[prev in list] [next in list] [prev in thread] [next in thread] 

List:       openikev2-users
Subject:    [openikev2-users] Re: hello Dr Perez
From:       Alejandro Perez Mendez <alejandro_perez () dif ! um ! es>
Date:       2007-03-30 12:32:04
Message-ID: 1175257924.3787.9.camel () localhost ! localdomain
[Download RAW message or body]

Hi,

The responder log should show what is the exact fail reason.

Best regards,
Alejandro

> Hello Sir
> Openikev2 is running in two peers configured with ICMP
> but there is a problem when i execute ping("AUTHENTICATION FAILED: Peer does not
> authenticaticate us")
> 
> this the initiator's log file :
> [2007/03/30 13:56:38.498] [INFOR] OpenIKEv2: Running version
> 0.93: Mode=[BACKGROUND] PID=[3222]
> [2007/03/30 13:56:38.498] [INFOR] OpenIKEv2: Executable MD5
> Checksum: MD5SUM=[execute OpenIKEv2 using the full path to enable this
> feature]
> [2007/03/30 13:56:38.498] [THRDS] OpenIKEv2: Starting: Thread
> ID=[-1213356368] (Main thread)
> [2007/03/30 13:56:38.499] [INFOR] UDPSocket: Listening from
> interface: Name=[eth0] Address=[192.168.1.2#500]
> [2007/03/30 13:56:38.499] [INFOR] UDPSocket: Listening from
> interface: Name=[eth0] Address=[fe80::2b0:d0ff:fed7:e058%eth0#500]
> [2007/03/30 13:56:38.499] [IPSEC] IPSecController: Updating
> policies: Found Policies=[3]
>     <IPSEC_POLICY> {
>         id = 392
>         direction = DIR_IN
>         SRC SELECTOR ADDRESS = 192.168.1.0/24
>         DST SELECTOR ADDRESS = 192.168.1.0/24
>         ip protocol = ICMP
>         icmp type = 0
>         icmp code = 0
>         <SA_REQUEST> {
>             mode = TRANSPORT_MODE
>             ipsec protocol = PROTO_ESP
>             level = LEVEL_REQUIRE
>             request id = 0
>         }
>     }
> 
>     <IPSEC_POLICY> {
>         id = 385
>         direction = DIR_OUT
>         SRC SELECTOR ADDRESS = 192.168.1.0/24
>         DST SELECTOR ADDRESS = 192.168.1.0/24
>         ip protocol = ICMP
>         icmp type = 0
>         icmp code = 0
>         <SA_REQUEST> {
>             mode = TRANSPORT_MODE
>             ipsec protocol = PROTO_ESP
>             level = LEVEL_REQUIRE
>             request id = 0
>         }
>     }
> 
>     <IPSEC_POLICY> {
>         id = 402
>         direction = DIR_FWD
>         SRC SELECTOR ADDRESS = 192.168.1.0/24
>         DST SELECTOR ADDRESS = 192.168.1.0/24
>         ip protocol = ICMP
>         icmp type = 0
>         icmp code = 0
>         <SA_REQUEST> {
>             mode = TRANSPORT_MODE
>             ipsec protocol = PROTO_ESP
>             level = LEVEL_REQUIRE
>             request id = 0
>         }
>     }
> 
> [2007/03/30 13:56:38.500] [CONFG] OpenIKEv2: Reading data from
> file: Path=[/etc/openikev2/openikev2.conf]
>     <CONFIGURATION> {
>         <GENERAL_CONFIGURATION> {
>             cookie threshold = 5
>             cookie lifetime = 20
>             ike max halfopen time = 30
>             vendor id = openikev2-0.93
>             <ATTRIBUTE_MAP> {
>                 eap_users_filename = /etc/openikev2/eap_users.txt [STR]
>             }
>         }
>         <PEERS> {
>             <PEER_CONFIGURATION> {
>                 role = ROLE_ANY
>                 <PEER_IDs> {
>                     <ID> {
>                         id type = ID_IPV4_ADDR
>                         identification data = 192.168.1.1
>                     }
>                 }
>                 <IKE_CONFIGURATION> {
>                     <PROPOSAL> {
>                         proposal # = 0
>                         <PROTOCOL> {
>                             id = PROTO_IKE
>                             spi size = 8
>                             spi value = [00:00:00:00:00:00:00:00]
>                             <TRANSFORM> {
>                                 type = ENCR
>                                 id = ENCR_3DES
>                             }
>                             <TRANSFORM> {
>                                 type = ENCR
>                                 id = ENCR_DES
>                             }
>                             <TRANSFORM> {
>                                 type = INTEG
>                                 id = AUTH_HMAC_SHA1_96
>                             }
>                             <TRANSFORM> {
>                                 type = INTEG
>                                 id = AUTH_HMAC_MD5_96
>                             }
>                             <TRANSFORM> {
>                                 type = PRF
>                                 id = PRF_HMAC_MD5
>                             }
>                             <TRANSFORM> {
>                                 type = DH
>                                 id = 2
>                             }
>                             <TRANSFORM> {
>                                 type = DH
>                                 id = 1
>                             }
>                         }
>                     }
>                     <ID> {
>                         id type = ID_IPV4_ADDR
>                         identification data = 192.168.1.2
>                     }
>                     auth method = AUTH_METHOD_PSK
>                     peer auth method = AUTH_METHOD_PSK
>                     preshared key =
>                        
> [74:68:69:73:20:66:69:6C:65:20:63:61:6E:20:62:65:20:77:68:61:74:65:76:65:72:20:6B:69:6E:64:20:6F:
>                         
> 66:20:66:69:6C:65:3A:20:54:58:54:2C:20:4A:50:47:2C:20:47:5A:49:50:2C:20:2E:2E:2E:0A]
>                     peer preshared key =
