0:01:04-20:05:40 acenn pluto[4451]: | 
2010:01:04-20:05:40 acenn pluto[4451]: | *time to handle event
2010:01:04-20:05:40 acenn pluto[4451]: | event after this is EVENT_REINIT_SECRET in 1361 seconds
2010:01:04-20:05:40 acenn pluto[4451]: | next event EVENT_REINIT_SECRET in 1361 seconds
2010:01:04-20:19:57 acenn pluto[4451]: | 
2010:01:04-20:19:57 acenn pluto[4451]: | *received 1160 bytes from 192.168.2.150:1259 on eth1
2010:01:04-20:19:57 acenn pluto[4451]: packet from 192.168.2.150:1259: size (1160) differs from size specified in ISAKMP HDR (1144)
2010:01:04-20:19:57 acenn pluto[4451]: packet from 192.168.2.150:1259: Cisco VPN client appends 16 surplus NULL bytes
2010:01:04-20:19:57 acenn pluto[4451]: packet from 192.168.2.150:1259: received Vendor ID payload [XAUTH]
2010:01:04-20:19:57 acenn pluto[4451]: packet from 192.168.2.150:1259: received Vendor ID payload [Dead Peer Detection]
2010:01:04-20:19:57 acenn pluto[4451]: packet from 192.168.2.150:1259: ignoring Vendor ID payload [FRAGMENTATION 80000000]
2010:01:04-20:19:57 acenn pluto[4451]: packet from 192.168.2.150:1259: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
2010:01:04-20:19:57 acenn pluto[4451]: packet from 192.168.2.150:1259: ignoring Vendor ID payload [Cisco-Unity]
2010:01:04-20:19:57 acenn pluto[4451]: | preparse_isakmp_policy: peer requests PUBKEY+XAUTHRSASIG+XAUTHSERVER authentication
2010:01:04-20:19:57 acenn pluto[4451]: | instantiated "D_REF_zfmTEQwktH_0" for 192.168.2.150
2010:01:04-20:19:57 acenn pluto[4451]: | creating state object #5 at 0x9469138
2010:01:04-20:19:57 acenn pluto[4451]: | ICOOKIE:  7c bb 32 9e  4e 3c eb f3
2010:01:04-20:19:57 acenn pluto[4451]: | RCOOKIE:  22 2b 98 ad  c9 5f 73 f0
2010:01:04-20:19:57 acenn pluto[4451]: | peer:  c0 a8 02 96
2010:01:04-20:19:57 acenn pluto[4451]: | state hash entry 18
2010:01:04-20:19:57 acenn pluto[4451]: | inserting event EVENT_SO_DISCARD, timeout in 0 seconds for #5
2010:01:04-20:19:57 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: responding to Main Mode from unknown peer 192.168.2.150:1259
2010:01:04-20:19:57 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: peer requested 2147483 seconds which exceeds our limit 86400 seconds
2010:01:04-20:19:57 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: lifetime reduced to 86400 seconds (todo: IPSEC_RESPONDER_LIFETIME notification)
2010:01:04-20:19:57 acenn pluto[4451]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #5
2010:01:04-20:19:57 acenn pluto[4451]: | next event EVENT_RETRANSMIT in 10 seconds for #5
2010:01:04-20:19:57 acenn pluto[4451]: | 
2010:01:04-20:19:57 acenn pluto[4451]: | *received 352 bytes from 192.168.2.150:1259 on eth1
2010:01:04-20:19:57 acenn pluto[4451]: packet from 192.168.2.150:1259: size (352) differs from size specified in ISAKMP HDR (336)
2010:01:04-20:19:57 acenn pluto[4451]: packet from 192.168.2.150:1259: Cisco VPN client appends 16 surplus NULL bytes
2010:01:04-20:19:57 acenn pluto[4451]: | ICOOKIE:  7c bb 32 9e  4e 3c eb f3
2010:01:04-20:19:57 acenn pluto[4451]: | RCOOKIE:  22 2b 98 ad  c9 5f 73 f0
2010:01:04-20:19:57 acenn pluto[4451]: | peer:  c0 a8 02 96
2010:01:04-20:19:57 acenn pluto[4451]: | state hash entry 18
2010:01:04-20:19:57 acenn pluto[4451]: | state object #5 found, in STATE_MAIN_R1
2010:01:04-20:19:57 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: ignoring Vendor ID payload [897c95834e3debf3953c66aa900b3fde]
