Aug 24 15:03:40 vc2_TPC1 ipsec_starter[8734]: Starting strongSwan 4.5.2 IPsec [starter]... Aug 24 15:03:40 vc2_TPC1 pluto[8747]: Starting IKEv1 pluto daemon (strongSwan 4.5.2) THREADS SMARTCARD VENDORID Aug 24 15:03:40 vc2_TPC1 pluto[8747]: listening on interfaces: Aug 24 15:03:40 vc2_TPC1 pluto[8747]: eth2 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: 169.254.1.70 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: fe80::21f:29ff:fe69:70ae Aug 24 15:03:40 vc2_TPC1 pluto[8747]: ethvc2 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: 10.58.228.93 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: fe80::780d:c5ff:fe3f:3ddb Aug 24 15:03:40 vc2_TPC1 pluto[8747]: loaded plugins: test-vectors curl ldap aes des sha1 sha2 md5 random x509 pkcs1 pgp dnskey pem openssl gmp hmac xauth attr kernel-netlink resolve Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | inserting event EVENT_REINIT_SECRET, timeout in 3600 seconds Aug 24 15:03:40 vc2_TPC1 pluto[8747]: including NAT-Traversal patch (Version 0.6c) [disabled] Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | pkcs11 module '/usr/lib/opensc-pkcs11.so' loading... Aug 24 15:03:40 vc2_TPC1 pluto[8747]: failed to load pkcs11 module '/usr/lib/opensc-pkcs11.so' Aug 24 15:03:40 vc2_TPC1 ipsec_starter[8746]: pluto (8747) started after 20 ms Aug 24 15:03:40 vc2_TPC1 pluto[8747]: loading ca certificates from '/etc/ipsec.d/cacerts' Aug 24 15:03:40 vc2_TPC1 pluto[8747]: loaded ca certificate from '/etc/ipsec.d/cacerts/caCert.der' Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | authcert inserted Aug 24 15:03:40 vc2_TPC1 pluto[8747]: loading aa certificates from '/etc/ipsec.d/aacerts' Aug 24 15:03:40 vc2_TPC1 pluto[8747]: loading ocsp certificates from '/etc/ipsec.d/ocspcerts' Aug 24 15:03:40 vc2_TPC1 pluto[8747]: Changing to directory '/etc/ipsec.d/crls' Aug 24 15:03:40 vc2_TPC1 pluto[8747]: loading attribute certificates from '/etc/ipsec.d/acerts' Aug 24 15:03:40 vc2_TPC1 pluto[8747]: spawning 4 worker threads Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | inserting event EVENT_LOG_DAILY, timeout in 32180 seconds Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | next event EVENT_REINIT_SECRET in 3600 seconds Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | *received whack message Aug 24 15:03:40 vc2_TPC1 pluto[8747]: listening for IKE messages Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | found lo with address 127.0.0.1 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | found ethvc2 with address 10.58.228.93 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | found eth2 with address 169.254.1.70 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: adding interface eth2/eth2 169.254.1.70:500 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: adding interface ethvc2/ethvc2 10.58.228.93:500 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: adding interface lo/lo 127.0.0.1:500 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | found lo with address 0000:0000:0000:0000:0000:0000:0000:0001 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: adding interface lo/lo ::1:500 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: loading secrets from "/etc/ipsec.secrets" Aug 24 15:03:40 vc2_TPC1 pluto[8747]: "/etc/ipsec.secrets" line 9: file starts with indentation (continuation notation) Aug 24 15:03:40 vc2_TPC1 pluto[8747]: no secrets filename matched "/var/lib/strongswan/ipsec.secrets.inc" Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | next event EVENT_REINIT_SECRET in 3600 seconds Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | *received whack message Aug 24 15:03:40 vc2_TPC1 pluto[8747]: loaded CA certificate from '/etc/ipsec.d/cacerts/caCert.der' Aug 24 15:03:40 vc2_TPC1 pluto[8747]: added ca description "strongswan" Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | authname: 'C=CH, O=strongSwan, CN=strongSwan CA' Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | authkey: 1e:fc:6e:71:5e:90:8f:7a:7d:3e:44:6b:32:10:03:a6:13:8d:9f:fa Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | authcert is already present and identical Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | next event EVENT_REINIT_SECRET in 3600 seconds Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | *received whack message Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | from whack: got --esp=aes128-sha1,3des-sha1 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | esp proposal: AES_CBC_128/HMAC_SHA1, 3DES_CBC/HMAC_SHA1, Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | from whack: got --ike=aes128-sha1-modp2048,3des-sha1-modp1536 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | ike proposal: AES_CBC_128/HMAC_SHA1/MODP_2048, 3DES_CBC/HMAC_SHA1/MODP_1536, Aug 24 15:03:40 vc2_TPC1 pluto[8747]: loaded host certificate from '/etc/ipsec.d/certs/VC2Cert.der' Aug 24 15:03:40 vc2_TPC1 pluto[8747]: id '%any' not confirmed by certificate, defaulting to 'C=CH, O=strongSwan, CN=169.254.1.70' Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | certificate is valid Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | cert inserted Aug 24 15:03:40 vc2_TPC1 pluto[8747]: added connection description "kay2" Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | 169.254.1.0/24===169.254.1.70[C=CH, O=strongSwan, CN=169.254.1.70]...169.254.0.70[C=CH, O=strongSwan, CN=169.254.0.70]===169.254.0.0/24 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | ike_life: 10800s; ipsec_life: 3600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 3; policy: PUBKEY+ENCRYPT+TUNNEL+PFS Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | next event EVENT_REINIT_SECRET in 3600 seconds Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | *received whack message Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | creating state object #1 at 0x2116dc68 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | ICOOKIE: b0 22 8b 74 8a 9e 7f f2 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | RCOOKIE: 00 00 00 00 00 00 00 00 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | state hash entry 27 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | inserting event EVENT_SO_DISCARD, timeout in 0 seconds for #1 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | Queuing pending Quick Mode with 169.254.0.70 "kay2" Aug 24 15:03:40 vc2_TPC1 pluto[8747]: "kay2" #1: initiating Main Mode Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | ike proposal: AES_CBC_128/HMAC_SHA1/MODP_2048, 3DES_CBC/HMAC_SHA1/MODP_1536, Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #1 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 10 seconds for #1 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | *received 136 bytes from 169.254.0.70:500 on eth2 