>                        
> [74:68:69:73:20:66:69:6C:65:20:63:61:6E:20:62:65:20:77:68:61:74:65:76:65:72:20:6B:69:6E:64:20:6F:
>                         
> 66:20:66:69:6C:65:3A:20:54:58:54:2C:20:4A:50:47:2C:20:47:5A:49:50:2C:20:2E:2E:2E:0A]
>                     request configuration = NO
>                     retransmition time = 5
>                     retransmition factor = 2
>                     rekey time = 60
>                     ike max exchange retransmitions = 10
>                     use eap = NO
>                     hash & url support = NO
>                     send CERT payload = NO
>                     send CERTREQ payload = NO
>                     <CERTIFICATE_CONTROLLER> {
>                         <CA_CERTIFICATES> {
>                         }
>                         <MY_CERTIFICATES> {
>                         }
>                         <MY_HASH_URL_CERTIFICATES> {
>                         }
>                         <BLACK_LIST> {
>                         }
>                         <WHITE_LIST> {
>                         }
>                     }
>                     <ATTRIBUTE_MAP> {
>                         configuration_method = none [STR]
>                         reauth_time = 600 [INT32]
>                         use_uname = NO [BOOL]
>                     }
>                 }
>                 <IPSEC_CONFIGURATION> {
>                     <PROPOSAL> {
>                         proposal # = 0
>                         <PROTOCOL> {
>                             id = PROTO_ESP
>                             spi size = 4
>                             spi value = [00:00:00:00]
>                             <TRANSFORM> {
>                                 type = ENCR
>                                 id = ENCR_3DES
>                             }
>                             <TRANSFORM> {
>                                 type = ENCR
>                                 id = ENCR_DES
>                             }
>                             <TRANSFORM> {
>                                 type = INTEG
>                                 id = AUTH_HMAC_SHA1_96
>                             }
>                         }
>                     }
>                     <PROPOSAL> {
>                         proposal # = 0
>                         <PROTOCOL> {
>                             id = PROTO_AH
>                             spi size = 4
>                             spi value = [00:00:00:00]
>                             <TRANSFORM> {
>                                 type = INTEG
>                                 id = AUTH_HMAC_SHA1_96
>                             }
>                         }
>                     }
>                     max_allocations_soft = 268435455
>                     max_allocations_hard = 268435455
>                     max_bytes_soft = 1000000
>                     max_bytes_hard = 1200000
>                     lifetime_soft = 500
>                     lifetime_hard = 800
>                     <ATTRIBUTE_MAP> {
>                     }
>                 }
>             }
>         }
>     }
> 
> [2007/03/30 13:56:38.502] [THRDS] NetworkController: Start:
> Thread ID=[20] Cookie Threshold=[5 half-opened IKE SAs] Max. Cookie Time=[20
> seconds]
> [2007/03/30 13:56:38.502] [THRDS] IPSecController: Start: Thread
> ID=[21] Implementation=[XFRM]
> [2007/03/30 13:56:38.502] [THRDS] AlarmController: Start: Thread
> ID=[22]
> [2007/03/30 13:57:04.907] [IPSEC] IPSecController: Recv acquire:
> Policy=[385]
>     SRC=[192.168.1.2]
>     DST=[192.168.1.1]
>     SEL SRC=[192.168.1.2]
>     SEL DST=[192.168.1.1]
>     SEL PROTO=[ICMP]
>     SEL SRC PORT=[8]
>     SEL DST PORT=[0]
>     <IPSEC_POLICY> {
>         id = 385
>         direction = DIR_OUT
>         SRC SELECTOR ADDRESS = 192.168.1.0/24
>         DST SELECTOR ADDRESS = 192.168.1.0/24
>         ip protocol = ICMP
>         icmp type = 0
>         icmp code = 0
>         <SA_REQUEST> {
>             mode = TRANSPORT_MODE
>             ipsec protocol = PROTO_ESP
>             level = LEVEL_REQUIRE
>             request id = 0
>         }
>     }
> 
> [2007/03/30 13:57:04.909] [INFOR] ThreadController:
> IKE_SA_Controller for IP=[192.168.1.1#500] does not exist. Creating a new
> one
> [2007/03/30 13:57:04.909] [ALARM] Alarm=[B8:26:10:AC]: New Alarm
> created
> [2007/03/30 13:57:04.909] [ALARM] Alarm=[00:27:10:AC]: New Alarm
> created
> [2007/03/30 13:57:04.909] [ALARM] Alarm=[78:27:10:AC]: New Alarm
> created
> [2007/03/30 13:57:04.909] [ALARM] AlarmController: Register
> alarm: Alarm Id=[B8:26:10:AC] Total Alarms=[1]
> [2007/03/30 13:57:04.909] [ALARM] AlarmController: Register
> alarm: Alarm Id=[00:27:10:AC] Total Alarms=[2]
> [2007/03/30 13:57:04.909] [ALARM] AlarmController: Register
> alarm: Alarm Id=[78:27:10:AC] Total Alarms=[3]
> [2007/03/30 13:57:04.909] [EVBUS]
> IKE_SA=[01:00:00:00:00:00:00:00]: New IKE_SA IKE_SA=[01:00:00:00:00:00:00:00]
> PEER_IP=[192.168.1.1#500]
> [2007/03/30 13:57:04.909] [INFOR]
> IKE_SA=[01:00:00:00:00:00:00:00]: New IKE_SA
>     Local peer:
>     IP=[192.168.1.2]
>     <ID> {
>         id type = ID_IPV4_ADDR
>         identification data = 192.168.1.2
>     }
> 
>     Remote peer:
>     IP=[192.168.1.1#500]
>     <ID> {
>         id type = ID_IPV4_ADDR
>         identification data = 192.168.1.1
>     }
> 
>     REKEY_TIME=[64]
>     TIMEOUT=[5]
>     RETRIES=[10]
> [2007/03/30 13:57:04.910] [HOPEN] ThreadController: Increment
> Half-open count: Count=[1]
> [2007/03/30 13:57:04.910] [INFOR] ThreadController: New
