ejjnyyo@SRX3400-1> show configuration security pki ca-profile LTEIPsecSEGRootCA { ca-identity LTEIPsecSEGRootCA; revocation-check { disable; } } ca-profile LTEIPsecNEcusRootCA { ca-identity LTEIPsecNEcusRootCA; revocation-check { disable; } } ca-profile Ericsson_pRBS { ca-identity Ericsson_pRBS; revocation-check { disable; } } traceoptions { file pki_trace.txt size 10000000 files 5; flag all; } {primary:node0} ejjnyyo@SRX3400-1> show configuration security ike traceoptions { file ike_debug; flag ike; flag policy-manager; flag routing-socket; flag all; flag certificates; flag database; flag general; flag next-hop-tunnels; } proposal Cabritos-ike-phase1-proposal { authentication-method pre-shared-keys; dh-group group2; authentication-algorithm sha1; encryption-algorithm aes-128-cbc; lifetime-seconds 3600; } proposal ike-proposal-pRBS-cert { authentication-method rsa-signatures; dh-group group14; authentication-algorithm sha1; encryption-algorithm aes-128-cbc; lifetime-seconds 86400; } inactive: policy Cabritos1-ike-phase1-policy { mode main; proposals Cabritos-ike-phase1-proposal; pre-shared-key ascii-text "$9$pOOVuRSvMX-b2Lx"; ## SECRET-DATA } policy ike-policy-pRBS-cert { mode main; proposals ike-proposal-pRBS-cert; certificate { local-certificate SRX3400-key-pair-1; peer-certificate-type x509-signature; } } inactive: gateway Cabritos-GW01 { ike-policy Cabritos1-ike-phase1-policy; address 2.2.2.1; external-interface reth1.341; } gateway ike-gw-pRBS-cert { ike-policy ike-policy-pRBS-cert; dynamic { distinguished-name { wildcard O=Ercisson; } ike-user-type group-ike-id; } dead-peer-detection { always-send; interval 10; threshold 1; } local-identity distinguished-name; external-interface reth7.32; xauth access-profile Radius_pRBS; version v2-only; } {primary:node0} ejjnyyo@SRX3400-1> show configuration access profile Radius_pRBS { authentication-order radius; radius-server { 10.185.25.20 { secret "$9$DbHPQF39u0I.PRSeK7N"; ## SECRET-DATA routing-instance VR_Temp_VPN; } } } {primary:node0} ejjnyyo@SRX3400-1> show configuration security ipsec traceoptions { flag security-associations; flag all; } proposal Cabritos-ipsec-phase2-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm aes-128-cbc; lifetime-seconds 3600; } proposal ipsec-SA-proposals { protocol esp; authentication-algorithm hmac-sha1-96; encryption-algorithm aes-128-cbc; lifetime-seconds 86400; } policy Cabritos-ipsec-phase2-policy { perfect-forward-secrecy { keys group2; } proposals Cabritos-ipsec-phase2-proposal; } policy ipsec-policy { perfect-forward-secrecy { keys group14; } proposals ipsec-SA-proposals; } inactive: vpn Cabritos-GRX-1 { bind-interface st0.3; vpn-monitor; ike { gateway Cabritos-GW01; proxy-identity { local 10.4.4.0/24; remote 10.3.3.0/24; service any; } ipsec-policy Cabritos-ipsec-phase2-policy; } establish-tunnels immediately; } vpn tunnel-pRBS-cert-TEMP { bind-interface st0.10; ike { gateway ike-gw-pRBS-cert; proxy-identity { local 0.0.0.0/0; remote 0.0.0.0/0; service any; } ipsec-policy ipsec-policy; } establish-tunnels immediately; } {primary:node0} ejjnyyo@SRX3400-1> show configuration security inter ^ syntax error. ejjnyyo@SRX3400-1> show configuration interfaces st0 unit 3 { description "IPSec interface for Cabritos"; family inet { mtu 1420; } } unit 10 { multipoint; family inet { address 10.185.28.9/30; } } {primary:node0} ejjnyyo@SRX3400-1> show cof ^ syntax error, expecting . ejjnyyo@SRX3400-1> show configuration routing-instances VR_Temp_VPN instance-type virtual-router; interface reth7.32; interface reth7.561; interface st0.10; routing-options { static { route 10.185.49.192/29 next-hop 10.185.49.209; route 10.185.28.8/30 next-hop st0.10; route 10.185.25.16/29 next-hop 10.185.28.36; route 10.185.28.16/29 next-hop 10.185.28.36; } } {primary:node0} ejjnyyo@SRX3400-1> ping 10.185.49.194 routing-instance VR_Temp_VPN PING 10.185.49.194 (10.185.49.194): 56 data bytes 64 bytes from 10.185.49.194: icmp_seq=0 ttl=63 time=4.996 ms ^C --- 10.185.49.194 ping statistics --- 1 packets transmitted, 1 packets received, 0% packet loss round-trip min/avg/max/stddev = 4.996/4.996/4.996/0.000 ms {primary:node0} ejjnyyo@SRX3400-1> ping 10.185.25.20 routing-instance VR_Temp_VPN PING 10.185.25.20 (10.185.25.20): 56 data bytes 64 bytes from 10.185.25.20: icmp_seq=0 ttl=62 time=9.492 ms 64 bytes from 10.185.25.20: icmp_seq=1 ttl=62 time=4.391 ms ^C --- 10.185.25.20 ping statistics --- 2 packets transmitted, 2 packets received, 0% packet loss round-trip min/avg/max/stddev = 4.391/6.942/9.492/2.551 ms {primary:node0} ejjnyyo@SRX3400-1> show log ike_debug | except 2.2.2 [Apr 15 23:12:25 PIC 1/7/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1887118717 (ref cnt 0), waiting_for_del 0x0 [Apr 15 23:12:25 PIC 1/7/0 KMD1]ike_free_sa: Start [Apr 15 23:12:27 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f76800 from freelist [Apr 15 23:12:27 PIC 1/7/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:12:27 PIC 1/7/0 KMD1]ike_sa_allocate: Start, SA = { f90778f2 1fe981d3 - 389ac0ee da411090 } [Apr 15 23:12:27 PIC 1/7/0 KMD1]ike_decode_packet: Start [Apr 15 23:12:27 PIC 1/7/0 KMD1]ike_decode_packet: Start, SA = { f90778f2 1fe981d3 - ca65020d 274869cb} / 00000000, nego = -1 [Apr 15 23:12:27 PIC 1/7/0 KMD1]ike_decode_payload_sa: Start [Apr 15 23:12:27 PIC 1/7/0 KMD1]ike_decode_payload_t: Start, # trans = 1 [Apr 15 23:12:27 PIC 1/7/0 KMD1]ike_st_i_vid: VID[0..28] = 382b5e05 0cf5644e ... [Apr 15 23:12:27 PIC 1/7/0 KMD1]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Apr 15 23:12:27 PIC 1/7/0 KMD1]ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [Apr 15 23:12:27 PIC 1/7/0 KMD1]ike_st_i_sa_proposal: Start [Apr 15 23:12:27 PIC 1/7/0 KMD1]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 15 23:12:27 PIC 1/7/0 KMD1]ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error No proposal chosen (neg 100fc1000) [Apr 15 23:12:27 PIC 1/7/0 KMD1]ike_isakmp_sa_reply: Start [Apr 15 23:12:27 PIC 1/7/0 KMD1]ike_state_restart_packet: Start, restart packet SA = { f90778f2 1fe981d3 - ca65020d 274869cb}, nego = -1 [Apr 15 23:12:27 PIC 1/7/0 KMD1]ike_st_i_sa_proposal: Start [Apr 15 23:12:27 PIC 1/7/0 KMD1]ike_st_i_cr: Start [Apr 15 23:12:27 PIC 1/7/0 KMD1]ike_st_i_cert: Start [Apr 15 23:12:27 PIC 1/7/0 KMD1]ike_st_i_private: Start [Apr 15 23:12:27 PIC 1/7/0 KMD1]ike_st_o_sa_values: Start [Apr 15 23:12:27 PIC 1/7/0 KMD1]ike_alloc_negotiation: Start, SA = { f90778f2 1fe981d3 - ca65020d 274869cb} [Apr 15 23:12:27 PIC 1/7/0 KMD1]ike_encode_packet: Start, SA = { 0xf90778f2 1fe981d3 - ca65020d 274869cb } / b2962edd, nego = 0 [Apr 15 23:12:27 PIC 1/7/0 KMD1]ike_delete_negotiation: Start, SA = { f90778f2 1fe981d3 - ca65020d 274869cb}, nego = 0 [Apr 15 23:12:27 PIC 1/7/0 KMD1]ike_free_negotiation_info: Start, nego = 0 [Apr 15 23:12:27 PIC 1/7/0 KMD1]ike_free_negotiation: Start, nego = 0 [Apr 15 23:12:27 PIC 1/7/0 KMD1] IKEv1 Error : No proposal chosen [Apr 15 23:12:31 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f77000 from freelist [Apr 15 23:12:31 PIC 1/7/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:12:35 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f77800 from freelist [Apr 15 23:12:35 PIC 1/7/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:12:39 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f78000 from freelist [Apr 15 23:12:39 PIC 1/7/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:12:57 PIC 1/7/0 KMD1]P1 SA 1887118718 timer expiry. ref cnt 1, timer reason Force delete timer expired (1), flags 0x230. [Apr 15 23:12:57 PIC 1/7/0 KMD1]iked_pm_ike_sa_delete_done_cb: For p1 sa index 1887118718, ref cnt 1, status: Error ok [Apr 15 23:12:57 PIC 1/7/0 KMD1]ike_remove_callback: Start, delete SA = { f90778f2 1fe981d3 - ca65020d 274869cb}, nego = -1 [Apr 15 23:12:57 PIC 1/7/0 KMD1]ike_delete_negotiation: Start, SA = { f90778f2 1fe981d3 - ca65020d 274869cb}, nego = -1 [Apr 15 23:12:57 PIC 1/7/0 KMD1]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Apr 15 23:12:57 PIC 1/7/0 KMD1]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Apr 15 23:12:57 PIC 1/7/0 KMD1]ike_sa_delete: Start, SA = { f90778f2 1fe981d3 - ca65020d 274869cb } [Apr 15 23:12:57 PIC 1/7/0 KMD1]ike_free_negotiation_isakmp: Start, nego = -1 [Apr 15 23:12:57 PIC 1/7/0 KMD1]ike_free_negotiation: Start, nego = -1 [Apr 15 23:12:57 PIC 1/7/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1887118718 (ref cnt 0), waiting_for_del 0x0 [Apr 15 23:12:57 PIC 1/7/0 KMD1]ike_free_sa: Start [Apr 15 23:14:16 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7a800 from freelist [Apr 15 23:14:16 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:14:16 PIC 1/6/0 KMD1]ike_sa_allocate: Start, SA = { 7634596c 46c94e7e - efdd65fd 0aa2f832 } [Apr 15 23:14:16 PIC 1/6/0 KMD1]ike_decode_packet: Start [Apr 15 23:14:16 PIC 1/6/0 KMD1]ike_decode_packet: Start, SA = { 7634596c 46c94e7e - 7d32fc70 d667cf85} / 00000000, nego = -1 [Apr 15 23:14:16 PIC 1/6/0 KMD1]ike_decode_payload_sa: Start [Apr 15 23:14:16 PIC 1/6/0 KMD1]ike_decode_payload_t: Start, # trans = 1 [Apr 15 23:14:16 PIC 1/6/0 KMD1]ike_st_i_vid: VID[0..28] = 382b5e05 0cf5644e ... [Apr 15 23:14:16 PIC 1/6/0 KMD1]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Apr 15 23:14:16 PIC 1/6/0 KMD1]ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [Apr 15 23:14:16 PIC 1/6/0 KMD1]ike_st_i_sa_proposal: Start [Apr 15 23:14:16 PIC 1/6/0 KMD1]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 15 23:14:16 PIC 1/6/0 KMD1]ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error No proposal chosen (neg 100fb9000) [Apr 15 23:14:16 PIC 1/6/0 KMD1]ike_isakmp_sa_reply: Start [Apr 15 23:14:16 PIC 1/6/0 KMD1]ike_state_restart_packet: Start, restart packet SA = { 7634596c 46c94e7e - 7d32fc70 d667cf85}, nego = -1 [Apr 15 23:14:16 PIC 1/6/0 KMD1]ike_st_i_sa_proposal: Start [Apr 15 23:14:16 PIC 1/6/0 KMD1]ike_st_i_cr: Start [Apr 15 23:14:16 PIC 1/6/0 KMD1]ike_st_i_cert: Start [Apr 15 23:14:16 PIC 1/6/0 KMD1]ike_st_i_private: Start [Apr 15 23:14:16 PIC 1/6/0 KMD1]ike_st_o_sa_values: Start [Apr 15 23:14:16 PIC 1/6/0 KMD1]ike_alloc_negotiation: Start, SA = { 7634596c 46c94e7e - 7d32fc70 d667cf85} [Apr 15 23:14:16 PIC 1/6/0 KMD1]ike_encode_packet: Start, SA = { 0x7634596c 46c94e7e - 7d32fc70 d667cf85 } / 1a06a005, nego = 0 [Apr 15 23:14:16 PIC 1/6/0 KMD1]ike_delete_negotiation: Start, SA = { 7634596c 46c94e7e - 7d32fc70 d667cf85}, nego = 0 [Apr 15 23:14:16 PIC 1/6/0 KMD1]ike_free_negotiation_info: Start, nego = 0 [Apr 15 23:14:16 PIC 1/6/0 KMD1]ike_free_negotiation: Start, nego = 0 [Apr 15 23:14:16 PIC 1/6/0 KMD1] IKEv1 Error : No proposal chosen [Apr 15 23:14:20 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7b000 from freelist [Apr 15 23:14:20 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:14:24 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7b800 from freelist [Apr 15 23:14:24 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:14:28 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7c000 from freelist [Apr 15 23:14:28 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:14:32 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7c800 from freelist [Apr 15 23:14:32 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:14:36 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7e000 from freelist [Apr 15 23:14:36 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:14:40 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7e800 from freelist [Apr 15 23:14:40 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:14:44 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7f000 from freelist [Apr 15 23:14:44 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:14:46 PIC 1/6/0 KMD1]P1 SA 1618683268 timer expiry. ref cnt 1, timer reason Force delete timer expired (1), flags 0x230. [Apr 15 23:14:46 PIC 1/6/0 KMD1]iked_pm_ike_sa_delete_done_cb: For p1 sa index 1618683268, ref cnt 1, status: Error ok [Apr 15 23:14:46 PIC 1/6/0 KMD1]ike_remove_callback: Start, delete SA = { 7634596c 46c94e7e - 7d32fc70 d667cf85}, nego = -1 [Apr 15 23:14:46 PIC 1/6/0 KMD1]ike_delete_negotiation: Start, SA = { 7634596c 46c94e7e - 7d32fc70 d667cf85}, nego = -1 [Apr 15 23:14:46 PIC 1/6/0 KMD1]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Apr 15 23:14:46 PIC 1/6/0 KMD1]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Apr 15 23:14:46 PIC 1/6/0 KMD1]ike_sa_delete: Start, SA = { 7634596c 46c94e7e - 7d32fc70 d667cf85 } [Apr 15 23:14:46 PIC 1/6/0 KMD1]ike_free_negotiation_isakmp: Start, nego = -1 [Apr 15 23:14:46 PIC 1/6/0 KMD1]ike_free_negotiation: Start, nego = -1 [Apr 15 23:14:46 PIC 1/6/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1618683268 (ref cnt 0), waiting_for_del 0x0 [Apr 15 23:14:46 PIC 1/6/0 KMD1]ike_free_sa: Start [Apr 15 23:14:48 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7f800 from freelist [Apr 15 23:14:48 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:14:48 PIC 1/6/0 KMD1]ike_sa_allocate: Start, SA = { 7634596c 46c94e7e - da4a0ffa d0992377 } [Apr 15 23:14:48 PIC 1/6/0 KMD1]ike_decode_packet: Start [Apr 15 23:14:48 PIC 1/6/0 KMD1]ike_decode_packet: Start, SA = { 7634596c 46c94e7e - 134299cb d30059de} / 00000000, nego = -1 [Apr 15 23:14:48 PIC 1/6/0 KMD1]ike_decode_payload_sa: Start [Apr 15 23:14:48 PIC 1/6/0 KMD1]ike_decode_payload_t: Start, # trans = 1 [Apr 15 23:14:48 PIC 1/6/0 KMD1]ike_st_i_vid: VID[0..28] = 382b5e05 0cf5644e ... [Apr 15 23:14:48 PIC 1/6/0 KMD1]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Apr 15 23:14:48 PIC 1/6/0 KMD1]ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [Apr 15 23:14:48 PIC 1/6/0 KMD1]ike_st_i_sa_proposal: Start [Apr 15 23:14:48 PIC 1/6/0 KMD1]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 15 23:14:48 PIC 1/6/0 KMD1]ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error No proposal chosen (neg 100fb9000) [Apr 15 23:14:48 PIC 1/6/0 KMD1]ike_isakmp_sa_reply: Start [Apr 15 23:14:48 PIC 1/6/0 KMD1]ike_state_restart_packet: Start, restart packet SA = { 7634596c 46c94e7e - 134299cb d30059de}, nego = -1 [Apr 15 23:14:48 PIC 1/6/0 KMD1]ike_st_i_sa_proposal: Start [Apr 15 23:14:48 PIC 1/6/0 KMD1]ike_st_i_cr: Start [Apr 15 23:14:48 PIC 1/6/0 KMD1]ike_st_i_cert: Start [Apr 15 23:14:48 PIC 1/6/0 KMD1]ike_st_i_private: Start [Apr 15 23:14:48 PIC 1/6/0 KMD1]ike_st_o_sa_values: Start [Apr 15 23:14:48 PIC 1/6/0 KMD1]ike_alloc_negotiation: Start, SA = { 7634596c 46c94e7e - 134299cb d30059de} [Apr 15 23:14:48 PIC 1/6/0 KMD1]ike_encode_packet: Start, SA = { 0x7634596c 46c94e7e - 134299cb d30059de } / 520620cc, nego = 0 [Apr 15 23:14:48 PIC 1/6/0 KMD1]ike_delete_negotiation: Start, SA = { 7634596c 46c94e7e - 134299cb d30059de}, nego = 0 [Apr 15 23:14:48 PIC 1/6/0 KMD1]ike_free_negotiation_info: Start, nego = 0 [Apr 15 23:14:48 PIC 1/6/0 KMD1]ike_free_negotiation: Start, nego = 0 [Apr 15 23:14:48 PIC 1/6/0 KMD1] IKEv1 Error : No proposal chosen [Apr 15 23:14:52 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f4d000 from freelist [Apr 15 23:14:52 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:14:56 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f4d800 from freelist [Apr 15 23:14:56 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:15:00 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f4f000 from freelist [Apr 15 23:15:00 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:15:18 PIC 1/6/0 KMD1]P1 SA 1618683269 timer expiry. ref cnt 1, timer reason Force delete timer expired (1), flags 0x230. [Apr 15 23:15:18 PIC 1/6/0 KMD1]iked_pm_ike_sa_delete_done_cb: For p1 sa index 1618683269, ref cnt 1, status: Error ok [Apr 15 23:15:18 PIC 1/6/0 KMD1]ike_remove_callback: Start, delete SA = { 7634596c 46c94e7e - 134299cb d30059de}, nego = -1 [Apr 15 23:15:18 PIC 1/6/0 KMD1]ike_delete_negotiation: Start, SA = { 7634596c 46c94e7e - 134299cb d30059de}, nego = -1 [Apr 15 23:15:18 PIC 1/6/0 KMD1]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Apr 15 23:15:18 PIC 1/6/0 KMD1]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Apr 15 23:15:18 PIC 1/6/0 KMD1]ike_sa_delete: Start, SA = { 7634596c 46c94e7e - 134299cb d30059de } [Apr 15 23:15:18 PIC 1/6/0 KMD1]ike_free_negotiation_isakmp: Start, nego = -1 [Apr 15 23:15:18 PIC 1/6/0 KMD1]ike_free_negotiation: Start, nego = -1 [Apr 15 23:15:18 PIC 1/6/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1618683269 (ref cnt 0), waiting_for_del 0x0 [Apr 15 23:15:18 PIC 1/6/0 KMD1]ike_free_sa: Start [Apr 15 23:16:37 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f73000 from freelist [Apr 15 23:16:37 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:16:37 PIC 1/7/0 KMD2]ike_sa_allocate: Start, SA = { 0381160a 55ab2ae9 - 22b9e942 3862f7fb } [Apr 15 23:16:37 PIC 1/7/0 KMD2]ike_decode_packet: Start [Apr 15 23:16:37 PIC 1/7/0 KMD2]ike_decode_packet: Start, SA = { 0381160a 55ab2ae9 - 1a56ebc6 fad804af} / 00000000, nego = -1 [Apr 15 23:16:37 PIC 1/7/0 KMD2]ike_decode_payload_sa: Start [Apr 15 23:16:37 PIC 1/7/0 KMD2]ike_decode_payload_t: Start, # trans = 1 [Apr 15 23:16:37 PIC 1/7/0 KMD2]ike_st_i_vid: VID[0..28] = 382b5e05 0cf5644e ... [Apr 15 23:16:37 PIC 1/7/0 KMD2]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Apr 15 23:16:37 PIC 1/7/0 KMD2]ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [Apr 15 23:16:37 PIC 1/7/0 KMD2]ike_st_i_sa_proposal: Start [Apr 15 23:16:37 PIC 1/7/0 KMD2]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 15 23:16:37 PIC 1/7/0 KMD2]ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error No proposal chosen (neg 100fc1000) [Apr 15 23:16:37 PIC 1/7/0 KMD2]ike_isakmp_sa_reply: Start [Apr 15 23:16:37 PIC 1/7/0 KMD2]ike_state_restart_packet: Start, restart packet SA = { 0381160a 55ab2ae9 - 1a56ebc6 fad804af}, nego = -1 [Apr 15 23:16:37 PIC 1/7/0 KMD2]ike_st_i_sa_proposal: Start [Apr 15 23:16:37 PIC 1/7/0 KMD2]ike_st_i_cr: Start [Apr 15 23:16:37 PIC 1/7/0 KMD2]ike_st_i_cert: Start [Apr 15 23:16:37 PIC 1/7/0 KMD2]ike_st_i_private: Start [Apr 15 23:16:37 PIC 1/7/0 KMD2]ike_st_o_sa_values: Start [Apr 15 23:16:37 PIC 1/7/0 KMD2]ike_alloc_negotiation: Start, SA = { 0381160a 55ab2ae9 - 1a56ebc6 fad804af} [Apr 15 23:16:37 PIC 1/7/0 KMD2]ike_encode_packet: Start, SA = { 0x0381160a 55ab2ae9 - 1a56ebc6 fad804af } / 9cee7503, nego = 0 [Apr 15 23:16:37 PIC 1/7/0 KMD2]ike_delete_negotiation: Start, SA = { 0381160a 55ab2ae9 - 1a56ebc6 fad804af}, nego = 0 [Apr 15 23:16:37 PIC 1/7/0 KMD2]ike_free_negotiation_info: Start, nego = 0 [Apr 15 23:16:37 PIC 1/7/0 KMD2]ike_free_negotiation: Start, nego = 0 [Apr 15 23:16:37 PIC 1/7/0 KMD2] IKEv1 Error : No proposal chosen [Apr 15 23:16:41 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f73800 from freelist [Apr 15 23:16:41 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:16:45 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f74000 from freelist [Apr 15 23:16:45 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:16:49 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f74800 from freelist [Apr 15 23:16:49 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:16:53 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f76000 from freelist [Apr 15 23:16:53 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:16:57 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f76800 from freelist [Apr 15 23:16:57 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:17:01 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f77000 from freelist [Apr 15 23:17:01 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:17:05 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f75000 from freelist [Apr 15 23:17:05 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:17:07 PIC 1/7/0 KMD2]P1 SA 1903895937 timer expiry. ref cnt 1, timer reason Force delete timer expired (1), flags 0x230. [Apr 15 23:17:07 PIC 1/7/0 KMD2]iked_pm_ike_sa_delete_done_cb: For p1 sa index 1903895937, ref cnt 1, status: Error ok [Apr 15 23:17:07 PIC 1/7/0 KMD2]ike_remove_callback: Start, delete SA = { 0381160a 55ab2ae9 - 1a56ebc6 fad804af}, nego = -1 [Apr 15 23:17:07 PIC 1/7/0 KMD2]ike_delete_negotiation: Start, SA = { 0381160a 55ab2ae9 - 1a56ebc6 fad804af}, nego = -1 [Apr 15 23:17:07 PIC 1/7/0 KMD2]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Apr 15 23:17:07 PIC 1/7/0 KMD2]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Apr 15 23:17:07 PIC 1/7/0 KMD2]ike_sa_delete: Start, SA = { 0381160a 55ab2ae9 - 1a56ebc6 fad804af } [Apr 15 23:17:07 PIC 1/7/0 KMD2]ike_free_negotiation_isakmp: Start, nego = -1 [Apr 15 23:17:07 PIC 1/7/0 KMD2]ike_free_negotiation: Start, nego = -1 [Apr 15 23:17:07 PIC 1/7/0 KMD2]iked_pm_p1_sa_destroy: p1 sa 1903895937 (ref cnt 0), waiting_for_del 0x0 [Apr 15 23:17:07 PIC 1/7/0 KMD2]ike_free_sa: Start [Apr 15 23:17:09 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f75800 from freelist [Apr 15 23:17:09 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:17:09 PIC 1/7/0 KMD2]ike_sa_allocate: Start, SA = { 0381160a 55ab2ae9 - 3909b3d4 abf13b47 } [Apr 15 23:17:09 PIC 1/7/0 KMD2]ike_decode_packet: Start [Apr 15 23:17:09 PIC 1/7/0 KMD2]ike_decode_packet: Start, SA = { 0381160a 55ab2ae9 - c8700470 269d414d} / 00000000, nego = -1 [Apr 15 23:17:09 PIC 1/7/0 KMD2]ike_decode_payload_sa: Start [Apr 15 23:17:09 PIC 1/7/0 KMD2]ike_decode_payload_t: Start, # trans = 1 [Apr 15 23:17:09 PIC 1/7/0 KMD2]ike_st_i_vid: VID[0..28] = 382b5e05 0cf5644e ... [Apr 15 23:17:09 PIC 1/7/0 KMD2]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Apr 15 23:17:09 PIC 1/7/0 KMD2]ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [Apr 15 23:17:09 PIC 1/7/0 KMD2]ike_st_i_sa_proposal: Start [Apr 15 23:17:09 PIC 1/7/0 KMD2]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 15 23:17:09 PIC 1/7/0 KMD2]ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error No proposal chosen (neg 100fc1000) [Apr 15 23:17:09 PIC 1/7/0 KMD2]ike_isakmp_sa_reply: Start [Apr 15 23:17:09 PIC 1/7/0 KMD2]ike_state_restart_packet: Start, restart packet SA = { 0381160a 55ab2ae9 - c8700470 269d414d}, nego = -1 [Apr 15 23:17:09 PIC 1/7/0 KMD2]ike_st_i_sa_proposal: Start [Apr 15 23:17:09 PIC 1/7/0 KMD2]ike_st_i_cr: Start [Apr 15 23:17:09 PIC 1/7/0 KMD2]ike_st_i_cert: Start [Apr 15 23:17:09 PIC 1/7/0 KMD2]ike_st_i_private: Start [Apr 15 23:17:09 PIC 1/7/0 KMD2]ike_st_o_sa_values: Start [Apr 15 23:17:09 PIC 1/7/0 KMD2]ike_alloc_negotiation: Start, SA = { 0381160a 55ab2ae9 - c8700470 269d414d} [Apr 15 23:17:09 PIC 1/7/0 KMD2]ike_encode_packet: Start, SA = { 0x0381160a 55ab2ae9 - c8700470 269d414d } / 51394df2, nego = 0 [Apr 15 23:17:09 PIC 1/7/0 KMD2]ike_delete_negotiation: Start, SA = { 0381160a 55ab2ae9 - c8700470 269d414d}, nego = 0 [Apr 15 23:17:09 PIC 1/7/0 KMD2]ike_free_negotiation_info: Start, nego = 0 [Apr 15 23:17:09 PIC 1/7/0 KMD2]ike_free_negotiation: Start, nego = 0 [Apr 15 23:17:09 PIC 1/7/0 KMD2] IKEv1 Error : No proposal chosen [Apr 15 23:17:13 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f77800 from freelist [Apr 15 23:17:13 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:17:17 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f78000 from freelist [Apr 15 23:17:17 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:17:21 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f78800 from freelist [Apr 15 23:17:21 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:17:39 PIC 1/7/0 KMD2]P1 SA 1903895938 timer expiry. ref cnt 1, timer reason Force delete timer expired (1), flags 0x230. [Apr 15 23:17:39 PIC 1/7/0 KMD2]iked_pm_ike_sa_delete_done_cb: For p1 sa index 1903895938, ref cnt 1, status: Error ok [Apr 15 23:17:39 PIC 1/7/0 KMD2]ike_remove_callback: Start, delete SA = { 0381160a 55ab2ae9 - c8700470 269d414d}, nego = -1 [Apr 15 23:17:39 PIC 1/7/0 KMD2]ike_delete_negotiation: Start, SA = { 0381160a 55ab2ae9 - c8700470 269d414d}, nego = -1 [Apr 15 23:17:39 PIC 1/7/0 KMD2]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Apr 15 23:17:39 PIC 1/7/0 KMD2]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Apr 15 23:17:39 PIC 1/7/0 KMD2]ike_sa_delete: Start, SA = { 0381160a 55ab2ae9 - c8700470 269d414d } [Apr 15 23:17:39 PIC 1/7/0 KMD2]ike_free_negotiation_isakmp: Start, nego = -1 [Apr 15 23:17:39 PIC 1/7/0 KMD2]ike_free_negotiation: Start, nego = -1 [Apr 15 23:17:39 PIC 1/7/0 KMD2]iked_pm_p1_sa_destroy: p1 sa 1903895938 (ref cnt 0), waiting_for_del 0x0 [Apr 15 23:17:39 PIC 1/7/0 KMD2]ike_free_sa: Start [Apr 15 23:18:58 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f6c000 from freelist [Apr 15 23:18:58 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:18:58 PIC 1/6/0 KMD2]ike_sa_allocate: Start, SA = { c2299021 09b30555 - 5c73e117 12c3a09a } [Apr 15 23:18:58 PIC 1/6/0 KMD2]ike_decode_packet: Start [Apr 15 23:18:58 PIC 1/6/0 KMD2]ike_decode_packet: Start, SA = { c2299021 09b30555 - 6a43689e 9f19abed} / 00000000, nego = -1 [Apr 15 23:18:58 PIC 1/6/0 KMD2]ike_decode_payload_sa: Start [Apr 15 23:18:58 PIC 1/6/0 KMD2]ike_decode_payload_t: Start, # trans = 1 [Apr 15 23:18:58 PIC 1/6/0 KMD2]ike_st_i_vid: VID[0..28] = 382b5e05 0cf5644e ... [Apr 15 23:18:58 PIC 1/6/0 KMD2]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Apr 15 23:18:58 PIC 1/6/0 KMD2]ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [Apr 15 23:18:58 PIC 1/6/0 KMD2]ike_st_i_sa_proposal: Start [Apr 15 23:18:58 PIC 1/6/0 KMD2]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 15 23:18:58 PIC 1/6/0 KMD2]ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error No proposal chosen (neg 100fc0000) [Apr 15 23:18:58 PIC 1/6/0 KMD2]ike_isakmp_sa_reply: Start [Apr 15 23:18:58 PIC 1/6/0 KMD2]ike_state_restart_packet: Start, restart packet SA = { c2299021 09b30555 - 6a43689e 9f19abed}, nego = -1 [Apr 15 23:18:58 PIC 1/6/0 KMD2]ike_st_i_sa_proposal: Start [Apr 15 23:18:58 PIC 1/6/0 KMD2]ike_st_i_cr: Start [Apr 15 23:18:58 PIC 1/6/0 KMD2]ike_st_i_cert: Start [Apr 15 23:18:58 PIC 1/6/0 KMD2]ike_st_i_private: Start [Apr 15 23:18:58 PIC 1/6/0 KMD2]ike_st_o_sa_values: Start [Apr 15 23:18:58 PIC 1/6/0 KMD2]ike_alloc_negotiation: Start, SA = { c2299021 09b30555 - 6a43689e 9f19abed} [Apr 15 23:18:58 PIC 1/6/0 KMD2]ike_encode_packet: Start, SA = { 0xc2299021 09b30555 - 6a43689e 9f19abed } / 3ece4b7d, nego = 0 [Apr 15 23:18:58 PIC 1/6/0 KMD2]ike_delete_negotiation: Start, SA = { c2299021 09b30555 - 6a43689e 9f19abed}, nego = 0 [Apr 15 23:18:58 PIC 1/6/0 KMD2]ike_free_negotiation_info: Start, nego = 0 [Apr 15 23:18:58 PIC 1/6/0 KMD2]ike_free_negotiation: Start, nego = 0 [Apr 15 23:18:58 PIC 1/6/0 KMD2] IKEv1 Error : No proposal chosen [Apr 15 23:19:02 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f6c800 from freelist [Apr 15 23:19:02 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:19:06 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f6d000 from freelist [Apr 15 23:19:06 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:19:10 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f6d800 from freelist [Apr 15 23:19:10 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:19:14 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f6e000 from freelist [Apr 15 23:19:14 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:19:16 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f78800 from freelist [Apr 15 23:19:16 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f78800/100fd2800] Setting ed pkt ctx from VR id 65535 to VR id 19) [Apr 15 23:19:16 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887118719 [Apr 15 23:19:16 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887118719 [Apr 15 23:19:16 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f78800/100fd2800] Received packet: HDR, SA, KE, Nonce, N(NAT_DETECTION_SOURCE_IP), N(NAT_DETECTION_DESTINATION_IP) [Apr 15 23:19:16 PIC 1/7/0 KMD1]iked_pm_dynamic_gw_local_addr_based_lookup: Found gateway matching local addr ike-gw-pRBS-cert for remote dynamic peer, sa_cfg[tunnel-pRBS-cert-TEMP] [Apr 15 23:19:16 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f79000 from freelist [Apr 15 23:19:17 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f79800 from freelist [Apr 15 23:19:17 PIC 1/7/0 KMD1]iked_pm_ike_conf_received: Received configuration payload CONF(type = 1, [0] type = IPv4 address (1), len = 0, no value; [1] type = IPv4 dns (3), len = 0, no value; ) from the IKE library. Action not supported. [Apr 15 23:19:17 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload MOBIKE supported from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887118719 [Apr 15 23:19:17 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload Additional IPv4 addresses from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887118719 [Apr 15 23:19:17 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload unknown from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887118719 [Apr 15 23:19:17 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f79800/100fd2800] Received packet: HDR, IDi, CERT, CERT, CERT, CERTREQ, AUTH, CP, SA, TSi, TSr, N(MOBIKE_SUPPORTED), N(ADDITIONAL_IP4_ADDRESS), N(RESERVED) [Apr 15 23:19:17 PIC 1/7/0 KMD1]iked_pm_id_validate id NOT matched. [Apr 15 23:19:17 PIC 1/7/0 KMD1]ikev2_reply_cb_public_key: [100f79800/100fd2800] Error: public_key failed: 24 [Apr 15 23:19:17 PIC 1/7/0 KMD1]ikev2_state_error: [100f79800/100fd2800] Negotiation failed because of error Authentication failed (24) [Apr 15 23:19:17 PIC 1/7/0 KMD1]IKE negotiation fail for local:10.185.49.212, remote:10.185.49.194 IKEv2 with status: Authentication failed [Apr 15 23:19:17 PIC 1/7/0 KMD1]IPSec negotiation failed for SA-CFG tunnel-pRBS-cert-TEMP for local:10.185.49.212, remote:10.185.49.194 IKEv2. status: Authentication failed [Apr 15 23:19:17 PIC 1/7/0 KMD1] P2 ed info: flags 0x0, P2 error: Error ok [Apr 15 23:19:17 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7b000 from freelist [Apr 15 23:19:18 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f6f800 from freelist [Apr 15 23:19:18 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:19:22 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f71000 from freelist [Apr 15 23:19:22 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:19:21 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7b800 from freelist [Apr 15 23:19:26 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f71800 from freelist [Apr 15 23:19:26 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:19:28 PIC 1/6/0 KMD2]P1 SA 1635460478 timer expiry. ref cnt 1, timer reason Force delete timer expired (1), flags 0x230. [Apr 15 23:19:28 PIC 1/6/0 KMD2]iked_pm_ike_sa_delete_done_cb: For p1 sa index 1635460478, ref cnt 1, status: Error ok [Apr 15 23:19:28 PIC 1/6/0 KMD2]ike_remove_callback: Start, delete SA = { c2299021 09b30555 - 6a43689e 9f19abed}, nego = -1 [Apr 15 23:19:28 PIC 1/6/0 KMD2]ike_delete_negotiation: Start, SA = { c2299021 09b30555 - 6a43689e 9f19abed}, nego = -1 [Apr 15 23:19:28 PIC 1/6/0 KMD2]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Apr 15 23:19:28 PIC 1/6/0 KMD2]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Apr 15 23:19:28 PIC 1/6/0 KMD2]ike_sa_delete: Start, SA = { c2299021 09b30555 - 6a43689e 9f19abed } [Apr 15 23:19:28 PIC 1/6/0 KMD2]ike_free_negotiation_isakmp: Start, nego = -1 [Apr 15 23:19:28 PIC 1/6/0 KMD2]ike_free_negotiation: Start, nego = -1 [Apr 15 23:19:28 PIC 1/6/0 KMD2]iked_pm_p1_sa_destroy: p1 sa 1635460478 (ref cnt 0), waiting_for_del 0x0 [Apr 15 23:19:28 PIC 1/6/0 KMD2]ike_free_sa: Start [Apr 15 23:19:30 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f6e800 from freelist [Apr 15 23:19:30 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:19:30 PIC 1/6/0 KMD2]ike_sa_allocate: Start, SA = { c2299021 09b30555 - 17fb83a3 8ece8bda } [Apr 15 23:19:30 PIC 1/6/0 KMD2]ike_decode_packet: Start [Apr 15 23:19:30 PIC 1/6/0 KMD2]ike_decode_packet: Start, SA = { c2299021 09b30555 - 0788f78a 7ed4a3f5} / 00000000, nego = -1 [Apr 15 23:19:30 PIC 1/6/0 KMD2]ike_decode_payload_sa: Start [Apr 15 23:19:30 PIC 1/6/0 KMD2]ike_decode_payload_t: Start, # trans = 1 [Apr 15 23:19:30 PIC 1/6/0 KMD2]ike_st_i_vid: VID[0..28] = 382b5e05 0cf5644e ... [Apr 15 23:19:30 PIC 1/6/0 KMD2]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Apr 15 23:19:30 PIC 1/6/0 KMD2]ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [Apr 15 23:19:30 PIC 1/6/0 KMD2]ike_st_i_sa_proposal: Start [Apr 15 23:19:30 PIC 1/6/0 KMD2]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 15 23:19:30 PIC 1/6/0 KMD2]ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error No proposal chosen (neg 100fc0000) [Apr 15 23:19:30 PIC 1/6/0 KMD2]ike_isakmp_sa_reply: Start [Apr 15 23:19:30 PIC 1/6/0 KMD2]ike_state_restart_packet: Start, restart packet SA = { c2299021 09b30555 - 0788f78a 7ed4a3f5}, nego = -1 [Apr 15 23:19:30 PIC 1/6/0 KMD2]ike_st_i_sa_proposal: Start [Apr 15 23:19:30 PIC 1/6/0 KMD2]ike_st_i_cr: Start [Apr 15 23:19:30 PIC 1/6/0 KMD2]ike_st_i_cert: Start [Apr 15 23:19:30 PIC 1/6/0 KMD2]ike_st_i_private: Start [Apr 15 23:19:30 PIC 1/6/0 KMD2]ike_st_o_sa_values: Start [Apr 15 23:19:30 PIC 1/6/0 KMD2]ike_alloc_negotiation: Start, SA = { c2299021 09b30555 - 0788f78a 7ed4a3f5} [Apr 15 23:19:30 PIC 1/6/0 KMD2]ike_encode_packet: Start, SA = { 0xc2299021 09b30555 - 0788f78a 7ed4a3f5 } / ba1b58da, nego = 0 [Apr 15 23:19:30 PIC 1/6/0 KMD2]ike_delete_negotiation: Start, SA = { c2299021 09b30555 - 0788f78a 7ed4a3f5}, nego = 0 [Apr 15 23:19:30 PIC 1/6/0 KMD2]ike_free_negotiation_info: Start, nego = 0 [Apr 15 23:19:30 PIC 1/6/0 KMD2]ike_free_negotiation: Start, nego = 0 [Apr 15 23:19:30 PIC 1/6/0 KMD2] IKEv1 Error : No proposal chosen [Apr 15 23:19:28 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7a800 from freelist [Apr 15 23:19:34 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f6f000 from freelist [Apr 15 23:19:34 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:19:38 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f72000 from freelist [Apr 15 23:19:38 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:19:42 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f70000 from freelist [Apr 15 23:19:42 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:19:41 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7c800 from freelist [Apr 15 23:19:46 PIC 1/7/0 KMD1]P1 SA 1887118719 timer expiry. ref cnt 0, timer reason Force delete timer expired (1), flags 0x200. [Apr 15 23:19:46 PIC 1/7/0 KMD1]IKE SA delete called for p1 sa 1887118719 (ref cnt 1) local:10.185.49.212, remote:10.185.49.194, IKEv2 [Apr 15 23:19:46 PIC 1/7/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1887118719 (ref cnt 0), waiting_for_del 0x0 [Apr 15 23:19:46 PIC 1/7/0 KMD1]iked_pm_ike_sa_delete_done_cb: For null p1 sa, status: Error ok [Apr 15 23:20:00 PIC 1/6/0 KMD2]P1 SA 1635460479 timer expiry. ref cnt 1, timer reason Force delete timer expired (1), flags 0x230. [Apr 15 23:20:00 PIC 1/6/0 KMD2]iked_pm_ike_sa_delete_done_cb: For p1 sa index 1635460479, ref cnt 1, status: Error ok [Apr 15 23:20:00 PIC 1/6/0 KMD2]ike_remove_callback: Start, delete SA = { c2299021 09b30555 - 0788f78a 7ed4a3f5}, nego = -1 [Apr 15 23:20:00 PIC 1/6/0 KMD2]ike_delete_negotiation: Start, SA = { c2299021 09b30555 - 0788f78a 7ed4a3f5}, nego = -1 [Apr 15 23:20:00 PIC 1/6/0 KMD2]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Apr 15 23:20:00 PIC 1/6/0 KMD2]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Apr 15 23:20:00 PIC 1/6/0 KMD2]ike_sa_delete: Start, SA = { c2299021 09b30555 - 0788f78a 7ed4a3f5 } [Apr 15 23:20:00 PIC 1/6/0 KMD2]ike_free_negotiation_isakmp: Start, nego = -1 [Apr 15 23:20:00 PIC 1/6/0 KMD2]ike_free_negotiation: Start, nego = -1 [Apr 15 23:20:00 PIC 1/6/0 KMD2]iked_pm_p1_sa_destroy: p1 sa 1635460479 (ref cnt 0), waiting_for_del 0x0 [Apr 15 23:20:00 PIC 1/6/0 KMD2]ike_free_sa: Start [Apr 15 23:21:19 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f4f800 from freelist [Apr 15 23:21:19 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:21:19 PIC 1/6/0 KMD1]ike_sa_allocate: Start, SA = { 870b01e9 ab4f397f - 0c044cd1 f7b0f516 } [Apr 15 23:21:19 PIC 1/6/0 KMD1]ike_decode_packet: Start [Apr 15 23:21:19 PIC 1/6/0 KMD1]ike_decode_packet: Start, SA = { 870b01e9 ab4f397f - 25c6ecec d074493c} / 00000000, nego = -1 [Apr 15 23:21:19 PIC 1/6/0 KMD1]ike_decode_payload_sa: Start [Apr 15 23:21:19 PIC 1/6/0 KMD1]ike_decode_payload_t: Start, # trans = 1 [Apr 15 23:21:19 PIC 1/6/0 KMD1]ike_st_i_vid: VID[0..28] = 382b5e05 0cf5644e ... [Apr 15 23:21:19 PIC 1/6/0 KMD1]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Apr 15 23:21:19 PIC 1/6/0 KMD1]ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [Apr 15 23:21:19 PIC 1/6/0 KMD1]ike_st_i_sa_proposal: Start [Apr 15 23:21:19 PIC 1/6/0 KMD1]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 15 23:21:19 PIC 1/6/0 KMD1]ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error No proposal chosen (neg 100fb9000) [Apr 15 23:21:19 PIC 1/6/0 KMD1]ike_isakmp_sa_reply: Start [Apr 15 23:21:19 PIC 1/6/0 KMD1]ike_state_restart_packet: Start, restart packet SA = { 870b01e9 ab4f397f - 25c6ecec d074493c}, nego = -1 [Apr 15 23:21:19 PIC 1/6/0 KMD1]ike_st_i_sa_proposal: Start [Apr 15 23:21:19 PIC 1/6/0 KMD1]ike_st_i_cr: Start [Apr 15 23:21:19 PIC 1/6/0 