Praying someone can help me overnite so i can get this tunnel up by tomorrow morning. Due to the syntax error, i created a new PSK and it was entered on both sides. Now the KMD Log shows this:
May 22 21:47:24 Dallas_SRX kmd[1458]: IKE negotiation failed with error: Authentication failed. IKE Version: 1, VPN: Colo_VPN Gateway: gw_Colo_VPN, Local: 2.2.2.2/500, Remote: 1.1.1.1/500, Local IKE-ID: 2.2.2.2, Remote IKE-ID: Maverick_Colo, VR-ID: 0 May 22 21:47:27 Dallas_SRX kmd[1458]: IKE negotiation failed with error: Authentication failed. IKE Version: 1, VPN: Colo_VPN Gateway: gw_Colo_VPN, Local: 2.2.2.2/500, Remote: 1.1.1.1/500, Local IKE-ID: 2.2.2.2, Remote IKE-ID: Maverick_Colo, VR-ID: 0 May 22 21:47:59 Dallas_SRX kmd[1458]: IKE negotiation failed with error: Authentication failed. IKE Version: 1, VPN: Colo_VPN Gateway: gw_Colo_VPN, Local: 2.2.2.2/500, Remote: 1.1.1.1/500, Local IKE-ID: 2.2.2.2, Remote IKE-ID: Maverick_Colo, VR-ID: 0 May 22 21:50:08 Dallas_SRX last message repeated 5 times May 22 22:00:04 Dallas_SRX last message repeated 21 times May 22 22:10:01 Dallas_SRX last message repeated 21 times May 22 22:18:25 Dallas_SRX last message repeated 20 times May 22 22:21:29 Dallas_SRX last message repeated 8 times May 22 22:31:29 Dallas_SRX last message repeated 24 times May 22 22:32:25 Dallas_SRX last message repeated 2 times May 22 22:39:25 Dallas_SRX last message repeated 16 times May 22 22:46:08 Dallas_SRX last message repeated 14 times May 22 22:56:08 Dallas_SRX last message repeated 24 times
And the KMD shows this:
[May 22 22:44:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:44:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:44:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:44:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:44:25][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:44:25][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847059 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:44:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847059 stop timer. timer duration 0, reason 0. [May 22 22:44:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847059 reference count is not zero (1). Delaying deletion of SA [May 22 22:44:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:44:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:44:25][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:44:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:44:25][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847059 (ref cnt 0), waiting_for_del 0xe729c0 [May 22 22:44:25][2.2.2.2 <-> 1.1.1.1] iked_peer_remove_p1sa_entry: Remove p1 sa 7847059 from peer entry 0xee3800 [May 22 22:44:25][2.2.2.2 <-> 1.1.1.1] iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { cf4da94b b93e62f9 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are responder and this is initiators first packet [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { cf4da94b b93e62f9 - 9cf2b89e 7cd6ef99 } [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: New SA [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] P1 SA 7847060 start timer. timer duration 30, reason 1. [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Original IKE cookie [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] 00000000: 9cf2 b89e 7cd6 ef99 ....|... [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: New IKE cookie [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] 00000000: 53d9 52e5 bdb6 b296 S.R..... [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800) [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296} / 00000000, nego = -1 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal. [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing 1 protocol(s) [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing transforms of protocol 1 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Attributes matched successfully [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Attributes match; selected input transform 0 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Protocols match [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Proposals match [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_isakmp_sa_reply: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296}, nego = -1 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_values: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA R (4) [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xcf4da94b b93e62f9 - 53d952e5 bdb6b296 } / 00000000, nego = -1 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 132 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e8f000 from freelist [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296 } [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296 } / 00000000, remote = 1.1.1.1:500 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296 } [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296} / 00000000, nego = -1 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = fde3d46a fb7208f6 ... [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = f3c2fd74 15163f50 ... [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6230] [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296}, nego = -1 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_o_calc_skeyid: Calculating skeyid [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5327] [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE R (6) [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xcf4da94b b93e62f9 - 53d952e5 bdb6b296 } / 00000000, nego = -1 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e8f400 from freelist [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296 } [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296 } / 00000000, remote = 1.1.1.1:500 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296 } [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296} / 00000000, nego = -1 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = 0605a938 e33b5cb2 ... [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = false [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_id: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296}, nego = -1 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = true [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0xcf4da94b b93e62f9 - 0x53d952e5 bdb6b296 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final R (8) [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xcf4da94b b93e62f9 - 53d952e5 bdb6b296 } / 00000000, nego = -1 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 68 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296}, nego = -1 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] P1 SA 7847060 stop timer. timer duration 30, reason 1. [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] P1 SA 7847060 start timer. timer duration 0, reason 3. [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] P1 SA 7847060 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230. [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847060 delete. curr ref count 1, del flags 0x3 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847060, ref cnt 1, status: Error ok [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296}, nego = -1 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296}, nego = -1 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296 } [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847060 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] P1 SA 7847060 stop timer. timer duration 0, reason 0. [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847060 (ref cnt 0), waiting_for_del 0x0 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] Initiating new P1 SA for gateway gw_Colo_VPN [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847061 start timer. timer duration 30, reason 1. [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_peer_insert_p1sa_entry: Insert p1 sa 7847061 in peer entry 0xee3800 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request: Sending Initial contact [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { 818584bb 9f18c607 - 00000000 00000000 } [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: SA = { 818584bb 9f18c607 - 00000000 00000000}, nego = -1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_proposal: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA I (3) [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x818584bb 9f18c607 - 00000000 00000000 } / 00000000, nego = -1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 144 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 818584bb 9f18c607 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3 } [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3 } / 00000000, remote = 1.1.1.1:500 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3 } [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find_half: Found half SA = { 818584bb 9f18c607 - 00000000 00000000 } [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are intiator, first response packet [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_sa_upgrade: Start, SA = { 818584bb 9f18c607 - 00000000 00000000 } -> { ... - 88cd8380 7a82a2b3 } [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3} / 00000000, nego = -1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_value: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6234] [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE I (5) [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x818584bb 9f18c607 - 88cd8380 7a82a2b3 } / 00000000, nego = -1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3 } [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3 } / 00000000, remote = 1.1.1.1:500 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3 } [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3} / 00000000, nego = -1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = 2e2b9712 2dd2f689 ... [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = a8227fae 70a6125b ... [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5204] [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = true [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final I (7) [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x818584bb 9f18c607 - 88cd8380 7a82a2b3 } / 00000000, nego = -1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 92 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3 } [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3 } / 00000000, remote = 1.1.1.1:500 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3 } [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3} / 00000000, nego = -1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = e2e23316 2cfe5285 ... [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = false [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0x818584bb 9f18c607 - 0x88cd8380 7a82a2b3 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM done I (9) [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}, nego = -1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847061 stop timer. timer duration 30, reason 1. [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847061 start timer. timer duration 0, reason 3. [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0x9717324a, protocol=0) entry to the spi table [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0xa1beaa78, protocol=0) entry to the spi table [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3} [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 0, max 1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}, nego = 0 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_init_qm_negotiation: Start, initiator = 1, message_id = eb93cb25 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_hash_1: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_sa_proposals: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_nonce: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_qm_nonce_data_len: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ke: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6345] [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ids: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] Construction NHTB payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847061 sa-cfg Colo_VPN [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] Inside iked_get_primary_addr_by_intf_name... AF = 2 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] No address found for interface st0.0 family inet [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = QM HASH SA I (16) [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x818584bb 9f18c607 - 88cd8380 7a82a2b3 } / eb93cb25, nego = 0 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_finalize_qm_hash_1: Hash[0..20] = a58b8216 44920fa1 ... [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 292 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}, nego = 0, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847061 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30. [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847061 delete. curr ref count 2, del flags 0x2 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847061, ref cnt 2, status: Error ok [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Start, expire SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}, nego = -1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3} [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 1, max 2 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Created random message id = 6f007396 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Phase 1 done, use HASH and N or D payload [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x818584bb 9f18c607 - 88cd8380 7a82a2b3 } / 6f007396, nego = 1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 84 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Sending notification to 1.1.1.1:500 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}, nego = 1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}, nego = 1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_info: Start, nego = 1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}, nego = -1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}, nego = -1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3 } [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_qm: Start, nego = 0 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 0 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847061 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847061 stop timer. timer duration 0, reason 0. [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847061 reference count is not zero (1). Delaying deletion of SA [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847061 (ref cnt 0), waiting_for_del 0xe729c0 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_peer_remove_p1sa_entry: Remove p1 sa 7847061 from peer entry 0xee3800 [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1] iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { aeb6c4e1 b1e71435 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are responder and this is initiators first packet [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { aeb6c4e1 b1e71435 - 61ac912e f417a271 } [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: New SA [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847062 start timer. timer duration 30, reason 1. [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Original IKE cookie [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] 00000000: 61ac 912e f417 a271 a......q [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: New IKE cookie [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] 00000000: 44f3 63e6 10f4 6dbe D.c...m. [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800) [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe} / 00000000, nego = -1 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal. [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing 1 protocol(s) [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing transforms of protocol 1 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Attributes matched successfully [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Attributes match; selected input transform 0 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Protocols match [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Proposals match [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_isakmp_sa_reply: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe}, nego = -1 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_values: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA R (4) [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xaeb6c4e1 b1e71435 - 44f363e6 10f46dbe } / 00000000, nego = -1 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 132 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e90800 from freelist [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe } [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe } / 00000000, remote = 1.1.1.1:500 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe } [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe} / 00000000, nego = -1 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = 10e7aee9 4a9dc393 ... [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = 3f82eeab 996ffd9b ... [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6361] [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe}, nego = -1 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_calc_skeyid: Calculating skeyid [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5791] [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE R (6) [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xaeb6c4e1 b1e71435 - 44f363e6 10f46dbe } / 00000000, nego = -1 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e90c00 from freelist [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe } [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe } / 00000000, remote = 1.1.1.1:500 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe } [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe} / 00000000, nego = -1 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = a1c24978 1b399ff0 ... [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = false [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_id: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe}, nego = -1 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = true [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0xaeb6c4e1 b1e71435 - 0x44f363e6 10f46dbe } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final R (8) [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xaeb6c4e1 b1e71435 - 44f363e6 10f46dbe } / 00000000, nego = -1 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 68 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe}, nego = -1 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847062 stop timer. timer duration 30, reason 1. [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847062 start timer. timer duration 0, reason 3. [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847062 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230. [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847062 delete. curr ref count 1, del flags 0x3 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847062, ref cnt 1, status: Error ok [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe}, nego = -1 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe}, nego = -1 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe } [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847062 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847062 stop timer. timer duration 0, reason 0. [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847062 (ref cnt 0), waiting_for_del 0x0 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] Initiating new P1 SA for gateway gw_Colo_VPN [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847063 start timer. timer duration 30, reason 1. [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_peer_insert_p1sa_entry: Insert p1 sa 7847063 in peer entry 0xee3800 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request: Sending Initial contact [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { 9c7b8610 962a1303 - 00000000 00000000 } [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: SA = { 9c7b8610 962a1303 - 00000000 00000000}, nego = -1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_proposal: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA I (3) [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x9c7b8610 962a1303 - 00000000 00000000 } / 00000000, nego = -1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 144 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 9c7b8610 962a1303 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7 } [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7 } / 00000000, remote = 1.1.1.1:500 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7 } [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find_half: Found half SA = { 9c7b8610 962a1303 - 00000000 00000000 } [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are intiator, first response packet [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_sa_upgrade: Start, SA = { 9c7b8610 962a1303 - 00000000 00000000 } -> { ... - dd01a3be ff2083a7 } [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7} / 00000000, nego = -1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_value: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [5836] [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE I (5) [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x9c7b8610 962a1303 - dd01a3be ff2083a7 } / 00000000, nego = -1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7 } [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7 } / 00000000, remote = 1.1.1.1:500 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7 } [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7} / 00000000, nego = -1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = fca967c7 1ccd44ae ... [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = 6a63391d 720e4760 ... [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5248] [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = true [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final I (7) [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x9c7b8610 962a1303 - dd01a3be ff2083a7 } / 00000000, nego = -1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 92 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7 } [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7 } / 00000000, remote = 1.1.1.1:500 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7 } [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7} / 00000000, nego = -1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = c94d79bd a55af41e ... [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = false [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0x9c7b8610 962a1303 - 0xdd01a3be ff2083a7 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM done I (9) [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}, nego = -1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847063 stop timer. timer duration 30, reason 1. [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847063 start timer. timer duration 0, reason 3. [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0x88b74904, protocol=0) entry to the spi table [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0x90f61701, protocol=0) entry to the spi table [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7} [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 0, max 1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}, nego = 0 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_init_qm_negotiation: Start, initiator = 1, message_id = b890e099 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_hash_1: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_sa_proposals: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_nonce: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_qm_nonce_data_len: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ke: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [7685] [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ids: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] Construction NHTB payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847063 sa-cfg Colo_VPN [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] Inside iked_get_primary_addr_by_intf_name... AF = 2 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] No address found for interface st0.0 family inet [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = QM HASH SA I (16) [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x9c7b8610 962a1303 - dd01a3be ff2083a7 } / b890e099, nego = 0 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_finalize_qm_hash_1: Hash[0..20] = f6a02527 b99bd880 ... [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 292 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}, nego = 0, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847063 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30. [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847063 delete. curr ref count 2, del flags 0x2 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847063, ref cnt 2, status: Error ok [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Start, expire SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}, nego = -1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7} [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 1, max 2 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Created random message id = 6f8d4bee [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Phase 1 done, use HASH and N or D payload [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x9c7b8610 962a1303 - dd01a3be ff2083a7 } / 6f8d4bee, nego = 1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 84 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Sending notification to 1.1.1.1:500 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}, nego = 1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}, nego = 1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_info: Start, nego = 1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}, nego = -1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}, nego = -1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7 } [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_qm: Start, nego = 0 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 0 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847063 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847063 stop timer. timer duration 0, reason 0. [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847063 reference count is not zero (1). Delaying deletion of SA [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847063 (ref cnt 0), waiting_for_del 0xe729c0 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_peer_remove_p1sa_entry: Remove p1 sa 7847063 from peer entry 0xee3800 [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1] iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 422949f3 2defc72e - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are responder and this is initiators first packet [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { 422949f3 2defc72e - 44e538d7 a7586ffd } [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: New SA [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847064 start timer. timer duration 30, reason 1. [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Original IKE cookie [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] 00000000: 44e5 38d7 a758 6ffd D.8..Xo. [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: New IKE cookie [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] 00000000: 0829 6c78 32f3 7c40 .)lx2.|@ [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800) [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 422949f3 2defc72e - 08296c78 32f37c40} / 00000000, nego = -1 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal. [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing 1 protocol(s) [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing transforms of protocol 1 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Attributes matched successfully [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Attributes match; selected input transform 0 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Protocols match [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Proposals match [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_isakmp_sa_reply: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 422949f3 2defc72e - 08296c78 32f37c40}, nego = -1 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_values: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA R (4) [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x422949f3 2defc72e - 08296c78 32f37c40 } / 00000000, nego = -1 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 132 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 422949f3 2defc72e - 08296c78 32f37c40}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e92000 from freelist [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 422949f3 2defc72e - 08296c78 32f37c40 } [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 422949f3 2defc72e - 08296c78 32f37c40 } / 00000000, remote = 1.1.1.1:500 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 422949f3 2defc72e - 08296c78 32f37c40 } [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 422949f3 2defc72e - 08296c78 32f37c40} / 00000000, nego = -1 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = 8b7fee50 03eb5e48 ... [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = 0e8941be c673c7ac ... [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6217] [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 422949f3 2defc72e - 08296c78 32f37c40}, nego = -1 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_calc_skeyid: Calculating skeyid [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5458] [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE R (6) [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x422949f3 2defc72e - 08296c78 32f37c40 } / 00000000, nego = -1 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 422949f3 2defc72e - 08296c78 32f37c40}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e92400 from freelist [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 422949f3 2defc72e - 08296c78 32f37c40 } [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 422949f3 2defc72e - 08296c78 32f37c40 } / 00000000, remote = 1.1.1.1:500 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 422949f3 2defc72e - 08296c78 32f37c40 } [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 422949f3 2defc72e - 08296c78 32f37c40} / 00000000, nego = -1 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = 71d3cbc4 261fd48c ... [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = false [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_id: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 422949f3 2defc72e - 08296c78 32f37c40}, nego = -1 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = true [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0x422949f3 2defc72e - 0x08296c78 32f37c40 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final R (8) [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x422949f3 2defc72e - 08296c78 32f37c40 } / 00000000, nego = -1 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 68 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 422949f3 2defc72e - 08296c78 32f37c40}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { 422949f3 2defc72e - 08296c78 32f37c40}, nego = -1 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847064 stop timer. timer duration 30, reason 1. [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847064 start timer. timer duration 0, reason 3. [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847064 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230. [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847064 delete. curr ref count 1, del flags 0x3 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847064, ref cnt 1, status: Error ok [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { 422949f3 2defc72e - 08296c78 32f37c40}, nego = -1 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 422949f3 2defc72e - 08296c78 32f37c40}, nego = -1 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { 422949f3 2defc72e - 08296c78 32f37c40 } [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847064 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847064 stop timer. timer duration 0, reason 0. [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847064 (ref cnt 0), waiting_for_del 0x0 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] Initiating new P1 SA for gateway gw_Colo_VPN [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847065 start timer. timer duration 30, reason 1. [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_peer_insert_p1sa_entry: Insert p1 sa 7847065 in peer entry 0xee3800 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request: Sending Initial contact [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { f6ef71f7 685cb743 - 00000000 00000000 } [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: SA = { f6ef71f7 685cb743 - 00000000 00000000}, nego = -1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_proposal: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA I (3) [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xf6ef71f7 685cb743 - 00000000 00000000 } / 00000000, nego = -1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 144 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { f6ef71f7 685cb743 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { f6ef71f7 685cb743 - c4c202df e3368960 } [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960 } / 00000000, remote = 1.1.1.1:500 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { f6ef71f7 685cb743 - c4c202df e3368960 } [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find_half: Found half SA = { f6ef71f7 685cb743 - 00000000 00000000 } [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are intiator, first response packet [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_sa_upgrade: Start, SA = { f6ef71f7 685cb743 - 00000000 00000000 } -> { ... - c4c202df e3368960 } [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960} / 00000000, nego = -1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_value: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6523] [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE I (5) [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xf6ef71f7 685cb743 - c4c202df e3368960 } / 00000000, nego = -1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { f6ef71f7 685cb743 - c4c202df e3368960}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { f6ef71f7 685cb743 - c4c202df e3368960 } [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960 } / 00000000, remote = 1.1.1.1:500 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { f6ef71f7 685cb743 - c4c202df e3368960 } [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960} / 00000000, nego = -1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = 49b04963 a199ad3e ... [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = d4801177 d2c0e8a9 ... [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5412] [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = true [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final I (7) [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xf6ef71f7 685cb743 - c4c202df e3368960 } / 00000000, nego = -1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 92 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { f6ef71f7 685cb743 - c4c202df e3368960}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { f6ef71f7 685cb743 - c4c202df e3368960 } [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960 } / 00000000, remote = 1.1.1.1:500 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { f6ef71f7 685cb743 - c4c202df e3368960 } [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960} / 00000000, nego = -1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = 58ba04fb 4108819f ... [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = false [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0xf6ef71f7 685cb743 - 0xc4c202df e3368960 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM done I (9) [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { f6ef71f7 685cb743 - c4c202df e3368960}, nego = -1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847065 stop timer. timer duration 30, reason 1. [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847065 start timer. timer duration 0, reason 3. [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0x58d5ddb1, protocol=0) entry to the spi table [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0x57f8f0d3, protocol=0) entry to the spi table [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960} [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 0, max 1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: SA = { f6ef71f7 685cb743 - c4c202df e3368960}, nego = 0 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_init_qm_negotiation: Start, initiator = 1, message_id = 64ec45d6 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_hash_1: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_sa_proposals: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_nonce: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_qm_nonce_data_len: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ke: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [7194] [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ids: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] Construction NHTB payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847065 sa-cfg Colo_VPN [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] Inside iked_get_primary_addr_by_intf_name... AF = 2 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] No address found for interface st0.0 family inet [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = QM HASH SA I (16) [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xf6ef71f7 685cb743 - c4c202df e3368960 } / 64ec45d6, nego = 0 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_finalize_qm_hash_1: Hash[0..20] = 420ade6e 9606c1f6 ... [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 292 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { f6ef71f7 685cb743 - c4c202df e3368960}, nego = 0, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847065 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30. [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847065 delete. curr ref count 2, del flags 0x2 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847065, ref cnt 2, status: Error ok [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Start, expire SA = { f6ef71f7 685cb743 - c4c202df e3368960}, nego = -1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960} [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 1, max 2 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Created random message id = 4ee8f295 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Phase 1 done, use HASH and N or D payload [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xf6ef71f7 685cb743 - c4c202df e3368960 } / 4ee8f295, nego = 1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 84 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Sending notification to 1.1.1.1:500 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { f6ef71f7 685cb743 - c4c202df e3368960}, nego = 1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960}, nego = 1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_info: Start, nego = 1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { f6ef71f7 685cb743 - c4c202df e3368960}, nego = -1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960}, nego = -1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960 } [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_qm: Start, nego = 0 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 0 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847065 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847065 stop timer. timer duration 0, reason 0. [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847065 reference count is not zero (1). Delaying deletion of SA [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847065 (ref cnt 0), waiting_for_del 0xe729c0 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_peer_remove_p1sa_entry: Remove p1 sa 7847065 from peer entry 0xee3800 [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1] iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 6897300a 37c0ec81 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500 [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are responder and this is initiators first packet [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { 6897300a 37c0ec81 - f226f596 30af1f67 } [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: New SA [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0 [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] P1 SA 7847066 start timer. timer duration 30, reason 1. [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Original IKE cookie [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] 00000000: f226 f596 30af 1f67 .&..0..g [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: New IKE cookie [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] 00000000: eb98 3e13 ac08 2e57 ..>....W [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800) [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 6897300a 37c0ec81 - eb983e13 ac082e57} / 00000000, nego = -1 [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal. [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1 [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing 1 protocol(s) [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing transforms of protocol 1 [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0 [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0 [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0 [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1 [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Attributes matched successfully [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Attributes match; selected input transform 0 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Protocols match [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Proposals match [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_isakmp_sa_reply: Start [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 6897300a 37c0ec81 - eb983e13 ac082e57}, nego = -1 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_values: Start [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA R (4) [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x6897300a 37c0ec81 - eb983e13 ac082e57 } / 00000000, nego = -1 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 132 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 6897300a 37c0ec81 - eb983e13 ac082e57}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e93800 from freelist [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 6897300a 37c0ec81 - eb983e13 ac082e57 } [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 6897300a 37c0ec81 - eb983e13 ac082e57 } / 00000000, remote = 1.1.1.1:500 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 6897300a 37c0ec81 - eb983e13 ac082e57 } [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 6897300a 37c0ec81 - eb983e13 ac082e57} / 00000000, nego = -1 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = 337a8d18 1ff5ac1d ... [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = 74468d44 6e74a905 ... [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6254] [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 6897300a 37c0ec81 - eb983e13 ac082e57}, nego = -1 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_st_o_calc_skeyid: Calculating skeyid [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5410] [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE R (6) [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x6897300a 37c0ec81 - eb983e13 ac082e57 } / 00000000, nego = -1 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 6897300a 37c0ec81 - eb983e13 ac082e57}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e93c00 from freelist [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 6897300a 37c0ec81 - eb983e13 ac082e57 } [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 6897300a 37c0ec81 - eb983e13 ac082e57 } / 00000000, remote = 1.1.1.1:500 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 6897300a 37c0ec81 - eb983e13 ac082e57 } [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 6897300a 37c0ec81 - eb983e13 ac082e57} / 00000000, nego = -1 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = 08e8ece5 e501e626 ... [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = false [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_id: Start [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 6897300a 37c0ec81 - eb983e13 ac082e57}, nego = -1 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = true [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0x6897300a 37c0ec81 - 0xeb983e13 ac082e57 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final R (8) [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x6897300a 37c0ec81 - eb983e13 ac082e57 } / 00000000, nego = -1 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 68 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 6897300a 37c0ec81 - eb983e13 ac082e57}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { 6897300a 37c0ec81 - eb983e13 ac082e57}, nego = -1 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] P1 SA 7847066 stop timer. timer duration 30, reason 1. [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] P1 SA 7847066 start timer. timer duration 0, reason 3. [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] P1 SA 7847066 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230. [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847066 delete. curr ref count 1, del flags 0x3 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847066, ref cnt 1, status: Error ok [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { 6897300a 37c0ec81 - eb983e13 ac082e57}, nego = -1 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 6897300a 37c0ec81 - eb983e13 ac082e57}, nego = -1 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { 6897300a 37c0ec81 - eb983e13 ac082e57 } [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847066 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] P1 SA 7847066 stop timer. timer duration 0, reason 0. [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847066 (ref cnt 0), waiting_for_del 0x0 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 2ad94000 1ab8d65b - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are responder and this is initiators first packet [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { 2ad94000 1ab8d65b - 28a45037 3e261557 } [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: New SA [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] P1 SA 7847067 start timer. timer duration 30, reason 1. [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Original IKE cookie [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] 00000000: 28a4 5037 3e26 1557 (.P7>&.W [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: New IKE cookie [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] 00000000: a68b 03f6 c07d 8bf0 .....}.. [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800) [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0} / 00000000, nego = -1 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal. [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing 1 protocol(s) [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing transforms of protocol 1 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Attributes matched successfully [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Attributes match; selected input transform 0 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Protocols match [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Proposals match [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_isakmp_sa_reply: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0}, nego = -1 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_values: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA R (4) [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x2ad94000 1ab8d65b - a68b03f6 c07d8bf0 } / 00000000, nego = -1 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 132 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e94400 from freelist [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0 } [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0 } / 00000000, remote = 1.1.1.1:500 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0 } [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0} / 00000000, nego = -1 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = ec67bc3e f88dce7b ... [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = 04b8fa98 a9b7aac0 ... [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6799] [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0}, nego = -1 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_calc_skeyid: Calculating skeyid [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [6766] [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE R (6) [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x2ad94000 1ab8d65b - a68b03f6 c07d8bf0 } / 00000000, nego = -1 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e94800 from freelist [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0 } [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0 } / 00000000, remote = 1.1.1.1:500 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0 } [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0} / 00000000, nego = -1 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = 920acfd6 1f7e9cdf ... [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = false [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_id: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0}, nego = -1 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = true [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0x2ad94000 1ab8d65b - 0xa68b03f6 c07d8bf0 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final R (8) [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x2ad94000 1ab8d65b - a68b03f6 c07d8bf0 } / 00000000, nego = -1 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 68 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0}, nego = -1 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] P1 SA 7847067 stop timer. timer duration 30, reason 1. [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] P1 SA 7847067 start timer. timer duration 0, reason 3. [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] P1 SA 7847067 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230. [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847067 delete. curr ref count 1, del flags 0x3 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847067, ref cnt 1, status: Error ok [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0}, nego = -1 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0}, nego = -1 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0 } [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847067 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] P1 SA 7847067 stop timer. timer duration 0, reason 0. [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847067 (ref cnt 0), waiting_for_del 0x0 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] Initiating new P1 SA for gateway gw_Colo_VPN [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847068 start timer. timer duration 30, reason 1. [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_peer_insert_p1sa_entry: Insert p1 sa 7847068 in peer entry 0xee3800 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request: Sending Initial contact [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { 8da66c58 e552ec99 - 00000000 00000000 } [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: SA = { 8da66c58 e552ec99 - 00000000 00000000}, nego = -1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_proposal: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA I (3) [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x8da66c58 e552ec99 - 00000000 00000000 } / 00000000, nego = -1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 144 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 8da66c58 e552ec99 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469 } [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469 } / 00000000, remote = 1.1.1.1:500 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469 } [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find_half: Found half SA = { 8da66c58 e552ec99 - 00000000 00000000 } [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are intiator, first response packet [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_sa_upgrade: Start, SA = { 8da66c58 e552ec99 - 00000000 00000000 } -> { ... - 9d2c42a7 38ee8469 } [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469} / 00000000, nego = -1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_value: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [5975] [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE I (5) [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x8da66c58 e552ec99 - 9d2c42a7 38ee8469 } / 00000000, nego = -1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469 } [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469 } / 00000000, remote = 1.1.1.1:500 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469 } [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469} / 00000000, nego = -1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = c424fbc1 26520783 ... [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = 2f4ab914 9fcba3b7 ... [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5394] [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = true [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final I (7) [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x8da66c58 e552ec99 - 9d2c42a7 38ee8469 } / 00000000, nego = -1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 92 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469 } [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469 } / 00000000, remote = 1.1.1.1:500 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469 } [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469} / 00000000, nego = -1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = 417e0ac9 398f8291 ... [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = false [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0x8da66c58 e552ec99 - 0x9d2c42a7 38ee8469 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM done I (9) [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}, nego = -1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847068 stop timer. timer duration 30, reason 1. [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847068 start timer. timer duration 0, reason 3. [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0xbfd50b0a, protocol=0) entry to the spi table [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0x6be3db97, protocol=0) entry to the spi table [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469} [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 0, max 1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}, nego = 0 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_init_qm_negotiation: Start, initiator = 1, message_id = f5a1a8f9 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_hash_1: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_sa_proposals: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_nonce: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_qm_nonce_data_len: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ke: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6022] [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ids: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] Construction NHTB payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847068 sa-cfg Colo_VPN [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] Inside iked_get_primary_addr_by_intf_name... AF = 2 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] No address found for interface st0.0 family inet [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = QM HASH SA I (16) [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x8da66c58 e552ec99 - 9d2c42a7 38ee8469 } / f5a1a8f9, nego = 0 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_finalize_qm_hash_1: Hash[0..20] = 32a0b90e e418caaa ... [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 292 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}, nego = 0, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847068 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30. [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847068 delete. curr ref count 2, del flags 0x2 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847068, ref cnt 2, status: Error ok [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Start, expire SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}, nego = -1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469} [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 1, max 2 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Created random message id = ad315233 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Phase 1 done, use HASH and N or D payload [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x8da66c58 e552ec99 - 9d2c42a7 38ee8469 } / ad315233, nego = 1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 84 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Sending notification to 1.1.1.1:500 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}, nego = 1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}, nego = 1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_info: Start, nego = 1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}, nego = -1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}, nego = -1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469 } [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_qm: Start, nego = 0 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 0 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847068 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847068 stop timer. timer duration 0, reason 0. [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847068 reference count is not zero (1). Delaying deletion of SA [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847068 (ref cnt 0), waiting_for_del 0xe729c0 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_peer_remove_p1sa_entry: Remove p1 sa 7847068 from peer entry 0xee3800 [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1] iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 75d251b7 a3c82220 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are responder and this is initiators first packet [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { 75d251b7 a3c82220 - 90abe627 201be8d4 } [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: New SA [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847069 start timer. timer duration 30, reason 1. [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Original IKE cookie [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] 00000000: 90ab e627 201b e8d4 ...' ... [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: New IKE cookie [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] 00000000: 9718 9611 5d62 7d43 ....]b}C [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800) [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 75d251b7 a3c82220 - 97189611 5d627d43} / 00000000, nego = -1 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal. [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing 1 protocol(s) [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing transforms of protocol 1 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Attributes matched successfully [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Attributes match; selected input transform 0 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Protocols match [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Proposals match [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_isakmp_sa_reply: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 75d251b7 a3c82220 - 97189611 5d627d43}, nego = -1 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_values: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA R (4) [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x75d251b7 a3c82220 - 97189611 5d627d43 } / 00000000, nego = -1 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 132 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 75d251b7 a3c82220 - 97189611 5d627d43}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e95c00 from freelist [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 75d251b7 a3c82220 - 97189611 5d627d43 } [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 75d251b7 a3c82220 - 97189611 5d627d43 } / 00000000, remote = 1.1.1.1:500 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 75d251b7 a3c82220 - 97189611 5d627d43 } [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 75d251b7 a3c82220 - 97189611 5d627d43} / 00000000, nego = -1 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = 05fc0842 1c9d002d ... [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = 40f8db1f b921be9f ... [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6219] [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 75d251b7 a3c82220 - 97189611 5d627d43}, nego = -1 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_calc_skeyid: Calculating skeyid [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5561] [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE R (6) [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x75d251b7 a3c82220 - 97189611 5d627d43 } / 00000000, nego = -1 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 75d251b7 a3c82220 - 97189611 5d627d43}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e96000 from freelist [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 75d251b7 a3c82220 - 97189611 5d627d43 } [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 75d251b7 a3c82220 - 97189611 5d627d43 } / 00000000, remote = 1.1.1.1:500 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 75d251b7 a3c82220 - 97189611 5d627d43 } [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 75d251b7 a3c82220 - 97189611 5d627d43} / 00000000, nego = -1 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = 17ead66e 5d6859e9 ... [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = false [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_id: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 75d251b7 a3c82220 - 97189611 5d627d43}, nego = -1 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = true [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0x75d251b7 a3c82220 - 0x97189611 5d627d43 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final R (8) [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x75d251b7 a3c82220 - 97189611 5d627d43 } / 00000000, nego = -1 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 68 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 75d251b7 a3c82220 - 97189611 5d627d43}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { 75d251b7 a3c82220 - 97189611 5d627d43}, nego = -1 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847069 stop timer. timer duration 30, reason 1. [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847069 start timer. timer duration 0, reason 3. [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847069 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230. [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847069 delete. curr ref count 1, del flags 0x3 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847069, ref cnt 1, status: Error ok [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { 75d251b7 a3c82220 - 97189611 5d627d43}, nego = -1 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 75d251b7 a3c82220 - 97189611 5d627d43}, nego = -1 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { 75d251b7 a3c82220 - 97189611 5d627d43 } [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847069 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847069 stop timer. timer duration 0, reason 0. [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847069 (ref cnt 0), waiting_for_del 0x0 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] Initiating new P1 SA for gateway gw_Colo_VPN [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847070 start timer. timer duration 30, reason 1. [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_peer_insert_p1sa_entry: Insert p1 sa 7847070 in peer entry 0xee3800 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request: Sending Initial contact [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { fbaaaede 9036f2e3 - 00000000 00000000 } [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: SA = { fbaaaede 9036f2e3 - 00000000 00000000}, nego = -1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_proposal: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA I (3) [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xfbaaaede 9036f2e3 - 00000000 00000000 } / 00000000, nego = -1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 144 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { fbaaaede 9036f2e3 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df } [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df } / 00000000, remote = 1.1.1.1:500 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df } [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find_half: Found half SA = { fbaaaede 9036f2e3 - 00000000 00000000 } [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are intiator, first response packet [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_sa_upgrade: Start, SA = { fbaaaede 9036f2e3 - 00000000 00000000 } -> { ... - 19a7df5f 7659c9df } [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df} / 00000000, nego = -1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_value: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6585] [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE I (5) [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xfbaaaede 9036f2e3 - 19a7df5f 7659c9df } / 00000000, nego = -1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df } [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df } / 00000000, remote = 1.1.1.1:500 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df } [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df} / 00000000, nego = -1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = 961c3f05 1c2d9b01 ... [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = 6410918e e0bc4d2b ... [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5449] [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = true [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final I (7) [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xfbaaaede 9036f2e3 - 19a7df5f 7659c9df } / 00000000, nego = -1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 92 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df } [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df } / 00000000, remote = 1.1.1.1:500 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df } [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df} / 00000000, nego = -1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = 2aa1c888 b580bad5 ... [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = false [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0xfbaaaede 9036f2e3 - 0x19a7df5f 7659c9df } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM done I (9) [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}, nego = -1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847070 stop timer. timer duration 30, reason 1. [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847070 start timer. timer duration 0, reason 3. [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0xaaa42b91, protocol=0) entry to the spi table [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0xfa27a941, protocol=0) entry to the spi table [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df} [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 0, max 1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}, nego = 0 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_init_qm_negotiation: Start, initiator = 1, message_id = 8c92511a [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_hash_1: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_sa_proposals: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_nonce: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_qm_nonce_data_len: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ke: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6335] [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ids: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] Construction NHTB payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847070 sa-cfg Colo_VPN [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] Inside iked_get_primary_addr_by_intf_name... AF = 2 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] No address found for interface st0.0 family inet [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = QM HASH SA I (16) [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xfbaaaede 9036f2e3 - 19a7df5f 7659c9df } / 8c92511a, nego = 0 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_finalize_qm_hash_1: Hash[0..20] = 30b3b60c 76c831bf ... [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 292 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}, nego = 0, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847070 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30. [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847070 delete. curr ref count 2, del flags 0x2 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847070, ref cnt 2, status: Error ok [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Start, expire SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}, nego = -1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df} [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 1, max 2 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Created random message id = 23187776 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Phase 1 done, use HASH and N or D payload [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xfbaaaede 9036f2e3 - 19a7df5f 7659c9df } / 23187776, nego = 1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 84 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Sending notification to 1.1.1.1:500 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}, nego = 1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}, nego = 1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_info: Start, nego = 1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}, nego = -1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}, nego = -1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df } [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_qm: Start, nego = 0 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 0 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847070 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847070 stop timer. timer duration 0, reason 0. [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847070 reference count is not zero (1). Delaying deletion of SA [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847070 (ref cnt 0), waiting_for_del 0xe729c0 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_peer_remove_p1sa_entry: Remove p1 sa 7847070 from peer entry 0xee3800 [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1] iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { ed0eb0da 22a80205 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are responder and this is initiators first packet [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { ed0eb0da 22a80205 - abe0f18f c75e6152 } [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: New SA [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] P1 SA 7847071 start timer. timer duration 30, reason 1. [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Original IKE cookie [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] 00000000: abe0 f18f c75e 6152 .....