> IKE_SA_Controller added: SPI=[01:00:00:00:00:00:00:00] Count=[1]
> [2007/03/30 13:57:04.910] [THRDS] CommandExecuter[0]: Assigned
> to an IKE_SA=[01:00:00:00:00:00:00:00]
> [2007/03/30 13:57:04.910] [THRDS]
> IKE_SA=[01:00:00:00:00:00:00:00]: Processing
> command=[START_INIT_EX_COMMAND]
> [2007/03/30 13:57:04.964] [ALARM] Alarm=[B8:26:10:AC]: Alarm
> reset
> [2007/03/30 13:57:04.967] [MESSG]
> IKE_SA=[01:00:00:00:00:00:00:00]: Send: IKE_SA_INIT request
>     <MESSAGE> {
>         exchange type = IKE_SA_INIT
>         message id = 0
>         initiator spi = [01:00:00:00:00:00:00:00]
>         responder spi = [00:00:00:00:00:00:00:00]
>         protocol version = 2.0
>         is original initiator? = YES
>         is a response? = NO
>         can use a higher major version? = NO
>         <UNENCRYPTED PAYLOADS> {
>             <PAYLOAD_SA> {
>                 <PROPOSAL> {
>                     proposal # = 1
>                     <PROTOCOL> {
>                         id = PROTO_IKE
>                         spi size = 0
>                         spi value = []
>                         <TRANSFORM> {
>                             type = ENCR
>                             id = ENCR_3DES
>                         }
>                         <TRANSFORM> {
>                             type = ENCR
>                             id = ENCR_DES
>                         }
>                         <TRANSFORM> {
>                             type = INTEG
>                             id = AUTH_HMAC_SHA1_96
>                         }
>                         <TRANSFORM> {
>                             type = INTEG
>                             id = AUTH_HMAC_MD5_96
>                         }
>                         <TRANSFORM> {
>                             type = PRF
>                             id = PRF_HMAC_MD5
>                         }
>                         <TRANSFORM> {
>                             type = DH
>                             id = 2
>                         }
>                         <TRANSFORM> {
>                             type = DH
>                             id = 1
>                         }
>                     }
>                 }
>             }
>             <PAYLOAD_KE> {
>                 gruop id = 2
>                 public key size = 128
>                 public key =
>                     [8A:95:8B:66:F8:8B:D5:73:A9:C4:FD:E9:3E:E4:40:23:
>                      B2:49:A0:1F:59:E6:E4:23:C2:C8:D7:FE:05:8F:77:C6:
>                      C6:2D:2A:6B:1E:83:A9:2C:BC:A1:20:EB:1E:4B:B3:E2:
>                      F4:2F:40:ED:C0:32:93:B4:8B:EA:CA:C8:1C:D7:CD:57:
>                      68:F9:E1:9E:78:E1:50:B5:4F:65:EC:A2:E2:EC:DA:67:
>                      75:46:DA:E0:A4:C9:04:C6:DE:A4:5D:59:0A:62:AA:78:
>                      A1:4F:CC:E5:9D:5E:E2:B0:F3:78:61:17:07:3F:2E:B7:
>                      C2:59:69:0D:34:92:74:49:8C:5B:16:DC:59:E1:42:C9]
>             }
>             <PAYLOAD_NONCE> {
>                 nonce length = 93
>                 nonce value =
>                     [AD:C4:D8:6C:7C:AC:E2:04:A9:0F:C9:DA:2E:BF:89:5B:
>                      74:D4:21:E9:C4:98:B2:7C:CC:30:B8:F1:4E:D6:C0:C4:
>                      95:9A:F1:81:FE:42:46:CA:03:52:B5:3F:CF:3B:A4:A6:
>                      2C:8B:F1:1E:CA:FF:81:84:7C:C0:72:C1:BC:C0:07:77:
>                      FB:6A:32:60:97:F8:51:4B:17:9C:C6:FB:4C:75:ED:18:
>                      4A:A4:6E:7A:56:69:BE:99:80:90:B1:C6:FE]
>             }
>             <PAYLOAD_VENDOR> {
>                 vendor id = openikev2-0.93
>             }
>         }
>         <ENCRYPTED PAYLOADS> {
>         }
>     }
> 
> [2007/03/30 13:57:04.967] [STATE]
> IKE_SA=[01:00:00:00:00:00:00:00]: Transition: [STATE_INITIAL --->
> STATE_IKE_SA_INIT_SENT]
> [2007/03/30 13:57:05.033] [THRDS] CommandExecuter[1]: Assigned
> to an IKE_SA=[01:00:00:00:00:00:00:00]
> [2007/03/30 13:57:05.033] [THRDS]
> IKE_SA=[01:00:00:00:00:00:00:00]: Processing command=[MESSAGE_COMMAND]
> [2007/03/30 13:57:05.034] [MESSG]
> IKE_SA=[01:00:00:00:00:00:00:00]: Recv: IKE_SA_INIT response
>     <MESSAGE> {
>         exchange type = IKE_SA_INIT
>         message id = 0
>         initiator spi = [01:00:00:00:00:00:00:00]
>         responder spi = [01:00:00:00:00:00:00:00]
>         protocol version = 2.0
>         is original initiator? = NO
>         is a response? = YES
>         can use a higher major version? = NO
>         <UNENCRYPTED PAYLOADS> {
>             <PAYLOAD_SA> {
>                 <PROPOSAL> {
>                     proposal # = 1
>                     <PROTOCOL> {
>                         id = PROTO_IKE
>                         spi size = 0
>                         spi value = []
>                         <TRANSFORM> {
>                             type = ENCR
>                             id = ENCR_3DES
>                         }
>                         <TRANSFORM> {
>                             type = PRF
>                             id = PRF_HMAC_MD5
>                         }
>                         <TRANSFORM> {
>                             type = INTEG
>                             id = AUTH_HMAC_SHA1_96
>                         }
>                         <TRANSFORM> {
>                             type = DH
>                             id = 2
>                         }
>                     }
>                 }
>             }
>             <PAYLOAD_KE> {
>                 gruop id = 2
>                 public key size = 128
>                 public key =
