>Заглуши ракун. Очисть лог. Потом стартани и потерпи секунд 30. Все что
>вывалиться кинь сюда или же вывеси где нить на страничку. Охота
>глянуть.
>Да еще, DEBUG включал в ядре? для IPSEC? Дебаг включен.
Содержимое лога:
2005-06-10 16:40:51: INFO: main.c:172:main(): @(#)package version freebsd-20030826a
2005-06-10 16:40:51: INFO: main.c:174:main(): @(#)internal version 20001216 sakane@kame.net
2005-06-10 16:40:51: INFO: main.c:175:main(): @(#)This product linked OpenSSL 0.9.7c 30 Sep 2003 (http://www.openssl.org/)
2005-06-10 16:40:51: WARNING: cftoken.l:514:yywarn(): /usr/local/etc/racoon/racoon.conf:46: "support_mip6" it is obsoleted. use "support_proxy".
2005-06-10 16:40:51: DEBUG: pfkey.c:2310:pk_checkalg(): compression algorithm can not be checked because sadb message doesn't support it.
2005-06-10 16:40:51: INFO: isakmp.c:1358:isakmp_open(): yyy.yyy.yyy.yyy[500] used as isakmp port (fd=5)
2005-06-10 16:40:51: DEBUG: pfkey.c:195:pfkey_handler(): get pfkey X_SPDDUMP message
2005-06-10 16:40:51: DEBUG: pfkey.c:195:pfkey_handler(): get pfkey X_SPDDUMP message
2005-06-10 16:40:51: DEBUG: policy.c:184:cmpspidxstrict(): sub:0xbfbfe9c0: 192.168.4.0/24[0] 192.168.3.0/32[0] proto=any dir=out
2005-06-10 16:40:51: DEBUG: policy.c:185:cmpspidxstrict(): db :0x80a1c08: 192.168.3.0/24[0] 192.168.4.0/24[0] proto=any dir=in
2005-06-10 16:42:07: DEBUG: isakmp.c:221:isakmp_handler(): ===
2005-06-10 16:42:07: DEBUG: isakmp.c:222:isakmp_handler(): 388 bytes message received from 195.58.28.165[500]
2005-06-10 16:42:07: DEBUG: plog.c:193:plogdump():
499615c2 69485703 00000000 00000000 01100200 00000000 00000184 0d0000dc
00000001 00000001 000000d0 00010006 03000024 00010000 80010007 800e0080
80020002 80030001 80040002 800b0001 800c7080 03000024 01010000 80010007
800e0080 80020001 80030001 80040002 800b0001 800c7080 03000020 02010000
80010005 80020002 80030001 80040002 800b0001 800c7080 03000020 03010000
80010005 80020001 80030001 80040002 800b0001 800c7080 03000020 04010000
80010001 80020002 80030001 80040002 800b0001 800c7080 00000020 05010000
80010001 80020001 80030001 80040002 800b0001 800c7080 0d000014 afcad713
68a1f1c9 6b8696fc 77570100 0d000014 27bab5dc 01ea0760 ea4e3190 ac27c0d0
0d000014 6105c422 e76847e4 3f968480 1292aecd 0d000014 4485152d 18b6bbcd
0be8a846 9579ddcc 0d000014 cd604643 35df21f8 7cfdb2fc 68b6a448 0d000014
90cb8091 3ebb696e 086381b5 ec427b1f 00000014 7d9419a6 5310ca6f 2c179d92
15529d56
2005-06-10 16:42:07: DEBUG: isakmp.c:2248:isakmp_printpacket(): begin.
2005-06-10 16:42:07: DEBUG: remoteconf.c:129:getrmconf(): anonymous configuration selected for 195.58.28.165[500].
2005-06-10 16:42:07: DEBUG: isakmp.c:889:isakmp_ph1begin_r(): ===
2005-06-10 16:42:07: INFO: isakmp.c:894:isakmp_ph1begin_r(): respond new phase 1 negotiation: yyy.yyy.yyy.yyy[500]<=>195.58.28.165[500]
2005-06-10 16:42:07: INFO: isakmp.c:899:isakmp_ph1begin_r(): begin Identity Protection mode.