2010:01:04-20:19:57 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: ignoring Vendor ID payload [Cisco-Unity]
2010:01:04-20:19:57 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-02/03: no NAT detected
2010:01:04-20:19:57 acenn pluto[4451]: | inserting event EVENT_NAT_T_KEEPALIVE, timeout in 60 seconds
2010:01:04-20:19:57 acenn pluto[4451]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #5
2010:01:04-20:19:57 acenn pluto[4451]: | next event EVENT_RETRANSMIT in 10 seconds for #5
2010:01:04-20:19:57 acenn pluto[4451]: | 
2010:01:04-20:19:57 acenn pluto[4451]: | *received 1996 bytes from 192.168.2.150:1259 on eth1
2010:01:04-20:19:57 acenn pluto[4451]: | ICOOKIE:  7c bb 32 9e  4e 3c eb f3
2010:01:04-20:19:57 acenn pluto[4451]: | RCOOKIE:  22 2b 98 ad  c9 5f 73 f0
2010:01:04-20:19:57 acenn pluto[4451]: | peer:  c0 a8 02 96
2010:01:04-20:19:57 acenn pluto[4451]: | state hash entry 18
2010:01:04-20:19:57 acenn pluto[4451]: | state object #5 found, in STATE_MAIN_R2
2010:01:04-20:19:57 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: ignoring informational payload, type IPSEC_INITIAL_CONTACT
2010:01:04-20:19:57 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: Peer ID is ID_DER_ASN1_DN: 'C=in, L=pune, O=cybervision, CN=admin, E=thinvm@gmail.com'
2010:01:04-20:19:57 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: self-signed cacert rejected
2010:01:04-20:19:57 acenn pluto[4451]: | subject: 'C=in, L=pune, O=cybervision, CN=admin, E=thinvm@gmail.com'
2010:01:04-20:19:57 acenn pluto[4451]: | issuer:  'C=in, L=pune, O=cybervision, CN=cybervision VPN CA, E=thinvm@gmail.com'
2010:01:04-20:19:57 acenn pluto[4451]: | authkey:  c1:9a:80:2b:5a:f5:d5:ea:58:a3:df:e8:7a:3f:6f:23:df:25:81:63
2010:01:04-20:19:57 acenn pluto[4451]: | certificate is valid
2010:01:04-20:19:57 acenn pluto[4451]: | issuer cacert found
2010:01:04-20:19:57 acenn pluto[4451]: | certificate signature is valid
2010:01:04-20:19:57 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: crl not found
2010:01:04-20:19:57 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: certificate status unknown
2010:01:04-20:19:57 acenn pluto[4451]: | subject: 'C=in, L=pune, O=cybervision, CN=cybervision VPN CA, E=thinvm@gmail.com'
2010:01:04-20:19:57 acenn pluto[4451]: | issuer:  'C=in, L=pune, O=cybervision, CN=cybervision VPN CA, E=thinvm@gmail.com'
2010:01:04-20:19:57 acenn pluto[4451]: | certificate is valid
2010:01:04-20:19:57 acenn pluto[4451]: | issuer cacert found
2010:01:04-20:19:57 acenn pluto[4451]: | certificate signature is valid
2010:01:04-20:19:57 acenn pluto[4451]: | reached self-signed root ca
2010:01:04-20:19:57 acenn pluto[4451]: | public key validated
2010:01:04-20:19:57 acenn pluto[4451]: | XAUTHInitRSA check passed with keyid e6:38:4f:5d:23:6a:44:22:6c:b3:32:45:19:07:30:ef:42:f7:8f:83
2010:01:04-20:19:57 acenn pluto[4451]: | peer CA:      "C=in, L=pune, O=cybervision, CN=cybervision VPN CA, E=thinvm@gmail.com"
2010:01:04-20:19:57 acenn pluto[4451]: | requested CA: "C=in, L=pune, O=cybervision, CN=cybervision VPN CA, E=thinvm@gmail.com"
2010:01:04-20:19:57 acenn pluto[4451]: | current connection is a full match -- no need to look further
2010:01:04-20:19:57 acenn pluto[4451]: | offered CA:   "C=in, L=pune, O=cybervision, CN=cybervision VPN CA, E=thinvm@gmail.com"
2010:01:04-20:19:57 acenn pluto[4451]: | our certificate policy is ALWAYS_SEND
2010:01:04-20:19:57 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: we have a cert and are sending it 