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | ICOOKIE: b0 22 8b 74 8a 9e 7f f2 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | RCOOKIE: 8a cc 2a 18 e0 6a 2d 44 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | state hash entry 20 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | state object not found Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | ICOOKIE: b0 22 8b 74 8a 9e 7f f2 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | RCOOKIE: 00 00 00 00 00 00 00 00 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | state hash entry 27 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | state object #1 found, in STATE_MAIN_I1 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: "kay2" #1: received Vendor ID payload [strongSwan] Aug 24 15:03:40 vc2_TPC1 pluto[8747]: "kay2" #1: received Vendor ID payload [XAUTH] Aug 24 15:03:40 vc2_TPC1 pluto[8747]: "kay2" #1: received Vendor ID payload [Dead Peer Detection] Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | ICOOKIE: b0 22 8b 74 8a 9e 7f f2 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | RCOOKIE: 00 00 00 00 00 00 00 00 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | state hash entry 27 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | ICOOKIE: b0 22 8b 74 8a 9e 7f f2 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | RCOOKIE: 8a cc 2a 18 e0 6a 2d 44 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | state hash entry 20 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #1 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 10 seconds for #1 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | *received 316 bytes from 169.254.0.70:500 on eth2 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | ICOOKIE: b0 22 8b 74 8a 9e 7f f2 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | RCOOKIE: 8a cc 2a 18 e0 6a 2d 44 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | state hash entry 20 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | state object #1 found, in STATE_MAIN_I2 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | requested CA: %any Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | our certificate policy is SEND_IF_ASKED Aug 24 15:03:40 vc2_TPC1 pluto[8747]: "kay2" #1: we have a cert and are sending it upon request Aug 24 15:03:40 vc2_TPC1 pluto[8747]: "kay2" #1: unable to locate my private key for signature Aug 24 15:03:40 vc2_TPC1 pluto[8747]: "kay2" #1: sending encrypted notification AUTHENTICATION_FAILED to 169.254.0.70:500 Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | state transition function for STATE_MAIN_I2 failed: AUTHENTICATION_FAILED Aug 24 15:03:40 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 10 seconds for #1 Aug 24 15:03:42 vc2_TPC1 pluto[8747]: | Aug 24 15:03:42 vc2_TPC1 pluto[8747]: | *received whack message Aug 24 15:03:42 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 8 seconds for #1 Aug 24 15:03:51 vc2_TPC1 pluto[8747]: | Aug 24 15:03:51 vc2_TPC1 pluto[8747]: | *received 316 bytes from 169.254.0.70:500 on eth2 Aug 24 15:03:51 vc2_TPC1 pluto[8747]: | ICOOKIE: b0 22 8b 74 8a 9e 7f f2 Aug 24 15:03:51 vc2_TPC1 pluto[8747]: | RCOOKIE: 8a cc 2a 18 e0 6a 2d 44 Aug 24 15:03:51 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:03:51 vc2_TPC1 pluto[8747]: | state hash entry 20 Aug 24 15:03:51 vc2_TPC1 pluto[8747]: | state object #1 found, in STATE_MAIN_I2 Aug 24 15:03:51 vc2_TPC1 pluto[8747]: | requested CA: %any Aug 24 15:03:51 vc2_TPC1 pluto[8747]: | our certificate policy is SEND_IF_ASKED Aug 24 15:03:51 vc2_TPC1 pluto[8747]: "kay2" #1: we have a cert and are sending it upon request Aug 24 15:03:51 vc2_TPC1 pluto[8747]: "kay2" #1: unable to locate my private key for signature Aug 24 15:03:51 vc2_TPC1 pluto[8747]: "kay2" #1: sending encrypted notification AUTHENTICATION_FAILED to 169.254.0.70:500 Aug 24 15:03:51 vc2_TPC1 pluto[8747]: | state transition function for STATE_MAIN_I2 failed: AUTHENTICATION_FAILED Aug 24 15:03:51 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in -1 seconds for #1 Aug 24 15:03:51 vc2_TPC1 pluto[8747]: | Aug 24 15:03:51 vc2_TPC1 pluto[8747]: | *time to handle event Aug 24 15:03:51 vc2_TPC1 pluto[8747]: | event after this is EVENT_REINIT_SECRET in 3589 seconds Aug 24 15:03:51 vc2_TPC1 pluto[8747]: | handling event EVENT_RETRANSMIT for 169.254.0.70 "kay2" #1 Aug 24 15:03:51 vc2_TPC1 pluto[8747]: | inserting event EVENT_RETRANSMIT, timeout in 20 seconds for #1 Aug 24 15:03:51 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 20 seconds for #1 Aug 24 15:04:11 vc2_TPC1 pluto[8747]: | Aug 24 15:04:11 vc2_TPC1 pluto[8747]: | *time to handle event Aug 24 15:04:11 vc2_TPC1 pluto[8747]: | event after this is EVENT_REINIT_SECRET in 3569 seconds Aug 24 15:04:11 vc2_TPC1 pluto[8747]: | handling event EVENT_RETRANSMIT for 169.254.0.70 "kay2" #1 Aug 24 15:04:11 vc2_TPC1 pluto[8747]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #1 Aug 24 15:04:11 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 40 seconds for #1 Aug 24 15:04:11 vc2_TPC1 pluto[8747]: | Aug 24 15:04:11 vc2_TPC1 pluto[8747]: | *received 316 bytes from 169.254.0.70:500 on eth2 Aug 24 15:04:11 vc2_TPC1 pluto[8747]: | ICOOKIE: b0 22 8b 74 8a 9e 7f f2 Aug 24 15:04:11 vc2_TPC1 pluto[8747]: | RCOOKIE: 8a cc 2a 18 e0 6a 2d 44 Aug 24 15:04:11 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:04:11 vc2_TPC1 pluto[8747]: | state hash entry 20 Aug 24 15:04:11 vc2_TPC1 pluto[8747]: | state object #1 found, in STATE_MAIN_I2 Aug 24 15:04:11 vc2_TPC1 pluto[8747]: | requested CA: %any Aug 24 15:04:11 vc2_TPC1 pluto[8747]: | our certificate policy is SEND_IF_ASKED Aug 24 15:04:11 vc2_TPC1 pluto[8747]: "kay2" #1: we have a cert and are sending it upon request Aug 24 15:04:11 vc2_TPC1 pluto[8747]: "kay2" #1: unable to locate my private key for signature Aug 24 15:04:11 vc2_TPC1 pluto[8747]: "kay2" #1: sending encrypted notification AUTHENTICATION_FAILED to 169.254.0.70:500 Aug 24 15:04:11 vc2_TPC1 pluto[8747]: | state transition function for STATE_MAIN_I2 failed: AUTHENTICATION_FAILED Aug 24 15:04:11 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 40 seconds for #1 Aug 24 15:04:12 vc2_TPC1 pluto[8747]: | Aug 24 15:04:12 vc2_TPC1 pluto[8747]: | *received 168 bytes from 169.254.0.70:500 on eth2 Aug 24 15:04:12 vc2_TPC1 pluto[8747]: packet from 169.254.0.70:500: received Vendor ID payload [strongSwan] Aug 24 15:04:12 vc2_TPC1 pluto[8747]: packet from 169.254.0.70:500: received Vendor ID payload [XAUTH] Aug 24 15:04:12 vc2_TPC1 pluto[8747]: packet from 169.254.0.70:500: received Vendor ID payload [Dead Peer Detection] Aug 24 15:04:12 vc2_TPC1 pluto[8747]: | preparse_isakmp_policy: peer requests PUBKEY authentication Aug 24 15:04:12 vc2_TPC1 pluto[8747]: | creating state