2005-06-10 16:42:07: DEBUG: isakmp.c:1112:isakmp_parsewoh(): begin.
2005-06-10 16:42:07: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=1(sa)
2005-06-10 16:42:07: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=13(vid)
2005-06-10 16:42:07: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=13(vid)
2005-06-10 16:42:07: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=13(vid)
2005-06-10 16:42:07: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=13(vid)
2005-06-10 16:42:07: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=13(vid)
2005-06-10 16:42:07: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=13(vid)
2005-06-10 16:42:07: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=13(vid)
2005-06-10 16:42:07: DEBUG: isakmp.c:1178:isakmp_parsewoh(): succeed.
2005-06-10 16:42:07: DEBUG: vendorid.c:137:check_vendorid(): received unknown Vendor ID
2005-06-10 16:42:07: DEBUG: vendorid.c:137:check_vendorid(): received unknown Vendor ID
2005-06-10 16:42:07: DEBUG: vendorid.c:137:check_vendorid(): received unknown Vendor ID
2005-06-10 16:42:07: DEBUG: vendorid.c:137:check_vendorid(): received unknown Vendor ID
2005-06-10 16:42:07: DEBUG: vendorid.c:137:check_vendorid(): received unknown Vendor ID
2005-06-10 16:42:07: DEBUG: vendorid.c:137:check_vendorid(): received unknown Vendor ID
2005-06-10 16:42:07: DEBUG: vendorid.c:137:check_vendorid(): received unknown Vendor ID
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:1117:get_proppair(): total SA len=216
2005-06-10 16:42:07: DEBUG: plog.c:193:plogdump():
00000001 00000001 000000d0 00010006 03000024 00010000 80010007 800e0080
80020002 80030001 80040002 800b0001 800c7080 03000024 01010000 80010007
800e0080 80020001 80030001 80040002 800b0001 800c7080 03000020 02010000
80010005 80020002 80030001 80040002 800b0001 800c7080 03000020 03010000
80010005 80020001 80030001 80040002 800b0001 800c7080 03000020 04010000
80010001 80020002 80030001 80040002 800b0001 800c7080 00000020 05010000
80010001 80020001 80030001 80040002 800b0001 800c7080
2005-06-10 16:42:07: DEBUG: isakmp.c:1112:isakmp_parsewoh(): begin.
2005-06-10 16:42:07: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=2(prop)
2005-06-10 16:42:07: DEBUG: isakmp.c:1178:isakmp_parsewoh(): succeed.
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:1178:get_proppair(): proposal #0 len=208
2005-06-10 16:42:07: DEBUG: isakmp.c:1112:isakmp_parsewoh(): begin.
2005-06-10 16:42:07: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=3(trns)
2005-06-10 16:42:07: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=3(trns)
2005-06-10 16:42:07: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=3(trns)
2005-06-10 16:42:07: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=3(trns)
2005-06-10 16:42:07: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=3(trns)
2005-06-10 16:42:07: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=3(trns)
2005-06-10 16:42:07: DEBUG: isakmp.c:1178:isakmp_parsewoh(): succeed.
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:1327:get_transform(): transform #0 len=36
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:1886:check_attr_isakmp(): type=Encryption Algorithm, flag=0x8000, lorv=7
2005-06-10 16:42:07: DEBUG: algorithm.c:386:alg_oakley_encdef(): encription(aes)
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:1886:check_attr_isakmp(): type=Key Length, flag=0x8000, lorv=128
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:1886:check_attr_isakmp(): type=Hash Algorithm, flag=0x8000, lorv=SHA
2005-06-10 16:42:07: DEBUG: algorithm.c:256:alg_oakley_hashdef(): hash(sha1)
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:1886:check_attr_isakmp(): type=Authentication Method, flag=0x8000, lorv=pre-shared key
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:1886:check_attr_isakmp(): type=Group Description, flag=0x8000, lorv=1024-bit MODP group
2005-06-10 16:42:07: DEBUG: algorithm.c:614:alg_oakley_dhdef(): hmac(modp1024)
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:1886:check_attr_isakmp(): type=Life Type, flag=0x8000, lorv=seconds
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:1886:check_attr_isakmp(): type=Life Duration, flag=0x8000, lorv=28800
2005-06-10 16:42:07: ERROR: ipsec_doi.c:1318:get_transform(): Only a single transform payload is allowed during phase 1 processing.