2010:01:04-20:19:57 acenn pluto[4451]: | inserting event EVENT_SA_REPLACE, timeout in 7530 seconds for #5
2010:01:04-20:19:57 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: sent MR3, ISAKMP SA established
2010:01:04-20:19:57 acenn pluto[4451]: | starting XAUTH server
2010:01:04-20:19:57 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: sending XAUTH request
2010:01:04-20:19:57 acenn pluto[4451]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #5
2010:01:04-20:19:57 acenn pluto[4451]: | next event EVENT_RETRANSMIT in 10 seconds for #5
2010:01:04-20:20:01 acenn pluto[4451]: | 
2010:01:04-20:20:01 acenn pluto[4451]: | *received 92 bytes from 192.168.2.150:1259 on eth1
2010:01:04-20:20:01 acenn pluto[4451]: | ICOOKIE:  7c bb 32 9e  4e 3c eb f3
2010:01:04-20:20:01 acenn pluto[4451]: | RCOOKIE:  22 2b 98 ad  c9 5f 73 f0
2010:01:04-20:20:01 acenn pluto[4451]: | peer:  c0 a8 02 96
2010:01:04-20:20:01 acenn pluto[4451]: | state hash entry 18
2010:01:04-20:20:01 acenn pluto[4451]: | state object #5 found, in STATE_XAUTH_R1
2010:01:04-20:20:01 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: parsing XAUTH reply
2010:01:04-20:20:01 acenn pluto[4451]: | peer xauth user name is 'admin'
2010:01:04-20:20:02 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: extended authentication was successful
2010:01:04-20:20:02 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: sending XAUTH status:
2010:01:04-20:20:02 acenn pluto[4451]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #5
2010:01:04-20:20:02 acenn pluto[4451]: | next event EVENT_RETRANSMIT in 10 seconds for #5
2010:01:04-20:20:02 acenn pluto[4451]: | 
2010:01:04-20:20:02 acenn pluto[4451]: | *received 60 bytes from 192.168.2.150:1259 on eth1
2010:01:04-20:20:02 acenn pluto[4451]: | ICOOKIE:  7c bb 32 9e  4e 3c eb f3
2010:01:04-20:20:02 acenn pluto[4451]: | RCOOKIE:  22 2b 98 ad  c9 5f 73 f0
2010:01:04-20:20:02 acenn pluto[4451]: | peer:  c0 a8 02 96
2010:01:04-20:20:02 acenn pluto[4451]: | state hash entry 18
2010:01:04-20:20:02 acenn pluto[4451]: | state object #5 found, in STATE_XAUTH_R2
2010:01:04-20:20:02 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: parsing XAUTH ack
2010:01:04-20:20:02 acenn pluto[4451]: | inserting event EVENT_SA_REPLACE, timeout in 7530 seconds for #5
2010:01:04-20:20:02 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: received XAUTH ack, established
2010:01:04-20:20:02 acenn pluto[4451]: | next event EVENT_NAT_T_KEEPALIVE in 55 seconds
2010:01:04-20:20:02 acenn pluto[4451]: | 
2010:01:04-20:20:02 acenn pluto[4451]: | *received 204 bytes from 192.168.2.150:1259 on eth1
2010:01:04-20:20:02 acenn pluto[4451]: | ICOOKIE:  7c bb 32 9e  4e 3c eb f3
2010:01:04-20:20:02 acenn pluto[4451]: | RCOOKIE:  22 2b 98 ad  c9 5f 73 f0
2010:01:04-20:20:02 acenn pluto[4451]: | peer:  c0 a8 02 96
2010:01:04-20:20:02 acenn pluto[4451]: | state hash entry 18
2010:01:04-20:20:02 acenn pluto[4451]: | state object not found
2010:01:04-20:20:02 acenn pluto[4451]: | ICOOKIE:  7c bb 32 9e  4e 3c eb f3
2010:01:04-20:20:02 acenn pluto[4451]: | RCOOKIE:  22 2b 98 ad  c9 5f 73 f0
2010:01:04-20:20:02 acenn pluto[4451]: | peer:  c0 a8 02 96
2010:01:04-20:20:02 acenn pluto[4451]: | state hash entry 18
2010:01:04-20:20:02 acenn pluto[4451]: | state object #5 found, in STATE_XAUTH_R3
2010:01:04-20:20:02 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: unsupported ModeCfg attribute 28683?? received.