>                     [6E:F7:0B:C0:97:35:31:BA:2D:28:BF:33:4C:2B:E7:04:
>                      F3:D6:03:DA:2A:B8:2D:0C:23:CC:FE:ED:AD:87:93:FC:
>                      DA:3E:D5:5F:E7:61:2A:2D:8E:1E:39:5C:DB:61:E9:D2:
>                      7E:A9:CC:DD:C0:07:53:F5:6B:C9:72:97:02:B4:03:FD:
>                      B5:68:F7:F3:03:04:40:B2:BD:BF:A4:79:04:64:86:98:
>                      18:AD:3A:C5:C3:19:70:6A:AF:7B:1E:B8:06:5B:7C:95:
>                      48:F6:62:F1:89:CB:0D:DD:A8:4D:46:A8:BD:50:C1:F4:
>                      02:88:22:0A:F9:07:4A:47:E9:1B:55:3B:5B:0C:98:5A]
>             }
>             <PAYLOAD_NONCE> {
>                 nonce length = 212
>                 nonce value =
>                     [9A:D9:4A:DE:29:D5:79:EF:D9:F7:95:E9:F0:B5:13:95:
>                      D3:69:05:B6:7D:73:6A:FE:36:94:4C:74:5F:5E:87:BB:
>                      54:4A:D9:15:92:4E:2D:01:DF:AD:20:02:71:F3:E9:28:
>                      41:5A:97:E1:0E:56:C6:18:BF:56:09:BE:C9:68:27:AC:
>                      49:71:0E:1E:1F:B1:CF:58:51:9B:34:92:91:94:32:F2:
>                      9F:49:93:F5:B5:E7:2F:2D:E3:C8:3B:02:BF:6A:F6:CA:
>                      4A:34:8A:24:D9:53:E3:0B:3C:71:BF:DB:6B:4D:B9:CB:
>                      97:EB:2B:60:33:49:EB:0B:2F:68:1B:07:7C:8B:AF:65:
>                      4B:CC:0C:23:E0:51:1A:0A:9D:82:EF:63:2E:2F:FA:9C:
>                      A4:CE:C7:ED:ED:E2:AA:B7:F1:1F:32:E3:96:6B:3A:E8:
>                      8F:13:D1:30:DF:3F:3E:AA:71:A5:74:23:F9:71:15:9C:
>                      3A:23:0D:8D:20:9D:AD:9D:BB:B8:10:97:77:BF:71:BC:
>                      2E:17:18:A5:68:3D:EE:3F:E2:8C:7C:6B:04:AD:EA:B0:
>                      4A:AA:4C:72]
>             }
>             <PAYLOAD_VENDOR> {
>                 vendor id = openikev2-0.93
>             }
>         }
>         <ENCRYPTED PAYLOADS> {
>         }
>     }
> 
> [2007/03/30 13:57:05.034] [INFOR]
> IKE_SA=[01:00:00:00:00:00:00:00]: Peer indicates its vendor ID
>     [6F:70:65:6E:69:6B:65:76:32:2D:30:2E:39:33]
> [2007/03/30 13:57:05.092] [CRYPT]
> IKE_SA=[01:00:00:00:00:00:00:00]: New shared secret
> 
>         [C6:A7:54:46:39:B6:B6:15:C0:A8:0A:0F:D5:03:F2:F3:
>          3F:D3:E8:75:2C:ED:F8:85:1A:DB:B3:72:E9:14:F9:3D:
>          8E:64:52:52:F7:F7:62:2A:4E:F6:C1:35:A6:88:00:A9:
>          DE:34:47:EA:3D:34:AB:B9:C1:5D:AC:FA:5B:C5:77:13:
>          22:C0:2C:18:A3:A0:8D:7D:8D:32:3D:04:F7:F1:D1:7C:
>          FA:42:A6:AF:4A:60:8C:9E:FB:8F:4D:F1:7D:21:0F:24:
>          48:DE:36:3A:34:93:4A:29:C9:E0:B9:EC:9C:3F:1F:9C:
>          6E:B3:E0:6D:B7:65:92:86:A2:1D:C8:21:81:C3:C5:19]
> [2007/03/30 13:57:05.092] [CRYPT]
> IKE_SA=[01:00:00:00:00:00:00:00]: New IKE keying material
>     <KEY_RING> {
>         SKEYSEED = [BA:7F:B3:E0:7A:B3:4B:00:DF:B5:23:A3:89:80:1F:BE]
>         SK_d = [49:88:59:EC:C7:BD:86:4E:B8:0D:4B:CD:BE:D6:ED:22]
>         SK_ai = [61:F9:0B:56:E6:66:36:93:06:3E:60:D3:D0:21:17:E9:FE:BA:19:E5]
>         SK_ar = [E8:AB:C5:FE:A2:4C:31:8D:48:EE:32:AC:E0:D6:5E:B0:EA:60:56:4A]
>         SK_ei =
> [F1:5A:C6:37:89:CF:EE:E0:40:1C:CD:3B:9F:D0:16:BB:A6:DD:42:86:2D:23:29:DF]
>         SK_er =
> [7F:79:C6:70:94:10:B3:7A:43:07:1D:C8:6C:25:C5:B7:10:E7:31:8B:A9:2F:7C:FD]
>         SK_pi = [17:76:FB:83:33:CE:1C:F7:2E:F7:19:28:C5:B2:69:D0]
>         SK_pr = [17:03:DC:A1:06:CE:95:90:29:F5:E1:90:4E:65:5B:8F]
>     }
> 
> [2007/03/30 13:57:05.093] [ALARM] Alarm=[B8:26:10:AC]: Alarm
> disabled
> [2007/03/30 13:57:05.093] [THRDS] CommandExecuter[2]: Assigned
> to an IKE_SA=[01:00:00:00:00:00:00:00]
> [2007/03/30 13:57:05.093] [THRDS]
> IKE_SA=[01:00:00:00:00:00:00:00]: Processing
> command=[START_AUTH_EX_COMMAND]
> [2007/03/30 13:57:05.093] [EVBUS] EventBus: New CHILD_SA
> IKE_SA=[01:00:00:00:00:00:00:00] PEER_IP=[192.168.1.1#500]
> CHILD_SA=[CF:90:5A:7E]
> [2007/03/30 13:57:05.093] [ALARM] Alarm=[B8:26:10:AC]: Alarm
> reset
> [2007/03/30 13:57:05.093] [MESSG]
> IKE_SA=[01:00:00:00:00:00:00:00]: Send: IKE_AUTH request
>     <MESSAGE> {
>         exchange type = IKE_AUTH
>         message id = 1
>         initiator spi = [01:00:00:00:00:00:00:00]
>         responder spi = [01:00:00:00:00:00:00:00]
>         protocol version = 2.0
>         is original initiator? = YES
>         is a response? = NO
>         can use a higher major version? = NO
>         <UNENCRYPTED PAYLOADS> {
>         }
>         <ENCRYPTED PAYLOADS> {
>             <PAYLOAD_NOTIFY> {
>                 type = USE_TRANSPORT_MODE
>                 protocol id = PROTO_NONE
>                 spi size = 0
>                 spi value = []
>                 data size = 0
>                 data = []
>             }
>             <PAYLOAD_ID> {
>                 type = IDi
>                 <ID> {
>                     id type = ID_IPV4_ADDR
>                     identification data = 192.168.1.2
>                 }
>             <PAYLOAD_AUTH> {
>                 method = AUTH_METHOD_PSK
>                 authentication field =
> [EB:4B:33:8B:90:3A:4D:52:53:D8:DF:47:5C:72:38:CE]
>             }
>             <PAYLOAD_SA> {
>                 <PROPOSAL> {
>                     proposal # = 1
>                     <PROTOCOL> {
>                         id = PROTO_ESP
>                         spi size = 4
>                         spi value = [CF:90:5A:7E]
>                         <TRANSFORM> {
>                             type = ENCR
>                             id = ENCR_3DES
>                         }
>                         <TRANSFORM> {
>                             type = ENCR
>                             id = ENCR_DES