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:1221:get_proppair(): pair 0:
2005-06-10 16:42:07: DEBUG: proposal.c:895:print_proppair0(): 0x80a7d20: next=0x0 tnext=0x0
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:1256:get_proppair(): proposal #0: 1 transform
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:322:get_ph1approvalx(): prop#=0, prot-id=ISAKMP, spi-size=0, #trns=6
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:327:get_ph1approvalx(): trns#=0, trns-id=IKE
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Encryption Algorithm, flag=0x8000, lorv=7
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Key Length, flag=0x8000, lorv=128
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Hash Algorithm, flag=0x8000, lorv=SHA
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Authentication Method, flag=0x8000, lorv=pre-shared key
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Group Description, flag=0x8000, lorv=1024-bit MODP group
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Life Type, flag=0x8000, lorv=seconds
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Life Duration, flag=0x8000, lorv=28800
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:338:get_ph1approvalx(): Compared: DB:Peer
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:339:get_ph1approvalx(): (lifetime = 3600:28800)
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:341:get_ph1approvalx(): (lifebyte = 0:0)
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:343:get_ph1approvalx(): enctype = 3DES-CBC:7
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:348:get_ph1approvalx(): (encklen = 0:128)
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:350:get_ph1approvalx(): hashtype = MD5:SHA
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:355:get_ph1approvalx(): authmethod = pre-shared key:pre-shared key
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:360:get_ph1approvalx(): dh_group = 768-bit MODP group:1024-bit MODP group
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Encryption Algorithm, flag=0x8000, lorv=7
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Key Length, flag=0x8000, lorv=128
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Hash Algorithm, flag=0x8000, lorv=SHA
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Authentication Method, flag=0x8000, lorv=pre-shared key
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Group Description, flag=0x8000, lorv=1024-bit MODP group
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Life Type, flag=0x8000, lorv=seconds
2005-06-10 16:42:07: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Life Duration, flag=0x8000, lorv=28800
2005-06-10 16:42:07: ERROR: ipsec_doi.c:404:print_ph1mismatched(): rejected enctype: DB(prop#1:trns#1):Peer(prop#0:trns#0) = 3DES-CBC:7
2005-06-10 16:42:07: ERROR: ipsec_doi.c:428:print_ph1mismatched(): rejected hashtype: DB(prop#1:trns#1):Peer(prop#0:trns#0) = MD5:SHA
2005-06-10 16:42:07: ERROR: ipsec_doi.c:440:print_ph1mismatched(): rejected dh_group: DB(prop#1:trns#1):Peer(prop#0:trns#0) = 768-bit MODP group:1024-bit MODP group
2005-06-10 16:42:07: ERROR: ipsec_doi.c:243:get_ph1approval(): no suitable proposal found.
2005-06-10 16:42:07: ERROR: isakmp_ident.c:782:ident_r1recv(): failed to get valid proposal.
2005-06-10 16:42:07: ERROR: isakmp.c:913:isakmp_ph1begin_r(): failed to process packet.