2010:01:04-20:20:02 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: unsupported ModeCfg attribute 28684?? received.
2010:01:04-20:20:02 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: peer requested virtual IP %any
2010:01:04-20:20:02 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: assigning virtual IP  10.242.5.1 to peer
2010:01:04-20:20:02 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: assigning DNS server 202.54.1.66 to peer
2010:01:04-20:20:02 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: sending ModeCfg reply
2010:01:04-20:20:02 acenn pluto[4451]: | inserting event EVENT_SA_REPLACE, timeout in 7530 seconds for #5
2010:01:04-20:20:02 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: sent ModeCfg reply, established
2010:01:04-20:20:02 acenn pluto[4451]: | next event EVENT_NAT_T_KEEPALIVE in 55 seconds
2010:01:04-20:20:02 acenn pluto[4451]: | 
2010:01:04-20:20:02 acenn pluto[4451]: | *received 1036 bytes from 192.168.2.150:1259 on eth1
2010:01:04-20:20:02 acenn pluto[4451]: | ICOOKIE:  7c bb 32 9e  4e 3c eb f3
2010:01:04-20:20:02 acenn pluto[4451]: | RCOOKIE:  22 2b 98 ad  c9 5f 73 f0
2010:01:04-20:20:02 acenn pluto[4451]: | peer:  c0 a8 02 96
2010:01:04-20:20:02 acenn pluto[4451]: | state hash entry 18
2010:01:04-20:20:02 acenn pluto[4451]: | state object not found
2010:01:04-20:20:02 acenn pluto[4451]: | ICOOKIE:  7c bb 32 9e  4e 3c eb f3
2010:01:04-20:20:02 acenn pluto[4451]: | RCOOKIE:  22 2b 98 ad  c9 5f 73 f0
2010:01:04-20:20:02 acenn pluto[4451]: | peer:  c0 a8 02 96
2010:01:04-20:20:02 acenn pluto[4451]: | state hash entry 18
2010:01:04-20:20:02 acenn pluto[4451]: | state object #5 found, in STATE_MODE_CFG_R1
2010:01:04-20:20:02 acenn pluto[4451]: | peer client is 10.242.5.1
2010:01:04-20:20:02 acenn pluto[4451]: | peer client protocol/port is 0/0
2010:01:04-20:20:02 acenn pluto[4451]: | our client is subnet 0.0.0.0/0
2010:01:04-20:20:02 acenn pluto[4451]: | our client protocol/port is 0/0
2010:01:04-20:20:02 acenn pluto[4451]: | no valid attribute cert found
2010:01:04-20:20:02 acenn pluto[4451]: | duplicating state object #5
2010:01:04-20:20:02 acenn pluto[4451]: | creating state object #6 at 0x94841c0
2010:01:04-20:20:02 acenn pluto[4451]: | ICOOKIE:  7c bb 32 9e  4e 3c eb f3
2010:01:04-20:20:02 acenn pluto[4451]: | RCOOKIE:  22 2b 98 ad  c9 5f 73 f0
2010:01:04-20:20:02 acenn pluto[4451]: | peer:  c0 a8 02 96
2010:01:04-20:20:02 acenn pluto[4451]: | state hash entry 18
2010:01:04-20:20:02 acenn pluto[4451]: | inserting event EVENT_SO_DISCARD, timeout in 0 seconds for #6
2010:01:04-20:20:02 acenn pluto[4451]: | unsupported IPCOMP Transform IPCOMP_LZS from 192.168.2.150
2010:01:04-20:20:02 acenn pluto[4451]: | unsupported IPCOMP Transform IPCOMP_LZS from 192.168.2.150