KMD1]ike_st_i_cert: Start [Apr 15 23:21:19 PIC 1/6/0 KMD1]ike_st_i_private: Start [Apr 15 23:21:19 PIC 1/6/0 KMD1]ike_st_o_sa_values: Start [Apr 15 23:21:19 PIC 1/6/0 KMD1]ike_alloc_negotiation: Start, SA = { 870b01e9 ab4f397f - 25c6ecec d074493c} [Apr 15 23:21:19 PIC 1/6/0 KMD1]ike_delete_negotiation: Start, SA = { 870b01e9 ab4f397f - 25c6ecec d074493c}, nego = 0 [Apr 15 23:21:19 PIC 1/6/0 KMD1]ike_free_negotiation_info: Start, nego = 0 [Apr 15 23:21:19 PIC 1/6/0 KMD1]ike_free_negotiation: Start, nego = 0 [Apr 15 23:21:19 PIC 1/6/0 KMD1] IKEv1 Error : No proposal chosen [Apr 15 23:21:23 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f50000 from freelist [Apr 15 23:21:23 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:21:27 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f4e000 from freelist [Apr 15 23:21:27 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:21:31 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f4e800 from freelist [Apr 15 23:21:31 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:21:35 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f50800 from freelist [Apr 15 23:21:35 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:21:39 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f51000 from freelist [Apr 15 23:21:39 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:21:43 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f52800 from freelist [Apr 15 23:21:43 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:21:47 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f54000 from freelist [Apr 15 23:21:47 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:21:49 PIC 1/6/0 KMD1]P1 SA 1618683270 timer expiry. ref cnt 1, timer reason Force delete timer expired (1), flags 0x230. [Apr 15 23:21:49 PIC 1/6/0 KMD1]iked_pm_ike_sa_delete_done_cb: For p1 sa index 1618683270, ref cnt 1, status: Error ok [Apr 15 23:21:49 PIC 1/6/0 KMD1]ike_remove_callback: Start, delete SA = { 870b01e9 ab4f397f - 25c6ecec d074493c}, nego = -1 [Apr 15 23:21:49 PIC 1/6/0 KMD1]ike_delete_negotiation: Start, SA = { 870b01e9 ab4f397f - 25c6ecec d074493c}, nego = -1 [Apr 15 23:21:49 PIC 1/6/0 KMD1]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Apr 15 23:21:49 PIC 1/6/0 KMD1]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Apr 15 23:21:49 PIC 1/6/0 KMD1]ike_sa_delete: Start, SA = { 870b01e9 ab4f397f - 25c6ecec d074493c } [Apr 15 23:21:49 PIC 1/6/0 KMD1]ike_free_negotiation_isakmp: Start, nego = -1 [Apr 15 23:21:49 PIC 1/6/0 KMD1]ike_free_negotiation: Start, nego = -1 [Apr 15 23:21:49 PIC 1/6/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1618683270 (ref cnt 0), waiting_for_del 0x0 [Apr 15 23:21:49 PIC 1/6/0 KMD1]ike_free_sa: Start [Apr 15 23:21:51 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f54800 from freelist [Apr 15 23:21:51 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:21:51 PIC 1/6/0 KMD1]ike_sa_allocate: Start, SA = { 870b01e9 ab4f397f - cfb97fd3 d6c3b3fc } [Apr 15 23:21:51 PIC 1/6/0 KMD1]ike_decode_packet: Start [Apr 15 23:21:51 PIC 1/6/0 KMD1]ike_decode_packet: Start, SA = { 870b01e9 ab4f397f - 272b589f ce8ee3c0} / 00000000, nego = -1 [Apr 15 23:21:51 PIC 1/6/0 KMD1]ike_decode_payload_sa: Start [Apr 15 23:21:51 PIC 1/6/0 KMD1]ike_decode_payload_t: Start, # trans = 1 [Apr 15 23:21:51 PIC 1/6/0 KMD1]ike_st_i_vid: VID[0..28] = 382b5e05 0cf5644e ... [Apr 15 23:21:51 PIC 1/6/0 KMD1]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Apr 15 23:21:51 PIC 1/6/0 KMD1]ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [Apr 15 23:21:51 PIC 1/6/0 KMD1]ike_st_i_sa_proposal: Start [Apr 15 23:21:51 PIC 1/6/0 KMD1]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 15 23:21:51 PIC 1/6/0 KMD1]ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error No proposal chosen (neg 100fb9000) [Apr 15 23:21:51 PIC 1/6/0 KMD1]ike_isakmp_sa_reply: Start [Apr 15 23:21:51 PIC 1/6/0 KMD1]ike_state_restart_packet: Start, restart packet SA = { 870b01e9 ab4f397f - 272b589f ce8ee3c0}, nego = -1 [Apr 15 23:21:51 PIC 1/6/0 KMD1]ike_st_i_sa_proposal: Start [Apr 15 23:21:51 PIC 1/6/0 KMD1]ike_st_i_cr: Start [Apr 15 23:21:51 PIC 1/6/0 KMD1]ike_st_i_cert: Start [Apr 15 23:21:51 PIC 1/6/0 KMD1]ike_st_i_private: Start [Apr 15 23:21:51 PIC 1/6/0 KMD1]ike_st_o_sa_values: Start [Apr 15 23:21:51 PIC 1/6/0 KMD1]ike_alloc_negotiation: Start, SA = { 870b01e9 ab4f397f - 272b589f ce8ee3c0} [Apr 15 23:21:51 PIC 1/6/0 KMD1]ike_encode_packet: Start, SA = { 0x870b01e9 ab4f397f - 272b589f ce8ee3c0 } / 6805f86d, nego = 0 [Apr 15 23:21:51 PIC 1/6/0 KMD1]ike_delete_negotiation: Start, SA = { 870b01e9 ab4f397f - 272b589f ce8ee3c0}, nego = 0 [Apr 15 23:21:51 PIC 1/6/0 KMD1]ike_free_negotiation_info: Start, nego = 0 [Apr 15 23:21:51 PIC 1/6/0 KMD1]ike_free_negotiation: Start, nego = 0 [Apr 15 23:21:51 PIC 1/6/0 KMD1] IKEv1 Error : No proposal chosen [Apr 15 23:21:55 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f51800 from freelist [Apr 15 23:21:55 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:21:59 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f52000 from freelist [Apr 15 23:21:59 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:22:03 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f55000 from freelist [Apr 15 23:22:03 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:22:21 PIC 1/6/0 KMD1]P1 SA 1618683271 timer expiry. ref cnt 1, timer reason Force delete timer expired (1), flags 0x230. [Apr 15 23:22:21 PIC 1/6/0 KMD1]iked_pm_ike_sa_delete_done_cb: For p1 sa index 1618683271, ref cnt 1, status: Error ok [Apr 15 23:22:21 PIC 1/6/0 KMD1]ike_remove_callback: Start, delete SA = { 870b01e9 ab4f397f - 272b589f ce8ee3c0}, nego = -1 [Apr 15 23:22:21 PIC 1/6/0 KMD1]ike_delete_negotiation: Start, SA = { 870b01e9 ab4f397f - 272b589f ce8ee3c0}, nego = -1 [Apr 15 23:22:21 PIC 1/6/0 KMD1]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Apr 15 23:22:21 PIC 1/6/0 KMD1]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Apr 15 23:22:21 PIC 1/6/0 KMD1]ike_sa_delete: Start, SA = { 870b01e9 ab4f397f - 272b589f ce8ee3c0 } [Apr 15 23:22:21 PIC 1/6/0 KMD1]ike_free_negotiation_isakmp: Start, nego = -1 [Apr 15 23:22:21 PIC 1/6/0 KMD1]ike_free_negotiation: Start, nego = -1 [Apr 15 23:22:21 PIC 1/6/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1618683271 (ref cnt 0), waiting_for_del 0x0 [Apr 15 23:22:21 PIC 1/6/0 KMD1]ike_free_sa: Start [Apr 15 23:23:40 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f79000 from freelist [Apr 15 23:23:40 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:23:40 PIC 1/7/0 KMD2]ike_sa_allocate: Start, SA = { 6c6eeff1 8c12fc33 - 53c4f9a8 7ccefd54 } [Apr 15 23:23:40 PIC 1/7/0 KMD2]ike_decode_packet: Start [Apr 15 23:23:40 PIC 1/7/0 KMD2]ike_decode_packet: Start, SA = { 6c6eeff1 8c12fc33 - 075bdb4b 26027365} / 00000000, nego = -1 [Apr 15 23:23:40 PIC 1/7/0 KMD2]ike_decode_payload_sa: Start [Apr 15 23:23:40 PIC 1/7/0 KMD2]ike_decode_payload_t: Start, # trans = 1 [Apr 15 23:23:40 PIC 1/7/0 KMD2]ike_st_i_vid: VID[0..28] = 382b5e05 0cf5644e ... [Apr 15 23:23:40 PIC 1/7/0 KMD2]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Apr 15 23:23:40 PIC 1/7/0 KMD2]ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [Apr 15 23:23:40 PIC 1/7/0 KMD2]ike_st_i_sa_proposal: Start [Apr 15 23:23:40 PIC 1/7/0 KMD2]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 15 23:23:40 PIC 1/7/0 KMD2]ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error No proposal chosen (neg 100fc1000) [Apr 15 23:23:40 PIC 1/7/0 KMD2]ike_isakmp_sa_reply: Start [Apr 15 23:23:40 PIC 1/7/0 KMD2]ike_state_restart_packet: Start, restart packet SA = { 6c6eeff1 8c12fc33 - 075bdb4b 26027365}, nego = -1 [Apr 15 23:23:40 PIC 1/7/0 KMD2]ike_st_i_sa_proposal: Start [Apr 15 23:23:40 PIC 1/7/0 KMD2]ike_st_i_cr: Start [Apr 15 23:23:40 PIC 1/7/0 KMD2]ike_st_i_cert: Start [Apr 15 23:23:40 PIC 1/7/0 KMD2]ike_st_i_private: Start [Apr 15 23:23:40 PIC 1/7/0 KMD2]ike_st_o_sa_values: Start [Apr 15 23:23:40 PIC 1/7/0 KMD2]ike_alloc_negotiation: Start, SA = { 6c6eeff1 8c12fc33 - 075bdb4b 26027365} [Apr 15 23:23:40 PIC 1/7/0 KMD2]ike_encode_packet: Start, SA = { 0x6c6eeff1 8c12fc33 - 075bdb4b 26027365 } / 2a94a075, nego = 0 [Apr 15 23:23:40 PIC 1/7/0 KMD2]ike_delete_negotiation: Start, SA = { 6c6eeff1 8c12fc33 - 075bdb4b 26027365}, nego = 0 [Apr 15 23:23:40 PIC 1/7/0 KMD2]ike_free_negotiation_info: Start, nego = 0 [Apr 15 23:23:40 PIC 1/7/0 KMD2]ike_free_negotiation: Start, nego = 0 [Apr 15 23:23:40 PIC 1/7/0 KMD2] IKEv1 Error : No proposal chosen [Apr 15 23:23:44 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f79800 from freelist [Apr 15 23:23:44 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:23:48 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f7a000 from freelist [Apr 15 23:23:48 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:23:52 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f7a800 from freelist [Apr 15 23:23:52 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:23:56 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f7b000 from freelist [Apr 15 23:23:56 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:24:00 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f7b800 from freelist [Apr 15 23:24:00 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:24:04 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f7c000 from freelist [Apr 15 23:24:04 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:24:08 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f7e800 from freelist [Apr 15 23:24:08 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:24:10 PIC 1/7/0 KMD2]P1 SA 1903895939 timer expiry. ref cnt 1, timer reason Force delete timer expired (1), flags 0x230. [Apr 15 23:24:10 PIC 1/7/0 KMD2]iked_pm_ike_sa_delete_done_cb: For p1 sa index 1903895939, ref cnt 1, status: Error ok [Apr 15 23:24:10 PIC 1/7/0 KMD2]ike_remove_callback: Start, delete SA = { 6c6eeff1 8c12fc33 - 075bdb4b 26027365}, nego = -1 [Apr 15 23:24:10 PIC 1/7/0 KMD2]ike_delete_negotiation: Start, SA = { 6c6eeff1 8c12fc33 - 075bdb4b 26027365}, nego = -1 [Apr 15 23:24:10 PIC 1/7/0 KMD2]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Apr 15 23:24:10 PIC 1/7/0 KMD2]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Apr 15 23:24:10 PIC 1/7/0 KMD2]ike_sa_delete: Start, SA = { 6c6eeff1 8c12fc33 - 075bdb4b 26027365 } [Apr 15 23:24:10 PIC 1/7/0 KMD2]ike_free_negotiation_isakmp: Start, nego = -1 [Apr 15 23:24:10 PIC 1/7/0 KMD2]ike_free_negotiation: Start, nego = -1 [Apr 15 23:24:10 PIC 1/7/0 KMD2]iked_pm_p1_sa_destroy: p1 sa 1903895939 (ref cnt 0), waiting_for_del 0x0 [Apr 15 23:24:10 PIC 1/7/0 KMD2]ike_free_sa: Start [Apr 15 23:24:12 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f4e000 from freelist [Apr 15 23:24:12 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:24:12 PIC 1/7/0 KMD2]ike_sa_allocate: Start, SA = { 6c6eeff1 8c12fc33 - 2b297de9 e43d4882 } [Apr 15 23:24:12 PIC 1/7/0 KMD2]ike_decode_packet: Start [Apr 15 23:24:12 PIC 1/7/0 KMD2]ike_decode_packet: Start, SA = { 6c6eeff1 8c12fc33 - ba2f7ea2 a7b8da2a} / 00000000, nego = -1 [Apr 15 23:24:12 PIC 1/7/0 KMD2]ike_decode_payload_sa: Start [Apr 15 23:24:12 PIC 1/7/0 KMD2]ike_decode_payload_t: Start, # trans = 1 [Apr 15 23:24:12 PIC 1/7/0 KMD2]ike_st_i_vid: VID[0..28] = 382b5e05 0cf5644e ... [Apr 15 23:24:12 PIC 1/7/0 KMD2]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Apr 15 23:24:12 PIC 1/7/0 KMD2]ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [Apr 15 23:24:12 PIC 1/7/0 KMD2]ike_st_i_sa_proposal: Start [Apr 15 23:24:12 PIC 1/7/0 KMD2]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 15 23:24:12 PIC 1/7/0 KMD2]ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error No proposal chosen (neg 100fc1000) [Apr 15 23:24:12 PIC 1/7/0 KMD2]ike_isakmp_sa_reply: Start [Apr 15 23:24:12 PIC 1/7/0 KMD2]ike_state_restart_packet: Start, restart packet SA = { 6c6eeff1 8c12fc33 - ba2f7ea2 a7b8da2a}, nego = -1 [Apr 15 23:24:12 PIC 1/7/0 KMD2]ike_st_i_sa_proposal: Start [Apr 15 23:24:12 PIC 1/7/0 KMD2]ike_st_i_cr: Start [Apr 15 23:24:12 PIC 1/7/0 KMD2]ike_st_i_cert: Start [Apr 15 23:24:12 PIC 1/7/0 KMD2]ike_st_i_private: Start [Apr 15 23:24:12 PIC 1/7/0 KMD2]ike_st_o_sa_values: Start [Apr 15 23:24:12 PIC 1/7/0 KMD2]ike_alloc_negotiation: Start, SA = { 6c6eeff1 8c12fc33 - ba2f7ea2 a7b8da2a} [Apr 15 23:24:12 PIC 1/7/0 KMD2]ike_encode_packet: Start, SA = { 0x6c6eeff1 8c12fc33 - ba2f7ea2 a7b8da2a } / a281913c, nego = 0 [Apr 15 23:24:12 PIC 1/7/0 KMD2]ike_delete_negotiation: Start, SA = { 6c6eeff1 8c12fc33 - ba2f7ea2 a7b8da2a}, nego = 0 [Apr 15 23:24:12 PIC 1/7/0 KMD2]ike_free_negotiation_info: Start, nego = 0 [Apr 15 23:24:12 PIC 1/7/0 KMD2]ike_free_negotiation: Start, nego = 0 [Apr 15 23:24:12 PIC 1/7/0 KMD2] IKEv1 Error : No proposal chosen [Apr 15 23:24:16 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f4d000 from freelist [Apr 15 23:24:16 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:24:20 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f7c800 from freelist [Apr 15 23:24:20 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:24:24 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f7e000 from freelist [Apr 15 23:24:24 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:24:42 PIC 1/7/0 KMD2]P1 SA 1903895940 timer expiry. ref cnt 1, timer reason Force delete timer expired (1), flags 0x230. [Apr 15 23:24:42 PIC 1/7/0 KMD2]iked_pm_ike_sa_delete_done_cb: For p1 sa index 1903895940, ref cnt 1, status: Error ok [Apr 15 23:24:42 PIC 1/7/0 KMD2]ike_remove_callback: Start, delete SA = { 6c6eeff1 8c12fc33 - ba2f7ea2 a7b8da2a}, nego = -1 [Apr 15 23:24:42 PIC 1/7/0 KMD2]ike_delete_negotiation: Start, SA = { 6c6eeff1 8c12fc33 - ba2f7ea2 a7b8da2a}, nego = -1 [Apr 15 23:24:42 PIC 1/7/0 KMD2]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Apr 15 23:24:42 PIC 1/7/0 KMD2]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Apr 15 23:24:42 PIC 1/7/0 KMD2]ike_sa_delete: Start, SA = { 6c6eeff1 8c12fc33 - ba2f7ea2 a7b8da2a } [Apr 15 23:24:42 PIC 1/7/0 KMD2]ike_free_negotiation_isakmp: Start, nego = -1 [Apr 15 23:24:42 PIC 1/7/0 KMD2]ike_free_negotiation: Start, nego = -1 [Apr 15 23:24:42 PIC 1/7/0 KMD2]iked_pm_p1_sa_destroy: p1 sa 1903895940 (ref cnt 0), waiting_for_del 0x0 [Apr 15 23:24:42 PIC 1/7/0 KMD2]ike_free_sa: Start [Apr 15 23:26:01 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f70800 from freelist [Apr 15 23:26:01 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:26:01 PIC 1/6/0 KMD2]ike_sa_allocate: Start, SA = { 7ec112f9 7026d9f6 - 21a40a80 734a1dd4 } [Apr 15 23:26:01 PIC 1/6/0 KMD2]ike_decode_packet: Start [Apr 15 23:26:01 PIC 1/6/0 KMD2]ike_decode_packet: Start, SA = { 7ec112f9 7026d9f6 - 0379e3a2 92914aa7} / 00000000, nego = -1 [Apr 15 23:26:01 PIC 1/6/0 KMD2]ike_decode_payload_sa: Start [Apr 15 23:26:01 PIC 1/6/0 KMD2]ike_decode_payload_t: Start, # trans = 1 [Apr 15 23:26:01 PIC 1/6/0 KMD2]ike_st_i_vid: VID[0..28] = 382b5e05 0cf5644e ... [Apr 15 23:26:01 PIC 1/6/0 KMD2]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Apr 15 23:26:01 PIC 1/6/0 KMD2]ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [Apr 15 23:26:01 PIC 1/6/0 KMD2]ike_st_i_sa_proposal: Start [Apr 15 23:26:01 PIC 1/6/0 KMD2]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 15 23:26:01 PIC 1/6/0 KMD2]ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error No proposal chosen (neg 100fc0000) [Apr 15 23:26:01 PIC 1/6/0 KMD2]ike_isakmp_sa_reply: Start [Apr 15 23:26:01 PIC 1/6/0 KMD2]ike_state_restart_packet: Start, restart packet SA = { 7ec112f9 7026d9f6 - 0379e3a2 92914aa7}, nego = -1 [Apr 15 23:26:01 PIC 1/6/0 KMD2]ike_st_i_sa_proposal: Start [Apr 15 23:26:01 PIC 1/6/0 KMD2]ike_st_i_cr: Start [Apr 15 23:26:01 PIC 1/6/0 KMD2]ike_st_i_cert: Start [Apr 15 23:26:01 PIC 1/6/0 KMD2]ike_st_i_private: Start [Apr 15 23:26:01 PIC 1/6/0 KMD2]ike_st_o_sa_values: Start [Apr 15 23:26:01 PIC 1/6/0 KMD2]ike_alloc_negotiation: Start, SA = { 7ec112f9 7026d9f6 - 0379e3a2 92914aa7} [Apr 15 23:26:01 PIC 1/6/0 KMD2]ike_encode_packet: Start, SA = { 0x7ec112f9 7026d9f6 - 0379e3a2 92914aa7 } / 03e79ac6, nego = 0 [Apr 15 23:26:01 PIC 1/6/0 KMD2]ike_delete_negotiation: Start, SA = { 7ec112f9 7026d9f6 - 0379e3a2 92914aa7}, nego = 0 [Apr 15 23:26:01 PIC 1/6/0 KMD2]ike_free_negotiation_info: Start, nego = 0 [Apr 15 23:26:01 PIC 1/6/0 KMD2]ike_free_negotiation: Start, nego = 0 [Apr 15 23:26:01 PIC 1/6/0 KMD2] IKEv1 Error : No proposal chosen [Apr 15 23:26:05 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f73800 from freelist [Apr 15 23:26:05 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:26:09 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f74000 from freelist [Apr 15 23:26:09 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:26:13 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f74800 from freelist [Apr 15 23:26:13 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:26:17 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f72800 from freelist [Apr 15 23:26:17 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:26:21 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f73000 from freelist [Apr 15 23:26:21 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:26:25 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f75000 from freelist [Apr 15 23:26:25 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:26:29 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f75800 from freelist [Apr 15 23:26:29 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:26:31 PIC 1/6/0 KMD2]P1 SA 1635460480 timer expiry. ref cnt 1, timer reason Force delete timer expired (1), flags 0x230. [Apr 15 23:26:31 PIC 1/6/0 KMD2]iked_pm_ike_sa_delete_done_cb: For p1 sa index 1635460480, ref cnt 1, status: Error ok [Apr 15 23:26:31 PIC 1/6/0 KMD2]ike_remove_callback: Start, delete SA = { 7ec112f9 7026d9f6 - 0379e3a2 92914aa7}, nego = -1 [Apr 15 23:26:31 PIC 1/6/0 KMD2]ike_delete_negotiation: Start, SA = { 7ec112f9 7026d9f6 - 0379e3a2 92914aa7}, nego = -1 [Apr 15 23:26:31 PIC 1/6/0 KMD2]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Apr 15 23:26:31 PIC 1/6/0 KMD2]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Apr 15 23:26:31 PIC 1/6/0 KMD2]ike_sa_delete: Start, SA = { 7ec112f9 7026d9f6 - 0379e3a2 92914aa7 } [Apr 15 23:26:31 PIC 1/6/0 KMD2]ike_free_negotiation_isakmp: Start, nego = -1 [Apr 15 23:26:31 PIC 1/6/0 KMD2]ike_free_negotiation: Start, nego = -1 [Apr 15 23:26:31 PIC 1/6/0 KMD2]iked_pm_p1_sa_destroy: p1 sa 1635460480 (ref cnt 0), waiting_for_del 0x0 [Apr 15 23:26:31 PIC 1/6/0 KMD2]ike_free_sa: Start [Apr 15 23:26:33 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f76000 from freelist [Apr 15 23:26:33 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:26:33 PIC 1/6/0 KMD2]ike_sa_allocate: Start, SA = { 7ec112f9 7026d9f6 - 4c5461ee 7eba16ad } [Apr 15 23:26:33 PIC 1/6/0 KMD2]ike_decode_packet: Start [Apr 15 23:26:33 PIC 1/6/0 KMD2]ike_decode_packet: Start, SA = { 7ec112f9 7026d9f6 - d5fa61b9 2357ca5a} / 00000000, nego = -1 [Apr 15 23:26:33 PIC 1/6/0 KMD2]ike_decode_payload_sa: Start [Apr 15 23:26:33 PIC 1/6/0 KMD2]ike_decode_payload_t: Start, # trans = 1 [Apr 15 23:26:33 PIC 1/6/0 KMD2]ike_st_i_vid: VID[0..28] = 382b5e05 0cf5644e ... [Apr 15 23:26:33 PIC 1/6/0 KMD2]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Apr 15 23:26:33 PIC 1/6/0 KMD2]ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [Apr 15 23:26:33 PIC 1/6/0 KMD2]ike_st_i_sa_proposal: Start [Apr 15 23:26:33 PIC 1/6/0 KMD2]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 15 23:26:33 PIC 1/6/0 KMD2]ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error No proposal chosen (neg 100fc0000) [Apr 15 23:26:33 PIC 1/6/0 KMD2]ike_isakmp_sa_reply: Start [Apr 15 23:26:33 PIC 1/6/0 KMD2]ike_state_restart_packet: Start, restart packet SA = { 7ec112f9 7026d9f6 - d5fa61b9 2357ca5a}, nego = -1 [Apr 15 23:26:33 PIC 1/6/0 KMD2]ike_st_i_sa_proposal: Start [Apr 15 23:26:33 PIC 1/6/0 KMD2]ike_st_i_cr: Start [Apr 15 23:26:33 PIC 1/6/0 KMD2]ike_st_i_cert: Start [Apr 15 23:26:33 PIC 1/6/0 KMD2]ike_st_i_private: Start [Apr 15 23:26:33 PIC 1/6/0 KMD2]ike_st_o_sa_values: Start [Apr 15 23:26:33 PIC 1/6/0 KMD2]ike_alloc_negotiation: Start, SA = { 7ec112f9 7026d9f6 - d5fa61b9 2357ca5a} [Apr 15 23:26:33 PIC 1/6/0 KMD2]ike_encode_packet: Start, SA = { 0x7ec112f9 7026d9f6 - d5fa61b9 2357ca5a } / f92c2c43, nego = 0 [Apr 15 23:26:33 PIC 1/6/0 KMD2]ike_delete_negotiation: Start, SA = { 7ec112f9 7026d9f6 - d5fa61b9 2357ca5a}, nego = 0 [Apr 15 23:26:33 PIC 1/6/0 KMD2]ike_free_negotiation_info: Start, nego = 0 [Apr 15 23:26:33 PIC 1/6/0 KMD2]ike_free_negotiation: Start, nego = 0 [Apr 15 23:26:33 PIC 1/6/0 KMD2] IKEv1 Error : No proposal chosen [Apr 15 23:26:37 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f77800 from freelist [Apr 15 23:26:37 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:26:41 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f79000 from freelist [Apr 15 23:26:41 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:26:45 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f7a800 from freelist [Apr 15 23:26:45 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:27:03 PIC 1/6/0 KMD2]P1 SA 1635460481 timer expiry. ref cnt 1, timer reason Force delete timer expired (1), flags 0x230. [Apr 15 23:27:03 PIC 1/6/0 KMD2]iked_pm_ike_sa_delete_done_cb: For p1 sa index 1635460481, ref cnt 1, status: Error ok [Apr 15 23:27:03 PIC 1/6/0 KMD2]ike_remove_callback: Start, delete SA = { 7ec112f9 7026d9f6 - d5fa61b9 2357ca5a}, nego = -1 [Apr 15 23:27:03 PIC 1/6/0 KMD2]ike_delete_negotiation: Start, SA = { 7ec112f9 7026d9f6 - d5fa61b9 2357ca5a}, nego = -1 [Apr 15 23:27:03 PIC 1/6/0 KMD2]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Apr 15 23:27:03 PIC 1/6/0 KMD2]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Apr 15 23:27:03 PIC 1/6/0 KMD2]ike_sa_delete: Start, SA = { 7ec112f9 7026d9f6 - d5fa61b9 2357ca5a } [Apr 15 23:27:03 PIC 1/6/0 KMD2]ike_free_negotiation_isakmp: Start, nego = -1 [Apr 15 23:27:03 PIC 1/6/0 KMD2]ike_free_negotiation: Start, nego = -1 [Apr 15 23:27:03 PIC 1/6/0 KMD2]iked_pm_p1_sa_destroy: p1 sa 1635460481 (ref cnt 0), waiting_for_del 0x0 [Apr 15 23:27:03 PIC 1/6/0 KMD2]ike_free_sa: Start [Apr 15 23:28:22 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7e000 from freelist [Apr 15 23:28:22 PIC 1/7/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:28:22 PIC 1/7/0 KMD1]ike_sa_allocate: Start, SA = { 6f22af9c dc186cad - 1604e367 5c599043 } [Apr 15 23:28:22 PIC 1/7/0 KMD1]ike_decode_packet: Start [Apr 15 23:28:22 PIC 1/7/0 KMD1]ike_decode_packet: Start, SA = { 6f22af9c dc186cad - fe33cd12 9cd85d7d} / 00000000, nego = -1 [Apr 15 23:28:22 PIC 1/7/0 KMD1]ike_decode_payload_sa: Start [Apr 15 23:28:22 PIC 1/7/0 KMD1]ike_decode_payload_t: Start, # trans = 1 [Apr 15 23:28:22 PIC 1/7/0 KMD1]ike_st_i_vid: VID[0..28] = 382b5e05 0cf5644e ... [Apr 15 23:28:22 PIC 1/7/0 KMD1]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Apr 15 23:28:22 PIC 1/7/0 KMD1]ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [Apr 15 23:28:22 PIC 1/7/0 KMD1]ike_st_i_sa_proposal: Start [Apr 15 23:28:22 PIC 1/7/0 KMD1]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 15 23:28:22 PIC 1/7/0 KMD1]ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error No proposal chosen (neg 100fc1000) [Apr 15 23:28:22 PIC 1/7/0 KMD1]ike_isakmp_sa_reply: Start [Apr 15 23:28:22 PIC 1/7/0 KMD1]ike_state_restart_packet: Start, restart packet SA = { 6f22af9c dc186cad - fe33cd12 9cd85d7d}, nego = -1 [Apr 15 23:28:22 PIC 1/7/0 KMD1]ike_st_i_sa_proposal: Start [Apr 15 23:28:22 PIC 1/7/0 KMD1]ike_st_i_cr: Start [Apr 15 23:28:22 PIC 1/7/0 KMD1]ike_st_i_cert: Start [Apr 15 23:28:22 PIC 1/7/0 KMD1]ike_st_i_private: Start [Apr 15 23:28:22 PIC 1/7/0 KMD1]ike_st_o_sa_values: Start [Apr 15 23:28:22 PIC 1/7/0 KMD1]ike_alloc_negotiation: Start, SA = { 6f22af9c dc186cad - fe33cd12 9cd85d7d} [Apr 15 23:28:22 PIC 1/7/0 KMD1]ike_encode_packet: Start, SA = { 0x6f22af9c dc186cad - fe33cd12 9cd85d7d } / 30b7f218, nego = 0 [Apr 15 23:28:22 PIC 1/7/0 KMD1]ike_delete_negotiation: Start, SA = { 6f22af9c dc186cad - fe33cd12 9cd85d7d}, nego = 0 [Apr 15 23:28:22 PIC 1/7/0 KMD1]ike_free_negotiation_info: Start, nego = 0 [Apr 15 23:28:22 PIC 1/7/0 KMD1]ike_free_negotiation: Start, nego = 0 [Apr 15 23:28:22 PIC 1/7/0 KMD1] IKEv1 Error : No proposal chosen [Apr 15 23:28:26 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7c000 from freelist [Apr 15 23:28:26 PIC 1/7/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:28:30 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7a000 from freelist [Apr 15 23:28:30 PIC 1/7/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:28:34 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7f800 from freelist [Apr 15 23:28:34 PIC 1/7/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:28:38 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f4d000 from freelist [Apr 15 23:28:38 PIC 1/7/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:28:42 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f4d800 from freelist [Apr 15 23:28:42 PIC 1/7/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:28:46 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7e800 from freelist [Apr 15 23:28:46 PIC 1/7/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:28:50 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7f000 from freelist [Apr 15 23:28:50 PIC 1/7/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:28:52 PIC 1/7/0 KMD1]P1 SA 1887118720 timer expiry. ref cnt 1, timer reason Force delete timer expired (1), flags 0x230. [Apr 15 23:28:52 PIC 1/7/0 KMD1]iked_pm_ike_sa_delete_done_cb: For p1 sa index 1887118720, ref cnt 1, status: Error ok [Apr 15 23:28:52 PIC 1/7/0 KMD1]ike_remove_callback: Start, delete SA = { 6f22af9c dc186cad - fe33cd12 9cd85d7d}, nego = -1 [Apr 15 23:28:52 PIC 1/7/0 KMD1]ike_delete_negotiation: Start, SA = { 6f22af9c dc186cad - fe33cd12 9cd85d7d}, nego = -1 [Apr 15 23:28:52 PIC 1/7/0 KMD1]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Apr 15 23:28:52 PIC 1/7/0 KMD1]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Apr 15 23:28:52 PIC 1/7/0 KMD1]ike_sa_delete: Start, SA = { 6f22af9c dc186cad - fe33cd12 9cd85d7d } [Apr 15 23:28:52 PIC 1/7/0 KMD1]ike_free_negotiation_isakmp: Start, nego = -1 [Apr 15 23:28:52 PIC 1/7/0 KMD1]ike_free_negotiation: Start, nego = -1 [Apr 15 23:28:52 PIC 1/7/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1887118720 (ref cnt 0), waiting_for_del 0x0 [Apr 15 23:28:52 PIC 1/7/0 KMD1]ike_free_sa: Start [Apr 15 23:28:54 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f4e000 from freelist [Apr 15 23:28:54 PIC 1/7/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:28:54 PIC 1/7/0 KMD1]ike_sa_allocate: Start, SA = { 6f22af9c dc186cad - 9cafd6a1 a025d442 } [Apr 15 23:28:54 PIC 1/7/0 KMD1]ike_decode_packet: Start [Apr 15 23:28:54 PIC 1/7/0 KMD1]ike_decode_packet: Start, SA = { 6f22af9c dc186cad - 307fa143 3be416d7} / 00000000, nego = -1 [Apr 15 23:28:54 PIC 1/7/0 KMD1]ike_decode_payload_sa: Start [Apr 15 23:28:54 PIC 1/7/0 KMD1]ike_decode_payload_t: Start, # trans = 1 [Apr 15 23:28:54 PIC 1/7/0 KMD1]ike_st_i_vid: VID[0..28] = 382b5e05 0cf5644e ... [Apr 15 23:28:54 PIC 1/7/0 KMD1]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Apr 15 23:28:54 PIC 1/7/0 KMD1]ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [Apr 15 23:28:54 PIC 1/7/0 KMD1]ike_st_i_sa_proposal: Start [Apr 15 23:28:54 PIC 1/7/0 KMD1]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 15 23:28:54 PIC 1/7/0 KMD1]ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error No proposal chosen (neg 100fc1000) [Apr 15 23:28:54 PIC 1/7/0 KMD1]ike_isakmp_sa_reply: Start [Apr 15 23:28:54 PIC 1/7/0 KMD1]ike_state_restart_packet: Start, restart packet SA = { 6f22af9c dc186cad - 307fa143 3be416d7}, nego = -1 [Apr 15 23:28:54 PIC 1/7/0 KMD1]ike_st_i_sa_proposal: Start [Apr 15 23:28:54 PIC 1/7/0 KMD1]ike_st_i_cr: Start [Apr 15 23:28:54 PIC 1/7/0 KMD1]ike_st_i_cert: Start [Apr 15 23:28:54 PIC 1/7/0 KMD1]ike_st_i_private: Start [Apr 15 23:28:54 PIC 1/7/0 KMD1]ike_st_o_sa_values: Start [Apr 15 23:28:54 PIC 1/7/0 KMD1]ike_alloc_negotiation: Start, SA = { 6f22af9c dc186cad - 307fa143 3be416d7} [Apr 15 23:28:54 PIC 1/7/0 KMD1]ike_encode_packet: Start, SA = { 0x6f22af9c dc186cad - 307fa143 3be416d7 } / 30dd47ef, nego = 0 [Apr 15 23:28:54 PIC 1/7/0 KMD1]ike_delete_negotiation: Start, SA = { 6f22af9c dc186cad - 307fa143 3be416d7}, nego = 0 [Apr 15 23:28:54 PIC 1/7/0 KMD1]ike_free_negotiation_info: Start, nego = 0 [Apr 15 23:28:54 PIC 1/7/0 KMD1]ike_free_negotiation: Start, nego = 0 [Apr 15 23:28:54 PIC 1/7/0 KMD1] IKEv1 Error : No proposal chosen [Apr 15 23:28:58 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f4e800 from freelist [Apr 15 23:28:58 PIC 1/7/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:29:02 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f4f000 from freelist [Apr 15 23:29:02 PIC 1/7/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:29:06 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f4f800 from freelist [Apr 15 23:29:06 PIC 1/7/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:29:24 PIC 1/7/0 KMD1]P1 SA 1887118721 timer expiry. ref cnt 1, timer reason Force delete timer expired (1), flags 0x230. [Apr 15 23:29:24 PIC 1/7/0 KMD1]iked_pm_ike_sa_delete_done_cb: For p1 sa index 1887118721, ref cnt 1, status: Error ok [Apr 15 23:29:24 PIC 1/7/0 KMD1]ike_remove_callback: Start, delete SA = { 6f22af9c dc186cad - 307fa143 3be416d7}, nego = -1 [Apr 15 23:29:24 PIC 1/7/0 KMD1]ike_delete_negotiation: Start, SA = { 6f22af9c dc186cad - 307fa143 3be416d7}, nego = -1 [Apr 15 23:29:24 PIC 1/7/0 KMD1]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Apr 15 23:29:24 PIC 1/7/0 KMD1]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Apr 15 23:29:24 PIC 1/7/0 KMD1]ike_sa_delete: Start, SA = { 6f22af9c dc186cad - 307fa143 3be416d7 } [Apr 15 23:29:24 PIC 1/7/0 KMD1]ike_free_negotiation_isakmp: Start, nego = -1 [Apr 15 23:29:24 PIC 1/7/0 KMD1]ike_free_negotiation: Start, nego = -1 [Apr 15 23:29:24 PIC 1/7/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1887118721 (ref cnt 0), waiting_for_del 0x0 [Apr 15 23:29:24 PIC 1/7/0 KMD1]ike_free_sa: Start [Apr 15 23:30:43 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f53000 from freelist [Apr 15 23:30:43 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:30:43 PIC 1/6/0 KMD1]ike_sa_allocate: Start, SA = { 712e053e eec8e324 - 0652968d cfeed324 } [Apr 15 23:30:43 PIC 1/6/0 KMD1]ike_decode_packet: Start [Apr 15 23:30:43 PIC 1/6/0 KMD1]ike_decode_packet: Start, SA = { 712e053e eec8e324 - 9deb3c07 9048c18a} / 00000000, nego = -1 [Apr 15 23:30:43 PIC 1/6/0 KMD1]ike_decode_payload_sa: Start [Apr 15 23:30:43 PIC 1/6/0 KMD1]ike_decode_payload_t: Start, # trans = 1 [Apr 15 23:30:43 PIC 1/6/0 KMD1]ike_st_i_vid: VID[0..28] = 382b5e05 0cf5644e ... [Apr 15 23:30:43 PIC 1/6/0 KMD1]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Apr 15 23:30:43 PIC 1/6/0 KMD1]ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [Apr 15 23:30:43 PIC 1/6/0 KMD1]ike_st_i_sa_proposal: Start [Apr 15 23:30:43 PIC 1/6/0 KMD1]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 15 23:30:43 PIC 1/6/0 KMD1]ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error No proposal chosen (neg 100fb9000) [Apr 15 23:30:43 PIC 1/6/0 KMD1]ike_isakmp_sa_reply: Start [Apr 15 23:30:43 PIC 1/6/0 KMD1]ike_state_restart_packet: Start, restart packet SA = { 712e053e eec8e324 - 9deb3c07 9048c18a}, nego = -1 [Apr 15 23:30:43 PIC 1/6/0 KMD1]ike_st_i_sa_proposal: Start [Apr 15 23:30:43 PIC 1/6/0 KMD1]ike_st_i_cr: Start [Apr 15 23:30:43 PIC 1/6/0 KMD1]ike_st_i_cert: Start [Apr 15 23:30:43 PIC 1/6/0 KMD1]ike_st_i_private: Start [Apr 15 23:30:43 PIC 1/6/0 KMD1]ike_st_o_sa_values: Start [Apr 15 23:30:43 PIC 1/6/0 KMD1]ike_alloc_negotiation: Start, SA = { 712e053e eec8e324 - 9deb3c07 9048c18a} [Apr 15 23:30:43 PIC 1/6/0 KMD1]ike_encode_packet: Start, SA = { 0x712e053e eec8e324 - 9deb3c07 9048c18a } / 83e8953e, nego = 0 [Apr 15 23:30:43 PIC 1/6/0 KMD1]ike_delete_negotiation: Start, SA = { 712e053e eec8e324 - 9deb3c07 9048c18a}, nego = 0 [Apr 15 23:30:43 PIC 1/6/0 KMD1]ike_free_negotiation_info: Start, nego = 0 [Apr 15 23:30:43 PIC 1/6/0 KMD1]ike_free_negotiation: Start, nego = 0 [Apr 15 23:30:43 PIC 1/6/0 KMD1] IKEv1 Error : No proposal chosen [Apr 15 23:30:47 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f53800 from freelist [Apr 15 23:30:47 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:30:51 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f55800 from freelist [Apr 15 23:30:51 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:30:55 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f56000 from freelist [Apr 15 23:30:55 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:30:59 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f56800 from freelist [Apr 15 23:30:59 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:31:03 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f57000 from freelist [Apr 15 23:31:03 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:31:07 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f57800 from freelist [Apr 15 23:31:07 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:31:11 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f58000 from freelist [Apr 15 23:31:11 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:31:13 PIC 1/6/0 KMD1]P1 SA 1618683272 timer expiry. ref cnt 1, timer reason Force delete timer expired (1), flags 0x230. [Apr 15 23:31:13 PIC 1/6/0 KMD1]iked_pm_ike_sa_delete_done_cb: For p1 sa index 1618683272, ref cnt 1, status: Error ok [Apr 15 23:31:13 PIC 1/6/0 KMD1]ike_remove_callback: Start, delete SA = { 712e053e eec8e324 - 9deb3c07 9048c18a}, nego = -1 [Apr 15 23:31:13 PIC 1/6/0 KMD1]ike_delete_negotiation: Start, SA = { 712e053e eec8e324 - 9deb3c07 9048c18a}, nego = -1 [Apr 15 23:31:13 PIC 1/6/0 KMD1]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Apr 15 23:31:13 PIC 1/6/0 KMD1]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Apr 15 23:31:13 PIC 1/6/0 KMD1]ike_sa_delete: Start, SA = { 712e053e eec8e324 - 9deb3c07 9048c18a } [Apr 15 23:31:13 PIC 1/6/0 KMD1]ike_free_negotiation_isakmp: Start, nego = -1 [Apr 15 23:31:13 PIC 1/6/0 KMD1]ike_free_negotiation: Start, nego = -1 [Apr 15 23:31:13 PIC 1/6/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1618683272 (ref cnt 0), waiting_for_del 0x0 [Apr 15 23:31:13 PIC 1/6/0 KMD1]ike_free_sa: Start [Apr 15 23:31:15 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f58800 from freelist [Apr 15 23:31:15 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:31:15 PIC 1/6/0 KMD1]ike_sa_allocate: Start, SA = { 712e053e eec8e324 - 9d0c945b d7449797 } [Apr 15 23:31:15 PIC 1/6/0 KMD1]ike_decode_packet: Start [Apr 15 23:31:15 PIC 1/6/0 KMD1]ike_decode_packet: Start, SA = { 712e053e eec8e324 - 448249a1 baa0c88e} / 00000000, nego = -1 [Apr 15 23:31:15 PIC 1/6/0 KMD1]ike_decode_payload_sa: Start [Apr 15 23:31:15 PIC 1/6/0 KMD1]ike_decode_payload_t: Start, # trans = 1 [Apr 15 23:31:15 PIC 1/6/0 KMD1]ike_st_i_vid: VID[0..28] = 382b5e05 0cf5644e ... [Apr 15 23:31:15 PIC 1/6/0 KMD1]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Apr 15 23:31:15 PIC 1/6/0 KMD1]ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [Apr 15 23:31:15 PIC 1/6/0 KMD1]ike_st_i_sa_proposal: Start [Apr 15 23:31:15 PIC 1/6/0 KMD1]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 15 23:31:15 PIC 1/6/0 KMD1]ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error No proposal chosen (neg 100fb9000) [Apr 15 23:31:15 PIC 1/6/0 KMD1]ike_isakmp_sa_reply: Start [Apr 15 23:31:15 PIC 1/6/0 KMD1]ike_state_restart_packet: Start, restart packet SA = { 712e053e eec8e324 - 448249a1 baa0c88e}, nego = -1 [Apr 15 23:31:15 PIC 1/6/0 KMD1]ike_st_i_sa_proposal: Start [Apr 15 23:31:15 PIC 1/6/0 KMD1]ike_st_i_cr: Start [Apr 15 23:31:15 PIC 1/6/0 KMD1]ike_st_i_cert: Start [Apr 15 23:31:15 PIC 1/6/0 KMD1]ike_st_i_private: Start [Apr 15 23:31:15 PIC 1/6/0 KMD1]ike_st_o_sa_values: Start [Apr 15 23:31:15 PIC 1/6/0 KMD1]ike_alloc_negotiation: Start, SA = { 712e053e eec8e324 - 448249a1 baa0c88e} [Apr 15 23:31:15 PIC 1/6/0 KMD1]ike_encode_packet: Start, SA = { 0x712e053e eec8e324 - 448249a1 baa0c88e } / 12919029, nego = 0 [Apr 15 23:31:15 PIC 1/6/0 KMD1]ike_delete_negotiation: Start, SA = { 712e053e eec8e324 - 448249a1 baa0c88e}, nego = 0 [Apr 15 23:31:15 PIC 1/6/0 KMD1]ike_free_negotiation_info: Start, nego = 0 [Apr 15 23:31:15 PIC 1/6/0 KMD1]ike_free_negotiation: Start, nego = 0 [Apr 15 23:31:15 PIC 1/6/0 KMD1] IKEv1 Error : No proposal chosen [Apr 15 23:31:19 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f59000 from freelist [Apr 15 23:31:19 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:31:23 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f59800 from freelist [Apr 15 23:31:23 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:31:27 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f5a000 from freelist [Apr 15 23:31:27 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:31:45 