>                         }
>                         <TRANSFORM> {
>                             type = INTEG
>                             id = AUTH_HMAC_SHA1_96
>                         }
>                     }
>                 }
>             }
>             <PAYLOAD_TS> {
>                 type = TSi
>                 <TRAFFIC_SELECTOR> {
>                     type = TS_IPV4_ADDR_RANGE
>                     ip protocol = ICMP
>                     type/code range = 8/0-8/255
>                     start address = [C0:A8:01:02]
>                     end address = [C0:A8:01:02]
>                 }
>                 <TRAFFIC_SELECTOR> {
>                     type = TS_IPV4_ADDR_RANGE
>                     ip protocol = ICMP
>                     type/code range = 0/0-255/255
>                     start address = [C0:A8:01:00]
>                     end address = [C0:A8:01:FF]
>                 }
>             }
>             <PAYLOAD_TS> {
>                 type = TSr
>                 <TRAFFIC_SELECTOR> {
>                     type = TS_IPV4_ADDR_RANGE
>                     ip protocol = ICMP
>                     type/code range = 8/0-8/255
>                     start address = [C0:A8:01:01]
>                     end address = [C0:A8:01:01]
>                 }
>                 <TRAFFIC_SELECTOR> {
>                     type = TS_IPV4_ADDR_RANGE
>                     ip protocol = ICMP
>                     type/code range = 0/0-255/255
>                     start address = [C0:A8:01:00]
>                     end address = [C0:A8:01:FF]
>                 }
>             }
>         }
>     }
> 
> [2007/03/30 13:57:05.095] [STATE]
> IKE_SA=[01:00:00:00:00:00:00:00]: Transition: [STATE_IKE_SA_INIT_SENT --->
> STATE_IKE_AUTH_SENT]
> [2007/03/30 13:57:05.099] [THRDS] CommandExecuter[3]: Assigned
> to an IKE_SA=[01:00:00:00:00:00:00:00]
> [2007/03/30 13:57:05.099] [THRDS]
> IKE_SA=[01:00:00:00:00:00:00:00]: Processing command=[MESSAGE_COMMAND]
> [2007/03/30 13:57:05.099] [MESSG]
> IKE_SA=[01:00:00:00:00:00:00:00]: Recv: IKE_AUTH response
>     <MESSAGE> {
>         exchange type = IKE_AUTH
>         message id = 1
>         initiator spi = [01:00:00:00:00:00:00:00]
>         responder spi = [01:00:00:00:00:00:00:00]
>         protocol version = 2.0
>         is original initiator? = NO
>         is a response? = YES
>         can use a higher major version? = NO
>         <UNENCRYPTED PAYLOADS> {
>         }
>         <ENCRYPTED PAYLOADS> {
>             <PAYLOAD_NOTIFY> {
>                 type = AUTHENTICATION_FAILED
>                 protocol id = PROTO_NONE
>                 spi size = 0
>                 spi value = []
>                 data size = 0
>                 data = []
>             }
>         }
>     }
> 
> [2007/03/30 13:57:05.100] [ERROR]
> IKE_SA=[01:00:00:00:00:00:00:00]: AUTHENTICATION FAILED: Peer does not
> authenticaticate us
> [2007/03/30 13:57:05.100] [EVBUS] EventBus: IKE_SA Fail
> IKE_SA=[01:00:00:00:00:00:00:00] PEER_IP=[192.168.1.1#500]
> reason=[authentication failed]
> [2007/03/30 13:57:05.100] [EVBUS] EventBus: IKE_SA Fail
> IKE_SA=[01:00:00:00:00:00:00:00] PEER_IP=[192.168.1.1#500] reason=[generic
> fail]
> [2007/03/30 13:57:05.100] [INFOR] ThreadController: Delete
> IKE_SA_Controller: SPI=[01:00:00:00:00:00:00:00] Count=[0]
> [2007/03/30 13:57:05.100] [EVBUS] EventBus: Delete IKE_SA
> IKE_SA=[01:00:00:00:00:00:00:00] PEER_IP=[192.168.1.1#500]
> [2007/03/30 13:57:05.100] [HOPEN] ThreadController: Decrement
> Half-open count: Count=[0]
> [2007/03/30 13:57:05.100] [ALARM] AlarmController: Remove alarm:
> Alarm Id=[[B8:26:10:AC]] Total Alarms=[3]
> [2007/03/30 13:57:05.100] [ALARM] Alarm=[B8:26:10:AC]: Alarm
> deleted
> [2007/03/30 13:57:05.100] [ALARM] AlarmController: Remove alarm:
> Alarm Id=[[00:27:10:AC]] Total Alarms=[2]
> [2007/03/30 13:57:05.100] [ALARM] Alarm=[00:27:10:AC]: Alarm
> deleted
> [2007/03/30 13:57:05.100] [ALARM] AlarmController: Remove alarm:
> Alarm Id=[[78:27:10:AC]] Total Alarms=[1]
> [2007/03/30 13:57:05.101] [ALARM] Alarm=[78:27:10:AC]: Alarm
> deleted
> [2007/03/30 13:57:05.101] [INFOR]
> IKE_SA=[01:00:00:00:00:00:00:00]: IKE_SA deleted
> [2007/03/30 13:57:34.908] [IPSEC] IPSecController: Recv HARD
> expiration: Child SA SPI=[CF:90:5A:7E]
> [2007/03/30 13:57:34.908] [WARNG] IPSecController: Does not
> exist any IKE_SA with this peer address.
> [2007/03/30 13:57:36.907] [IPSEC] IPSecController: Recv acquire:
> Policy=[385]
>     SRC=[192.168.1.2]
>     DST=[192.168.1.1]
>     SEL SRC=[192.168.1.2]
>     SEL DST=[192.168.1.1]
>     SEL PROTO=[ICMP]
>     SEL SRC PORT=[8]
>     SEL DST PORT=[0]
>     <IPSEC_POLICY> {
>         id = 385
>         direction = DIR_OUT
>         SRC SELECTOR ADDRESS = 192.168.1.0/24
>         DST SELECTOR ADDRESS = 192.168.1.0/24
>         ip protocol = ICMP
>         icmp type = 0
>         icmp code = 0
>         <SA_REQUEST> {
>             mode = TRANSPORT_MODE
>             ipsec protocol = PROTO_ESP
>             level = LEVEL_REQUIRE
>             request id = 0
>         }
>     }
> 
> [2007/03/30 13:57:36.908] [INFOR] ThreadController:
> IKE_SA_Controller for IP=[192.168.1.1#500] does not exist. Creating a new
> one
> [2007/03/30 13:57:36.909] [ALARM] Alarm=[C8:26:10:AC]: New Alarm
> created
> [2007/03/30 13:57:36.909] [ALARM] Alarm=[10:27:10:AC]: New Alarm
> created
> [2007/03/30 13:57:36.909] [ALARM] Alarm=[00:28:10:AC]: New Alarm
> created
> [2007/03/30 13:57:36.909] [ALARM] AlarmController: Register
> alarm: Alarm Id=[C8:26:10:AC] Total Alarms=[1]