object #2 at 0x211707b0 Aug 24 15:04:12 vc2_TPC1 pluto[8747]: | ICOOKIE: fb ba ab fe b9 af 67 9f Aug 24 15:04:12 vc2_TPC1 pluto[8747]: | RCOOKIE: f3 1e f9 21 b4 e7 b9 38 Aug 24 15:04:12 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:04:12 vc2_TPC1 pluto[8747]: | state hash entry 6 Aug 24 15:04:12 vc2_TPC1 pluto[8747]: | inserting event EVENT_SO_DISCARD, timeout in 0 seconds for #2 Aug 24 15:04:12 vc2_TPC1 pluto[8747]: "kay2" #2: responding to Main Mode Aug 24 15:04:12 vc2_TPC1 pluto[8747]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #2 Aug 24 15:04:12 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 10 seconds for #2 Aug 24 15:04:13 vc2_TPC1 pluto[8747]: | Aug 24 15:04:13 vc2_TPC1 pluto[8747]: | *received 308 bytes from 169.254.0.70:500 on eth2 Aug 24 15:04:13 vc2_TPC1 pluto[8747]: | ICOOKIE: fb ba ab fe b9 af 67 9f Aug 24 15:04:13 vc2_TPC1 pluto[8747]: | RCOOKIE: f3 1e f9 21 b4 e7 b9 38 Aug 24 15:04:13 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:04:13 vc2_TPC1 pluto[8747]: | state hash entry 6 Aug 24 15:04:13 vc2_TPC1 pluto[8747]: | state object #2 found, in STATE_MAIN_R1 Aug 24 15:04:13 vc2_TPC1 pluto[8747]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #2 Aug 24 15:04:13 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 10 seconds for #2 Aug 24 15:04:13 vc2_TPC1 pluto[8747]: | Aug 24 15:04:13 vc2_TPC1 pluto[8747]: | *received 76 bytes from 169.254.0.70:500 on eth2 Aug 24 15:04:13 vc2_TPC1 pluto[8747]: | ICOOKIE: fb ba ab fe b9 af 67 9f Aug 24 15:04:13 vc2_TPC1 pluto[8747]: | RCOOKIE: f3 1e f9 21 b4 e7 b9 38 Aug 24 15:04:13 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:04:13 vc2_TPC1 pluto[8747]: | state hash entry 6 Aug 24 15:04:13 vc2_TPC1 pluto[8747]: | state object #2 found, in STATE_MAIN_R2 Aug 24 15:04:13 vc2_TPC1 pluto[8747]: "kay2" #2: ignoring informational payload, type AUTHENTICATION_FAILED Aug 24 15:04:13 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 10 seconds for #2 Aug 24 15:04:23 vc2_TPC1 pluto[8747]: | Aug 24 15:04:23 vc2_TPC1 pluto[8747]: | *time to handle event Aug 24 15:04:23 vc2_TPC1 pluto[8747]: | event after this is EVENT_RETRANSMIT in 28 seconds Aug 24 15:04:23 vc2_TPC1 pluto[8747]: | handling event EVENT_RETRANSMIT for 169.254.0.70 "kay2" #2 Aug 24 15:04:23 vc2_TPC1 pluto[8747]: | inserting event EVENT_RETRANSMIT, timeout in 20 seconds for #2 Aug 24 15:04:23 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 20 seconds for #2 Aug 24 15:04:23 vc2_TPC1 pluto[8747]: | Aug 24 15:04:23 vc2_TPC1 pluto[8747]: | *received 308 bytes from 169.254.0.70:500 on eth2 Aug 24 15:04:23 vc2_TPC1 pluto[8747]: | ICOOKIE: fb ba ab fe b9 af 67 9f Aug 24 15:04:23 vc2_TPC1 pluto[8747]: | RCOOKIE: f3 1e f9 21 b4 e7 b9 38 Aug 24 15:04:23 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:04:23 vc2_TPC1 pluto[8747]: | state hash entry 6 Aug 24 15:04:23 vc2_TPC1 pluto[8747]: | state object #2 found, in STATE_MAIN_R2 Aug 24 15:04:23 vc2_TPC1 pluto[8747]: "kay2" #2: discarding duplicate packet; already STATE_MAIN_R2 Aug 24 15:04:23 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 20 seconds for #2 Aug 24 15:04:23 vc2_TPC1 pluto[8747]: | Aug 24 15:04:23 vc2_TPC1 pluto[8747]: | *received 76 bytes from 169.254.0.70:500 on eth2 Aug 24 15:04:23 vc2_TPC1 pluto[8747]: | ICOOKIE: fb ba ab fe b9 af 67 9f Aug 24 15:04:23 vc2_TPC1 pluto[8747]: | RCOOKIE: f3 1e f9 21 b4 e7 b9 38 Aug 24 15:04:23 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:04:23 vc2_TPC1 pluto[8747]: | state hash entry 6 Aug 24 15:04:23 vc2_TPC1 pluto[8747]: | state object #2 found, in STATE_MAIN_R2 Aug 24 15:04:23 vc2_TPC1 pluto[8747]: "kay2" #2: next payload type of ISAKMP Hash Payload has an unknown value: 118 Aug 24 15:04:23 vc2_TPC1 pluto[8747]: "kay2" #2: malformed payload in packet Aug 24 15:04:23 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 20 seconds for #2 Aug 24 15:04:37 vc2_TPC1 pluto[8747]: | Aug 24 15:04:37 vc2_TPC1 pluto[8747]: | *received whack message Aug 24 15:04:37 vc2_TPC1 pluto[8747]: | Queuing pending Quick Mode with 169.254.0.70 "kay2" already done Aug 24 15:04:37 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 6 seconds for #2 Aug 24 15:04:43 vc2_TPC1 pluto[8747]: | Aug 24 15:04:43 vc2_TPC1 pluto[8747]: | *time to handle event Aug 24 15:04:43 vc2_TPC1 pluto[8747]: | event after this is EVENT_RETRANSMIT in 8 seconds Aug 24 15:04:43 vc2_TPC1 pluto[8747]: | handling event EVENT_RETRANSMIT for 169.254.0.70 "kay2" #2 Aug 24 15:04:43 vc2_TPC1 pluto[8747]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #2 Aug 24 15:04:43 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 8 seconds for #1 Aug 24 15:04:43 vc2_TPC1 pluto[8747]: | Aug 24 15:04:43 vc2_TPC1 pluto[8747]: | *received 76 bytes from 169.254.0.70:500 on eth2 Aug 24 15:04:43 vc2_TPC1 pluto[8747]: | ICOOKIE: fb ba ab fe b9 af 67 9f Aug 24 15:04:43 vc2_TPC1 pluto[8747]: | RCOOKIE: f3 1e f9 21 b4 e7 b9 38 Aug 24 15:04:43 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:04:43 vc2_TPC1 pluto[8747]: | state hash entry 6 Aug 24 15:04:43 vc2_TPC1 pluto[8747]: | state object #2 found, in STATE_MAIN_R2 Aug 24 15:04:43 vc2_TPC1 pluto[8747]: "kay2" #2: next payload type of ISAKMP Hash Payload has an unknown value: 116 Aug 24 15:04:43 vc2_TPC1 pluto[8747]: "kay2" #2: malformed payload in packet Aug 24 15:04:43 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 8 seconds for #1 Aug 24 15:04:43 vc2_TPC1 pluto[8747]: | Aug 24 15:04:43 vc2_TPC1 pluto[8747]: | *received 308 bytes from 169.254.0.70:500 on eth2 Aug 24 15:04:43 vc2_TPC1 pluto[8747]: | ICOOKIE: fb ba ab fe b9 af 67 9f Aug 24 15:04:43 vc2_TPC1 pluto[8747]: | RCOOKIE: f3 1e f9 21 b4 e7 b9 38 Aug 24 15:04:43 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:04:43 vc2_TPC1 pluto[8747]: | state hash entry 6 Aug 24 15:04:43 vc2_TPC1 pluto[8747]: | state object #2 found, in STATE_MAIN_R2 Aug 24 15:04:43 vc2_TPC1 pluto[8747]: "kay2" #2: discarding duplicate packet; already STATE_MAIN_R2 Aug 24 15:04:43 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 8 seconds for #1 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | *time to handle event Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | event after this is EVENT_RETRANSMIT in 32 seconds Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | handling event EVENT_RETRANSMIT for 169.254.0.70 "kay2" #1 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: "kay2" #1: max number of retransmissions (2) reached STATE_MAIN_I2 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: "kay2" #1: starting keying attempt 2 of at most 3 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | creating state object #3 at 0x21171d40 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | ICOOKIE: b5 97 d1 fc 98 49 66 d3 