR 3DES (keylength 0 <-> 0)
> proposals_match: xform 5 <-> 2 (4): PRF HMAC_SHA1 (keylength 0 <-> 0)
> proposals_match: xform 5 <-> 2 (10): INTEGR HMAC_SHA1_96 (keylength 0 <-> 0)
> proposals_match: xform 5 <-> 2 (17): DH MODP_1024 (keylength 0 <-> 0)
> proposals_negotiate: score 41
> proposals_negotiate: score 1: ENCR AES_CBC 256
> proposals_negotiate: score 1: PRF HMAC_SHA2_256
> proposals_negotiate: score 1: INTEGR HMAC_SHA2_256_128
> proposals_negotiate: score 7: DH ECP_256
> sa_stateok: SA_INIT flags 0x0000, require 0x0000 
> sa_stateflags: 0x0000 -> 0x0020 sa (required 0x0000 )
> spi=0x2cb46a467283eb2e: ikev2_sa_responder_dh: want dh ECP_256, KE has 
> MODP_2048
> spi=0x2cb46a467283eb2e: ikev2_resp_recv: failed to negotiate IKE SA
> spi=0x2cb46a467283eb2e: ikev2_add_error: INVALID_KE_PAYLOAD
> ikev2_add_error: done
> ikev2_next_payload: length 10 nextpayload NONE
> ikev2_pld_parse: header ispi 0x2cb46a467283eb2e rspi 0x940480243829496e 
> nextpayload NOTIFY version 0x20 exchange IKE_SA_INIT flags 0x20 msgid 0 
> length 38 response 1
> ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00 length 10
> ikev2_pld_notify: protoid NONE spisize 0 type INVALID_KE_PAYLOAD
> 0013
> spi=0x2cb46a467283eb2e: send IKE_SA_INIT res 0 peer 172.20.20.11:62336 local 
> 192.168.110.50:500, 38 bytes
> spi=0x2cb46a467283eb2e: sa_state: SA_INIT -> CLOSED from any to any policy 
> 'ROAD_WARRIOR'
> config_free_proposals: free 0x8f3b2d19b00
> config_free_proposals: free 0x8f3b2d19a00
> config_free_proposals: free 0x8f3b2d15f80
> config_free_proposals: free 0x8f3b2d26480
> config_free_proposals: free 0x8f3b2d15200
> spi=0x2cb46a467283eb2e: recv IKE_SA_INIT req 0 peer 172.20.20.11:62336 local 
> 192.168.110.50:500, 412 bytes, policy 'ROAD_WARRIOR'
> ikev2_recv: ispi 0x2cb46a467283eb2e rspi 0x0000000000000000
> spi=0x2cb46a467283eb2e: sa_free: ispi 0x2cb46a467283eb2e rspi 
> 0x940480243829496e
> config_free_proposals: free 0x8f3b2d26680
> ikev2_policy2id: srcid FQDN/vpn.company.com length 23
> ikev2_pld_parse: header ispi 0x2cb46a467283eb2e rspi 0x0000000000000000 
> nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x08 msgid 0 length 
> 412 response 0
> ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 220
> ikev2_pld_sa: more 2 reserved 0 length 44 proposal #1 protoid IKE spisize 0 
> xforms 4 spi 0
> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256
> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
> ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048
> ikev2_pld_sa: more 2 reserved 0 length 44 proposal #2 protoid IKE spisize 0 
> xforms 4 spi 0
> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256
> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
> ikev2_pld_xform: more 0 reserved 0 length 8 type DH id ECP_256
> ikev2_pld_sa: more 2 reserved 0 length 44 proposal #3 protoid IKE spisize 0 
> xforms 4 spi 0
> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256
> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
> ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_1536
> ikev2_pld_sa: more 2 reserved 0 length 44 proposal #4 protoid IKE spisize 0 
> xforms 4 spi 0
> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1
> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96
> ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_1024
> ikev2_pld_sa: more 0 reserved 0 length 40 proposal #5 protoid IKE spisize 0 
> xforms 4 spi 0
> ikev2_pld_xform: more 3 reserved 0 length 8 type ENCR id 3DES
> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1
> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96
> ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_1024
> ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 72
> ikev2_pld_ke: dh group ECP_256 reserved 0
> 7f3ea78a fe2e796b 7f90510a 50b18846 2416d5d0 b822bcd2 03cec7a7 e41642dd
> 31ead620 1a9dcf82 7598d586 236c9071 3f90d5f3 69907b05 d2906b2e c2aad6ff
> ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 20
> 7997057e 92b50e5b ff320add d69bcfa4
> ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 8
> ikev2_pld_notify: protoid NONE spisize 0 type REDIRECT_SUPPORTED
> ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28
> ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP
> 285c3347 02e18980 3a311319 c820a2b0 e672941a
> ikev2_nat_detection: peer source 0x2cb46a467283eb2e 0x0000000000000000 
> 172.20.20.11:62336
> ikev2_pld_notify: NAT_DETECTION_SOURCE_IP detected NAT
> 0d2d900b bca747f3 9b712d11 83aaa930 c7a76467
> ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28
> ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP
> 763f3eea 3095b3e5 1552866e b9233f03 aa9bc2b2
> ikev2_nat_detection: peer destination 0x2cb46a467283eb2e 0x0000000000000000 
> 192.168.110.50:500
> 763f3eea 3095b3e5 1552866e b9233f03 aa9bc2b2
> ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00 length 8
> ikev2_pld_notify: protoid NONE spisize 0 type FRAGMENTATION_SUPPORTED
> proposals_match: xform 1 <-> 1 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
> proposals_match: xform 1 <-> 1 (13): DH MODP_2048 (keylength 0 <-> 0)
> proposals_negotiate: score 0
> proposals_match: xform 2 <-> 1 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
> proposals_match: xform 2 <-> 1 (7): DH ECP_256 (keylength 0 <-> 0)
> proposals_negotiate: score 0
> proposals_match: xform 3 <-> 1 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
> proposals_match: xform 3 <-> 1 (15): DH MODP_1536 (keylength 0 <-> 0)
> proposals_negotiate: score 0
> proposals_match: xform 4 <-> 1 (4): PRF HMAC_SHA1 (keylength 0 <-> 0)
> proposals_match: xform 4 <-> 1 (17): DH MODP_1024 (keylength 0 <-> 0)
> proposals_negotiate: score 0
> proposals_match: xform 5 <-> 1 (4): PRF HMAC_SHA1 (keylength 0 <-> 0)
> proposals_match: xform 5 <-> 1 (17): DH MODP_1024 (keylength 0 <-> 0)
> proposals_negotiate: score 0
> proposals_match: xform 1 <-> 2 (1): ENCR AES_CBC (keylength 256 <-> 0) 256
> proposals_match: xform 1 <-> 2 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
> proposals_match: xform 1 <-> 2 (1): INTEGR HMAC_SHA2_256_128 (keylength 0 <-> 
> 0)
> proposals_match: xform 1 <-> 2 (13): DH MODP_2048 (keylength 0 <-> 0)
> proposals_negotiate: score 16
> proposals_match: xform 2 <-> 2 (1): ENCR AES_CBC (keylength 256 <-> 0) 256
> proposals_match: xform 2 <-> 2 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
> proposals_match: xform 2 <-> 2 (1): INTEGR HMAC_SHA2_256_128 (keylength 0 <-> 
> 0)
> proposals_match: xform 2 <-> 2 (7): DH ECP_256 (keylength 0 <-> 0)
> proposals_negotiate: score 10
> proposals_match: xform 3 <-> 2 (1): ENCR AES_CBC (keylength 256 <-> 0) 256
> proposals_match: xform 3 <-> 2 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
> proposals_match: xform 3 <-> 2 (1): INTEGR HMAC_SHA2_256_128 (keylength 0 <-> 
> 0)
> proposals_match: xform 3 <-> 2 (15): DH MODP_1536 (keylength 0 <-> 0)
> proposals_negotiate: score 18
> proposals_match: xform 4 <-> 2 (7): ENCR AES_CBC (keylength 128 <-> 0) 128
> proposals_match: xform 4 <-> 2 (4): PRF HMAC_SHA1 (keylength 0 <-> 0)
> proposals_match: xform 4 <-> 2 (10): INTEGR HMAC_SHA1_96 (keylength 0 <-> 0)
> proposals_match: xform 4 <-> 2 (17): DH MODP_1024 (keylength 0 <-> 0)
> proposals_negotiate: score 38
> proposals_match: xform 5 <-> 2 (10): ENCR 3DES (keylength 0 <-> 0)
> proposals_match: xform 5 <-> 2 (4): PRF HMAC_SHA1 (keylength 0 <-> 0)
> proposals_match: xform 5 <-> 2 (10): INTEGR HMAC_SHA1_96 (keylength 0 <-> 0)
> proposals_match: xform 5 <-> 2 (17): DH MODP_1024 (keylength 0 <-> 0)
> proposals_negotiate: score 41
> policy_lookup: setting policy 'ROAD_WARRIOR'
> spi=0x2cb46a467283eb2e: sa_state: INIT -> SA_INIT
> proposals_match: xform 1 <-> 1 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
> proposals_match: xform 1 <-> 1 (13): DH MODP_2048 (keylength 0 <-> 0)
> proposals_negotiate: score 0
> proposals_match: xform 2 <-> 1 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
> proposals_match: xform 2 <-> 1 (7): DH ECP_256 (keylength 0 <-> 0)
> proposals_negotiate: score 0
> proposals_match: xform 3 <-> 1 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
> proposals_match: xform 3 <-> 1 (15): DH MODP_1536 (keylength 0 <-> 0)
> proposals_negotiate: score 0
> proposals_match: xform 4 <-> 1 (4): PRF HMAC_SHA1 (keylength 0 <-> 0)
> proposals_match: xform 4 <-> 1 (17): DH MODP_1024 (keylength 0 <-> 0)
> proposals_negotiate: score 0
> proposals_match: xform 5 <-> 1 (4): PRF HMAC_SHA1 (keylength 0 <-> 0)
> proposals_match: xform 5 <-> 1 (17): DH MODP_1024 (keylength 0 <-> 0)
> proposals_negotiate: score 0
> proposals_match: xform 1 <-> 2 (1): ENCR AES_CBC (keylength 256 <-> 0) 256
> proposals_match: xform 1 <-> 2 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
> proposals_match: xform 1 <-> 2 (1): INTEGR HMAC_SHA2_256_128 (keylength 0 <-> 
> 0)
> proposals_match: xform 1 <-> 2 (13): DH MODP_2048 (keylength 0 <-> 0)
> proposals_negotiate: score 16
> proposals_match: xform 2 <-> 2 (1): ENCR AES_CBC (keylength 256 <-> 0) 256
> proposals_match: xform 2 <-> 2 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
> proposals_match: xform 2 <-> 2 (1): INTEGR HMAC_SHA2_256_128 (keylength 0 <-> 
> 0)
> proposals_match: xform 2 <-> 2 (7): DH ECP_256 (keylength 0 <-> 0)
> proposals_negotiate: score 10
> proposals_match: xform 3 <-> 2 (1): ENCR AES_CBC (keylength 256 <-> 0) 256
> proposals_match: xform 3 <-> 2 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
> proposals_match: xform 3 <-> 2 (1): INTEGR HMAC_SHA2_256_128 (keylength 0 <-> 
> 0)
> proposals_match: xform 3 <-> 2 (15): DH MODP_1536 (keylength 0 <-> 0)