> [2007/03/30 13:57:36.909] [ALARM] AlarmController: Register
> alarm: Alarm Id=[10:27:10:AC] Total Alarms=[2]
> [2007/03/30 13:57:36.909] [ALARM] AlarmController: Register
> alarm: Alarm Id=[00:28:10:AC] Total Alarms=[3]
> [2007/03/30 13:57:36.909] [EVBUS]
> IKE_SA=[02:00:00:00:00:00:00:00]: New IKE_SA IKE_SA=[02:00:00:00:00:00:00:00]
> PEER_IP=[192.168.1.1#500]
> [2007/03/30 13:57:36.909] [INFOR]
> IKE_SA=[02:00:00:00:00:00:00:00]: New IKE_SA
>     Local peer:
>     IP=[192.168.1.2]
>     <ID> {
>         id type = ID_IPV4_ADDR
>         identification data = 192.168.1.2
>     }
> 
>     Remote peer:
>     IP=[192.168.1.1#500]
>     <ID> {
>         id type = ID_IPV4_ADDR
>         identification data = 192.168.1.1
>     }
> 
>     REKEY_TIME=[55]
>     TIMEOUT=[5]
>     RETRIES=[10]
> [2007/03/30 13:57:36.909] [HOPEN] ThreadController: Increment
> Half-open count: Count=[1]
> [2007/03/30 13:57:36.910] [INFOR] ThreadController: New
> IKE_SA_Controller added: SPI=[02:00:00:00:00:00:00:00] Count=[1]
> [2007/03/30 13:57:36.910] [THRDS] CommandExecuter[4]: Assigned
> to an IKE_SA=[02:00:00:00:00:00:00:00]
> [2007/03/30 13:57:36.910] [THRDS]
> IKE_SA=[02:00:00:00:00:00:00:00]: Processing
> command=[START_INIT_EX_COMMAND]
> [2007/03/30 13:57:36.933] [ALARM] Alarm=[C8:26:10:AC]: Alarm
> reset
> [2007/03/30 13:57:36.933] [MESSG]
> IKE_SA=[02:00:00:00:00:00:00:00]: Send: IKE_SA_INIT request
>     <MESSAGE> {
>         exchange type = IKE_SA_INIT
>         message id = 0
>         initiator spi = [02:00:00:00:00:00:00:00]
>         responder spi = [00:00:00:00:00:00:00:00]
>         protocol version = 2.0
>         is original initiator? = YES
>         is a response? = NO
>         can use a higher major version? = NO
>         <UNENCRYPTED PAYLOADS> {
>             <PAYLOAD_SA> {
>                 <PROPOSAL> {
>                     proposal # = 1
>                     <PROTOCOL> {
>                         id = PROTO_IKE
>                         spi size = 0
>                         spi value = []
>                         <TRANSFORM> {
>                             type = ENCR
>                             id = ENCR_3DES
>                         }
>                         <TRANSFORM> {
>                             type = ENCR
>                             id = ENCR_DES
>                         }
>                         <TRANSFORM> {
>                             type = INTEG
>                             id = AUTH_HMAC_SHA1_96
>                         }
>                         <TRANSFORM> {
>                             type = INTEG
>                             id = AUTH_HMAC_MD5_96
>                         }
>                         <TRANSFORM> {
>                             type = PRF
>                             id = PRF_HMAC_MD5
>                         }
>                         <TRANSFORM> {
>                             type = DH
>                             id = 2
>                         }
>                         <TRANSFORM> {
>                             type = DH
>                             id = 1
>                         }
>                     }
>                 }
>             }
>             <PAYLOAD_KE> {
>                 gruop id = 2
>                 public key size = 128
>                 public key =
>                     [DD:CE:FF:D5:E0:FC:40:D7:89:83:CB:35:3C:02:FD:7F:
>                      31:A5:93:04:60:94:46:82:10:38:3A:BD:0B:F2:52:CF:
>                      44:9F:BF:B0:89:CD:D6:67:99:53:63:9C:3D:65:EC:58:
>                      B6:D1:0C:04:F8:AF:60:6B:0C:4D:F1:8E:0C:C2:73:E6:
>                      98:B6:86:11:8F:4C:24:94:81:64:32:B8:4F:4A:12:0F:
>                      21:BF:39:D8:88:14:92:81:BB:70:72:DE:6F:87:00:AE:
>                      CE:56:31:B8:94:B1:A3:64:73:3B:0B:C3:59:A3:B3:48:
>                      BF:41:2A:25:77:34:87:C9:58:C6:B0:78:2D:33:88:4A]
>             }
>             <PAYLOAD_NONCE> {
>                 nonce length = 121
>                 nonce value =
>                     [17:B2:2B:59:4A:45:76:CA:00:44:8B:96:3D:64:52:FE:
>                      86:86:C7:6D:C2:97:58:43:99:70:94:02:F1:7B:C4:A3:
>                      9C:C0:6E:10:F1:94:83:AC:50:7C:A3:6C:40:30:1C:5A:
>                      0B:14:63:4E:A4:E3:F9:8D:6C:D9:18:25:91:F9:B6:14:
>                      D5:F5:51:3B:C1:15:69:DC:EA:4F:48:8E:9C:0F:80:F6:
>                      09:F7:C9:45:1F:6B:55:0E:30:67:7B:F6:79:19:BE:3E:
>                      28:42:5F:27:A7:CD:06:77:5B:8B:6A:01:F8:9F:65:CA:
>                      AA:C1:F5:D5:F0:3B:09:F3:AA]
>             }
>             <PAYLOAD_VENDOR> {
>                 vendor id = openikev2-0.93
>             }
>         }
>         <ENCRYPTED PAYLOADS> {
>         }
>     }
> 
> [2007/03/30 13:57:36.934] [STATE]
> IKE_SA=[02:00:00:00:00:00:00:00]: Transition: [STATE_INITIAL --->
> STATE_IKE_SA_INIT_SENT]
> [2007/03/30 13:57:37.001] [THRDS] CommandExecuter[5]: Assigned
> to an IKE_SA=[02:00:00:00:00:00:00:00]
> [2007/03/30 13:57:37.001] [THRDS]
> IKE_SA=[02:00:00:00:00:00:00:00]: Processing command=[MESSAGE_COMMAND]
> [2007/03/30 13:57:37.001] [MESSG]
> IKE_SA=[02:00:00:00:00:00:00:00]: Recv: IKE_SA_INIT response
>     <MESSAGE> {
>         exchange type = IKE_SA_INIT
>         message id = 0
>         initiator spi = [02:00:00:00:00:00:00:00]
>         responder spi = [02:00:00:00:00:00:00:00]
>         protocol version = 2.0
>         is original initiator? = NO
>         is a response? = YES
>         can use a higher major version? = NO
>         <UNENCRYPTED PAYLOADS> {