^aR [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: New IKE cookie [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] 00000000: 9a71 fccc f899 d3f5 .q...... [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800) [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5} / 00000000, nego = -1 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal. [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing 1 protocol(s) [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing transforms of protocol 1 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Attributes matched successfully [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Attributes match; selected input transform 0 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Protocols match [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Proposals match [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_isakmp_sa_reply: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5}, nego = -1 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_values: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA R (4) [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xed0eb0da 22a80205 - 9a71fccc f899d3f5 } / 00000000, nego = -1 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 132 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e97400 from freelist [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5 } [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5 } / 00000000, remote = 1.1.1.1:500 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5 } [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5} / 00000000, nego = -1 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = 77f44d34 13e46bea ... [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = 299ce81e 9436984f ... [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6170] [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5}, nego = -1 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_calc_skeyid: Calculating skeyid [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5362] [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE R (6) [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xed0eb0da 22a80205 - 9a71fccc f899d3f5 } / 00000000, nego = -1 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e97800 from freelist [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5 } [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5 } / 00000000, remote = 1.1.1.1:500 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5 } [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5} / 00000000, nego = -1 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = 47a312a3 1ad1f332 ... [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = false [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_id: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5}, nego = -1 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = true [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0xed0eb0da 22a80205 - 0x9a71fccc f899d3f5 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final R (8) [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xed0eb0da 22a80205 - 9a71fccc f899d3f5 } / 00000000, nego = -1 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 68 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5}, nego = -1 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] P1 SA 7847071 stop timer. timer duration 30, reason 1. [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] P1 SA 7847071 start timer. timer duration 0, reason 3. [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] P1 SA 7847071 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230. [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847071 delete. curr ref count 1, del flags 0x3 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847071, ref cnt 1, status: Error ok [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5}, nego = -1 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5}, nego = -1 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5 } [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847071 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] P1 SA 7847071 stop timer. timer duration 0, reason 0. [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847071 (ref cnt 0), waiting_for_del 0x0 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] Initiating new P1 SA for gateway gw_Colo_VPN [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847072 start timer. timer duration 30, reason 1. [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_peer_insert_p1sa_entry: Insert p1 sa 7847072 in peer entry 0xee3800 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request: Sending Initial contact [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { 1673a7ae 3ccb16a6 - 00000000 00000000 } [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: SA = { 1673a7ae 3ccb16a6 - 00000000 00000000}, nego = -1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_proposal: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA I (3) [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x1673a7ae 3ccb16a6 - 00000000 00000000 } / 00000000, nego = -1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 144 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 1673a7ae 3ccb16a6 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41 } [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41 } / 00000000, remote = 1.1.1.1:500 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41 } [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find_half: Found half SA = { 1673a7ae 3ccb16a6 - 00000000 00000000 } [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are intiator, first response packet [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_sa_upgrade: Start, SA = { 1673a7ae 3ccb16a6 - 00000000 00000000 } -> { ... - 22dadc26 76298e41 } [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41} / 00000000, nego = -1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_value: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6306] [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE I (5) [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x1673a7ae 3ccb16a6 - 22dadc26 76298e41 } / 00000000, nego = -1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41 } [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41 } / 00000000, remote = 1.1.1.1:500 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41 } [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41} / 00000000, nego = -1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = b83d9b9d 3b4ef0c2 ... [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = 0127180b 2454acd1 ... [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5549] [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = true [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final I (7) [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x1673a7ae 3ccb16a6 - 22dadc26 76298e41 } / 00000000, nego = -1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 92 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41 } [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41 } / 00000000, remote = 1.1.1.1:500 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41 } [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41} / 00000000, nego = -1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = d32f50a5 4ac57ee9 ... [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = false [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0x1673a7ae 3ccb16a6 - 0x22dadc26 76298e41 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM done I (9) [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}, nego = -1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847072 stop timer. timer duration 30, reason 1. [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847072 start timer. timer duration 0, reason 3. [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0x4bd66a56, protocol=0) entry to the spi table [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0x7fc54c2c, protocol=0) entry to the spi table [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41} [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 0, max 1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}, nego = 0 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_init_qm_negotiation: Start, initiator = 1, message_id = e18b2fef [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_hash_1: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_sa_proposals: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_nonce: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_qm_nonce_data_len: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ke: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6368] [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ids: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] Construction NHTB payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847072 sa-cfg Colo_VPN [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] Inside iked_get_primary_addr_by_intf_name... AF = 2 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] No address found for interface st0.0 family inet [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = QM HASH SA I (16) [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x1673a7ae 3ccb16a6 - 22dadc26 76298e41 } / e18b2fef, nego = 0 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_finalize_qm_hash_1: Hash[0..20] = f3541bad b593dd50 ... [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 292 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}, nego = 0, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847072 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30. [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847072 delete. curr ref count 2, del flags 0x2 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847072, ref cnt 2, status: Error ok [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Start, expire SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}, nego = -1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41} [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 1, max 2 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Created random message id = 1500d330 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Phase 1 done, use HASH and N or D payload [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x1673a7ae 3ccb16a6 - 22dadc26 76298e41 } / 1500d330, nego = 1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 84 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Sending notification to 1.1.1.1:500 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}, nego = 1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}, nego = 1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_info: Start, nego = 1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}, nego = -1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}, nego = -1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41 } [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_qm: Start, nego = 0 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 0 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847072 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847072 stop timer. timer duration 0, reason 0. [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847072 reference count is not zero (1). Delaying deletion of SA [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847072 (ref cnt 0), waiting_for_del 0xe729c0 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_peer_remove_p1sa_entry: Remove p1 sa 7847072 from peer entry 0xee3800 [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1] iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { ac4e6e0f dd3ffdde - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are responder and this is initiators first packet [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { ac4e6e0f dd3ffdde - ae8efd44 4b583902 } [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: New SA [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847073 start timer. timer duration 30, reason 1. [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Original IKE cookie [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] 00000000: ae8e fd44 4b58 3902 ...DKX9. [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: New IKE cookie [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] 00000000: ef9c f04b 588f ce8c ...KX... [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800) [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c} / 00000000, nego = -1 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal. [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing 1 protocol(s) [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing transforms of protocol 1 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Attributes matched successfully [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Attributes match; selected input transform 0 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Protocols match [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Proposals match [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_isakmp_sa_reply: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c}, nego = -1 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_values: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA R (4) [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xac4e6e0f dd3ffdde - ef9cf04b 588fce8c } / 00000000, nego = -1 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 132 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e98c00 from freelist [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c } [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c } / 00000000, remote = 1.1.1.1:500 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c } [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c} / 00000000, nego = -1 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = 0332d6e6 20ef1f4a ... [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = 24f47c20 73e9e227 ... [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6207] [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c}, nego = -1 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_calc_skeyid: Calculating skeyid [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5334] [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE R (6) [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xac4e6e0f dd3ffdde - ef9cf04b 588fce8c } / 00000000, nego = -1 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e99000 from freelist [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c } [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c } / 00000000, remote = 1.1.1.1:500 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c } [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c} / 00000000, nego = -1 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = 1141997e 992da1b7 ... [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = false [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_id: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c}, nego = -1 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = true [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0xac4e6e0f dd3ffdde - 0xef9cf04b 588fce8c } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final R (8) [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xac4e6e0f dd3ffdde - ef9cf04b 588fce8c } / 00000000, nego = -1 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 68 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c}, nego = -1 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847073 stop timer. timer duration 30, reason 1. [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847073 start timer. timer duration 0, reason 3. [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847073 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230. [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847073 delete. curr ref count 1, del flags 0x3 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847073, ref cnt 1, status: Error ok [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c}, nego = -1 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c}, nego = -1 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c } [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847073 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847073 stop timer. timer duration 0, reason 0. [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847073 (ref cnt 0), waiting_for_del 0x0 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] Initiating new P1 SA for gateway gw_Colo_VPN [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847074 start timer. timer duration 30, reason 1. [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_peer_insert_p1sa_entry: Insert p1 sa 7847074 in peer entry 0xee3800 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request: Sending Initial contact [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { c88db471 ce438b29 - 00000000 00000000 } [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: SA = { c88db471 ce438b29 - 00000000 00000000}, nego = -1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_proposal: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA I (3) [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xc88db471 ce438b29 - 00000000 00000000 } / 00000000, nego = -1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 144 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { c88db471 ce438b29 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { c88db471 ce438b29 - f46c7b96 c56fdf06 } [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06 } / 00000000, remote = 1.1.1.1:500 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { c88db471 ce438b29 - f46c7b96 c56fdf06 } [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find_half: Found half SA = { c88db471 ce438b29 - 00000000 00000000 } [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are intiator, first response packet [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_sa_upgrade: Start, SA = { c88db471 ce438b29 - 00000000 00000000 } -> { ... - f46c7b96 c56fdf06 } [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06} / 00000000, nego = -1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_value: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [5976] [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE I (5) [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xc88db471 ce438b29 - f46c7b96 c56fdf06 } / 00000000, nego = -1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { c88db471 ce438b29 - f46c7b96 c56fdf06 } [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06 } / 00000000, remote = 1.1.1.1:500 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { c88db471 ce438b29 - f46c7b96 c56fdf06 } [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06} / 00000000, nego = -1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = e2a696c7 6733cdac ... [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = dd668c8a f12c0431 ... [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5353] [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = true [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final I (7) [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xc88db471 ce438b29 - f46c7b96 c56fdf06 } / 00000000, nego = -1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 92 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { c88db471 ce438b29 - f46c7b96 c56fdf06 } [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06 } / 00000000, remote = 1.1.1.1:500 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { c88db471 ce438b29 - f46c7b96 c56fdf06 } [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06} / 00000000, nego = -1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = 161b61e3 73973175 ... [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = false [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0xc88db471 ce438b29 - 0xf46c7b96 c56fdf06 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM done I (9) [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}, nego = -1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847074 stop timer. timer duration 30, reason 1. [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847074 start timer. timer duration 0, reason 3. [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0x381aa335, protocol=0) entry to the spi table [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0xe39eb454, protocol=0) entry to the spi table [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06} [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 0, max 1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}, nego = 0 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_init_qm_negotiation: Start, initiator = 1, message_id = 05f58094 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_hash_1: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_sa_proposals: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_nonce: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_qm_nonce_data_len: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ke: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6229] [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ids: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] Construction NHTB payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847074 sa-cfg Colo_VPN [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] Inside iked_get_primary_addr_by_intf_name... AF = 2 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] No address found for interface st0.0 family inet [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = QM HASH SA I (16) [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xc88db471 ce438b29 - f46c7b96 c56fdf06 } / 05f58094, nego = 0 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_finalize_qm_hash_1: Hash[0..20] = d2e93f05 0e349dc7 ... [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 292 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}, nego = 0, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847074 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30. [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847074 delete. curr ref count 2, del flags 0x2 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847074, ref cnt 2, status: Error ok [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Start, expire SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}, nego = -1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06} [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 1, max 2 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Created random message id = c737bf2b [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Phase 1 done, use HASH and N or D payload [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xc88db471 ce438b29 - f46c7b96 c56fdf06 } / c737bf2b, nego = 1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 84 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Sending notification to 1.1.1.1:500 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}, nego = 1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}, nego = 1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_info: Start, nego = 1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}, nego = -1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}, nego = -1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06 } [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_qm: Start, nego = 0 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 0 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847074 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847074 stop timer. timer duration 0, reason 0. [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847074 reference count is not zero (1). Delaying deletion of SA [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847074 (ref cnt 0), waiting_for_del 0xe729c0 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_peer_remove_p1sa_entry: Remove p1 sa 7847074 from peer entry 0xee3800 [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1] iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { bb33d81b fe098510 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are responder and this is initiators first packet [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { bb33d81b fe098510 - 42e4b074 65a22c29 } [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: New SA [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] P1 SA 7847075 start timer. timer duration 30, reason 1. [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Original IKE cookie [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] 00000000: 42e4 b074 65a2 2c29 B..te.,) [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: New IKE cookie [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] 00000000: 740d 409b 38b2 734c t.@.8.sL [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800) [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { bb33d81b fe098510 - 740d409b 38b2734c} / 00000000, nego = -1 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal. [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing 1 protocol(s) [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing transforms of protocol 1 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Attributes matched successfully [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Attributes match; selected input transform 0 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Protocols match [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Proposals match [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_isakmp_sa_reply: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { bb33d81b fe098510 - 740d409b 38b2734c}, nego = -1 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_values: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA R (4) [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xbb33d81b fe098510 - 740d409b 38b2734c } / 00000000, nego = -1 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 132 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { bb33d81b fe098510 - 740d409b 38b2734c}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e9a400 from freelist [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { bb33d81b fe098510 - 740d409b 38b2734c } [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { bb33d81b fe098510 - 740d409b 38b2734c } / 00000000, remote = 1.1.1.1:500 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { bb33d81b fe098510 - 740d409b 38b2734c } [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { bb33d81b fe098510 - 740d409b 38b2734c} / 00000000, nego = -1 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = 62db8133 55e24423 ... [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = 69fb3828 4f46f3c0 ... [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6096] [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { bb33d81b fe098510 - 740d409b 38b2734c}, nego = -1 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_calc_skeyid: Calculating skeyid [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5375] [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE R (6) [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xbb33d81b fe098510 - 740d409b 38b2734c } / 00000000, nego = -1 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { bb33d81b fe098510 - 740d409b 38b2734c}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e9a800 from freelist [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { bb33d81b fe098510 - 740d409b 38b2734c } [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { bb33d81b fe098510 - 740d409b 38b2734c } / 00000000, remote = 1.1.1.1:500 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { bb33d81b fe098510 - 740d409b 38b2734c } [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { bb33d81b fe098510 - 740d409b 38b2734c} / 00000000, nego = -1 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = d55a8705 59a1aacc ... [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = false [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_id: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { bb33d81b fe098510 - 740d409b 38b2734c}, nego = -1 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = true [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0xbb33d81b fe098510 - 0x740d409b 38b2734c } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final R (8) [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xbb33d81b fe098510 - 740d409b 38b2734c } / 00000000, nego = -1 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 68 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { bb33d81b fe098510 - 740d409b 38b2734c}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { bb33d81b fe098510 - 740d409b 38b2734c}, nego = -1 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] P1 SA 7847075 stop timer. timer duration 30, reason 1. [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] P1 SA 7847075 start timer. timer duration 0, reason 3. [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] P1 SA 7847075 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230. [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847075 delete. curr ref count 1, del flags 0x3 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847075, ref cnt 1, status: Error ok [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { bb33d81b fe098510 - 740d409b 38b2734c}, nego = -1 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { bb33d81b fe098510 - 740d409b 38b2734c}, nego = -1 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { bb33d81b fe098510 - 740d409b 38b2734c } [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847075 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] P1 SA 7847075 stop timer. timer duration 0, reason 0. [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847075 (ref cnt 0), waiting_for_del 0x0 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { e3077ddb 73c320d0 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are responder and this is initiators first packet [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { e3077ddb 73c320d0 - 99c2e6ab 8ee4f746 } [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: New SA [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] P1 SA 7847076 start timer. timer duration 30, reason 1. [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Original IKE cookie [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] 00000000: 99c2 e6ab 8ee4 f746 .......F [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: New IKE cookie [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] 00000000: b5ef 57a2 a26a ae62 ..W..j.b [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800) [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62} / 00000000, nego = -1 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal. [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing 1 protocol(s) [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing transforms of protocol 1 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Attributes matched successfully [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Attributes match; selected input transform 0 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Protocols match [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Proposals match [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_isakmp_sa_reply: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62}, nego = -1 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_values: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA R (4) [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xe3077ddb 73c320d0 - b5ef57a2 a26aae62 } / 00000000, nego = -1 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 132 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e9b000 from freelist [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62 } [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62 } / 00000000, remote = 1.1.1.1:500 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62 } [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62} / 00000000, nego = -1 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = d2e5e151 6001093a ... [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = 4d8ae88d 1fa02f3d ... [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6190] [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62}, nego = -1 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_calc_skeyid: Calculating skeyid [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5372] [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE R (6) [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xe3077ddb 73c320d0 - b5ef57a2 a26aae62 } / 00000000, nego = -1 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e9b400 from freelist [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62 } [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62 } / 00000000, remote = 1.1.1.1:500 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62 } [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62} / 00000000, nego = -1 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = 20910f01 df2d4a50 ... [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = false [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_id: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62}, nego = -1 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = true [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0xe3077ddb 73c320d0 - 0xb5ef57a2 a26aae62 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final R (8) [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xe3077ddb 73c320d0 - b5ef57a2 a26aae62 } / 00000000, nego = -1 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 68 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62}, nego = -1 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] P1 SA 7847076 stop timer. timer duration 30, reason 1. [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] P1 SA 7847076 start timer. timer duration 0, reason 3. [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] P1 SA 7847076 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230. [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847076 delete. curr ref count 1, del flags 0x3 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847076, ref cnt 1, status: Error ok [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62}, nego = -1 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62}, nego = -1 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62 } [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847076 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] P1 SA 7847076 stop timer. timer duration 0, reason 0. [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847076 (ref cnt 0), waiting_for_del 0x0 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] Initiating new P1 SA for gateway gw_Colo_VPN [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847077 start timer. timer duration 30, reason 1. [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_peer_insert_p1sa_entry: Insert p1 sa 7847077 in peer entry 0xee3800 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request: Sending Initial contact [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { 84fd2fdb 7f94abe5 - 00000000 00000000 } [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: SA = { 84fd2fdb 7f94abe5 - 00000000 00000000}, nego = -1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_proposal: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA I (3) [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x84fd2fdb 7f94abe5 - 00000000 00000000 } / 00000000, nego = -1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 144 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 84fd2fdb 7f94abe5 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b } [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b } / 00000000, remote = 1.1.1.1:500 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b } [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find_half: Found half SA = { 84fd2fdb 7f94abe5 - 00000000 00000000 } [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are intiator, first response packet [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_sa_upgrade: Start, SA = { 84fd2fdb 7f94abe5 - 00000000 00000000 } -> { ... - d222cb2e 8271747b } [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b} / 00000000, nego = -1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_value: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6027] [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE I (5) [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x84fd2fdb 7f94abe5 - d222cb2e 8271747b } / 00000000, nego = -1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b } [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b } / 00000000, remote = 1.1.1.1:500 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b } [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b} / 00000000, nego = -1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = 7d2d3cbb e76b26b8 ... [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = 4ba3f4dd 3106d2e7 ... [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5380] [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = true [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final I (7) [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x84fd2fdb 7f94abe5 - d222cb2e 8271747b } / 00000000, nego = -1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 92 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b } [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b } / 00000000, remote = 1.1.1.1:500 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b } [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b} / 00000000, nego = -1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = 261e6412 fba8b505 ... [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = false [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0x84fd2fdb 7f94abe5 - 0xd222cb2e 8271747b } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM done I (9) [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}, nego = -1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847077 stop timer. timer duration 30, reason 1. [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847077 start timer. timer duration 0, reason 3. [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0xd10e271a, protocol=0) entry to the spi table [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0x7fa74d51, protocol=0) entry to the spi table [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b} [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 0, max 1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}, nego = 0 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_init_qm_negotiation: Start, initiator = 1, message_id = 0bde4c60 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_hash_1: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_sa_proposals: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_nonce: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_qm_nonce_data_len: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ke: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [5963] [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ids: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] Construction NHTB payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847077 sa-cfg Colo_VPN [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] Inside iked_get_primary_addr_by_intf_name... AF = 2 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] No address found for interface st0.0 family inet [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = QM HASH SA I (16) [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x84fd2fdb 7f94abe5 - d222cb2e 8271747b } / 0bde4c60, nego = 0 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_finalize_qm_hash_1: Hash[0..20] = f6a66bb9 f2722499 ... [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 292 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}, nego = 0, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847077 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30. [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847077 delete. curr ref count 2, del flags 0x2 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847077, ref cnt 2, status: Error ok [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Start, expire SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}, nego = -1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b} [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 1, max 2 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Created random message id = 5f506d70 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Phase 1 done, use HASH and N or D payload [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x84fd2fdb 7f94abe5 - d222cb2e 8271747b } / 5f506d70, nego = 1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 84 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Sending notification to 1.1.1.1:500 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}, nego = 1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}, nego = 1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_info: Start, nego = 1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}, nego = -1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}, nego = -1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b } [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_qm: Start, nego = 0 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 0 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847077 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847077 stop timer. timer duration 0, reason 0. [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847077 reference count is not zero (1). Delaying deletion of SA [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847077 (ref cnt 0), waiting_for_del 0xe729c0 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_peer_remove_p1sa_entry: Remove p1 sa 7847077 from peer entry 0xee3800 [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1] iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 04e2c2bf 184be017 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are responder and this is initiators first packet [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { 04e2c2bf 184be017 - b0f43429 a5fc9501 } [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: New SA [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] P1 SA 7847078 start timer. timer duration 30, reason 1. [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Original IKE cookie [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] 00000000: b0f4 3429 a5fc 9501 ..4).... [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: New IKE cookie [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] 00000000: 4ebb 4b31 f962 a288 N.K1.b.. [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800) [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288} / 00000000, nego = -1 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal. [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing 1 protocol(s) [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing transforms of protocol 1 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Attributes matched successfully [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Attributes match; selected input transform 0 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Protocols match [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Proposals match [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_isakmp_sa_reply: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288}, nego = -1 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_values: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA R (4) [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x04e2c2bf 184be017 - 4ebb4b31 f962a288 } / 00000000, nego = -1 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 132 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e9c800 from freelist [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288 } [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288 } / 00000000, remote = 1.1.1.1:500 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288 } [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288} / 00000000, nego = -1 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = 0420dad6 bd84acfe ... [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = af2f202d cbb95594 ... [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6347] [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288}, nego = -1 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_o_calc_skeyid: Calculating skeyid [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5630] [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE R (6) [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x04e2c2bf 184be017 - 4ebb4b31 f962a288 } / 00000000, nego = -1 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e9cc00 from freelist [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288 } [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288 } / 00000000, remote = 1.1.1.1:500 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288 } [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288} / 00000000, nego = -1 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = 7d11e8c5 40a24829 ... [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = false [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_id: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288}, nego = -1 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = true [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0x04e2c2bf 184be017 - 0x4ebb4b31 f962a288 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final R (8) [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x04e2c2bf 184be017 - 4ebb4b31 f962a288 } / 00000000, nego = -1 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 68 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288}, nego = -1 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] P1 SA 7847078 stop timer. timer duration 30, reason 1. [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] P1 SA 7847078 start timer. timer duration 0, reason 3. [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] P1 SA 7847078 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230. [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847078 delete. curr ref count 1, del flags 0x3 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847078, ref cnt 1, status: Error ok [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288}, nego = -1 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288}, nego = -1 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288 } [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847078 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] P1 SA 7847078 stop timer. timer duration 0, reason 0. [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847078 (ref cnt 0), waiting_for_del 0x0 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] Initiating new P1 SA for gateway gw_Colo_VPN [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847079 start timer. timer duration 30, reason 1. [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_peer_insert_p1sa_entry: Insert p1 sa 7847079 in peer entry 0xee3800 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request: Sending Initial contact [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { fe14b406 242a6e97 - 00000000 00000000 } [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: SA = { fe14b406 242a6e97 - 00000000 00000000}, nego = -1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_proposal: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA I (3) [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xfe14b406 242a6e97 - 00000000 00000000 } / 00000000, nego = -1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 144 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { fe14b406 242a6e97 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049 } [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049 } / 00000000, remote = 1.1.1.1:500 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049 } [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find_half: Found half SA = { fe14b406 242a6e97 - 00000000 00000000 } [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are intiator, first response packet [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_sa_upgrade: Start, SA = { fe14b406 242a6e97 - 00000000 00000000 } -> { ... - 12948fb8 1b7cb049 } [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049} / 00000000, nego = -1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_value: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6359] [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE I (5) [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xfe14b406 242a6e97 - 12948fb8 1b7cb049 } / 00000000, nego = -1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049 } [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049 } / 00000000, remote = 1.1.1.1:500 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049 } [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049} / 00000000, nego = -1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = 06dc5ea2 c24dd8bf ... [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = eedc6114 830b1e9e ... [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5334] [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = true [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final I (7) [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xfe14b406 242a6e97 - 12948fb8 1b7cb049 } / 00000000, nego = -1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 92 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049 } [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049 } / 00000000, remote = 1.1.1.1:500 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049 } [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049} / 00000000, nego = -1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = bc410a88 b43e8086 ... [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = false [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0xfe14b406 242a6e97 - 0x12948fb8 1b7cb049 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM done I (9) [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}, nego = -1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847079 stop timer. timer duration 30, reason 1. [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847079 start timer. timer duration 0, reason 3. [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0x756ba779, protocol=0) entry to the spi table [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0xcf9787da, protocol=0) entry to the spi table [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049} [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 0, max 1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}, nego = 0 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_init_qm_negotiation: Start, initiator = 1, message_id = a5b050e0 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_hash_1: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_sa_proposals: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_nonce: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_qm_nonce_data_len: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ke: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6007] [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ids: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] Construction NHTB payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847079 sa-cfg Colo_VPN [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] Inside iked_get_primary_addr_by_intf_name... AF = 2 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] No address found for interface st0.0 family inet [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = QM HASH SA I (16) [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xfe14b406 242a6e97 - 12948fb8 1b7cb049 } / a5b050e0, nego = 0 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_finalize_qm_hash_1: Hash[0..20] = cff5149b 1e941545 ... [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 292 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}, nego = 0, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847079 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30. [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847079 delete. curr ref count 2, del flags 0x2 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847079, ref cnt 2, status: Error ok [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Start, expire SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}, nego = -1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049} [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 1, max 2 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Created random message id = 89de6d15 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Phase 1 done, use HASH and N or D payload [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xfe14b406 242a6e97 - 12948fb8 1b7cb049 } / 89de6d15, nego = 1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 84 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Sending notification to 1.1.1.1:500 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}, nego = 1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}, nego = 1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_info: Start, nego = 1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}, nego = -1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}, nego = -1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049 } [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_qm: Start, nego = 0 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 0 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847079 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847079 stop timer. timer duration 0, reason 0. [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847079 reference count is not zero (1). Delaying deletion of SA [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847079 (ref cnt 0), waiting_for_del 0xe729c0 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_peer_remove_p1sa_entry: Remove p1 sa 7847079 from peer entry 0xee3800 [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1] iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 1c6b3ef1 962d02eb - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are responder and this is initiators first packet [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { 1c6b3ef1 962d02eb - c4b81806 cd6f7f46 } [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: New SA [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] P1 SA 7847080 start timer. timer duration 30, reason 1. [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Original IKE cookie [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] 00000000: c4b8 1806 cd6f 7f46 .....o.F [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: New IKE cookie [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] 00000000: c2de 5453 3554 d88e ..TS5T.. [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800) [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e} / 00000000, nego = -1 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal. [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing 1 protocol(s) [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing transforms of protocol 1 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Attributes matched successfully [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Attributes match; selected input transform 0 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Protocols match [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Proposals match [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_isakmp_sa_reply: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e}, nego = -1 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_values: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA R (4) [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x1c6b3ef1 962d02eb - c2de5453 3554d88e } / 00000000, nego = -1 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 132 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e9e000 from freelist [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e } [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e } / 00000000, remote = 1.1.1.1:500 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e } [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e} / 00000000, nego = -1 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = a901aefa d06f8c41 ... [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = 16ca6f52 e903682d ... [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [11175] [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e}, nego = -1 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_o_calc_skeyid: Calculating skeyid [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [10523] [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE R (6) [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x1c6b3ef1 962d02eb - c2de5453 3554d88e } / 00000000, nego = -1 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e9e400 from freelist [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e } [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e } / 00000000, remote = 1.1.1.1:500 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e } [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e} / 00000000, nego = -1 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = bb917032 685b6920 ... [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = false [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_id: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e}, nego = -1 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = true [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0x1c6b3ef1 962d02eb - 0xc2de5453 3554d88e } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final R (8) [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x1c6b3ef1 962d02eb - c2de5453 3554d88e } / 00000000, nego = -1 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 68 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e}, nego = -1 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] P1 SA 7847080 stop timer. timer duration 30, reason 1. [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] P1 SA 7847080 start timer. timer duration 0, reason 3. [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] P1 SA 7847080 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230. [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847080 delete. curr ref count 1, del flags 0x3 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847080, ref cnt 1, status: Error ok [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e}, nego = -1 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e}, nego = -1 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e } [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847080 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] P1 SA 7847080 stop timer. timer duration 0, reason 0. [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847080 (ref cnt 0), waiting_for_del 0x0 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { d81d3616 787ee65c - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are responder and this is initiators first packet [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { d81d3616 787ee65c - db4e581d 1489a577 } [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: New SA [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847081 start timer. timer duration 30, reason 1. [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Original IKE cookie [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] 00000000: db4e 581d 1489 a577 .NX....w [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: New IKE cookie [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] 00000000: db5d 9b8f f057 4d06 .]