> proposals_negotiate: score 18
> proposals_match: xform 4 <-> 2 (7): ENCR AES_CBC (keylength 128 <-> 0) 128
> proposals_match: xform 4 <-> 2 (4): PRF HMAC_SHA1 (keylength 0 <-> 0)
> proposals_match: xform 4 <-> 2 (10): INTEGR HMAC_SHA1_96 (keylength 0 <-> 0)
> proposals_match: xform 4 <-> 2 (17): DH MODP_1024 (keylength 0 <-> 0)
> proposals_negotiate: score 38
> proposals_match: xform 5 <-> 2 (10): ENCR 3DES (keylength 0 <-> 0)
> proposals_match: xform 5 <-> 2 (4): PRF HMAC_SHA1 (keylength 0 <-> 0)
> proposals_match: xform 5 <-> 2 (10): INTEGR HMAC_SHA1_96 (keylength 0 <-> 0)
> proposals_match: xform 5 <-> 2 (17): DH MODP_1024 (keylength 0 <-> 0)
> proposals_negotiate: score 41
> proposals_negotiate: score 1: ENCR AES_CBC 256
> proposals_negotiate: score 1: PRF HMAC_SHA2_256
> proposals_negotiate: score 1: INTEGR HMAC_SHA2_256_128
> proposals_negotiate: score 7: DH ECP_256
> sa_stateok: SA_INIT flags 0x0000, require 0x0000 
> sa_stateflags: 0x0000 -> 0x0020 sa (required 0x0000 )
> spi=0x2cb46a467283eb2e: ikev2_sa_keys: DHSECRET with 32 bytes
> 1f76cfd9 fa8e7dbd eb97aafd 5a6f3639 66513e1d 62d5dcd8 1f7dc816 8dc7a659
> ikev2_sa_keys: SKEYSEED with 32 bytes
> 523a456d 8f704897 fc26dcbc 90bddaab ba4cc016 a28e5156 2a4d0b26 11c5c472
> spi=0x2cb46a467283eb2e: ikev2_sa_keys: S with 64 bytes
> 7997057e 92b50e5b ff320add d69bcfa4 1eafa8f6 509355cf 1d59f792 78ff16f5
> 3dea18b3 7eed86b1 70d2e060 079a8ae1 2cb46a46 7283eb2e 137bbbbd 92cea87c
> ikev2_prfplus: T1 with 32 bytes
> 520d97dd 76d89239 b9b2d5ea 18550ceb 6427eb8c ea4b2ef1 9d1214e0 f6026556
> ikev2_prfplus: T2 with 32 bytes
> 50f6e4d6 75a7913c 4435290f d02a18e3 ca6e104f 6aab8b80 28c938f8 09282808
> ikev2_prfplus: T3 with 32 bytes
> 5f367cb9 c8280134 78bea101 dd96d6d4 2690f873 bc6cbbef aafe51e1 363a2cab
> ikev2_prfplus: T4 with 32 bytes
> 383497fb ff43f3f8 40326518 c54cbc91 cfef2c31 87001c20 866e4e94 4ca2dedc
> ikev2_prfplus: T5 with 32 bytes
> e535455d da8f3e11 10611ea2 902735b5 7abc655c 7d3783b2 faac4eb2 ceadfe51
> ikev2_prfplus: T6 with 32 bytes
> 6e76a748 31b01edb 5fcee843 990d27c9 d30fb621 beada2c0 cb0f1fb9 c6606781
> ikev2_prfplus: T7 with 32 bytes
> e44029df d507c482 29b92b68 702a8961 1533a795 616a29a9 28432bba 928c97ad
> ikev2_prfplus: Tn with 224 bytes
> 520d97dd 76d89239 b9b2d5ea 18550ceb 6427eb8c ea4b2ef1 9d1214e0 f6026556
> 50f6e4d6 75a7913c 4435290f d02a18e3 ca6e104f 6aab8b80 28c938f8 09282808
> 5f367cb9 c8280134 78bea101 dd96d6d4 2690f873 bc6cbbef aafe51e1 363a2cab
> 383497fb ff43f3f8 40326518 c54cbc91 cfef2c31 87001c20 866e4e94 4ca2dedc
> e535455d da8f3e11 10611ea2 902735b5 7abc655c 7d3783b2 faac4eb2 ceadfe51
> 6e76a748 31b01edb 5fcee843 990d27c9 d30fb621 beada2c0 cb0f1fb9 c6606781
> e44029df d507c482 29b92b68 702a8961 1533a795 616a29a9 28432bba 928c97ad
> ikev2_sa_keys: SK_d with 32 bytes
> 520d97dd 76d89239 b9b2d5ea 18550ceb 6427eb8c ea4b2ef1 9d1214e0 f6026556
> ikev2_sa_keys: SK_ai with 32 bytes
> 50f6e4d6 75a7913c 4435290f d02a18e3 ca6e104f 6aab8b80 28c938f8 09282808
> ikev2_sa_keys: SK_ar with 32 bytes
> 5f367cb9 c8280134 78bea101 dd96d6d4 2690f873 bc6cbbef aafe51e1 363a2cab
> ikev2_sa_keys: SK_ei with 32 bytes
> 383497fb ff43f3f8 40326518 c54cbc91 cfef2c31 87001c20 866e4e94 4ca2dedc
> ikev2_sa_keys: SK_er with 32 bytes
> e535455d da8f3e11 10611ea2 902735b5 7abc655c 7d3783b2 faac4eb2 ceadfe51
> ikev2_sa_keys: SK_pi with 32 bytes
> 6e76a748 31b01edb 5fcee843 990d27c9 d30fb621 beada2c0 cb0f1fb9 c6606781
> ikev2_sa_keys: SK_pr with 32 bytes
> e44029df d507c482 29b92b68 702a8961 1533a795 616a29a9 28432bba 928c97ad
> ikev2_resp_ike_sa_init: detected NAT, enabling UDP encapsulation
> ikev2_add_proposals: length 44
> ikev2_next_payload: length 48 nextpayload KE
> ikev2_next_payload: length 72 nextpayload NONCE
> ikev2_next_payload: length 36 nextpayload NOTIFY
> ikev2_nat_detection: local source 0x2cb46a467283eb2e 0x137bbbbd92cea87c 
> 192.168.110.50:500
> ikev2_next_payload: length 28 nextpayload NOTIFY
> ikev2_nat_detection: local destination 0x2cb46a467283eb2e 0x137bbbbd92cea87c 
> 172.20.20.11:62336
> ikev2_next_payload: length 28 nextpayload CERTREQ
> ikev2_add_certreq: type RSA_KEY length 1
> ikev2_next_payload: length 5 nextpayload NONE
> ikev2_pld_parse: header ispi 0x2cb46a467283eb2e rspi 0x137bbbbd92cea87c 
> nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x20 msgid 0 length 
> 245 response 1
> ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 48
> ikev2_pld_sa: more 0 reserved 0 length 44 proposal #2 protoid IKE spisize 0 
> xforms 4 spi 0
> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256
> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
> ikev2_pld_xform: more 0 reserved 0 length 8 type DH id ECP_256
> ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 72
> ikev2_pld_ke: dh group ECP_256 reserved 0