PIC 1/6/0 KMD1]P1 SA 1618683273 timer expiry. ref cnt 1, timer reason Force delete timer expired (1), flags 0x230. [Apr 15 23:31:45 PIC 1/6/0 KMD1]iked_pm_ike_sa_delete_done_cb: For p1 sa index 1618683273, ref cnt 1, status: Error ok [Apr 15 23:31:45 PIC 1/6/0 KMD1]ike_remove_callback: Start, delete SA = { 712e053e eec8e324 - 448249a1 baa0c88e}, nego = -1 [Apr 15 23:31:45 PIC 1/6/0 KMD1]ike_delete_negotiation: Start, SA = { 712e053e eec8e324 - 448249a1 baa0c88e}, nego = -1 [Apr 15 23:31:45 PIC 1/6/0 KMD1]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Apr 15 23:31:45 PIC 1/6/0 KMD1]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Apr 15 23:31:45 PIC 1/6/0 KMD1]ike_sa_delete: Start, SA = { 712e053e eec8e324 - 448249a1 baa0c88e } [Apr 15 23:31:45 PIC 1/6/0 KMD1]ike_free_negotiation_isakmp: Start, nego = -1 [Apr 15 23:31:45 PIC 1/6/0 KMD1]ike_free_negotiation: Start, nego = -1 [Apr 15 23:31:45 PIC 1/6/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1618683273 (ref cnt 0), waiting_for_del 0x0 [Apr 15 23:31:45 PIC 1/6/0 KMD1]ike_free_sa: Start [Apr 15 23:33:04 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f4f000 from freelist [Apr 15 23:33:04 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:33:04 PIC 1/7/0 KMD2]ike_sa_allocate: Start, SA = { d224a73d 380d9d3a - 02739aff 58bcf665 } [Apr 15 23:33:04 PIC 1/7/0 KMD2]ike_decode_packet: Start [Apr 15 23:33:04 PIC 1/7/0 KMD2]ike_decode_packet: Start, SA = { d224a73d 380d9d3a - 5d9683c9 5012ac0a} / 00000000, nego = -1 [Apr 15 23:33:04 PIC 1/7/0 KMD2]ike_decode_payload_sa: Start [Apr 15 23:33:04 PIC 1/7/0 KMD2]ike_decode_payload_t: Start, # trans = 1 [Apr 15 23:33:04 PIC 1/7/0 KMD2]ike_st_i_vid: VID[0..28] = 382b5e05 0cf5644e ... [Apr 15 23:33:04 PIC 1/7/0 KMD2]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Apr 15 23:33:04 PIC 1/7/0 KMD2]ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [Apr 15 23:33:04 PIC 1/7/0 KMD2]ike_st_i_sa_proposal: Start [Apr 15 23:33:04 PIC 1/7/0 KMD2]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 15 23:33:04 PIC 1/7/0 KMD2]ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error No proposal chosen (neg 100fc1000) [Apr 15 23:33:04 PIC 1/7/0 KMD2]ike_isakmp_sa_reply: Start [Apr 15 23:33:04 PIC 1/7/0 KMD2]ike_state_restart_packet: Start, restart packet SA = { d224a73d 380d9d3a - 5d9683c9 5012ac0a}, nego = -1 [Apr 15 23:33:04 PIC 1/7/0 KMD2]ike_st_i_sa_proposal: Start [Apr 15 23:33:04 PIC 1/7/0 KMD2]ike_st_i_cr: Start [Apr 15 23:33:04 PIC 1/7/0 KMD2]ike_st_i_cert: Start [Apr 15 23:33:04 PIC 1/7/0 KMD2]ike_st_i_private: Start [Apr 15 23:33:04 PIC 1/7/0 KMD2]ike_st_o_sa_values: Start [Apr 15 23:33:04 PIC 1/7/0 KMD2]ike_alloc_negotiation: Start, SA = { d224a73d 380d9d3a - 5d9683c9 5012ac0a} [Apr 15 23:33:04 PIC 1/7/0 KMD2]ike_encode_packet: Start, SA = { 0xd224a73d 380d9d3a - 5d9683c9 5012ac0a } / 92c2161b, nego = 0 [Apr 15 23:33:04 PIC 1/7/0 KMD2]ike_delete_negotiation: Start, SA = { d224a73d 380d9d3a - 5d9683c9 5012ac0a}, nego = 0 [Apr 15 23:33:04 PIC 1/7/0 KMD2]ike_free_negotiation_info: Start, nego = 0 [Apr 15 23:33:04 PIC 1/7/0 KMD2]ike_free_negotiation: Start, nego = 0 [Apr 15 23:33:04 PIC 1/7/0 KMD2] IKEv1 Error : No proposal chosen [Apr 15 23:33:08 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f7f000 from freelist [Apr 15 23:33:08 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:33:12 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f4d800 from freelist [Apr 15 23:33:12 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:33:16 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f4f800 from freelist [Apr 15 23:33:16 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:33:20 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f4e800 from freelist [Apr 15 23:33:20 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:33:24 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f7f800 from freelist [Apr 15 23:33:24 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:33:28 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f50000 from freelist [Apr 15 23:33:28 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:33:32 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f50800 from freelist [Apr 15 23:33:32 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:33:34 PIC 1/7/0 KMD2]P1 SA 1903895941 timer expiry. ref cnt 1, timer reason Force delete timer expired (1), flags 0x230. [Apr 15 23:33:34 PIC 1/7/0 KMD2]iked_pm_ike_sa_delete_done_cb: For p1 sa index 1903895941, ref cnt 1, status: Error ok [Apr 15 23:33:34 PIC 1/7/0 KMD2]ike_remove_callback: Start, delete SA = { d224a73d 380d9d3a - 5d9683c9 5012ac0a}, nego = -1 [Apr 15 23:33:34 PIC 1/7/0 KMD2]ike_delete_negotiation: Start, SA = { d224a73d 380d9d3a - 5d9683c9 5012ac0a}, nego = -1 [Apr 15 23:33:34 PIC 1/7/0 KMD2]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Apr 15 23:33:34 PIC 1/7/0 KMD2]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Apr 15 23:33:34 PIC 1/7/0 KMD2]ike_sa_delete: Start, SA = { d224a73d 380d9d3a - 5d9683c9 5012ac0a } [Apr 15 23:33:34 PIC 1/7/0 KMD2]ike_free_negotiation_isakmp: Start, nego = -1 [Apr 15 23:33:34 PIC 1/7/0 KMD2]ike_free_negotiation: Start, nego = -1 [Apr 15 23:33:34 PIC 1/7/0 KMD2]iked_pm_p1_sa_destroy: p1 sa 1903895941 (ref cnt 0), waiting_for_del 0x0 [Apr 15 23:33:34 PIC 1/7/0 KMD2]ike_free_sa: Start [Apr 15 23:33:36 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f51000 from freelist [Apr 15 23:33:36 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:33:36 PIC 1/7/0 KMD2]ike_sa_allocate: Start, SA = { d224a73d 380d9d3a - ba648589 c69bc777 } [Apr 15 23:33:36 PIC 1/7/0 KMD2]ike_decode_packet: Start [Apr 15 23:33:36 PIC 1/7/0 KMD2]ike_decode_packet: Start, SA = { d224a73d 380d9d3a - 36fed192 87a2283d} / 00000000, nego = -1 [Apr 15 23:33:36 PIC 1/7/0 KMD2]ike_decode_payload_sa: Start [Apr 15 23:33:36 PIC 1/7/0 KMD2]ike_decode_payload_t: Start, # trans = 1 [Apr 15 23:33:36 PIC 1/7/0 KMD2]ike_st_i_vid: VID[0..28] = 382b5e05 0cf5644e ... [Apr 15 23:33:36 PIC 1/7/0 KMD2]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Apr 15 23:33:36 PIC 1/7/0 KMD2]ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [Apr 15 23:33:36 PIC 1/7/0 KMD2]ike_st_i_sa_proposal: Start [Apr 15 23:33:36 PIC 1/7/0 KMD2]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 15 23:33:36 PIC 1/7/0 KMD2]ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error No proposal chosen (neg 100fc1000) [Apr 15 23:33:36 PIC 1/7/0 KMD2]ike_isakmp_sa_reply: Start [Apr 15 23:33:36 PIC 1/7/0 KMD2]ike_state_restart_packet: Start, restart packet SA = { d224a73d 380d9d3a - 36fed192 87a2283d}, nego = -1 [Apr 15 23:33:36 PIC 1/7/0 KMD2]ike_st_i_sa_proposal: Start [Apr 15 23:33:36 PIC 1/7/0 KMD2]ike_st_i_cr: Start [Apr 15 23:33:36 PIC 1/7/0 KMD2]ike_st_i_cert: Start [Apr 15 23:33:36 PIC 1/7/0 KMD2]ike_st_i_private: Start [Apr 15 23:33:36 PIC 1/7/0 KMD2]ike_st_o_sa_values: Start [Apr 15 23:33:36 PIC 1/7/0 KMD2]ike_alloc_negotiation: Start, SA = { d224a73d 380d9d3a - 36fed192 87a2283d} [Apr 15 23:33:36 PIC 1/7/0 KMD2]ike_encode_packet: Start, SA = { 0xd224a73d 380d9d3a - 36fed192 87a2283d } / a6347c82, nego = 0 [Apr 15 23:33:36 PIC 1/7/0 KMD2]ike_delete_negotiation: Start, SA = { d224a73d 380d9d3a - 36fed192 87a2283d}, nego = 0 [Apr 15 23:33:36 PIC 1/7/0 KMD2]ike_free_negotiation_info: Start, nego = 0 [Apr 15 23:33:36 PIC 1/7/0 KMD2]ike_free_negotiation: Start, nego = 0 [Apr 15 23:33:36 PIC 1/7/0 KMD2] IKEv1 Error : No proposal chosen [Apr 15 23:33:40 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f51800 from freelist [Apr 15 23:33:40 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:33:44 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f52000 from freelist [Apr 15 23:33:44 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:33:48 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f52800 from freelist [Apr 15 23:33:48 PIC 1/7/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:34:06 PIC 1/7/0 KMD2]P1 SA 1903895942 timer expiry. ref cnt 1, timer reason Force delete timer expired (1), flags 0x230. [Apr 15 23:34:06 PIC 1/7/0 KMD2]iked_pm_ike_sa_delete_done_cb: For p1 sa index 1903895942, ref cnt 1, status: Error ok [Apr 15 23:34:06 PIC 1/7/0 KMD2]ike_remove_callback: Start, delete SA = { d224a73d 380d9d3a - 36fed192 87a2283d}, nego = -1 [Apr 15 23:34:06 PIC 1/7/0 KMD2]ike_delete_negotiation: Start, SA = { d224a73d 380d9d3a - 36fed192 87a2283d}, nego = -1 [Apr 15 23:34:06 PIC 1/7/0 KMD2]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Apr 15 23:34:06 PIC 1/7/0 KMD2]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Apr 15 23:34:06 PIC 1/7/0 KMD2]ike_sa_delete: Start, SA = { d224a73d 380d9d3a - 36fed192 87a2283d } [Apr 15 23:34:06 PIC 1/7/0 KMD2]ike_free_negotiation_isakmp: Start, nego = -1 [Apr 15 23:34:06 PIC 1/7/0 KMD2]ike_free_negotiation: Start, nego = -1 [Apr 15 23:34:06 PIC 1/7/0 KMD2]iked_pm_p1_sa_destroy: p1 sa 1903895942 (ref cnt 0), waiting_for_del 0x0 [Apr 15 23:34:06 PIC 1/7/0 KMD2]ike_free_sa: Start [Apr 15 23:35:25 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f76800 from freelist [Apr 15 23:35:25 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:35:25 PIC 1/6/0 KMD2]ike_sa_allocate: Start, SA = { 7862045f c021588d - e6953c1d 78325d94 } [Apr 15 23:35:25 PIC 1/6/0 KMD2]ike_decode_packet: Start [Apr 15 23:35:25 PIC 1/6/0 KMD2]ike_decode_packet: Start, SA = { 7862045f c021588d - ee18a0b3 9ca8eb34} / 00000000, nego = -1 [Apr 15 23:35:25 PIC 1/6/0 KMD2]ike_decode_payload_sa: Start [Apr 15 23:35:25 PIC 1/6/0 KMD2]ike_decode_payload_t: Start, # trans = 1 [Apr 15 23:35:25 PIC 1/6/0 KMD2]ike_st_i_vid: VID[0..28] = 382b5e05 0cf5644e ... [Apr 15 23:35:25 PIC 1/6/0 KMD2]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Apr 15 23:35:25 PIC 1/6/0 KMD2]ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [Apr 15 23:35:25 PIC 1/6/0 KMD2]ike_st_i_sa_proposal: Start [Apr 15 23:35:25 PIC 1/6/0 KMD2]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 15 23:35:25 PIC 1/6/0 KMD2]ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error No proposal chosen (neg 100fc0000) [Apr 15 23:35:25 PIC 1/6/0 KMD2]ike_isakmp_sa_reply: Start [Apr 15 23:35:25 PIC 1/6/0 KMD2]ike_state_restart_packet: Start, restart packet SA = { 7862045f c021588d - ee18a0b3 9ca8eb34}, nego = -1 [Apr 15 23:35:25 PIC 1/6/0 KMD2]ike_st_i_sa_proposal: Start [Apr 15 23:35:25 PIC 1/6/0 KMD2]ike_st_i_cr: Start [Apr 15 23:35:25 PIC 1/6/0 KMD2]ike_st_i_cert: Start [Apr 15 23:35:25 PIC 1/6/0 KMD2]ike_st_i_private: Start [Apr 15 23:35:25 PIC 1/6/0 KMD2]ike_st_o_sa_values: Start [Apr 15 23:35:25 PIC 1/6/0 KMD2]ike_alloc_negotiation: Start, SA = { 7862045f c021588d - ee18a0b3 9ca8eb34} [Apr 15 23:35:25 PIC 1/6/0 KMD2]ike_encode_packet: Start, SA = { 0x7862045f c021588d - ee18a0b3 9ca8eb34 } / 3a49efbe, nego = 0 [Apr 15 23:35:25 PIC 1/6/0 KMD2]ike_delete_negotiation: Start, SA = { 7862045f c021588d - ee18a0b3 9ca8eb34}, nego = 0 [Apr 15 23:35:25 PIC 1/6/0 KMD2]ike_free_negotiation_info: Start, nego = 0 [Apr 15 23:35:25 PIC 1/6/0 KMD2]ike_free_negotiation: Start, nego = 0 [Apr 15 23:35:25 PIC 1/6/0 KMD2] IKEv1 Error : No proposal chosen [Apr 15 23:35:29 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f77000 from freelist [Apr 15 23:35:29 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:35:33 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f7b000 from freelist [Apr 15 23:35:33 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:35:37 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f78000 from freelist [Apr 15 23:35:37 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:35:41 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f78800 from freelist [Apr 15 23:35:41 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:35:45 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f7b800 from freelist [Apr 15 23:35:45 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:35:49 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f79800 from freelist [Apr 15 23:35:49 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:35:53 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f7a000 from freelist [Apr 15 23:35:53 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:35:55 PIC 1/6/0 KMD2]P1 SA 1635460482 timer expiry. ref cnt 1, timer reason Force delete timer expired (1), flags 0x230. [Apr 15 23:35:55 PIC 1/6/0 KMD2]iked_pm_ike_sa_delete_done_cb: For p1 sa index 1635460482, ref cnt 1, status: Error ok [Apr 15 23:35:55 PIC 1/6/0 KMD2]ike_remove_callback: Start, delete SA = { 7862045f c021588d - ee18a0b3 9ca8eb34}, nego = -1 [Apr 15 23:35:55 PIC 1/6/0 KMD2]ike_delete_negotiation: Start, SA = { 7862045f c021588d - ee18a0b3 9ca8eb34}, nego = -1 [Apr 15 23:35:55 PIC 1/6/0 KMD2]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Apr 15 23:35:55 PIC 1/6/0 KMD2]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Apr 15 23:35:55 PIC 1/6/0 KMD2]ike_sa_delete: Start, SA = { 7862045f c021588d - ee18a0b3 9ca8eb34 } [Apr 15 23:35:55 PIC 1/6/0 KMD2]ike_free_negotiation_isakmp: Start, nego = -1 [Apr 15 23:35:55 PIC 1/6/0 KMD2]ike_free_negotiation: Start, nego = -1 [Apr 15 23:35:55 PIC 1/6/0 KMD2]iked_pm_p1_sa_destroy: p1 sa 1635460482 (ref cnt 0), waiting_for_del 0x0 [Apr 15 23:35:55 PIC 1/6/0 KMD2]ike_free_sa: Start [Apr 15 23:35:57 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f7e000 from freelist [Apr 15 23:35:57 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:35:57 PIC 1/6/0 KMD2]ike_sa_allocate: Start, SA = { 7862045f c021588d - 3adfec55 f947a49d } [Apr 15 23:35:57 PIC 1/6/0 KMD2]ike_decode_packet: Start [Apr 15 23:35:57 PIC 1/6/0 KMD2]ike_decode_packet: Start, SA = { 7862045f c021588d - 20fe9a31 3eca112c} / 00000000, nego = -1 [Apr 15 23:35:57 PIC 1/6/0 KMD2]ike_decode_payload_sa: Start [Apr 15 23:35:57 PIC 1/6/0 KMD2]ike_decode_payload_t: Start, # trans = 1 [Apr 15 23:35:57 PIC 1/6/0 KMD2]ike_st_i_vid: VID[0..28] = 382b5e05 0cf5644e ... [Apr 15 23:35:57 PIC 1/6/0 KMD2]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Apr 15 23:35:57 PIC 1/6/0 KMD2]ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [Apr 15 23:35:57 PIC 1/6/0 KMD2]ike_st_i_sa_proposal: Start [Apr 15 23:35:57 PIC 1/6/0 KMD2]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 15 23:35:57 PIC 1/6/0 KMD2]ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error No proposal chosen (neg 100fc0000) [Apr 15 23:35:57 PIC 1/6/0 KMD2]ike_isakmp_sa_reply: Start [Apr 15 23:35:57 PIC 1/6/0 KMD2]ike_state_restart_packet: Start, restart packet SA = { 7862045f c021588d - 20fe9a31 3eca112c}, nego = -1 [Apr 15 23:35:57 PIC 1/6/0 KMD2]ike_st_i_sa_proposal: Start [Apr 15 23:35:57 PIC 1/6/0 KMD2]ike_st_i_cr: Start [Apr 15 23:35:57 PIC 1/6/0 KMD2]ike_st_i_cert: Start [Apr 15 23:35:57 PIC 1/6/0 KMD2]ike_st_i_private: Start [Apr 15 23:35:57 PIC 1/6/0 KMD2]ike_st_o_sa_values: Start [Apr 15 23:35:57 PIC 1/6/0 KMD2]ike_alloc_negotiation: Start, SA = { 7862045f c021588d - 20fe9a31 3eca112c} [Apr 15 23:35:57 PIC 1/6/0 KMD2]ike_encode_packet: Start, SA = { 0x7862045f c021588d - 20fe9a31 3eca112c } / dfba00d1, nego = 0 [Apr 15 23:35:57 PIC 1/6/0 KMD2]ike_delete_negotiation: Start, SA = { 7862045f c021588d - 20fe9a31 3eca112c}, nego = 0 [Apr 15 23:35:57 PIC 1/6/0 KMD2]ike_free_negotiation_info: Start, nego = 0 [Apr 15 23:35:57 PIC 1/6/0 KMD2]ike_free_negotiation: Start, nego = 0 [Apr 15 23:35:57 PIC 1/6/0 KMD2] IKEv1 Error : No proposal chosen [Apr 15 23:36:01 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f7e800 from freelist [Apr 15 23:36:01 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:36:05 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f7f000 from freelist [Apr 15 23:36:05 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 15 23:36:09 PIC 1/6/0 KMD2]ikev2_packet_allocate: Allocated packet 100f7c000 from freelist [Apr 15 23:36:09 PIC 1/6/0 KMD2]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library {primary:node0} ejjnyyo@SRX3400-1> show log kmd | except 2.2.2 [Apr 14 04:33:01 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f79800 from freelist [Apr 14 04:33:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload Authentication failed from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121845 [Apr 14 04:33:01 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f79800/100fe4000] Received packet: HDR, N(AUTHENTICATION_FAILED) [Apr 14 04:33:01 PIC 1/7/0 KMD1]ikev2_state_auth_initiator_in: [100f79800/100fe4000] Error: IKE_AUTH packet is missing IDr or AUTH payload [Apr 14 04:33:01 PIC 1/7/0 KMD1]ikev2_process_notify: [100f79800/100fe4000] Received error notify Authentication failed (24) [Apr 14 04:33:01 PIC 1/7/0 KMD1]ikev2_state_error: [100f79800/100fe4000] Negotiation failed because of error Authentication failed (24) [Apr 14 04:33:01 PIC 1/7/0 KMD1]IKE negotiation fail for local:10.185.49.212, remote:10.185.49.194 IKEv2 with status: Authentication failed [Apr 14 04:33:01 PIC 1/7/0 KMD1]IPSec negotiation failed for SA-CFG tunnel-pRBS-cert-TEMP for local:10.185.49.212, remote:10.185.49.194 IKEv2. status: Authentication failed [Apr 14 04:33:01 PIC 1/7/0 KMD1] P2 ed info: flags 0xc2, P2 error: Error ok [Apr 14 04:33:01 PIC 1/7/0 KMD1]IKE SA delete called for p1 sa 1887121845 (ref cnt 1) local:10.185.49.212, remote:10.185.49.194, IKEv2 [Apr 14 04:33:01 PIC 1/7/0 KMD1]Freeing all P2 SAs for IKEv2 p1 SA 1887121845 [Apr 14 04:33:01 PIC 1/7/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1887121845 (ref cnt 0), waiting_for_del 0x0 [Apr 14 04:33:01 PIC 1/7/0 KMD1]iked_deferred_free_inactive_peer_entry: Free 1 peer_entry(s) [Apr 14 04:34:00 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7d800 from freelist [Apr 14 04:34:01 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f81000 from freelist [Apr 14 04:34:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121846 [Apr 14 04:34:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121846 [Apr 14 04:34:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload Multiple auth supported from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121846 [Apr 14 04:34:01 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f81000/100ffa000] Received packet: HDR, SA, KE, Nonce, N(NAT_DETECTION_SOURCE_IP), N(NAT_DETECTION_DESTINATION_IP), CERTREQ, N(MULTIPLE_AUTH_SUPPORTED) [Apr 14 04:34:01 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f77000 from freelist [Apr 14 04:34:01 PIC 1/7/0 KMD1]Added (spi=0xe7b29e1, protocol=0) entry to the spi table [Apr 14 04:34:01 PIC 1/7/0 KMD1]iked_pm_ike_conf_request: SA-CFG tunnel-pRBS-cert-TEMP not configured for config payload. Skipping... [Apr 14 04:34:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_request: Sending Initial contact [Apr 14 04:34:01 PIC 1/7/0 KMD1]Construction NHTB payload for local:10.185.49.212, remote:10.185.49.194 IKEv2 P1 SA index 1887121846 sa-cfg tunnel-pRBS-cert-TEMP [Apr 14 04:34:01 PIC 1/7/0 KMD1]Peer router vendor is not Juniper. Not sending NHTB payload for sa-cfg tunnel-pRBS-cert-TEMP, p1_sa=1887121846 [Apr 14 04:34:01 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f82000 from freelist [Apr 14 04:34:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload Authentication failed from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121846 [Apr 14 04:34:01 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f82000/100ffa000] Received packet: HDR, N(AUTHENTICATION_FAILED) [Apr 14 04:34:01 PIC 1/7/0 KMD1]ikev2_state_auth_initiator_in: [100f82000/100ffa000] Error: IKE_AUTH packet is missing IDr or AUTH payload [Apr 14 04:34:01 PIC 1/7/0 KMD1]ikev2_process_notify: [100f82000/100ffa000] Received error notify Authentication failed (24) [Apr 14 04:34:01 PIC 1/7/0 KMD1]ikev2_state_error: [100f82000/100ffa000] Negotiation failed because of error Authentication failed (24) [Apr 14 04:34:01 PIC 1/7/0 KMD1]IKE negotiation fail for local:10.185.49.212, remote:10.185.49.194 IKEv2 with status: Authentication failed [Apr 14 04:34:01 PIC 1/7/0 KMD1]IPSec negotiation failed for SA-CFG tunnel-pRBS-cert-TEMP for local:10.185.49.212, remote:10.185.49.194 IKEv2. status: Authentication failed [Apr 14 04:34:01 PIC 1/7/0 KMD1] P2 ed info: flags 0xc2, P2 error: Error ok [Apr 14 04:34:01 PIC 1/7/0 KMD1]IKE SA delete called for p1 sa 1887121846 (ref cnt 1) local:10.185.49.212, remote:10.185.49.194, IKEv2 [Apr 14 04:34:01 PIC 1/7/0 KMD1]Freeing all P2 SAs for IKEv2 p1 SA 1887121846 [Apr 14 04:34:01 PIC 1/7/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1887121846 (ref cnt 0), waiting_for_del 0x0 [Apr 14 04:34:01 PIC 1/7/0 KMD1]iked_deferred_free_inactive_peer_entry: Free 1 peer_entry(s) [Apr 14 04:35:00 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f79000 from freelist [Apr 14 04:35:01 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f80000 from freelist [Apr 14 04:35:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121847 [Apr 14 04:35:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121847 [Apr 14 04:35:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload Multiple auth supported from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121847 [Apr 14 04:35:01 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f80000/100ffa000] Received packet: HDR, SA, KE, Nonce, N(NAT_DETECTION_SOURCE_IP), N(NAT_DETECTION_DESTINATION_IP), CERTREQ, N(MULTIPLE_AUTH_SUPPORTED) [Apr 14 04:35:01 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7b000 from freelist [Apr 14 04:35:01 PIC 1/7/0 KMD1]Added (spi=0xe254931, protocol=0) entry to the spi table [Apr 14 04:35:01 PIC 1/7/0 KMD1]iked_pm_ike_conf_request: SA-CFG tunnel-pRBS-cert-TEMP not configured for config payload. Skipping... [Apr 14 04:35:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_request: Sending Initial contact [Apr 14 04:35:01 PIC 1/7/0 KMD1]Construction NHTB payload for local:10.185.49.212, remote:10.185.49.194 IKEv2 P1 SA index 1887121847 sa-cfg tunnel-pRBS-cert-TEMP [Apr 14 04:35:01 PIC 1/7/0 KMD1]Peer router vendor is not Juniper. Not sending NHTB payload for sa-cfg tunnel-pRBS-cert-TEMP, p1_sa=1887121847 [Apr 14 04:35:01 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f75800 from freelist [Apr 14 04:35:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload Authentication failed from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121847 [Apr 14 04:35:01 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f75800/100ffa000] Received packet: HDR, N(AUTHENTICATION_FAILED) [Apr 14 04:35:01 PIC 1/7/0 KMD1]ikev2_state_auth_initiator_in: [100f75800/100ffa000] Error: IKE_AUTH packet is missing IDr or AUTH payload [Apr 14 04:35:01 PIC 1/7/0 KMD1]ikev2_process_notify: [100f75800/100ffa000] Received error notify Authentication failed (24) [Apr 14 04:35:01 PIC 1/7/0 KMD1]ikev2_state_error: [100f75800/100ffa000] Negotiation failed because of error Authentication failed (24) [Apr 14 04:35:01 PIC 1/7/0 KMD1]IKE negotiation fail for local:10.185.49.212, remote:10.185.49.194 IKEv2 with status: Authentication failed [Apr 14 04:35:01 PIC 1/7/0 KMD1]IPSec negotiation failed for SA-CFG tunnel-pRBS-cert-TEMP for local:10.185.49.212, remote:10.185.49.194 IKEv2. status: Authentication failed [Apr 14 04:35:01 PIC 1/7/0 KMD1] P2 ed info: flags 0xc2, P2 error: Error ok [Apr 14 04:35:01 PIC 1/7/0 KMD1]IKE SA delete called for p1 sa 1887121847 (ref cnt 1) local:10.185.49.212, remote:10.185.49.194, IKEv2 [Apr 14 04:35:01 PIC 1/7/0 KMD1]Freeing all P2 SAs for IKEv2 p1 SA 1887121847 [Apr 14 04:35:01 PIC 1/7/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1887121847 (ref cnt 0), waiting_for_del 0x0 [Apr 14 04:35:01 PIC 1/7/0 KMD1]iked_deferred_free_inactive_peer_entry: Free 1 peer_entry(s) [Apr 14 04:36:00 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7e800 from freelist [Apr 14 04:36:01 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f83800 from freelist [Apr 14 04:36:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121848 [Apr 14 04:36:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121848 [Apr 14 04:36:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload Multiple auth supported from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121848 [Apr 14 04:36:01 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f83800/100fe4000] Received packet: HDR, SA, KE, Nonce, N(NAT_DETECTION_SOURCE_IP), N(NAT_DETECTION_DESTINATION_IP), CERTREQ, N(MULTIPLE_AUTH_SUPPORTED) [Apr 14 04:36:01 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7c000 from freelist [Apr 14 04:36:01 PIC 1/7/0 KMD1]Added (spi=0xe00e279, protocol=0) entry to the spi table [Apr 14 04:36:01 PIC 1/7/0 KMD1]iked_pm_ike_conf_request: SA-CFG tunnel-pRBS-cert-TEMP not configured for config payload. Skipping... [Apr 14 04:36:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_request: Sending Initial contact [Apr 14 04:36:01 PIC 1/7/0 KMD1]Construction NHTB payload for local:10.185.49.212, remote:10.185.49.194 IKEv2 P1 SA index 1887121848 sa-cfg tunnel-pRBS-cert-TEMP [Apr 14 04:36:01 PIC 1/7/0 KMD1]Peer router vendor is not Juniper. Not sending NHTB payload for sa-cfg tunnel-pRBS-cert-TEMP, p1_sa=1887121848 [Apr 14 04:36:01 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f86000 from freelist [Apr 14 04:36:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload Authentication failed from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121848 [Apr 14 04:36:01 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f86000/100fe4000] Received packet: HDR, N(AUTHENTICATION_FAILED) [Apr 14 04:36:01 PIC 1/7/0 KMD1]ikev2_state_auth_initiator_in: [100f86000/100fe4000] Error: IKE_AUTH packet is missing IDr or AUTH payload [Apr 14 04:36:01 PIC 1/7/0 KMD1]ikev2_process_notify: [100f86000/100fe4000] Received error notify Authentication failed (24) [Apr 14 04:36:01 PIC 1/7/0 KMD1]ikev2_state_error: [100f86000/100fe4000] Negotiation failed because of error Authentication failed (24) [Apr 14 04:36:01 PIC 1/7/0 KMD1]IKE negotiation fail for local:10.185.49.212, remote:10.185.49.194 IKEv2 with status: Authentication failed [Apr 14 04:36:01 PIC 1/7/0 KMD1]IPSec negotiation failed for SA-CFG tunnel-pRBS-cert-TEMP for local:10.185.49.212, remote:10.185.49.194 IKEv2. status: Authentication failed [Apr 14 04:36:01 PIC 1/7/0 KMD1] P2 ed info: flags 0xc2, P2 error: Error ok [Apr 14 04:36:01 PIC 1/7/0 KMD1]IKE SA delete called for p1 sa 1887121848 (ref cnt 1) local:10.185.49.212, remote:10.185.49.194, IKEv2 [Apr 14 04:36:01 PIC 1/7/0 KMD1]Freeing all P2 SAs for IKEv2 p1 SA 1887121848 [Apr 14 04:36:01 PIC 1/7/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1887121848 (ref cnt 0), waiting_for_del 0x0 [Apr 14 04:36:01 PIC 1/7/0 KMD1]iked_deferred_free_inactive_peer_entry: Free 1 peer_entry(s) [Apr 14 04:37:00 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f81800 from freelist [Apr 14 04:37:01 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7f800 from freelist [Apr 14 04:37:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121849 [Apr 14 04:37:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121849 [Apr 14 04:37:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload Multiple auth supported from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121849 [Apr 14 04:37:01 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f7f800/100fe4000] Received packet: HDR, SA, KE, Nonce, N(NAT_DETECTION_SOURCE_IP), N(NAT_DETECTION_DESTINATION_IP), CERTREQ, N(MULTIPLE_AUTH_SUPPORTED) [Apr 14 04:37:01 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f87000 from freelist [Apr 14 04:37:01 PIC 1/7/0 KMD1]Added (spi=0xe9321dc, protocol=0) entry to the spi table [Apr 14 04:37:01 PIC 1/7/0 KMD1]iked_pm_ike_conf_request: SA-CFG tunnel-pRBS-cert-TEMP not configured for config payload. Skipping... [Apr 14 04:37:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_request: Sending Initial contact [Apr 14 04:37:01 PIC 1/7/0 KMD1]Construction NHTB payload for local:10.185.49.212, remote:10.185.49.194 IKEv2 P1 SA index 1887121849 sa-cfg tunnel-pRBS-cert-TEMP [Apr 14 04:37:01 PIC 1/7/0 KMD1]Peer router vendor is not Juniper. Not sending NHTB payload for sa-cfg tunnel-pRBS-cert-TEMP, p1_sa=1887121849 [Apr 14 04:37:01 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f75000 from freelist [Apr 14 04:37:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload Authentication failed from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121849 [Apr 14 04:37:01 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f75000/100fe4000] Received packet: HDR, N(AUTHENTICATION_FAILED) [Apr 14 04:37:01 PIC 1/7/0 KMD1]ikev2_state_auth_initiator_in: [100f75000/100fe4000] Error: IKE_AUTH packet is missing IDr or AUTH payload [Apr 14 04:37:01 PIC 1/7/0 KMD1]ikev2_process_notify: [100f75000/100fe4000] Received error notify Authentication failed (24) [Apr 14 04:37:01 PIC 1/7/0 KMD1]ikev2_state_error: [100f75000/100fe4000] Negotiation failed because of error Authentication failed (24) [Apr 14 04:37:01 PIC 1/7/0 KMD1]IKE negotiation fail for local:10.185.49.212, remote:10.185.49.194 IKEv2 with status: Authentication failed [Apr 14 04:37:01 PIC 1/7/0 KMD1]IPSec negotiation failed for SA-CFG tunnel-pRBS-cert-TEMP for local:10.185.49.212, remote:10.185.49.194 IKEv2. status: Authentication failed [Apr 14 04:37:01 PIC 1/7/0 KMD1] P2 ed info: flags 0xc2, P2 error: Error ok [Apr 14 04:37:01 PIC 1/7/0 KMD1]IKE SA delete called for p1 sa 1887121849 (ref cnt 1) local:10.185.49.212, remote:10.185.49.194, IKEv2 [Apr 14 04:37:01 PIC 1/7/0 KMD1]Freeing all P2 SAs for IKEv2 p1 SA 1887121849 [Apr 14 04:37:01 PIC 1/7/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1887121849 (ref cnt 0), waiting_for_del 0x0 [Apr 14 04:37:01 PIC 1/7/0 KMD1]iked_deferred_free_inactive_peer_entry: Free 1 peer_entry(s) [Apr 14 04:38:00 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f88800 from freelist [Apr 14 04:38:01 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f87800 from freelist [Apr 14 04:38:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121850 [Apr 14 04:38:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121850 [Apr 14 04:38:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload Multiple auth supported from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121850 [Apr 14 04:38:01 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f87800/100ffa000] Received packet: HDR, SA, KE, Nonce, N(NAT_DETECTION_SOURCE_IP), N(NAT_DETECTION_DESTINATION_IP), CERTREQ, N(MULTIPLE_AUTH_SUPPORTED) [Apr 14 04:38:01 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f85000 from freelist [Apr 14 04:38:01 PIC 1/7/0 KMD1]Added (spi=0xe4fa94d, protocol=0) entry to the spi table [Apr 14 04:38:01 PIC 1/7/0 KMD1]iked_pm_ike_conf_request: SA-CFG tunnel-pRBS-cert-TEMP not configured for config payload. Skipping... [Apr 14 04:38:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_request: Sending Initial contact [Apr 14 04:38:01 PIC 1/7/0 KMD1]Construction NHTB payload for local:10.185.49.212, remote:10.185.49.194 IKEv2 P1 SA index 1887121850 sa-cfg tunnel-pRBS-cert-TEMP [Apr 14 04:38:01 PIC 1/7/0 KMD1]Peer router vendor is not Juniper. Not sending NHTB payload for sa-cfg tunnel-pRBS-cert-TEMP, p1_sa=1887121850 [Apr 14 04:38:01 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f84800 from freelist [Apr 14 04:38:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload Authentication failed from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121850 [Apr 14 04:38:01 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f84800/100ffa000] Received packet: HDR, N(AUTHENTICATION_FAILED) [Apr 14 04:38:01 PIC 1/7/0 KMD1]ikev2_state_auth_initiator_in: [100f84800/100ffa000] Error: IKE_AUTH packet is missing IDr or AUTH payload [Apr 14 04:38:01 PIC 1/7/0 KMD1]ikev2_process_notify: [100f84800/100ffa000] Received error notify Authentication failed (24) [Apr 14 04:38:01 PIC 1/7/0 KMD1]ikev2_state_error: [100f84800/100ffa000] Negotiation failed because of error Authentication failed (24) [Apr 14 04:38:01 PIC 1/7/0 KMD1]IKE negotiation fail for local:10.185.49.212, remote:10.185.49.194 IKEv2 with status: Authentication failed [Apr 14 04:38:01 PIC 1/7/0 KMD1]IPSec negotiation failed for SA-CFG tunnel-pRBS-cert-TEMP for local:10.185.49.212, remote:10.185.49.194 IKEv2. status: Authentication failed [Apr 14 04:38:01 PIC 1/7/0 KMD1] P2 ed info: flags 0xc2, P2 error: Error ok [Apr 14 04:38:01 PIC 1/7/0 KMD1]IKE SA delete called for p1 sa 1887121850 (ref cnt 1) local:10.185.49.212, remote:10.185.49.194, IKEv2 [Apr 14 04:38:01 PIC 1/7/0 KMD1]Freeing all P2 SAs for IKEv2 p1 SA 1887121850 [Apr 14 04:38:01 PIC 1/7/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1887121850 (ref cnt 0), waiting_for_del 0x0 [Apr 14 04:38:01 PIC 1/7/0 KMD1]iked_deferred_free_inactive_peer_entry: Free 1 peer_entry(s) [Apr 14 04:39:00 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f82800 from freelist [Apr 14 04:39:01 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7c800 from freelist [Apr 14 04:39:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121851 [Apr 14 04:39:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121851 [Apr 14 04:39:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload Multiple auth supported from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121851 [Apr 14 04:39:01 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f7c800/100ffa000] Received packet: HDR, SA, KE, Nonce, N(NAT_DETECTION_SOURCE_IP), N(NAT_DETECTION_DESTINATION_IP), CERTREQ, N(MULTIPLE_AUTH_SUPPORTED) [Apr 14 04:39:01 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f83000 from freelist [Apr 14 04:39:01 PIC 1/7/0 KMD1]Added (spi=0xedc0f4d, protocol=0) entry to the spi table [Apr 14 04:39:01 PIC 1/7/0 KMD1]iked_pm_ike_conf_request: SA-CFG tunnel-pRBS-cert-TEMP not configured for config payload. Skipping... [Apr 14 04:39:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_request: Sending Initial contact [Apr 14 04:39:01 PIC 1/7/0 KMD1]Construction NHTB payload for local:10.185.49.212, remote:10.185.49.194 IKEv2 P1 SA index 1887121851 sa-cfg tunnel-pRBS-cert-TEMP [Apr 14 04:39:01 PIC 1/7/0 KMD1]Peer router vendor is not Juniper. Not sending NHTB payload for sa-cfg tunnel-pRBS-cert-TEMP, p1_sa=1887121851 [Apr 14 04:39:01 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f85800 from freelist [Apr 14 04:39:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload Authentication failed from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121851 [Apr 14 04:39:01 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f85800/100ffa000] Received packet: HDR, N(AUTHENTICATION_FAILED) [Apr 14 04:39:01 PIC 1/7/0 KMD1]ikev2_state_auth_initiator_in: [100f85800/100ffa000] Error: IKE_AUTH packet is missing IDr or AUTH payload [Apr 14 04:39:01 PIC 1/7/0 KMD1]ikev2_process_notify: [100f85800/100ffa000] Received error notify Authentication failed (24) [Apr 14 04:39:01 PIC 1/7/0 KMD1]ikev2_state_error: [100f85800/100ffa000] Negotiation failed because of error Authentication failed (24) [Apr 14 04:39:01 PIC 1/7/0 KMD1]IKE negotiation fail for local:10.185.49.212, remote:10.185.49.194 IKEv2 with status: Authentication failed [Apr 14 04:39:01 PIC 1/7/0 KMD1]IPSec negotiation failed for SA-CFG tunnel-pRBS-cert-TEMP for local:10.185.49.212, remote:10.185.49.194 IKEv2. status: Authentication failed [Apr 14 04:39:01 PIC 1/7/0 KMD1] P2 ed info: flags 0xc2, P2 error: Error ok [Apr 14 04:39:01 PIC 1/7/0 KMD1]IKE SA delete called for p1 sa 1887121851 (ref cnt 1) local:10.185.49.212, remote:10.185.49.194, IKEv2 [Apr 14 04:39:01 PIC 1/7/0 KMD1]Freeing all P2 SAs for IKEv2 p1 SA 1887121851 [Apr 14 04:39:01 PIC 1/7/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1887121851 (ref cnt 0), waiting_for_del 0x0 [Apr 14 04:39:01 PIC 1/7/0 KMD1]iked_deferred_free_inactive_peer_entry: Free 1 peer_entry(s) [Apr 14 04:40:00 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f89000 from freelist [Apr 14 04:40:01 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f8c800 from freelist [Apr 14 04:40:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121852 [Apr 14 04:40:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121852 [Apr 14 04:40:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload Multiple auth supported from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121852 [Apr 14 04:40:01 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f8c800/100fe4000] Received packet: HDR, SA, KE, Nonce, N(NAT_DETECTION_SOURCE_IP), N(NAT_DETECTION_DESTINATION_IP), CERTREQ, N(MULTIPLE_AUTH_SUPPORTED) [Apr 14 04:40:01 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f88000 from freelist [Apr 14 04:40:01 PIC 1/7/0 KMD1]Added (spi=0xed867e4, protocol=0) entry to the spi table [Apr 14 04:40:01 PIC 1/7/0 KMD1]iked_pm_ike_conf_request: SA-CFG tunnel-pRBS-cert-TEMP not configured for config payload. Skipping... [Apr 14 04:40:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_request: Sending Initial contact [Apr 14 04:40:01 PIC 1/7/0 KMD1]Construction NHTB payload for local:10.185.49.212, remote:10.185.49.194 IKEv2 P1 SA index 1887121852 sa-cfg tunnel-pRBS-cert-TEMP [Apr 14 04:40:01 PIC 1/7/0 KMD1]Peer router vendor is