./rsa-v2 adjusting ipsec.d to ../../baseconfigs/east/etc/ipsec.d ./rsa-v2 ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC_SSH: Ok (ret=0) ./rsa-v2 ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC: Ok (ret=0) ./rsa-v2 ike_alg_register_enc(): Activating OAKLEY_SERPENT_CBC: Ok (ret=0) ./rsa-v2 ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0) ./rsa-v2 ike_alg_register_enc(): Activating OAKLEY_BLOWFISH_CBC: Ok (ret=0) ./rsa-v2 ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0) ./rsa-v2 ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0) Pre-amble: #!-pluto-whack-file- recorded on west on 2007-10-07 01:40:12 ./rsa-v2 listening for IKE messages ./rsa-v2 loading secrets from "../../baseconfigs/east/etc/ipsec.secrets" ./rsa-v2 loaded private key for keyid: PPK_RSA:AQN3cn11F ./rsa-v2 loaded private key file '../../baseconfigs/east/etc/ipsec.d/private/east.pem' (963 bytes) | decrypting file using 'DES-EDE3-CBC' ./rsa-v2 loaded private key for keyid: PPK_RSA:AwEAAaFHY | interface "eth0" matched right side ./rsa-v2 added connection description "westnet--eastnet-ikev2" | base debugging = crypt+parsing+control+controlmore ./rsa-v2 listening for IKE messages ./rsa-v2 forgetting secrets ./rsa-v2 loading secrets from "../../baseconfigs/east/etc/ipsec.secrets" ./rsa-v2 loaded private key for keyid: PPK_RSA:AQN3cn11F | id type added to secret(0xADDRESS) 1: C=CA, ST=Ontario, O=Libreswan, CN=east.uml.freeswan.org, E=east@libreswan.org | id type added to secret(0xADDRESS) 1: %any ./rsa-v2 loaded private key file '../../baseconfigs/east/etc/ipsec.d/private/east.pem' (963 bytes) | file content is not binary ASN.1 | -----BEGIN RSA PRIVATE KEY----- | Proc-Type: 4,ENCRYPTED | DEK-Info: DES-EDE3-CBC,16F2C4D726B9DB34 | -----END RSA PRIVATE KEY----- | decrypting file using 'DES-EDE3-CBC' | file coded in PEM format | L0 - RSAPrivateKey: | L1 - version: | L1 - modulus: | L1 - publicExponent: | L1 - privateExponent: | L1 - prime1: | L1 - prime2: | L1 - exponent1: | L1 - exponent2: | L1 - coefficient: ./rsa-v2 loaded private key for keyid: PPK_RSA:AwEAAaFHY RC=0 "westnet--eastnet-ikev2": 192.0.2.0/24===192.1.2.23<192.1.2.23>[@east]...192.1.2.45<192.1.2.45>[@west]===192.0.1.0/24; unrouted; eroute owner: #0 RC=0 "westnet--eastnet-ikev2": myip=unset; hisip=unset; RC=0 "westnet--eastnet-ikev2": ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 3 RC=0 "westnet--eastnet-ikev2": policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEv2ALLOW+IKEv2Init; prio: 24,24; interface: eth0; RC=0 "westnet--eastnet-ikev2": newest ISAKMP SA: #0; newest IPsec SA: #0; ./rsa-v2 forgetting secrets ./rsa-v2 loading secrets from "../../baseconfigs/east/etc/ipsec.secrets" ./rsa-v2 loaded private key for keyid: PPK_RSA:AQN3cn11F | id type added to secret(0xADDRESS) 1: C=CA, ST=Ontario, O=Libreswan, CN=east.uml.freeswan.org, E=east@libreswan.org | id type added to secret(0xADDRESS) 1: %any ./rsa-v2 loaded private key file '../../baseconfigs/east/etc/ipsec.d/private/east.pem' (963 bytes) | file content is not binary ASN.1 | -----BEGIN RSA PRIVATE KEY----- | Proc-Type: 4,ENCRYPTED | DEK-Info: DES-EDE3-CBC,16F2C4D726B9DB34 | -----END