> 953ceb3a f2531b9e 9c941b69 ccca92ec 64b42b61 9ea1ba83 bccd0bad a51757cc
> 3b07840f af0e4d7b 4ab35534 f54a222d f701b9f8 42e02632 930abc89 7d9deae7
> ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 36
> 1eafa8f6 509355cf 1d59f792 78ff16f5 3dea18b3 7eed86b1 70d2e060 079a8ae1
> ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28
> ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP
> 081b7a6d 260c19d6 e805e851 d3c9f345 7cc31ac3
> ikev2_pld_payloads: payload NOTIFY nextpayload CERTREQ critical 0x00 length 28
> ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP
> ba7bba2f fb6401e3 6168e557 aaf4a39e c7efa043
> ikev2_pld_payloads: payload CERTREQ nextpayload NONE critical 0x00 length 5
> ikev2_pld_certreq: type RSA_KEY length 0
> spi=0x2cb46a467283eb2e: send IKE_SA_INIT res 0 peer 172.20.20.11:62336 local 
> 192.168.110.50:500, 245 bytes
> config_free_proposals: free 0x8f3b2d26700
> config_free_proposals: free 0x8f3b2d26000
> config_free_proposals: free 0x8f3b2d10b00
> config_free_proposals: free 0x8f3b2d2c580
> config_free_proposals: free 0x8f3b2d2c600
> spi=0x2cb46a467283eb2e: recv IKE_AUTH req 1 peer 172.20.20.11:55618 local 
> 192.168.110.50:4500, 512 bytes, policy 'ROAD_WARRIOR'
> ikev2_recv: ispi 0x2cb46a467283eb2e rspi 0x137bbbbd92cea87c
> ikev2_recv: updated SA to peer 172.20.20.11:55618 local 192.168.110.50:4500
> ikev2_pld_parse: header ispi 0x2cb46a467283eb2e rspi 0x137bbbbd92cea87c 
> nextpayload SK version 0x20 exchange IKE_AUTH flags 0x08 msgid 1 length 512 
> response 0
> ikev2_pld_payloads: payload SK nextpayload IDi critical 0x00 length 484
> ikev2_msg_decrypt: IV length 16
> 592a8094 82131658 c5df646a d25a602b
> ikev2_msg_decrypt: encrypted payload length 448
> a2c02504 f472968e 438b05d1 c2592024 9ac07bed 06b3643d ec41a78a 856ea751
> f3970957 ebaf2d2d 9f4ae9c4 79495303 d2cee529 6050dd97 36f14420 87b36aa9
> 34d44944 ad717a20 18272577 7b7f5953 159485c3 98959a31 e6514ba7 ddd04afe
> 53ce1637 d317c829 84205694 7b684ede e8dfc960 929248cd 4f3f09bf fcc83d69
> 085f5795 9b80e315 e0d76707 56a13703 4e99b0c4 498c752e 1d1d91e3 eab98087
> 42872c91 20dc81bc 5f436be4 9f41c9e4 d59153dc 946592af 3be94873 2a17f39e
> e605cfe9 3a6b4d4d c663f9e8 b765be00 6e5b1560 7cdf96f0 a047873a 34fb1266
> fc033ac5 8e34d88c 021b3bb1 3a829314 78bbc484 ea051799 5739872d 92ce5b9f
> 973c48d2 a8759922 3a302b95 d8819f12 3bf8b789 625ca26a 3e0bf0c3 a59746cc
> 89a3beb1 0ef270cb 78978c49 8eda5e12 e0212977 b7f34067 73428f1d b4531ca8
> 448e65a6 9d4f22f7 cbfeb1c4 b869983c f480cce1 e2ebc711 7639327a 8f98ff5b
> 0acdbd2f 76590773 a9a76925 9e719717 237f6167 ce123a13 e168a3bb 42efce12
> 41a69050 cfa6cbfe 4c7099f5 631532a4 2b12803b f6463c92 8518e3a4 80d58b2f
> 06dba1ff 6fc83218 231d93a3 75e27f16 c42c22e2 fe0054fc 1797452d a3c9c6f8
> ikev2_msg_decrypt: integrity checksum length 16
> 5288433e f46da10b 0bfbb802 4a312467
> ikev2_msg_decrypt: integrity check succeeded
> 5288433e f46da10b 0bfbb802 4a312467
> ikev2_msg_decrypt: decrypted payload length 448/448 padding 5
> 2900000f 02000000 6e657074 756e6524 00000800 0040002f 00001b02 0000006c
> 61782e63 61746173 74726f70 68652e6e 65742900 00280100 00000001 00000002
> 00000006 00000003 00000008 0000000c 0000000a 00000019 00002900 00080000
> 400a2100 00080000 400b2c00 00c80200 00280103 04030e4a 6ada0300 000c0100
> 000c800e 01000300 00080300 000c0000 00080500 00000200 00280203 0403009c
> 37b70300 000c0100 000c800e 01000300 00080300 000c0000 00080500 00000200
> 00280303 04030ff4 35160300 000c0100 000c800e 01000300 00080300 000c0000
> 00080500 00000200 00280403 040303f5 f8250300 000c0100 000c800e 00800300
> 00080300 00020000 00080500 00000000 00240503 04030c0e f0b00300 00080100
> 00030300 00080300 00020000 00080500 00002d00 00400200 00000700 00100000
> ffff0000 0000ffff ffff0800 00280000 ffff0000 00000000 00000000 00000000
> 0000ffff ffffffff ffffffff ffffffff ffff2900 00400200 00000700 00100000
> ffff0000 0000ffff ffff0800 00280000 ffff0000 00000000 00000000 00000000
> 0000ffff ffffffff ffffffff ffffffff ffff0000 00080000 400c42b8 4403f205
> ikev2_pld_payloads: decrypted payload IDi nextpayload NOTIFY critical 0x00 
> length 15
> ikev2_pld_id: id FQDN/mac-laptop length 11
> ikev2_pld_payloads: decrypted payload NOTIFY nextpayload IDr critical 0x00 
> length 8
> ikev2_pld_notify: protoid NONE spisize 0 type INITIAL_CONTACT
> ikev2_pld_payloads: decrypted payload IDr nextpayload CP critical 0x00 length 
> 27
> ikev2_pld_id: id FQDN/vpn.company.com length 23
> ikev2_pld_id: unexpected id payload
> ikev2_pld_payloads: decrypted payload CP nextpayload NOTIFY critical 0x00 
> length 40
> ikev2_pld_cp: type REQUEST length 32
> 00010000 00020000 00060000 00030000 00080000 000c0000 000a0000 00190000
> ikev2_pld_cp: INTERNAL_IP4_ADDRESS 0x0001 length 0
> ikev2_pld_cp: INTERNAL_IP4_NETMASK 0x0002 length 0