not Juniper. Not sending NHTB payload for sa-cfg tunnel-pRBS-cert-TEMP, p1_sa=1887121852 [Apr 14 04:40:01 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7f000 from freelist [Apr 14 04:40:01 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload Authentication failed from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121852 [Apr 14 04:40:01 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f7f000/100fe4000] Received packet: HDR, N(AUTHENTICATION_FAILED) [Apr 14 04:40:01 PIC 1/7/0 KMD1]ikev2_state_auth_initiator_in: [100f7f000/100fe4000] Error: IKE_AUTH packet is missing IDr or AUTH payload [Apr 14 04:40:01 PIC 1/7/0 KMD1]ikev2_process_notify: [100f7f000/100fe4000] Received error notify Authentication failed (24) [Apr 14 04:40:01 PIC 1/7/0 KMD1]ikev2_state_error: [100f7f000/100fe4000] Negotiation failed because of error Authentication failed (24) [Apr 14 04:40:01 PIC 1/7/0 KMD1]IKE negotiation fail for local:10.185.49.212, remote:10.185.49.194 IKEv2 with status: Authentication failed [Apr 14 04:40:01 PIC 1/7/0 KMD1]IPSec negotiation failed for SA-CFG tunnel-pRBS-cert-TEMP for local:10.185.49.212, remote:10.185.49.194 IKEv2. status: Authentication failed [Apr 14 04:40:01 PIC 1/7/0 KMD1] P2 ed info: flags 0xc2, P2 error: Error ok [Apr 14 04:40:01 PIC 1/7/0 KMD1]IKE SA delete called for p1 sa 1887121852 (ref cnt 1) local:10.185.49.212, remote:10.185.49.194, IKEv2 [Apr 14 04:40:01 PIC 1/7/0 KMD1]Freeing all P2 SAs for IKEv2 p1 SA 1887121852 [Apr 14 04:40:01 PIC 1/7/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1887121852 (ref cnt 0), waiting_for_del 0x0 [Apr 14 04:40:01 PIC 1/7/0 KMD1]iked_deferred_free_inactive_peer_entry: Free 1 peer_entry(s) [Apr 14 04:34:37 PIC 2/7/0 KMD2]Config download: Processed 101 - 102 messages [Apr 14 04:34:37 PIC 2/7/0 KMD2]Config download time: 0 secs [Apr 14 04:34:37 PIC 2/7/0 KMD2]iked_config_process_config_list, configuration diff complete [Apr 14 04:40:22 KMD-RE]kmd_iked_cfgbuf_addrec: 530: ** Allocated recptr is 0, reclen = 0 ** [Apr 14 04:40:22 KMD-RE]kmd_iked_cfgbuf_addrec: 530: ** Allocated recptr is c, reclen = 0 ** [Apr 14 04:40:22 KMD-RE]KMD_INTERNAL_ERROR: kmd_read_securitycfg: dax_get_object_by_path() returned FALSE, secop: 0x20a7880. [Apr 14 04:40:22 KMD-RE]kmd_iked_cfgbuf_addrec: 530: ** Allocated recptr is 54, reclen = 0 ** [Apr 14 04:40:22 KMD-RE]kmd_iked_cfgbuf_addrec: 530: ** Allocated recptr is 0, reclen = 0 ** [Apr 14 04:40:22 KMD-RE]Config download: Processed 101 - 102 messages [Apr 14 04:40:22 KMD-RE]Config download time: 0 secs [Apr 14 04:40:23 KMD-RE]iked_config_process_config_list, configuration diff complete [Apr 14 04:40:23 KMD-RE]iked_sa_cfg_delete_from_hash_table: Failed to delete sa_cfg tunnel-pRBS-cert-TEMP from sadb hash tbl [Apr 14 04:40:22 PIC 1/6/0 KMD1]Config download: Processed 101 - 102 messages [Apr 14 04:40:22 PIC 1/6/0 KMD1]Config download time: 0 secs [Apr 14 04:40:22 PIC 1/6/0 KMD1]iked_config_process_config_list, configuration diff complete [Apr 14 04:40:22 PIC 1/6/0 KMD1]In iked_sa_config_delete Deleting GENCFG msg with key; Tunnel = 131074;SPI-In = 0x0 [Apr 14 04:40:22 PIC 1/6/0 KMD1]Deleting Mini Tunnel for tunnel id 131074 spi 0x0 failed. It has already been deleted by another kmd instance [Apr 14 04:34:37 PIC 2/7/0 KMD1]Config download: Processed 101 - 102 messages [Apr 14 04:34:37 PIC 2/7/0 KMD1]Config download time: 0 secs [Apr 14 04:34:37 PIC 2/7/0 KMD1]iked_config_process_config_list, configuration diff complete [Apr 14 04:34:37 PIC 2/7/0 KMD1]In iked_sa_config_delete Deleting GENCFG msg with key; Tunnel = 131074;SPI-In = 0x0 [Apr 14 04:34:37 PIC 2/7/0 KMD1]Successfully deleted SA Config [Apr 14 04:40:22 PIC 1/7/0 KMD2]Config download: Processed 101 - 102 messages [Apr 14 04:40:22 PIC 1/7/0 KMD2]Config download time: 0 secs [Apr 14 04:40:22 PIC 1/7/0 KMD2]iked_config_process_config_list, configuration diff complete [Apr 14 04:34:43 PIC 2/6/0 KMD2]Config download: Processed 101 - 102 messages [Apr 14 04:34:43 PIC 2/6/0 KMD2]Config download time: 0 secs [Apr 14 04:34:43 PIC 2/6/0 KMD2]iked_config_process_config_list, configuration diff complete [Apr 14 04:34:43 PIC 2/6/0 KMD2]In iked_sa_config_delete Deleting GENCFG msg with key; Tunnel = 131074;SPI-In = 0x0 [Apr 14 04:34:43 PIC 2/6/0 KMD2]Deleting Mini Tunnel for tunnel id 131074 spi 0x0 failed. It has already been deleted by another kmd instance [Apr 14 04:40:22 PIC 1/7/0 KMD1]Config download: Processed 101 - 102 messages [Apr 14 04:40:22 PIC 1/7/0 KMD1]Config download time: 0 secs [Apr 14 04:40:22 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f84000 from freelist [Apr 14 04:40:22 PIC 1/7/0 KMD1]iked_config_process_config_list, configuration diff complete [Apr 14 04:40:22 PIC 1/7/0 KMD1]In iked_sa_config_delete Deleting GENCFG msg with key; Tunnel = 131074;SPI-In = 0x0 [Apr 14 04:40:22 PIC 1/7/0 KMD1]Successfully deleted SA Config [Apr 14 04:40:23 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f8c000 from freelist [Apr 14 04:40:23 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121853 [Apr 14 04:40:23 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121853 [Apr 14 04:40:23 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload Multiple auth supported from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121853 [Apr 14 04:40:23 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f8c000/100fe4000] Received packet: HDR, SA, KE, Nonce, N(NAT_DETECTION_SOURCE_IP), N(NAT_DETECTION_DESTINATION_IP), CERTREQ, N(MULTIPLE_AUTH_SUPPORTED) [Apr 14 04:40:23 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f8b800 from freelist [Apr 14 04:40:23 PIC 1/7/0 KMD1]Added (spi=0xe48a9a9, protocol=0) entry to the spi table [Apr 14 04:40:23 PIC 1/7/0 KMD1]iked_pm_ike_conf_request: SA-CFG tunnel-pRBS-cert-TEMP not configured for config payload. Skipping... [Apr 14 04:40:23 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_request: Sending Initial contact [Apr 14 04:40:23 PIC 1/7/0 KMD1]Construction NHTB payload for local:10.185.49.212, remote:10.185.49.194 IKEv2 P1 SA index 1887121853 sa-cfg tunnel-pRBS-cert-TEMP [Apr 14 04:40:23 PIC 1/7/0 KMD1]Peer router vendor is not Juniper. Not sending NHTB payload for sa-cfg tunnel-pRBS-cert-TEMP, p1_sa=1887121853 [Apr 14 04:40:23 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f8f000 from freelist [Apr 14 04:40:23 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload Authentication failed from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121853 [Apr 14 04:40:23 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f8f000/100fe4000] Received packet: HDR, N(AUTHENTICATION_FAILED) [Apr 14 04:40:23 PIC 1/7/0 KMD1]ikev2_state_auth_initiator_in: [100f8f000/100fe4000] Error: IKE_AUTH packet is missing IDr or AUTH payload [Apr 14 04:40:23 PIC 1/7/0 KMD1]ikev2_process_notify: [100f8f000/100fe4000] Received error notify Authentication failed (24) [Apr 14 04:40:23 PIC 1/7/0 KMD1]ikev2_state_error: [100f8f000/100fe4000] Negotiation failed because of error Authentication failed (24) [Apr 14 04:40:23 PIC 1/7/0 KMD1]IKE negotiation fail for local:10.185.49.212, remote:10.185.49.194 IKEv2 with status: Authentication failed [Apr 14 04:40:23 PIC 1/7/0 KMD1]IPSec negotiation failed for SA-CFG tunnel-pRBS-cert-TEMP for local:10.185.49.212, remote:10.185.49.194 IKEv2. status: Authentication failed [Apr 14 04:40:23 PIC 1/7/0 KMD1] P2 ed info: flags 0xc2, P2 error: Error ok [Apr 14 04:40:23 PIC 1/7/0 KMD1]IKE SA delete called for p1 sa 1887121853 (ref cnt 1) local:10.185.49.212, remote:10.185.49.194, IKEv2 [Apr 14 04:40:23 PIC 1/7/0 KMD1]Freeing all P2 SAs for IKEv2 p1 SA 1887121853 [Apr 14 04:40:23 PIC 1/7/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1887121853 (ref cnt 0), waiting_for_del 0x0 [Apr 14 04:40:23 PIC 1/7/0 KMD1]iked_deferred_free_inactive_peer_entry: Free 1 peer_entry(s) [Apr 14 04:34:43 PIC 2/6/0 KMD1]Config download: Processed 101 - 102 messages [Apr 14 04:34:43 PIC 2/6/0 KMD1]Config download time: 0 secs [Apr 14 04:34:43 PIC 2/6/0 KMD1]iked_config_process_config_list, configuration diff complete [Apr 14 04:34:43 PIC 2/6/0 KMD1]In iked_sa_config_delete Deleting GENCFG msg with key; Tunnel = 131074;SPI-In = 0x0 [Apr 14 04:34:43 PIC 2/6/0 KMD1]Successfully deleted Mini Tunnel [Apr 14 04:40:22 PIC 1/6/0 KMD2]Config download: Processed 101 - 102 messages [Apr 14 04:40:22 PIC 1/6/0 KMD2]Config download time: 0 secs [Apr 14 04:40:22 PIC 1/6/0 KMD2]iked_config_process_config_list, configuration diff complete [Apr 14 04:40:22 PIC 1/6/0 KMD2]In iked_sa_config_delete Deleting GENCFG msg with key; Tunnel = 131074;SPI-In = 0x0 [Apr 14 04:40:22 PIC 1/6/0 KMD2]Successfully deleted Mini Tunnel [Apr 14 04:45:16 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f8d800 from freelist [Apr 14 04:45:16 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f8d800/100ffa000] Setting ed pkt ctx from VR id 65535 to VR id 19) [Apr 14 04:45:16 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121854 [Apr 14 04:45:16 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121854 [Apr 14 04:45:16 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f8d800/100ffa000] Received packet: HDR, SA, KE, Nonce, N(NAT_DETECTION_SOURCE_IP), N(NAT_DETECTION_DESTINATION_IP) [Apr 14 04:45:16 PIC 1/7/0 KMD1]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 14 04:45:16 PIC 1/7/0 KMD1]ikev2_select_sa_reply: [100f8d800/100ffa000] Error: SA select failed: 14 [Apr 14 04:45:16 PIC 1/7/0 KMD1]ikev2_state_error: [100f8d800/100ffa000] Negotiation failed because of error No proposal chosen (14) [Apr 14 04:45:16 PIC 1/7/0 KMD1]IKE negotiation fail for local:10.185.49.212, remote:10.185.49.194 IKEv2 with status: No proposal chosen [Apr 14 04:45:16 PIC 1/7/0 KMD1]IKE SA delete called for p1 sa 1887121854 (ref cnt 1) local:, remote:10.185.49.194, IKEv2 [Apr 14 04:45:16 PIC 1/7/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1887121854 (ref cnt 0), waiting_for_del 0x0 [Apr 14 04:45:20 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f93000 from freelist [Apr 14 04:45:20 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f93000/100fe4000] Setting ed pkt ctx from VR id 65535 to VR id 19) [Apr 14 04:45:20 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121855 [Apr 14 04:45:20 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121855 [Apr 14 04:45:20 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f93000/100fe4000] Received packet: HDR, SA, KE, Nonce, N(NAT_DETECTION_SOURCE_IP), N(NAT_DETECTION_DESTINATION_IP) [Apr 14 04:45:20 PIC 1/7/0 KMD1]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 14 04:45:20 PIC 1/7/0 KMD1]ikev2_select_sa_reply: [100f93000/100fe4000] Error: SA select failed: 14 [Apr 14 04:45:20 PIC 1/7/0 KMD1]ikev2_state_error: [100f93000/100fe4000] Negotiation failed because of error No proposal chosen (14) [Apr 14 04:45:20 PIC 1/7/0 KMD1]IKE negotiation fail for local:10.185.49.212, remote:10.185.49.194 IKEv2 with status: No proposal chosen [Apr 14 04:45:20 PIC 1/7/0 KMD1]IKE SA delete called for p1 sa 1887121855 (ref cnt 1) local:, remote:10.185.49.194, IKEv2 [Apr 14 04:45:20 PIC 1/7/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1887121855 (ref cnt 0), waiting_for_del 0x0 [Apr 14 04:45:28 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f8a000 from freelist [Apr 14 04:45:28 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f8a000/100ffa000] Setting ed pkt ctx from VR id 65535 to VR id 19) [Apr 14 04:45:28 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121856 [Apr 14 04:45:28 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121856 [Apr 14 04:45:28 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f8a000/100ffa000] Received packet: HDR, SA, KE, Nonce, N(NAT_DETECTION_SOURCE_IP), N(NAT_DETECTION_DESTINATION_IP) [Apr 14 04:45:28 PIC 1/7/0 KMD1]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 14 04:45:28 PIC 1/7/0 KMD1]ikev2_select_sa_reply: [100f8a000/100ffa000] Error: SA select failed: 14 [Apr 14 04:45:28 PIC 1/7/0 KMD1]ikev2_state_error: [100f8a000/100ffa000] Negotiation failed because of error No proposal chosen (14) [Apr 14 04:45:28 PIC 1/7/0 KMD1]IKE negotiation fail for local:10.185.49.212, remote:10.185.49.194 IKEv2 with status: No proposal chosen [Apr 14 04:45:28 PIC 1/7/0 KMD1]IKE SA delete called for p1 sa 1887121856 (ref cnt 1) local:, remote:10.185.49.194, IKEv2 [Apr 14 04:45:28 PIC 1/7/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1887121856 (ref cnt 0), waiting_for_del 0x0 [Apr 14 04:45:37 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f8a800 from freelist [Apr 14 04:45:37 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f8a800/100fe4000] Setting ed pkt ctx from VR id 65535 to VR id 19) [Apr 14 04:45:37 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121857 [Apr 14 04:45:37 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121857 [Apr 14 04:45:37 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f8a800/100fe4000] Received packet: HDR, SA, KE, Nonce, N(NAT_DETECTION_SOURCE_IP), N(NAT_DETECTION_DESTINATION_IP) [Apr 14 04:45:37 PIC 1/7/0 KMD1]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 14 04:45:37 PIC 1/7/0 KMD1]ikev2_select_sa_reply: [100f8a800/100fe4000] Error: SA select failed: 14 [Apr 14 04:45:37 PIC 1/7/0 KMD1]ikev2_state_error: [100f8a800/100fe4000] Negotiation failed because of error No proposal chosen (14) [Apr 14 04:45:37 PIC 1/7/0 KMD1]IKE negotiation fail for local:10.185.49.212, remote:10.185.49.194 IKEv2 with status: No proposal chosen [Apr 14 04:45:37 PIC 1/7/0 KMD1]IKE SA delete called for p1 sa 1887121857 (ref cnt 1) local:, remote:10.185.49.194, IKEv2 [Apr 14 04:45:37 PIC 1/7/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1887121857 (ref cnt 0), waiting_for_del 0x0 [Apr 14 04:45:41 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f89800 from freelist [Apr 14 04:45:41 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f89800/100ffa000] Setting ed pkt ctx from VR id 65535 to VR id 19) [Apr 14 04:45:41 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121858 [Apr 14 04:45:41 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121858 [Apr 14 04:45:41 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f89800/100ffa000] Received packet: HDR, SA, KE, Nonce, N(NAT_DETECTION_SOURCE_IP), N(NAT_DETECTION_DESTINATION_IP) [Apr 14 04:45:41 PIC 1/7/0 KMD1]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 14 04:45:41 PIC 1/7/0 KMD1]ikev2_select_sa_reply: [100f89800/100ffa000] Error: SA select failed: 14 [Apr 14 04:45:41 PIC 1/7/0 KMD1]ikev2_state_error: [100f89800/100ffa000] Negotiation failed because of error No proposal chosen (14) [Apr 14 04:45:41 PIC 1/7/0 KMD1]IKE negotiation fail for local:10.185.49.212, remote:10.185.49.194 IKEv2 with status: No proposal chosen [Apr 14 04:45:41 PIC 1/7/0 KMD1]IKE SA delete called for p1 sa 1887121858 (ref cnt 1) local:, remote:10.185.49.194, IKEv2 [Apr 14 04:45:41 PIC 1/7/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1887121858 (ref cnt 0), waiting_for_del 0x0 [Apr 14 04:45:41 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f92000 from freelist [Apr 14 04:45:41 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f92000/100fe4000] Setting ed pkt ctx from VR id 65535 to VR id 19) [Apr 14 04:45:41 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121859 [Apr 14 04:45:41 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121859 [Apr 14 04:45:41 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f92000/100fe4000] Received packet: HDR, SA, KE, Nonce, N(NAT_DETECTION_SOURCE_IP), N(NAT_DETECTION_DESTINATION_IP) [Apr 14 04:45:41 PIC 1/7/0 KMD1]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 14 04:45:41 PIC 1/7/0 KMD1]ikev2_select_sa_reply: [100f92000/100fe4000] Error: SA select failed: 14 [Apr 14 04:45:41 PIC 1/7/0 KMD1]ikev2_state_error: [100f92000/100fe4000] Negotiation failed because of error No proposal chosen (14) [Apr 14 04:45:41 PIC 1/7/0 KMD1]IKE negotiation fail for local:10.185.49.212, remote:10.185.49.194 IKEv2 with status: No proposal chosen [Apr 14 04:45:41 PIC 1/7/0 KMD1]IKE SA delete called for p1 sa 1887121859 (ref cnt 1) local:, remote:10.185.49.194, IKEv2 [Apr 14 04:45:41 PIC 1/7/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1887121859 (ref cnt 0), waiting_for_del 0x0 [Apr 14 04:45:49 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f65800 from freelist [Apr 14 04:45:49 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f65800/100ffa000] Setting ed pkt ctx from VR id 65535 to VR id 19) [Apr 14 04:45:49 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121860 [Apr 14 04:45:49 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121860 [Apr 14 04:45:49 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f65800/100ffa000] Received packet: HDR, SA, KE, Nonce, N(NAT_DETECTION_SOURCE_IP), N(NAT_DETECTION_DESTINATION_IP) [Apr 14 04:45:49 PIC 1/7/0 KMD1]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 14 04:45:49 PIC 1/7/0 KMD1]ikev2_select_sa_reply: [100f65800/100ffa000] Error: SA select failed: 14 [Apr 14 04:45:49 PIC 1/7/0 KMD1]ikev2_state_error: [100f65800/100ffa000] Negotiation failed because of error No proposal chosen (14) [Apr 14 04:45:49 PIC 1/7/0 KMD1]IKE negotiation fail for local:10.185.49.212, remote:10.185.49.194 IKEv2 with status: No proposal chosen [Apr 14 04:45:49 PIC 1/7/0 KMD1]IKE SA delete called for p1 sa 1887121860 (ref cnt 1) local:, remote:10.185.49.194, IKEv2 [Apr 14 04:45:49 PIC 1/7/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1887121860 (ref cnt 0), waiting_for_del 0x0 [Apr 14 04:46:02 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f92800 from freelist [Apr 14 04:46:02 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f92800/100fe4000] Setting ed pkt ctx from VR id 65535 to VR id 19) [Apr 14 04:46:02 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121861 [Apr 14 04:46:02 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121861 [Apr 14 04:46:02 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f92800/100fe4000] Received packet: HDR, SA, KE, Nonce, N(NAT_DETECTION_SOURCE_IP), N(NAT_DETECTION_DESTINATION_IP) [Apr 14 04:46:02 PIC 1/7/0 KMD1]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 14 04:46:02 PIC 1/7/0 KMD1]ikev2_select_sa_reply: [100f92800/100fe4000] Error: SA select failed: 14 [Apr 14 04:46:02 PIC 1/7/0 KMD1]ikev2_state_error: [100f92800/100fe4000] Negotiation failed because of error No proposal chosen (14) [Apr 14 04:46:02 PIC 1/7/0 KMD1]IKE negotiation fail for local:10.185.49.212, remote:10.185.49.194 IKEv2 with status: No proposal chosen [Apr 14 04:46:02 PIC 1/7/0 KMD1]IKE SA delete called for p1 sa 1887121861 (ref cnt 1) local:, remote:10.185.49.194, IKEv2 [Apr 14 04:46:02 PIC 1/7/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1887121861 (ref cnt 0), waiting_for_del 0x0 [Apr 14 04:46:04 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f77800 from freelist [Apr 14 04:46:04 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f77800/100ffa000] Setting ed pkt ctx from VR id 65535 to VR id 19) [Apr 14 04:46:04 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121862 [Apr 14 04:46:04 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121862 [Apr 14 04:46:04 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f77800/100ffa000] Received packet: HDR, SA, KE, Nonce, N(NAT_DETECTION_SOURCE_IP), N(NAT_DETECTION_DESTINATION_IP) [Apr 14 04:46:04 PIC 1/7/0 KMD1]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 14 04:46:04 PIC 1/7/0 KMD1]ikev2_select_sa_reply: [100f77800/100ffa000] Error: SA select failed: 14 [Apr 14 04:46:04 PIC 1/7/0 KMD1]ikev2_state_error: [100f77800/100ffa000] Negotiation failed because of error No proposal chosen (14) [Apr 14 04:46:04 PIC 1/7/0 KMD1]IKE negotiation fail for local:10.185.49.212, remote:10.185.49.194 IKEv2 with status: No proposal chosen [Apr 14 04:46:04 PIC 1/7/0 KMD1]IKE SA delete called for p1 sa 1887121862 (ref cnt 1) local:, remote:10.185.49.194, IKEv2 [Apr 14 04:46:04 PIC 1/7/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1887121862 (ref cnt 0), waiting_for_del 0x0 [Apr 14 04:46:25 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f8e000 from freelist [Apr 14 04:46:25 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f8e000/100fe4000] Setting ed pkt ctx from VR id 65535 to VR id 19) [Apr 14 04:46:25 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121863 [Apr 14 04:46:25 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121863 [Apr 14 04:46:25 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f8e000/100fe4000] Received packet: HDR, SA, KE, Nonce, N(NAT_DETECTION_SOURCE_IP), N(NAT_DETECTION_DESTINATION_IP) [Apr 14 04:46:25 PIC 1/7/0 KMD1]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 14 04:46:25 PIC 1/7/0 KMD1]ikev2_select_sa_reply: [100f8e000/100fe4000] Error: SA select failed: 14 [Apr 14 04:46:25 PIC 1/7/0 KMD1]ikev2_state_error: [100f8e000/100fe4000] Negotiation failed because of error No proposal chosen (14) [Apr 14 04:46:25 PIC 1/7/0 KMD1]IKE negotiation fail for local:10.185.49.212, remote:10.185.49.194 IKEv2 with status: No proposal chosen [Apr 14 04:46:25 PIC 1/7/0 KMD1]IKE SA delete called for p1 sa 1887121863 (ref cnt 1) local:, remote:10.185.49.194, IKEv2 [Apr 14 04:46:25 PIC 1/7/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1887121863 (ref cnt 0), waiting_for_del 0x0 [Apr 14 04:46:46 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f8e800 from freelist [Apr 14 04:46:46 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f8e800/100ffa000] Setting ed pkt ctx from VR id 65535 to VR id 19) [Apr 14 04:46:46 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121864 [Apr 14 04:46:46 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121864 [Apr 14 04:46:46 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f8e800/100ffa000] Received packet: HDR, SA, KE, Nonce, N(NAT_DETECTION_SOURCE_IP), N(NAT_DETECTION_DESTINATION_IP) [Apr 14 04:46:46 PIC 1/7/0 KMD1]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 14 04:46:46 PIC 1/7/0 KMD1]ikev2_select_sa_reply: [100f8e800/100ffa000] Error: SA select failed: 14 [Apr 14 04:46:46 PIC 1/7/0 KMD1]ikev2_state_error: [100f8e800/100ffa000] Negotiation failed because of error No proposal chosen (14) [Apr 14 04:46:46 PIC 1/7/0 KMD1]IKE negotiation fail for local:10.185.49.212, remote:10.185.49.194 IKEv2 with status: No proposal chosen [Apr 14 04:46:46 PIC 1/7/0 KMD1]IKE SA delete called for p1 sa 1887121864 (ref cnt 1) local:, remote:10.185.49.194, IKEv2 [Apr 14 04:46:46 PIC 1/7/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1887121864 (ref cnt 0), waiting_for_del 0x0 [Apr 14 04:47:07 PIC 1/7/0 KMD1]ikev2_packet_allocate: Allocated packet 100f90000 from freelist [Apr 14 04:47:07 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f90000/100fe4000] Setting ed pkt ctx from VR id 65535 to VR id 19) [Apr 14 04:47:07 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121865 [Apr 14 04:47:07 PIC 1/7/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1887121865 [Apr 14 04:47:07 PIC 1/7/0 KMD1]ikev2_decode_packet: [100f90000/100fe4000] Received packet: HDR, SA, KE, Nonce, N(NAT_DETECTION_SOURCE_IP), N(NAT_DETECTION_DESTINATION_IP) [Apr 14 04:47:07 PIC 1/7/0 KMD1]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 14 04:47:07 PIC 1/7/0 KMD1]ikev2_select_sa_reply: [100f90000/100fe4000] Error: SA select failed: 14 [Apr 14 04:47:07 PIC 1/7/0 KMD1]ikev2_state_error: [100f90000/100fe4000] Negotiation failed because of error No proposal chosen (14) [Apr 14 04:47:07 PIC 1/7/0 KMD1]IKE negotiation fail for local:10.185.49.212, remote:10.185.49.194 IKEv2 with status: No proposal chosen [Apr 14 04:47:07 PIC 1/7/0 KMD1]IKE SA delete called for p1 sa 1887121865 (ref cnt 1) local:, remote:10.185.49.194, IKEv2 [Apr 14 04:47:07 PIC 1/7/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1887121865 (ref cnt 0), waiting_for_del 0x0 [Apr 14 04:50:59 PIC 2/6/0 KMD1]KMD_INTERNAL_ERROR: Bring down synced tunnel due to lifetime error [Apr 14 04:50:59 PIC 2/6/0 KMD1]ssh_ike_sa_import: Start [Apr 14 04:50:59 PIC 2/6/0 KMD1]ike_sa_allocate: Start, SA = { 851c1603 83e40110 - 96434ed8 6dbde313 } [Apr 14 04:50:59 PIC 2/6/0 KMD1]ike_free_negotiation_isakmp: Start, nego = -1 [Apr 14 04:50:59 PIC 2/6/0 KMD1]ike_free_negotiation: Start, nego = -1 [Apr 14 04:50:59 PIC 2/6/0 KMD1]ssh_ike_sa_import_id: Start [Apr 14 04:50:59 PIC 2/6/0 KMD1]ssh_ike_sa_import_id: Start [Apr 14 04:50:59 PIC 2/6/0 KMD1]iked_sa_cfg_update_sa_cfg_child_sa_count Parent not found for sa_cfg Cabritos-GRX-1 [Apr 14 04:50:59 PIC 2/6/0 KMD1]iked_sa_cfg_update_sa_cfg_child_sa_count Parent not found for sa_cfg Cabritos-GRX-1 [Apr 14 04:50:59 PIC 2/6/0 KMD1]Hardlife timer started for inbound Cabritos-GRX-1 with 3600 seconds/0 kilobytes [Apr 14 04:50:59 PIC 2/6/0 KMD1]Softlife timer started for inbound Cabritos-GRX-1 with 3000 seconds/0 kilobytes [Apr 14 04:50:59 PIC 2/6/0 KMD1]Creating dependency on SA config blob with tunnelid = 131073 [Apr 14 04:50:59 PIC 2/6/0 KMD1]Added dependency on SA config blob with tunnelid = 131073 [Apr 14 04:50:59 PIC 2/6/0 KMD1]Successfully added ipsec SA PAIR [Apr 14 04:56:38 KMD-RE]iked_sa_cfg_update_sa_cfg_child_sa_count Parent not found for sa_cfg Cabritos-GRX-1 [Apr 14 04:56:38 KMD-RE]iked_sa_cfg_update_sa_cfg_child_sa_count Parent not found for sa_cfg Cabritos-GRX-1 [Apr 14 04:56:38 PIC 1/6/0 KMD1]Soft life timer expired for inbound Cabritos-GRX-1 with spi 0xc0955c6 [Apr 14 04:56:38 PIC 1/6/0 KMD1]iked_pm_ike_conf_request: SA-CFG Cabritos-GRX-1 not configured for config payload. Skipping... [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_sa_allocate: Start, SA = { 851c1603 83e40110 - 00000000 00000000 } [Apr 14 04:56:38 PIC 1/6/0 KMD1]ssh_ike_connect: SA = { 851c1603 83e40110 - 00000000 00000000}, nego = -1 [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_o_sa_proposal: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_policy_reply_isakmp_vendor_ids: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_o_private: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_policy_reply_private_payload_out: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_encode_packet: Start, SA = { 0x851c1603 83e40110 - 00000000 00000000 } / 00000000, nego = -1 [Apr 14 04:56:38 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f78800 from freelist [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_sa_find: Not found SA = { 851c1603 83e40110 - 96434ed8 6dbde313 } [Apr 14 04:56:38 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_sa_find: Not found SA = { 851c1603 83e40110 - 96434ed8 6dbde313 } [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_sa_find_half: Found half SA = { 851c1603 83e40110 - 00000000 00000000 } [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_sa_upgrade: Start, SA = { 851c1603 83e40110 - 00000000 00000000 } -> { ... - 96434ed8 6dbde313 } [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_decode_packet: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_decode_packet: Start, SA = { 851c1603 83e40110 - 96434ed8 6dbde313} / 00000000, nego = -1 [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_decode_payload_sa: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_decode_payload_t: Start, # trans = 1 [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_i_sa_value: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_i_cr: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_i_cert: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_i_vid: VID[0..28] = 382b5e05 0cf5644e ... [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_i_private: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_o_ke: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_o_nonce: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_policy_reply_isakmp_nonce_data_len: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_o_private: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_policy_reply_private_payload_out: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_encode_packet: Start, SA = { 0x851c1603 83e40110 - 96434ed8 6dbde313 } / 00000000, nego = -1 [Apr 14 04:56:38 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f79000 from freelist [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_sa_find: Found SA = { 851c1603 83e40110 - 96434ed8 6dbde313 } [Apr 14 04:56:38 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_sa_find: Found SA = { 851c1603 83e40110 - 96434ed8 6dbde313 } [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_decode_packet: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_decode_packet: Start, SA = { 851c1603 83e40110 - 96434ed8 6dbde313} / 00000000, nego = -1 [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_i_nonce: Start, nonce[0..32] = d2ea1917 22b8df50 ... [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_i_ke: Ke[0..128] = 1a58a657 9a0a7560 ... [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_i_cr: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_i_cert: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_i_private: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_o_id: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_o_hash: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_policy_reply_find_pre_shared_key: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_calc_mac: Start, initiator = true, local = true [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_o_status_n: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_o_private: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_policy_reply_private_payload_out: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_o_encrypt: Marking encryption for packet [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_encode_packet: Start, SA = { 0x851c1603 83e40110 - 96434ed8 6dbde313 } / 00000000, nego = -1 [Apr 14 04:56:38 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7a000 from freelist [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_sa_find: Found SA = { 851c1603 83e40110 - 96434ed8 6dbde313 } [Apr 14 04:56:38 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_sa_find: Found SA = { 851c1603 83e40110 - 96434ed8 6dbde313 } [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_decode_packet: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_decode_packet: Start, SA = { 851c1603 83e40110 - 96434ed8 6dbde313} / 00000000, nego = -1 [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_i_encrypt: Check that packet was encrypted succeeded [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_i_id: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_i_hash: Start, hash[0..20] = 5437cfe0 dccdaeb7 ... [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_calc_mac: Start, initiator = true, local = false [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_i_cert: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_i_private: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_o_wait_done: Marking for waiting for done [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_o_all_done: MESSAGE: Phase 1 { 0x851c1603 83e40110 - 0x96434ed8 6dbde313 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = aes-cbc, hash = sha1, prf = hmac-sha1, [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_send_notify: Connected, SA = { 851c1603 83e40110 - 96434ed8 6dbde313}, nego = -1 [Apr 14 04:56:38 PIC 1/6/0 KMD1]ssh_ike_sa_export: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ssh_ike_sa_export_id: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ssh_ike_sa_export_id: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]Added (spi=0xc5e969f, protocol=0) entry to the spi table [Apr 14 04:56:38 PIC 1/6/0 KMD1]Added (spi=0xca96655, protocol=0) entry to the spi table [Apr 14 04:56:38 PIC 1/6/0 KMD1]ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000 [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_alloc_negotiation: Start, SA = { 851c1603 83e40110 - 96434ed8 6dbde313} [Apr 14 04:56:38 PIC 1/6/0 KMD1]ssh_ike_connect_ipsec: SA = { 851c1603 83e40110 - 96434ed8 6dbde313}, nego = 0 [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_init_qm_negotiation: Start, initiator = 1, message_id = 883d4a57 [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_o_qm_hash_1: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_o_qm_sa_proposals: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_o_qm_nonce: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_policy_reply_qm_nonce_data_len: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_o_qm_optional_ke: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_o_qm_optional_ids: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_qm_optional_id: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_qm_optional_id: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_o_private: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.3 [Apr 14 04:56:38 PIC 1/6/0 KMD1]iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.3 [Apr 14 04:56:38 PIC 1/6/0 KMD1]Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Cabritos-GRX-1 [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_policy_reply_private_payload_out: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_o_encrypt: Marking encryption for packet [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_encode_packet: Start, SA = { 0x851c1603 83e40110 - 96434ed8 6dbde313 } / 883d4a57, nego = 0 [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_finalize_qm_hash_1: Hash[0..20] = 12d2af8c cac59b2b ... [Apr 14 04:56:38 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7a800 from freelist [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_sa_find: Found SA = { 851c1603 83e40110 - 96434ed8 6dbde313 } [Apr 14 04:56:38 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_sa_find: Found SA = { 851c1603 83e40110 - 96434ed8 6dbde313 } [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_o_done: ISAKMP SA negotiation done [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_send_notify: Connected, SA = { 851c1603 83e40110 - 96434ed8 6dbde313}, nego = -1 [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_free_negotiation_isakmp: Start, nego = -1 [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_free_negotiation: Start, nego = -1 [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_decode_packet: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_decode_packet: Start, SA = { 851c1603 83e40110 - 96434ed8 6dbde313} / 883d4a57, nego = 0 [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_decode_payload_sa: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_decode_payload_t: Start, # trans = 1 [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_i_encrypt: Check that packet was encrypted succeeded [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_i_qm_hash_2: Start, hash[0..20] = 23300db9 4f1ce7f6 ... [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_i_qm_sa_values: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_i_qm_nonce: Nonce[0..32] = 35224ce5 89a5e3fc ... [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_i_qm_ke: Ke[0..128] = debd135f eee8c324 ... [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_i_status_n: Start, doi = 1, protocol = 3, code = unknown (40001), spi[0..4] = 9a77bad4 00000000 ..., data[0..8] = 00010004 0a010101 ... [Apr 14 04:56:38 PIC 1/6/0 KMD1]Received NHTB private IP address 10.1.1.1 [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_i_private: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_o_qm_hash_3: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_o_private: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_policy_reply_private_payload_out: Start [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_o_encrypt: Marking encryption for packet [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_qm_call_callback: MESSAGE: Phase 2 connection succeeded, Using PFS, group = 2 [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_qm_call_callback: MESSAGE: SA[0][0] = ESP aes, life = 0 kB/3600 sec, group = 2, tunnel, hmac-md5-96, Extended seq not used, key len = 128, key rounds = 0 [Apr 14 04:56:38 PIC 1/6/0 KMD1]iked_pm_ipsec_sa_create: encr key len 16, auth key len: 16, salt len: 0 [Apr 14 04:56:38 PIC 1/6/0 KMD1]iked_sa_cfg_update_sa_cfg_child_sa_count Parent not found for sa_cfg Cabritos-GRX-1 [Apr 14 04:56:38 PIC 1/6/0 KMD1]iked_sa_cfg_update_sa_cfg_child_sa_count Parent not found for sa_cfg Cabritos-GRX-1 [Apr 14 04:56:38 PIC 1/6/0 KMD1]Hardlife timer started for inbound Cabritos-GRX-1 with 3600 seconds/0 kilobytes [Apr 14 04:56:38 PIC 1/6/0 KMD1]Softlife timer started for inbound Cabritos-GRX-1 with 3000 seconds/0 kilobytes [Apr 14 04:56:38 PIC 1/6/0 KMD1]Rekey was initiated by us. So restart timer so that we can send delete notification [Apr 14 04:56:38 PIC 1/6/0 KMD1]Hardlife timer restarted for rekeyed sa of outbound Cabritos-GRX-1 with 5 seconds/0 kilobytes [Apr 14 04:56:38 PIC 1/6/0 KMD1]In iked_ipsec_sa_pair_add Adding GENCFG msg with key; Tunnel = 131073;SPI-In = 0xc5e969f [Apr 14 04:56:38 PIC 1/6/0 KMD1]Added dependency on SA config blob