2005-06-10 16:42:37: DEBUG: isakmp.c:221:isakmp_handler(): ===
2005-06-10 16:42:37: DEBUG: isakmp.c:222:isakmp_handler(): 388 bytes message received from 195.58.28.165[500]
2005-06-10 16:42:37: DEBUG: plog.c:193:plogdump():
499615c2 69485703 00000000 00000000 01100200 00000000 00000184 0d0000dc
00000001 00000001 000000d0 00010006 03000024 00010000 80010007 800e0080
80020002 80030001 80040002 800b0001 800c7080 03000024 01010000 80010007
800e0080 80020001 80030001 80040002 800b0001 800c7080 03000020 02010000
80010005 80020002 80030001 80040002 800b0001 800c7080 03000020 03010000
80010005 80020001 80030001 80040002 800b0001 800c7080 03000020 04010000
80010001 80020002 80030001 80040002 800b0001 800c7080 00000020 05010000
80010001 80020001 80030001 80040002 800b0001 800c7080 0d000014 afcad713
68a1f1c9 6b8696fc 77570100 0d000014 27bab5dc 01ea0760 ea4e3190 ac27c0d0
0d000014 6105c422 e76847e4 3f968480 1292aecd 0d000014 4485152d 18b6bbcd
0be8a846 9579ddcc 0d000014 cd604643 35df21f8 7cfdb2fc 68b6a448 0d000014
90cb8091 3ebb696e 086381b5 ec427b1f 00000014 7d9419a6 5310ca6f 2c179d92
15529d56
2005-06-10 16:42:37: DEBUG: isakmp.c:2248:isakmp_printpacket(): begin.
2005-06-10 16:42:37: DEBUG: remoteconf.c:129:getrmconf(): anonymous configuration selected for 195.58.28.165[500].
2005-06-10 16:42:37: DEBUG: isakmp.c:889:isakmp_ph1begin_r(): ===
2005-06-10 16:42:37: INFO: isakmp.c:894:isakmp_ph1begin_r(): respond new phase 1 negotiation: yyy.yyy.yyy.yyy[500]<=>195.58.28.165[500]
2005-06-10 16:42:37: INFO: isakmp.c:899:isakmp_ph1begin_r(): begin Identity Protection mode.
2005-06-10 16:42:37: DEBUG: isakmp.c:1112:isakmp_parsewoh(): begin.
2005-06-10 16:42:37: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=1(sa)
2005-06-10 16:42:37: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=13(vid)
2005-06-10 16:42:37: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=13(vid)
2005-06-10 16:42:37: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=13(vid)
2005-06-10 16:42:37: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=13(vid)
2005-06-10 16:42:37: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=13(vid)
2005-06-10 16:42:37: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=13(vid)
2005-06-10 16:42:37: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=13(vid)
2005-06-10 16:42:37: DEBUG: isakmp.c:1178:isakmp_parsewoh(): succeed.
2005-06-10 16:42:37: DEBUG: vendorid.c:137:check_vendorid(): received unknown Vendor ID
2005-06-10 16:42:37: DEBUG: vendorid.c:137:check_vendorid(): received unknown Vendor ID
2005-06-10 16:42:37: DEBUG: vendorid.c:137:check_vendorid(): received unknown Vendor ID
2005-06-10 16:42:37: DEBUG: vendorid.c:137:check_vendorid(): received unknown Vendor ID
2005-06-10 16:42:37: DEBUG: vendorid.c:137:check_vendorid(): received unknown Vendor ID
2005-06-10 16:42:37: DEBUG: vendorid.c:137:check_vendorid(): received unknown Vendor ID
2005-06-10 16:42:37: DEBUG: vendorid.c:137:check_vendorid(): received unknown Vendor ID
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:1117:get_proppair(): total SA len=216
2005-06-10 16:42:37: DEBUG: plog.c:193:plogdump():
00000001 00000001 000000d0 00010006 03000024 00010000 80010007 800e0080
80020002 80030001 80040002 800b0001 800c7080 03000024 01010000 80010007
800e0080 80020001 80030001 80040002 800b0001 800c7080 03000020 02010000
80010005 80020002 80030001 80040002 800b0001 800c7080 03000020 03010000
80010005 80020001 80030001 80040002 800b0001 800c7080 03000020 04010000
80010001 80020002 80030001 80040002 800b0001 800c7080 00000020 05010000
80010001 80020001 80030001 80040002 800b0001 800c7080
2005-06-10 16:42:37: DEBUG: isakmp.c:1112:isakmp_parsewoh(): begin.
2005-06-10 16:42:37: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=2(prop)
2005-06-10 16:42:37: DEBUG: isakmp.c:1178:isakmp_parsewoh(): succeed.