2010:01:04-20:20:02 acenn pluto[4451]: | unsupported IPCOMP Transform IPCOMP_LZS from 192.168.2.150
2010:01:04-20:20:02 acenn pluto[4451]: | unsupported IPCOMP Transform IPCOMP_LZS from 192.168.2.150
2010:01:04-20:20:02 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #6: responding to Quick Mode
2010:01:04-20:20:02 acenn pluto[4451]: | kernel_alg_esp_auth_keylen(auth=1, sadb_aalg=2): a_keylen=16
2010:01:04-20:20:02 acenn pluto[4451]: | route owner of "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 unrouted: NULL
2010:01:04-20:20:02 acenn pluto[4451]: | install_inbound_ipsec_sa() checking if we can route
2010:01:04-20:20:02 acenn pluto[4451]: | route owner of "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 unrouted: NULL; eroute owner: NULL
2010:01:04-20:20:02 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #6: ERROR: netlink response for Add SA esp.0@121.247.65.116 included errno 22: Invalid argument
2010:01:04-20:20:02 acenn pluto[4451]: | state transition function for STATE_QUICK_R0 had internal error
2010:01:04-20:20:02 acenn pluto[4451]: | next event EVENT_SO_DISCARD in 0 seconds for #6
2010:01:04-20:20:02 acenn pluto[4451]: | 
2010:01:04-20:20:02 acenn pluto[4451]: | *time to handle event
2010:01:04-20:20:02 acenn pluto[4451]: | event after this is EVENT_NAT_T_KEEPALIVE in 55 seconds
2010:01:04-20:20:02 acenn pluto[4451]: | ICOOKIE:  7c bb 32 9e  4e 3c eb f3
2010:01:04-20:20:02 acenn pluto[4451]: | RCOOKIE:  22 2b 98 ad  c9 5f 73 f0
2010:01:04-20:20:02 acenn pluto[4451]: | peer:  c0 a8 02 96
2010:01:04-20:20:02 acenn pluto[4451]: | state hash entry 18
2010:01:04-20:20:02 acenn pluto[4451]: | next event EVENT_NAT_T_KEEPALIVE in 55 seconds
2010:01:04-20:20:07 acenn pluto[4451]: | 
2010:01:04-20:20:07 acenn pluto[4451]: | *received 1036 bytes from 192.168.2.150:1259 on eth1
2010:01:04-20:20:07 acenn pluto[4451]: | ICOOKIE:  7c bb 32 9e  4e 3c eb f3
2010:01:04-20:20:07 acenn pluto[4451]: | RCOOKIE:  22 2b 98 ad  c9 5f 73 f0
2010:01:04-20:20:07 acenn pluto[4451]: | peer:  c0 a8 02 96
2010:01:04-20:20:07 acenn pluto[4451]: | state hash entry 18
2010:01:04-20:20:07 acenn pluto[4451]: | state object not found
2010:01:04-20:20:07 acenn pluto[4451]: | ICOOKIE:  7c bb 32 9e  4e 3c eb f3
2010:01:04-20:20:07 acenn pluto[4451]: | RCOOKIE:  22 2b 98 ad  c9 5f 73 f0
2010:01:04-20:20:07 acenn pluto[4451]: | peer:  c0 a8 02 96
2010:01:04-20:20:07 acenn pluto[4451]: | state hash entry 18
2010:01:04-20:20:07 acenn pluto[4451]: | state object #5 found, in STATE_MODE_CFG_R1
2010:01:04-20:20:07 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0xbfc5039b (perhaps this is a duplicated packet)