with tunnelid = 131073 [Apr 14 04:56:38 PIC 1/6/0 KMD1]Successfully added ipsec SA PAIR [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_st_o_qm_wait_done: Marking for waiting for done [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_encode_packet: Start, SA = { 0x851c1603 83e40110 - 96434ed8 6dbde313 } / 883d4a57, nego = 0 [Apr 14 04:56:38 PIC 1/6/0 KMD1]ike_send_notify: Connected, SA = { 851c1603 83e40110 - 96434ed8 6dbde313}, nego = 0 [Apr 14 04:51:04 PIC 2/6/0 KMD1]In iked_ipsec_sa_pair_delete Deleting GENCFG msg with key; Tunnel = 131073;SPI-In = 0xc0955c6 [Apr 14 04:51:04 PIC 2/6/0 KMD1]Deleted SA pair for tunnel = 131073 with SPI-In = 0xc0955c6 to kernel [Apr 14 04:51:04 PIC 2/6/0 KMD1]Deleted (spi=0xc0955c6, protocol=ESP) entry from the inbound sa spi hash table [Apr 14 04:51:04 PIC 2/6/0 KMD1]iked_sa_cfg_update_sa_cfg_child_sa_count Parent not found for sa_cfg Cabritos-GRX-1 [Apr 14 04:51:04 PIC 2/6/0 KMD1]iked_sa_cfg_update_sa_cfg_child_sa_count Parent not found for sa_cfg Cabritos-GRX-1 [Apr 14 04:56:43 KMD-RE]iked_sa_cfg_update_sa_cfg_child_sa_count Parent not found for sa_cfg Cabritos-GRX-1 [Apr 14 04:56:43 KMD-RE]Deleted (spi=0xc0955c6, protocol=ESP) entry from the inbound sa spi hash table [Apr 14 04:56:43 KMD-RE]iked_sa_cfg_update_sa_cfg_child_sa_count Parent not found for sa_cfg Cabritos-GRX-1 [Apr 14 04:56:43 PIC 1/6/0 KMD1]Hard life timer expired for outbound Cabritos-GRX-1 with spi 0x9a77bad3 [Apr 14 04:56:43 PIC 1/6/0 KMD1]In iked_ipsec_sa_pair_delete Deleting GENCFG msg with key; Tunnel = 131073;SPI-In = 0xc0955c6 [Apr 14 04:56:43 PIC 1/6/0 KMD1]Deleted SA pair for tunnel = 131073 with SPI-In = 0xc0955c6 to kernel [Apr 14 04:56:43 PIC 1/6/0 KMD1]iked_sa_cfg_update_sa_cfg_child_sa_count Parent not found for sa_cfg Cabritos-GRX-1 [Apr 14 04:56:43 PIC 1/6/0 KMD1]ssh_ike_connect_delete: Start, remote_name = :500, flags = 00010000 [Apr 14 04:56:43 PIC 1/6/0 KMD1]ssh_ike_create_delete_internal: Start, remote_name = :500, flags = 00010000 [Apr 14 04:56:43 PIC 1/6/0 KMD1]ike_alloc_negotiation: Start, SA = { 851c1603 83e40110 - 96434ed8 6dbde313} [Apr 14 04:56:43 PIC 1/6/0 KMD1]ssh_ike_create_delete_internal: SA = { 851c1603 83e40110 - 96434ed8 6dbde313}, nego = 1 [Apr 14 04:56:43 PIC 1/6/0 KMD1]ike_encode_packet: Start, SA = { 0x851c1603 83e40110 - 96434ed8 6dbde313 } / 64d766e0, nego = 1 [Apr 14 04:56:43 PIC 1/6/0 KMD1]ike_delete_negotiation: Start, SA = { 851c1603 83e40110 - 96434ed8 6dbde313}, nego = 1 [Apr 14 04:56:43 PIC 1/6/0 KMD1]ike_free_negotiation_info: Start, nego = 1 [Apr 14 04:56:43 PIC 1/6/0 KMD1]ike_free_negotiation: Start, nego = 1 [Apr 14 04:56:43 PIC 1/6/0 KMD1]Deleted (spi=0xc0955c6, protocol=ESP) entry from the inbound sa spi hash table [Apr 14 04:56:43 PIC 1/6/0 KMD1]iked_sa_cfg_update_sa_cfg_child_sa_count Parent not found for sa_cfg Cabritos-GRX-1 [Apr 14 04:59:38 PIC 1/6/0 KMD1]ike_state_restart_packet: Start, restart packet SA = { 851c1603 83e40110 - 96434ed8 6dbde313}, nego = 0 [Apr 14 04:59:38 PIC 1/6/0 KMD1]ike_st_o_qm_done: Quick Mode negotiation done [Apr 14 04:59:38 PIC 1/6/0 KMD1]ike_send_notify: Connected, SA = { 851c1603 83e40110 - 96434ed8 6dbde313}, nego = 0 [Apr 14 04:59:38 PIC 1/6/0 KMD1]ike_delete_negotiation: Start, SA = { 851c1603 83e40110 - 96434ed8 6dbde313}, nego = 0 [Apr 14 04:59:38 PIC 1/6/0 KMD1]ike_free_negotiation_qm: Start, nego = 0 [Apr 14 04:59:38 PIC 1/6/0 KMD1]ike_free_negotiation: Start, nego = 0 [Apr 14 04:59:38 PIC 1/6/0 KMD1]ike_free_id_payload: Start, id type = 4 [Apr 14 04:59:38 PIC 1/6/0 KMD1]ike_free_id_payload: Start, id type = 4 [Apr 14 04:59:38 PIC 1/6/0 KMD1]ike_free_id_payload: Start, id type = 4 [Apr 14 04:59:38 PIC 1/6/0 KMD1]ike_free_id_payload: Start, id type = 4 [Apr 14 05:03:59 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7c800 from freelist [Apr 14 05:03:59 PIC 1/6/0 KMD1]ikev2_decode_packet: [100f7c800/100fd9800] Setting ed pkt ctx from VR id 65535 to VR id 19) [Apr 14 05:03:59 PIC 1/6/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1618693704 [Apr 14 05:03:59 PIC 1/6/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1618693704 [Apr 14 05:03:59 PIC 1/6/0 KMD1]ikev2_decode_packet: [100f7c800/100fd9800] Received packet: HDR, SA, KE, Nonce, N(NAT_DETECTION_SOURCE_IP), N(NAT_DETECTION_DESTINATION_IP) [Apr 14 05:03:59 PIC 1/6/0 KMD1]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 14 05:03:59 PIC 1/6/0 KMD1]ikev2_select_sa_reply: [100f7c800/100fd9800] Error: SA select failed: 14 [Apr 14 05:03:59 PIC 1/6/0 KMD1]ikev2_state_error: [100f7c800/100fd9800] Negotiation failed because of error No proposal chosen (14) [Apr 14 05:03:59 PIC 1/6/0 KMD1]IKE negotiation fail for local:10.185.49.212, remote:10.185.49.194 IKEv2 with status: No proposal chosen [Apr 14 05:03:59 PIC 1/6/0 KMD1]IKE SA delete called for p1 sa 1618693704 (ref cnt 1) local:, remote:10.185.49.194, IKEv2 [Apr 14 05:03:59 PIC 1/6/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1618693704 (ref cnt 0), waiting_for_del 0x0 [Apr 14 05:04:03 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7d000 from freelist [Apr 14 05:04:03 PIC 1/6/0 KMD1]ikev2_decode_packet: [100f7d000/100fd9800] Setting ed pkt ctx from VR id 65535 to VR id 19) [Apr 14 05:04:03 PIC 1/6/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1618693705 [Apr 14 05:04:03 PIC 1/6/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1618693705 [Apr 14 05:04:03 PIC 1/6/0 KMD1]ikev2_decode_packet: [100f7d000/100fd9800] Received packet: HDR, SA, KE, Nonce, N(NAT_DETECTION_SOURCE_IP), N(NAT_DETECTION_DESTINATION_IP) [Apr 14 05:04:03 PIC 1/6/0 KMD1]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 14 05:04:03 PIC 1/6/0 KMD1]ikev2_select_sa_reply: [100f7d000/100fd9800] Error: SA select failed: 14 [Apr 14 05:04:03 PIC 1/6/0 KMD1]ikev2_state_error: [100f7d000/100fd9800] Negotiation failed because of error No proposal chosen (14) [Apr 14 05:04:03 PIC 1/6/0 KMD1]IKE negotiation fail for local:10.185.49.212, remote:10.185.49.194 IKEv2 with status: No proposal chosen [Apr 14 05:04:03 PIC 1/6/0 KMD1]IKE SA delete called for p1 sa 1618693705 (ref cnt 1) local:, remote:10.185.49.194, IKEv2 [Apr 14 05:04:03 PIC 1/6/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1618693705 (ref cnt 0), waiting_for_del 0x0 [Apr 14 05:04:10 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7b000 from freelist [Apr 14 05:04:10 PIC 1/6/0 KMD1]ikev2_decode_packet: [100f7b000/100fd9800] Setting ed pkt ctx from VR id 65535 to VR id 19) [Apr 14 05:04:10 PIC 1/6/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1618693706 [Apr 14 05:04:10 PIC 1/6/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1618693706 [Apr 14 05:04:10 PIC 1/6/0 KMD1]ikev2_decode_packet: [100f7b000/100fd9800] Received packet: HDR, SA, KE, Nonce, N(NAT_DETECTION_SOURCE_IP), N(NAT_DETECTION_DESTINATION_IP) [Apr 14 05:04:10 PIC 1/6/0 KMD1]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 14 05:04:10 PIC 1/6/0 KMD1]ikev2_select_sa_reply: [100f7b000/100fd9800] Error: SA select failed: 14 [Apr 14 05:04:10 PIC 1/6/0 KMD1]ikev2_state_error: [100f7b000/100fd9800] Negotiation failed because of error No proposal chosen (14) [Apr 14 05:04:10 PIC 1/6/0 KMD1]IKE negotiation fail for local:10.185.49.212, remote:10.185.49.194 IKEv2 with status: No proposal chosen [Apr 14 05:04:10 PIC 1/6/0 KMD1]IKE SA delete called for p1 sa 1618693706 (ref cnt 1) local:, remote:10.185.49.194, IKEv2 [Apr 14 05:04:10 PIC 1/6/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1618693706 (ref cnt 0), waiting_for_del 0x0 [Apr 14 05:04:23 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7d800 from freelist [Apr 14 05:04:23 PIC 1/6/0 KMD1]ikev2_decode_packet: [100f7d800/100fd9800] Setting ed pkt ctx from VR id 65535 to VR id 19) [Apr 14 05:04:23 PIC 1/6/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1618693707 [Apr 14 05:04:23 PIC 1/6/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1618693707 [Apr 14 05:04:23 PIC 1/6/0 KMD1]ikev2_decode_packet: [100f7d800/100fd9800] Received packet: HDR, SA, KE, Nonce, N(NAT_DETECTION_SOURCE_IP), N(NAT_DETECTION_DESTINATION_IP) [Apr 14 05:04:23 PIC 1/6/0 KMD1]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 14 05:04:23 PIC 1/6/0 KMD1]ikev2_select_sa_reply: [100f7d800/100fd9800] Error: SA select failed: 14 [Apr 14 05:04:23 PIC 1/6/0 KMD1]ikev2_state_error: [100f7d800/100fd9800] Negotiation failed because of error No proposal chosen (14) [Apr 14 05:04:23 PIC 1/6/0 KMD1]IKE negotiation fail for local:10.185.49.212, remote:10.185.49.194 IKEv2 with status: No proposal chosen [Apr 14 05:04:23 PIC 1/6/0 KMD1]IKE SA delete called for p1 sa 1618693707 (ref cnt 1) local:, remote:10.185.49.194, IKEv2 [Apr 14 05:04:23 PIC 1/6/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1618693707 (ref cnt 0), waiting_for_del 0x0 [Apr 14 05:04:47 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7e000 from freelist [Apr 14 05:04:47 PIC 1/6/0 KMD1]ikev2_decode_packet: [100f7e000/100fd9800] Setting ed pkt ctx from VR id 65535 to VR id 19) [Apr 14 05:04:47 PIC 1/6/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1618693708 [Apr 14 05:04:47 PIC 1/6/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1618693708 [Apr 14 05:04:47 PIC 1/6/0 KMD1]ikev2_decode_packet: [100f7e000/100fd9800] Received packet: HDR, SA, KE, Nonce, N(NAT_DETECTION_SOURCE_IP), N(NAT_DETECTION_DESTINATION_IP) [Apr 14 05:04:47 PIC 1/6/0 KMD1]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 14 05:04:47 PIC 1/6/0 KMD1]ikev2_select_sa_reply: [100f7e000/100fd9800] Error: SA select failed: 14 [Apr 14 05:04:47 PIC 1/6/0 KMD1]ikev2_state_error: [100f7e000/100fd9800] Negotiation failed because of error No proposal chosen (14) [Apr 14 05:04:47 PIC 1/6/0 KMD1]IKE negotiation fail for local:10.185.49.212, remote:10.185.49.194 IKEv2 with status: No proposal chosen [Apr 14 05:04:47 PIC 1/6/0 KMD1]IKE SA delete called for p1 sa 1618693708 (ref cnt 1) local:, remote:10.185.49.194, IKEv2 [Apr 14 05:04:47 PIC 1/6/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1618693708 (ref cnt 0), waiting_for_del 0x0 [Apr 14 05:05:29 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f7b800 from freelist [Apr 14 05:05:29 PIC 1/6/0 KMD1]ikev2_decode_packet: [100f7b800/100fd9800] Setting ed pkt ctx from VR id 65535 to VR id 19) [Apr 14 05:05:29 PIC 1/6/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1618693709 [Apr 14 05:05:29 PIC 1/6/0 KMD1]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1618693709 [Apr 14 05:05:29 PIC 1/6/0 KMD1]ikev2_decode_packet: [100f7b800/100fd9800] Received packet: HDR, SA, KE, Nonce, N(NAT_DETECTION_SOURCE_IP), N(NAT_DETECTION_DESTINATION_IP) [Apr 14 05:05:29 PIC 1/6/0 KMD1]iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen [Apr 14 05:05:29 PIC 1/6/0 KMD1]ikev2_select_sa_reply: [100f7b800/100fd9800] Error: SA select failed: 14 [Apr 14 05:05:29 PIC 1/6/0 KMD1]ikev2_state_error: [100f7b800/100fd9800] Negotiation failed because of error No proposal chosen (14) [Apr 14 05:05:29 PIC 1/6/0 KMD1]IKE negotiation fail for local:10.185.49.212, remote:10.185.49.194 IKEv2 with status: No proposal chosen [Apr 14 05:05:29 PIC 1/6/0 KMD1]IKE SA delete called for p1 sa 1618693709 (ref cnt 1) local:, remote:10.185.49.194, IKEv2 [Apr 14 05:05:29 PIC 1/6/0 KMD1]iked_pm_p1_sa_destroy: p1 sa 1618693709 (ref cnt 0), waiting_for_del 0x0 [Apr 14 05:07:29 PIC 1/6/0 KMD1]ikev2_packet_allocate: Allocated packet 100f79800 from freelist [Apr 14 05:07:29 PIC 1/6/0 KMD1]ike_sa_find: Found SA = { 851c1603 83e40110 - 96434ed8 6dbde313 } [Apr 14 05:07:29 PIC 1/6/0 KMD1]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Apr 14 05:07:29 PIC 1/6/0 KMD1]ike_sa_find: Found SA = { 851c1603 83e40110 - 96434ed8 6dbde313 } [Apr 14 05:07:29 PIC 1/6/0 KMD1]ike_alloc_negotiation: Start, SA = { 851c1603 83e40110 - 96434ed8 6dbde313} [Apr 14 05:07:29 PIC 1/6/0 KMD1]ike_decode_packet: Start [Apr 14 05:07:29 PIC 1/6/0 KMD1]ike_decode_packet: Start, SA = { 851c1603 83e40110 - 96434ed8 6dbde313} / df4761c9, nego = 0 [Apr 14 05:07:29 PIC 1/6/0 KMD1]ike_st_i_encrypt: Check that packet was encrypted succeeded [Apr 14 05:07:29 PIC 1/6/0 KMD1]ike_st_i_gen_hash: Start, hash[0..20] = 41797dd1 13818032 ... [Apr 14 05:07:29 PIC 1/6/0 KMD1]ike_st_i_d: Start, doi = 1, protocol = 3, spis[0..1][0..4] = [9a77bad3 00000000 ...] [Apr 14 05:07:29 PIC 1/6/0 KMD1]iked_pm_ipsec_spi_delete_received: Received IPsec SPI delete for SPI 0x9a77bad3 from the IKE library [Apr 14 05:07:29 PIC 1/6/0 KMD1]SA already deleted for this spi [Apr 14 05:07:29 PIC 1/6/0 KMD1]ike_st_i_private: Start [Apr 14 05:07:29 PIC 1/6/0 KMD1]ike_send_notify: Connected, SA = { 851c1603 83e40110 - 96434ed8 6dbde313}, nego = 0 [Apr 14 05:07:29 PIC 1/6/0 KMD1]ike_delete_negotiation: Start, SA = { 851c1603 83e40110 - 96434ed8 6dbde313}, nego = 0 [Apr 14 05:07:29 PIC 1/6/0 KMD1]ike_free_negotiation_info: Start, nego = 0 [Apr 14 05:07:29 PIC 1/6/0 KMD1]ike_free_negotiation: Start, nego = 0 [Apr 14 05:03:45 PIC 2/6/0 KMD1]Config download: Processed 102 - 103 messages [Apr 14 05:03:45 PIC 2/6/0 KMD1]Config download time: 0 secs [Apr 14 05:03:45 PIC 2/6/0 KMD1]iked_group_template_sa_cfg_convert: sa_cfg tunnel-pRBS-cert-TEMP not ready [Apr 14 05:03:45 PIC 2/6/0 KMD1]iked_config_process_config_list, configuration diff complete [Apr 14 05:09:24 PIC 1/6/0 KMD2]Config download: Processed 102 - 103 messages [Apr 14 05:09:24 PIC 1/6/0 KMD2]Config download time: 0 secs [Apr 14 05:09:24 PIC 1/6/0 KMD2]iked_group_template_sa_cfg_convert: sa_cfg tunnel-pRBS-cert-TEMP not ready [Apr 14 05:09:24 PIC 1/6/0 KMD2]iked_config_process_config_list, configuration diff complete [Apr 14 05:03:39 PIC 2/7/0 KMD2]Config download: Processed 102 - 103 messages [Apr 14 05:03:39 PIC 2/7/0 KMD2]Config download time: 0 secs [Apr 14 05:03:39 PIC 2/7/0 KMD2]iked_group_template_sa_cfg_convert: sa_cfg tunnel-pRBS-cert-TEMP not ready [Apr 14 05:03:39 PIC 2/7/0 KMD2]iked_config_process_config_list, configuration diff complete [Apr 14 05:09:24 KMD-RE]kmd_iked_cfgbuf_addrec: 530: ** Allocated recptr is 0, reclen = 0 ** [Apr 14 05:09:24 KMD-RE]kmd_iked_cfgbuf_addrec: 530: ** Allocated recptr is c, reclen = 0 ** [Apr 14 05:09:24 KMD-RE]Error: Unknown record, type = 25 [Apr 14 05:09:24 KMD-RE]kmd_iked_cfgbuf_addrec: 530: ** Allocated recptr is 41c, reclen = 0 ** [Apr 14 05:09:24 KMD-RE]kmd_iked_cfgbuf_addrec: 530: ** Allocated recptr is 4, reclen = 0 ** [Apr 14 05:09:24 KMD-RE]kmd_iked_cfgbuf_addrec: 530: ** Allocated recptr is 54, reclen = 0 ** [Apr 14 05:09:24 KMD-RE]kmd_iked_cfgbuf_addrec: 530: ** Allocated recptr is 0, reclen = 0 ** [Apr 14 05:09:24 KMD-RE]Config download: Processed 102 - 103 messages [Apr 14 05:09:24 KMD-RE]Config download time: 0 secs [Apr 14 05:09:25 KMD-RE]iked_sa_cfg_delete_from_hash_table: Failed to delete sa_cfg tunnel-pRBS-cert-TEMP from sadb hash tbl [Apr 14 05:09:25 KMD-RE]iked_group_template_sa_cfg_convert: sa_cfg tunnel-pRBS-cert-TEMP not ready [Apr 14 05:09:25 KMD-RE]iked_config_process_config_list, configuration diff complete [Apr 14 05:09:24 PIC 1/6/0 KMD1]Config download: Processed 102 - 103 messages [Apr 14 05:09:24 PIC 1/6/0 KMD1]Config download time: 0 secs [Apr 14 05:09:24 PIC 1/6/0 KMD1]iked_group_template_sa_cfg_convert: sa_cfg tunnel-pRBS-cert-TEMP not ready [Apr 14 05:09:24 PIC 1/6/0 KMD1]iked_config_process_config_list, configuration diff complete [Apr 14 05:03:39 PIC 2/7/0 KMD1]Config download: Processed 102 - 103 messages [Apr 14 05:03:39 PIC 2/7/0 KMD1]Config download time: 0 secs [Apr 14 05:03:39 PIC 2/7/0 KMD1]iked_group_template_sa_cfg_convert: sa_cfg tunnel-pRBS-cert-TEMP not ready [Apr 14 05:03:39 PIC 2/7/0 KMD1]iked_config_process_config_list, configuration diff complete [Apr 14 05:09:24 PIC 1/7/0 KMD2]Config download: Processed 102 - 103 messages [Apr 14 05:09:24 PIC 1/7/0 KMD2]Config download time: 0 secs [Apr 14 05:09:24 PIC 1/7/0 KMD2]iked_group_template_sa_cfg_convert: sa_cfg tunnel-pRBS-cert-TEMP not ready [Apr 14 05:09:24 PIC 1/7/0 KMD2]iked_config_process_config_list, configuration diff complete [Apr 14 05:03:45 PIC 2/6/0 KMD2]Config download: Processed 102 - 103 messages [Apr 14 05:03:45 PIC 2/6/0 KMD2]Config download time: 0 secs [Apr 14 05:03:45 PIC 2/6/0 KMD2]iked_group_template_sa_cfg_convert: sa_cfg tunnel-pRBS-cert-TEMP not ready [Apr 14 05:03:45 PIC 2/6/0 KMD2]iked_config_process_config_list, configuration diff complete [Apr 14 05:09:24 PIC 1/7/0 KMD1]Config download: Processed 102 - 103 messages [Apr 14 05:09:24 PIC 1/7/0 KMD1]Config download time: 0 secs [Apr 14 05:09:24 PIC 1/7/0 KMD1]iked_group_template_sa_cfg_convert: sa_cfg tunnel-pRBS-cert-TEMP not ready [Apr 14 05:09:24 PIC 1/7/0 KMD1]iked_config_process_config_list, configuration diff complete [Apr 14 05:21:53 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f88000 from freelist [Apr 14 05:21:53 PIC 1/7/0 KMD2]ikev2_decode_packet: [100f88000/100fc7800] Setting ed pkt ctx from VR id 65535 to VR id 19) [Apr 14 05:21:53 PIC 1/7/0 KMD2]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1903896426 [Apr 14 05:21:53 PIC 1/7/0 KMD2]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1903896426 [Apr 14 05:21:53 PIC 1/7/0 KMD2]ikev2_decode_packet: [100f88000/100fc7800] Received packet: HDR, SA, KE, Nonce, N(NAT_DETECTION_SOURCE_IP), N(NAT_DETECTION_DESTINATION_IP) [Apr 14 05:21:53 PIC 1/7/0 KMD2]iked_pm_dynamic_gw_local_addr_based_lookup: Found gateway matching local addr ike-gw-pRBS-cert for remote dynamic peer, sa_cfg[tunnel-pRBS-cert-TEMP] [Apr 14 05:21:53 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f89000 from freelist [Apr 14 05:21:53 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f89800 from freelist [Apr 14 05:21:53 PIC 1/7/0 KMD2]iked_pm_ike_conf_received: Received configuration payload CONF(type = 1, [0] type = IPv4 address (1), len = 0, no value; [1] type = IPv4 dns (3), len = 0, no value; ) from the IKE library. Action not supported. [Apr 14 05:21:53 PIC 1/7/0 KMD2]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload MOBIKE supported from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1903896426 [Apr 14 05:21:53 PIC 1/7/0 KMD2]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload Additional IPv4 addresses from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1903896426 [Apr 14 05:21:53 PIC 1/7/0 KMD2]iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload unknown from local:10.185.49.212 remote:10.185.49.194 IKEv2 for P1 SA 1903896426 [Apr 14 05:21:53 PIC 1/7/0 KMD2]ikev2_decode_packet: [100f89800/100fc7800] Received packet: HDR, IDi, CERT, CERT, CERT, CERTREQ, AUTH, CP, SA, TSi, TSr, N(MOBIKE_SUPPORTED), N(ADDITIONAL_IP4_ADDRESS), N(RESERVED) [Apr 14 05:21:53 PIC 1/7/0 KMD2]iked_pm_id_validate id NOT matched. [Apr 14 05:21:53 PIC 1/7/0 KMD2]ikev2_reply_cb_public_key: [100f89800/100fc7800] Error: public_key failed: 24 [Apr 14 05:21:53 PIC 1/7/0 KMD2]ikev2_state_error: [100f89800/100fc7800] Negotiation failed because of error Authentication failed (24) [Apr 14 05:21:53 PIC 1/7/0 KMD2]IKE negotiation fail for local:10.185.49.212, remote:10.185.49.194 IKEv2 with status: Authentication failed [Apr 14 05:21:53 PIC 1/7/0 KMD2]IPSec negotiation failed for SA-CFG tunnel-pRBS-cert-TEMP for local:10.185.49.212, remote:10.185.49.194 IKEv2. status: Authentication failed [Apr 14 05:21:53 PIC 1/7/0 KMD2] P2 ed info: flags 0x0, P2 error: Error ok [Apr 14 05:21:53 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f8a000 from freelist [Apr 14 05:21:57 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f8a800 from freelist [Apr 14 05:22:04 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f8b800 from freelist [Apr 14 05:22:17 PIC 1/7/0 KMD2]ikev2_packet_allocate: Allocated packet 100f8d800 from freelist [Apr 14 05:22:23 PIC 1/7/0 KMD2]P1 SA 1903896426 timer expiry. ref cnt 0, timer reason Force delete timer expired (1), flags 0x200. [Apr 14 05:22:23 PIC 1/7/0 KMD2]IKE SA delete called for p1 sa 1903896426 (ref cnt 1) local:10.185.49.212, remote:10.185.49.194, IKEv2 [Apr 14 05:22:23 PIC 1/7/0 KMD2]iked_pm_p1_sa_destroy: p1 sa 1903896426 (ref cnt 0), waiting_for_del 0x0 [Apr 14 05:22:23 PIC 1/7/0 KMD2]iked_pm_ike_sa_delete_done_cb: For null p1 sa, status: Error ok {primary:node0} ejjnyyo@SRX3400-1> show log pki_trace.txt Apr 14 04:23:31 pkid_config_read, enrollment trace in pid 1454 Apr 14 04:23:31 pkid_read_after_key_gen_config: self-test after-key-generation option not configured Apr 14 04:23:31 Inside pkid_security_pki_config... Apr 14 04:23:31 attribute_name is: log Apr 14 04:23:31 attribute_name is: pki Apr 14 04:23:31 attribute_name is: ike Apr 14 04:23:31 attribute_name is: ipsec Apr 14 04:23:31 attribute_name is: alg Apr 14 04:23:31 attribute_name is: utm Apr 14 04:23:31 attribute_name is: forwarding-options Apr 14 04:23:31 attribute_name is: flow Apr 14 04:23:31 attribute_name is: screen Apr 14 04:23:31 attribute_name is: nat Apr 14 04:23:31 attribute_name is: policies Apr 14 04:23:31 attribute_name is: analysis Apr 14 04:23:31 attribute_name is: datapath-debug Apr 14 04:23:31 attribute_name is: zones Apr 14 04:23:31 2 pkid_security_pki_config... Apr 14 04:23:31 3 pkid_security_pki_config... Apr 14 04:23:31 4 pkid_security_pki_config... Apr 14 04:23:31 ddc_ca_profile_object 0x602aeca0 Apr 14 04:23:31 Inside pkid_pki_ca_profile_config... Apr 14 04:23:31 ddc_ca_profile_name_attr LTEIPsecSEGRootCA Apr 14 04:23:31 Creating a CA config LTEIPsecSEGRootCA Apr 14 04:23:31 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 04:23:31 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 04:23:31 ddc_ca_identity_attr LTEIPsecSEGRootCA Apr 14 04:23:31 ddc_revocation_check_object 0x602b30e0 Apr 14 04:23:31 Inside pkid_pki_ca_revocation_check_config... Apr 14 04:23:31 ddc_ca_profile_revocation_check_disable_attr 0x0 Apr 14 04:23:31 ddc_ca_profile_name_attr LTEIPsecNEcusRootCA Apr 14 04:23:31 Creating a CA config LTEIPsecNEcusRootCA Apr 14 04:23:31 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 04:23:31 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 04:23:31 ddc_ca_identity_attr LTEIPsecNEcusRootCA Apr 14 04:23:31 ddc_revocation_check_object 0x602b31a0 Apr 14 04:23:31 Inside pkid_pki_ca_revocation_check_config... Apr 14 04:23:31 ddc_ca_profile_revocation_check_disable_attr 0x0 Apr 14 04:23:31 ddc_ca_profile_name_attr EricssonVCRootCA Apr 14 04:23:31 Creating a CA config EricssonVCRootCA Apr 14 04:23:31 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 04:23:31 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 04:23:31 ddc_ca_identity_attr EricssonVCRootCA Apr 14 04:23:31 ddc_revocation_check_object 0x602164e0 Apr 14 04:23:31 Inside pkid_pki_ca_revocation_check_config... Apr 14 04:23:31 ddc_ca_profile_revocation_check_disable_attr 0x0 Apr 14 04:23:31 pkid_start_crl_for_ca: Start CRL download Apr 14 04:23:31 pkid_start_crl_for_ca: Initiating CRL download for CA EricssonVCRootCA Apr 14 04:23:31 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 04:23:31 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 04:23:31 pkid_initiate_crl_for_ca: Revocation check disabled for CA EricssonVCRootCA Apr 14 04:23:31 pkid_start_crl_for_ca: Start CRL download Apr 14 04:23:31 pkid_start_crl_for_ca: Initiating CRL download for CA LTEIPsecSEGRootCA Apr 14 04:23:31 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 04:23:31 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 04:23:31 pkid_initiate_crl_for_ca: Revocation check disabled for CA LTEIPsecSEGRootCA Apr 14 04:23:31 pkid_start_crl_for_ca: Start CRL download Apr 14 04:23:31 pkid_start_crl_for_ca: Initiating CRL download for CA LTEIPsecNEcusRootCA Apr 14 04:23:31 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 04:23:31 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 04:23:31 pkid_initiate_crl_for_ca: Revocation check disabled for CA LTEIPsecNEcusRootCA Apr 14 04:24:36 received SIGHUP, pid 1454 Apr 14 04:24:36 pkid_config_read, enrollment trace in pid 1454 Apr 14 04:24:36 pkid_read_after_key_gen_config: self-test after-key-generation option not configured Apr 14 04:24:36 Inside pkid_security_pki_config... Apr 14 04:24:36 attribute_name is: log Apr 14 04:24:36 attribute_name is: pki Apr 14 04:24:36 attribute_name is: ike Apr 14 04:24:36 attribute_name is: ipsec Apr 14 04:24:36 attribute_name is: alg Apr 14 04:24:36 attribute_name is: utm Apr 14 04:24:36 attribute_name is: forwarding-options Apr 14 04:24:36 attribute_name is: flow Apr 14 04:24:36 attribute_name is: screen Apr 14 04:24:36 attribute_name is: nat Apr 14 04:24:36 attribute_name is: policies Apr 14 04:24:36 attribute_name is: analysis Apr 14 04:24:36 attribute_name is: datapath-debug Apr 14 04:24:36 attribute_name is: zones Apr 14 04:24:36 2 pkid_security_pki_config... Apr 14 04:24:36 3 pkid_security_pki_config... Apr 14 04:24:36 4 pkid_security_pki_config... Apr 14 04:24:36 ddc_ca_profile_object 0x602aeca0 Apr 14 04:24:36 Inside pkid_pki_ca_profile_config... Apr 14 04:24:36 ddc_ca_profile_name_attr LTEIPsecSEGRootCA Apr 14 04:24:36 Creating a CA config LTEIPsecSEGRootCA Apr 14 04:24:36 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 04:24:36 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 04:24:36 ddc_ca_identity_attr LTEIPsecSEGRootCA Apr 14 04:24:36 ddc_revocation_check_object 0x602b30e0 Apr 14 04:24:36 Inside pkid_pki_ca_revocation_check_config... Apr 14 04:24:36 ddc_ca_profile_revocation_check_disable_attr 0x0 Apr 14 04:24:36 ddc_ca_profile_name_attr LTEIPsecNEcusRootCA Apr 14 04:24:36 Creating a CA config LTEIPsecNEcusRootCA Apr 14 04:24:36 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 04:24:36 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 04:24:36 ddc_ca_identity_attr LTEIPsecNEcusRootCA Apr 14 04:24:36 ddc_revocation_check_object 0x602b31a0 Apr 14 04:24:36 Inside pkid_pki_ca_revocation_check_config... Apr 14 04:24:36 ddc_ca_profile_revocation_check_disable_attr 0x0 Apr 14 04:24:36 found ca cert for profile id Apr 14 04:24:36 pkid ca cert found in lhash Apr 14 04:24:36 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 04:24:36 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 04:24:36 Checking Issuer:: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 14 04:24:36 Check CA:: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 14 04:24:36 Checking Issuer:: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 14 04:24:36 pkid_clear_one_ca_certificate, delete ca cert id Apr 14 04:24:36 pkid_delete_cert_id: Deleted cert-id = EricssonVCRootCA of len = 16 from list Apr 14 04:24:36 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 04:24:36 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 04:24:36 pkid_clear_one_crl: Error in get crl for EricssonVCRootCA Apr 14 04:24:36 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 04:24:36 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 04:24:36 pkid_initiate_crl_for_ca: Revocation check disabled for CA EricssonVCRootCA Apr 14 04:24:36 pkid_start_crl_for_ca: Start CRL download Apr 14 04:24:36 pkid_start_crl_for_ca: Initiating CRL download for CA LTEIPsecSEGRootCA Apr 14 04:24:36 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 04:24:36 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 04:24:36 pkid_initiate_crl_for_ca: Revocation check disabled for CA LTEIPsecSEGRootCA Apr 14 04:24:36 pkid_start_crl_for_ca: Start CRL download Apr 14 04:24:36 pkid_start_crl_for_ca: Initiating CRL download for CA LTEIPsecNEcusRootCA Apr 14 04:24:36 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 04:24:36 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 04:24:36 pkid_initiate_crl_for_ca: Revocation check disabled for CA LTEIPsecNEcusRootCA Apr 14 04:26:38 received SIGHUP, pid 1454 Apr 14 04:26:38 pkid_config_read, enrollment trace in pid 1454 Apr 14 04:26:38 pkid_read_after_key_gen_config: self-test after-key-generation option not configured Apr 14 04:26:38 Inside pkid_security_pki_config... Apr 14 04:26:38 attribute_name is: log Apr 14 04:26:38 attribute_name is: pki Apr 14 04:26:38 attribute_name is: ike Apr 14 04:26:38 attribute_name is: ipsec Apr 14 04:26:38 attribute_name is: alg Apr 14 04:26:38 attribute_name is: utm Apr 14 04:26:38 attribute_name is: forwarding-options Apr 14 04:26:38 attribute_name is: flow Apr 14 04:26:38 attribute_name is: screen Apr 14 04:26:38 attribute_name is: nat Apr 14 04:26:38 attribute_name is: policies Apr 14 04:26:38 attribute_name is: analysis Apr 14 04:26:38 attribute_name is: datapath-debug Apr 14 04:26:38 attribute_name is: zones Apr 14 04:26:38 2 pkid_security_pki_config... Apr 14 04:26:38 3 pkid_security_pki_config... Apr 14 04:26:38 4 pkid_security_pki_config... Apr 14 04:26:38 ddc_ca_profile_object 0x602aeca0 Apr 14 04:26:38 Inside pkid_pki_ca_profile_config... Apr 14 04:26:38 ddc_ca_profile_name_attr LTEIPsecSEGRootCA Apr 14 04:26:38 Creating a CA config LTEIPsecSEGRootCA Apr 14 04:26:38 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 04:26:38 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 04:26:38 ddc_ca_identity_attr LTEIPsecSEGRootCA Apr 14 04:26:38 ddc_revocation_check_object 0x602b30e0 Apr 14 04:26:38 Inside pkid_pki_ca_revocation_check_config... Apr 14 04:26:38 ddc_ca_profile_revocation_check_disable_attr 0x0 Apr 14 04:26:38 ddc_ca_profile_name_attr LTEIPsecNEcusRootCA Apr 14 04:26:38 Creating a CA config LTEIPsecNEcusRootCA Apr 14 04:26:38 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 04:26:38 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 04:26:38 ddc_ca_identity_attr LTEIPsecNEcusRootCA Apr 14 04:26:38 ddc_revocation_check_object 0x602b31a0 Apr 14 04:26:38 Inside pkid_pki_ca_revocation_check_config... Apr 14 04:26:38 ddc_ca_profile_revocation_check_disable_attr 0x0 Apr 14 04:26:38 ddc_ca_profile_name_attr Ericsson_pRBS Apr 14 04:26:38 Creating a CA config Ericsson_pRBS Apr 14 04:26:38 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 04:26:38 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 14 04:26:38 Inside pkid_add_obj_to_lhash, retrieved obj type <101> from lhash just saved Apr 14 04:26:38 Inside pkid_add_obj_to_lhash, store obj type <101> to lhash, id Apr 14 04:26:38 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 04:26:38 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 04:26:38 pkid_ca_config_create: retrieved ca config from lhash Apr 14 04:26:38 ddc_ca_identity_attr Ericsson_pRBS Apr 14 04:26:38 ddc_revocation_check_object 0x602b3020 Apr 14 04:26:38 Inside pkid_pki_ca_revocation_check_config... Apr 14 04:26:38 ddc_ca_profile_revocation_check_disable_attr 0x0 Apr 14 04:26:38 pkid_start_crl_for_ca: Start CRL download Apr 14 04:26:38 pkid_start_crl_for_ca: Initiating CRL download for CA Ericsson_pRBS Apr 14 04:26:38 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 04:26:38 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 04:26:38 pkid_initiate_crl_for_ca: Revocation check disabled for CA Ericsson_pRBS Apr 14 04:26:38 pkid_start_crl_for_ca: Start CRL download Apr 14 04:26:38 pkid_start_crl_for_ca: Initiating CRL download for CA LTEIPsecSEGRootCA Apr 14 04:26:38 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 04:26:38 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 04:26:38 pkid_initiate_crl_for_ca: Revocation check disabled for CA LTEIPsecSEGRootCA Apr 14 04:26:38 pkid_start_crl_for_ca: Start CRL download Apr 14 04:26:38 pkid_start_crl_for_ca: Initiating CRL download for CA LTEIPsecNEcusRootCA Apr 14 04:26:38 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 04:26:38 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 04:26:38 pkid_initiate_crl_for_ca: Revocation check disabled for CA LTEIPsecNEcusRootCA Apr 14 04:27:21 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 04:27:22 checkLdapResponse Apr 14 04:27:49 pkid_request_security_pki_ca_cert_load: rehearsal yes Apr 14 04:27:49 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 04:27:49 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 04:27:49 pkid_request_security_pki_ca_cert_load: request ca cert load prof fname<:b:/cf/root/VC_Root_CA_A1.der> caf format<0> Apr 14 04:27:49 pkid_load_object_from_file, load form file Apr 14 04:27:49 pkid_read_fullpath_file_to_buf, read Apr 14 04:27:49 loadx509File: file_name :1952000 len = 1496 Apr 14 04:27:49 Attempt (PKCS7, ASN1) format ... Apr 14 04:27:49 Attempt raw(DER, ASN1) format for certificate Apr 14 04:27:49 raw(DER, ASN1) format found for CERT Apr 14 04:27:49 load_one_x509File, load one cert to hash Apr 14 04:27:49 count x509 object, type<1> Apr 14 04:27:49 pkid_request_security_pki_ca_cert_load: rehearsal no Apr 14 04:27:49 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 04:27:49 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 04:27:49 pkid_request_security_pki_ca_cert_load: request ca cert load prof fname<:b:/cf/root/VC_Root_CA_A1.der> caf format<0> Apr 14 04:27:49 pkid_load_object_from_file, load form file Apr 14 04:27:49 pkid_read_fullpath_file_to_buf, read Apr 14 04:27:49 loadx509File: file_name :1952000 len = 1496 Apr 14 04:27:49 Attempt (PKCS7, ASN1) format ... Apr 14 04:27:49 Attempt raw(DER, ASN1) format for certificate Apr 14 04:27:49 raw(DER, ASN1) format found for CERT Apr 14 04:27:49 load_one_x509File, load one cert to hash Apr 14 04:27:49 count x509 object, type<1> Apr 14 04:27:49 Inside pkid_add_obj_to_lhash, retrieved obj type <1> from lhash just saved Apr 14 04:27:49 Inside pkid_add_obj_to_lhash, store obj type <1> to lhash, id Apr 14 04:27:49 pkid_save_obj_to_file, save to Apr 14 04:27:50 found ca cert for profile id Apr 14 04:27:50 pkid ca cert found in lhash Apr 14 04:27:50 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 04:27:50 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 04:27:50 Checking Issuer:: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 14 04:27:50 Check CA:: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 14 04:27:50 Checking Issuer:: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 14 04:27:50 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 04:27:50 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 04:27:50 pkid_initiate_crl_for_ca: Revocation check disabled for CA Ericsson_pRBS Apr 14 04:27:50 pkid_add_cert_id: Added cert-id = Ericsson_pRBS of len = 13 to list Apr 14 04:30:16 Inside pkid_request_security_pki_ca_cert_verify, pid<1454> Apr 14 04:30:16 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 04:30:16 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 04:30:16 pkid_request_security_pki_ca_cert_verify, key cert Apr 14 04:30:16 found ca cert for profile id Apr 14 04:30:16 pkid ca cert found in lhash Apr 14 04:30:16 Cert-Chain-Val> Building cert Chain Apr 14 04:30:16 Adding EE to the untrusted chain: /C=SE/O=Ericsson/CN=VC_Root_CA_A1 Apr 14 04:30:16 Cert-Chain-Val> self signed cert encountered Apr 14 04:30:16 build_untrust_chain: Zero depth self signed cert Apr 14 04:30:16 Cert-Chain-Val> 0 0 idx<0>, total<1> Apr 14 04:30:16 Root CA: /C=SE/O=Ericsson/CN=VC_Root_CA_A1 Apr 14 04:30:16 Cert-Chain-Val> Start Certificate Validation Apr 14 04:30:16 Verifying cert: /C=SE/O=Ericsson/CN=VC_Root_CA_A1 Apr 14 04:30:16 Cert issued by: /C=SE/O=Ericsson/CN=VC_Root_CA_A1 Apr 14 04:30:16 CA=TRUE validation successful Apr 14 04:30:16 X509_cmp_current_time_ns: time comparison result -1 Apr 14 04:30:16 X509_cmp_current_time_ns: time comparison result 1 Apr 14 04:30:16 CERT VERIFIED: /C=SE/O=Ericsson/CN=VC_Root_CA_A1 Apr 14 04:30:16 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 04:30:16 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 04:30:16 Cert-Chain-Val> warning: Revocation Check skipped Apr 14 04:30:16 Apr 14 04:30:16 Cert-Chain-Val> Cert-Chian Validation Cur<0> Total<1> Apr 14 04:30:16 Cert-Chain-Val> at end Apr 14 04:30:16 ldapNotify_func Apr 14 04:30:16 Top of chain verified ok: /C=SE/O=Ericsson/CN=VC_Root_CA_A1 Apr 14 04:30:16 cert verified ok: /C=SE/O=Ericsson/CN=VC_Root_CA_A1 Apr 14 04:30:16 ldapIdleCleanup <35><127><35><84> Apr 14 04:30:16 pCert_no_buf: /C=SE/O=Ericsson/CN=VC_Root_CA_A1 Apr 14 04:30:16 pCert_with_buf: /C=SE/O=Ericsson/CN=VC_Root_CA_A1 Apr 14 04:30:16 pCaCert: /C=SE/O=Ericsson/CN=VC_Root_CA_A1 Apr 14 04:30:16 scep_http_release_all: releasing LDAP-STATE 1933400 Apr 14 04:30:16 pkid_request_security_pki_ca_cert_verify, verified CA cert, id Apr 14 04:31:38 checkLdapResponse Apr 14 04:32:46 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 04:32:46 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 14 04:32:46 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 04:32:46 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 14 04:32:46 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 04:32:46 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 14 04:35:53 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 04:35:54 checkLdapResponse Apr 14 04:40:11 checkLdapResponse Apr 14 04:44:26 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 04:44:27 checkLdapResponse Apr 14 04:48:43 checkLdapResponse Apr 14 04:52:59 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 04:53:00 checkLdapResponse Apr 14 04:57:16 checkLdapResponse Apr 14 05:01:31 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 