>             <PAYLOAD_SA> {
>                 <PROPOSAL> {
>                     proposal # = 1
>                     <PROTOCOL> {
>                         id = PROTO_IKE
>                         spi size = 0
>                         spi value = []
>                         <TRANSFORM> {
>                             type = ENCR
>                             id = ENCR_3DES
>                         }
>                         <TRANSFORM> {
>                             type = PRF
>                             id = PRF_HMAC_MD5
>                         }
>                         <TRANSFORM> {
>                             type = INTEG
>                             id = AUTH_HMAC_SHA1_96
>                         }
>                         <TRANSFORM> {
>                             type = DH
>                             id = 2
>                         }
>                     }
>                 }
>             }
>             <PAYLOAD_KE> {
>                 gruop id = 2
>                 public key size = 128
>                 public key =
>                     [15:24:56:AD:D6:A2:D9:C6:31:BF:65:C8:65:8A:CE:CD:
>                      5A:75:23:98:53:0A:A4:E3:46:B2:3C:97:5D:74:68:E0:
>                      AF:E9:DB:25:85:D7:7F:E0:96:28:36:FF:CA:42:CB:9C:
>                      42:35:63:4D:04:70:CD:8B:1C:A3:CB:7D:0C:1D:B5:5C:
>                      89:F9:D3:E4:FB:61:17:11:B4:D1:1D:06:A2:27:9A:54:
>                      18:0D:DF:98:94:85:83:AE:E1:42:1C:4F:19:1D:3E:EF:
>                      0A:91:60:EF:9B:20:7D:D1:A3:1C:B0:E8:A3:F3:3E:8D:
>                      34:D5:7D:B8:BA:C8:CB:FD:EB:92:1E:62:A5:C0:25:7D]
>             }
>             <PAYLOAD_NONCE> {
>                 nonce length = 152
>                 nonce value =
>                     [B1:D1:6F:40:E5:6A:6E:BD:46:0C:F4:2F:DE:76:F6:96:
>                      F0:DB:35:BB:28:5E:93:61:9C:07:BF:DD:31:8B:EE:48:
>                      51:1C:B7:4E:60:2C:28:CF:6B:22:4D:33:8B:5A:05:45:
>                      3A:E3:A9:7C:38:05:02:91:A7:F7:B4:3C:18:48:7E:E1:
>                      1B:52:79:71:4A:6B:65:07:4A:4F:75:9C:FF:8D:E2:35:
>                      1E:9C:B4:F3:B5:37:57:2D:8E:B3:99:50:05:CB:42:8E:
>                      F7:A5:CC:35:69:0F:6D:2B:8C:28:D3:84:BA:BE:02:69:
>                      E6:C4:EC:01:C5:D6:07:91:87:2D:69:E6:A4:B8:5F:8D:
>                      07:23:9E:5C:26:F1:DC:03:6F:A2:C2:FC:2A:35:37:33:
>                      7B:5A:EC:68:A4:8D:AC:A0]
>             }
>             <PAYLOAD_VENDOR> {
>                 vendor id = openikev2-0.93
>             }
>         }
>         <ENCRYPTED PAYLOADS> {
>         }
>     }
> 
> [2007/03/30 13:57:37.002] [INFOR]
> IKE_SA=[02:00:00:00:00:00:00:00]: Peer indicates its vendor ID
>     [6F:70:65:6E:69:6B:65:76:32:2D:30:2E:39:33]
> [2007/03/30 13:57:37.057] [CRYPT]
> IKE_SA=[02:00:00:00:00:00:00:00]: New shared secret
> 
>         [B5:07:68:CE:69:4E:21:B9:31:6B:DC:1F:E0:E2:5F:8A:
>          98:AE:BE:B7:DD:8B:A1:06:2E:63:20:B6:FD:2F:C0:DA:
>          7B:15:E3:E0:44:E7:DC:34:DA:03:CC:16:9E:D8:D1:F4:
>          F7:78:0B:C3:22:9C:5E:87:2B:82:83:8C:9C:AA:01:04:
>          CA:B3:17:CA:A4:01:5F:9E:B7:F8:ED:19:A5:C8:61:B8:
>          E5:3B:F2:22:DF:FC:D8:0A:88:11:F3:C4:2D:10:DF:57:
>          8E:68:E7:C6:30:BA:C5:35:91:07:B9:91:C9:47:24:D8:
>          92:A8:82:E1:6A:28:F1:81:05:68:28:3B:C3:8F:B2:70]
> [2007/03/30 13:57:37.057] [CRYPT]
> IKE_SA=[02:00:00:00:00:00:00:00]: New IKE keying material
>     <KEY_RING> {
>         SKEYSEED = [3D:2C:A9:79:54:AD:0E:DC:93:C2:68:00:CB:82:8B:76]
>         SK_d = [97:80:40:80:A0:E8:53:F9:26:CA:0B:82:A0:AF:3F:5F]
>         SK_ai = [F4:EE:9D:0D:0E:E9:61:47:07:DF:99:7A:06:6B:E5:1A:90:89:1E:13]
>         SK_ar = [3B:4E:65:80:85:81:66:29:28:6C:22:8C:E5:D9:1A:13:1B:10:F6:DB]
>         SK_ei =
> [36:FC:A1:29:DA:0C:BC:D2:05:49:0B:F9:CD:59:35:73:E3:98:E7:F0:3C:56:2F:F4]
>         SK_er =
> [E6:7E:B3:72:A3:FC:96:63:1B:63:19:8D:E1:46:57:66:85:A1:5C:48:3E:93:12:F6]
>         SK_pi = [56:D1:61:95:45:9E:2F:C0:09:18:72:20:7A:4A:AE:78]
>         SK_pr = [79:D0:6C:C4:54:5C:B2:EE:EF:F7:CB:C4:F0:F0:EB:DB]
>     }
> 
> [2007/03/30 13:57:37.058] [ALARM] Alarm=[C8:26:10:AC]: Alarm
> disabled
> [2007/03/30 13:57:37.058] [THRDS] CommandExecuter[6]: Assigned
> to an IKE_SA=[02:00:00:00:00:00:00:00]
> [2007/03/30 13:57:37.058] [THRDS]
> IKE_SA=[02:00:00:00:00:00:00:00]: Processing
> command=[START_AUTH_EX_COMMAND]
> [2007/03/30 13:57:37.058] [EVBUS] EventBus: New CHILD_SA
> IKE_SA=[02:00:00:00:00:00:00:00] PEER_IP=[192.168.1.1#500]
> CHILD_SA=[3B:42:F1:F4]
> [2007/03/30 13:57:37.058] [ALARM] Alarm=[C8:26:10:AC]: Alarm
> reset
> [2007/03/30 13:57:37.058] [MESSG]
> IKE_SA=[02:00:00:00:00:00:00:00]: Send: IKE_AUTH request
>     <MESSAGE> {
>         exchange type = IKE_AUTH
>         message id = 1
>         initiator spi = [02:00:00:00:00:00:00:00]
>         responder spi = [02:00:00:00:00:00:00:00]
>         protocol version = 2.0
>         is original initiator? = YES
>         is a response? = NO
>         can use a higher major version? = NO
>         <UNENCRYPTED PAYLOADS> {
>         }
>         <ENCRYPTED PAYLOADS> {
>             <PAYLOAD_NOTIFY> {
>                 type = USE_TRANSPORT_MODE
>                 protocol id = PROTO_NONE
>                 spi size = 0
>                 spi value = []
>                 data size = 0
>                 data = []
>             }
>             <PAYLOAD_ID> {
>                 type = IDi
>                 <ID> {
>                     id type = ID_IPV4_ADDR