> ikev2_pld_cp: INTERNAL_IP4_DHCP 0x0006 length 0
> ikev2_pld_cp: INTERNAL_IP4_DNS 0x0003 length 0
> ikev2_pld_cp: INTERNAL_IP6_ADDRESS 0x0008 length 0
> ikev2_pld_cp: INTERNAL_IP6_DHCP 0x000c length 0
> ikev2_pld_cp: INTERNAL_IP6_DNS 0x000a length 0
> ikev2_pld_cp: <UNKNOWN:25> 0x0019 length 0
> ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NOTIFY critical 0x00 
> length 8
> ikev2_pld_notify: protoid NONE spisize 0 type ESP_TFC_PADDING_NOT_SUPPORTED
> ikev2_pld_payloads: decrypted payload NOTIFY nextpayload SA critical 0x00 
> length 8
> ikev2_pld_notify: protoid NONE spisize 0 type NON_FIRST_FRAGMENTS_ALSO
> ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00 length 
> 200
> ikev2_pld_sa: more 2 reserved 0 length 40 proposal #1 protoid ESP spisize 4 
> xforms 3 spi 0x0e4a6ada
> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
> ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE
> ikev2_pld_sa: more 2 reserved 0 length 40 proposal #2 protoid ESP spisize 4 
> xforms 3 spi 0x009c37b7
> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
> ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE
> ikev2_pld_sa: more 2 reserved 0 length 40 proposal #3 protoid ESP spisize 4 
> xforms 3 spi 0x0ff43516
> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
> ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE
> ikev2_pld_sa: more 2 reserved 0 length 40 proposal #4 protoid ESP spisize 4 
> xforms 3 spi 0x03f5f825
> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96
> ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE
> ikev2_pld_sa: more 0 reserved 0 length 36 proposal #5 protoid ESP spisize 4 
> xforms 3 spi 0x0c0ef0b0
> ikev2_pld_xform: more 3 reserved 0 length 8 type ENCR id 3DES
> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96
> ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE
> ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 
> length 64
> ikev2_pld_tss: count 2 length 56
> ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 
> 65535
> ikev2_pld_ts: start 0.0.0.0 end 255.255.255.255
> ikev2_pld_tss: type IPV6_ADDR_RANGE protoid 0 length 40 startport 0 endport 
> 65535
> ikev2_pld_ts: start :: end ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
> ikev2_pld_payloads: decrypted payload TSr nextpayload NOTIFY critical 0x00 
> length 64
> ikev2_pld_tss: count 2 length 56
> ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 
> 65535
> ikev2_pld_ts: start 0.0.0.0 end 255.255.255.255
> ikev2_pld_tss: type IPV6_ADDR_RANGE protoid 0 length 40 startport 0 endport 
> 65535
> ikev2_pld_ts: start :: end ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
> ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NONE critical 0x00 
> length 8
> ikev2_pld_notify: protoid NONE spisize 0 type MOBIKE_SUPPORTED
> ikev2_handle_notifies: mobike enabled
> sa_stateok: SA_INIT flags 0x0000, require 0x0000 
> spi=0x2cb46a467283eb2e: sa_state: SA_INIT -> EAP
> policy_lookup: peerid 'mac-laptop'
> proposals_match: xform 2 <-> 1 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
> proposals_match: xform 2 <-> 1 (7): DH ECP_256 (keylength 0 <-> 0)
> proposals_negotiate: score 0
> proposals_match: xform 2 <-> 2 (1): ENCR AES_CBC (keylength 0 <-> 0) 256
> proposals_match: xform 2 <-> 2 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
> proposals_match: xform 2 <-> 2 (1): INTEGR HMAC_SHA2_256_128 (keylength 0 <-> 
> 0)
> proposals_match: xform 2 <-> 2 (7): DH ECP_256 (keylength 0 <-> 0)
> proposals_negotiate: score 10
> policy_lookup: setting policy 'ROAD_WARRIOR'
> ikev2_policy2id: srcid FQDN/vpn.company.com length 23
> sa_stateflags: 0x0020 -> 0x0024 certreq,sa (required 0x0079 
> cert,auth,authvalid,sa,eapvalid)
> ikev2_msg_auth: responder auth data length 293
> 2cb46a46 7283eb2e 137bbbbd 92cea87c 21202220 00000000 000000f5 22000030
> 0000002c 02010004 0300000c 0100000c 800e0100 03000008 02000005 03000008
> 0300000c 00000008 04000013 28000048 00130000 953ceb3a f2531b9e 9c941b69
> ccca92ec 64b42b61 9ea1ba83 bccd0bad a51757cc 3b07840f af0e4d7b 4ab35534
> f54a222d f701b9f8 42e02632 930abc89 7d9deae7 29000024 1eafa8f6 509355cf
> 1d59f792 78ff16f5 3dea18b3 7eed86b1 70d2e060 079a8ae1 2900001c 00004004
> 081b7a6d 260c19d6 e805e851 d3c9f345 7cc31ac3 2600001c 00004005 ba7bba2f
> fb6401e3 6168e557 aaf4a39e c7efa043 00000005 0b799705 7e92b50e 5bff320a
> ddd69bcf a46bec8a 91381953 c2f07d10 dae1411b 424b4c2f 9d0fd191 18a345c5
> 1ffec1c8 fa
> ca_setauth: switching SIG to RSA_SIG(*)
> ca_setauth: auth length 293
> proposals_match: xform 1 <-> 1 (2): ESN NONE (keylength 0 <-> 0)
> proposals_negotiate: score 0
> proposals_match: xform 2 <-> 1 (2): ESN NONE (keylength 0 <-> 0)
> proposals_negotiate: score 0
> proposals_match: xform 3 <-> 1 (2): ESN NONE (keylength 0 <-> 0)