...WM. [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800) [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { d81d3616 787ee65c - db5d9b8f f0574d06} / 00000000, nego = -1 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal. [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing 1 protocol(s) [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing transforms of protocol 1 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Attributes matched successfully [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Attributes match; selected input transform 0 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Protocols match [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Proposals match [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_isakmp_sa_reply: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { d81d3616 787ee65c - db5d9b8f f0574d06}, nego = -1 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_values: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA R (4) [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xd81d3616 787ee65c - db5d9b8f f0574d06 } / 00000000, nego = -1 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 132 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { d81d3616 787ee65c - db5d9b8f f0574d06}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e9ec00 from freelist [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { d81d3616 787ee65c - db5d9b8f f0574d06 } [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { d81d3616 787ee65c - db5d9b8f f0574d06 } / 00000000, remote = 1.1.1.1:500 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { d81d3616 787ee65c - db5d9b8f f0574d06 } [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { d81d3616 787ee65c - db5d9b8f f0574d06} / 00000000, nego = -1 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = 39a71fb3 b2bf155d ... [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = ad6a1c38 a5c14fb8 ... [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6545] [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { d81d3616 787ee65c - db5d9b8f f0574d06}, nego = -1 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_calc_skeyid: Calculating skeyid [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5346] [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE R (6) [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xd81d3616 787ee65c - db5d9b8f f0574d06 } / 00000000, nego = -1 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { d81d3616 787ee65c - db5d9b8f f0574d06}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e9f000 from freelist [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { d81d3616 787ee65c - db5d9b8f f0574d06 } [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { d81d3616 787ee65c - db5d9b8f f0574d06 } / 00000000, remote = 1.1.1.1:500 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { d81d3616 787ee65c - db5d9b8f f0574d06 } [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { d81d3616 787ee65c - db5d9b8f f0574d06} / 00000000, nego = -1 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = 6366f5a1 d17ff7f7 ... [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = false [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_id: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { d81d3616 787ee65c - db5d9b8f f0574d06}, nego = -1 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = true [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0xd81d3616 787ee65c - 0xdb5d9b8f f0574d06 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final R (8) [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xd81d3616 787ee65c - db5d9b8f f0574d06 } / 00000000, nego = -1 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 68 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { d81d3616 787ee65c - db5d9b8f f0574d06}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { d81d3616 787ee65c - db5d9b8f f0574d06}, nego = -1 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847081 stop timer. timer duration 30, reason 1. [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847081 start timer. timer duration 0, reason 3. [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847081 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230. [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847081 delete. curr ref count 1, del flags 0x3 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847081, ref cnt 1, status: Error ok [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { d81d3616 787ee65c - db5d9b8f f0574d06}, nego = -1 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { d81d3616 787ee65c - db5d9b8f f0574d06}, nego = -1 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { d81d3616 787ee65c - db5d9b8f f0574d06 } [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847081 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847081 stop timer. timer duration 0, reason 0. [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847081 (ref cnt 0), waiting_for_del 0x0 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] Initiating new P1 SA for gateway gw_Colo_VPN [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847082 start timer. timer duration 30, reason 1. [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_peer_insert_p1sa_entry: Insert p1 sa 7847082 in peer entry 0xee3800 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request: Sending Initial contact [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { b15898c9 6650d8fa - 00000000 00000000 } [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: SA = { b15898c9 6650d8fa - 00000000 00000000}, nego = -1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_proposal: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA I (3) [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xb15898c9 6650d8fa - 00000000 00000000 } / 00000000, nego = -1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 144 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { b15898c9 6650d8fa - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121 } [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121 } / 00000000, remote = 1.1.1.1:500 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121 } [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find_half: Found half SA = { b15898c9 6650d8fa - 00000000 00000000 } [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are intiator, first response packet [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_sa_upgrade: Start, SA = { b15898c9 6650d8fa - 00000000 00000000 } -> { ... - 79ac07fd 14f4c121 } [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121} / 00000000, nego = -1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_value: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6059] [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE I (5) [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xb15898c9 6650d8fa - 79ac07fd 14f4c121 } / 00000000, nego = -1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121 } [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121 } / 00000000, remote = 1.1.1.1:500 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121 } [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121} / 00000000, nego = -1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = 82ac181e 0c1c5a28 ... [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = d346ed84 1922d17c ... [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5344] [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = true [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final I (7) [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xb15898c9 6650d8fa - 79ac07fd 14f4c121 } / 00000000, nego = -1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 92 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121 } [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121 } / 00000000, remote = 1.1.1.1:500 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121 } [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121} / 00000000, nego = -1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = 15405b7d 4af61969 ... [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = false [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0xb15898c9 6650d8fa - 0x79ac07fd 14f4c121 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM done I (9) [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}, nego = -1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847082 stop timer. timer duration 30, reason 1. [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847082 start timer. timer duration 0, reason 3. [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0x9d299e6d, protocol=0) entry to the spi table [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0x4f6450dd, protocol=0) entry to the spi table [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121} [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 0, max 1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}, nego = 0 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_init_qm_negotiation: Start, initiator = 1, message_id = 0ee3c060 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_hash_1: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_sa_proposals: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_nonce: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_qm_nonce_data_len: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ke: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6224] [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ids: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] Construction NHTB payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847082 sa-cfg Colo_VPN [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] Inside iked_get_primary_addr_by_intf_name... AF = 2 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] No address found for interface st0.0 family inet [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = QM HASH SA I (16) [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xb15898c9 6650d8fa - 79ac07fd 14f4c121 } / 0ee3c060, nego = 0 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_finalize_qm_hash_1: Hash[0..20] = c1ff7fe6 440347db ... [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 292 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}, nego = 0, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847082 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30. [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847082 delete. curr ref count 2, del flags 0x2 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847082, ref cnt 2, status: Error ok [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Start, expire SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}, nego = -1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121} [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 1, max 2 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Created random message id = 2828e9be [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Phase 1 done, use HASH and N or D payload [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xb15898c9 6650d8fa - 79ac07fd 14f4c121 } / 2828e9be, nego = 1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 84 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Sending notification to 1.1.1.1:500 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}, nego = 1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}, nego = 1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_info: Start, nego = 1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}, nego = -1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}, nego = -1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121 } [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_qm: Start, nego = 0 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 0 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847082 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847082 stop timer. timer duration 0, reason 0. [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847082 reference count is not zero (1). Delaying deletion of SA [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847082 (ref cnt 0), waiting_for_del 0xe729c0 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_peer_remove_p1sa_entry: Remove p1 sa 7847082 from peer entry 0xee3800 [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1] iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 24c24aa1 1e7e050c - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are responder and this is initiators first packet [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { 24c24aa1 1e7e050c - 1fca010d e9380819 } [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: New SA [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] P1 SA 7847083 start timer. timer duration 30, reason 1. [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Original IKE cookie [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] 00000000: 1fca 010d e938 0819 .....8.. [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: New IKE cookie [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] 00000000: 69c9 246c af89 f6d9 i.$l.... [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800) [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9} / 00000000, nego = -1 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal. [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing 1 protocol(s) [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing transforms of protocol 1 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Attributes matched successfully [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Attributes match; selected input transform 0 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Protocols match [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Proposals match [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_isakmp_sa_reply: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9}, nego = -1 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_values: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA R (4) [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x24c24aa1 1e7e050c - 69c9246c af89f6d9 } / 00000000, nego = -1 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 132 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet ea0400 from freelist [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9 } [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9 } / 00000000, remote = 1.1.1.1:500 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9 } [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9} / 00000000, nego = -1 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = 606e413c e4ceb4c9 ... [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = 0b08be7c 5312c024 ... [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6663] [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9}, nego = -1 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_calc_skeyid: Calculating skeyid [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5407] [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE R (6) [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x24c24aa1 1e7e050c - 69c9246c af89f6d9 } / 00000000, nego = -1 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet ea0800 from freelist [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9 } [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9 } / 00000000, remote = 1.1.1.1:500 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9 } [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9} / 00000000, nego = -1 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = 1e30af57 6b851fb6 ... [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = false [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_id: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9}, nego = -1 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = true [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0x24c24aa1 1e7e050c - 0x69c9246c af89f6d9 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final R (8) [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x24c24aa1 1e7e050c - 69c9246c af89f6d9 } / 00000000, nego = -1 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 68 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9}, nego = -1 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] P1 SA 7847083 stop timer. timer duration 30, reason 1. [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] P1 SA 7847083 start timer. timer duration 0, reason 3. [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] P1 SA 7847083 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230. [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847083 delete. curr ref count 1, del flags 0x3 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847083, ref cnt 1, status: Error ok [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9}, nego = -1 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9}, nego = -1 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9 } [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847083 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] P1 SA 7847083 stop timer. timer duration 0, reason 0. [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847083 (ref cnt 0), waiting_for_del 0x0 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 2d398a59 2f84efda - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are responder and this is initiators first packet [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { 2d398a59 2f84efda - 4bb9e3a4 7b3e4adb } [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: New SA [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] P1 SA 7847084 start timer. timer duration 30, reason 1. [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Original IKE cookie [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] 00000000: 4bb9 e3a4 7b3e 4adb K...{>J. [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: New IKE cookie [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] 00000000: a414 8000 d2fe e73e .......> [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800) [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 2d398a59 2f84efda - a4148000 d2fee73e} / 00000000, nego = -1 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal. [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing 1 protocol(s) [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing transforms of protocol 1 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Attributes matched successfully [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Attributes match; selected input transform 0 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Protocols match [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Proposals match [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_isakmp_sa_reply: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 2d398a59 2f84efda - a4148000 d2fee73e}, nego = -1 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_values: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA R (4) [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x2d398a59 2f84efda - a4148000 d2fee73e } / 00000000, nego = -1 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 132 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 2d398a59 2f84efda - a4148000 d2fee73e}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet ea1000 from freelist [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 2d398a59 2f84efda - a4148000 d2fee73e } [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 2d398a59 2f84efda - a4148000 d2fee73e } / 00000000, remote = 1.1.1.1:500 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 2d398a59 2f84efda - a4148000 d2fee73e } [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 2d398a59 2f84efda - a4148000 d2fee73e} / 00000000, nego = -1 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = 027db0f8 38e092e2 ... [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = bc2ca1b1 a483f98a ... [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6082] [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 2d398a59 2f84efda - a4148000 d2fee73e}, nego = -1 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_calc_skeyid: Calculating skeyid [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5347] [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE R (6) [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x2d398a59 2f84efda - a4148000 d2fee73e } / 00000000, nego = -1 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 2d398a59 2f84efda - a4148000 d2fee73e}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet ea1400 from freelist [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 2d398a59 2f84efda - a4148000 d2fee73e } [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 2d398a59 2f84efda - a4148000 d2fee73e } / 00000000, remote = 1.1.1.1:500 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 2d398a59 2f84efda - a4148000 d2fee73e } [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 2d398a59 2f84efda - a4148000 d2fee73e} / 00000000, nego = -1 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = f3eb2b99 cebb759f ... [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = false [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_id: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 2d398a59 2f84efda - a4148000 d2fee73e}, nego = -1 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = true [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0x2d398a59 2f84efda - 0xa4148000 d2fee73e } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final R (8) [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x2d398a59 2f84efda - a4148000 d2fee73e } / 00000000, nego = -1 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 68 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 2d398a59 2f84efda - a4148000 d2fee73e}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { 2d398a59 2f84efda - a4148000 d2fee73e}, nego = -1 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] P1 SA 7847084 stop timer. timer duration 30, reason 1. [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] P1 SA 7847084 start timer. timer duration 0, reason 3. [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] P1 SA 7847084 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230. [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847084 delete. curr ref count 1, del flags 0x3 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847084, ref cnt 1, status: Error ok [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { 2d398a59 2f84efda - a4148000 d2fee73e}, nego = -1 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 2d398a59 2f84efda - a4148000 d2fee73e}, nego = -1 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { 2d398a59 2f84efda - a4148000 d2fee73e } [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847084 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] P1 SA 7847084 stop timer. timer duration 0, reason 0. [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847084 (ref cnt 0), waiting_for_del 0x0 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] Initiating new P1 SA for gateway gw_Colo_VPN [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847085 start timer. timer duration 30, reason 1. [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_peer_insert_p1sa_entry: Insert p1 sa 7847085 in peer entry 0xee3800 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request: Sending Initial contact [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { 81f8c0de 75c6e3e2 - 00000000 00000000 } [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: SA = { 81f8c0de 75c6e3e2 - 00000000 00000000}, nego = -1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_proposal: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA I (3) [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x81f8c0de 75c6e3e2 - 00000000 00000000 } / 00000000, nego = -1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 144 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 81f8c0de 75c6e3e2 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8 } [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8 } / 00000000, remote = 1.1.1.1:500 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8 } [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find_half: Found half SA = { 81f8c0de 75c6e3e2 - 00000000 00000000 } [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are intiator, first response packet [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_sa_upgrade: Start, SA = { 81f8c0de 75c6e3e2 - 00000000 00000000 } -> { ... - ce4e235d 79f682e8 } [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8} / 00000000, nego = -1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_value: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6059] [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE I (5) [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x81f8c0de 75c6e3e2 - ce4e235d 79f682e8 } / 00000000, nego = -1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8 } [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8 } / 00000000, remote = 1.1.1.1:500 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8 } [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8} / 00000000, nego = -1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = 6dccffb2 dcb7e1a9 ... [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = f2516c19 afe2c971 ... [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5569] [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = true [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final I (7) [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x81f8c0de 75c6e3e2 - ce4e235d 79f682e8 } / 00000000, nego = -1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 92 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8 } [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8 } / 00000000, remote = 1.1.1.1:500 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8 } [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8} / 00000000, nego = -1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = f8d86835 9df708e7 ... [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = false [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0x81f8c0de 75c6e3e2 - 0xce4e235d 79f682e8 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM done I (9) [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}, nego = -1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847085 stop timer. timer duration 30, reason 1. [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847085 start timer. timer duration 0, reason 3. [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0xcbb30636, protocol=0) entry to the spi table [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0x66dbc7d6, protocol=0) entry to the spi table [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8} [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 0, max 1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}, nego = 0 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_init_qm_negotiation: Start, initiator = 1, message_id = e974772c [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_hash_1: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_sa_proposals: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_nonce: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_qm_nonce_data_len: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ke: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6218] [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ids: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] Construction NHTB payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847085 sa-cfg Colo_VPN [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] Inside iked_get_primary_addr_by_intf_name... AF = 2 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] No address found for interface st0.0 family inet [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = QM HASH SA I (16) [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x81f8c0de 75c6e3e2 - ce4e235d 79f682e8 } / e974772c, nego = 0 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_finalize_qm_hash_1: Hash[0..20] = 64241253 e80f9d13 ... [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 292 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}, nego = 0, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847085 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30. [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847085 delete. curr ref count 2, del flags 0x2 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847085, ref cnt 2, status: Error ok [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Start, expire SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}, nego = -1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8} [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 1, max 2 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Created random message id = a29785b5 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Phase 1 done, use HASH and N or D payload [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x81f8c0de 75c6e3e2 - ce4e235d 79f682e8 } / a29785b5, nego = 1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 84 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Sending notification to 1.1.1.1:500 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}, nego = 1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}, nego = 1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_info: Start, nego = 1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}, nego = -1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}, nego = -1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8 } [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_qm: Start, nego = 0 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 0 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847085 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847085 stop timer. timer duration 0, reason 0. [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847085 reference count is not zero (1). Delaying deletion of SA [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847085 (ref cnt 0), waiting_for_del 0xe729c0 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_peer_remove_p1sa_entry: Remove p1 sa 7847085 from peer entry 0xee3800 [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1] iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { bb74b286 586ead5d - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are responder and this is initiators first packet [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { bb74b286 586ead5d - 95d6ffa2 50ea3ea5 } [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: New SA [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847086 start timer. timer duration 30, reason 1. [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Original IKE cookie [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] 00000000: 95d6 ffa2 50ea 3ea5 ....P.>. [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: New IKE cookie [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] 00000000: 33f3 35cd 0613 f177 3.5....w [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800) [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { bb74b286 586ead5d - 33f335cd 0613f177} / 00000000, nego = -1 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal. [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing 1 protocol(s) [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing transforms of protocol 1 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Attributes matched successfully [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Attributes match; selected input transform 0 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Protocols match [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Proposals match [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_isakmp_sa_reply: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { bb74b286 586ead5d - 33f335cd 0613f177}, nego = -1 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_values: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA R (4) [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xbb74b286 586ead5d - 33f335cd 0613f177 } / 00000000, nego = -1 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 132 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { bb74b286 586ead5d - 33f335cd 0613f177}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet ea2800 from freelist [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { bb74b286 586ead5d - 33f335cd 0613f177 } [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { bb74b286 586ead5d - 33f335cd 0613f177 } / 00000000, remote = 1.1.1.1:500 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { bb74b286 586ead5d - 33f335cd 0613f177 } [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { bb74b286 586ead5d - 33f335cd 0613f177} / 00000000, nego = -1 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = 71a21605 d9f2599a ... [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = be9f4c32 e7ccca5e ... [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6285] [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { bb74b286 586ead5d - 33f335cd 0613f177}, nego = -1 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_calc_skeyid: Calculating skeyid [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5332] [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE R (6) [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xbb74b286 586ead5d - 33f335cd 0613f177 } / 00000000, nego = -1 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { bb74b286 586ead5d - 33f335cd 0613f177}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet ea2c00 from freelist [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { bb74b286 586ead5d - 33f335cd 0613f177 } [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { bb74b286 586ead5d - 33f335cd 0613f177 } / 00000000, remote = 1.1.1.1:500 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { bb74b286 586ead5d - 33f335cd 0613f177 } [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { bb74b286 586ead5d - 33f335cd 0613f177} / 00000000, nego = -1 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = 729dcf4f ce066efc ... [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = false [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_id: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { bb74b286 586ead5d - 33f335cd 0613f177}, nego = -1 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = true [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0xbb74b286 586ead5d - 0x33f335cd 0613f177 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final R (8) [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xbb74b286 586ead5d - 33f335cd 0613f177 } / 00000000, nego = -1 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 68 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { bb74b286 586ead5d - 33f335cd 0613f177}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { bb74b286 586ead5d - 33f335cd 0613f177}, nego = -1 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847086 stop timer. timer duration 30, reason 1. [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847086 start timer. timer duration 0, reason 3. [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847086 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230. [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847086 delete. curr ref count 1, del flags 0x3 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847086, ref cnt 1, status: Error ok [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { bb74b286 586ead5d - 33f335cd 0613f177}, nego = -1 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { bb74b286 586ead5d - 33f335cd 0613f177}, nego = -1 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { bb74b286 586ead5d - 33f335cd 0613f177 } [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847086 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847086 stop timer. timer duration 0, reason 0. [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847086 (ref cnt 0), waiting_for_del 0x0 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] Initiating new P1 SA for gateway gw_Colo_VPN [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847087 start timer. timer duration 30, reason 1. [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_peer_insert_p1sa_entry: Insert p1 sa 7847087 in peer entry 0xee3800 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request: Sending Initial contact [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { fad51adb 54984319 - 00000000 00000000 } [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: SA = { fad51adb 54984319 - 00000000 00000000}, nego = -1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_proposal: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA I (3) [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xfad51adb 54984319 - 00000000 00000000 } / 00000000, nego = -1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 144 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { fad51adb 54984319 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { fad51adb 54984319 - bb2f809f 7b8314d7 } [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7 } / 00000000, remote = 1.1.1.1:500 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { fad51adb 54984319 - bb2f809f 7b8314d7 } [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find_half: Found half SA = { fad51adb 54984319 - 00000000 00000000 } [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are intiator, first response packet [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_sa_upgrade: Start, SA = { fad51adb 54984319 - 00000000 00000000 } -> { ... - bb2f809f 7b8314d7 } [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7} / 00000000, nego = -1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_value: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6154] [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE I (5) [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xfad51adb 54984319 - bb2f809f 7b8314d7 } / 00000000, nego = -1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { fad51adb 54984319 - bb2f809f 7b8314d7}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fad51adb 54984319 - bb2f809f 7b8314d7 } [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7 } / 00000000, remote = 1.1.1.1:500 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fad51adb 54984319 - bb2f809f 7b8314d7 } [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7} / 00000000, nego = -1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = 73f77bb2 2e057b20 ... [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = ad2020a5 da46ed43 ... [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5502] [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = true [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final I (7) [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xfad51adb 54984319 - bb2f809f 7b8314d7 } / 00000000, nego = -1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 92 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { fad51adb 54984319 - bb2f809f 7b8314d7}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fad51adb 54984319 - bb2f809f 7b8314d7 } [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7 } / 00000000, remote = 1.1.1.1:500 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fad51adb 54984319 - bb2f809f 7b8314d7 } [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7} / 00000000, nego = -1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = 03d60c73 49190e21 ... [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = false [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0xfad51adb 54984319 - 0xbb2f809f 7b8314d7 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM done I (9) [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { fad51adb 54984319 - bb2f809f 7b8314d7}, nego = -1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847087 stop timer. timer duration 30, reason 1. [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847087 start timer. timer duration 0, reason 3. [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0xc5137e6e, protocol=0) entry to the spi table [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0x50fa962f, protocol=0) entry to the spi table [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7} [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 0, max 1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: SA = { fad51adb 54984319 - bb2f809f 7b8314d7}, nego = 0 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_init_qm_negotiation: Start, initiator = 1, message_id = 349a5ad9 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_hash_1: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_sa_proposals: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_nonce: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_qm_nonce_data_len: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ke: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6291] [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ids: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] Construction NHTB payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847087 sa-cfg Colo_VPN [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] Inside iked_get_primary_addr_by_intf_name... AF = 2 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] No address found for interface st0.0 family inet [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = QM HASH SA I (16) [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xfad51adb 54984319 - bb2f809f 7b8314d7 } / 349a5ad9, nego = 0 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_finalize_qm_hash_1: Hash[0..20] = 1f20e801 3c15ddd6 ... [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 292 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { fad51adb 54984319 - bb2f809f 7b8314d7}, nego = 0, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847087 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30. [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847087 delete. curr ref count 2, del flags 0x2 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847087, ref cnt 2, status: Error ok [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Start, expire SA = { fad51adb 54984319 - bb2f809f 7b8314d7}, nego = -1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7} [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 1, max 2 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Created random message id = bd255a4c [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Phase 1 done, use HASH and N or D payload [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xfad51adb 54984319 - bb2f809f 7b8314d7 } / bd255a4c, nego = 1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 84 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Sending notification to 1.1.1.1:500 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { fad51adb 54984319 - bb2f809f 7b8314d7}, nego = 1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7}, nego = 1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_info: Start, nego = 1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { fad51adb 54984319 - bb2f809f 7b8314d7}, nego = -1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7}, nego = -1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7 } [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_qm: Start, nego = 0 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 0 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847087 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847087 stop timer. timer duration 0, reason 0. [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847087 reference count is not zero (1). Delaying deletion of SA [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847087 (ref cnt 0), waiting_for_del 0xe729c0 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_peer_remove_p1sa_entry: Remove p1 sa 7847087 from peer entry 0xee3800 [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1] iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 7462923a f0cccf69 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are responder and this is initiators first packet [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { 7462923a f0cccf69 - a5e7b583 1f1f6699 } [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: New SA [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] P1 SA 7847088 start timer. timer duration 30, reason 1. [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Original IKE cookie [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] 00000000: a5e7 b583 1f1f 6699 ......f. [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: New IKE cookie [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] 00000000: 3e85 169a 77cc 9b37 >...w..7 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800) [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37} / 00000000, nego = -1 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal. [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing 1 protocol(s) [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing transforms of protocol 1 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Attributes matched successfully [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Attributes match; selected input transform 0 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Protocols match [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Proposals match [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_isakmp_sa_reply: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37}, nego = -1 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_values: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA R (4) [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x7462923a f0cccf69 - 3e85169a 77cc9b37 } / 00000000, nego = -1 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 132 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet ea4000 from freelist [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37 } [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37 } / 00000000, remote = 1.1.1.1:500 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37 } [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37} / 00000000, nego = -1 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = a27459bf e3fe2818 ... [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = e77c92a2 385f386c ... [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6546] [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37}, nego = -1 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_calc_skeyid: Calculating skeyid [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5390] [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE R (6) [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x7462923a f0cccf69 - 3e85169a 77cc9b37 } / 00000000, nego = -1 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet ea4400 from freelist [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37 } [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37 } / 00000000, remote = 1.1.1.1:500 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37 } [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37} / 00000000, nego = -1 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = 90358891 0992d206 ... [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = false [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_id: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37}, nego = -1 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = true [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0x7462923a f0cccf69 - 0x3e85169a 77cc9b37 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final R (8) [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x7462923a f0cccf69 - 3e85169a 77cc9b37 } / 00000000, nego = -1 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 68 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37}, nego = -1 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] P1 SA 7847088 stop timer. timer duration 30, reason 1. [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] P1 SA 7847088 start timer. timer duration 0, reason 3. [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] P1 SA 7847088 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230. [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847088 delete. curr ref count 1, del flags 0x3 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847088, ref cnt 1, status: Error ok [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37}, nego = -1 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37}, nego = -1 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37 } [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847088 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] P1 SA 7847088 stop timer. timer duration 0, reason 0. [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847088 (ref cnt 0), waiting_for_del 0x0 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { c289ddf4 0572727e - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are responder and this is initiators first packet [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { c289ddf4 0572727e - 389e1bd0 253a1439 } [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: New SA [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] P1 SA 7847089 start timer. timer duration 30, reason 1. [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Original IKE cookie [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] 00000000: 389e 1bd0 253a 1439 8...%:.9 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: New IKE cookie [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] 00000000: 6a12 5469 f0ee 641d j.Ti..d. [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800) [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { c289ddf4 0572727e - 6a125469 f0ee641d} / 00000000, nego = -1 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal. [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing 1 protocol(s) [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing transforms of protocol 1 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Attributes matched successfully [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Attributes match; selected input transform 0 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Protocols match [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Proposals match [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_isakmp_sa_reply: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { c289ddf4 0572727e - 6a125469 f0ee641d}, nego = -1 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_values: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA R (4) [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xc289ddf4 0572727e - 6a125469 f0ee641d } / 00000000, nego = -1 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 132 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { c289ddf4 0572727e - 6a125469 f0ee641d}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet ea4c00 from freelist [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { c289ddf4 0572727e - 6a125469 f0ee641d } [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { c289ddf4 0572727e - 6a125469 f0ee641d } / 00000000, remote = 1.1.1.1:500 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { c289ddf4 0572727e - 6a125469 f0ee641d } [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { c289ddf4 0572727e - 6a125469 f0ee641d} / 00000000, nego = -1 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = b7f898d8 28d400d0 ... [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = 8bdc80a3 77aafe71 ... [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6024] [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { c289ddf4 0572727e - 6a125469 f0ee641d}, nego = -1 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_calc_skeyid: Calculating skeyid [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5403] [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE R (6) [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xc289ddf4 0572727e - 6a125469 f0ee641d } / 00000000, nego = -1 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { c289ddf4 0572727e - 6a125469 f0ee641d}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet ea5000 from freelist [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { c289ddf4 0572727e - 6a125469 f0ee641d } [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { c289ddf4 0572727e - 6a125469 f0ee641d } / 00000000, remote = 1.1.1.1:500 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { c289ddf4 0572727e - 6a125469 f0ee641d } [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { c289ddf4 0572727e - 6a125469 f0ee641d} / 00000000, nego = -1 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = abc36bf9 ac2a43d0 ... [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = false [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_id: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { c289ddf4 0572727e - 6a125469 f0ee641d}, nego = -1 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = true [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0xc289ddf4 0572727e - 0x6a125469 f0ee641d } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final R (8) [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xc289ddf4 0572727e - 6a125469 f0ee641d } / 00000000, nego = -1 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 68 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { c289ddf4 0572727e - 6a125469 f0ee641d}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { c289ddf4 0572727e - 6a125469 f0ee641d}, nego = -1 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] P1 SA 7847089 stop timer. timer duration 30, reason 1. [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] P1 SA 7847089 start timer. timer duration 0, reason 3. [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] P1 SA 7847089 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230. [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847089 delete. curr ref count 1, del flags 0x3 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847089, ref cnt 1, status: Error ok [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { c289ddf4 0572727e - 6a125469 f0ee641d}, nego = -1 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { c289ddf4 0572727e - 6a125469 f0ee641d}, nego = -1 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { c289ddf4 0572727e - 6a125469 f0ee641d } [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847089 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] P1 SA 7847089 stop timer. timer duration 0, reason 0. [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847089 (ref cnt 0), waiting_for_del 0x0 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] Initiating new P1 SA for gateway gw_Colo_VPN [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847090 start timer. timer duration 30, reason 1. [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_peer_insert_p1sa_entry: Insert p1 sa 7847090 in peer entry 0xee3800 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request: Sending Initial contact [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { b9b72055 81c56ad8 - 00000000 00000000 } [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: SA = { b9b72055 81c56ad8 - 00000000 00000000}, nego = -1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_proposal: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA I (3) [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xb9b72055 81c56ad8 - 00000000 00000000 } / 00000000, nego = -1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 144 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { b9b72055 81c56ad8 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b } [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b } / 00000000, remote = 1.1.1.1:500 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b } [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find_half: Found half SA = { b9b72055 81c56ad8 - 00000000 00000000 } [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are intiator, first response packet [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_sa_upgrade: Start, SA = { b9b72055 81c56ad8 - 00000000 00000000 } -> { ... - 029a6a3f d4bbaf2b } [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b} / 00000000, nego = -1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_value: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [7076] [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE I (5) [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xb9b72055 81c56ad8 - 029a6a3f d4bbaf2b } / 00000000, nego = -1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b } [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b } / 00000000, remote = 1.1.1.1:500 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b } [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b} / 00000000, nego = -1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = 8f578eaf c54d8081 ... [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = c1f8f407 7c4ba979 ... [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [6615] [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = true [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final I (7) [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xb9b72055 81c56ad8 - 029a6a3f d4bbaf2b } / 00000000, nego = -1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 92 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b } [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b } / 00000000, remote = 1.1.1.1:500 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b } [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b} / 00000000, nego = -1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = aaa9333b c90d5e12 ... [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = false [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0xb9b72055 81c56ad8 - 0x029a6a3f d4bbaf2b } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM done I (9) [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}, nego = -1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847090 stop timer. timer duration 30, reason 1. [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847090 start timer. timer duration 0, reason 3. [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0x38db8fa0, protocol=0) entry to the spi table [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0xf17cb67b, protocol=0) entry to the spi table [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b} [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 0, max 1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}, nego = 0 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_init_qm_negotiation: Start, initiator = 1, message_id = 5b4791a4 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_hash_1: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_sa_proposals: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_nonce: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_qm_nonce_data_len: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ke: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [8013] [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ids: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] Construction NHTB payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847090 sa-cfg Colo_VPN [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] Inside iked_get_primary_addr_by_intf_name... AF = 2 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] No address found for interface st0.0 family inet [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = QM HASH SA I (16) [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xb9b72055 81c56ad8 - 029a6a3f d4bbaf2b } / 5b4791a4, nego = 0 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_finalize_qm_hash_1: Hash[0..20] = 35395310 a0452caa ... [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 292 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}, nego = 0, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847090 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30. [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847090 delete. curr ref count 2, del flags 0x2 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847090, ref cnt 2, status: Error ok [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Start, expire SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}, nego = -1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b} [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 1, max 2 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Created random message id = 7e4f54d5 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Phase 1 done, use HASH and N or D payload [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xb9b72055 81c56ad8 - 029a6a3f d4bbaf2b } / 7e4f54d5, nego = 1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 84 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Sending notification to 1.1.1.1:500 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}, nego = 1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}, nego = 1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_info: Start, nego = 1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}, nego = -1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}, nego = -1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b } [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_qm: Start, nego = 0 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 0 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847090 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847090 stop timer. timer duration 0, reason 0. [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847090 reference count is not zero (1). Delaying deletion of SA [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847090 (ref cnt 0), waiting_for_del 0xe729c0 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_peer_remove_p1sa_entry: Remove p1 sa 7847090 from peer entry 0xee3800 [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1] iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 1a428c76 909ef9d5 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are responder and this is initiators first packet [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { 1a428c76 909ef9d5 - dbe0a93b e7380095 } [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: New SA [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847091 start timer. timer duration 30, reason 1. [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Original IKE cookie [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] 00000000: dbe0 a93b e738 0095 ...;.8.. [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: New IKE cookie [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] 00000000: 259b 203f c6ee b6bc %. ?.... [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800) [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc} / 00000000, nego = -1 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal. [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing 1 protocol(s) [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing transforms of protocol 1 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Attributes matched successfully [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Attributes match; selected input transform 0 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Protocols match [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Proposals match [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_isakmp_sa_reply: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc}, nego = -1 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_values: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA R (4) [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x1a428c76 909ef9d5 - 259b203f c6eeb6bc } / 00000000, nego = -1 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 132 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet ea6400 from freelist [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc } [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc } / 00000000, remote = 1.1.1.1:500 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc } [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc} / 00000000, nego = -1 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = d2e175e4 766b0798 ... [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = f5858aa4 83bd6308 ... [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [5957] [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc}, nego = -1 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_calc_skeyid: Calculating skeyid [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5544] [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE R (6) [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x1a428c76 909ef9d5 - 259b203f c6eeb6bc } / 00000000, nego = -1 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet ea6800 from freelist [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc } [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc } / 00000000, remote = 1.1.1.1:500 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc } [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc} / 00000000, nego = -1 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = a6d1dcdb 6a481409 ... [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = false [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_id: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc}, nego = -1 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = true [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0x1a428c76 909ef9d5 - 0x259b203f c6eeb6bc } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final R (8) [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x1a428c76 909ef9d5 - 259b203f c6eeb6bc } / 00000000, nego = -1 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 68 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc}, nego = -1 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847091 stop timer. timer duration 30, reason 1. [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847091 start timer. timer duration 0, reason 3. [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847091 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230. [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847091 delete. curr ref count 1, del flags 0x3 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847091, ref cnt 1, status: Error ok [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc}, nego = -1 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc}, nego = -1 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc } [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847091 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] P1 SA 7847091 stop timer. timer duration 0, reason 0. [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847091 (ref cnt 0), waiting_for_del 0x0 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] Initiating new P1 SA for gateway gw_Colo_VPN [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847092 start timer. timer duration 30, reason 1. [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_peer_insert_p1sa_entry: Insert p1 sa 7847092 in peer entry 0xee3800 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request: Sending Initial contact [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { 3c4c807d 175f179f - 00000000 00000000 } [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: SA = { 3c4c807d 175f179f - 00000000 00000000}, nego = -1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_proposal: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA I (3) [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x3c4c807d 175f179f - 00000000 00000000 } / 00000000, nego = -1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 144 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 3c4c807d 175f179f - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { 3c4c807d 175f179f - ab56939d 12017776 } [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776 } / 00000000, remote = 1.1.1.1:500 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { 3c4c807d 175f179f - ab56939d 12017776 } [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find_half: Found half SA = { 3c4c807d 175f179f - 00000000 00000000 } [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are intiator, first response packet [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_sa_upgrade: Start, SA = { 3c4c807d 175f179f - 00000000 00000000 } -> { ... - ab56939d 12017776 } [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776} / 00000000, nego = -1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_value: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6063] [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE I (5) [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x3c4c807d 175f179f - ab56939d 12017776 } / 00000000, nego = -1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 3c4c807d 175f179f - ab56939d 12017776}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 3c4c807d 175f179f - ab56939d 12017776 } [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776 } / 00000000, remote = 1.1.1.1:500 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 3c4c807d 175f179f - ab56939d 12017776 } [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776} / 00000000, nego = -1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = 9e5853f1 48ce3029 ... [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = 61e8f992 e01287b7 ... [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5576] [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = true [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final I (7) [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x3c4c807d 175f179f - ab56939d 12017776 } / 00000000, nego = -1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 92 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 3c4c807d 175f179f - ab56939d 12017776}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 3c4c807d 175f179f - ab56939d 12017776 } [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776 } / 00000000, remote = 1.1.1.1:500 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 3c4c807d 175f179f - ab56939d 12017776 } [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776} / 00000000, nego = -1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = 4e323f36 8865d60c ... [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = false [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0x3c4c807d 175f179f - 0xab56939d 12017776 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM done I (9) [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { 3c4c807d 175f179f - ab56939d 12017776}, nego = -1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847092 stop timer. timer duration 30, reason 1. [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847092 start timer. timer duration 0, reason 3. [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0x2e0d60a8, protocol=0) entry to the spi table [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0x53ec7bf3, protocol=0) entry to the spi table [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776} [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 0, max 1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: SA = { 3c4c807d 175f179f - ab56939d 12017776}, nego = 0 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_init_qm_negotiation: Start, initiator = 1, message_id = 023e3113 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_hash_1: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_sa_proposals: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_nonce: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_qm_nonce_data_len: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ke: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6894] [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ids: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] Construction NHTB payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847092 sa-cfg Colo_VPN [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] Inside iked_get_primary_addr_by_intf_name... AF = 2 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] No address found for interface st0.0 family inet [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = QM HASH SA I (16) [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x3c4c807d 175f179f - ab56939d 12017776 } / 023e3113, nego = 0 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_finalize_qm_hash_1: Hash[0..20] = 3f4319af 81c3d0f6 ... [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 292 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 3c4c807d 175f179f - ab56939d 12017776}, nego = 0, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847092 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30. [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847092 delete. curr ref count 2, del flags 0x2 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847092, ref cnt 2, status: Error ok [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Start, expire SA = { 3c4c807d 175f179f - ab56939d 12017776}, nego = -1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776} [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 1, max 2 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Created random message id = e7aa38e3 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Phase 1 done, use HASH and N or D payload [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x3c4c807d 175f179f - ab56939d 12017776 } / e7aa38e3, nego = 1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 84 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Sending notification to 1.1.1.1:500 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 3c4c807d 175f179f - ab56939d 12017776}, nego = 1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776}, nego = 1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_info: Start, nego = 1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { 3c4c807d 175f179f - ab56939d 12017776}, nego = -1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776}, nego = -1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776 } [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_qm: Start, nego = 0 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 0 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847092 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847092 stop timer. timer duration 0, reason 0. [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847092 reference count is not zero (1). Delaying deletion of SA [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847092 (ref cnt 0), waiting_for_del 0xe729c0 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_peer_remove_p1sa_entry: Remove p1 sa 7847092 from peer entry 0xee3800 [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1] iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { fe5db3a0 71e58cc6 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are responder and this is initiators first packet [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { fe5db3a0 71e58cc6 - 3120d7cb 3c34bf80 } [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: New SA [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] P1 SA 7847093 start timer. timer duration 30, reason 1. [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Original IKE cookie [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] 00000000: 3120 d7cb 3c34 bf80 1 ..