RSA PRIVATE KEY----- | decrypting file using 'DES-EDE3-CBC' | file coded in PEM format | L0 - RSAPrivateKey: | L1 - version: | L1 - modulus: | L1 - publicExponent: | L1 - privateExponent: | L1 - prime1: | L1 - prime2: | L1 - exponent1: | L1 - exponent2: | L1 - coefficient: ./rsa-v2 loaded private key for keyid: PPK_RSA:AwEAAaFHY | started looking for secret for @east->@west of kind PPK_RSA | actually looking for secret for @east->@west of kind PPK_RSA | line 25: key type PPK_RSA(@east) to type PPK_RSA | 1: compared key %any to @east / @west -> 0 | 2: compared key C=CA, ST=Ontario, O=Libreswan, CN=east.uml.freeswan.org, E=east@libreswan.org to @east / @west -> 0 | line 25: match=0 | line 8: key type PPK_RSA(@east) to type PPK_RSA | 1: compared key (none) to @east / @west -> 6 | 2: compared key (none) to @east / @west -> 6 | line 8: match=6 | best_match 0>6 best=0xADDRESS (line=8) | concluding with best_match=6 best=0xADDRESS (lineno=8) | inputs to hash1 (first packet) | 00 01 02 03 04 05 06 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 fc 22 80 00 f4 | 02 00 00 28 01 01 00 04 03 00 00 08 01 00 00 0c | 03 00 00 08 03 00 00 02 03 00 00 08 02 00 00 02 | 00 00 00 08 04 00 00 05 02 00 00 28 02 01 00 04 | 03 00 00 08 01 00 00 0c 03 00 00 08 03 00 00 02 | 03 00 00 08 02 00 00 01 00 00 00 08 04 00 00 05 | 02 00 00 28 03 01 00 04 03 00 00 08 01 00 00 03 | 03 00 00 08 03 00 00 02 03 00 00 08 02 00 00 02 | 00 00 00 08 04 00 00 05 02 00 00 28 04 01 00 04 | 03 00 00 08 01 00 00 03 03 00 00 08 03 00 00 02 | 03 00 00 08 02 00 00 01 00 00 00 08 04 00 00 05 | 02 00 00 28 05 01 00 04 03 00 00 08 01 00 00 03 | 03 00 00 08 03 00 00 02 03 00 00 08 02 00 00 02 | 00 00 00 08 04 00 00 02 00 00 00 28 06 01 00 04 | 03 00 00 08 01 00 00 03 03 00 00 08 03 00 00 02 | 03 00 00 08 02 00 00 01 00 00 00 08 04 00 00 02 | 28 00 00 c8 00 05 00 00 ff bc 6a 92 a6 b9 55 9b | 05 fa 96 a7 a4 35 07 b4 c1 e1 c0 86 1a 58 71 d9 | ba 73 a1 63 11 37 88 c0 de bb 39 79 e7 ff 0c 52 | b4 ce 60 50 eb 05 36 9e a4 30 0d 2b ff 3b 1b 29 | 9f 3b 80 2c cb 13 31 8c 2a b9 e3 b5 62 7c b4 b3 | 5e b9 39 98 20 76 b5 7c 05 0d 7b 35 c3 c5 c7 cc | 8c 0f ea b7 b6 4a 7d 7b 6b 8f 6b 4d ab f4 ac 40 | 6d d2 01 26 b9 0a 98 ac 76 6e fa 37 a7 89 0c 43 | 94 ff 9a 77 61 5b 58 f5 2d 65 1b bf a5 8d 2a 54 | 9a f8 b0 1a a4 bc a3 d7 62 42 66 63 b1 55 d4 eb | da 9f 60 a6 a1 35 73 e6 a8 88 13 5c dc 67 3d d4 | 83 02 99 03 f3 a9 0e ca 23 e1 ec 1e 27 03 31 b2 | d0 50 f4 f7 58 f4 99 27 2b 80 00 14 b5 ce 84 19 | 09 5c 6e 2b 6b 62 d3 05 53 05 b3 c4 00 00 00 10 | 4f 45 73 40 40 7a 4a 56 57 5b 6a 5d | inputs to hash2 (responder nonce) | b5 ce 84 19 09 5c 6e 2b 6b 62 d3 05 53 05 b3 c4 | idhash 01 02 03 04 11 12 13 14 21 22 23 24 31 32 33 34 | 41 42 43 44 | v2rsa octets 30 21 30 09 06 05 2b 0e 03 02 1a 05 00 04 14 47 | 8f 2d 01 ca ce e5 9c 83 c5 f2 3c 18 dc 44 7a 2c | d5 2b 3e | signing hash with RSA Key *AQN3cn11F | rsa signature 2c 62 5c 5c 30 bb ac ae 0a bb 9d 50 86 63 ec bc | 57 28 50 ba b8 73 d6 40 3c 31 a4 2b 72 18 c1 de | da ec 10 d5 47 a5 42 33 23 32 e5 4e cf c6 47 6a | 27 a5 66 b7 6b f9 6f 32 55 b7 c1 3d cf 13 31 c9 | 4a 16 ee 83 d4 dd fc 33 9a 4d 8b 7d c5 8d ab 27 | 38 89 dc