05:01:32 checkLdapResponse Apr 14 05:05:48 checkLdapResponse Apr 14 05:10:04 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 05:10:05 checkLdapResponse Apr 14 05:14:21 checkLdapResponse Apr 14 05:18:36 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 05:18:37 checkLdapResponse Apr 14 05:22:53 checkLdapResponse Apr 14 05:27:09 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 05:27:10 checkLdapResponse Apr 14 05:31:26 checkLdapResponse Apr 14 05:35:41 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 05:35:42 checkLdapResponse Apr 14 05:39:58 checkLdapResponse Apr 14 05:44:14 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 05:44:15 checkLdapResponse Apr 14 05:48:31 checkLdapResponse Apr 14 05:52:46 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 05:52:47 checkLdapResponse Apr 14 05:57:04 checkLdapResponse Apr 14 06:01:19 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 06:01:20 checkLdapResponse Apr 14 06:05:36 checkLdapResponse Apr 14 06:09:51 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 06:09:52 checkLdapResponse Apr 14 06:14:09 checkLdapResponse Apr 14 06:18:24 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 06:18:25 checkLdapResponse Apr 14 06:22:41 checkLdapResponse Apr 14 06:26:56 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 06:26:57 checkLdapResponse Apr 14 06:31:14 checkLdapResponse Apr 14 06:35:29 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 06:35:30 checkLdapResponse Apr 14 06:39:46 checkLdapResponse Apr 14 06:44:02 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 06:44:03 checkLdapResponse Apr 14 06:48:19 checkLdapResponse Apr 14 06:52:34 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 06:52:35 checkLdapResponse Apr 14 06:56:51 checkLdapResponse Apr 14 07:01:07 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 07:01:08 checkLdapResponse Apr 14 07:05:24 checkLdapResponse Apr 14 07:09:39 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 07:09:40 checkLdapResponse Apr 14 07:13:56 checkLdapResponse Apr 14 07:18:12 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 07:18:13 checkLdapResponse Apr 14 07:22:29 checkLdapResponse Apr 14 07:26:44 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 07:26:45 checkLdapResponse Apr 14 07:31:01 checkLdapResponse Apr 14 07:35:17 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 07:35:18 checkLdapResponse Apr 14 07:39:34 checkLdapResponse Apr 14 07:43:49 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 07:43:50 checkLdapResponse Apr 14 07:48:07 checkLdapResponse Apr 14 07:52:22 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 07:52:23 checkLdapResponse Apr 14 07:56:39 checkLdapResponse Apr 14 08:00:54 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 08:00:55 checkLdapResponse Apr 14 08:05:12 checkLdapResponse Apr 14 08:09:27 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 08:09:28 checkLdapResponse Apr 14 08:13:44 checkLdapResponse Apr 14 08:17:59 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 08:18:00 checkLdapResponse Apr 14 08:22:17 checkLdapResponse Apr 14 08:26:32 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 08:26:33 checkLdapResponse Apr 14 08:30:49 checkLdapResponse Apr 14 08:35:04 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 08:35:05 checkLdapResponse Apr 14 08:39:22 checkLdapResponse Apr 14 08:43:37 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 08:43:38 checkLdapResponse Apr 14 08:47:54 checkLdapResponse Apr 14 08:52:09 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 08:52:10 checkLdapResponse Apr 14 08:56:27 checkLdapResponse Apr 14 09:00:42 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 09:00:43 checkLdapResponse Apr 14 09:04:59 checkLdapResponse Apr 14 09:09:15 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 09:09:16 checkLdapResponse Apr 14 09:13:32 checkLdapResponse Apr 14 09:17:47 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 09:17:48 checkLdapResponse Apr 14 09:22:04 checkLdapResponse Apr 14 09:26:20 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 09:26:21 checkLdapResponse Apr 14 09:30:37 checkLdapResponse Apr 14 09:34:52 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 09:34:53 checkLdapResponse Apr 14 09:39:09 checkLdapResponse Apr 14 09:43:25 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 09:43:26 checkLdapResponse Apr 14 09:47:42 checkLdapResponse Apr 14 09:51:57 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 09:51:58 checkLdapResponse Apr 14 09:56:14 checkLdapResponse Apr 14 10:00:30 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 10:00:31 checkLdapResponse Apr 14 10:04:47 checkLdapResponse Apr 14 10:09:02 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 10:09:03 checkLdapResponse Apr 14 10:13:19 checkLdapResponse Apr 14 10:17:35 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 10:17:36 checkLdapResponse Apr 14 10:21:52 checkLdapResponse Apr 14 10:26:07 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 10:26:08 checkLdapResponse Apr 14 10:30:24 checkLdapResponse Apr 14 10:34:40 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 10:34:41 checkLdapResponse Apr 14 10:38:57 checkLdapResponse Apr 14 10:43:12 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 10:43:13 checkLdapResponse Apr 14 10:47:30 checkLdapResponse Apr 14 10:51:45 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 10:51:46 checkLdapResponse Apr 14 10:56:02 checkLdapResponse Apr 14 11:00:17 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 11:00:18 checkLdapResponse Apr 14 11:04:35 checkLdapResponse Apr 14 11:08:50 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 11:08:51 checkLdapResponse Apr 14 11:13:07 checkLdapResponse Apr 14 11:17:22 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 11:17:23 checkLdapResponse Apr 14 11:21:40 checkLdapResponse Apr 14 11:25:55 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 11:25:56 checkLdapResponse Apr 14 11:30:12 checkLdapResponse Apr 14 11:34:27 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 11:34:28 checkLdapResponse Apr 14 11:38:45 checkLdapResponse Apr 14 11:43:00 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 11:43:01 checkLdapResponse Apr 14 11:47:17 checkLdapResponse Apr 14 11:51:32 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 11:51:33 checkLdapResponse Apr 14 11:55:50 checkLdapResponse Apr 14 12:00:05 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 12:00:06 checkLdapResponse Apr 14 12:04:22 checkLdapResponse Apr 14 12:08:38 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 12:08:39 checkLdapResponse Apr 14 12:12:55 checkLdapResponse Apr 14 12:17:10 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 12:17:11 checkLdapResponse Apr 14 12:21:27 checkLdapResponse Apr 14 12:25:43 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 12:25:44 checkLdapResponse Apr 14 12:30:00 checkLdapResponse Apr 14 12:34:15 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 12:34:16 checkLdapResponse Apr 14 12:38:32 checkLdapResponse Apr 14 12:42:48 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 12:42:49 checkLdapResponse Apr 14 12:47:05 checkLdapResponse Apr 14 12:51:20 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 12:51:21 checkLdapResponse Apr 14 12:55:37 checkLdapResponse Apr 14 12:59:53 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 12:59:54 checkLdapResponse Apr 14 13:04:10 checkLdapResponse Apr 14 13:08:25 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 13:08:26 checkLdapResponse Apr 14 13:12:42 checkLdapResponse Apr 14 13:16:58 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 13:16:59 checkLdapResponse Apr 14 13:21:15 checkLdapResponse Apr 14 13:25:30 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 13:25:31 checkLdapResponse Apr 14 13:29:47 checkLdapResponse Apr 14 13:34:03 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 13:34:04 checkLdapResponse Apr 14 13:38:20 checkLdapResponse Apr 14 13:42:35 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 13:42:36 checkLdapResponse Apr 14 13:46:52 checkLdapResponse Apr 14 13:51:08 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 13:51:09 checkLdapResponse Apr 14 13:55:25 checkLdapResponse Apr 14 13:59:40 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 13:59:41 checkLdapResponse Apr 14 14:03:58 checkLdapResponse Apr 14 14:08:13 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 14:08:14 checkLdapResponse Apr 14 14:12:30 checkLdapResponse Apr 14 14:16:45 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 14:16:46 checkLdapResponse Apr 14 14:21:03 checkLdapResponse Apr 14 14:25:18 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 14:25:19 checkLdapResponse Apr 14 14:29:35 checkLdapResponse Apr 14 14:33:50 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 14:33:51 checkLdapResponse Apr 14 14:38:08 checkLdapResponse Apr 14 14:42:23 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 14:42:24 checkLdapResponse Apr 14 14:46:40 checkLdapResponse Apr 14 14:50:55 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 14:50:56 checkLdapResponse Apr 14 14:55:13 checkLdapResponse Apr 14 14:59:28 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 14:59:29 checkLdapResponse Apr 14 15:03:45 checkLdapResponse Apr 14 15:08:00 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 15:08:01 checkLdapResponse Apr 14 15:12:18 checkLdapResponse Apr 14 15:16:33 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 15:16:34 checkLdapResponse Apr 14 15:20:50 checkLdapResponse Apr 14 15:25:05 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 15:25:06 checkLdapResponse Apr 14 15:29:23 checkLdapResponse Apr 14 15:33:38 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 15:33:39 checkLdapResponse Apr 14 15:37:55 checkLdapResponse Apr 14 15:42:10 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 15:42:12 checkLdapResponse Apr 14 15:46:28 checkLdapResponse Apr 14 15:50:43 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 15:50:44 checkLdapResponse Apr 14 15:55:00 checkLdapResponse Apr 14 15:59:16 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 15:59:17 checkLdapResponse Apr 14 16:03:33 checkLdapResponse Apr 14 16:07:48 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 16:07:49 checkLdapResponse Apr 14 16:12:05 checkLdapResponse Apr 14 16:16:21 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 16:16:22 checkLdapResponse Apr 14 16:20:38 checkLdapResponse Apr 14 16:24:53 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 16:24:54 checkLdapResponse Apr 14 16:29:10 checkLdapResponse Apr 14 16:33:26 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 16:33:27 checkLdapResponse Apr 14 16:37:43 checkLdapResponse Apr 14 16:41:58 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 16:41:59 checkLdapResponse Apr 14 16:46:15 checkLdapResponse Apr 14 16:50:31 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 16:50:32 checkLdapResponse Apr 14 16:54:48 checkLdapResponse Apr 14 16:59:03 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 16:59:04 checkLdapResponse Apr 14 17:03:20 checkLdapResponse Apr 14 17:07:36 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 17:07:37 checkLdapResponse Apr 14 17:11:53 checkLdapResponse Apr 14 17:16:08 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 17:16:09 checkLdapResponse Apr 14 17:20:25 checkLdapResponse Apr 14 17:24:41 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 17:24:42 checkLdapResponse Apr 14 17:28:58 checkLdapResponse Apr 14 17:33:13 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 17:33:14 checkLdapResponse Apr 14 17:37:31 checkLdapResponse Apr 14 17:41:46 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 17:41:47 checkLdapResponse Apr 14 17:46:03 checkLdapResponse Apr 14 17:50:18 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 17:50:19 checkLdapResponse Apr 14 17:54:36 checkLdapResponse Apr 14 17:58:51 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 17:58:52 checkLdapResponse Apr 14 18:03:08 checkLdapResponse Apr 14 18:07:23 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 18:07:24 checkLdapResponse Apr 14 18:11:41 checkLdapResponse Apr 14 18:15:56 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 18:15:57 checkLdapResponse Apr 14 18:20:13 checkLdapResponse Apr 14 18:24:28 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 18:24:29 checkLdapResponse Apr 14 18:28:46 checkLdapResponse Apr 14 18:33:01 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 18:33:02 checkLdapResponse Apr 14 18:37:18 checkLdapResponse Apr 14 18:41:33 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 18:41:34 checkLdapResponse Apr 14 18:45:51 checkLdapResponse Apr 14 18:50:06 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 18:50:07 checkLdapResponse Apr 14 18:54:23 checkLdapResponse Apr 14 18:58:38 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 18:58:39 checkLdapResponse Apr 14 19:02:56 checkLdapResponse Apr 14 19:07:11 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 19:07:12 checkLdapResponse Apr 14 19:11:28 checkLdapResponse Apr 14 19:15:43 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 19:15:44 checkLdapResponse Apr 14 19:20:01 checkLdapResponse Apr 14 19:24:16 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 19:24:17 checkLdapResponse Apr 14 19:28:33 checkLdapResponse Apr 14 19:32:49 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 19:32:50 checkLdapResponse Apr 14 19:37:06 checkLdapResponse Apr 14 19:41:21 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 19:41:22 checkLdapResponse Apr 14 19:45:38 checkLdapResponse Apr 14 19:49:54 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 19:49:55 checkLdapResponse Apr 14 19:54:11 checkLdapResponse Apr 14 19:58:26 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 19:58:27 checkLdapResponse Apr 14 20:02:43 checkLdapResponse Apr 14 20:06:59 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 20:07:00 checkLdapResponse Apr 14 20:11:16 checkLdapResponse Apr 14 20:15:31 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 20:15:32 checkLdapResponse Apr 14 20:19:48 checkLdapResponse Apr 14 20:24:04 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 20:24:05 checkLdapResponse Apr 14 20:28:21 checkLdapResponse Apr 14 20:32:36 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 20:32:37 checkLdapResponse Apr 14 20:36:53 checkLdapResponse Apr 14 20:41:09 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 20:41:10 checkLdapResponse Apr 14 20:45:26 checkLdapResponse Apr 14 20:49:41 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 20:49:42 checkLdapResponse Apr 14 20:53:58 checkLdapResponse Apr 14 20:58:14 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 20:58:15 checkLdapResponse Apr 14 21:02:31 checkLdapResponse Apr 14 21:06:46 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 21:06:47 checkLdapResponse Apr 14 21:11:03 checkLdapResponse Apr 14 21:15:19 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 21:15:20 checkLdapResponse Apr 14 21:18:44 Inside pkid_request_security_pki_ca_cert_verify, pid<1454> Apr 14 21:18:44 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 21:18:44 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 21:18:44 pkid_request_security_pki_ca_cert_verify, key cert Apr 14 21:18:44 found ca cert for profile id Apr 14 21:18:44 pkid ca cert found in lhash Apr 14 21:18:44 Cert-Chain-Val> Building cert Chain Apr 14 21:18:44 Adding EE to the untrusted chain: /C=SE/O=Ericsson/CN=VC_Root_CA_A1 Apr 14 21:18:44 Cert-Chain-Val> self signed cert encountered Apr 14 21:18:44 build_untrust_chain: Zero depth self signed cert Apr 14 21:18:44 Cert-Chain-Val> 0 0 idx<0>, total<1> Apr 14 21:18:44 Root CA: /C=SE/O=Ericsson/CN=VC_Root_CA_A1 Apr 14 21:18:44 Cert-Chain-Val> Start Certificate Validation Apr 14 21:18:44 Verifying cert: /C=SE/O=Ericsson/CN=VC_Root_CA_A1 Apr 14 21:18:44 Cert issued by: /C=SE/O=Ericsson/CN=VC_Root_CA_A1 Apr 14 21:18:44 CA=TRUE validation successful Apr 14 21:18:44 X509_cmp_current_time_ns: time comparison result -1 Apr 14 21:18:44 X509_cmp_current_time_ns: time comparison result 1 Apr 14 21:18:44 CERT VERIFIED: /C=SE/O=Ericsson/CN=VC_Root_CA_A1 Apr 14 21:18:44 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 21:18:44 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 21:18:44 Cert-Chain-Val> warning: Revocation Check skipped Apr 14 21:18:44 Apr 14 21:18:44 Cert-Chain-Val> Cert-Chian Validation Cur<0> Total<1> Apr 14 21:18:44 Cert-Chain-Val> at end Apr 14 21:18:44 ldapNotify_func Apr 14 21:18:44 Top of chain verified ok: /C=SE/O=Ericsson/CN=VC_Root_CA_A1 Apr 14 21:18:44 cert verified ok: /C=SE/O=Ericsson/CN=VC_Root_CA_A1 Apr 14 21:18:44 ldapIdleCleanup <154><191><80><225> Apr 14 21:18:44 pCert_no_buf: /C=SE/O=Ericsson/CN=VC_Root_CA_A1 Apr 14 21:18:44 pCert_with_buf: /C=SE/O=Ericsson/CN=VC_Root_CA_A1 Apr 14 21:18:44 pCaCert: /C=SE/O=Ericsson/CN=VC_Root_CA_A1 Apr 14 21:18:44 scep_http_release_all: releasing LDAP-STATE 1933400 Apr 14 21:18:44 pkid_request_security_pki_ca_cert_verify, verified CA cert, id Apr 14 21:18:53 Inside pkid_request_security_pki_ca_cert_verify, pid<1454> Apr 14 21:18:53 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 21:18:53 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 21:18:53 pkid_request_security_pki_ca_cert_verify, key cert Apr 14 21:18:53 found ca cert for profile id Apr 14 21:18:53 pkid ca cert found in lhash Apr 14 21:18:53 Cert-Chain-Val> Building cert Chain Apr 14 21:18:53 Adding EE to the untrusted chain: /O=Ericsson/CN=LTEIPSecNEcusRootCA Apr 14 21:18:53 Cert-Chain-Val> self signed cert encountered Apr 14 21:18:53 build_untrust_chain: Zero depth self signed cert Apr 14 21:18:53 Cert-Chain-Val> 0 0 idx<0>, total<1> Apr 14 21:18:53 Root CA: /O=Ericsson/CN=LTEIPSecNEcusRootCA Apr 14 21:18:53 Cert-Chain-Val> Start Certificate Validation Apr 14 21:18:53 Verifying cert: /O=Ericsson/CN=LTEIPSecNEcusRootCA Apr 14 21:18:53 Cert issued by: /O=Ericsson/CN=LTEIPSecNEcusRootCA Apr 14 21:18:53 CA=TRUE validation successful Apr 14 21:18:53 X509_cmp_current_time_ns: time comparison result -1 Apr 14 21:18:53 X509_cmp_current_time_ns: time comparison result 1 Apr 14 21:18:53 CERT VERIFIED: /O=Ericsson/CN=LTEIPSecNEcusRootCA Apr 14 21:18:53 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 21:18:53 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 21:18:53 Cert-Chain-Val> warning: Revocation Check skipped Apr 14 21:18:53 Apr 14 21:18:53 Cert-Chain-Val> Cert-Chian Validation Cur<0> Total<1> Apr 14 21:18:53 Cert-Chain-Val> at end Apr 14 21:18:53 ldapNotify_func Apr 14 21:18:53 Top of chain verified ok: /O=Ericsson/CN=LTEIPSecNEcusRootCA Apr 14 21:18:53 cert verified ok: /O=Ericsson/CN=LTEIPSecNEcusRootCA Apr 14 21:18:53 ldapIdleCleanup <241><217><131><187> Apr 14 21:18:53 pCert_no_buf: /O=Ericsson/CN=LTEIPSecNEcusRootCA Apr 14 21:18:53 pCert_with_buf: /O=Ericsson/CN=LTEIPSecNEcusRootCA Apr 14 21:18:53 pCaCert: /O=Ericsson/CN=LTEIPSecNEcusRootCA Apr 14 21:18:53 scep_http_release_all: releasing LDAP-STATE 1933400 Apr 14 21:18:53 pkid_request_security_pki_ca_cert_verify, verified CA cert, id Apr 14 21:19:01 Inside pkid_request_security_pki_ca_cert_verify, pid<1454> Apr 14 21:19:01 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 21:19:01 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 21:19:01 pkid_request_security_pki_ca_cert_verify, key cert Apr 14 21:19:01 found ca cert for profile id Apr 14 21:19:01 pkid ca cert found in lhash Apr 14 21:19:01 Cert-Chain-Val> Building cert Chain Apr 14 21:19:01 Adding EE to the untrusted chain: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 14 21:19:01 Cert-Chain-Val> self signed cert encountered Apr 14 21:19:01 build_untrust_chain: Zero depth self signed cert Apr 14 21:19:01 Cert-Chain-Val> 0 0 idx<0>, total<1> Apr 14 21:19:01 Root CA: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 14 21:19:01 Cert-Chain-Val> Start Certificate Validation Apr 14 21:19:01 Verifying cert: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 14 21:19:01 Cert issued by: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 14 21:19:01 CA=TRUE validation successful Apr 14 21:19:01 X509_cmp_current_time_ns: time comparison result -1 Apr 14 21:19:01 X509_cmp_current_time_ns: time comparison result 1 Apr 14 21:19:01 CERT VERIFIED: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 14 21:19:01 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 21:19:01 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 21:19:01 Cert-Chain-Val> warning: Revocation Check skipped Apr 14 21:19:01 Apr 14 21:19:01 Cert-Chain-Val> Cert-Chian Validation Cur<0> Total<1> Apr 14 21:19:01 Cert-Chain-Val> at end Apr 14 21:19:01 ldapNotify_func Apr 14 21:19:01 Top of chain verified ok: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 14 21:19:01 cert verified ok: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 14 21:19:01 ldapIdleCleanup <161><88><138><36> Apr 14 21:19:01 pCert_no_buf: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 14 21:19:01 pCert_with_buf: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 14 21:19:01 pCaCert: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 14 21:19:01 scep_http_release_all: releasing LDAP-STATE 1933400 Apr 14 21:19:01 pkid_request_security_pki_ca_cert_verify, verified CA cert, id Apr 14 21:19:36 checkLdapResponse Apr 14 21:23:51 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 21:23:52 checkLdapResponse Apr 14 21:28:08 checkLdapResponse Apr 14 21:32:24 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 21:32:25 checkLdapResponse Apr 14 21:36:41 checkLdapResponse Apr 14 21:40:56 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 21:40:57 checkLdapResponse Apr 14 21:45:14 checkLdapResponse Apr 14 21:49:29 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 21:49:30 checkLdapResponse Apr 14 21:53:46 checkLdapResponse Apr 14 21:58:01 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 21:58:02 checkLdapResponse Apr 14 22:02:19 checkLdapResponse Apr 14 22:06:34 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 22:06:35 checkLdapResponse Apr 14 22:10:51 checkLdapResponse Apr 14 22:15:06 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 22:15:07 checkLdapResponse Apr 14 22:19:24 checkLdapResponse Apr 14 22:23:39 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 22:23:40 checkLdapResponse Apr 14 22:27:56 checkLdapResponse Apr 14 22:32:11 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 22:32:12 checkLdapResponse Apr 14 22:36:29 checkLdapResponse Apr 14 22:40:44 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 22:40:45 checkLdapResponse Apr 14 22:45:01 checkLdapResponse Apr 14 22:49:17 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 22:49:18 checkLdapResponse Apr 14 22:53:34 checkLdapResponse Apr 14 22:57:49 pkid 3 seconds timer off 512 times, pid 1454 Apr 14 22:57:50 checkLdapResponse Apr 14 23:02:06 checkLdapResponse Apr 14 23:05:12 Shutting down on SIGTERM. Apr 14 23:12:03 Inside pkid_security_cc_config... Apr 14 23:12:03 attribute_name is: log Apr 14 23:12:03 attribute_name is: pki Apr 14 23:12:03 attribute_name is: ike Apr 14 23:12:03 attribute_name is: ipsec Apr 14 23:12:03 attribute_name is: alg Apr 14 23:12:03 attribute_name is: utm Apr 14 23:12:03 attribute_name is: forwarding-options Apr 14 23:12:03 attribute_name is: flow Apr 14 23:12:03 attribute_name is: screen Apr 14 23:12:03 attribute_name is: nat Apr 14 23:12:03 attribute_name is: policies Apr 14 23:12:03 attribute_name is: analysis Apr 14 23:12:03 attribute_name is: datapath-debug Apr 14 23:12:03 attribute_name is: zones Apr 14 23:12:03 PKI object store being populated. Apr 14 23:12:03 PKID: initiate ca config lhash. Apr 14 23:12:03 PKID: load config through mgd. Apr 14 23:12:03 PKID: initiate enroll config lhash. Apr 14 23:12:03 PKID: load config through mgd. Apr 14 23:12:03 PKID: initiate ca certificate lhash. Apr 14 23:12:03 pkid_read_fullpath_file_to_buf, read Apr 14 23:12:04 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 23:12:04 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 14 23:12:04 pkid_initiate_crl_for_ca: SKip revocation, No CA-CONFIG for CA Ericsson_pRBS Apr 14 23:12:04 pkid_add_cert_id: Added cert-id = Ericsson_pRBS of len = 13 to list Apr 14 23:12:04 Inside pkid_add_obj_to_lhash, retrieved obj type <1> from lhash just saved Apr 14 23:12:04 Inside pkid_add_obj_to_lhash, store obj type <1> to lhash, id Apr 14 23:12:04 add x509 to lhash Apr 14 23:12:04 pkid_read_fullpath_file_to_buf, read Apr 14 23:12:04 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 23:12:04 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 14 23:12:04 pkid_initiate_crl_for_ca: SKip revocation, No CA-CONFIG for CA LTEIPsecNEcusRootCA Apr 14 23:12:04 pkid_add_cert_id: Added cert-id = LTEIPsecNEcusRootCA of len = 19 to list Apr 14 23:12:04 Inside pkid_add_obj_to_lhash, retrieved obj type <1> from lhash just saved Apr 14 23:12:04 Inside pkid_add_obj_to_lhash, store obj type <1> to lhash, id Apr 14 23:12:04 add x509 to lhash Apr 14 23:12:04 pkid_read_fullpath_file_to_buf, read Apr 14 23:12:04 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 23:12:04 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 14 23:12:04 pkid_initiate_crl_for_ca: SKip revocation, No CA-CONFIG for CA LTEIPsecSEGRootCA Apr 14 23:12:04 pkid_add_cert_id: Added cert-id = LTEIPsecSEGRootCA of len = 17 to list Apr 14 23:12:04 Inside pkid_add_obj_to_lhash, retrieved obj type <1> from lhash just saved Apr 14 23:12:04 Inside pkid_add_obj_to_lhash, store obj type <1> to lhash, id Apr 14 23:12:04 add x509 to lhash Apr 14 23:12:04 PKID: initiate untrusted-ca certificate lhash. Apr 14 23:12:04 PKID: initiate crl lhash. Apr 14 23:12:04 PKID: initiate end-entity certificate lhash. Apr 14 23:12:04 pkid_read_fullpath_file_to_buf, read Apr 14 23:12:04 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 23:12:04 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 14 23:12:04 pkid_crl_initiate_crl_for_certificate: Cannot start CRL download for cert SRX3400-key-pair-1 Apr 14 23:12:04 pkid_add_cert_id: Added cert-id = SRX3400-key-pair-1 of len = 18 to list Apr 14 23:12:04 Inside pkid_add_obj_to_lhash, retrieved obj type <1> from lhash just saved Apr 14 23:12:04 Inside pkid_add_obj_to_lhash, store obj type <1> to lhash, id Apr 14 23:12:04 add x509 to lhash Apr 14 23:12:04 PKID: initiate system self-signed keypair lhash. Apr 14 23:12:04 PKID: initiate system self-signed certificate lhash. Apr 14 23:12:04 pkid_read_fullpath_file_to_buf, read Apr 14 23:12:04 pkid_read_fullpath_file_to_buf, read Apr 14 23:12:04 Inside pkid_add_obj_to_lhash, retrieved obj type <1> from lhash just saved Apr 14 23:12:04 Inside pkid_add_obj_to_lhash, store obj type <1> to lhash, id Apr 14 23:12:04 PKID: initiate private key lhash. Apr 14 23:12:04 pkid_read_fullpath_file_to_buf, read Apr 14 23:12:04 Key pair load try for SRX3400-key-pair-1 Apr 14 23:12:04 DER decoding for this RSA key in progress... ret=0x19230a0, a=0x0 Apr 14 23:12:04 pkid_load_metad_from_file, load from file Apr 14 23:12:04 pkid_read_metad_file_to_buf, read Apr 14 23:12:04 pkid_load_metad_from_file, error metadata load failed -1! Apr 14 23:12:04 No metadata file for cert-id SRX3400-key-pair-1 Apr 14 23:12:04 Inside pkid_add_obj_to_lhash, retrieved obj type <3> from lhash just saved Apr 14 23:12:04 Inside pkid_add_obj_to_lhash, store obj type <3> to lhash, id Apr 14 23:12:04 add key to lhash, type<6> Apr 14 23:12:04 PKI object store populated. Done Apr 14 23:12:04 pkid_crl_init: CRL file size 0x201000 Apr 14 23:12:04 pkid process initiate internal data <0> Apr 14 23:12:04 pkid_config_read, enrollment trace in pid 1426 Apr 14 23:12:04 pkid_read_after_key_gen_config: self-test after-key-generation option not configured Apr 14 23:12:04 Inside pkid_security_pki_config... Apr 14 23:12:04 attribute_name is: log Apr 14 23:12:04 attribute_name is: pki Apr 14 23:12:04 attribute_name is: ike Apr 14 23:12:04 attribute_name is: ipsec Apr 14 23:12:04 attribute_name is: alg Apr 14 23:12:04 attribute_name is: utm Apr 14 23:12:04 attribute_name is: forwarding-options Apr 14 23:12:04 attribute_name is: flow Apr 14 23:12:04 attribute_name is: screen Apr 14 23:12:04 attribute_name is: nat Apr 14 23:12:04 attribute_name is: policies Apr 14 23:12:04 attribute_name is: analysis Apr 14 23:12:04 attribute_name is: datapath-debug Apr 14 23:12:04 attribute_name is: zones Apr 14 23:12:04 2 pkid_security_pki_config... Apr 14 23:12:04 3 pkid_security_pki_config... Apr 14 23:12:04 4 pkid_security_pki_config... Apr 14 23:12:04 ddc_ca_profile_object 0x60283e20 Apr 14 23:12:04 Inside pkid_pki_ca_profile_config... Apr 14 23:12:04 ddc_ca_profile_name_attr LTEIPsecSEGRootCA Apr 14 23:12:04 Creating a CA config LTEIPsecSEGRootCA Apr 14 23:12:04 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 23:12:04 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 14 23:12:04 Inside pkid_add_obj_to_lhash, retrieved obj type <101> from lhash just saved Apr 14 23:12:04 Inside pkid_add_obj_to_lhash, store obj type <101> to lhash, id Apr 14 23:12:04 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 23:12:04 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 23:12:04 pkid_ca_config_create: retrieved ca config from lhash Apr 14 23:12:04 ddc_ca_identity_attr LTEIPsecSEGRootCA Apr 14 23:12:04 ddc_revocation_check_object 0x602844e0 Apr 14 23:12:04 Inside pkid_pki_ca_revocation_check_config... Apr 14 23:12:05 ddc_ca_profile_revocation_check_disable_attr 0x0 Apr 14 23:12:05 ddc_ca_profile_name_attr LTEIPsecNEcusRootCA Apr 14 23:12:05 Creating a CA config LTEIPsecNEcusRootCA Apr 14 23:12:05 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 23:12:05 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 14 23:12:05 Inside pkid_add_obj_to_lhash, retrieved obj type <101> from lhash just saved Apr 14 23:12:05 Inside pkid_add_obj_to_lhash, store obj type <101> to lhash, id Apr 14 23:12:05 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 23:12:05 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 23:12:05 pkid_ca_config_create: retrieved ca config from lhash Apr 14 23:12:05 ddc_ca_identity_attr LTEIPsecNEcusRootCA Apr 14 23:12:05 ddc_revocation_check_object 0x602845a0 Apr 14 23:12:05 Inside pkid_pki_ca_revocation_check_config... Apr 14 23:12:05 ddc_ca_profile_revocation_check_disable_attr 0x0 Apr 14 23:12:05 ddc_ca_profile_name_attr Ericsson_pRBS Apr 14 23:12:05 Creating a CA config Ericsson_pRBS Apr 14 23:12:05 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 23:12:05 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 14 23:12:05 Inside pkid_add_obj_to_lhash, retrieved obj type <101> from lhash just saved Apr 14 23:12:05 Inside pkid_add_obj_to_lhash, store obj type <101> to lhash, id Apr 14 23:12:05 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 23:12:05 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 23:12:05 pkid_ca_config_create: retrieved ca config from lhash Apr 14 23:12:05 ddc_ca_identity_attr Ericsson_pRBS Apr 14 23:12:05 ddc_revocation_check_object 0x60284660 Apr 14 23:12:05 Inside pkid_pki_ca_revocation_check_config... Apr 14 23:12:05 ddc_ca_profile_revocation_check_disable_attr 0x0 Apr 14 23:12:05 pkid_start_crl_for_ca: Start CRL download Apr 14 23:12:05 pkid_start_crl_for_ca: Initiating CRL download for CA Ericsson_pRBS Apr 14 23:12:05 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 23:12:05 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 23:12:05 pkid_initiate_crl_for_ca: Revocation check disabled for CA Ericsson_pRBS Apr 14 23:12:05 pkid_start_crl_for_ca: Start CRL download Apr 14 23:12:05 pkid_start_crl_for_ca: Initiating CRL download for CA LTEIPsecSEGRootCA Apr 14 23:12:05 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 23:12:05 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 23:12:05 pkid_initiate_crl_for_ca: Revocation check disabled for CA LTEIPsecSEGRootCA Apr 14 23:12:05 pkid_start_crl_for_ca: Start CRL download Apr 14 23:12:05 pkid_start_crl_for_ca: Initiating CRL download for CA LTEIPsecNEcusRootCA Apr 14 23:12:05 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 23:12:05 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 23:12:05 pkid_initiate_crl_for_ca: Revocation check disabled for CA LTEIPsecNEcusRootCA Apr 14 23:12:05 Pkid: Done config read Apr 14 23:12:05 pkid_setup_inet_server: ipc done sockfd is 12 Apr 14 23:12:05 pkid_ipc_setup: ipc done sockfd is 13 Apr 14 23:12:06 checkLdapResponse Apr 14 23:13:10 pkid_serv_listen: Got a new client Apr 14 23:13:10 pkid_serv_conn_new: accepted a new connection Apr 14 23:13:10 pkid_serv_listen: Got a new client Apr 14 23:13:10 pkid_serv_conn_new: accepted a new connection Apr 14 23:13:11 pkid_serv_listen: Got a new client Apr 14 23:13:11 pkid_serv_conn_new: accepted a new connection Apr 14 23:13:11 pkid_serv_listen: Got a new client Apr 14 23:13:11 pkid_serv_conn_new: accepted a new connection Apr 14 23:16:23 checkLdapResponse Apr 14 23:20:39 pkid 3 seconds timer off 512 times, pid 1426 Apr 14 23:20:40 checkLdapResponse Apr 14 23:20:41 pkid_serv_listen: Got a new client Apr 14 23:20:41 pkid_serv_conn_new: accepted a new connection Apr 14 23:20:41 pkid_serv_listen: Got a new client Apr 14 23:20:41 pkid_serv_conn_new: accepted a new connection Apr 14 23:20:41 pkid_serv_listen: Got a new client Apr 14 23:20:41 pkid_serv_conn_new: accepted a new connection Apr 14 23:20:41 pkid_serv_listen: Got a new client Apr 14 23:20:41 pkid_serv_conn_new: accepted a new connection Apr 14 23:21:31 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 14 23:21:31 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 23:21:31 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 23:21:31 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 23:21:31 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 23:21:31 pkid_crl_check_cert_for_revocation: CRL file not found Apr 14 23:21:31 DER encoding for this RSA/ECDSA key in progress... item =0x19230a0, a=0x19230a0 Apr 14 23:21:31 Cert-Chain-Val> Len of RSA for keypair SRX3400-key-pair-1 is 1192 Apr 14 23:21:31 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 23:21:31 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 23:21:31 1st cert into stack: /CN=SecGW_SRX_Site1 Apr 14 23:21:31 cert into stack: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 14 23:21:31 Cert-Chain-Val> KEYPAIR-CERT CHAIN Reply, len<3298> Apr 14 23:21:31 pkid_ipc_send: Queued packet to IKED-Q, len 3310 Apr 14 23:21:31 pkid_ipc_write: Sending packet to IKED len 3310, total packets sent 1 Apr 14 23:24:56 checkLdapResponse Apr 14 23:29:11 pkid 3 seconds timer off 512 times, pid 1426 Apr 14 23:29:12 checkLdapResponse Apr 14 23:33:28 checkLdapResponse Apr 14 23:37:44 pkid 3 seconds timer off 512 times, pid 1426 Apr 14 23:37:45 checkLdapResponse Apr 14 23:42:01 checkLdapResponse Apr 14 23:46:16 pkid 3 seconds timer off 512 times, pid 1426 Apr 14 23:46:17 checkLdapResponse Apr 14 23:50:33 checkLdapResponse Apr 14 23:54:49 pkid 3 seconds timer off 512 times, pid 1426 Apr 14 23:54:50 checkLdapResponse Apr 14 23:57:30 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 14 23:57:30 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 23:57:30 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 23:57:30 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 23:57:30 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 23:57:30 pkid_crl_check_cert_for_revocation: CRL file not found Apr 14 23:57:30 DER encoding for this RSA/ECDSA key in progress... item =0x19230a0, a=0x19230a0 Apr 14 23:57:30 Cert-Chain-Val> Len of RSA for keypair SRX3400-key-pair-1 is 1192 Apr 14 23:57:30 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 14 23:57:30 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 14 23:57:30 1st cert into stack: /CN=SecGW_SRX_Site1 Apr 14 23:57:30 cert into stack: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 14 23:57:30 Cert-Chain-Val> KEYPAIR-CERT CHAIN Reply, len<3298> Apr 14 23:57:30 pkid_ipc_send: Queued packet to IKED-Q, len 3310 Apr 14 23:57:30 pkid_ipc_write: Sending packet to IKED len 3310, total packets sent 2 Apr 14 23:59:06 checkLdapResponse Apr 15 00:03:21 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 00:03:22 checkLdapResponse Apr 15 00:07:38 checkLdapResponse Apr 15 00:11:54 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 00:11:55 checkLdapResponse Apr 15 00:13:32 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:13:32 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 00:13:32 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:13:32 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 00:13:32 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:13:32 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 00:14:25 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:14:25 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 00:14:25 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:14:25 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 00:14:25 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:14:25 