<4.. [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: New IKE cookie [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] 00000000: 5a16 ff94 5d40 4ed0 Z...]@N. [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800) [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0} / 00000000, nego = -1 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal. [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing 1 protocol(s) [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing transforms of protocol 1 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Attributes matched successfully [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Attributes match; selected input transform 0 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Protocols match [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Proposals match [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_isakmp_sa_reply: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0}, nego = -1 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_values: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA R (4) [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xfe5db3a0 71e58cc6 - 5a16ff94 5d404ed0 } / 00000000, nego = -1 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 132 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet ea7c00 from freelist [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0 } [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0 } / 00000000, remote = 1.1.1.1:500 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0 } [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0} / 00000000, nego = -1 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = e853c5de 9e4d3b58 ... [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = af85d0e3 16030f08 ... [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6240] [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0}, nego = -1 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_calc_skeyid: Calculating skeyid [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5429] [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE R (6) [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xfe5db3a0 71e58cc6 - 5a16ff94 5d404ed0 } / 00000000, nego = -1 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet ea8000 from freelist [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0 } [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0 } / 00000000, remote = 1.1.1.1:500 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0 } [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0} / 00000000, nego = -1 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = 9f5f1678 87017e84 ... [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = false [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_id: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0}, nego = -1 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = true [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0xfe5db3a0 71e58cc6 - 0x5a16ff94 5d404ed0 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final R (8) [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xfe5db3a0 71e58cc6 - 5a16ff94 5d404ed0 } / 00000000, nego = -1 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 68 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0}, nego = -1 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] P1 SA 7847093 stop timer. timer duration 30, reason 1. [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] P1 SA 7847093 start timer. timer duration 0, reason 3. [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] P1 SA 7847093 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230. [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847093 delete. curr ref count 1, del flags 0x3 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847093, ref cnt 1, status: Error ok [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0}, nego = -1 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0}, nego = -1 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0 } [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847093 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] P1 SA 7847093 stop timer. timer duration 0, reason 0. [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847093 (ref cnt 0), waiting_for_del 0x0 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { a889e18b 74ae2c03 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are responder and this is initiators first packet [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { a889e18b 74ae2c03 - b104dfaa 8217b033 } [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: New SA [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] P1 SA 7847094 start timer. timer duration 30, reason 1. [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Original IKE cookie [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] 00000000: b104 dfaa 8217 b033 .......3 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: New IKE cookie [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] 00000000: 82c0 de52 dc99 913a ...R...: [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800) [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a} / 00000000, nego = -1 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal. [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing 1 protocol(s) [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing transforms of protocol 1 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Attributes matched successfully [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Attributes match; selected input transform 0 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Protocols match [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Proposals match [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_isakmp_sa_reply: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a}, nego = -1 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_values: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA R (4) [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xa889e18b 74ae2c03 - 82c0de52 dc99913a } / 00000000, nego = -1 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 132 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet ea8800 from freelist [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a } [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a } / 00000000, remote = 1.1.1.1:500 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a } [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a} / 00000000, nego = -1 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = d402b224 063dd004 ... [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = e1a52b1e 8011ca17 ... [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6097] [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a}, nego = -1 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_calc_skeyid: Calculating skeyid [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5408] [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE R (6) [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xa889e18b 74ae2c03 - 82c0de52 dc99913a } / 00000000, nego = -1 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet ea8c00 from freelist [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a } [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a } / 00000000, remote = 1.1.1.1:500 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a } [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a} / 00000000, nego = -1 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = e63d08df e98ac025 ... [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = false [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_id: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a}, nego = -1 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = true [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0xa889e18b 74ae2c03 - 0x82c0de52 dc99913a } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final R (8) [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xa889e18b 74ae2c03 - 82c0de52 dc99913a } / 00000000, nego = -1 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 68 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a}, nego = -1 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] P1 SA 7847094 stop timer. timer duration 30, reason 1. [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] P1 SA 7847094 start timer. timer duration 0, reason 3. [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] P1 SA 7847094 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230. [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847094 delete. curr ref count 1, del flags 0x3 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847094, ref cnt 1, status: Error ok [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a}, nego = -1 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a}, nego = -1 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a } [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847094 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] P1 SA 7847094 stop timer. timer duration 0, reason 0. [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847094 (ref cnt 0), waiting_for_del 0x0 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] Initiating new P1 SA for gateway gw_Colo_VPN [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847095 start timer. timer duration 30, reason 1. [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_peer_insert_p1sa_entry: Insert p1 sa 7847095 in peer entry 0xee3800 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request: Sending Initial contact [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { f36de9a5 d88590f1 - 00000000 00000000 } [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: SA = { f36de9a5 d88590f1 - 00000000 00000000}, nego = -1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_proposal: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA I (3) [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xf36de9a5 d88590f1 - 00000000 00000000 } / 00000000, nego = -1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 144 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { f36de9a5 d88590f1 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067 } [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067 } / 00000000, remote = 1.1.1.1:500 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067 } [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find_half: Found half SA = { f36de9a5 d88590f1 - 00000000 00000000 } [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are intiator, first response packet [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_sa_upgrade: Start, SA = { f36de9a5 d88590f1 - 00000000 00000000 } -> { ... - d5aafd4e 2bca6067 } [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067} / 00000000, nego = -1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_value: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6168] [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE I (5) [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xf36de9a5 d88590f1 - d5aafd4e 2bca6067 } / 00000000, nego = -1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067 } [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067 } / 00000000, remote = 1.1.1.1:500 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067 } [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067} / 00000000, nego = -1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = d5ccd74a 3bfba150 ... [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = 76d5342f a18be05b ... [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5612] [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = true [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final I (7) [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xf36de9a5 d88590f1 - d5aafd4e 2bca6067 } / 00000000, nego = -1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 92 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067 } [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067 } / 00000000, remote = 1.1.1.1:500 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067 } [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067} / 00000000, nego = -1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = 56c0cf58 8896d889 ... [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = false [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0xf36de9a5 d88590f1 - 0xd5aafd4e 2bca6067 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM done I (9) [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}, nego = -1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847095 stop timer. timer duration 30, reason 1. [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847095 start timer. timer duration 0, reason 3. [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0x1d1269c0, protocol=0) entry to the spi table [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0x65861acc, protocol=0) entry to the spi table [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067} [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 0, max 1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}, nego = 0 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_init_qm_negotiation: Start, initiator = 1, message_id = 5b1c7068 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_hash_1: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_sa_proposals: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_nonce: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_qm_nonce_data_len: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ke: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6182] [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ids: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] Construction NHTB payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847095 sa-cfg Colo_VPN [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] Inside iked_get_primary_addr_by_intf_name... AF = 2 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] No address found for interface st0.0 family inet [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = QM HASH SA I (16) [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xf36de9a5 d88590f1 - d5aafd4e 2bca6067 } / 5b1c7068, nego = 0 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_finalize_qm_hash_1: Hash[0..20] = b88262ee d20d034c ... [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 292 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}, nego = 0, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847095 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30. [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847095 delete. curr ref count 2, del flags 0x2 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847095, ref cnt 2, status: Error ok [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Start, expire SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}, nego = -1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067} [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 1, max 2 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Created random message id = c8b3accd [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Phase 1 done, use HASH and N or D payload [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xf36de9a5 d88590f1 - d5aafd4e 2bca6067 } / c8b3accd, nego = 1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 84 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Sending notification to 1.1.1.1:500 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}, nego = 1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}, nego = 1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_info: Start, nego = 1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}, nego = -1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}, nego = -1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067 } [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_qm: Start, nego = 0 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 0 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847095 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847095 stop timer. timer duration 0, reason 0. [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847095 reference count is not zero (1). Delaying deletion of SA [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847095 (ref cnt 0), waiting_for_del 0xe729c0 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_peer_remove_p1sa_entry: Remove p1 sa 7847095 from peer entry 0xee3800 [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1] iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { f56e1251 eaac6de2 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are responder and this is initiators first packet [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { f56e1251 eaac6de2 - ed89276d c90ccc71 } [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: New SA [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] P1 SA 7847096 start timer. timer duration 30, reason 1. [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Original IKE cookie [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] 00000000: ed89 276d c90c cc71 ..'m...q [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: New IKE cookie [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] 00000000: d861 4ce7 42f8 a970 .aL.B..p [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800) [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970} / 00000000, nego = -1 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal. [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing 1 protocol(s) [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing transforms of protocol 1 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Attributes matched successfully [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Attributes match; selected input transform 0 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Protocols match [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Proposals match [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_isakmp_sa_reply: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970}, nego = -1 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_values: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA R (4) [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xf56e1251 eaac6de2 - d8614ce7 42f8a970 } / 00000000, nego = -1 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 132 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e2c000 from freelist [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970 } [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970 } / 00000000, remote = 1.1.1.1:500 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970 } [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970} / 00000000, nego = -1 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = 256356a7 f30c2c15 ... [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = 8ecdfba8 90f847ba ... [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6094] [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970}, nego = -1 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_o_calc_skeyid: Calculating skeyid [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [6196] [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE R (6) [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xf56e1251 eaac6de2 - d8614ce7 42f8a970 } / 00000000, nego = -1 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e2c400 from freelist [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970 } [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970 } / 00000000, remote = 1.1.1.1:500 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970 } [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970} / 00000000, nego = -1 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = 75f9b052 2f895a0a ... [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = false [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_id: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970}, nego = -1 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = true [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0xf56e1251 eaac6de2 - 0xd8614ce7 42f8a970 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final R (8) [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xf56e1251 eaac6de2 - d8614ce7 42f8a970 } / 00000000, nego = -1 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 68 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970}, nego = -1 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] P1 SA 7847096 stop timer. timer duration 30, reason 1. [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] P1 SA 7847096 start timer. timer duration 0, reason 3. [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] P1 SA 7847096 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230. [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847096 delete. curr ref count 1, del flags 0x3 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847096, ref cnt 1, status: Error ok [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970}, nego = -1 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970}, nego = -1 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970 } [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847096 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] P1 SA 7847096 stop timer. timer duration 0, reason 0. [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847096 (ref cnt 0), waiting_for_del 0x0 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] Initiating new P1 SA for gateway gw_Colo_VPN [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847097 start timer. timer duration 30, reason 1. [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_peer_insert_p1sa_entry: Insert p1 sa 7847097 in peer entry 0xee3800 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request: Sending Initial contact [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { 19c1e16d dd74b9b9 - 00000000 00000000 } [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: SA = { 19c1e16d dd74b9b9 - 00000000 00000000}, nego = -1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_proposal: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA I (3) [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x19c1e16d dd74b9b9 - 00000000 00000000 } / 00000000, nego = -1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 144 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 19c1e16d dd74b9b9 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b } [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b } / 00000000, remote = 1.1.1.1:500 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b } [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find_half: Found half SA = { 19c1e16d dd74b9b9 - 00000000 00000000 } [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are intiator, first response packet [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_sa_upgrade: Start, SA = { 19c1e16d dd74b9b9 - 00000000 00000000 } -> { ... - 2e2a4137 81d10f2b } [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b} / 00000000, nego = -1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_value: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6139] [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE I (5) [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x19c1e16d dd74b9b9 - 2e2a4137 81d10f2b } / 00000000, nego = -1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b } [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b } / 00000000, remote = 1.1.1.1:500 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b } [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b} / 00000000, nego = -1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = b77596f3 8643257b ... [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = 034b164f 1668e949 ... [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5324] [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = true [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final I (7) [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x19c1e16d dd74b9b9 - 2e2a4137 81d10f2b } / 00000000, nego = -1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 92 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b } [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b } / 00000000, remote = 1.1.1.1:500 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b } [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b} / 00000000, nego = -1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = 9142fb83 28a809c7 ... [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = false [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0x19c1e16d dd74b9b9 - 0x2e2a4137 81d10f2b } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM done I (9) [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}, nego = -1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847097 stop timer. timer duration 30, reason 1. [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847097 start timer. timer duration 0, reason 3. [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0x70c0b0f, protocol=0) entry to the spi table [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0x2df946a1, protocol=0) entry to the spi table [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b} [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 0, max 1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}, nego = 0 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_init_qm_negotiation: Start, initiator = 1, message_id = 2b93b101 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_hash_1: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_sa_proposals: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_nonce: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_qm_nonce_data_len: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ke: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6096] [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ids: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] Construction NHTB payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847097 sa-cfg Colo_VPN [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] Inside iked_get_primary_addr_by_intf_name... AF = 2 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] No address found for interface st0.0 family inet [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = QM HASH SA I (16) [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x19c1e16d dd74b9b9 - 2e2a4137 81d10f2b } / 2b93b101, nego = 0 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_finalize_qm_hash_1: Hash[0..20] = 35d70b37 750ff2dd ... [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 292 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}, nego = 0, dst = 1.1.1.1:500, routing table id = 0 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847097 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30. [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847097 delete. curr ref count 2, del flags 0x2 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847097, ref cnt 2, status: Error ok [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Start, expire SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}, nego = -1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b} [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 1, max 2 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Created random message id = c923872a [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Phase 1 done, use HASH and N or D payload [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x19c1e16d dd74b9b9 - 2e2a4137 81d10f2b } / c923872a, nego = 1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 84 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Sending notification to 1.1.1.1:500 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}, nego = 1, dst = 1.1.1.1:500, routing table id = 0 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}, nego = 1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_info: Start, nego = 1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}, nego = -1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}, nego = -1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b } [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_qm: Start, nego = 0 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 0 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847097 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847097 stop timer. timer duration 0, reason 0. [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847097 reference count is not zero (1). Delaying deletion of SA [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847097 (ref cnt 0), waiting_for_del 0xe729c0 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_peer_remove_p1sa_entry: Remove p1 sa 7847097 from peer entry 0xee3800 [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1] iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 4e75e70a c12ab1c7 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are responder and this is initiators first packet [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { 4e75e70a c12ab1c7 - 04633986 1808f5be } [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: New SA [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] P1 SA 7847098 start timer. timer duration 30, reason 1. [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Original IKE cookie [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] 00000000: 0463 3986 1808 f5be .c9..... [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: New IKE cookie [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] 00000000: cf42 f52c 16ee 1c42 .B.,...B [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800) [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42} / 00000000, nego = -1 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal. [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing 1 protocol(s) [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing transforms of protocol 1 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Attributes matched successfully [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Attributes match; selected input transform 0 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Protocols match [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Proposals match [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_isakmp_sa_reply: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42}, nego = -1 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_values: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA R (4) [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x4e75e70a c12ab1c7 - cf42f52c 16ee1c42 } / 00000000, nego = -1 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 132 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e2d800 from freelist [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42 } [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42 } / 00000000, remote = 1.1.1.1:500 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42 } [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42} / 00000000, nego = -1 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = 9126ec06 fee45e46 ... [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = f5319a54 17803b8e ... [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6284] [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42}, nego = -1 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_o_calc_skeyid: Calculating skeyid [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5465] [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE R (6) [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x4e75e70a c12ab1c7 - cf42f52c 16ee1c42 } / 00000000, nego = -1 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e2dc00 from freelist [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42 } [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42 } / 00000000, remote = 1.1.1.1:500 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42 } [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42} / 00000000, nego = -1 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = 10028f66 729ba0ee ... [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = false [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_id: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42}, nego = -1 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = true [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0x4e75e70a c12ab1c7 - 0xcf42f52c 16ee1c42 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final R (8) [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x4e75e70a c12ab1c7 - cf42f52c 16ee1c42 } / 00000000, nego = -1 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 68 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42}, nego = -1 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] P1 SA 7847098 stop timer. timer duration 30, reason 1. [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] P1 SA 7847098 start timer. timer duration 0, reason 3. [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] P1 SA 7847098 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230. [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847098 delete. curr ref count 1, del flags 0x3 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847098, ref cnt 1, status: Error ok [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42}, nego = -1 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42}, nego = -1 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42 } [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847098 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] P1 SA 7847098 stop timer. timer duration 0, reason 0. [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847098 (ref cnt 0), waiting_for_del 0x0 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 88245fff 590c6db7 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are responder and this is initiators first packet [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { 88245fff 590c6db7 - a3322cd8 e6a3cd37 } [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: New SA [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] P1 SA 7847099 start timer. timer duration 30, reason 1. [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: Original IKE cookie [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] 00000000: a332 2cd8 e6a3 cd37 .2,....7 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ssh_isakmp_update_responder_cookie: New IKE cookie [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] 00000000: 62be 219e 2528 677d b.!.