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:1178:get_proppair(): proposal #0 len=208
2005-06-10 16:42:37: DEBUG: isakmp.c:1112:isakmp_parsewoh(): begin.
2005-06-10 16:42:37: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=3(trns)
2005-06-10 16:42:37: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=3(trns)
2005-06-10 16:42:37: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=3(trns)
2005-06-10 16:42:37: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=3(trns)
2005-06-10 16:42:37: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=3(trns)
2005-06-10 16:42:37: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=3(trns)
2005-06-10 16:42:37: DEBUG: isakmp.c:1178:isakmp_parsewoh(): succeed.
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:1327:get_transform(): transform #0 len=36
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:1886:check_attr_isakmp(): type=Encryption Algorithm, flag=0x8000, lorv=7
2005-06-10 16:42:37: DEBUG: algorithm.c:386:alg_oakley_encdef(): encription(aes)
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:1886:check_attr_isakmp(): type=Key Length, flag=0x8000, lorv=128
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:1886:check_attr_isakmp(): type=Hash Algorithm, flag=0x8000, lorv=SHA
2005-06-10 16:42:37: DEBUG: algorithm.c:256:alg_oakley_hashdef(): hash(sha1)
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:1886:check_attr_isakmp(): type=Authentication Method, flag=0x8000, lorv=pre-shared key
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:1886:check_attr_isakmp(): type=Group Description, flag=0x8000, lorv=1024-bit MODP group
2005-06-10 16:42:37: DEBUG: algorithm.c:614:alg_oakley_dhdef(): hmac(modp1024)
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:1886:check_attr_isakmp(): type=Life Type, flag=0x8000, lorv=seconds
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:1886:check_attr_isakmp(): type=Life Duration, flag=0x8000, lorv=28800
2005-06-10 16:42:37: ERROR: ipsec_doi.c:1318:get_transform(): Only a single transform payload is allowed during phase 1 processing.
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:1221:get_proppair(): pair 0:
2005-06-10 16:42:37: DEBUG: proposal.c:895:print_proppair0(): 0x80a7d20: next=0x0 tnext=0x0
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:1256:get_proppair(): proposal #0: 1 transform
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:322:get_ph1approvalx(): prop#=0, prot-id=ISAKMP, spi-size=0, #trns=6
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:327:get_ph1approvalx(): trns#=0, trns-id=IKE
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Encryption Algorithm, flag=0x8000, lorv=7
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Key Length, flag=0x8000, lorv=128
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Hash Algorithm, flag=0x8000, lorv=SHA
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Authentication Method, flag=0x8000, lorv=pre-shared key
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Group Description, flag=0x8000, lorv=1024-bit MODP group
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Life Type, flag=0x8000, lorv=seconds
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Life Duration, flag=0x8000, lorv=28800
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:338:get_ph1approvalx(): Compared: DB:Peer
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:339:get_ph1approvalx(): (lifetime = 3600:28800)
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:341:get_ph1approvalx(): (lifebyte = 0:0)
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:343:get_ph1approvalx(): enctype = 3DES-CBC:7
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:348:get_ph1approvalx(): (encklen = 0:128)
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:350:get_ph1approvalx(): hashtype = MD5:SHA
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:355:get_ph1approvalx(): authmethod = pre-shared key:pre-shared key
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:360:get_ph1approvalx(): dh_group = 768-bit MODP group:1024-bit MODP group
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Encryption Algorithm, flag=0x8000, lorv=7
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Key Length, flag=0x8000, lorv=128
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Hash Algorithm, flag=0x8000, lorv=SHA
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Authentication Method, flag=0x8000, lorv=pre-shared key
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Group Description, flag=0x8000, lorv=1024-bit MODP group
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Life Type, flag=0x8000, lorv=seconds
2005-06-10 16:42:37: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Life Duration, flag=0x8000, lorv=28800
2005-06-10 16:42:37: ERROR: ipsec_doi.c:404:print_ph1mismatched(): rejected enctype: DB(prop#1:trns#1):Peer(prop#0:trns#0) = 3DES-CBC:7
2005-06-10 16:42:37: ERROR: ipsec_doi.c:428:print_ph1mismatched(): rejected hashtype: DB(prop#1:trns#1):Peer(prop#0:trns#0) = MD5:SHA
2005-06-10 16:42:37: ERROR: ipsec_doi.c:440:print_ph1mismatched(): rejected dh_group: DB(prop#1:trns#1):Peer(prop#0:trns#0) = 768-bit MODP group:1024-bit MODP group
2005-06-10 16:42:37: ERROR: ipsec_doi.c:243:get_ph1approval(): no suitable proposal found.