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 00:15:32 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 00:15:32 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:15:32 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 00:15:32 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:15:32 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 00:15:32 pkid_crl_check_cert_for_revocation: CRL file not found Apr 15 00:15:32 DER encoding for this RSA/ECDSA key in progress... item =0x19230a0, a=0x19230a0 Apr 15 00:15:32 Cert-Chain-Val> Len of RSA for keypair SRX3400-key-pair-1 is 1192 Apr 15 00:15:32 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:15:32 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 00:15:32 1st cert into stack: /CN=SecGW_SRX_Site1 Apr 15 00:15:32 cert into stack: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 15 00:15:32 Cert-Chain-Val> KEYPAIR-CERT CHAIN Reply, len<3298> Apr 15 00:15:32 pkid_ipc_send: Queued packet to IKED-Q, len 3310 Apr 15 00:15:32 pkid_ipc_write: Sending packet to IKED len 3310, total packets sent 3 Apr 15 00:16:11 checkLdapResponse Apr 15 00:18:45 pkid_show_security_pki_local_cert called. Apr 15 00:18:45 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:18:45 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 00:18:45 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:18:45 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 00:20:26 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 00:20:27 checkLdapResponse Apr 15 00:24:43 checkLdapResponse Apr 15 00:25:21 pkid_show_security_pki_local_cert called. Apr 15 00:26:01 pkid_show_certificate_request: read the certificate req from file key file Apr 15 00:26:01 pkid_read_fullpath_file_to_buf, read Apr 15 00:26:01 got nm . Apr 15 00:26:01 certificate request name: /CN=SecGW_SRX_Site1/O=ERICSSON/C=SE Apr 15 00:27:07 pkid_ipc_send: Queued packet to IKED-Q, len 34 Apr 15 00:27:07 pkid_ipc_send: Queued packet to IKED-Q, len 34 Apr 15 00:27:07 pkid_ipc_send: Queued packet to IKED-Q, len 34 Apr 15 00:27:07 pkid_ipc_send: Queued packet to IKED-Q, len 34 Apr 15 00:27:07 pkid_ipc_send: Queued packet to IKED-Q, len 34 Apr 15 00:27:07 pkid_ipc_send: Queued packet to IKED-Q, len 34 Apr 15 00:27:07 pkid_ipc_send: Queued packet to IKED-Q, len 34 Apr 15 00:27:07 pkid_ipc_send: Queued packet to IKED-Q, len 34 Apr 15 00:27:07 pkid_delete_cert_id: Deleted cert-id = SRX3400-key-pair-1 of len = 18 from list Apr 15 00:27:08 pkid_ipc_write: Sending packet to IKED len 34, total packets sent 4 Apr 15 00:27:08 pkid_ipc_write: Sending packet to IKED len 34, total packets sent 5 Apr 15 00:27:08 pkid_ipc_write: Sending packet to IKED len 34, total packets sent 6 Apr 15 00:27:08 pkid_ipc_write: Sending packet to IKED len 34, total packets sent 7 Apr 15 00:27:08 pkid_ipc_write: Sending packet to IKED len 34, total packets sent 8 Apr 15 00:27:08 pkid_ipc_write: Sending packet to IKED len 34, total packets sent 9 Apr 15 00:27:08 pkid_ipc_write: Sending packet to IKED len 34, total packets sent 10 Apr 15 00:27:08 pkid_ipc_write: Sending packet to IKED len 34, total packets sent 11 Apr 15 00:27:18 pkid_show_security_pki_local_cert called. Apr 15 00:28:59 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 00:29:00 checkLdapResponse Apr 15 00:29:37 Inside pkid_request_security_pki_gen_cert_req Apr 15 00:29:37 PKID: generate cert request id file enc Apr 15 00:29:37 PKID: subject Apr 15 00:29:37 PKID: domain<(null)> ip<10.185.49.212> email<(null)> Apr 15 00:29:37 PKID: priv file Apr 15 00:29:37 pkid_generate_cert_request, pid<1426>. Cert CN=SecGW_SRX_Site1,O=Ericsson,C=SE ip <10.185.49.212> email domain Apr 15 00:29:37 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:29:37 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 00:29:37 pki_x509_req: subject alt name extension rc<0> Apr 15 00:29:37 pkid_utility_buffer_new: allocated new utility buffer at 01949000 Apr 15 00:29:37 pki_PEM_ASN1_write_bio pem before i2d, no data Apr 15 00:29:37 pki_PEM_ASN1_write_bio pem after i2d, no data Apr 15 00:29:37 pki_PEM_ASN1_write_bio pem before i2d Apr 15 00:29:37 pem no encryption needed. Apr 15 00:29:37 pkid_utility_buffer_add( buf: 01949000, to add: 018b9a28, size: 11) Apr 15 00:29:37 pkid_utility_buffer_add( buf: 01949000, to add: 018b9b9c, size: 19) Apr 15 00:29:37 pkid_utility_buffer_add( buf: 01949000, to add: 018b9a34, size: 6) Apr 15 00:29:37 pemwritebio: outl<910> Apr 15 00:29:37 pkid_utility_buffer_add( buf: 01949000, to add: 01952000, size: 910) Apr 15 00:29:37 pkid_utility_buffer_add( buf: 01949000, to add: 01952000, size: 9) Apr 15 00:29:37 pkid_utility_buffer_add( buf: 01949000, to add: 018b9a3c, size: 9) Apr 15 00:29:37 pkid_utility_buffer_add( buf: 01949000, to add: 018b9b9c, size: 19) Apr 15 00:29:37 pkid_utility_buffer_add( buf: 01949000, to add: 018b9a34, size: 6) Apr 15 00:29:37 pemwritebio: i<910>outl<9> Apr 15 00:29:37 pkid_utility_buffer_copy( buf: 01949000, dest: 01928000, size: 989) Apr 15 00:29:37 got pem write bio return <989> Apr 15 00:29:37 pkid_utility_buffer_free: freeing utility buffer at 01949000 Apr 15 00:29:39 pkid_generate_cert_req: cert request write to sysfile , file Apr 15 00:29:39 got nm . Apr 15 00:33:18 checkLdapResponse Apr 15 00:33:38 pkid_clear_security_pki_keypair: Certificate request exist for this key pair, abort Apr 15 00:34:18 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 00:34:18 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:34:18 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 00:34:18 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:34:18 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 00:34:18 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 00:34:18 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 00:34:18 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 00:34:18 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 12 Apr 15 00:34:22 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 00:34:22 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:34:22 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 00:34:22 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:34:22 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 00:34:22 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 00:34:22 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 00:34:22 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 00:34:22 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 13 Apr 15 00:34:29 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 00:34:29 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:34:29 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 00:34:29 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:34:29 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 00:34:29 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 00:34:29 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 00:34:29 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 00:34:29 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 14 Apr 15 00:34:42 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 00:34:42 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:34:42 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 00:34:42 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:34:42 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 00:34:42 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 00:34:42 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 00:34:42 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 00:34:42 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 15 Apr 15 00:35:05 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 00:35:05 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:35:05 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 00:35:05 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:35:05 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 00:35:05 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 00:35:05 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 00:35:05 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 00:35:05 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 16 Apr 15 00:35:47 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 00:35:47 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:35:47 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 00:35:47 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:35:47 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 00:35:47 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 00:35:47 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 00:35:47 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 00:35:47 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 17 Apr 15 00:37:33 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 00:37:34 checkLdapResponse Apr 15 00:41:50 checkLdapResponse Apr 15 00:46:06 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 00:46:07 checkLdapResponse Apr 15 00:50:23 checkLdapResponse Apr 15 00:52:12 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 00:52:12 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:52:12 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 00:52:12 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:52:12 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 00:52:12 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 00:52:12 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 00:52:12 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 00:52:12 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 18 Apr 15 00:52:16 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 00:52:16 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:52:16 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 00:52:16 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:52:16 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 00:52:16 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 00:52:16 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 00:52:16 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 00:52:16 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 19 Apr 15 00:52:24 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 00:52:24 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:52:24 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 00:52:24 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:52:24 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 00:52:24 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 00:52:24 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 00:52:24 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 00:52:24 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 20 Apr 15 00:52:37 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 00:52:37 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:52:37 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 00:52:37 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:52:37 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 00:52:37 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 00:52:37 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 00:52:37 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 00:52:37 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 21 Apr 15 00:53:00 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 00:53:00 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:53:00 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 00:53:00 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:53:00 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 00:53:00 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 00:53:00 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 00:53:00 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 00:53:00 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 22 Apr 15 00:53:42 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 00:53:42 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:53:42 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 00:53:42 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 00:53:42 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 00:53:42 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 00:53:42 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 00:53:42 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 00:53:42 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 23 Apr 15 00:54:38 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 00:54:39 checkLdapResponse Apr 15 00:58:55 checkLdapResponse Apr 15 01:03:11 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 01:03:12 checkLdapResponse Apr 15 01:07:28 checkLdapResponse Apr 15 01:10:08 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 01:10:08 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:10:08 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 01:10:08 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:10:08 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 01:10:08 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 01:10:08 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 01:10:08 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 01:10:08 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 24 Apr 15 01:10:12 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 01:10:12 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:10:12 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 01:10:12 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:10:12 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 01:10:12 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 01:10:12 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 01:10:12 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 01:10:12 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 25 Apr 15 01:10:19 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 01:10:19 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:10:19 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 01:10:19 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:10:19 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 01:10:19 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 01:10:19 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 01:10:19 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 01:10:19 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 26 Apr 15 01:10:32 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 01:10:32 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:10:32 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 01:10:32 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:10:32 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 01:10:32 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 01:10:32 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 01:10:32 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 01:10:32 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 27 Apr 15 01:10:55 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 01:10:55 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:10:55 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 01:10:55 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:10:55 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 01:10:55 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 01:10:55 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 01:10:55 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 01:10:55 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 28 Apr 15 01:11:37 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 01:11:37 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:11:37 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 01:11:37 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:11:37 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 01:11:37 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 01:11:37 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 01:11:37 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 01:11:37 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 29 Apr 15 01:11:43 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 01:11:44 checkLdapResponse Apr 15 01:16:01 checkLdapResponse Apr 15 01:20:16 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 01:20:17 checkLdapResponse Apr 15 01:24:33 checkLdapResponse Apr 15 01:28:03 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 01:28:03 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:28:03 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 01:28:03 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:28:03 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 01:28:03 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 01:28:03 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 01:28:03 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 01:28:03 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 30 Apr 15 01:28:07 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 01:28:07 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:28:07 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 01:28:07 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:28:07 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 01:28:07 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 01:28:07 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 01:28:07 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 01:28:07 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 31 Apr 15 01:28:14 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 01:28:14 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:28:14 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 01:28:14 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:28:14 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 01:28:14 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 01:28:14 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 01:28:14 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 01:28:14 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 32 Apr 15 01:28:27 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 01:28:27 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:28:27 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 01:28:27 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:28:27 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 01:28:27 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 01:28:27 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 01:28:27 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 01:28:27 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 33 Apr 15 01:28:48 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 01:28:49 checkLdapResponse Apr 15 01:28:50 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 01:28:50 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:28:50 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 01:28:50 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:28:50 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 01:28:50 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 01:28:50 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 01:28:50 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 01:28:50 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 34 Apr 15 01:29:32 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 01:29:32 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:29:32 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 01:29:32 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:29:32 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 01:29:32 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 01:29:32 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 01:29:32 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 01:29:32 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 35 Apr 15 01:33:06 checkLdapResponse Apr 15 01:37:21 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 01:37:22 checkLdapResponse Apr 15 01:41:38 checkLdapResponse Apr 15 01:45:53 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 01:45:54 checkLdapResponse Apr 15 01:45:58 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 01:45:58 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:45:58 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 01:45:58 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:45:58 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 01:45:58 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 01:45:58 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 01:45:58 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 01:45:58 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 36 Apr 15 01:46:02 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 01:46:02 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:46:02 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 01:46:02 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:46:02 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 01:46:02 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 01:46:02 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 01:46:02 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 01:46:02 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 37 Apr 15 01:46:09 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 01:46:09 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:46:09 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 01:46:09 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:46:09 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 01:46:09 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 01:46:09 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 01:46:09 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 01:46:09 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 38 Apr 15 01:46:22 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 01:46:22 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:46:22 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 01:46:22 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:46:22 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 01:46:22 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 01:46:22 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 01:46:22 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 01:46:22 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 39 Apr 15 01:46:45 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 01:46:45 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:46:45 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 01:46:45 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:46:45 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 01:46:45 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 01:46:45 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 01:46:45 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 01:46:45 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 40 Apr 15 01:47:27 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 01:47:27 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:47:27 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 01:47:27 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 01:47:27 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 01:47:27 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 01:47:27 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 01:47:27 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 01:47:27 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 41 Apr 15 01:50:11 checkLdapResponse Apr 15 01:54:26 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 01:54:27 checkLdapResponse Apr 15 01:58:43 checkLdapResponse Apr 15 02:02:58 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 02:02:59 checkLdapResponse Apr 15 02:03:52 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 02:03:52 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:03:52 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 02:03:52 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:03:52 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 02:03:52 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 02:03:52 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 02:03:52 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 02:03:52 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 42 Apr 15 02:03:56 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 02:03:56 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:03:56 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 02:03:56 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:03:56 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 02:03:56 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 02:03:56 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 02:03:56 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 02:03:56 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 43 Apr 15 02:04:03 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 02:04:03 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:04:03 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 02:04:03 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:04:03 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 02:04:03 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 02:04:03 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 02:04:03 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 02:04:03 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 44 Apr 15 02:04:16 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 02:04:16 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:04:16 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 02:04:16 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:04:16 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 02:04:16 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 02:04:16 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 02:04:16 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 02:04:16 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 45 Apr 15 02:04:39 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 02:04:39 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:04:39 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 02:04:39 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:04:39 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 02:04:39 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 02:04:39 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 02:04:39 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 02:04:39 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 46 Apr 15 02:05:21 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 02:05:21 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:05:21 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 02:05:21 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:05:21 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 02:05:21 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 02:05:21 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 02:05:21 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 02:05:21 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 47 Apr 15 02:07:16 checkLdapResponse Apr 15 02:11:31 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 02:11:32 checkLdapResponse Apr 15 02:15:48 checkLdapResponse Apr 15 02:20:03 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 02:20:04 checkLdapResponse Apr 15 02:21:46 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 02:21:46 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:21:46 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 02:21:46 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:21:46 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 02:21:46 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 02:21:46 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 02:21:46 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 02:21:46 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 48 Apr 15 02:21:50 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 02:21:50 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:21:50 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 02:21:50 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:21:50 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 02:21:50 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 02:21:50 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 02:21:50 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 02:21:50 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 49 Apr 15 02:21:57 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 02:21:57 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:21:57 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 02:21:57 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:21:57 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 02:21:57 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 02:21:57 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 02:21:57 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 02:21:57 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 50 Apr 15 02:22:10 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 02:22:10 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:22:10 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 02:22:10 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:22:10 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 02:22:10 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 02:22:10 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 02:22:10 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 02:22:10 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 51 Apr 15 02:22:33 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 02:22:33 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:22:33 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 02:22:33 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:22:33 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 02:22:33 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 02:22:33 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 02:22:33 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 02:22:33 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 52 Apr 15 02:23:15 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 02:23:15 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:23:15 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 02:23:15 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:23:15 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 02:23:15 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 02:23:15 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 02:23:15 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 02:23:15 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 53 Apr 15 02:24:21 checkLdapResponse Apr 15 02:28:36 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 02:28:37 checkLdapResponse Apr 15 02:32:53 checkLdapResponse Apr 15 02:37:08 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 02:37:09 checkLdapResponse Apr 15 02:39:43 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 02:39:43 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:39:43 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 02:39:43 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:39:43 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 02:39:43 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 02:39:43 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 02:39:43 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 02:39:43 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 54 Apr 15 02:39:47 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 02:39:47 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:39:47 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 02:39:47 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:39:47 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 02:39:47 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 02:39:47 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 02:39:47 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 02:39:47 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 55 Apr 15 02:39:54 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 02:39:54 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:39:54 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 02:39:54 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:39:54 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 02:39:54 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 02:39:54 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 02:39:54 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 02:39:54 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 56 Apr 15 02:40:07 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 02:40:07 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:40:07 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 02:40:07 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:40:07 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 02:40:07 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 02:40:07 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 02:40:07 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 02:40:07 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 57 Apr 15 02:40:30 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 02:40:30 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:40:30 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 02:40:30 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:40:30 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 02:40:30 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 02:40:30 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 02:40:30 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 02:40:30 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 58 Apr 15 02:41:12 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 02:41:12 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:41:12 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 02:41:12 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:41:12 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 02:41:12 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 02:41:12 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 02:41:12 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 02:41:12 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 59 Apr 15 02:41:26 checkLdapResponse Apr 15 02:45:41 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 02:45:42 checkLdapResponse Apr 15 02:49:58 checkLdapResponse Apr 15 02:54:14 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 02:54:15 checkLdapResponse Apr 15 02:57:38 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 02:57:38 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:57:38 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 02:57:38 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:57:38 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 02:57:38 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 02:57:38 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 02:57:38 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 02:57:38 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 60 Apr 15 02:57:42 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 02:57:42 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:57:42 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 02:57:42 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:57:42 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 02:57:42 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 02:57:42 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 02:57:42 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 02:57:42 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 61 Apr 15 02:57:49 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 02:57:49 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:57:49 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 02:57:49 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:57:49 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 02:57:49 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 02:57:49 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 02:57:49 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 02:57:49 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 62 Apr 15 02:58:02 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 02:58:02 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:58:02 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 02:58:02 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:58:02 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 02:58:02 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 02:58:02 