> proposals_negotiate: score 0
> proposals_match: xform 4 <-> 1 (2): ESN NONE (keylength 0 <-> 0)
> proposals_negotiate: score 0
> proposals_match: xform 5 <-> 1 (2): ESN NONE (keylength 0 <-> 0)
> proposals_negotiate: score 0
> proposals_match: xform 1 <-> 2 (1): ENCR AES_CBC (keylength 256 <-> 0) 256
> proposals_match: xform 1 <-> 2 (1): INTEGR HMAC_SHA2_256_128 (keylength 0 <-> 
> 0)
> proposals_match: xform 1 <-> 2 (2): ESN NONE (keylength 0 <-> 0)
> proposals_negotiate: score 4
> proposals_match: xform 2 <-> 2 (1): ENCR AES_CBC (keylength 256 <-> 0) 256
> proposals_match: xform 2 <-> 2 (1): INTEGR HMAC_SHA2_256_128 (keylength 0 <-> 
> 0)
> proposals_match: xform 2 <-> 2 (2): ESN NONE (keylength 0 <-> 0)
> proposals_negotiate: score 4
> proposals_match: xform 3 <-> 2 (1): ENCR AES_CBC (keylength 256 <-> 0) 256
> proposals_match: xform 3 <-> 2 (1): INTEGR HMAC_SHA2_256_128 (keylength 0 <-> 
> 0)
> proposals_match: xform 3 <-> 2 (2): ESN NONE (keylength 0 <-> 0)
> proposals_negotiate: score 4
> proposals_match: xform 4 <-> 2 (7): ENCR AES_CBC (keylength 128 <-> 0) 128
> proposals_match: xform 4 <-> 2 (10): INTEGR HMAC_SHA1_96 (keylength 0 <-> 0)
> proposals_match: xform 4 <-> 2 (2): ESN NONE (keylength 0 <-> 0)
> proposals_negotiate: score 19
> proposals_match: xform 5 <-> 2 (10): INTEGR HMAC_SHA1_96 (keylength 0 <-> 0)
> proposals_match: xform 5 <-> 2 (2): ESN NONE (keylength 0 <-> 0)
> proposals_negotiate: score 0
> proposals_negotiate: score 1: ENCR AES_CBC 256
> proposals_negotiate: score 1: INTEGR HMAC_SHA2_256_128
> proposals_negotiate: score 2: ESN NONE
> sa_stateflags: 0x0024 -> 0x0024 certreq,sa (required 0x0079 
> cert,auth,authvalid,sa,eapvalid)
> config_free_proposals: free 0x8f3b2d15680
> config_free_proposals: free 0x8f3b2d2c800
> config_free_proposals: free 0x8f3b2d10080
> config_free_proposals: free 0x8f3b2d10100
> config_free_proposals: free 0x8f3b2d15600
> ca_getreq: using local public key of type RSA_KEY
> ca_setauth: auth length 256
> ikev2_getimsgdata: imsg 22 rspi 0x137bbbbd92cea87c ispi 0x2cb46a467283eb2e 
> initiator 0 sa valid type 11 data length 270
> ikev2_dispatch_cert: cert type RSA_KEY length 270, ok
> sa_stateflags: 0x0024 -> 0x0025 cert,certreq,sa (required 0x0079 
> cert,auth,authvalid,sa,eapvalid)
> ikev2_getimsgdata: imsg 35 rspi 0x137bbbbd92cea87c ispi 0x2cb46a467283eb2e 
> initiator 0 sa valid type 1 data length 256
> ikev2_dispatch_cert: AUTH type 1 len 256
> sa_stateflags: 0x0025 -> 0x002d cert,certreq,auth,sa (required 0x0079 
> cert,auth,authvalid,sa,eapvalid)
> ikev2_next_payload: length 27 nextpayload CERT
> ikev2_next_payload: length 275 nextpayload AUTH
> ikev2_next_payload: length 264 nextpayload EAP
> ikev2_next_payload: length 9 nextpayload NONE
> ikev2_next_payload: length 612 nextpayload IDr
> ikev2_msg_encrypt: decrypted length 575
> 2500001b 02000000 6c61782e 63617461 7374726f 7068652e 6e657427 0001130b
> 3082010a 02820101 00c399db 355d8f29 015c1af3 1ac78343 2f2bab59 4fb72ea2
> d7e5dc06 127a589b f2322355 82c523ec 876573c6 08ef62f7 3f581ce8 e2cc7e3f
> 34c5d1e0 efb8677c f0ff59d1 7d505c34 a733f600 1acb73f9 a8b5c572 eb9a8e92
> 5a6d91ed 3d162e0f 83b34866 179cf49a fa44f754 135c7745 29988e90 ac9697b8
> d49e027e 11e7defb fc49bbd7 d8aca879 668844dd cda40ac0 25aaada4 80164790
> 3737993a c6f20d18 a250e500 09684da6 fd6161ec cfc1d34a ed4fe025 feb743b6
> 8eda8f5d dc7f1310 11b0c81b 249a514d da1b269a 0f1b7922 cd141b67 5e38037a
> ff1c49aa 7f0123f1 f435a919 51d7d2d9 4041ead4 bf5153af 42ff26b2 2c8ce716
> 6309a439 664b4749 a1020301 00013000 01080100 00002fb7 311a6a7b 623d8941
> 081e8bf5 030f4ee9 a7c9f18d c7c5df95 133691c5 bf93c265 56e5cf57 f26702d4
> 59be3837 f29d98a3 4fd806c9 9a20eba1 546cefb4 ae527b11 24cef99d c238981e
> d098c6f2 01af46de 52c67863 b47c15cb fa4f7bee 4cbae348 2a1c39e4 713a6b9b
> b46e89f5 17262966 2ebee2e6 308d9486 7debe2de 1cfe731b 3d65c300 61928c89
> 507eaa7a b91c0d9d 7e44513a 0bb02d18 cc4e4494 c0ab802a 7255a79a 84f60ed2
> 9b187714 c82a961b f2f5c8af 7f0c4dc2 91216be0 7b4441b3 828e4c3e a08df000
> d3f05e0d 1a080765 b95a9546 c80847f3 030e884c 415ad83e afb0b2d2 9762162a
> 978aee7a 14486d8f 5409be1b 1abbcd07 0d4bea8c c7180000 00090100 000501
> ikev2_msg_encrypt: padded length 576
> 2500001b 02000000 6c61782e 63617461 7374726f 7068652e 6e657427 0001130b
> 3082010a 02820101 00c399db 355d8f29 015c1af3 1ac78343 2f2bab59 4fb72ea2
> d7e5dc06 127a589b f2322355 82c523ec 876573c6 08ef62f7 3f581ce8 e2cc7e3f
> 34c5d1e0 efb8677c f0ff59d1 7d505c34 a733f600 1acb73f9 a8b5c572 eb9a8e92
> 5a6d91ed 3d162e0f 83b34866 179cf49a fa44f754 135c7745 29988e90 ac9697b8
> d49e027e 11e7defb fc49bbd7 d8aca879 668844dd cda40ac0 25aaada4 80164790
> 3737993a c6f20d18 a250e500 09684da6 fd6161ec cfc1d34a ed4fe025 feb743b6
> 8eda8f5d dc7f1310 11b0c81b 249a514d da1b269a 0f1b7922 cd141b67 5e38037a