2010:01:04-20:20:07 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: sending encrypted notification INVALID_MESSAGE_ID to 192.168.2.150:1259
2010:01:04-20:20:07 acenn pluto[4451]: | next event EVENT_NAT_T_KEEPALIVE in 50 seconds
2010:01:04-20:20:12 acenn pluto[4451]: | 
2010:01:04-20:20:12 acenn pluto[4451]: | *received 1036 bytes from 192.168.2.150:1259 on eth1
2010:01:04-20:20:12 acenn pluto[4451]: | ICOOKIE:  7c bb 32 9e  4e 3c eb f3
2010:01:04-20:20:12 acenn pluto[4451]: | RCOOKIE:  22 2b 98 ad  c9 5f 73 f0
2010:01:04-20:20:12 acenn pluto[4451]: | peer:  c0 a8 02 96
2010:01:04-20:20:12 acenn pluto[4451]: | state hash entry 18
2010:01:04-20:20:12 acenn pluto[4451]: | state object not found
2010:01:04-20:20:12 acenn pluto[4451]: | ICOOKIE:  7c bb 32 9e  4e 3c eb f3
2010:01:04-20:20:12 acenn pluto[4451]: | RCOOKIE:  22 2b 98 ad  c9 5f 73 f0
2010:01:04-20:20:12 acenn pluto[4451]: | peer:  c0 a8 02 96
2010:01:04-20:20:12 acenn pluto[4451]: | state hash entry 18
2010:01:04-20:20:12 acenn pluto[4451]: | state object #5 found, in STATE_MODE_CFG_R1
2010:01:04-20:20:12 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0xbfc5039b (perhaps this is a duplicated packet)
2010:01:04-20:20:12 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: sending encrypted notification INVALID_MESSAGE_ID to 192.168.2.150:1259
2010:01:04-20:20:12 acenn pluto[4451]: | next event EVENT_NAT_T_KEEPALIVE in 45 seconds
2010:01:04-20:20:12 acenn pluto[4451]: | 
2010:01:04-20:20:12 acenn pluto[4451]: | *received 92 bytes from 192.168.2.150:1259 on eth1
2010:01:04-20:20:12 acenn pluto[4451]: | ICOOKIE:  7c bb 32 9e  4e 3c eb f3
2010:01:04-20:20:12 acenn pluto[4451]: | RCOOKIE:  22 2b 98 ad  c9 5f 73 f0
2010:01:04-20:20:12 acenn pluto[4451]: | peer:  c0 a8 02 96
2010:01:04-20:20:12 acenn pluto[4451]: | state hash entry 18
2010:01:04-20:20:12 acenn pluto[4451]: | state object #5 found, in STATE_MODE_CFG_R1
2010:01:04-20:20:12 acenn pluto[4451]: | received DPD notification R_U_THERE with seqno = 602657027
2010:01:04-20:20:12 acenn pluto[4451]: | sent DPD notification R_U_THERE_ACK with seqno = 602657027
2010:01:04-20:20:12 acenn pluto[4451]: | next event EVENT_NAT_T_KEEPALIVE in 45 seconds
2010:01:04-20:20:17 acenn pluto[4451]: | 
2010:01:04-20:20:17 acenn pluto[4451]: | *received 1036 bytes from 192.168.2.150:1259 on eth1
2010:01:04-20:20:17 acenn pluto[4451]: | ICOOKIE:  7c bb 32 9e  4e 3c eb f3
2010:01:04-20:20:17 acenn pluto[4451]: | RCOOKIE:  22 2b 98 ad  c9 5f 73 f0
2010:01:04-20:20:17 acenn pluto[4451]: | peer:  c0 a8 02 96
2010:01:04-20:20:17 acenn pluto[4451]: | state hash entry 18
2010:01:04-20:20:17 acenn pluto[4451]: | state object not found
2010:01:04-20:20:17 acenn pluto[4451]: | ICOOKIE:  7c bb 32 9e  4e 3c eb f3