2005-06-10 16:42:37: ERROR: isakmp_ident.c:782:ident_r1recv(): failed to get valid proposal.
2005-06-10 16:42:37: ERROR: isakmp.c:913:isakmp_ph1begin_r(): failed to process packet.
2005-06-10 16:42:45: DEBUG: isakmp.c:221:isakmp_handler(): ===
2005-06-10 16:42:45: DEBUG: isakmp.c:222:isakmp_handler(): 80 bytes message received from xxx.xxx.xxx.xxx[500]
2005-06-10 16:42:45: DEBUG: plog.c:193:plogdump():
ca92beea 8fc89635 00000000 00000000 01100200 00000000 00000050 00000034
00000001 00000001 00000028 01010001 00000020 01010000 800b0001 800c7080
80010005 80030001 80020001 80040002
2005-06-10 16:42:45: DEBUG: isakmp.c:2248:isakmp_printpacket(): begin.
2005-06-10 16:42:45: DEBUG: remoteconf.c:129:getrmconf(): anonymous configuration selected for xxx.xxx.xxx.xxx[500].
2005-06-10 16:42:45: DEBUG: isakmp.c:889:isakmp_ph1begin_r(): ===
2005-06-10 16:42:45: INFO: isakmp.c:894:isakmp_ph1begin_r(): respond new phase 1 negotiation: yyy.yyy.yyy.yyy[500]<=>xxx.xxx.xxx.xxx[500]
2005-06-10 16:42:45: INFO: isakmp.c:899:isakmp_ph1begin_r(): begin Identity Protection mode.
2005-06-10 16:42:45: DEBUG: isakmp.c:1112:isakmp_parsewoh(): begin.
2005-06-10 16:42:45: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=1(sa)
2005-06-10 16:42:45: DEBUG: isakmp.c:1178:isakmp_parsewoh(): succeed.
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:1117:get_proppair(): total SA len=48
2005-06-10 16:42:45: DEBUG: plog.c:193:plogdump():
00000001 00000001 00000028 01010001 00000020 01010000 800b0001 800c7080
80010005 80030001 80020001 80040002
2005-06-10 16:42:45: DEBUG: isakmp.c:1112:isakmp_parsewoh(): begin.
2005-06-10 16:42:45: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=2(prop)
2005-06-10 16:42:45: DEBUG: isakmp.c:1178:isakmp_parsewoh(): succeed.
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:1178:get_proppair(): proposal #1 len=40
2005-06-10 16:42:45: DEBUG: isakmp.c:1112:isakmp_parsewoh(): begin.
2005-06-10 16:42:45: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=3(trns)
2005-06-10 16:42:45: DEBUG: isakmp.c:1178:isakmp_parsewoh(): succeed.