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 02:58:02 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 02:58:02 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 63 Apr 15 02:58:25 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 02:58:25 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:58:25 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 02:58:25 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:58:25 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 02:58:25 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 02:58:25 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 02:58:25 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 02:58:25 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 64 Apr 15 02:58:31 checkLdapResponse Apr 15 02:59:07 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 02:59:07 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:59:07 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 02:59:07 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 02:59:07 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 02:59:07 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 02:59:07 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 02:59:07 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 02:59:07 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 65 Apr 15 03:02:46 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 03:02:47 checkLdapResponse Apr 15 03:07:03 checkLdapResponse Apr 15 03:11:19 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 03:11:20 checkLdapResponse Apr 15 03:15:31 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 03:15:31 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 03:15:31 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 03:15:31 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 03:15:31 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 03:15:31 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 03:15:31 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 03:15:31 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 03:15:31 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 66 Apr 15 03:15:35 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 03:15:35 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 03:15:35 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 03:15:35 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 03:15:35 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 03:15:35 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 03:15:35 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 03:15:35 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 03:15:35 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 67 Apr 15 03:15:36 checkLdapResponse Apr 15 03:15:42 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 03:15:42 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 03:15:42 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 03:15:42 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 03:15:42 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 03:15:42 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 03:15:42 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 03:15:42 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 03:15:42 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 68 Apr 15 03:15:55 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 03:15:55 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 03:15:55 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 03:15:55 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 03:15:55 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 03:15:55 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 03:15:55 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 03:15:55 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 03:15:55 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 69 Apr 15 03:16:18 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 03:16:18 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 03:16:18 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 03:16:18 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 03:16:18 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 03:16:18 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 03:16:18 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 03:16:18 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 03:16:18 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 70 Apr 15 03:17:00 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 03:17:00 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 03:17:00 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 03:17:00 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 03:17:00 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 03:17:00 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 03:17:00 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 03:17:00 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 03:17:00 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 71 Apr 15 03:19:51 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 03:19:52 checkLdapResponse Apr 15 03:24:08 checkLdapResponse Apr 15 03:28:24 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 03:28:25 checkLdapResponse Apr 15 03:32:41 checkLdapResponse Apr 15 03:36:56 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 03:36:57 checkLdapResponse Apr 15 03:41:13 checkLdapResponse Apr 15 03:45:29 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 03:45:30 checkLdapResponse Apr 15 03:49:46 checkLdapResponse Apr 15 03:54:01 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 03:54:02 checkLdapResponse Apr 15 03:58:18 checkLdapResponse Apr 15 04:02:34 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 04:02:35 checkLdapResponse Apr 15 04:06:51 checkLdapResponse Apr 15 04:11:06 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 04:11:07 checkLdapResponse Apr 15 04:15:24 checkLdapResponse Apr 15 04:19:39 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 04:19:40 checkLdapResponse Apr 15 04:23:56 checkLdapResponse Apr 15 04:28:11 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 04:28:12 checkLdapResponse Apr 15 04:32:29 checkLdapResponse Apr 15 04:36:44 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 04:36:45 checkLdapResponse Apr 15 04:41:01 checkLdapResponse Apr 15 04:45:16 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 04:45:17 checkLdapResponse Apr 15 04:49:34 checkLdapResponse Apr 15 04:53:49 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 04:53:50 checkLdapResponse Apr 15 04:58:06 checkLdapResponse Apr 15 05:02:21 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 05:02:22 checkLdapResponse Apr 15 05:06:39 checkLdapResponse Apr 15 05:10:54 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 05:10:55 checkLdapResponse Apr 15 05:15:11 checkLdapResponse Apr 15 05:17:53 Inside pkid_request_security_pki_gen_key_pair, pid<1426> Apr 15 05:17:53 Inside pkid_request_security_pki_gen_key_pair, key_len<2048>, file. keyalg <0> Apr 15 05:19:26 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 05:19:27 checkLdapResponse Apr 15 05:23:44 checkLdapResponse Apr 15 05:27:59 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 05:28:00 checkLdapResponse Apr 15 05:32:16 checkLdapResponse Apr 15 05:36:32 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 05:36:33 checkLdapResponse Apr 15 05:38:55 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 05:38:55 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 05:38:55 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 05:38:55 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 05:38:55 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 05:38:55 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 05:38:55 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 05:38:55 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 05:38:55 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 72 Apr 15 05:38:59 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 05:38:59 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 05:38:59 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 05:38:59 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 05:38:59 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 05:38:59 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 05:38:59 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 05:38:59 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 05:38:59 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 73 Apr 15 05:39:06 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 05:39:06 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 05:39:06 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 05:39:06 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 05:39:06 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 05:39:06 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 05:39:06 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 05:39:06 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 05:39:06 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 74 Apr 15 05:39:19 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 05:39:19 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 05:39:19 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 05:39:19 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 05:39:19 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 05:39:19 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 05:39:19 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 05:39:19 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 05:39:19 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 75 Apr 15 05:39:42 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 05:39:42 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 05:39:42 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 05:39:42 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 05:39:42 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 05:39:42 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 05:39:42 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 05:39:42 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 05:39:42 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 76 Apr 15 05:40:24 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 05:40:24 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 05:40:24 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 05:40:24 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 05:40:24 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 05:40:24 Cert-Chain-Val> No certificate for key-pair SRX3400-key-pair-1 Apr 15 05:40:24 Cert-Chain-Val> Failed to get certificate key-pair Apr 15 05:40:24 pkid_ipc_send: Queued packet to IKED-Q, len 12 Apr 15 05:40:24 pkid_ipc_write: Sending packet to IKED len 12, total packets sent 77 Apr 15 05:40:49 checkLdapResponse Apr 15 05:45:04 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 05:45:05 checkLdapResponse Apr 15 05:45:18 Inside pkid_request_security_pki_local_cert_load, pid<1426> Apr 15 05:45:18 pkid_request_security_pki_local_cert_load, Loading certid: load-request-type: <1>: from cert-file to . from key-file to . Apr 15 05:45:18 pkid_load_object_from_file, load form file Apr 15 05:45:18 pkid_read_fullpath_file_to_buf, read Apr 15 05:45:18 loadx509File: file_name :193f000 len = 1032 Apr 15 05:45:18 Attempt (PKCS7, ASN1) format ... Apr 15 05:45:18 Attempt raw(DER, ASN1) format for certificate Apr 15 05:45:18 raw(DER, ASN1) format found for CERT Apr 15 05:45:18 load_one_x509File, load one cert to hash Apr 15 05:45:18 count x509 object, type<1> Apr 15 05:45:18 pkid_eecert_matching_privatekey, cert id Apr 15 05:45:18 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 05:45:18 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 05:45:18 pkid_eecert_matching_privatekey: retrieved private key from lhash, pkey<019230a0> Apr 15 05:45:18 For signing: pkey<019230a0> type<6> key-size<256> dlen <32> Apr 15 05:45:18 pkid_pkey_signature_sign: private priv key<019230a0> Apr 15 05:45:18 pkey<019230a0> type<6> top<64> Apr 15 05:45:18 RSA signature verified. Apr 15 05:45:18 pkid_eecert_matching_privatekey, signature verified rc<0> Apr 15 05:45:18 pkid_eecert_matching_privatekey, rc<0> Apr 15 05:45:18 Inside pkid_add_obj_to_lhash, retrieved obj type <1> from lhash just saved Apr 15 05:45:18 Inside pkid_add_obj_to_lhash, store obj type <1> to lhash, id Apr 15 05:45:18 pkid_save_obj_to_file, save to Apr 15 05:45:19 pkid_request_security_pki_local_cert_load, loaded certid form file to Apr 15 05:45:19 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 05:45:19 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 05:45:19 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 05:45:19 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 05:45:19 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 05:45:19 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 05:45:19 pkid_initiate_crl_for_ca: Revocation check disabled for CA LTEIPsecSEGRootCA Apr 15 05:45:19 pkid_add_cert_id: Added cert-id = SRX3400-key-pair-1 of len = 18 to list Apr 15 05:45:51 Inside pkid_request_security_pki_local_cert_verify, pid<1426> Apr 15 05:45:51 pkid_request_security_pki_local_cert_verify, key cert Apr 15 05:45:51 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 05:45:51 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 05:45:51 Cert-Chain-Val> Building cert Chain Apr 15 05:45:51 Adding EE to the untrusted chain: /CN=SecGW_SRX_Site1 Apr 15 05:45:51 Issuer CA in Trust Store: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 15 05:45:51 Cert-Chain-Val> do element in chain <1> Apr 15 05:45:51 cert subject: /CN=SecGW_SRX_Site1 Apr 15 05:45:51 cert issuer: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 15 05:45:51 Add trusted CA: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 15 05:45:51 Cert-Chain-Val> do element in chain <2> Apr 15 05:45:51 cert subject: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 15 05:45:51 cert issuer: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 15 05:45:51 Cert-Chain-Val> 0 0 idx<0>, total<2> Apr 15 05:45:51 Next CA: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 15 05:45:51 Cert-Chain-Val> Start Certificate Validation Apr 15 05:45:51 Verifying cert: /CN=SecGW_SRX_Site1 Apr 15 05:45:51 Cert issued by: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 15 05:45:51 CA=TRUE validation successful Apr 15 05:45:51 X509_cmp_current_time_ns: time comparison result -1 Apr 15 05:45:51 X509_cmp_current_time_ns: time comparison result 1 Apr 15 05:45:51 CERT VERIFIED: /CN=SecGW_SRX_Site1 Apr 15 05:45:51 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 05:45:51 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 05:45:51 Cert-Chain-Val> warning: Revocation Check skipped Apr 15 05:45:51 Apr 15 05:45:51 Cert-Chain-Val> Cert-Chian Validation Cur<0> Total<2> Apr 15 05:45:51 Cert-Chain-Val> at end Apr 15 05:45:51 ldapNotify_func Apr 15 05:45:51 Top of chain verified ok: /CN=SecGW_SRX_Site1 Apr 15 05:45:51 cert verified ok: /CN=SecGW_SRX_Site1 Apr 15 05:45:51 ldapIdleCleanup <226><43><162><85> Apr 15 05:45:51 pCert_no_buf: /CN=SecGW_SRX_Site1 Apr 15 05:45:51 pCert_with_buf: /CN=SecGW_SRX_Site1 Apr 15 05:45:51 pCaCert: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 15 05:45:51 scep_http_release_all: releasing LDAP-STATE 1929c00 Apr 15 05:45:51 pkid_request_security_pki_local_cert_verify, verified local cert, id Apr 15 05:46:01 pkid_show_security_pki_local_cert called. Apr 15 05:49:22 checkLdapResponse Apr 15 05:49:54 pkid_show_security_pki_local_cert called. Apr 15 05:49:54 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 05:49:54 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 05:49:54 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 05:49:54 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 05:53:37 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 05:53:38 checkLdapResponse Apr 15 05:56:53 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 05:56:53 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 05:56:53 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 05:56:53 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 05:56:53 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 05:56:53 pkid_crl_check_cert_for_revocation: CRL file not found Apr 15 05:56:53 DER encoding for this RSA/ECDSA key in progress... item =0x19230a0, a=0x19230a0 Apr 15 05:56:53 Cert-Chain-Val> Len of RSA for keypair SRX3400-key-pair-1 is 1192 Apr 15 05:56:53 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 05:56:53 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 05:56:53 1st cert into stack: /CN=SecGW_SRX_Site1 Apr 15 05:56:53 cert into stack: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 15 05:56:53 Cert-Chain-Val> KEYPAIR-CERT CHAIN Reply, len<3298> Apr 15 05:56:53 pkid_ipc_send: Queued packet to IKED-Q, len 3310 Apr 15 05:56:53 pkid_ipc_write: Sending packet to IKED len 3310, total packets sent 78 Apr 15 05:57:54 checkLdapResponse Apr 15 06:02:10 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 06:02:11 checkLdapResponse Apr 15 06:06:27 checkLdapResponse Apr 15 06:10:42 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 06:10:43 checkLdapResponse Apr 15 06:14:54 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 06:14:54 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 06:14:54 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 06:14:54 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 06:14:54 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 06:14:54 pkid_crl_check_cert_for_revocation: CRL file not found Apr 15 06:14:54 DER encoding for this RSA/ECDSA key in progress... item =0x19230a0, a=0x19230a0 Apr 15 06:14:54 Cert-Chain-Val> Len of RSA for keypair SRX3400-key-pair-1 is 1192 Apr 15 06:14:54 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 06:14:54 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 06:14:54 1st cert into stack: /CN=SecGW_SRX_Site1 Apr 15 06:14:54 cert into stack: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 15 06:14:54 Cert-Chain-Val> KEYPAIR-CERT CHAIN Reply, len<3298> Apr 15 06:14:54 pkid_ipc_send: Queued packet to IKED-Q, len 3310 Apr 15 06:14:54 pkid_ipc_write: Sending packet to IKED len 3310, total packets sent 79 Apr 15 06:15:00 checkLdapResponse Apr 15 06:19:15 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 06:19:16 checkLdapResponse Apr 15 06:23:32 checkLdapResponse Apr 15 06:27:47 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 06:27:48 checkLdapResponse Apr 15 06:32:05 checkLdapResponse Apr 15 06:33:40 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 06:33:40 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 06:33:40 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 06:33:40 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 06:33:40 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 06:33:40 pkid_crl_check_cert_for_revocation: CRL file not found Apr 15 06:33:40 DER encoding for this RSA/ECDSA key in progress... item =0x19230a0, a=0x19230a0 Apr 15 06:33:40 Cert-Chain-Val> Len of RSA for keypair SRX3400-key-pair-1 is 1192 Apr 15 06:33:40 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 06:33:40 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 06:33:40 1st cert into stack: /CN=SecGW_SRX_Site1 Apr 15 06:33:40 cert into stack: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 15 06:33:40 Cert-Chain-Val> KEYPAIR-CERT CHAIN Reply, len<3298> Apr 15 06:33:40 pkid_ipc_send: Queued packet to IKED-Q, len 3310 Apr 15 06:33:40 pkid_ipc_write: Sending packet to IKED len 3310, total packets sent 80 Apr 15 06:36:20 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 06:36:21 checkLdapResponse Apr 15 06:40:37 checkLdapResponse Apr 15 06:44:52 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 06:44:53 checkLdapResponse Apr 15 06:49:10 checkLdapResponse Apr 15 06:53:25 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 06:53:26 checkLdapResponse Apr 15 06:57:42 checkLdapResponse Apr 15 07:01:57 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 07:01:58 checkLdapResponse Apr 15 07:06:15 checkLdapResponse Apr 15 07:09:30 pkid_conn_process_msg: PKId got IPC request from IKEd <6> Apr 15 07:09:30 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 07:09:30 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 07:09:30 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 07:09:30 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 07:09:30 pkid_crl_check_cert_for_revocation: CRL file not found Apr 15 07:09:30 DER encoding for this RSA/ECDSA key in progress... item =0x19230a0, a=0x19230a0 Apr 15 07:09:30 Cert-Chain-Val> Len of RSA for keypair SRX3400-key-pair-1 is 1192 Apr 15 07:09:30 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 07:09:30 pkid_retrieve_obj_from_lhash, retrieved obj from lhash for id Apr 15 07:09:30 1st cert into stack: /CN=SecGW_SRX_Site1 Apr 15 07:09:30 cert into stack: /O=Ericsson/CN=LTEIPSecSEGRootCA Apr 15 07:09:30 Cert-Chain-Val> KEYPAIR-CERT CHAIN Reply, len<3298> Apr 15 07:09:30 pkid_ipc_send: Queued packet to IKED-Q, len 3310 Apr 15 07:09:30 pkid_ipc_write: Sending packet to IKED len 3310, total packets sent 81 Apr 15 07:10:30 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 07:10:31 checkLdapResponse Apr 15 07:14:47 checkLdapResponse Apr 15 07:19:02 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 07:19:03 checkLdapResponse Apr 15 07:23:20 checkLdapResponse Apr 15 07:27:35 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 07:27:36 checkLdapResponse Apr 15 07:31:52 checkLdapResponse Apr 15 07:36:08 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 07:36:09 checkLdapResponse Apr 15 07:40:25 checkLdapResponse Apr 15 07:44:40 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 07:44:41 checkLdapResponse Apr 15 07:48:57 checkLdapResponse Apr 15 07:53:13 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 07:53:14 checkLdapResponse Apr 15 07:57:30 checkLdapResponse Apr 15 08:01:45 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 08:01:46 checkLdapResponse Apr 15 08:06:02 checkLdapResponse Apr 15 08:10:18 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 08:10:19 checkLdapResponse Apr 15 08:14:35 checkLdapResponse Apr 15 08:18:50 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 08:18:51 checkLdapResponse Apr 15 08:23:07 checkLdapResponse Apr 15 08:27:23 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 08:27:24 checkLdapResponse Apr 15 08:31:40 checkLdapResponse Apr 15 08:35:55 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 08:35:56 checkLdapResponse Apr 15 08:40:12 checkLdapResponse Apr 15 08:44:28 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 08:44:29 checkLdapResponse Apr 15 08:48:45 checkLdapResponse Apr 15 08:53:00 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 08:53:01 checkLdapResponse Apr 15 08:57:17 checkLdapResponse Apr 15 09:01:33 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 09:01:34 checkLdapResponse Apr 15 09:05:50 checkLdapResponse Apr 15 09:10:05 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 09:10:06 checkLdapResponse Apr 15 09:14:23 checkLdapResponse Apr 15 09:18:38 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 09:18:39 checkLdapResponse Apr 15 09:22:55 checkLdapResponse Apr 15 09:27:10 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 09:27:11 checkLdapResponse Apr 15 09:31:28 checkLdapResponse Apr 15 09:35:43 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 09:35:44 checkLdapResponse Apr 15 09:40:00 checkLdapResponse Apr 15 09:44:15 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 09:44:16 checkLdapResponse Apr 15 09:48:33 checkLdapResponse Apr 15 09:52:48 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 09:52:49 checkLdapResponse Apr 15 09:57:05 checkLdapResponse Apr 15 10:01:20 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 10:01:21 checkLdapResponse Apr 15 10:05:38 checkLdapResponse Apr 15 10:09:53 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 10:09:54 checkLdapResponse Apr 15 10:14:10 checkLdapResponse Apr 15 10:18:25 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 10:18:26 checkLdapResponse Apr 15 10:22:43 checkLdapResponse Apr 15 10:26:58 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 10:26:59 checkLdapResponse Apr 15 10:31:15 checkLdapResponse Apr 15 10:35:30 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 10:35:31 checkLdapResponse Apr 15 10:39:48 checkLdapResponse Apr 15 10:44:03 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 10:44:04 checkLdapResponse Apr 15 10:48:20 checkLdapResponse Apr 15 10:52:35 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 10:52:36 checkLdapResponse Apr 15 10:56:53 checkLdapResponse Apr 15 11:01:08 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 11:01:09 checkLdapResponse Apr 15 11:05:25 checkLdapResponse Apr 15 11:09:41 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 11:09:42 checkLdapResponse Apr 15 11:13:58 checkLdapResponse Apr 15 11:18:13 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 11:18:14 checkLdapResponse Apr 15 11:22:30 checkLdapResponse Apr 15 11:26:46 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 11:26:47 checkLdapResponse Apr 15 11:31:03 checkLdapResponse Apr 15 11:35:18 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 11:35:19 checkLdapResponse Apr 15 11:39:35 checkLdapResponse Apr 15 11:43:51 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 11:43:52 checkLdapResponse Apr 15 11:48:08 checkLdapResponse Apr 15 11:52:23 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 11:52:24 checkLdapResponse Apr 15 11:56:40 checkLdapResponse Apr 15 12:00:56 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 12:00:57 checkLdapResponse Apr 15 12:05:13 checkLdapResponse Apr 15 12:09:28 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 12:09:29 checkLdapResponse Apr 15 12:13:45 checkLdapResponse Apr 15 12:18:01 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 12:18:02 checkLdapResponse Apr 15 12:22:18 checkLdapResponse Apr 15 12:26:33 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 12:26:34 checkLdapResponse Apr 15 12:30:50 checkLdapResponse Apr 15 12:35:06 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 12:35:07 checkLdapResponse Apr 15 12:39:23 checkLdapResponse Apr 15 12:43:38 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 12:43:39 checkLdapResponse Apr 15 12:47:56 checkLdapResponse Apr 15 12:52:11 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 12:52:12 checkLdapResponse Apr 15 12:56:28 checkLdapResponse Apr 15 13:00:43 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 13:00:44 checkLdapResponse Apr 15 13:05:01 checkLdapResponse Apr 15 13:09:16 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 13:09:17 checkLdapResponse Apr 15 13:13:33 checkLdapResponse Apr 15 13:17:48 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 13:17:49 checkLdapResponse Apr 15 13:22:06 checkLdapResponse Apr 15 13:26:21 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 13:26:22 checkLdapResponse Apr 15 13:30:38 checkLdapResponse Apr 15 13:34:53 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 13:34:54 checkLdapResponse Apr 15 13:39:11 checkLdapResponse Apr 15 13:43:26 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 13:43:27 checkLdapResponse Apr 15 13:47:43 checkLdapResponse Apr 15 13:51:58 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 13:51:59 checkLdapResponse Apr 15 13:56:16 checkLdapResponse Apr 15 14:00:31 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 14:00:32 checkLdapResponse Apr 15 14:04:48 checkLdapResponse Apr 15 14:09:03 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 14:09:04 checkLdapResponse Apr 15 14:13:21 checkLdapResponse Apr 15 14:17:36 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 14:17:37 checkLdapResponse Apr 15 14:21:53 checkLdapResponse Apr 15 14:26:08 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 14:26:09 checkLdapResponse Apr 15 14:30:26 checkLdapResponse Apr 15 14:34:41 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 14:34:42 checkLdapResponse Apr 15 14:38:58 checkLdapResponse Apr 15 14:43:13 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 14:43:14 checkLdapResponse Apr 15 14:47:31 checkLdapResponse Apr 15 14:51:46 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 14:51:47 checkLdapResponse Apr 15 14:56:03 checkLdapResponse Apr 15 15:00:19 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 15:00:20 checkLdapResponse Apr 15 15:04:36 checkLdapResponse Apr 15 15:08:51 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 15:08:52 checkLdapResponse Apr 15 15:13:08 checkLdapResponse Apr 15 15:17:24 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 15:17:25 checkLdapResponse Apr 15 15:21:41 checkLdapResponse Apr 15 15:25:56 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 15:25:57 checkLdapResponse Apr 15 15:30:13 checkLdapResponse Apr 15 15:34:29 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 15:34:30 checkLdapResponse Apr 15 15:38:46 checkLdapResponse Apr 15 15:43:01 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 15:43:02 checkLdapResponse Apr 15 15:47:18 checkLdapResponse Apr 15 15:51:34 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 15:51:35 checkLdapResponse Apr 15 15:55:51 checkLdapResponse Apr 15 16:00:06 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 16:00:07 checkLdapResponse Apr 15 16:04:23 checkLdapResponse Apr 15 16:08:39 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 16:08:40 checkLdapResponse Apr 15 16:12:56 checkLdapResponse Apr 15 16:17:11 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 16:17:12 checkLdapResponse Apr 15 16:21:28 checkLdapResponse Apr 15 16:25:44 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 16:25:45 checkLdapResponse Apr 15 16:30:01 checkLdapResponse Apr 15 16:34:16 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 16:34:17 checkLdapResponse Apr 15 16:38:34 checkLdapResponse Apr 15 16:42:49 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 16:42:50 checkLdapResponse Apr 15 16:47:06 checkLdapResponse Apr 15 16:51:21 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 16:51:22 checkLdapResponse Apr 15 16:55:39 checkLdapResponse Apr 15 16:59:54 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 16:59:55 checkLdapResponse Apr 15 17:04:11 checkLdapResponse Apr 15 17:08:26 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 17:08:27 checkLdapResponse Apr 15 17:12:44 checkLdapResponse Apr 15 17:16:59 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 17:17:00 checkLdapResponse Apr 15 17:21:16 checkLdapResponse Apr 15 17:25:31 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 17:25:32 checkLdapResponse Apr 15 17:29:49 checkLdapResponse Apr 15 17:34:04 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 17:34:05 checkLdapResponse Apr 15 17:38:21 checkLdapResponse Apr 15 17:42:37 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 17:42:38 checkLdapResponse Apr 15 17:46:54 checkLdapResponse Apr 15 17:51:09 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 17:51:10 checkLdapResponse Apr 15 17:55:26 checkLdapResponse Apr 15 17:59:42 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 17:59:43 checkLdapResponse Apr 15 18:03:59 checkLdapResponse Apr 15 18:08:14 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 18:08:15 checkLdapResponse Apr 15 18:12:31 checkLdapResponse Apr 15 18:16:47 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 18:16:48 checkLdapResponse Apr 15 18:21:04 checkLdapResponse Apr 15 18:25:19 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 18:25:20 checkLdapResponse Apr 15 18:29:36 checkLdapResponse Apr 15 18:33:52 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 18:33:53 checkLdapResponse Apr 15 18:38:09 checkLdapResponse Apr 15 18:42:24 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 18:42:25 checkLdapResponse Apr 15 18:46:42 checkLdapResponse Apr 15 18:50:57 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 18:50:58 checkLdapResponse Apr 15 18:55:14 checkLdapResponse Apr 15 18:59:29 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 18:59:30 checkLdapResponse Apr 15 19:03:47 checkLdapResponse Apr 15 19:08:02 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 19:08:03 checkLdapResponse Apr 15 19:12:19 checkLdapResponse Apr 15 19:16:34 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 19:16:35 checkLdapResponse Apr 15 19:20:52 checkLdapResponse Apr 15 19:20:56 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 19:20:56 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 19:20:56 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 19:20:56 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 19:20:56 pkid_retrieve_obj_from_lhash, try retrieve obj from lhash type <2> for id Apr 15 19:20:56 pkid_retrieve_obj_from_lhash, error retrieve obj from lhash for id Apr 15 19:25:07 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 19:25:08 checkLdapResponse Apr 15 19:29:24 checkLdapResponse Apr 15 19:33:39 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 19:33:40 checkLdapResponse Apr 15 19:37:57 checkLdapResponse Apr 15 19:42:12 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 19:42:13 checkLdapResponse Apr 15 19:46:29 checkLdapResponse Apr 15 19:50:45 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 19:50:46 checkLdapResponse Apr 15 19:55:02 checkLdapResponse Apr 15 19:59:17 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 19:59:18 checkLdapResponse Apr 15 20:03:34 checkLdapResponse Apr 15 20:07:50 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 20:07:51 checkLdapResponse Apr 15 20:12:07 checkLdapResponse Apr 15 20:16:22 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 20:16:23 checkLdapResponse Apr 15 20:20:39 checkLdapResponse Apr 15 20:24:55 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 20:24:56 checkLdapResponse Apr 15 20:29:12 checkLdapResponse Apr 15 20:33:27 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 20:33:28 checkLdapResponse Apr 15 20:37:44 checkLdapResponse Apr 15 20:42:00 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 20:42:01 checkLdapResponse Apr 15 20:46:17 checkLdapResponse Apr 15 20:50:32 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 20:50:33 checkLdapResponse Apr 15 20:54:50 checkLdapResponse Apr 15 20:59:05 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 20:59:06 checkLdapResponse Apr 15 21:03:22 checkLdapResponse Apr 15 21:07:37 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 21:07:38 checkLdapResponse Apr 15 21:11:55 checkLdapResponse Apr 15 21:16:10 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 21:16:11 checkLdapResponse Apr 15 21:20:27 checkLdapResponse Apr 15 21:24:42 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 21:24:43 checkLdapResponse Apr 15 21:29:00 checkLdapResponse Apr 15 21:33:15 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 21:33:16 checkLdapResponse Apr 15 21:37:32 checkLdapResponse Apr 15 21:41:47 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 21:41:48 checkLdapResponse Apr 15 21:46:05 checkLdapResponse Apr 15 21:50:20 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 21:50:21 checkLdapResponse Apr 15 21:54:37 checkLdapResponse Apr 15 21:58:52 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 21:58:53 checkLdapResponse Apr 15 22:03:10 checkLdapResponse Apr 15 22:07:25 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 22:07:26 checkLdapResponse Apr 15 22:11:42 checkLdapResponse Apr 15 22:15:58 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 22:15:59 checkLdapResponse Apr 15 22:20:15 checkLdapResponse Apr 15 22:24:30 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 22:24:31 checkLdapResponse Apr 15 22:28:47 checkLdapResponse Apr 15 22:33:03 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 22:33:04 checkLdapResponse Apr 15 22:37:20 checkLdapResponse Apr 15 22:41:35 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 22:41:36 checkLdapResponse Apr 15 22:45:52 checkLdapResponse Apr 15 22:50:08 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 22:50:09 checkLdapResponse Apr 15 22:54:25 checkLdapResponse Apr 15 22:58:40 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 22:58:41 checkLdapResponse Apr 15 23:02:57 checkLdapResponse Apr 15 23:07:13 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 23:07:14 checkLdapResponse Apr 15 23:11:30 checkLdapResponse Apr 15 23:15:45 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 23:15:46 checkLdapResponse Apr 15 23:20:02 checkLdapResponse Apr 15 23:24:18 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 23:24:19 checkLdapResponse Apr 15 23:28:35 checkLdapResponse Apr 15 23:32:50 pkid 3 seconds timer off 512 times, pid 1426 Apr 15 23:32:51 checkLdapResponse Apr 15 23:35:54 pkid_show_security_pki_local_cert called. Apr 15 23:37:08 checkLdapResponse {primary:node0} ejjnyyo@SRX3400-1> exit