2010:01:04-20:20:17 acenn pluto[4451]: | RCOOKIE:  22 2b 98 ad  c9 5f 73 f0
2010:01:04-20:20:17 acenn pluto[4451]: | peer:  c0 a8 02 96
2010:01:04-20:20:17 acenn pluto[4451]: | state hash entry 18
2010:01:04-20:20:17 acenn pluto[4451]: | state object #5 found, in STATE_MODE_CFG_R1
2010:01:04-20:20:17 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0xbfc5039b (perhaps this is a duplicated packet)
2010:01:04-20:20:17 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: sending encrypted notification INVALID_MESSAGE_ID to 192.168.2.150:1259
2010:01:04-20:20:17 acenn pluto[4451]: | next event EVENT_NAT_T_KEEPALIVE in 40 seconds
2010:01:04-20:20:22 acenn pluto[4451]: | 
2010:01:04-20:20:22 acenn pluto[4451]: | *received 92 bytes from 192.168.2.150:1259 on eth1
2010:01:04-20:20:22 acenn pluto[4451]: | ICOOKIE:  7c bb 32 9e  4e 3c eb f3
2010:01:04-20:20:22 acenn pluto[4451]: | RCOOKIE:  22 2b 98 ad  c9 5f 73 f0
2010:01:04-20:20:22 acenn pluto[4451]: | peer:  c0 a8 02 96
2010:01:04-20:20:22 acenn pluto[4451]: | state hash entry 18
2010:01:04-20:20:22 acenn pluto[4451]: | state object #5 found, in STATE_MODE_CFG_R1
2010:01:04-20:20:22 acenn pluto[4451]: | received DPD notification R_U_THERE with seqno = 602657028
2010:01:04-20:20:22 acenn pluto[4451]: | sent DPD notification R_U_THERE_ACK with seqno = 602657028
2010:01:04-20:20:22 acenn pluto[4451]: | next event EVENT_NAT_T_KEEPALIVE in 35 seconds
2010:01:04-20:20:22 acenn pluto[4451]: | 
2010:01:04-20:20:22 acenn pluto[4451]: | *received 76 bytes from 192.168.2.150:1259 on eth1
2010:01:04-20:20:22 acenn pluto[4451]: | ICOOKIE:  7c bb 32 9e  4e 3c eb f3
2010:01:04-20:20:22 acenn pluto[4451]: | RCOOKIE:  22 2b 98 ad  c9 5f 73 f0
2010:01:04-20:20:22 acenn pluto[4451]: | peer:  c0 a8 02 96
2010:01:04-20:20:22 acenn pluto[4451]: | state hash entry 18
2010:01:04-20:20:22 acenn pluto[4451]: | state object #5 found, in STATE_MODE_CFG_R1
2010:01:04-20:20:22 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x4e4c1407) not found (maybe expired)
2010:01:04-20:20:22 acenn pluto[4451]: | next event EVENT_NAT_T_KEEPALIVE in 35 seconds
2010:01:04-20:20:32 acenn pluto[4451]: | 
2010:01:04-20:20:32 acenn pluto[4451]: | *received 92 bytes from 192.168.2.150:1259 on eth1
2010:01:04-20:20:32 acenn pluto[4451]: | ICOOKIE:  7c bb 32 9e  4e 3c eb f3
2010:01:04-20:20:32 acenn pluto[4451]: | RCOOKIE:  22 2b 98 ad  c9 5f 73 f0
2010:01:04-20:20:32 acenn pluto[4451]: | peer:  c0 a8 02 96
2010:01:04-20:20:32 acenn pluto[4451]: | state hash entry 18
2010:01:04-20:20:32 acenn pluto[4451]: | state object #5 found, in STATE_MODE_CFG_R1
2010:01:04-20:20:32 acenn pluto[4451]: | received DPD notification R_U_THERE with seqno = 602657029
2010:01:04-20:20:32 acenn pluto[4451]: | sent DPD notification R_U_THERE_ACK with seqno = 602657029
2010:01:04-20:20:32 acenn pluto[4451]: | next event EVENT_NAT_T_KEEPALIVE in 25 seconds
2010:01:04-20:20:42 acenn pluto[4451]: | 
2010:01:04-20:20:42 acenn pluto[4451]: | *received 92 bytes from 192.168.2.150:1259 on eth1
2010:01:04-20:20:42 acenn pluto[4451]: | ICOOKIE:  7c bb 32 9e  4e 3c eb f3
2010:01:04-20:20:42 acenn pluto[4451]: | RCOOKIE:  22 2b 98 ad  c9 5f 73 f0
2010:01:04-20:20:42 acenn pluto[4451]: | peer:  c0 a8 02 96
2010:01:04-20:20:42 acenn pluto[4451]: | state hash entry 18
2010:01:04-20:20:42 acenn pluto[4451]: | state object #5 found, in STATE_MODE_CFG_R1
2010:01:04-20:20:42 acenn pluto[4451]: | received DPD notification R_U_THERE with seqno = 602657030
2010:01:04-20:20:42 acenn pluto[4451]: | sent DPD notification R_U_THERE_ACK with seqno = 602657030
2010:01:04-20:20:42 acenn pluto[4451]: | next event EVENT_NAT_T_KEEPALIVE in 15 seconds
2010:01:04-20:20:52 acenn pluto[4451]: | 
2010:01:04-20:20:52 acenn pluto[4451]: | *received 92 bytes from 192.168.2.150:1259 on eth1
2010:01:04-20:20:52 acenn pluto[4451]: | ICOOKIE:  7c bb 32 9e  4e 3c eb f3
2010:01:04-20:20:52 acenn pluto[4451]: | RCOOKIE:  22 2b 98 ad  c9 5f 73 f0
2010:01:04-20:20:52 acenn pluto[4451]: | peer:  c0 a8 02 96
2010:01:04-20:20:52 acenn pluto[4451]: | state hash entry 18
2010:01:04-20:20:52 acenn pluto[4451]: | state object #5 found, in STATE_MODE_CFG_R1
2010:01:04-20:20:52 acenn pluto[4451]: | ICOOKIE:  7c bb 32 9e  4e 3c eb f3
2010:01:04-20:20:52 acenn pluto[4451]: | RCOOKIE:  22 2b 98 ad  c9 5f 73 f0
2010:01:04-20:20:52 acenn pluto[4451]: | peer:  c0 a8 02 96
2010:01:04-20:20:52 acenn pluto[4451]: | state hash entry 18
2010:01:04-20:20:52 acenn pluto[4451]: | state object #5 found, in STATE_MODE_CFG_R1
2010:01:04-20:20:52 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259 #5: received Delete SA payload: deleting ISAKMP State #5
2010:01:04-20:20:52 acenn pluto[4451]: | ICOOKIE:  7c bb 32 9e  4e 3c eb f3
2010:01:04-20:20:52 acenn pluto[4451]: | RCOOKIE:  22 2b 98 ad  c9 5f 73 f0
2010:01:04-20:20:52 acenn pluto[4451]: | peer:  c0 a8 02 96
2010:01:04-20:20:52 acenn pluto[4451]: | state hash entry 18
2010:01:04-20:20:52 acenn pluto[4451]: "D_REF_zfmTEQwktH_0"[3] 192.168.2.150:1259: deleting connection "D_REF_zfmTEQwktH_0" instance with peer 192.168.2.150 {isakmp=#0/ipsec=#0}
2010:01:04-20:20:52 acenn pluto[4451]: | next event EVENT_NAT_T_KEEPALIVE in 5 seconds
2010:01:04-20:20:57 acenn pluto[4451]: | 
2010:01:04-20:20:57 acenn pluto[4451]: | *time to handle event
2010:01:04-20:20:57 acenn pluto[4451]: | event after this is EVENT_REINIT_SECRET in 444 seconds
2010:01:04-20:20:57 acenn pluto[4451]: | next event EVENT_REINIT_SECRET in 444 seconds