db eb df d9 8a be 32 a4 0c 11 9d 0d f6 | 93 ec 33 6d 1a 58 65 32 f3 ed 03 c1 8a 26 bd 0b | 9e 46 52 d2 e5 83 c8 5a 43 b5 94 70 56 e5 03 92 | e7 d9 fd 4e 19 b5 83 13 db af 9c 02 63 43 0e c2 | 1f dc c3 cf 20 3c cc c6 03 2d 92 8d 5a ca 27 9e | d9 f9 d7 1e fe 69 de 87 87 ea 95 e2 e7 08 1a f1 | 9c 4a 0b 37 de 03 39 05 8d 89 52 f5 d2 63 e7 f5 | 8f ed 7d 99 80 f2 91 81 2d ef ea 53 83 0d f6 e0 | ae db 65 ba 35 5e 10 1a d0 01 b5 a4 cc 26 43 db | d0 fe fb ba 19 10 74 af ef 16 3e ca 1b 09 a7 93 | fc db 22 41 6a c4 92 73 69 37 b4 15 25 0b a0 df RC=0 "westnet--eastnet-ikev2": 192.0.1.0/24===192.1.2.45<192.1.2.45>[@west]...192.1.2.23<192.1.2.23>[@east]===192.0.2.0/24; unrouted; eroute owner: #0 RC=0 "westnet--eastnet-ikev2": myip=unset; hisip=unset; RC=0 "westnet--eastnet-ikev2": ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 3 RC=0 "westnet--eastnet-ikev2": policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEv2ALLOW+IKEv2Init; prio: 24,24; interface: eth0; RC=0 "westnet--eastnet-ikev2": newest ISAKMP SA: #0; newest IPsec SA: #0; | inputs to hash1 (first packet) | 00 01 02 03 04 05 06 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 fc 22 80 00 f4 | 02 00 00 28 01 01 00 04 03 00 00 08 01 00 00 0c | 03 00 00 08 03 00 00 02 03 00 00 08 02 00 00 02 | 00 00 00 08 04 00 00 05 02 00 00 28 02 01 00 04 | 03 00 00 08 01 00 00 0c 03 00 00 08 03 00 00 02 | 03 00 00 08 02 00 00 01 00 00 00 08 04 00 00 05 | 02 00 00 28 03 01 00 04 03 00 00 08 01 00 00 03 | 03 00 00 08 03 00 00 02 03 00 00 08 02 00 00 02 | 00 00 00 08 04 00 00 05 02 00 00 28 04 01 00 04 | 03 00 00 08 01 00 00 03 03 00 00 08 03 00 00 02 | 03 00 00 08 02 00 00 01 00 00 00 08 04 00 00 05 | 02 00 00 28 05 01 00 04 03 00 00 08 01 00 00 03 | 03 00 00 08 03 00 00 02 03 00 00 08 02 00 00 02 | 00 00 00 08 04 00 00 02 00 00 00 28 06 01 00 04 | 03 00 00 08 01 00 00 03 03 00 00 08 03 00 00 02 | 03 00 00 08 02 00 00 01 00 00 00 08 04 00 00 02 | 28 00 00 c8 00 05 00 00 ff bc 6a 92 a6 b9 55 9b | 05 fa 96 a7 a4 35 07 b4 c1 e1 c0 86 1a 58 71 d9 | ba 73 a1 63 11 37 88 c0 de bb 39 79 e7 ff 0c 52 | b4 ce 60 50 eb 05 36 9e a4 30 0d 2b ff 3b 1b 29 | 9f 3b 80 2c cb 13 31 8c 2a b9 e3 b5 62 7c b4 b3 | 5e b9 39 98 20 76 b5 7c 05 0d 7b 35 c3 c5 c7 cc | 8c 0f ea b7 b6 4a 7d 7b 6b 8f 6b 4d ab f4 ac 40 | 6d d2 01 26 b9 0a 98 ac 76 6e fa 37 a7 89 0c 43 | 94 ff 9a 77 61 5b 58 f5 2d 65 1b bf a5 8d 2a 54 | 9a f8 b0 1a a4 bc a3 d7 62 42 66 63 b1 55 d4 eb | da 9f 60 a6 a1 35 73 e6 a8 88 13 5c dc 67 3d d4 | 83 02 99 03 f3 a9 0e ca 23 e1 ec 1e 27 03 31 b2 | d0 50 f4 f7 58 f4 99 27 2b 80 00 14 b5 ce 84 19 | 09 5c 6e 2b 6b 62 d3 05 53 05 b3 c4 00 00 00 10 | 4f 45 73 40 40 7a 4a 56 57 5b 6a 5d | inputs to hash2 (responder nonce) | b5 ce 84 19 09 5c 6e 2b 6b 62 d3 05 53 05 b3 c4 | idhash 01 02 03 04 11 12 13 14 21 22 23 24 31 32 33 34 | 41 42 43 44 | required CA is '%any' | trusted_ca called with a=(empty) b=(empty) | key issuer CA is '%any' | v2rsa decrypted SIG: | 47 8f 2d 01 ca ce e5 9c 83 c5 f2 3c 18 dc 44 7a | 2c d5 2b 3e | v2rsa computed hash: | 47 8f 2d 01 ca ce e5 9c 83 c5 f2 3c 18 dc 44 7a | 2c d5 2b 3e | an RSA Sig check passed with *AQN3cn11F [preloaded key] stf status: STF_OK