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:1327:get_transform(): transform #1 len=32
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:1886:check_attr_isakmp(): type=Life Type, flag=0x8000, lorv=seconds
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:1886:check_attr_isakmp(): type=Life Duration, flag=0x8000, lorv=28800
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:1886:check_attr_isakmp(): type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
2005-06-10 16:42:45: DEBUG: algorithm.c:386:alg_oakley_encdef(): encription(3des)
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:1886:check_attr_isakmp(): type=Authentication Method, flag=0x8000, lorv=pre-shared key
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:1886:check_attr_isakmp(): type=Hash Algorithm, flag=0x8000, lorv=MD5
2005-06-10 16:42:45: DEBUG: algorithm.c:256:alg_oakley_hashdef(): hash(md5)
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:1886:check_attr_isakmp(): type=Group Description, flag=0x8000, lorv=1024-bit MODP group
2005-06-10 16:42:45: DEBUG: algorithm.c:614:alg_oakley_dhdef(): hmac(modp1024)
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:1221:get_proppair(): pair 1:
2005-06-10 16:42:45: DEBUG: proposal.c:895:print_proppair0(): 0x80a7d20: next=0x0 tnext=0x0
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:1256:get_proppair(): proposal #1: 1 transform
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:322:get_ph1approvalx(): prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:327:get_ph1approvalx(): trns#=1, trns-id=IKE
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Life Type, flag=0x8000, lorv=seconds
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Life Duration, flag=0x8000, lorv=28800
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Authentication Method, flag=0x8000, lorv=pre-shared key
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Hash Algorithm, flag=0x8000, lorv=MD5
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Group Description, flag=0x8000, lorv=1024-bit MODP group
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:338:get_ph1approvalx(): Compared: DB:Peer
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:339:get_ph1approvalx(): (lifetime = 3600:28800)
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:341:get_ph1approvalx(): (lifebyte = 0:0)
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:343:get_ph1approvalx(): enctype = 3DES-CBC:3DES-CBC
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:348:get_ph1approvalx(): (encklen = 0:0)
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:350:get_ph1approvalx(): hashtype = MD5:MD5
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:355:get_ph1approvalx(): authmethod = pre-shared key:pre-shared key
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:360:get_ph1approvalx(): dh_group = 768-bit MODP group:1024-bit MODP group
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Life Type, flag=0x8000, lorv=seconds
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Life Duration, flag=0x8000, lorv=28800
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Authentication Method, flag=0x8000, lorv=pre-shared key
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Hash Algorithm, flag=0x8000, lorv=MD5
2005-06-10 16:42:45: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Group Description, flag=0x8000, lorv=1024-bit MODP group
2005-06-10 16:42:45: ERROR: ipsec_doi.c:440:print_ph1mismatched(): rejected dh_group: DB(prop#1:trns#1):Peer(prop#1:trns#1) = 768-bit MODP group:1024-bit MODP group
2005-06-10 16:42:45: ERROR: ipsec_doi.c:243:get_ph1approval(): no suitable proposal found.
2005-06-10 16:42:45: ERROR: isakmp_ident.c:782:ident_r1recv(): failed to get valid proposal.
2005-06-10 16:42:45: ERROR: isakmp.c:913:isakmp_ph1begin_r(): failed to process packet.
2005-06-10 16:42:54: DEBUG: isakmp.c:221:isakmp_handler(): ===
2005-06-10 16:42:54: DEBUG: isakmp.c:222:isakmp_handler(): 80 bytes message received from xxx.xxx.xxx.xxx[500]
2005-06-10 16:42:54: DEBUG: plog.c:193:plogdump():
ca92beea 8fc89635 00000000 00000000 01100200 00000000 00000050 00000034
00000001 00000001 00000028 01010001 00000020 01010000 800b0001 800c7080
80010005 80030001 80020001 80040002
2005-06-10 16:42:54: DEBUG: isakmp.c:2248:isakmp_printpacket(): begin.
2005-06-10 16:42:54: DEBUG: remoteconf.c:129:getrmconf(): anonymous configuration selected for xxx.xxx.xxx.xxx[500].
2005-06-10 16:42:54: DEBUG: isakmp.c:889:isakmp_ph1begin_r(): ===
2005-06-10 16:42:54: INFO: isakmp.c:894:isakmp_ph1begin_r(): respond new phase 1 negotiation: yyy.yyy.yyy.yyy[500]<=>xxx.xxx.xxx.xxx[500]
2005-06-10 16:42:54: INFO: isakmp.c:899:isakmp_ph1begin_r(): begin Identity Protection mode.
2005-06-10 16:42:54: DEBUG: isakmp.c:1112:isakmp_parsewoh(): begin.
2005-06-10 16:42:54: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=1(sa)
2005-06-10 16:42:54: DEBUG: isakmp.c:1178:isakmp_parsewoh(): succeed.