> ff1c49aa 7f0123f1 f435a919 51d7d2d9 4041ead4 bf5153af 42ff26b2 2c8ce716
> 6309a439 664b4749 a1020301 00013000 01080100 00002fb7 311a6a7b 623d8941
> 081e8bf5 030f4ee9 a7c9f18d c7c5df95 133691c5 bf93c265 56e5cf57 f26702d4
> 59be3837 f29d98a3 4fd806c9 9a20eba1 546cefb4 ae527b11 24cef99d c238981e
> d098c6f2 01af46de 52c67863 b47c15cb fa4f7bee 4cbae348 2a1c39e4 713a6b9b
> b46e89f5 17262966 2ebee2e6 308d9486 7debe2de 1cfe731b 3d65c300 61928c89
> 507eaa7a b91c0d9d 7e44513a 0bb02d18 cc4e4494 c0ab802a 7255a79a 84f60ed2
> 9b187714 c82a961b f2f5c8af 7f0c4dc2 91216be0 7b4441b3 828e4c3e a08df000
> d3f05e0d 1a080765 b95a9546 c80847f3 030e884c 415ad83e afb0b2d2 9762162a
> 978aee7a 14486d8f 5409be1b 1abbcd07 0d4bea8c c7180000 00090100 00050100
> ikev2_msg_encrypt: length 576, padding 0, output length 608
> 85c15226 1ff9cd72 af54ba13 d83d2b57 5e0adab8 7b3d10d3 f197dda8 45c3719f
> a6b42345 0d8ffd4e e8aba2c5 7b3003f1 a91bde6a b4d18b12 b4a56d11 b362386c
> b9957a18 51bd72bb c612baee 9613acd9 01747041 38ea3f0e e325aa1f ab8c9da6
> f4585f8f eec07f8c e16d9d9e 7035685a 1f62151d 498a163f bc176854 111c8d13
> ff3130ed 739e18bb 0a071b93 f840a71e 38be4753 d7276bc1 84e0172c 26031dfc
> 6e7b5695 7e623c8c 5433c51a 884cd418 2147dce2 e4dfd3ae ea485c35 351fd03f
> a416f2ad aa81f224 f3735b3d 5abae41c caa86d6f 9c0b3e60 0a6bff83 09abeaa2
> 1af83329 2e0c6b4b 53c78d9e 8190ac83 b49ebde1 1e499dfb 446b1518 9ae44ec5
> 4b0728be 70353f3f 848c3f0e 55219bf5 26566aa3 5c908a67 b179590f 02edd4a4
> 7949d29e 37d1f29a 2e792c8f 3987ba61 da38d56d a7a92e00 988e6885 9d2c45ed
> dcfed8de afa48aed f8be37fd e8e0c344 cf598aa4 a4667c70 0f093a3d e42e3926
> 81b65674 13944628 90d1787a 15ec6c1d 25f96982 875e2258 fec7ec08 86083c4f
> 5d76e8c1 2ab11b20 9cfd4200 37cadebe 464678b0 873603d8 519dc5fd c90913f9
> b3bb987c facc2b9f 1eacf5dc 8279ecdf dc4e70ea b57e41c1 f63c6c2e 81e16015
> 175bc715 3c4d0411 c68845bc b1335055 fdf9382d 9ff158be 4a0300d9 a2c14f58
> 19ca000c 279ed955 7908bc6e 773d0a60 8d1fc74a 1dac4bc6 62bac0cb b0aef764
> 8a440d7f 43f88e2c 4a3c2fd2 34d1f1c3 d0dc26cd e60976d4 624c9cc5 bf91bb53
> 39dcf14f fdca67e7 f005bb10 722a7f65 5446def7 2d5e005b 7f1af083 6cb36144
> e20cee0c 1f1e02f2 bb326941 d49bf0c6 00000000 00000000 00000000 00000000
> ikev2_msg_integr: message length 640
> 2cb46a46 7283eb2e 137bbbbd 92cea87c 2e202320 00000001 00000280 24000264
> 85c15226 1ff9cd72 af54ba13 d83d2b57 5e0adab8 7b3d10d3 f197dda8 45c3719f
> a6b42345 0d8ffd4e e8aba2c5 7b3003f1 a91bde6a b4d18b12 b4a56d11 b362386c
> b9957a18 51bd72bb c612baee 9613acd9 01747041 38ea3f0e e325aa1f ab8c9da6
> f4585f8f eec07f8c e16d9d9e 7035685a 1f62151d 498a163f bc176854 111c8d13
> ff3130ed 739e18bb 0a071b93 f840a71e 38be4753 d7276bc1 84e0172c 26031dfc
> 6e7b5695 7e623c8c 5433c51a 884cd418 2147dce2 e4dfd3ae ea485c35 351fd03f
> a416f2ad aa81f224 f3735b3d 5abae41c caa86d6f 9c0b3e60 0a6bff83 09abeaa2
> 1af83329 2e0c6b4b 53c78d9e 8190ac83 b49ebde1 1e499dfb 446b1518 9ae44ec5
> 4b0728be 70353f3f 848c3f0e 55219bf5 26566aa3 5c908a67 b179590f 02edd4a4
> 7949d29e 37d1f29a 2e792c8f 3987ba61 da38d56d a7a92e00 988e6885 9d2c45ed
> dcfed8de afa48aed f8be37fd e8e0c344 cf598aa4 a4667c70 0f093a3d e42e3926
> 81b65674 13944628 90d1787a 15ec6c1d 25f96982 875e2258 fec7ec08 86083c4f
> 5d76e8c1 2ab11b20 9cfd4200 37cadebe 464678b0 873603d8 519dc5fd c90913f9
> b3bb987c facc2b9f 1eacf5dc 8279ecdf dc4e70ea b57e41c1 f63c6c2e 81e16015
> 175bc715 3c4d0411 c68845bc b1335055 fdf9382d 9ff158be 4a0300d9 a2c14f58
> 19ca000c 279ed955 7908bc6e 773d0a60 8d1fc74a 1dac4bc6 62bac0cb b0aef764
> 8a440d7f 43f88e2c 4a3c2fd2 34d1f1c3 d0dc26cd e60976d4 624c9cc5 bf91bb53
> 39dcf14f fdca67e7 f005bb10 722a7f65 5446def7 2d5e005b 7f1af083 6cb36144
> e20cee0c 1f1e02f2 bb326941 d49bf0c6 00000000 00000000 00000000 00000000
> ikev2_msg_integr: integrity checksum length 16
> a3badec3 bc5bd2fc 67089d67 462ccf19 5ca2b136 3ddc5e52 104b9f65 29a739f6
> ikev2_pld_parse: header ispi 0x2cb46a467283eb2e rspi 0x137bbbbd92cea87c 
> nextpayload SK version 0x20 exchange IKE_AUTH flags 0x20 msgid 1 length 640 
> response 1
> ikev2_pld_payloads: payload SK nextpayload IDr critical 0x00 length 612
> ikev2_msg_decrypt: IV length 16
> 85c15226 1ff9cd72 af54ba13 d83d2b57
> ikev2_msg_decrypt: encrypted payload length 576
> 5e0adab8 7b3d10d3 f197dda8 45c3719f a6b42345 0d8ffd4e e8aba2c5 7b3003f1
> a91bde6a b4d18b12 b4a56d11 b362386c b9957a18 51bd72bb c612baee 9613acd9
> 01747041 38ea3f0e e325aa1f ab8c9da6 f4585f8f eec07f8c e16d9d9e 7035685a
> 1f62151d 498a163f bc176854 111c8d13 ff3130ed 739e18bb 0a071b93 f840a71e
> 38be4753 d7276bc1 84e0172c 26031dfc 6e7b5695 7e623c8c 5433c51a 884cd418
> 2147dce2 e4dfd3ae ea485c35 351fd03f a416f2ad aa81f224 f3735b3d 5abae41c
> caa86d6f 9c0b3e60 0a6bff83 09abeaa2 1af83329 2e0c6b4b 53c78d9e 8190ac83
> b49ebde1 1e499dfb 446b1518 9ae44ec5 4b0728be 70353f3f 848c3f0e 55219bf5