%(g} [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800) [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 88245fff 590c6db7 - 62be219e 2528677d} / 00000000, nego = -1 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal. [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing 1 protocol(s) [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Comparing transforms of protocol 1 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Attributes matched successfully [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_transform: Attributes match; selected input transform 0 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Protocols match [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sav1_select: Proposals match [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_isakmp_sa_reply: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 88245fff 590c6db7 - 62be219e 2528677d}, nego = -1 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_proposal: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_values: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA R (4) [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x88245fff 590c6db7 - 62be219e 2528677d } / 00000000, nego = -1 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 132 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 88245fff 590c6db7 - 62be219e 2528677d}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e2e400 from freelist [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 88245fff 590c6db7 - 62be219e 2528677d } [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 88245fff 590c6db7 - 62be219e 2528677d } / 00000000, remote = 1.1.1.1:500 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 88245fff 590c6db7 - 62be219e 2528677d } [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 88245fff 590c6db7 - 62be219e 2528677d} / 00000000, nego = -1 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = 09810e38 6b3e5ed6 ... [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = e6f84c2a 2fe6fb6e ... [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6144] [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1 remote_port:500 ksa_cfg_remote_port=0 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 88245fff 590c6db7 - 62be219e 2528677d}, nego = -1 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_o_calc_skeyid: Calculating skeyid [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5397] [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE R (6) [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x88245fff 590c6db7 - 62be219e 2528677d } / 00000000, nego = -1 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 88245fff 590c6db7 - 62be219e 2528677d}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet e2e800 from freelist [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 88245fff 590c6db7 - 62be219e 2528677d } [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 88245fff 590c6db7 - 62be219e 2528677d } / 00000000, remote = 1.1.1.1:500 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 88245fff 590c6db7 - 62be219e 2528677d } [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 88245fff 590c6db7 - 62be219e 2528677d} / 00000000, nego = -1 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = 18dc6279 ffe68499 ... [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = false [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_id: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_state_restart_packet: Start, restart packet SA = { 88245fff 590c6db7 - 62be219e 2528677d}, nego = -1 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = false, local = true [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0x88245fff 590c6db7 - 0x62be219e 2528677d } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final R (8) [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x88245fff 590c6db7 - 62be219e 2528677d } / 00000000, nego = -1 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 68 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 88245fff 590c6db7 - 62be219e 2528677d}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { 88245fff 590c6db7 - 62be219e 2528677d}, nego = -1 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] P1 SA 7847099 stop timer. timer duration 30, reason 1. [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] P1 SA 7847099 start timer. timer duration 0, reason 3. [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] P1 SA 7847099 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230. [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847099 delete. curr ref count 1, del flags 0x3 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847099, ref cnt 1, status: Error ok [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { 88245fff 590c6db7 - 62be219e 2528677d}, nego = -1 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 88245fff 590c6db7 - 62be219e 2528677d}, nego = -1 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { 88245fff 590c6db7 - 62be219e 2528677d } [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847099 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] P1 SA 7847099 stop timer. timer duration 0, reason 0. [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847099 (ref cnt 0), waiting_for_del 0x0 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] Initiating new P1 SA for gateway gw_Colo_VPN [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847100 start timer. timer duration 30, reason 1. [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_peer_insert_p1sa_entry: Insert p1 sa 7847100 in peer entry 0xee3800 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request: Sending Initial contact [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { 216909ba 442354e5 - 00000000 00000000 } [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: SA = { 216909ba 442354e5 - 00000000 00000000}, nego = -1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_proposal: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA I (3) [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x216909ba 442354e5 - 00000000 00000000 } / 00000000, nego = -1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 144 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 216909ba 442354e5 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f } [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f } / 00000000, remote = 1.1.1.1:500 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f } [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find_half: Found half SA = { 216909ba 442354e5 - 00000000 00000000 } [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are intiator, first response packet [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_sa_upgrade: Start, SA = { 216909ba 442354e5 - 00000000 00000000 } -> { ... - e6ff0043 1ad96c6f } [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f} / 00000000, nego = -1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_value: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6320] [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE I (5) [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x216909ba 442354e5 - e6ff0043 1ad96c6f } / 00000000, nego = -1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f } [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f } / 00000000, remote = 1.1.1.1:500 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f } [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f} / 00000000, nego = -1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = d95abcf9 e5a2fd76 ... [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = a1afbbf0 bdd582d9 ... [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5308] [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = true [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final I (7) [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x216909ba 442354e5 - e6ff0043 1ad96c6f } / 00000000, nego = -1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 92 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f } [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f } / 00000000, remote = 1.1.1.1:500 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f } [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f} / 00000000, nego = -1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Decrypting packet [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_encrypt: Check that packet was encrypted succeeded [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_id: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_hash: Start, hash[0..20] = a68929d1 35cb922f ... [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = false [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_wait_done: Marking for waiting for done [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_all_done: MESSAGE: Phase 1 { 0x216909ba 442354e5 - 0xe6ff0043 1ad96c6f } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM done I (9) [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Connected, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}, nego = -1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_process_packet: No output packet, returning [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] kmd_ipaddr2ikeid: ipaddr = 1.1.1.1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate id NOT matched. [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847100 stop timer. timer duration 30, reason 1. [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847100 start timer. timer duration 0, reason 3. [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0x3c87e713, protocol=0) entry to the spi table [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] Added (spi=0x3fe4d380, protocol=0) entry to the spi table [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f} [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 0, max 1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect_ipsec: SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}, nego = 0 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_init_qm_negotiation: Start, initiator = 1, message_id = baca2511 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_hash_1: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_sa_proposals: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_nonce: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_qm_nonce_data_len: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ke: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6363] [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_qm_optional_ids: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_qm_optional_id: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] Construction NHTB payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847100 sa-cfg Colo_VPN [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] Inside iked_get_primary_addr_by_intf_name... AF = 2 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] No address found for interface st0.0 family inet [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = QM HASH SA I (16) [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x216909ba 442354e5 - e6ff0043 1ad96c6f } / baca2511, nego = 0 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_finalize_qm_hash_1: Hash[0..20] = 878a16d9 8112bb55 ... [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 292 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}, nego = 0, dst = 1.1.1.1:500, routing table id = 0 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847100 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30. [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 7847100 delete. curr ref count 2, del flags 0x2 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847100, ref cnt 2, status: Error ok [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Start, expire SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}, nego = -1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f} [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 1, max 2 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Created random message id = cfbe3c7f [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_init_info_exchange: Phase 1 done, use HASH and N or D payload [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x216909ba 442354e5 - e6ff0043 1ad96c6f } / cfbe3c7f, nego = 1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 84 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_expire_callback: Sending notification to 1.1.1.1:500 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}, nego = 1, dst = 1.1.1.1:500, routing table id = 0 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}, nego = 1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_info: Start, nego = 1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}, nego = -1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}, nego = -1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f } [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_qm: Start, nego = 0 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 0 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 4 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 7847100 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847100 stop timer. timer duration 0, reason 0. [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] P1 SA 7847100 reference count is not zero (1). Delaying deletion of SA [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 2 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 7847100 (ref cnt 0), waiting_for_del 0xe729c0 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_peer_remove_p1sa_entry: Remove p1 sa 7847100 from peer entry 0xee3800 [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1] iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
Finally, the iKE debug from the SSG
## 2016-05-22 22:00:18 : IKE<0.0.0.0 > protocol matched expected<0>. ## 2016-05-22 22:00:18 : IKE<0.0.0.0 > port matched expect l:<0>, r<0>. ## 2016-05-22 22:00:18 : ipvx = IPV4 ## 2016-05-22 22:00:18 : rcv_local_addr = 172.16.10.0, rcv_local_mask = 255.255.255.0, p_rcv_local_real = 172.16.10.0 ## 2016-05-22 22:00:18 : rcv_remote_addr = 172.16.72.0, rcv_remote_mask = 255.255.255.0, p_rcv_remote_real = 172.16.72.0 ## 2016-05-22 22:00:18 : ike_p2_id->local_ip = 172.16.10.0, cfg_local_mask = 255.255.255.0, p_cfg_local_real = 172.16.10.0 ## 2016-05-22 22:00:18 : ike_p2_id->remote_ip = 172.16.72.0, cfg_remote_mask = 255.255.255.0, p_cfg_remote_real = 172.16.72.0 ## 2016-05-22 22:00:18 : IKE<2.2.2.2> Proxy ID match: Located matching Phase 2 SA <16>. ## 2016-05-22 22:00:18 : IKE<2.2.2.2> resolve concurrent session for peer. exist<3c623f10> drop new<2e5342cc>. ## 2016-05-22 22:00:18 : IKE<2.2.2.2> oakley_process_quick_mode():exit ## 2016-05-22 22:00:18 : IKE<2.2.2.2> Delete conn entry... ## 2016-05-22 22:00:18 : IKE<2.2.2.2> ...found conn entry(2e5342cc) ## 2016-05-22 22:00:18 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<3/80122f> ## 2016-05-22 22:00:18 : IKE<2.2.2.2> Catcher: received 84 bytes from socket. ## 2016-05-22 22:00:18 : IKE<2.2.2.2> ****** Recv packet if <bgroup0/0> of vsys <Root> ****** ## 2016-05-22 22:00:18 : IKE<2.2.2.2> Catcher: get 84 bytes. src port 500 ## 2016-05-22 22:00:18 : IKE<0.0.0.0 > ISAKMP msg: len 84, nxp 8[HASH], exch 5[INFO], flag 01 E ## 2016-05-22 22:00:18 : IKE<2.2.2.2> Create conn entry... ## 2016-05-22 22:00:18 : IKE<2.2.2.2> ...done(new 85f84bad) ## 2016-05-22 22:00:18 : IKE<2.2.2.2> Decrypting payload (length 56) ## 2016-05-22 22:00:18 : IKE<2.2.2.2 > Recv*: [HASH] [DELETE] ## 2016-05-22 22:00:18 : IKE<2.2.2.2> Process [DELETE]: ## 2016-05-22 22:00:18 : IKE<2.2.2.2> DELETE payload received, deleting Phase-1 SA ## 2016-05-22 22:00:18 : IKE<2.2.2.2> Delete conn entry... ## 2016-05-22 22:00:18 : IKE<2.2.2.2> ...found conn entry(85f84bad) ## 2016-05-22 22:00:18 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<3/80122f> ## 2016-05-22 22:00:21 : IKE<0.0.0.0 > IKE: phase-2 packet re-trans timer expired ## 2016-05-22 22:00:21 : IKE<2.2.2.2> phase-2 packet re-trans timer expired. ## 2016-05-22 22:00:21 : IKE<2.2.2.2> Initiator sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-22 22:00:21 : IKE<2.2.2.2> Send Phase 2 packet (len=340) ## 2016-05-22 22:00:25 : IKE<0.0.0.0 > IKE: phase-2 packet re-trans timer expired ## 2016-05-22 22:00:25 : IKE<2.2.2.2> phase-2 packet re-trans timer expired. ## 2016-05-22 22:00:25 : IKE<2.2.2.2> Delete conn entry... ## 2016-05-22 22:00:25 : IKE<2.2.2.2> ...found conn entry(3c623f10) ## 2016-05-22 22:00:25 : IKE<2.2.2.2> XAuth for peer deactivated due to P2 retry timeout. ## 2016-05-22 22:00:26 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-22 22:00:26 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-22 22:00:26 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-22 22:00:26 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-22 22:00:33 : IKE<2.2.2.2> ****** Recv kernel msg IDX-1, TYPE-5 ****** ## 2016-05-22 22:00:33 : IKE<2.2.2.2> ****** Recv kernel msg IDX-1, TYPE-5 ****** ## 2016-05-22 22:00:33 : IKE<2.2.2.2> sa orig index<1>, peer_id<3>. ## 2016-05-22 22:00:33 : IKE<2.2.2.2> isadb_get_entry_by_peer_and_local_if_port_p2sa isadb get entry by peer/local ip and port ## 2016-05-22 22:00:33 : IKE<2.2.2.2> create sa: 1.1.1.1->2.2.2.2 ## 2016-05-22 22:00:33 : getProfileFromP1Proposal-> ## 2016-05-22 22:00:33 : find profile[0]=<00000005 00000002 00000001 00000002> for p1 proposal (id 5), xauth(0) ## 2016-05-22 22:00:33 : init p1sa, pidt = 0x0 ## 2016-05-22 22:00:33 : change peer identity for p1 sa, pidt = 0x0 ## 2016-05-22 22:00:33 : IKE<0.0.0.0 > peer_identity_create_with_uid: uid<0> ## 2016-05-22 22:00:33 : IKE<0.0.0.0 > create peer identity 0x6990b54 ## 2016-05-22 22:00:33 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry before add <1> ## 2016-05-22 22:00:33 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry after add <2> ## 2016-05-22 22:00:33 : peer identity 6990b54 created. ## 2016-05-22 22:00:33 : IKE<0.0.0.0 > EDIPI disabled ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Phase 1: Initiated negotiation in main mode. <1.1.1.1 => 2.2.2.2> ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Msg header built (next payload #1) ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Construct [SA] for ISAKMP ## 2016-05-22 22:00:33 : IKE<2.2.2.2> auth(1)<PRESHRD>, encr(5)<3DES>, hash(2)<SHA>, group(2) ## 2016-05-22 22:00:33 : IKE<2.2.2.2> xauth attribute: disabled ## 2016-05-22 22:00:33 : IKE<2.2.2.2> lifetime/lifesize (28800/0) ## 2016-05-22 22:00:33 : IKE<0.0.0.0 > set_phase1_transform, dh_group(2). ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Construct NetScreen [VID] ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Construct custom [VID] ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Construct custom [VID] ## 2016-05-22 22:00:33 : IKE<2.2.2.2 > Xmit : [SA] [VID] [VID] [VID] ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Initiator sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Send Phase 1 packet (len=156) ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Phase 2 task added ## 2016-05-22 22:00:33 : IKE<2.2.2.2> ike packet, len 160, action 0 ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Catcher: received 132 bytes from socket. ## 2016-05-22 22:00:33 : IKE<2.2.2.2> ****** Recv packet if <bgroup0/0> of vsys <Root> ****** ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Catcher: get 132 bytes. src port 500 ## 2016-05-22 22:00:33 : IKE<0.0.0.0 > ISAKMP msg: len 132, nxp 1[SA], exch 2[MM], flag 00 ## 2016-05-22 22:00:33 : IKE<2.2.2.2 > Recv : [SA] [VID] [VID] ## 2016-05-22 22:00:33 : IKE<0.0.0.0 > extract payload (104): ## 2016-05-22 22:00:33 : IKE<2.2.2.2> MM in state OAK_MM_NO_STATE. ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Process [VID]: ## 2016-05-22 22:00:33 : IKE<2.2.2.2 > Vendor ID: ## 2016-05-22 22:00:33 : af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Process [VID]: ## 2016-05-22 22:00:33 : IKE<2.2.2.2 > Vendor ID: ## 2016-05-22 22:00:33 : 69 93 69 22 87 41 c6 d4 ca 09 4c 93 e2 42 c9 de ## 2016-05-22 22:00:33 : 19 e7 b7 c6 00 00 00 05 00 00 05 00 ## 2016-05-22 22:00:33 : IKE<2.2.2.2> peer is an NetScreen box, model=NetScreen-204, ver=5.00 ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Process [SA]: ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Proposal received: xauthflag 0 ## 2016-05-22 22:00:33 : IKE<2.2.2.2> auth(1)<PRESHRD>, encr(5)<3DES>, hash(2)<SHA>, group(2) ## 2016-05-22 22:00:33 : IKE<2.2.2.2> xauth attribute: disabled ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Phase 1 proposal [0] selected. ## 2016-05-22 22:00:33 : IKE<2.2.2.2> SA Life Type = seconds ## 2016-05-22 22:00:33 : IKE<2.2.2.2> SA lifetime (TV) = 28800 ## 2016-05-22 22:00:33 : IKE<2.2.2.2> DH_BG_consume OK. p1 resp ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Phase 1 MM Initiator constructing 3rd message. ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Msg header built (next payload #4) ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Construct [KE] for ISAKMP ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Construct [NONCE] ## 2016-05-22 22:00:33 : IKE<2.2.2.2 > Xmit : [KE] [NONCE] ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Initiator sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-22 22:00:33 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<1/800207> ## 2016-05-22 22:00:34 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-22 22:00:34 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-22 22:00:34 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-22 22:00:34 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-22 22:00:34 : IKE<2.2.2.2> ike packet, len 208, action 0 ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Catcher: received 180 bytes from socket. ## 2016-05-22 22:00:34 : IKE<2.2.2.2> ****** Recv packet if <bgroup0/0> of vsys <Root> ****** ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Catcher: get 180 bytes. src port 500 ## 2016-05-22 22:00:34 : IKE<0.0.0.0 > ISAKMP msg: len 180, nxp 4[KE], exch 2[MM], flag 00 ## 2016-05-22 22:00:34 : IKE<2.2.2.2 > Recv : [KE] [NONCE] ## 2016-05-22 22:00:34 : IKE<0.0.0.0 > extract payload (152): ## 2016-05-22 22:00:34 : IKE<2.2.2.2> MM in state OAK_MM_SA_SETUP. ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Process [KE]: ## 2016-05-22 22:00:34 : IKE<2.2.2.2> processing ISA_KE in phase 1. ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Phase1: his_DH_pub_len is 128 ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Process [NONCE]: ## 2016-05-22 22:00:34 : IKE<2.2.2.2> processing NONCE in phase 1. ## 2016-05-22 22:00:34 : IKE<2.2.2.2> gen_skeyid() ## 2016-05-22 22:00:34 : IKE<2.2.2.2> gen_skeyid: returning 0 ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Phase 1 MM Initiator constructing 5th message. ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Msg header built (next payload #5) ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct [ID] for ISAKMP ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Use Maverick_Colo as IKE p1 ID. ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct [HASH] ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Use Maverick_Colo as IKE p1 ID. ## 2016-05-22 22:00:34 : IKE<2.2.2.2> ID, len=17, type=2, pro=17, port=500, ## 2016-05-22 22:00:34 : IKE<2.2.2.2> ## 2016-05-22 22:00:34 : IKE<2.2.2.2 > Xmit*: [ID] [HASH] ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Encrypt P1 payload (len 73) ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Initiator sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Send Phase 1 packet (len=76) ## 2016-05-22 22:00:34 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<2/80120f> ## 2016-05-22 22:00:34 : IKE<2.2.2.2> ike packet, len 96, action 0 ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Catcher: received 68 bytes from socket. ## 2016-05-22 22:00:34 : IKE<2.2.2.2> ****** Recv packet if <bgroup0/0> of vsys <Root> ****** ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Catcher: get 68 bytes. src port 500 ## 2016-05-22 22:00:34 : IKE<0.0.0.0 > ISAKMP msg: len 68, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Decrypting payload (length 40) ## 2016-05-22 22:00:34 : IKE<2.2.2.2 > Recv*: [ID] [HASH] ## 2016-05-22 22:00:34 : valid id checking, id type:IP Address, len:12. ## 2016-05-22 22:00:34 : IKE<0.0.0.0 > extract payload (40): ## 2016-05-22 22:00:34 : valid id checking, id type:IP Address, len:12. ## 2016-05-22 22:00:34 : IKE<2.2.2.2> MM in state OAK_MM_KEY_EXCH. ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Process [ID]: ## 2016-05-22 22:00:34 : IKE<2.2.2.2> ID received: type=ID_IPV4_ADDR, ip = 2.2.2.2, port=0, protocol=0 ## 2016-05-22 22:00:34 : IKE<2.2.2.2> peer gateway entry has no peer id configured ## 2016-05-22 22:00:34 : IKE<2.2.2.2> ID processed. return 0. sa->p1_state = 2. ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Process [HASH]: ## 2016-05-22 22:00:34 : IKE<2.2.2.2> ID, len=8, type=1, pro=0, port=0, ## 2016-05-22 22:00:34 : IKE<2.2.2.2> addr=2.2.2.2 ## 2016-05-22 22:00:34 : IKE<2.2.2.2> completing Phase 1 ## 2016-05-22 22:00:34 : IKE<2.2.2.2> sa_pidt = 6990b54 ## 2016-05-22 22:00:34 : IKE<2.2.2.2> found existing peer identity 698ed98 ## 2016-05-22 22:00:34 : IKE<2.2.2.2> peer_identity_unregister_p1_sa. ## 2016-05-22 22:00:34 : IKE<0.0.0.0 > delete peer identity 0x6990b54 ## 2016-05-22 22:00:34 : IKE<0.0.0.0 > peer_identity_remove_from_peer: num entry before remove <2> ## 2016-05-22 22:00:34 : IKE<2.2.2.2> peer_idt.c peer_identity_unregister_p1_sa 686: pidt deleted. ## 2016-05-22 22:00:34 : IKE<2.2.2.2> phase 1 sa timeout value reduced <28784> to <30>. ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Phase 1: Completed Main mode negotiation with a <28800>-second lifetime. ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Phase 2: Initiated Quick Mode negotiation. ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Phase-2: start quick mode negotiation ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Phase-2: no change in Modecfg IPv4 address for tunnel ifp. ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Create conn entry... ## 2016-05-22 22:00:34 : IKE<2.2.2.2> ...done(new f3a04cd6) ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Initiator not set commit bit on 1st QM. ## 2016-05-22 22:00:34 : IKE<2.2.2.2> DH_BG_consume OK. p2 init ## 2016-05-22 22:00:34 : IKE<0.0.0.0 > add sa list for msg id <f3a04cd6> ## 2016-05-22 22:00:34 : IKE<2.2.2.2> get_unique_spi 0, 2589482087, 9a585c67 ## 2016-05-22 22:00:34 : IKE<2.2.2.2> 0,0/0(0)/spi(9a585c67)/keylen(0) ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct ISAKMP header. ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Msg header built (next payload #8) ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct [HASH] ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct [SA] for IPSEC ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Set IPSEC SA attrs: lifetime(3600/0) ## 2016-05-22 22:00:34 : IKE<2.2.2.2> atts<00000003 00000000 00000003 00000002 00000001 00000002> ## 2016-05-22 22:00:34 : IKE<2.2.2.2> proto(3)<ESP>, esp(3)<ESP_3DES>, auth(2)<SHA>, encap(1)<TUNNEL>, group(2) ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Before NAT-T attr unmap: private tunnel = 1. ## 2016-05-22 22:00:34 : IKE<2.2.2.2> After NAT-T attr unmap: private tunnel = 1. ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Policy have separate SA. Use P2 ID from policy sa (16). ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Initiator P2 ID built: .... ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Responder P2 ID built: .... ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct [NONCE] for IPSec ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct [KE] for PFS ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct [ID] for Phase 2 ## 2016-05-22 22:00:34 : id payload constructed. type(4),ip(172.16.10.0),mask(255.255.255.0), prot(0), port(0) ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct [ID] for Phase 2 ## 2016-05-22 22:00:34 : id payload constructed. type(4),ip(172.16.72.0),mask(255.255.255.0), prot(0), port(0) ## 2016-05-22 22:00:34 : IKE<2.2.2.2> construct NOTIFY_NS_NHTB_INFORM: attr INTERNAL_IPx_ADDRESS, value 172.16.10.254, datalen 12 ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct [NOTIF] (NOTIFY_NS_NHTB_INFORM) for IPSEC ## 2016-05-22 22:00:34 : IKE<2.2.2.2> construct QM HASH ## 2016-05-22 22:00:34 : IKE<2.2.2.2 > Xmit*: [HASH] [SA] [NONCE] [KE] [ID] [ID] [NOTIF] ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Encrypt P2 payload (len 332) ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Initiator sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Send Phase 2 packet (len=340) ## 2016-05-22 22:00:34 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<3/80122f> ## 2016-05-22 22:00:35 : reap_db. deleting p1sa 6998424 ## 2016-05-22 22:00:35 : terminate_SA: trying to delete SA cause: 0 cond: c2 ## 2016-05-22 22:00:35 : IKE<2.2.2.2> xauth_cleanup() ## 2016-05-22 22:00:35 : IKE<2.2.2.2> Done cleaning up IKE Phase 1 SA ## 2016-05-22 22:00:35 : peer_identity_unregister_p1_sa. ## 2016-05-22 22:00:35 : reap_db. deleting p1sa 6998d6c ## 2016-05-22 22:00:35 : terminate_SA: trying to delete SA cause: 0 cond: 2 ## 2016-05-22 22:00:35 : peer_identity_unregister_p1_sa. ## 2016-05-22 22:00:35 : IKE<0.0.0.0 > delete peer identity 0x698fb1c ## 2016-05-22 22:00:35 : IKE<0.0.0.0 > peer_identity_remove_from_peer: num entry before remove <2> ## 2016-05-22 22:00:35 : peer_idt.c peer_identity_unregister_p1_sa 686: pidt deleted. ## 2016-05-22 22:00:35 : X509_free <03dba0d8>. ## 2016-05-22 22:00:35 : X509_free: CN=0185042012000312,CN=system generated,CN=self-signed, ## 2016-05-22 22:00:35 : EVP_PKEY_free reference 1, i 1 ## 2016-05-22 22:00:35 : build_ike_pki_mail: key_type=0 ## 2016-05-22 22:00:35 : processPkiRequest cmd=0 ## 2016-05-22 22:00:35 : certReqHandler: req=7607d3c task=205e77c ## 2016-05-22 22:00:35 : build_ike_pki_mail: key_type=0 ## 2016-05-22 22:00:35 : pki mail received. ## 2016-05-22 22:00:35 : X509_PUBKEY_get key->pkey->reference 2 ## 2016-05-22 22:00:35 : EVP_PKEY_free reference 1, i 1 ## 2016-05-22 22:00:35 : X509_PUBKEY_get key->pkey->reference 2 ## 2016-05-22 22:00:35 : EVP_PKEY_free reference 1, i 1 ## 2016-05-22 22:00:35 : X509_PUBKEY_get key->pkey->reference 2 ## 2016-05-22 22:00:35 : EVP_PKEY_free reference 1, i 1 ## 2016-05-22 22:00:35 : X509_PUBKEY_get key->pkey->reference 2 ## 2016-05-22 22:00:35 : EVP_PKEY_free reference 1, i 1 ## 2016-05-22 22:00:35 : cert into stack: CN=0185042012000312,CN=system generated,CN=self-signed, ## 2016-05-22 22:00:35 : bio_write, before bwrite. ## 2016-05-22 22:00:35 : buffer_write: <86> ## 2016-05-22 22:00:35 : bio_write, after bwrite. <86> ## 2016-05-22 22:00:35 : bio_write, before bwrite. ## 2016-05-22 22:00:35 : buffer_write: <574> ## 2016-05-22 22:00:35 : bio_write, after bwrite. <574> ## 2016-05-22 22:00:35 : bio_write, before bwrite. ## 2016-05-22 22:00:35 : buffer_write: <9> ## 2016-05-22 22:00:35 : bio_write, after bwrite. <9> ## 2016-05-22 22:00:35 : bio_write, before bwrite. ## 2016-05-22 22:00:35 : bio_write, after bwrite. <669> ## 2016-05-22 22:00:35 : BIO_copy_next_retry: b<02b2bb84> ## 2016-05-22 22:00:35 : BIO_copy_next_retry: b next<02b29b1c> ## 2016-05-22 22:00:35 : bio_write, before bwrite. ## 2016-05-22 22:00:35 : buffer_write: <6> ## 2016-05-22 22:00:35 : bio_write, after bwrite. <6> ## 2016-05-22 22:00:35 : bio_write, before bwrite. ## 2016-05-22 22:00:35 : buffer_write: <37> ## 2016-05-22 22:00:35 : bio_write, after bwrite. <37> ## 2016-05-22 22:00:35 : bio_write, before bwrite. ## 2016-05-22 22:00:35 : bio_write, after bwrite. <43> ## 2016-05-22 22:00:35 : BIO_copy_next_retry: b<02b2bb84> ## 2016-05-22 22:00:35 : BIO_copy_next_retry: b next<02b29b1c>
Show security IKE Security-assoc is blank