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | RCOOKIE: 00 00 00 00 00 00 00 00 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | state hash entry 4 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | inserting event EVENT_SO_DISCARD, timeout in 0 seconds for #3 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: "kay2" #3: initiating Main Mode to replace #1 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | ike proposal: AES_CBC_128/HMAC_SHA1/MODP_2048, 3DES_CBC/HMAC_SHA1/MODP_1536, Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #3 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | ICOOKIE: b0 22 8b 74 8a 9e 7f f2 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | RCOOKIE: 8a cc 2a 18 e0 6a 2d 44 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | state hash entry 20 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 10 seconds for #3 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | *received 136 bytes from 169.254.0.70:500 on eth2 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | ICOOKIE: b5 97 d1 fc 98 49 66 d3 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | RCOOKIE: ce 4c 5c 42 4f a2 51 99 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | state hash entry 19 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | state object not found Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | ICOOKIE: b5 97 d1 fc 98 49 66 d3 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | RCOOKIE: 00 00 00 00 00 00 00 00 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | state hash entry 4 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | state object #3 found, in STATE_MAIN_I1 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: "kay2" #3: received Vendor ID payload [strongSwan] Aug 24 15:04:51 vc2_TPC1 pluto[8747]: "kay2" #3: received Vendor ID payload [XAUTH] Aug 24 15:04:51 vc2_TPC1 pluto[8747]: "kay2" #3: received Vendor ID payload [Dead Peer Detection] Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | ICOOKIE: b5 97 d1 fc 98 49 66 d3 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | RCOOKIE: 00 00 00 00 00 00 00 00 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | state hash entry 4 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | ICOOKIE: b5 97 d1 fc 98 49 66 d3 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | RCOOKIE: ce 4c 5c 42 4f a2 51 99 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | state hash entry 19 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #3 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 10 seconds for #3 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | *received 316 bytes from 169.254.0.70:500 on eth2 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | ICOOKIE: b5 97 d1 fc 98 49 66 d3 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | RCOOKIE: ce 4c 5c 42 4f a2 51 99 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | state hash entry 19 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | state object #3 found, in STATE_MAIN_I2 Aug 24 15:04:51 vc2_TPC1 pluto[8747]: | requested CA: %any Aug 24 15:04:52 vc2_TPC1 pluto[8747]: | our certificate policy is SEND_IF_ASKED Aug 24 15:04:52 vc2_TPC1 pluto[8747]: "kay2" #3: we have a cert and are sending it upon request Aug 24 15:04:52 vc2_TPC1 pluto[8747]: "kay2" #3: unable to locate my private key for signature Aug 24 15:04:52 vc2_TPC1 pluto[8747]: "kay2" #3: sending encrypted notification AUTHENTICATION_FAILED to 169.254.0.70:500 Aug 24 15:04:52 vc2_TPC1 pluto[8747]: | state transition function for STATE_MAIN_I2 failed: AUTHENTICATION_FAILED Aug 24 15:04:52 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 9 seconds for #3 Aug 24 15:05:01 vc2_TPC1 pluto[8747]: | Aug 24 15:05:01 vc2_TPC1 pluto[8747]: | *time to handle event Aug 24 15:05:01 vc2_TPC1 pluto[8747]: | event after this is EVENT_RETRANSMIT in 22 seconds Aug 24 15:05:01 vc2_TPC1 pluto[8747]: | handling event EVENT_RETRANSMIT for 169.254.0.70 "kay2" #3 Aug 24 15:05:01 vc2_TPC1 pluto[8747]: | inserting event EVENT_RETRANSMIT, timeout in 20 seconds for #3 Aug 24 15:05:01 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 20 seconds for #3 Aug 24 15:05:01 vc2_TPC1 pluto[8747]: | Aug 24 15:05:01 vc2_TPC1 pluto[8747]: | *received 316 bytes from 169.254.0.70:500 on eth2 Aug 24 15:05:01 vc2_TPC1 pluto[8747]: | ICOOKIE: b5 97 d1 fc 98 49 66 d3 Aug 24 15:05:01 vc2_TPC1 pluto[8747]: | RCOOKIE: ce 4c 5c 42 4f a2 51 99 Aug 24 15:05:01 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:05:01 vc2_TPC1 pluto[8747]: | state hash entry 19 Aug 24 15:05:01 vc2_TPC1 pluto[8747]: | state object #3 found, in STATE_MAIN_I2 Aug 24 15:05:01 vc2_TPC1 pluto[8747]: | requested CA: %any Aug 24 15:05:01 vc2_TPC1 pluto[8747]: | our certificate policy is SEND_IF_ASKED Aug 24 15:05:01 vc2_TPC1 pluto[8747]: "kay2" #3: we have a cert and are sending it upon request Aug 24 15:05:01 vc2_TPC1 pluto[8747]: "kay2" #3: unable to locate my private key for signature Aug 24 15:05:01 vc2_TPC1 pluto[8747]: "kay2" #3: sending encrypted notification AUTHENTICATION_FAILED to 169.254.0.70:500 Aug 24 15:05:01 vc2_TPC1 pluto[8747]: | state transition function for STATE_MAIN_I2 failed: AUTHENTICATION_FAILED Aug 24 15:05:01 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 20 seconds for #3 Aug 24 15:05:21 vc2_TPC1 pluto[8747]: | Aug 24 15:05:21 vc2_TPC1 pluto[8747]: | *time to handle event Aug 24 15:05:21 vc2_TPC1 pluto[8747]: | event after this is EVENT_RETRANSMIT in 2 seconds Aug 24 15:05:21 vc2_TPC1 pluto[8747]: | handling event EVENT_RETRANSMIT for 169.254.0.70 "kay2" #3 Aug 24 15:05:21 vc2_TPC1 pluto[8747]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #3 Aug 24 15:05:21 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 2 seconds for #2 Aug 24 15:05:21 vc2_TPC1 pluto[8747]: | Aug 24 15:05:21 vc2_TPC1 pluto[8747]: | *received 316 bytes from 169.254.0.70:500 on eth2 Aug 24 15:05:21 vc2_TPC1 pluto[8747]: | ICOOKIE: b5 97 d1 fc 98 49 66 d3 Aug 24 15:05:21 vc2_TPC1 pluto[8747]: | RCOOKIE: ce 4c 5c 42 4f a2 51 99 Aug 24 15:05:21 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:05:21 vc2_TPC1 pluto[8747]: | state hash entry 19 Aug 24 15:05:21 vc2_TPC1 pluto[8747]: | state object #3 found, in STATE_MAIN_I2 Aug 24 15:05:21 vc2_TPC1 pluto[8747]: | requested CA: %any Aug 24 15:05:21 vc2_TPC1 pluto[8747]: | our certificate policy is SEND_IF_ASKED Aug 24 15:05:21 vc2_TPC1 pluto[8747]: "kay2" #3: we have a cert and are sending it upon request Aug 24 15:05:21 vc2_TPC1 pluto[8747]: "kay2" #3: unable to locate my private key for signature Aug 24 15:05:21 vc2_TPC1 pluto[8747]: "kay2" #3: sending encrypted notification AUTHENTICATION_FAILED to 169.254.0.70:500 Aug 24 15:05:21 vc2_TPC1 pluto[8747]: | state transition function for STATE_MAIN_I2 failed: AUTHENTICATION_FAILED Aug 24 15:05:21 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 2 seconds for #2 Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | *time to handle event Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | event after this is EVENT_RETRANSMIT in 38 seconds Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | handling event EVENT_RETRANSMIT for 169.254.0.70 "kay2" #2 Aug 24 15:05:23 vc2_TPC1 pluto[8747]: "kay2" #2: max number of retransmissions (2) reached STATE_MAIN_R2 Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | ICOOKIE: fb ba ab fe b9 af 67 9f Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | RCOOKIE: f3 1e f9 21 b4 e7 b9 38 Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | state hash entry 6 Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 38 seconds for #3 Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | *received 168 bytes from 169.254.0.70:500 on eth2 Aug 24 15:05:23 vc2_TPC1 pluto[8747]: packet from 169.254.0.70:500: received Vendor ID payload [strongSwan] Aug 24 15:05:23 vc2_TPC1 pluto[8747]: packet from 169.254.0.70:500: received Vendor ID payload [XAUTH] Aug 24 15:05:23 vc2_TPC1 pluto[8747]: packet from 169.254.0.70:500: received Vendor ID payload [Dead Peer Detection] Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | preparse_isakmp_policy: peer requests PUBKEY authentication Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | creating state object #4 at 0x21171168 Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | ICOOKIE: 60 46 63 a9 6d 05 2b 7c Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | RCOOKIE: 86 81 e8 a4 2b f2 f2 41 Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | state hash entry 11 Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | inserting event EVENT_SO_DISCARD, timeout in 0 seconds for #4 Aug 24 15:05:23 vc2_TPC1 pluto[8747]: "kay2" #4: responding to Main Mode Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #4 Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 10 seconds for #4 Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | *received 308 bytes from 169.254.0.70:500 on eth2 Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | ICOOKIE: 60 46 63 a9 6d 05 2b 7c Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | RCOOKIE: 86 81 e8 a4 2b f2 f2 41 Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | state hash entry 11 Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | state object #4 found, in STATE_MAIN_R1 Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #4 Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 10 seconds for #4 Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | *received 76 bytes from 169.254.0.70:500 on eth2 Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | ICOOKIE: 60 46 63 a9 6d 05 2b 7c Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | RCOOKIE: 86 81 e8 a4 2b f2 f2 41 Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | state hash entry 11 Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | state object #4 found, in STATE_MAIN_R2 Aug 24 15:05:23 vc2_TPC1 pluto[8747]: "kay2" #4: ignoring informational payload, type AUTHENTICATION_FAILED Aug 24 15:05:23 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 10 seconds for #4 Aug 24 15:05:33 vc2_TPC1 pluto[8747]: | Aug 24 15:05:33 vc2_TPC1 pluto[8747]: | *time to handle event Aug 24 15:05:33 vc2_TPC1 pluto[8747]: | event after this is EVENT_RETRANSMIT in 28 seconds Aug 24 15:05:33 vc2_TPC1 pluto[8747]: | handling event EVENT_RETRANSMIT for 169.254.0.70 "kay2" #4 Aug 24 15:05:33 vc2_TPC1 pluto[8747]: | inserting event EVENT_RETRANSMIT, timeout in 20 seconds for #4 Aug 24 15:05:33 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 20 seconds for #4 Aug 24 15:05:33 vc2_TPC1 pluto[8747]: | Aug 24 15:05:33 vc2_TPC1 pluto[8747]: | *received 308 bytes from 169.254.0.70:500 on eth2 Aug 24 15:05:33 vc2_TPC1 pluto[8747]: | ICOOKIE: 60 46 63 a9 6d 05 2b 7c Aug 24 15:05:33 vc2_TPC1 pluto[8747]: | RCOOKIE: 86 81 e8 a4 2b f2 f2 41 Aug 24 15:05:33 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:05:33 vc2_TPC1 pluto[8747]: | state hash entry 11 Aug 24 15:05:33 vc2_TPC1 pluto[8747]: | state object #4 found, in STATE_MAIN_R2 Aug 24 15:05:33 vc2_TPC1 pluto[8747]: "kay2" #4: discarding duplicate packet; already STATE_MAIN_R2 Aug 24 15:05:33 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 20 seconds for #4 Aug 24 15:05:34 vc2_TPC1 pluto[8747]: | Aug 24 15:05:34 vc2_TPC1 pluto[8747]: | *received 76 bytes from 169.254.0.70:500 on eth2 Aug 24 15:05:34 vc2_TPC1 pluto[8747]: | ICOOKIE: 60 46 63 a9 6d 05 2b 7c Aug 24 15:05:34 vc2_TPC1 pluto[8747]: | RCOOKIE: 86 81 e8 a4 2b f2 f2 41 Aug 24 15:05:34 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:05:34 vc2_TPC1 pluto[8747]: | state hash entry 11 Aug 24 15:05:34 vc2_TPC1 pluto[8747]: | state object #4 found, in STATE_MAIN_R2 Aug 24 15:05:34 vc2_TPC1 pluto[8747]: "kay2" #4: next payload type of ISAKMP Hash Payload has an unknown value: 197 Aug 24 15:05:34 vc2_TPC1 pluto[8747]: "kay2" #4: malformed payload in packet Aug 24 15:05:34 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 19 seconds for #4 Aug 24 15:05:53 vc2_TPC1 pluto[8747]: | Aug 24 15:05:53 vc2_TPC1 pluto[8747]: | *received 308 bytes from 169.254.0.70:500 on eth2 Aug 24 15:05:53 vc2_TPC1 pluto[8747]: | ICOOKIE: 60 46 63 a9 6d 05 2b 7c Aug 24 15:05:53 vc2_TPC1 pluto[8747]: | RCOOKIE: 86 81 e8 a4 2b f2 f2 41 Aug 24 15:05:53 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:05:53 vc2_TPC1 pluto[8747]: | state hash entry 11 Aug 24 15:05:53 vc2_TPC1 pluto[8747]: | state object #4 found, in STATE_MAIN_R2 Aug 24 15:05:53 vc2_TPC1 pluto[8747]: "kay2" #4: discarding duplicate packet; already STATE_MAIN_R2 Aug 24 15:05:53 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 0 seconds for #4 Aug 24 15:05:53 vc2_TPC1 pluto[8747]: | Aug 24 15:05:53 vc2_TPC1 pluto[8747]: | *time to handle event Aug 24 15:05:53 vc2_TPC1 pluto[8747]: | event after this is EVENT_RETRANSMIT in 8 seconds Aug 24 15:05:53 vc2_TPC1 pluto[8747]: | handling event EVENT_RETRANSMIT for 169.254.0.70 "kay2" #4 Aug 24 15:05:53 vc2_TPC1 pluto[8747]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #4 Aug 24 15:05:53 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 8 seconds for #3 Aug 24 15:05:53 vc2_TPC1 pluto[8747]: | Aug 24 15:05:53 vc2_TPC1 pluto[8747]: | *received 76 bytes from 169.254.0.70:500 on eth2 Aug 24 15:05:53 vc2_TPC1 pluto[8747]: | ICOOKIE: 60 46 63 a9 6d 05 2b 7c Aug 24 15:05:53 vc2_TPC1 pluto[8747]: | RCOOKIE: 86 81 e8 a4 2b f2 f2 41 Aug 24 15:05:53 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:05:53 vc2_TPC1 pluto[8747]: | state hash entry 11 Aug 24 15:05:53 vc2_TPC1 pluto[8747]: | state object #4 found, in STATE_MAIN_R2 Aug 24 15:05:53 vc2_TPC1 pluto[8747]: "kay2" #4: next payload type of ISAKMP Hash Payload has an unknown value: 166 Aug 24 15:05:53 vc2_TPC1 pluto[8747]: "kay2" #4: malformed payload in packet Aug 24 15:05:53 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 8 seconds for #3 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | *time to handle event Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | event after this is EVENT_RETRANSMIT in 32 seconds Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | handling event EVENT_RETRANSMIT for 169.254.0.70 "kay2" #3 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: "kay2" #3: max number of retransmissions (2) reached STATE_MAIN_I2 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: "kay2" #3: starting keying attempt 3 of at most 3 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | creating state object #5 at 0x21171fe0 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | ICOOKIE: 94 9b bb 79 ed 4c d6 68 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | RCOOKIE: 00 00 00 00 00 00 00 00 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | state hash entry 31 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | inserting event EVENT_SO_DISCARD, timeout in 0 seconds for #5 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: "kay2" #5: initiating Main Mode to replace #3 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | ike proposal: AES_CBC_128/HMAC_SHA1/MODP_2048, 3DES_CBC/HMAC_SHA1/MODP_1536, Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #5 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | ICOOKIE: b5 97 d1 fc 98 49 66 d3 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | RCOOKIE: ce 4c 5c 42 4f a2 51 99 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | state hash entry 19 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 10 seconds for #5 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | *received 136 bytes from 169.254.0.70:500 on eth2 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | ICOOKIE: 94 9b bb 79 ed 4c d6 68 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | RCOOKIE: a5 1a 25 9c 4d f6 f0 1a Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | state hash entry 22 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | state object not found Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | ICOOKIE: 94 9b bb 79 ed 4c d6 68 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | RCOOKIE: 00 00 00 00 00 00 00 00 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | state hash entry 31 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | state object #5 found, in STATE_MAIN_I1 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: "kay2" #5: received Vendor ID payload [strongSwan] Aug 24 15:06:01 vc2_TPC1 pluto[8747]: "kay2" #5: received Vendor ID payload [XAUTH] Aug 24 15:06:01 vc2_TPC1 pluto[8747]: "kay2" #5: received Vendor ID payload [Dead Peer Detection] Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | ICOOKIE: 94 9b bb 79 ed 4c d6 68 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | RCOOKIE: 00 00 00 00 00 00 00 00 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | state hash entry 31 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | ICOOKIE: 94 9b bb 79 ed 4c d6 68 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | RCOOKIE: a5 1a 25 9c 4d f6 f0 1a Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | state hash entry 22 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #5 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 10 seconds for #5 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | *received 316 bytes from 169.254.0.70:500 on eth2 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | ICOOKIE: 94 9b bb 79 ed 4c d6 68 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | RCOOKIE: a5 1a 25 9c 4d f6 f0 1a Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | state hash entry 22 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | state object #5 found, in STATE_MAIN_I2 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | requested CA: %any Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | our certificate policy is SEND_IF_ASKED Aug 24 15:06:01 vc2_TPC1 pluto[8747]: "kay2" #5: we have a cert and are sending it upon request Aug 24 15:06:01 vc2_TPC1 pluto[8747]: "kay2" #5: unable to locate my private key for signature Aug 24 15:06:01 vc2_TPC1 pluto[8747]: "kay2" #5: sending encrypted notification AUTHENTICATION_FAILED to 169.254.0.70:500 Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | state transition function for STATE_MAIN_I2 failed: AUTHENTICATION_FAILED Aug 24 15:06:01 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 10 seconds for #5 Aug 24 15:06:11 vc2_TPC1 pluto[8747]: | Aug 24 15:06:11 vc2_TPC1 pluto[8747]: | *time to handle event Aug 24 15:06:11 vc2_TPC1 pluto[8747]: | event after this is EVENT_RETRANSMIT in 22 seconds Aug 24 15:06:11 vc2_TPC1 pluto[8747]: | handling event EVENT_RETRANSMIT for 169.254.0.70 "kay2" #5 Aug 24 15:06:11 vc2_TPC1 pluto[8747]: | inserting event EVENT_RETRANSMIT, timeout in 20 seconds for #5 Aug 24 15:06:11 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 20 seconds for #5 Aug 24 15:06:11 vc2_TPC1 pluto[8747]: | Aug 24 15:06:11 vc2_TPC1 pluto[8747]: | *received 316 bytes from 169.254.0.70:500 on eth2 Aug 24 15:06:11 vc2_TPC1 pluto[8747]: | ICOOKIE: 94 9b bb 79 ed 4c d6 68 Aug 24 15:06:11 vc2_TPC1 pluto[8747]: | RCOOKIE: a5 1a 25 9c 4d f6 f0 1a Aug 24 15:06:11 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:06:11 vc2_TPC1 pluto[8747]: | state hash entry 22 Aug 24 15:06:11 vc2_TPC1 pluto[8747]: | state object #5 found, in STATE_MAIN_I2 Aug 24 15:06:11 vc2_TPC1 pluto[8747]: | requested CA: %any Aug 24 15:06:12 vc2_TPC1 pluto[8747]: | our certificate policy is SEND_IF_ASKED Aug 24 15:06:12 vc2_TPC1 pluto[8747]: "kay2" #5: we have a cert and are sending it upon request Aug 24 15:06:12 vc2_TPC1 pluto[8747]: "kay2" #5: unable to locate my private key for signature Aug 24 15:06:12 vc2_TPC1 pluto[8747]: "kay2" #5: sending encrypted notification AUTHENTICATION_FAILED to 169.254.0.70:500 Aug 24 15:06:12 vc2_TPC1 pluto[8747]: | state transition function for STATE_MAIN_I2 failed: AUTHENTICATION_FAILED Aug 24 15:06:12 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 19 seconds for #5 Aug 24 15:06:31 vc2_TPC1 pluto[8747]: | Aug 24 15:06:31 vc2_TPC1 pluto[8747]: | *time to handle event Aug 24 15:06:31 vc2_TPC1 pluto[8747]: | event after this is EVENT_RETRANSMIT in 2 seconds Aug 24 15:06:31 vc2_TPC1 pluto[8747]: | handling event EVENT_RETRANSMIT for 169.254.0.70 "kay2" #5 Aug 24 15:06:31 vc2_TPC1 pluto[8747]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #5 Aug 24 15:06:31 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 2 seconds for #4 Aug 24 15:06:31 vc2_TPC1 pluto[8747]: | Aug 24 15:06:31 vc2_TPC1 pluto[8747]: | *received 316 bytes from 169.254.0.70:500 on eth2 Aug 24 15:06:31 vc2_TPC1 pluto[8747]: | ICOOKIE: 94 9b bb 79 ed 4c d6 68 Aug 24 15:06:31 vc2_TPC1 pluto[8747]: | RCOOKIE: a5 1a 25 9c 4d f6 f0 1a Aug 24 15:06:31 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:06:31 vc2_TPC1 pluto[8747]: | state hash entry 22 Aug 24 15:06:31 vc2_TPC1 pluto[8747]: | state object #5 found, in STATE_MAIN_I2 Aug 24 15:06:31 vc2_TPC1 pluto[8747]: | requested CA: %any Aug 24 15:06:31 vc2_TPC1 pluto[8747]: | our certificate policy is SEND_IF_ASKED Aug 24 15:06:31 vc2_TPC1 pluto[8747]: "kay2" #5: we have a cert and are sending it upon request Aug 24 15:06:31 vc2_TPC1 pluto[8747]: "kay2" #5: unable to locate my private key for signature Aug 24 15:06:31 vc2_TPC1 pluto[8747]: "kay2" #5: sending encrypted notification AUTHENTICATION_FAILED to 169.254.0.70:500 Aug 24 15:06:31 vc2_TPC1 pluto[8747]: | state transition function for STATE_MAIN_I2 failed: AUTHENTICATION_FAILED Aug 24 15:06:31 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 2 seconds for #4 Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | *time to handle event Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | event after this is EVENT_RETRANSMIT in 38 seconds Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | handling event EVENT_RETRANSMIT for 169.254.0.70 "kay2" #4 Aug 24 15:06:33 vc2_TPC1 pluto[8747]: "kay2" #4: max number of retransmissions (2) reached STATE_MAIN_R2 Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | ICOOKIE: 60 46 63 a9 6d 05 2b 7c Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | RCOOKIE: 86 81 e8 a4 2b f2 f2 41 Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | state hash entry 11 Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 38 seconds for #5 Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | *received 168 bytes from 169.254.0.70:500 on eth2 Aug 24 15:06:33 vc2_TPC1 pluto[8747]: packet from 169.254.0.70:500: received Vendor ID payload [strongSwan] Aug 24 15:06:33 vc2_TPC1 pluto[8747]: packet from 169.254.0.70:500: received Vendor ID payload [XAUTH] Aug 24 15:06:33 vc2_TPC1 pluto[8747]: packet from 169.254.0.70:500: received Vendor ID payload [Dead Peer Detection] Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | preparse_isakmp_policy: peer requests PUBKEY authentication Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | creating state object #6 at 0x2116ff48 Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | ICOOKIE: bf 56 f6 40 b6 9a 78 49 Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | RCOOKIE: c1 85 56 a6 62 e9 0c c0 Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | state hash entry 14 Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | inserting event EVENT_SO_DISCARD, timeout in 0 seconds for #6 Aug 24 15:06:33 vc2_TPC1 pluto[8747]: "kay2" #6: responding to Main Mode Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #6 Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 10 seconds for #6 Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | *received 308 bytes from 169.254.0.70:500 on eth2 Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | ICOOKIE: bf 56 f6 40 b6 9a 78 49 Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | RCOOKIE: c1 85 56 a6 62 e9 0c c0 Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | state hash entry 14 Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | state object #6 found, in STATE_MAIN_R1 Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #6 Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 10 seconds for #6 Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | *received 76 bytes from 169.254.0.70:500 on eth2 Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | ICOOKIE: bf 56 f6 40 b6 9a 78 49 Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | RCOOKIE: c1 85 56 a6 62 e9 0c c0 Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | state hash entry 14 Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | state object #6 found, in STATE_MAIN_R2 Aug 24 15:06:33 vc2_TPC1 pluto[8747]: "kay2" #6: ignoring informational payload, type AUTHENTICATION_FAILED Aug 24 15:06:33 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 10 seconds for #6 Aug 24 15:06:43 vc2_TPC1 pluto[8747]: | Aug 24 15:06:43 vc2_TPC1 pluto[8747]: | *time to handle event Aug 24 15:06:43 vc2_TPC1 pluto[8747]: | event after this is EVENT_RETRANSMIT in 28 seconds Aug 24 15:06:43 vc2_TPC1 pluto[8747]: | handling event EVENT_RETRANSMIT for 169.254.0.70 "kay2" #6 Aug 24 15:06:43 vc2_TPC1 pluto[8747]: | inserting event EVENT_RETRANSMIT, timeout in 20 seconds for #6 Aug 24 15:06:43 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 20 seconds for #6 Aug 24 15:06:43 vc2_TPC1 pluto[8747]: | Aug 24 15:06:43 vc2_TPC1 pluto[8747]: | *received 308 bytes from 169.254.0.70:500 on eth2 Aug 24 15:06:43 vc2_TPC1 pluto[8747]: | ICOOKIE: bf 56 f6 40 b6 9a 78 49 Aug 24 15:06:43 vc2_TPC1 pluto[8747]: | RCOOKIE: c1 85 56 a6 62 e9 0c c0 Aug 24 15:06:43 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:06:43 vc2_TPC1 pluto[8747]: | state hash entry 14 Aug 24 15:06:43 vc2_TPC1 pluto[8747]: | state object #6 found, in STATE_MAIN_R2 Aug 24 15:06:43 vc2_TPC1 pluto[8747]: "kay2" #6: discarding duplicate packet; already STATE_MAIN_R2 Aug 24 15:06:43 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 20 seconds for #6 Aug 24 15:06:43 vc2_TPC1 pluto[8747]: | Aug 24 15:06:43 vc2_TPC1 pluto[8747]: | *received 76 bytes from 169.254.0.70:500 on eth2 Aug 24 15:06:43 vc2_TPC1 pluto[8747]: | ICOOKIE: bf 56 f6 40 b6 9a 78 49 Aug 24 15:06:43 vc2_TPC1 pluto[8747]: | RCOOKIE: c1 85 56 a6 62 e9 0c c0 Aug 24 15:06:43 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:06:43 vc2_TPC1 pluto[8747]: | state hash entry 14 Aug 24 15:06:43 vc2_TPC1 pluto[8747]: | state object #6 found, in STATE_MAIN_R2 Aug 24 15:06:43 vc2_TPC1 pluto[8747]: "kay2" #6: next payload type of ISAKMP Hash Payload has an unknown value: 215 Aug 24 15:06:43 vc2_TPC1 pluto[8747]: "kay2" #6: malformed payload in packet Aug 24 15:06:43 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 20 seconds for #6 Aug 24 15:07:03 vc2_TPC1 pluto[8747]: | Aug 24 15:07:03 vc2_TPC1 pluto[8747]: | *time to handle event Aug 24 15:07:03 vc2_TPC1 pluto[8747]: | event after this is EVENT_RETRANSMIT in 8 seconds Aug 24 15:07:03 vc2_TPC1 pluto[8747]: | handling event EVENT_RETRANSMIT for 169.254.0.70 "kay2" #6 Aug 24 15:07:03 vc2_TPC1 pluto[8747]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #6 Aug 24 15:07:03 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 8 seconds for #5 Aug 24 15:07:03 vc2_TPC1 pluto[8747]: | Aug 24 15:07:03 vc2_TPC1 pluto[8747]: | *received 308 bytes from 169.254.0.70:500 on eth2 Aug 24 15:07:03 vc2_TPC1 pluto[8747]: | ICOOKIE: bf 56 f6 40 b6 9a 78 49 Aug 24 15:07:03 vc2_TPC1 pluto[8747]: | RCOOKIE: c1 85 56 a6 62 e9 0c c0 Aug 24 15:07:03 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:07:03 vc2_TPC1 pluto[8747]: | state hash entry 14 Aug 24 15:07:03 vc2_TPC1 pluto[8747]: | state object #6 found, in STATE_MAIN_R2 Aug 24 15:07:03 vc2_TPC1 pluto[8747]: "kay2" #6: discarding duplicate packet; already STATE_MAIN_R2 Aug 24 15:07:03 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 8 seconds for #5 Aug 24 15:07:04 vc2_TPC1 pluto[8747]: | Aug 24 15:07:04 vc2_TPC1 pluto[8747]: | *received 76 bytes from 169.254.0.70:500 on eth2 Aug 24 15:07:04 vc2_TPC1 pluto[8747]: | ICOOKIE: bf 56 f6 40 b6 9a 78 49 Aug 24 15:07:04 vc2_TPC1 pluto[8747]: | RCOOKIE: c1 85 56 a6 62 e9 0c c0 Aug 24 15:07:04 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:07:04 vc2_TPC1 pluto[8747]: | state hash entry 14 Aug 24 15:07:04 vc2_TPC1 pluto[8747]: | state object #6 found, in STATE_MAIN_R2 Aug 24 15:07:04 vc2_TPC1 pluto[8747]: "kay2" #6: next payload type of ISAKMP Hash Payload has an unknown value: 159 Aug 24 15:07:04 vc2_TPC1 pluto[8747]: "kay2" #6: malformed payload in packet Aug 24 15:07:04 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 7 seconds for #5 Aug 24 15:07:11 vc2_TPC1 pluto[8747]: | Aug 24 15:07:11 vc2_TPC1 pluto[8747]: | *time to handle event Aug 24 15:07:11 vc2_TPC1 pluto[8747]: | event after this is EVENT_RETRANSMIT in 32 seconds Aug 24 15:07:11 vc2_TPC1 pluto[8747]: | handling event EVENT_RETRANSMIT for 169.254.0.70 "kay2" #5 Aug 24 15:07:11 vc2_TPC1 pluto[8747]: "kay2" #5: max number of retransmissions (2) reached STATE_MAIN_I2 Aug 24 15:07:11 vc2_TPC1 pluto[8747]: | ICOOKIE: 94 9b bb 79 ed 4c d6 68 Aug 24 15:07:11 vc2_TPC1 pluto[8747]: | RCOOKIE: a5 1a 25 9c 4d f6 f0 1a Aug 24 15:07:11 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:07:11 vc2_TPC1 pluto[8747]: | state hash entry 22 Aug 24 15:07:11 vc2_TPC1 pluto[8747]: | next event EVENT_RETRANSMIT in 32 seconds for #6 Aug 24 15:07:43 vc2_TPC1 pluto[8747]: | Aug 24 15:07:43 vc2_TPC1 pluto[8747]: | *time to handle event Aug 24 15:07:43 vc2_TPC1 pluto[8747]: | event after this is EVENT_REINIT_SECRET in 3357 seconds Aug 24 15:07:43 vc2_TPC1 pluto[8747]: | handling event EVENT_RETRANSMIT for 169.254.0.70 "kay2" #6 Aug 24 15:07:43 vc2_TPC1 pluto[8747]: "kay2" #6: max number of retransmissions (2) reached STATE_MAIN_R2 Aug 24 15:07:43 vc2_TPC1 pluto[8747]: | ICOOKIE: bf 56 f6 40 b6 9a 78 49 Aug 24 15:07:43 vc2_TPC1 pluto[8747]: | RCOOKIE: c1 85 56 a6 62 e9 0c c0 Aug 24 15:07:43 vc2_TPC1 pluto[8747]: | peer: a9 fe 00 46 Aug 24 15:07:43 vc2_TPC1 pluto[8747]: | state hash entry 14 Aug 24 15:07:43 vc2_TPC1 pluto[8747]: | next event EVENT_REINIT_SECRET in 3357 seconds Aug 24 15:12:29 vc2_TPC1 sshd[8761]: Accepted password for root from 10.58.206.10 port 45737 ssh2 Aug 24 15:12:29 vc2_TPC1 sshd[8761]: pam_env(sshd:setcred): Unable to open env file: /etc/default/locale: No such file or directory Aug 24 15:12:29 vc2_TPC1 sshd[8761]: pam_unix(sshd:session): session opened for user root by (uid=0) Aug 24 15:12:29 vc2_TPC1 sshd[8772]: pam_env(sshd:setcred): Unable to open env file: /etc/default/locale: No such file or directory Aug 24 15:12:30 vc2_TPC1 sshd[8761]: pam_unix(sshd:session): session closed for user root Aug 24 15:12:30 vc2_TPC1 sshd[8761]: pam_env(sshd:setcred): Unable to open env file: /etc/default/locale: No such file or directory Aug 24 15:14:41 vc2_TPC1 sshd[7232]: pam_unix(sshd:session): session closed for user root Aug 24 15:14:41 vc2_TPC1 sshd[7232]: pam_env(sshd:setcred): Unable to open env file: /etc/default/locale: No such file or directory Aug 24 15:14:51 vc2_TPC1 sshd[8773]: Accepted password for root from 10.142.140.113 port 1711 ssh2 Aug 24 15:14:51 vc2_TPC1 sshd[8773]: pam_env(sshd:setcred): Unable to open env file: /etc/default/locale: No such file or directory Aug 24 15:14:51 vc2_TPC1 sshd[8773]: pam_unix(sshd:session): session opened for user root by (uid=0) Aug 24 15:14:51 vc2_TPC1 sshd[8784]: pam_env(sshd:setcred): Unable to open env file: /etc/default/locale: No such file or directory Aug 24 15:17:01 vc2_TPC1 CRON[8798]: pam_env(cron:session): Unable to open env file: /etc/default/locale: No such file or directory Aug 24 15:17:01 vc2_TPC1 CRON[8798]: pam_unix(cron:session): session opened for user root by (uid=0) Aug 24 15:17:01 vc2_TPC1 CRON[8798]: pam_unix(cron:session): session closed for user root Aug 24 15:20:01 vc2_TPC1 CRON[8801]: pam_env(cron:session): Unable to open env file: /etc/default/locale: No such file or directory Aug 24 15:20:01 vc2_TPC1 CRON[8801]: pam_unix(cron:session): session opened for user smmsp by (uid=0) Aug 24 15:20:01 vc2_TPC1 CRON[8801]: pam_unix(cron:session): session closed for user smmsp Aug 24 15:22:27 vc2_TPC1 sshd[8820]: Accepted password for root from 10.58.206.10 port 46476 ssh2 Aug 24 15:22:27 vc2_TPC1 sshd[8820]: pam_env(sshd:setcred): Unable to open env file: /etc/default/locale: No such file or directory Aug 24 15:22:27 vc2_TPC1 sshd[8820]: pam_unix(sshd:session): session opened for user root by (uid=0) Aug 24 15:22:27 vc2_TPC1 sshd[8831]: pam_env(sshd:setcred): Unable to open env file: /etc/default/locale: No such file or directory Aug 24 15:22:27 vc2_TPC1 sshd[8820]: pam_unix(sshd:session): session closed for user root Aug 24 15:22:27 vc2_TPC1 sshd[8820]: pam_env(sshd:setcred): Unable to open env file: /etc/default/locale: No such file or directory Aug 24 15:23:05 vc2_TPC1 sshd[8832]: Accepted password for root from 10.142.140.113 port 1762 ssh2 Aug 24 15:23:05 vc2_TPC1 sshd[8832]: pam_env(sshd:setcred): Unable to open env file: /etc/default/locale: No such file or directory Aug 24 15:23:05 vc2_TPC1 sshd[8832]: pam_unix(sshd:session): session opened for user root by (uid=0) Aug 24 15:23:05 vc2_TPC1 sshd[8843]: pam_env(sshd:setcred): Unable to open env file: /etc/default/locale: No such file or directory Aug 24 15:23:54 vc2_TPC1 sshd[8858]: Accepted password for root from 10.142.140.92 port 2557 ssh2 Aug 24 15:23:54 vc2_TPC1 sshd[8858]: pam_env(sshd:setcred): Unable to open env file: /etc/default/locale: No such file or directory Aug 24 15:23:54 vc2_TPC1 sshd[8858]: pam_unix(sshd:session): session opened for user root by (uid=0) Aug 24 15:23:54 vc2_TPC1 sshd[8858]: subsystem request for sftp Aug 24 15:23:54 vc2_TPC1 sshd[8869]: pam_env(sshd:setcred): Unable to open env file: /etc/default/locale: No such file or directory Aug 24 15:24:01 vc2_TPC1 sshd[8832]: pam_unix(sshd:session): session closed for user root Aug 24 15:24:01 vc2_TPC1 sshd[8832]: pam_env(sshd:setcred): Unable to open env file: /etc/default/locale: No such file or directory