> 26566aa3 5c908a67 b179590f 02edd4a4 7949d29e 37d1f29a 2e792c8f 3987ba61
> da38d56d a7a92e00 988e6885 9d2c45ed dcfed8de afa48aed f8be37fd e8e0c344
> cf598aa4 a4667c70 0f093a3d e42e3926 81b65674 13944628 90d1787a 15ec6c1d
> 25f96982 875e2258 fec7ec08 86083c4f 5d76e8c1 2ab11b20 9cfd4200 37cadebe
> 464678b0 873603d8 519dc5fd c90913f9 b3bb987c facc2b9f 1eacf5dc 8279ecdf
> dc4e70ea b57e41c1 f63c6c2e 81e16015 175bc715 3c4d0411 c68845bc b1335055
> fdf9382d 9ff158be 4a0300d9 a2c14f58 19ca000c 279ed955 7908bc6e 773d0a60
> 8d1fc74a 1dac4bc6 62bac0cb b0aef764 8a440d7f 43f88e2c 4a3c2fd2 34d1f1c3
> d0dc26cd e60976d4 624c9cc5 bf91bb53 39dcf14f fdca67e7 f005bb10 722a7f65
> 5446def7 2d5e005b 7f1af083 6cb36144 e20cee0c 1f1e02f2 bb326941 d49bf0c6
> ikev2_msg_decrypt: integrity checksum length 16
> a3badec3 bc5bd2fc 67089d67 462ccf19
> ikev2_msg_decrypt: integrity check succeeded
> a3badec3 bc5bd2fc 67089d67 462ccf19
> ikev2_msg_decrypt: decrypted payload length 576/576 padding 0
> 2500001b 02000000 6c61782e 63617461 7374726f 7068652e 6e657427 0001130b
> 3082010a 02820101 00c399db 355d8f29 015c1af3 1ac78343 2f2bab59 4fb72ea2
> d7e5dc06 127a589b f2322355 82c523ec 876573c6 08ef62f7 3f581ce8 e2cc7e3f
> 34c5d1e0 efb8677c f0ff59d1 7d505c34 a733f600 1acb73f9 a8b5c572 eb9a8e92
> 5a6d91ed 3d162e0f 83b34866 179cf49a fa44f754 135c7745 29988e90 ac9697b8
> d49e027e 11e7defb fc49bbd7 d8aca879 668844dd cda40ac0 25aaada4 80164790
> 3737993a c6f20d18 a250e500 09684da6 fd6161ec cfc1d34a ed4fe025 feb743b6
> 8eda8f5d dc7f1310 11b0c81b 249a514d da1b269a 0f1b7922 cd141b67 5e38037a
> ff1c49aa 7f0123f1 f435a919 51d7d2d9 4041ead4 bf5153af 42ff26b2 2c8ce716
> 6309a439 664b4749 a1020301 00013000 01080100 00002fb7 311a6a7b 623d8941
> 081e8bf5 030f4ee9 a7c9f18d c7c5df95 133691c5 bf93c265 56e5cf57 f26702d4
> 59be3837 f29d98a3 4fd806c9 9a20eba1 546cefb4 ae527b11 24cef99d c238981e
> d098c6f2 01af46de 52c67863 b47c15cb fa4f7bee 4cbae348 2a1c39e4 713a6b9b
> b46e89f5 17262966 2ebee2e6 308d9486 7debe2de 1cfe731b 3d65c300 61928c89
> 507eaa7a b91c0d9d 7e44513a 0bb02d18 cc4e4494 c0ab802a 7255a79a 84f60ed2
> 9b187714 c82a961b f2f5c8af 7f0c4dc2 91216be0 7b4441b3 828e4c3e a08df000
> d3f05e0d 1a080765 b95a9546 c80847f3 030e884c 415ad83e afb0b2d2 9762162a
> 978aee7a 14486d8f 5409be1b 1abbcd07 0d4bea8c c7180000 00090100 00050100
> ikev2_pld_payloads: decrypted payload IDr nextpayload CERT critical 0x00 
> length 27
> ikev2_pld_id: id FQDN/vpn.company.com length 23
> ikev2_pld_payloads: decrypted payload CERT nextpayload AUTH critical 0x00 
> length 275
> ikev2_pld_cert: type RSA_KEY length 270
> 3082010a 02820101 00c399db 355d8f29 015c1af3 1ac78343 2f2bab59 4fb72ea2
> d7e5dc06 127a589b f2322355 82c523ec 876573c6 08ef62f7 3f581ce8 e2cc7e3f
> 34c5d1e0 efb8677c f0ff59d1 7d505c34 a733f600 1acb73f9 a8b5c572 eb9a8e92
> 5a6d91ed 3d162e0f 83b34866 179cf49a fa44f754 135c7745 29988e90 ac9697b8
> d49e027e 11e7defb fc49bbd7 d8aca879 668844dd cda40ac0 25aaada4 80164790
> 3737993a c6f20d18 a250e500 09684da6 fd6161ec cfc1d34a ed4fe025 feb743b6
> 8eda8f5d dc7f1310 11b0c81b 249a514d da1b269a 0f1b7922 cd141b67 5e38037a
> ff1c49aa 7f0123f1 f435a919 51d7d2d9 4041ead4 bf5153af 42ff26b2 2c8ce716
> 6309a439 664b4749 a1020301 0001
> ikev2_pld_payloads: decrypted payload AUTH nextpayload EAP critical 0x00 
> length 264
> ikev2_pld_auth: method RSA_SIG length 256
> 2fb7311a 6a7b623d 8941081e 8bf5030f 4ee9a7c9 f18dc7c5 df951336 91c5bf93
> c26556e5 cf57f267 02d459be 3837f29d 98a34fd8 06c99a20 eba1546c efb4ae52
> 7b1124ce f99dc238 981ed098 c6f201af 46de52c6 7863b47c 15cbfa4f 7bee4cba
> e3482a1c 39e4713a 6b9bb46e 89f51726 29662ebe e2e6308d 94867deb e2de1cfe
> 731b3d65 c3006192 8c89507e aa7ab91c 0d9d7e44 513a0bb0 2d18cc4e 4494c0ab
> 802a7255 a79a84f6 0ed29b18 7714c82a 961bf2f5 c8af7f0c 4dc29121 6be07b44
> 41b3828e 4c3ea08d f000d3f0 5e0d1a08 0765b95a 9546c808 47f3030e 884c415a
> d83eafb0 b2d29762 162a978a ee7a1448 6d8f5409 be1b1abb cd070d4b ea8cc718
> ikev2_pld_payloads: decrypted payload EAP nextpayload NONE critical 0x00 
> length 9
> spi=0x2cb46a467283eb2e: ikev2_pld_eap: REQUEST id 0 length 5 EAP-IDENTITY
> spi=0x2cb46a467283eb2e: send IKE_AUTH res 1 peer 172.20.20.11:55618 local 
> 192.168.110.50:4500, 640 bytes, NAT-T
> 
> ^Cconfig_doreset: flushing policies
> config_doreset: flushing SAs
> config_free_proposals: free 0x8f3b2d15580
> config_free_proposals: free 0x8f3b2d15700
> config_free_proposals: free 0x8f3b2d26d80
> config_free_proposals: free 0x8f3b2d2ca00
> config_free_proposals: free 0x8f3b2d26e00
> config_free_proposals: free 0x8f3b2d2c300
> config_free_flows: free 0x8f3b2d05400
> config_doreset: flushing users
> ca exiting, pid 69111
> control exiting, pid 57526
> ikev2 exiting, pid 38703
> parent terminating
> 
> Thanks for the help.

Reply via email to