Starting IKEv1 pluto daemon (strongSwan 4.6.2) THREADS VENDORID listening on interfaces: eth1 10.10.10.7 fe80::250:baff:fecd:7779 eth0 10.125.47.47 fe80::21c:25ff:feaa:102e eth2 20.20.20.2 eth1.400 12.1.1.10 fe80::250:baff:fecd:7779 eth1.500 16.1.1.10 fe80::250:baff:fecd:7779 eth2.400 11.1.1.1 fe80::207:e9ff:fe0c:7233 eth2.500 22.1.1.1 fe80::207:e9ff:fe0c:7233 loaded plugins: aes des sha1 sha2 md5 random x509 pkcs1 pkcs8 pgp dnskey pem gmp hmac xauth attr kernel-netlink resolve including NAT-Traversal patch (Version 0.6c) [disabled] loading ca certificates from '/etc/ipsec.d/cacerts' loaded ca certificate from '/etc/ipsec.d/cacerts/cacert.pem' loading aa certificates from '/etc/ipsec.d/aacerts' loading ocsp certificates from '/etc/ipsec.d/ocspcerts' Changing to directory '/etc/ipsec.d/crls' loading attribute certificates from '/etc/ipsec.d/acerts' spawning 4 worker threads listening for IKE messages adding interface eth2.500/eth2.500 22.1.1.1:500 adding interface eth2.400/eth2.400 11.1.1.1:500 adding interface eth1.500/eth1.500 16.1.1.10:500 adding interface eth1.400/eth1.400 12.1.1.10:500 adding interface eth2/eth2 20.20.20.2:500 adding interface eth0/eth0 10.125.47.47:500 adding interface eth1/eth1 10.10.10.7:500 adding interface lo/lo 127.0.0.1:500 adding interface lo/lo ::1:500 loading secrets from "/etc/ipsec.secrets" loaded private key from 'oms_key.pem' loaded host certificate from '/etc/ipsec.d/certs/oms_cert.pem' id '%any' not confirmed by certificate, defaulting to 'C=IN, ST=BLR, O=Wipro Technologies, OU=RA, CN=oms' added connection description "conn502" packet from 10.10.10.6:500: received Vendor ID payload [strongSwan] packet from 10.10.10.6:500: received Vendor ID payload [XAUTH] packet from 10.10.10.6:500: received Vendor ID payload [Dead Peer Detection] "conn502" #1: responding to Main Mode "conn502" #1: Peer ID is ID_DER_ASN1_DN: 'C=IN, ST=BLR, O=Wipro Technologies, OU=RA, CN=ftm' "conn502" #1: crl not found "conn502" #1: certificate status unknown "conn502" #1: we have a cert and are sending it upon request "conn502" #1: sent MR3, ISAKMP SA established "conn502" #2: responding to Quick Mode "conn502" #2: Dead Peer Detection (RFC 3706) enabled "conn502" #2: IPsec SA established {ESP=>0xc11e8f13 <0xc29abdd9} "conn502" #3: responding to Quick Mode "conn502" #3: Dead Peer Detection (RFC 3706) enabled "conn502" #3: IPsec SA established {ESP=>0xc2df58a4 <0xc96eb76e} "conn502" #4: responding to Quick Mode "conn502" #4: Dead Peer Detection (RFC 3706) enabled "conn502" #4: IPsec SA established {ESP=>0xc9adba01 <0xc1a2c0d0} "conn502" #5: responding to Quick Mode "conn502" #5: Dead Peer Detection (RFC 3706) enabled "conn502" #5: IPsec SA established {ESP=>0xc9efac8d <0xc1c20f9a} "conn502" #6: responding to Quick Mode "conn502" #6: Dead Peer Detection (RFC 3706) enabled "conn502" #6: IPsec SA established {ESP=>0xc361a998 <0xcd1fefd2} "conn502" #7: responding to Quick Mode "conn502" #7: Dead Peer Detection (RFC 3706) enabled "conn502" #7: IPsec SA established {ESP=>0xcf678a29 <0xc14e4933} "conn502" #1: received Delete SA(0xc11e8f13) payload: deleting IPSEC State #2