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:1117:get_proppair(): total SA len=48
2005-06-10 16:42:54: DEBUG: plog.c:193:plogdump():
00000001 00000001 00000028 01010001 00000020 01010000 800b0001 800c7080
80010005 80030001 80020001 80040002
2005-06-10 16:42:54: DEBUG: isakmp.c:1112:isakmp_parsewoh(): begin.
2005-06-10 16:42:54: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=2(prop)
2005-06-10 16:42:54: DEBUG: isakmp.c:1178:isakmp_parsewoh(): succeed.
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:1178:get_proppair(): proposal #1 len=40
2005-06-10 16:42:54: DEBUG: isakmp.c:1112:isakmp_parsewoh(): begin.
2005-06-10 16:42:54: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=3(trns)
2005-06-10 16:42:54: DEBUG: isakmp.c:1178:isakmp_parsewoh(): succeed.
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:1327:get_transform(): transform #1 len=32
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:1886:check_attr_isakmp(): type=Life Type, flag=0x8000, lorv=seconds
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:1886:check_attr_isakmp(): type=Life Duration, flag=0x8000, lorv=28800
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:1886:check_attr_isakmp(): type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
2005-06-10 16:42:54: DEBUG: algorithm.c:386:alg_oakley_encdef(): encription(3des)
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:1886:check_attr_isakmp(): type=Authentication Method, flag=0x8000, lorv=pre-shared key
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:1886:check_attr_isakmp(): type=Hash Algorithm, flag=0x8000, lorv=MD5
2005-06-10 16:42:54: DEBUG: algorithm.c:256:alg_oakley_hashdef(): hash(md5)
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:1886:check_attr_isakmp(): type=Group Description, flag=0x8000, lorv=1024-bit MODP group
2005-06-10 16:42:54: DEBUG: algorithm.c:614:alg_oakley_dhdef(): hmac(modp1024)
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:1221:get_proppair(): pair 1:
2005-06-10 16:42:54: DEBUG: proposal.c:895:print_proppair0(): 0x80a7d20: next=0x0 tnext=0x0
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:1256:get_proppair(): proposal #1: 1 transform
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:322:get_ph1approvalx(): prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:327:get_ph1approvalx(): trns#=1, trns-id=IKE
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Life Type, flag=0x8000, lorv=seconds
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Life Duration, flag=0x8000, lorv=28800
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Authentication Method, flag=0x8000, lorv=pre-shared key
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Hash Algorithm, flag=0x8000, lorv=MD5
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Group Description, flag=0x8000, lorv=1024-bit MODP group
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:338:get_ph1approvalx(): Compared: DB:Peer
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:339:get_ph1approvalx(): (lifetime = 3600:28800)
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:341:get_ph1approvalx(): (lifebyte = 0:0)
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:343:get_ph1approvalx(): enctype = 3DES-CBC:3DES-CBC
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:348:get_ph1approvalx(): (encklen = 0:0)
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:350:get_ph1approvalx(): hashtype = MD5:MD5
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:355:get_ph1approvalx(): authmethod = pre-shared key:pre-shared key
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:360:get_ph1approvalx(): dh_group = 768-bit MODP group:1024-bit MODP group
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Life Type, flag=0x8000, lorv=seconds
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Life Duration, flag=0x8000, lorv=28800
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Authentication Method, flag=0x8000, lorv=pre-shared key
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Hash Algorithm, flag=0x8000, lorv=MD5
2005-06-10 16:42:54: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Group Description, flag=0x8000, lorv=1024-bit MODP group
2005-06-10 16:42:54: ERROR: ipsec_doi.c:440:print_ph1mismatched(): rejected dh_group: DB(prop#1:trns#1):Peer(prop#1:trns#1) = 768-bit MODP group:1024-bit MODP group
2005-06-10 16:42:54: ERROR: ipsec_doi.c:243:get_ph1approval(): no suitable proposal found.
2005-06-10 16:42:54: ERROR: isakmp_ident.c:782:ident_r1recv(): failed to get valid proposal.
2005-06-10 16:42:54: ERROR: isakmp.c:913:isakmp_ph1begin_r(): failed to process packet.