>                     identification data = 192.168.1.2
>                 }
>             <PAYLOAD_AUTH> {
>                 method = AUTH_METHOD_PSK
>                 authentication field =
> [A5:30:18:28:CB:84:62:24:FA:4A:13:B1:84:B9:D2:0A]
>             }
>             <PAYLOAD_SA> {
>                 <PROPOSAL> {
>                     proposal # = 1
>                     <PROTOCOL> {
>                         id = PROTO_ESP
>                         spi size = 4
>                         spi value = [3B:42:F1:F4]
>                         <TRANSFORM> {
>                             type = ENCR
>                             id = ENCR_3DES
>                         }
>                         <TRANSFORM> {
>                             type = ENCR
>                             id = ENCR_DES
>                         }
>                         <TRANSFORM> {
>                             type = INTEG
>                             id = AUTH_HMAC_SHA1_96
>                         }
>                     }
>                 }
>             }
>             <PAYLOAD_TS> {
>                 type = TSi
>                 <TRAFFIC_SELECTOR> {
>                     type = TS_IPV4_ADDR_RANGE
>                     ip protocol = ICMP
>                     type/code range = 8/0-8/255
>                     start address = [C0:A8:01:02]
>                     end address = [C0:A8:01:02]
>                 }
>                 <TRAFFIC_SELECTOR> {
>                     type = TS_IPV4_ADDR_RANGE
>                     ip protocol = ICMP
>                     type/code range = 0/0-255/255
>                     start address = [C0:A8:01:00]
>                     end address = [C0:A8:01:FF]
>                 }
>             }
>             <PAYLOAD_TS> {
>                 type = TSr
>                 <TRAFFIC_SELECTOR> {
>                     type = TS_IPV4_ADDR_RANGE
>                     ip protocol = ICMP
>                     type/code range = 8/0-8/255
>                     start address = [C0:A8:01:01]
>                     end address = [C0:A8:01:01]
>                 }
>                 <TRAFFIC_SELECTOR> {
>                     type = TS_IPV4_ADDR_RANGE
>                     ip protocol = ICMP
>                     type/code range = 0/0-255/255
>                     start address = [C0:A8:01:00]
>                     end address = [C0:A8:01:FF]
>                 }
>             }
>         }
>     }
> 
> [2007/03/30 13:57:37.060] [STATE]
> IKE_SA=[02:00:00:00:00:00:00:00]: Transition: [STATE_IKE_SA_INIT_SENT --->
> STATE_IKE_AUTH_SENT]
> [2007/03/30 13:57:37.063] [THRDS] CommandExecuter[7]: Assigned
> to an IKE_SA=[02:00:00:00:00:00:00:00]
> [2007/03/30 13:57:37.064] [THRDS]
> IKE_SA=[02:00:00:00:00:00:00:00]: Processing command=[MESSAGE_COMMAND]
> [2007/03/30 13:57:37.064] [MESSG]
> IKE_SA=[02:00:00:00:00:00:00:00]: Recv: IKE_AUTH response
>     <MESSAGE> {
>         exchange type = IKE_AUTH
>         message id = 1
>         initiator spi = [02:00:00:00:00:00:00:00]
>         responder spi = [02:00:00:00:00:00:00:00]
>         protocol version = 2.0
>         is original initiator? = NO
>         is a response? = YES
>         can use a higher major version? = NO
>         <UNENCRYPTED PAYLOADS> {
>         }
>         <ENCRYPTED PAYLOADS> {
>             <PAYLOAD_NOTIFY> {
>                 type = AUTHENTICATION_FAILED
>                 protocol id = PROTO_NONE
>                 spi size = 0
>                 spi value = []
>                 data size = 0
>                 data = []
>             }
>         }
>     }
> 
> [2007/03/30 13:57:37.064] [ERROR]
> IKE_SA=[02:00:00:00:00:00:00:00]: AUTHENTICATION FAILED: Peer does not
> authenticaticate us
> [2007/03/30 13:57:37.064] [EVBUS] EventBus: IKE_SA Fail
> IKE_SA=[02:00:00:00:00:00:00:00] PEER_IP=[192.168.1.1#500]
> reason=[authentication failed]
> [2007/03/30 13:57:37.064] [EVBUS] EventBus: IKE_SA Fail
> IKE_SA=[02:00:00:00:00:00:00:00] PEER_IP=[192.168.1.1#500] reason=[generic
> fail]
> [2007/03/30 13:57:37.064] [INFOR] ThreadController: Delete
> IKE_SA_Controller: SPI=[02:00:00:00:00:00:00:00] Count=[0]
> [2007/03/30 13:57:37.064] [EVBUS] EventBus: Delete IKE_SA
> IKE_SA=[02:00:00:00:00:00:00:00] PEER_IP=[192.168.1.1#500]
> [2007/03/30 13:57:37.064] [HOPEN] ThreadController: Decrement
> Half-open count: Count=[0]
> [2007/03/30 13:57:37.064] [ALARM] AlarmController: Remove alarm:
> Alarm Id=[[C8:26:10:AC]] Total Alarms=[3]
> [2007/03/30 13:57:37.064] [ALARM] Alarm=[C8:26:10:AC]: Alarm
> deleted
> [2007/03/30 13:57:37.064] [ALARM] AlarmController: Remove alarm:
> Alarm Id=[[10:27:10:AC]] Total Alarms=[2]
> [2007/03/30 13:57:37.065] [ALARM] Alarm=[10:27:10:AC]: Alarm
> deleted
> [2007/03/30 13:57:37.065] [ALARM] AlarmController: Remove alarm:
> Alarm Id=[[00:28:10:AC]] Total Alarms=[1]
> [2007/03/30 13:57:37.065] [ALARM] Alarm=[00:28:10:AC]: Alarm
> deleted
> [2007/03/30 13:57:37.065] [INFOR]
> IKE_SA=[02:00:00:00:00:00:00:00]: IKE_SA deleted
> [2007/03/30 13:58:06.913] [IPSEC] IPSecController: Recv HARD
> expiration: Child SA SPI=[3B:42:F1:F4]
> [2007/03/30 13:58:06.913] [WARNG] IPSecController: Does not
> exist any IKE_SA with this peer address.
> 
> 
> 
> 
> ----------------------------------------------------------------
> This message was sent using IMP, the Internet Messaging Program.

_______________________________________________
openikev2-users mailing list
openikev2-users@dif.um.es
https://correo.dif.um.es/cgi-bin/mailman/listinfo/openikev2-users
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic