./rekey-no-reply-I1 ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
./rekey-no-reply-I1 ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0)
./rekey-no-reply-I1 ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0)
./rekey-no-reply-I1 loading secrets from "../samples/parker.secrets"
./rekey-no-reply-I1 loaded private key for keyid: PPK_RSA:AQN7wUerV/66A6 7046 BBAB E28F 310E C6C0 80EC 790E F556 2AB9
| processing whack message of size: A
| processing whack message of size: A
processing whack msg time: X size: Y
./rekey-no-reply-I1 loaded key: 2A3A 92D4 E0FA 5CD7 8DE1 D133 0C62 6985 2B6E D701
| processing whack message of size: A
processing whack msg time: X size: Y
./rekey-no-reply-I1 loaded key: 66A6 7046 BBAB E28F 310E C6C0 80EC 790E F556 2AB9
| processing whack message of size: A
processing whack msg time: X size: Y
| Added new connection parker1--jj2 with policy RSASIG+ENCRYPT+TUNNEL+PFS+IKEv2ALLOW+IKEv2Init+SAREFTRACK
./rekey-no-reply-I1 use keyid: 1:2A3A 92D4 E0FA 5CD7 8DE1 D133 0C62 6985 2B6E D701 / 2:<>
| counting wild cards for @jamesjohnson.emmjay.credil.org is 0
./rekey-no-reply-I1 use keyid: 1:66A6 7046 BBAB E28F 310E C6C0 80EC 790E F556 2AB9 / 2:<>
| counting wild cards for @parker01.emmjay.credil.org is 0
| orient parker1--jj2 checking against if: eth0 (AF_INET:192.168.1.1:500)
|     orient matched on IP
| orient parker1--jj2 checking against if: eth0 (AF_INET:192.168.1.1:4500)
| orient parker1--jj2 checking against if: eth0 (AF_INET6:2606:2800:220:1:248:1893:25c8:1946:500)
|   orient parker1--jj2 finished with: 1 [192.168.1.1]
| find_host_pair: looking for me=192.168.1.1:500 %address him=132.213.238.7:500 exact-match
| find_host_pair: concluded with <none>
| connect_to_host_pair: 192.168.1.1:500 %address 132.213.238.7:500 -> hp:none
| find_ID_host_pair: looking for me=@parker01.emmjay.credil.org him=@jamesjohnson.emmjay.credil.org (exact)
|   concluded with <none>
./rekey-no-reply-I1 adding connection: "parker1--jj2"
| fd68:c9f9:4157:2:0:1::/96===192.168.1.1[@parker01.emmjay.credil.org]...132.213.238.7[@jamesjohnson.emmjay.credil.org]===fd68:c9f9:4157::/64
| ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEv2ALLOW+IKEv2Init+SAREFTRACK
|   orient parker1--jj2 finished with: 1 [192.168.1.1]
RC=0 "parker1--jj2": fd68:c9f9:4157:2:0:1::/96===192.168.1.1[@parker01.emmjay.credil.org]...132.213.238.7[@jamesjohnson.emmjay.credil.org]===fd68:c9f9:4157::/64; unrouted; eroute owner: #0
RC=0 "parker1--jj2":     myip=unset; hisip=unset;
RC=0 "parker1--jj2":   keys: 1:66A6 7046 BBAB E28F 310E C6C0 80EC 790E F556 2AB9 2:none...
RC=0 "parker1--jj2":        ....1:2A3A 92D4 E0FA 5CD7 8DE1 D133 0C62 6985 2B6E D701 2:none
RC=0 "parker1--jj2":   ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0
RC=0 "parker1--jj2":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEv2ALLOW+IKEv2Init+SAREFTRACK; prio: 64,96; interface: eth0; kind=CK_PERMANENT
| find_phase1_state: no SA found for conn 'parker1--jj2'
| creating state object #1 at Z
| orient parker1--jj2 checking against if: eth0 (AF_INET:192.168.1.1:500)
|     orient matched on IP
| orient parker1--jj2 checking against if: eth0 (AF_INET:192.168.1.1:4500)
| orient parker1--jj2 checking against if: eth0 (AF_INET6:2606:2800:220:1:248:1893:25c8:1946:500)
|   orient parker1--jj2 finished with: 1 [192.168.1.1]
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  00 00 00 00  00 00 00 00
| state hash entry 4
| inserting state object #1 bucket: 4
./rekey-no-reply-I1 initiating v2 parent SA
./rekey-no-reply-I1 STATE_PARENT_I1: initiate
sending 892 bytes for ikev2_parent_outI1_common through eth0:500 [192.168.1.1:500] to 132.213.238.7:500 (using #1)
|   80 01 02 03  04 05 06 07  00 00 00 00  00 00 00 00
|   21 20 22 08  00 00 00 00  00 00 03 7c  22 00 01 fc
|   02 00 00 2c  01 01 00 04  03 00 00 0c  01 00 00 0c
|   80 0e 00 80  03 00 00 08  03 00 00 02  03 00 00 08
|   02 00 00 02  00 00 00 08  04 00 00 0e  02 00 00 2c
|   02 01 00 04  03 00 00 0c  01 00 00 0c  80 0e 00 80
|   03 00 00 08  03 00 00 01  03 00 00 08  02 00 00 01
|   00 00 00 08  04 00 00 0e  02 00 00 28  03 01 00 04
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 02
|   03 00 00 08  02 00 00 02  00 00 00 08  04 00 00 0e
|   02 00 00 28  04 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 01  03 00 00 08  02 00 00 01
|   00 00 00 08  04 00 00 0e  02 00 00 2c  05 01 00 04
|   03 00 00 0c  01 00 00 0c  80 0e 00 80  03 00 00 08
|   03 00 00 02  03 00 00 08  02 00 00 02  00 00 00 08
|   04 00 00 05  02 00 00 2c  06 01 00 04  03 00 00 0c
|   01 00 00 0c  80 0e 00 80  03 00 00 08  03 00 00 01
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 05
|   02 00 00 28  07 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 02  03 00 00 08  02 00 00 02
|   00 00 00 08  04 00 00 05  02 00 00 28  08 01 00 04
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 01
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 05
|   02 00 00 28  09 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 02  03 00 00 08  02 00 00 02
|   00 00 00 08  04 00 00 02  02 00 00 28  0a 01 00 04
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 01
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 02
|   02 00 00 2c  0b 01 00 04  03 00 00 0c  01 00 00 0c
|   80 0e 00 80  03 00 00 08  03 00 00 02  03 00 00 08
|   02 00 00 02  00 00 00 08  04 00 00 02  00 00 00 2c
|   0c 01 00 04  03 00 00 0c  01 00 00 0c  80 0e 00 80
|   03 00 00 08  03 00 00 01  03 00 00 08  02 00 00 01
|   00 00 00 08  04 00 00 02  28 00 01 08  00 0e 00 00
|   3d a6 6a 81  e2 92 09 be  18 4f a0 1e  5c ed ea 7c
|   7d 7b 3a 21  3e 15 0d 53  5d 17 6a be  1b c5 70 ab
|   34 47 bc 09  14 7c aa 91  9c 8f 81 dc  1e f9 87 cd
|   6a ec fa f3  a5 9e 37 bc  ac 3d fd e1  32 8e e8 b3
|   fe d3 8b f4  7b 50 34 13  33 7a 93 ea  e9 3c 0e 8b
|   bd 48 18 9c  9e 03 70 f2  55 ce 45 22  9f c7 c9 48
|   43 a3 e2 64  b5 5d 43 38  c8 fe f1 d3  06 43 f0 0a
|   e8 6d 61 8c  60 78 d9 98  d3 1b 3b 5e  f5 a6 e8 2f
|   ef 56 ac b4  33 bd 1e 62  b2 3e 0b 17  af 6c b8 31
|   08 d7 19 5a  7b c4 54 c2  13 47 98 c2  cc d2 16 29
|   75 6c 03 fb  1e 9c 9d 21  0c a1 e6 c2  f3 f2 49 2c
|   f6 06 73 c1  96 1e ce 58  81 01 1c cb  16 dc f9 fc
|   c7 93 08 75  58 16 57 71  69 96 66 b7  a9 81 7f f7
|   37 4d 7c 41  38 62 a6 39  00 81 ca 3d  1d fc f7 b5
|   08 38 d4 34  70 22 6c 21  d2 5b 20 a1  d2 ba 2a d1
|   89 f3 20 79  ce ac 1e c2  ec 7d ae 76  94 40 39 a0
|   29 00 00 14  20 98 9d 37  a8 14 a6 4d  8f f0 7c 08
|   d3 20 e9 e3  29 00 00 1c  00 00 40 04  ea 59 1e 1b
|   30 a3 e0 94  4c dc 91 5b  b0 95 3c 48  70 73 62 f1
|   2b 00 00 1c  00 00 40 05  cd bc 1b 74  02 d7 5e 4c
|   da 5b cd 1c  a1 08 87 2b  f9 7d c4 c2  00 00 00 10
|   4f 45 70 6c  75 74 6f 75  6e 69 74 30
| #1 complete v2 state transition with STF_OK
./rekey-no-reply-I1 transition from state STATE_IKEv2_START to state STATE_PARENT_I1
| v2_state_transition: st is #1; pst is #0; transition_st is #0
./rekey-no-reply-I1 STATE_PARENT_I1: sent v2I1, expected v2R1 (msgid: 00000000/4294967295)
0: input from ../lp10-parentI2/parentR1.pcap
|   =========== input from pcap file ../lp10-parentI2/parentR1.pcap ========
| *received 432 bytes from 132.213.238.7:500 on eth0 (port=500)
|   80 01 02 03  04 05 06 07  de bc 58 3a  8f 40 d0 cf
|   21 20 22 20  00 00 00 00  00 00 01 b0  22 00 00 30
|   00 00 00 2c  01 01 00 04  03 00 00 0c  01 00 00 0c
|   80 0e 00 80  03 00 00 08  03 00 00 02  03 00 00 08
|   02 00 00 02  00 00 00 08  04 00 00 0e  28 00 01 08
|   00 0e 00 00  a5 9a 13 6c  b8 87 48 57  e1 22 6e a0
|   b8 55 c2 00  31 15 65 84  8b f9 dc a4  5f 49 d4 c5
|   f0 98 8e 9b  31 85 6e 27  5a c2 75 09  07 37 05 b5
|   b1 53 18 07  81 e8 1d 07  c6 19 1c de  dc 1f 2c 26
|   d2 0b 59 f9  67 6a ee 3c  e5 fa 72 3f  54 96 1e 7d
|   8e d0 30 08  0b ed 95 b0  65 2f 5c a6  36 7e 92 2d
|   da cb 88 54  e3 97 fa 16  6f 9e 7c a6  0c 43 2f 29
|   be 2c a4 55  68 01 45 bc  56 a9 84 b9  2b 1b bf 9a
|   fc 84 67 5f  d3 04 79 90  b7 fa 89 5b  04 06 d5 9a
|   50 92 16 4b  d6 33 40 be  2a 44 94 74  33 a7 a5 c1
|   1f 88 5b eb  4e d2 bb 94  b9 22 db e3  b6 5a 8c f9
|   d6 43 5d 5e  5d c9 19 b8  c8 81 53 01  95 09 02 7b
|   c0 2a b0 c8  5d 2c 69 78  6c e8 f6 5d  e4 90 43 83
|   fd f7 98 5e  cc 92 5c 79  7b 62 ae 98  db 4f 7f e0
|   68 7c cd 29  69 0a ad a3  e8 37 d7 41  b4 79 b3 a5
|   38 a2 8d a0  69 ff bd aa  ba d5 54 70  40 ab b5 fc
|   26 6d ae ce  29 00 00 14  c6 ba 31 9f  88 5b e7 b7
|   a2 93 85 dc  bb c6 15 84  29 00 00 1c  00 00 40 04
|   1d 77 eb e3  db b6 db 7c  4b b5 ef 4b  57 c6 f1 b8
|   ec 7e 9b fe  2b 00 00 1c  00 00 40 05  81 b5 74 15
|   c4 1e 64 b8  4c 1a 4e 9c  14 92 f7 ab  25 31 bf 62
|   00 00 00 10  4f 45 70 6c  75 74 6f 75  6e 69 74 30
|  processing version=2.0 packet with exchange type=ISAKMP_v2_SA_INIT (34), msgid: 00000000
| I am IKE SA Initiator
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  de bc 58 3a  8f 40 d0 cf
| state hash entry 28
| v2 state object not found
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  00 00 00 00  00 00 00 00
| state hash entry 4
| v2 peer and cookies match on #1
| v2 state object #1 (parker1--jj2) found, in STATE_PARENT_I1
| removing state object #1
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  00 00 00 00  00 00 00 00
| state hash entry 4
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  de bc 58 3a  8f 40 d0 cf
| state hash entry 28
| inserting state object #1 bucket: 28
| state found and its state is:STATE_PARENT_I1 msgid: 00000
| considering state entry: 0
| now proceed with state specific processing using state #0 initiator-V2_init
| nat chunk  80 01 02 03  04 05 06 07  de bc 58 3a  8f 40 d0 cf
|   84 d5 ee 07  01 f4
| nat-t payloads for v2N_NAT_DETECTION_SOURCE_IP match: no NAT
| nat chunk  80 01 02 03  04 05 06 07  de bc 58 3a  8f 40 d0 cf
|   c0 a8 01 01  01 f4
| nat-t payloads for v2N_NAT_DETECTION_DESTINATION_IP match: no NAT
| ikev2 parent inR1: calculating g^{xy} in order to send I2
| processor 'initiator-V2_init' returned STF_SUSPEND (2)
| #1 complete v2 state transition with STF_SUSPEND
| ikev2 parent inR1outI2: calculating g^{xy}, sending I2
| ikev2 parent SA details
| ikev2 I 0x8001020304050607 0xdebc583a8f40d0cf sha1:0x4ea8e662b07cdd430f6944c6723e4b82d5722418 aes128:0x3f44bf47cafd8150591deb088199fcbf
| ikev2 R 0x8001020304050607 0xdebc583a8f40d0cf sha1:0x515b0bd22e6d76b34fdb760aa7bfad80b109b75d aes128:0xbedb67ec7dc3d00cccac42e70cd63bde
| duplicating state object #1
| creating state object #2 at Z
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  de bc 58 3a  8f 40 d0 cf
| state hash entry 28
| inserting state object #2 bucket: 28
| **emit ISAKMP Message:
|    initiator cookie:
|   80 01 02 03  04 05 06 07
|    responder cookie:
|   de bc 58 3a  8f 40 d0 cf
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996)
|    exchange type: ISAKMP_v2_AUTH
|    flags: ISAKMP_FLAG_INIT
|    message ID:  00 00 00 01
| ***emit IKEv2 Encryption Payload:
|    critical bit: none
| emitting 16 zero bytes of iv into IKEv2 Encryption Payload
|    next-payload: ISAKMP_NEXT_v2IDi [@-20=0x23]
| *****emit IKEv2 Identification Payload:
|    critical bit: none
|    id_type: ID_FQDN
| emitting 26 raw bytes of my identity into IKEv2 Identification Payload
| my identity  70 61 72 6b  65 72 30 31  2e 65 6d 6d  6a 61 79 2e
|   63 72 65 64  69 6c 2e 6f  72 67
| idhash calc pi  cc 07 97 44  b4 a3 4e 8a  0d 2f 27 8b  ee 06 6d 07
|   a5 a5 75 2e
| idhash calc I2  02 00 00 00  70 61 72 6b  65 72 30 31  2e 65 6d 6d
|   6a 61 79 2e  63 72 65 64  69 6c 2e 6f  72 67
| emitting length of IKEv2 Identification Payload: 34
| IKEv2 thinking whether to send my certificate:
|  my policy has  RSASIG, the policy is : RSASIG+ENCRYPT+TUNNEL+PFS+IKEv2ALLOW+IKEv2Init+SAREFTRACK
|  sendcert: CERT_SENDIFASKED and I did not get a certificate request
|  so do not send cert.
| I did not send a certificate because I do not have one.
|  payload after AUTH will be ISAKMP_NEXT_v2SA
|    next-payload: ISAKMP_NEXT_v2AUTH [@0=0x27]
| *****emit IKEv2 Authentication Payload:
|    critical bit: none
|    auth method: v2_AUTH_RSA
| emitting 192 zero bytes of fake rsa sig into IKEv2 Authentication Payload
| emitting length of IKEv2 Authentication Payload: 200
| empty esp_info, returning defaults
|    next-payload: ISAKMP_NEXT_v2SA [@34=0x21]
| *****emit IKEv2 Security Association Payload:
|    critical bit: none
| ******emit IKEv2 Proposal Substructure Payload:
|    prop #: 1
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  12 34 56 78
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 1
|    transform ID: 12
| ********emit IKEv2 Attribute Substructure Payload:
|    af+type: KEY_LENGTH
|    length/value: 128
|     [128 is 128??]
| emitting length of IKEv2 Transform Substructure Payload: 12
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 3
|    transform ID: 2
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 40
| ******emit IKEv2 Proposal Substructure Payload:
|    prop #: 2
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  12 34 56 78
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 1
|    transform ID: 12
| ********emit IKEv2 Attribute Substructure Payload:
|    af+type: KEY_LENGTH
|    length/value: 128
|     [128 is 128??]
| emitting length of IKEv2 Transform Substructure Payload: 12
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 3
|    transform ID: 1
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 40
| ******emit IKEv2 Proposal Substructure Payload:
|    prop #: 3
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  12 34 56 78
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 1
|    transform ID: 3
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 3
|    transform ID: 2
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 36
| ******emit IKEv2 Proposal Substructure Payload:
|    prop #: 4
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  12 34 56 78
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 1
|    transform ID: 3
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 3
|    transform ID: 1
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 36
| emitting length of IKEv2 Security Association Payload: 156
|    next-payload: ISAKMP_NEXT_v2TSi [@234=0x2c]
| *****emit IKEv2 Traffic Selector Payload:
|    critical bit: none
|    number of TS: 1
| ******emit IKEv2 Traffic Selector:
|    TS type: IKEv2_TS_IPV6_ADDR_RANGE
|    IP Protocol ID: 0
|    start port: 0
|    end port: 65535
| emitting 16 raw bytes of ipv6 low into IKEv2 Traffic Selector
| ipv6 low  fd 68 c9 f9  41 57 00 02  00 00 00 01  00 00 00 00
| emitting 16 raw bytes of ipv6 high into IKEv2 Traffic Selector
| ipv6 high  fd 68 c9 f9  41 57 00 02  00 00 00 01  ff ff ff ff
| emitting length of IKEv2 Traffic Selector: 40
| emitting length of IKEv2 Traffic Selector Payload: 48
|    next-payload: ISAKMP_NEXT_v2TSr [@390=0x2d]
| *****emit IKEv2 Traffic Selector Payload:
|    critical bit: none
|    number of TS: 1
| ******emit IKEv2 Traffic Selector:
|    TS type: IKEv2_TS_IPV6_ADDR_RANGE
|    IP Protocol ID: 0
|    start port: 0
|    end port: 65535
| emitting 16 raw bytes of ipv6 low into IKEv2 Traffic Selector
| ipv6 low  fd 68 c9 f9  41 57 00 00  00 00 00 00  00 00 00 00
| emitting 16 raw bytes of ipv6 high into IKEv2 Traffic Selector
| ipv6 high  fd 68 c9 f9  41 57 00 00  ff ff ff ff  ff ff ff ff
| emitting length of IKEv2 Traffic Selector: 40
| emitting length of IKEv2 Traffic Selector Payload: 48
| emitting 10 raw bytes of padding and length into cleartext
| padding and length  00 01 02 03  04 05 06 07  08 09
| emitting 12 zero bytes of length of truncated HMAC into IKEv2 Encryption Payload
| emitting length of IKEv2 Encryption Payload: 528
| emitting length of ISAKMP Message: 556
| encrypting as INITIATOR, parent SA #1
| data before encryption:
|   27 00 00 22  02 00 00 00  70 61 72 6b  65 72 30 31
|   2e 65 6d 6d  6a 61 79 2e  63 72 65 64  69 6c 2e 6f
|   72 67 21 00  00 c8 01 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 2c 00  00 9c 02 00
|   00 28 01 03  04 03 12 34  56 78 03 00  00 0c 01 00
|   00 0c 80 0e  00 80 03 00  00 08 03 00  00 02 00 00
|   00 08 05 00  00 00 02 00  00 28 02 03  04 03 12 34
|   56 78 03 00  00 0c 01 00  00 0c 80 0e  00 80 03 00
|   00 08 03 00  00 01 00 00  00 08 05 00  00 00 02 00
|   00 24 03 03  04 03 12 34  56 78 03 00  00 08 01 00
|   00 03 03 00  00 08 03 00  00 02 00 00  00 08 05 00
|   00 00 00 00  00 24 04 03  04 03 12 34  56 78 03 00
|   00 08 01 00  00 03 03 00  00 08 03 00  00 01 00 00
|   00 08 05 00  00 00 2d 00  00 30 01 00  00 00 08 00
|   00 28 00 00  ff ff fd 68  c9 f9 41 57  00 02 00 00
|   00 01 00 00  00 00 fd 68  c9 f9 41 57  00 02 00 00
|   00 01 ff ff  ff ff 00 00  00 30 01 00  00 00 08 00
|   00 28 00 00  ff ff fd 68  c9 f9 41 57  00 00 00 00
|   00 00 00 00  00 00 fd 68  c9 f9 41 57  00 00 ff ff
|   ff ff ff ff  ff ff 00 01  02 03 04 05  06 07 08 09
| data after encryption:
|   bc 35 37 b7  f3 29 8d 7f  0e 4a 2b b3  5d 29 2d b7
|   23 65 2e b5  89 be 6c b5  1e a6 e8 51  7b 82 bc 62
|   c6 2c 43 c6  ae 0f ec 1a  69 62 67 2e  9a c5 dd 37
|   12 23 a6 b7  de 53 97 61  34 05 0e 5c  b1 64 2c 98
|   e9 d9 a9 bc  39 23 84 2e  eb 15 07 fa  8b a9 6f 4c
|   b8 09 d0 ed  bd bb b3 10  5e f9 cb 1b  08 8c c3 e9
|   ae 83 3a 41  c5 c6 42 f7  a3 83 87 36  cf 53 1e b7
|   ef b6 46 fa  21 e6 56 f8  e0 02 03 41  6e d4 a5 c9
|   5f 0a 07 28  a3 c7 0d 34  05 18 a5 e0  92 10 8d 6a
|   20 0f c5 6a  9b f5 29 20  2a 3c 87 bd  49 8e 01 43
|   4b 41 ce 20  55 e2 26 20  0f f8 4b bf  ee 30 b4 ad
|   7f a3 bb dd  2e 12 6d 54  e8 2c 81 44  e5 da cd 62
|   59 f9 9f 21  d9 42 aa 59  c9 28 ef 49  86 a7 ab e1
|   32 06 d3 28  5d ad 51 24  8a da 15 fc  e9 31 7c f7
|   52 db a6 a5  11 8a c7 1e  53 02 e5 29  3b 74 e4 59
|   60 16 3a 64  dd 54 cf 5f  0d 57 1c 1c  5e ef ab 90
|   46 69 5e 24  e9 1d f5 eb  de 89 18 38  7e e1 1d 68
|   75 fb 84 4b  f6 c9 75 1f  c5 85 e6 e8  17 65 80 5e
|   58 be 1c a8  f7 4e e7 df  7f 2a e5 81  2a d9 d4 f2
|   09 45 fc da  44 c4 53 5a  a7 ae af 10  c3 59 ea c6
|   5e 39 03 96  53 27 fe 52  df 7d f9 97  a4 2b 43 0a
|   29 fb 70 71  eb 47 b4 ab  0c 68 cf af  e4 f7 f6 be
|   27 b5 7e 30  d6 95 98 25  4a 07 1c 45  70 14 98 83
|   ab c8 29 7b  fd 86 44 b4  bc 4e a2 ef  96 16 7c 37
|   ef 8a d3 e6  07 41 a1 a3  9e 27 e4 65  ed 05 09 f0
|   4c fc 78 b3  3a fb da 6a  43 b1 70 87  a4 94 3c d4
|   87 76 c4 9a  28 16 4d a0  42 c6 55 0a  e6 75 df 23
|   b6 a1 4e b7  6b 3c 35 54  09 20 48 e3  25 5d 31 d3
|   04 07 84 ff  70 d1 8f 1b  14 83 0d 09  14 e1 a2 60
|   ee 9b 99 56  10 11 d4 62  ec 13 7c c8  ff 25 00 be
|   d3 11 ff 52  18 90 c1 47  e3 6c 1d 54  b6 13 e8 b7
| data being hmac:  80 01 02 03  04 05 06 07  de bc 58 3a  8f 40 d0 cf
|   2e 20 23 08  00 00 00 01  00 00 02 2c  23 00 02 10
|   80 01 02 03  04 05 06 07  08 09 0a 0b  0c 0d 0e 0f
|   bc 35 37 b7  f3 29 8d 7f  0e 4a 2b b3  5d 29 2d b7
|   23 65 2e b5  89 be 6c b5  1e a6 e8 51  7b 82 bc 62
|   c6 2c 43 c6  ae 0f ec 1a  69 62 67 2e  9a c5 dd 37
|   12 23 a6 b7  de 53 97 61  34 05 0e 5c  b1 64 2c 98
|   e9 d9 a9 bc  39 23 84 2e  eb 15 07 fa  8b a9 6f 4c
|   b8 09 d0 ed  bd bb b3 10  5e f9 cb 1b  08 8c c3 e9
|   ae 83 3a 41  c5 c6 42 f7  a3 83 87 36  cf 53 1e b7
|   ef b6 46 fa  21 e6 56 f8  e0 02 03 41  6e d4 a5 c9
|   5f 0a 07 28  a3 c7 0d 34  05 18 a5 e0  92 10 8d 6a
|   20 0f c5 6a  9b f5 29 20  2a 3c 87 bd  49 8e 01 43
|   4b 41 ce 20  55 e2 26 20  0f f8 4b bf  ee 30 b4 ad
|   7f a3 bb dd  2e 12 6d 54  e8 2c 81 44  e5 da cd 62
|   59 f9 9f 21  d9 42 aa 59  c9 28 ef 49  86 a7 ab e1
|   32 06 d3 28  5d ad 51 24  8a da 15 fc  e9 31 7c f7
|   52 db a6 a5  11 8a c7 1e  53 02 e5 29  3b 74 e4 59
|   60 16 3a 64  dd 54 cf 5f  0d 57 1c 1c  5e ef ab 90
|   46 69 5e 24  e9 1d f5 eb  de 89 18 38  7e e1 1d 68
|   75 fb 84 4b  f6 c9 75 1f  c5 85 e6 e8  17 65 80 5e
|   58 be 1c a8  f7 4e e7 df  7f 2a e5 81  2a d9 d4 f2
|   09 45 fc da  44 c4 53 5a  a7 ae af 10  c3 59 ea c6
|   5e 39 03 96  53 27 fe 52  df 7d f9 97  a4 2b 43 0a
|   29 fb 70 71  eb 47 b4 ab  0c 68 cf af  e4 f7 f6 be
|   27 b5 7e 30  d6 95 98 25  4a 07 1c 45  70 14 98 83
|   ab c8 29 7b  fd 86 44 b4  bc 4e a2 ef  96 16 7c 37
|   ef 8a d3 e6  07 41 a1 a3  9e 27 e4 65  ed 05 09 f0
|   4c fc 78 b3  3a fb da 6a  43 b1 70 87  a4 94 3c d4
|   87 76 c4 9a  28 16 4d a0  42 c6 55 0a  e6 75 df 23
|   b6 a1 4e b7  6b 3c 35 54  09 20 48 e3  25 5d 31 d3
|   04 07 84 ff  70 d1 8f 1b  14 83 0d 09  14 e1 a2 60
|   ee 9b 99 56  10 11 d4 62  ec 13 7c c8  ff 25 00 be
|   d3 11 ff 52  18 90 c1 47  e3 6c 1d 54  b6 13 e8 b7
| out calculated auth:
|   30 a6 4f 50  60 8d ac 6d  e3 5c 72 84
| #2 complete v2 state transition with STF_OK
./rekey-no-reply-I1 transition from state STATE_PARENT_I1 to state STATE_PARENT_I2
| v2_state_transition: st is #2; pst is #1; transition_st is #1
./rekey-no-reply-I1 STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 oursig=fakesig1 theirsig= cipher=aes_128 integ=sha1_96 prf=oakley_sha group=modp2048} (msgid: 00000000/4294967295)
| sending reply packet to 132.213.238.7:500 (from port 500)
sending 556 bytes for STATE_PARENT_I1 through eth0:500 [192.168.1.1:500] to 132.213.238.7:500 (using #2)
|   80 01 02 03  04 05 06 07  de bc 58 3a  8f 40 d0 cf
|   2e 20 23 08  00 00 00 01  00 00 02 2c  23 00 02 10
|   80 01 02 03  04 05 06 07  08 09 0a 0b  0c 0d 0e 0f
|   bc 35 37 b7  f3 29 8d 7f  0e 4a 2b b3  5d 29 2d b7
|   23 65 2e b5  89 be 6c b5  1e a6 e8 51  7b 82 bc 62
|   c6 2c 43 c6  ae 0f ec 1a  69 62 67 2e  9a c5 dd 37
|   12 23 a6 b7  de 53 97 61  34 05 0e 5c  b1 64 2c 98
|   e9 d9 a9 bc  39 23 84 2e  eb 15 07 fa  8b a9 6f 4c
|   b8 09 d0 ed  bd bb b3 10  5e f9 cb 1b  08 8c c3 e9
|   ae 83 3a 41  c5 c6 42 f7  a3 83 87 36  cf 53 1e b7
|   ef b6 46 fa  21 e6 56 f8  e0 02 03 41  6e d4 a5 c9
|   5f 0a 07 28  a3 c7 0d 34  05 18 a5 e0  92 10 8d 6a
|   20 0f c5 6a  9b f5 29 20  2a 3c 87 bd  49 8e 01 43
|   4b 41 ce 20  55 e2 26 20  0f f8 4b bf  ee 30 b4 ad
|   7f a3 bb dd  2e 12 6d 54  e8 2c 81 44  e5 da cd 62
|   59 f9 9f 21  d9 42 aa 59  c9 28 ef 49  86 a7 ab e1
|   32 06 d3 28  5d ad 51 24  8a da 15 fc  e9 31 7c f7
|   52 db a6 a5  11 8a c7 1e  53 02 e5 29  3b 74 e4 59
|   60 16 3a 64  dd 54 cf 5f  0d 57 1c 1c  5e ef ab 90
|   46 69 5e 24  e9 1d f5 eb  de 89 18 38  7e e1 1d 68
|   75 fb 84 4b  f6 c9 75 1f  c5 85 e6 e8  17 65 80 5e
|   58 be 1c a8  f7 4e e7 df  7f 2a e5 81  2a d9 d4 f2
|   09 45 fc da  44 c4 53 5a  a7 ae af 10  c3 59 ea c6
|   5e 39 03 96  53 27 fe 52  df 7d f9 97  a4 2b 43 0a
|   29 fb 70 71  eb 47 b4 ab  0c 68 cf af  e4 f7 f6 be
|   27 b5 7e 30  d6 95 98 25  4a 07 1c 45  70 14 98 83
|   ab c8 29 7b  fd 86 44 b4  bc 4e a2 ef  96 16 7c 37
|   ef 8a d3 e6  07 41 a1 a3  9e 27 e4 65  ed 05 09 f0
|   4c fc 78 b3  3a fb da 6a  43 b1 70 87  a4 94 3c d4
|   87 76 c4 9a  28 16 4d a0  42 c6 55 0a  e6 75 df 23
|   b6 a1 4e b7  6b 3c 35 54  09 20 48 e3  25 5d 31 d3
|   04 07 84 ff  70 d1 8f 1b  14 83 0d 09  14 e1 a2 60
|   ee 9b 99 56  10 11 d4 62  ec 13 7c c8  ff 25 00 be
|   d3 11 ff 52  18 90 c1 47  e3 6c 1d 54  b6 13 e8 b7
|   30 a6 4f 50  60 8d ac 6d  e3 5c 72 84
1: output to /dev/null
1: input from ../lp13-parentI3/parentR2.pcap
|   =========== input from pcap file ../lp13-parentI3/parentR2.pcap ========
| *received 444 bytes from 132.213.238.7:500 on eth0 (port=500)
|   80 01 02 03  04 05 06 07  de bc 58 3a  8f 40 d0 cf
|   2e 20 23 20  00 00 00 01  00 00 01 bc  24 00 01 a0
|   80 01 02 03  04 05 06 07  08 09 0a 0b  0c 0d 0e 0f
|   eb ff 97 78  70 72 7e b3  64 db c7 fe  e4 69 0f 92
|   2a dd bb d8  41 fc d0 3e  5c 5a 07 57  fd e7 7d 8a
|   c1 fc 19 db  f7 a0 0a 58  95 e0 43 74  1f 5e e0 33
|   f2 06 29 c9  8d 3e 52 00  37 22 20 6c  47 af 94 1c
|   6a 93 b3 97  1f ff 5c 1b  70 b3 48 6a  c7 5f 27 b3
|   e4 bf e1 17  0e 15 c1 47  77 7b 53 88  6c 4a cb 12
|   d0 82 94 13  cf 66 cc 4c  d8 b2 8e c1  39 07 b9 a5
|   12 f6 e0 69  cb ad 11 c1  e9 58 33 21  a8 bb a9 ec
|   40 9e ba 01  5c 8d e8 04  ac b9 22 b2  c6 ce c8 a9
|   79 a2 02 52  da d8 f7 41  ae 9c 82 85  5f f2 f5 a3
|   3f f7 09 de  d6 e7 31 43  51 69 8f 8d  fa 0b 41 e6
|   d8 07 00 68  9e b7 92 3d  47 93 37 e6  14 e0 48 0d
|   bb 1d 13 08  66 5d 87 c4  86 8a 38 f3  05 57 97 5c
|   e1 dc 5c ac  36 b4 e1 93  68 57 da 98  6c 69 99 c3
|   2a b8 60 09  8f 1f d2 d0  27 0b e5 b8  bf 6b e2 83
|   5d af f9 88  7c 09 47 32  c7 c7 72 61  b0 29 20 0b
|   a1 79 22 95  8b 5f 46 ab  30 48 6c 4f  21 93 99 84
|   14 f4 c8 bc  fa 9b cf 92  69 69 86 55  7b 4e c6 b3
|   bb 68 e6 d1  3b ed 7c 9e  1c 96 d1 cc  e2 ec cb c2
|   e2 fc d5 60  ce 12 9f 9f  0e 65 a0 54  fb 44 4d 33
|   2d 5c 31 47  f5 95 a8 ca  70 81 d2 ee  9f 04 9b 9b
|   5a 3c 92 93  70 80 1e 90  1c d5 c4 5b  79 be 96 94
|   fe 3e e9 26  40 48 ae 09  00 c4 47 35  2e b1 6c c4
|   a0 ef fd 33  7a 65 05 55  d1 ff c0 9a  b0 a2 7f fb
|   2f e8 96 e0  25 30 6d 60  47 f4 91 cc
|  processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35), msgid: 00000001
| I am IKE SA Initiator
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  de bc 58 3a  8f 40 d0 cf
| state hash entry 28
| v2 peer, cookies and msgid match on #2
| v2 state object #2 found, in STATE_CHILD_C0_KEYING
| state found and its state is:STATE_CHILD_C0_KEYING msgid: 00001
| considering state entry: 0
|   reject: in state: STATE_CHILD_C0_KEYING, needs STATE_PARENT_I1
| considering state entry: 1
|   reject: in state: STATE_CHILD_C0_KEYING, needs STATE_PARENT_I1
| considering state entry: 2
| now proceed with state specific processing using state #2 initiator-auth-process
| ikev2 parent inR2: calculating g^{xy} in order to decrypt I2
| decrypting as INITIATOR, using RESPONDER keys
./rekey-no-reply-I1 IKEv2 mode peer ID is ID_FQDN: '@jamesjohnson.emmjay.credil.org'
| ikev2 verify required CA is '%any'
| checking alg=1 == 1, keyid=@parker01.emmjay.credil.org same_id=1
| key issuer CA is '%any'
|  checking narrowing - responding to R2
| checking TSi(1)/TSr(1) selectors, looking for exact match
|   ikev2_evaluate_connection_fit evaluating our I=parker1--jj2:fd68:c9f9:4157:2:0:1::/96:0/0 R=fd68:c9f9:4157::/64:0/0  to their:
|     tsi[0]=fd68:c9f9:4157:2:0:1::/fd68:c9f9:4157:2:0:1:ffff:ffff proto=0 portrange 0-65535, tsr[0]=fd68:c9f9:4157::/fd68:c9f9:4157:0:ffff:ffff:ffff:ffff proto=0 portrange 0-65535
| ei->port 0  tsi[tsi_ni].startport 0  tsi[tsi_ni].endport 65535
|       has ts_range1=32 maskbits1=96 ts_range2=64 maskbits2=64 fitbits=32896 <> -1
|  prefix fitness found a better match c parker1--jj2
|     evaluate_connection_port_fit tsi_n[1], best=-1
|    tsi[0] 0-65535: exact port match with 0.  fitness 65536
|       evaluating_connection_port_fit tsi_n[0], range_i=65536 best=-1
|    tsr[0] 0-65535: exact port match with 0.  fitness 65536
|       evaluating_connection_port_fit tsi_n[0] tsr_n[0], range=65536/65536 best=-1
|     best ports fit so far: tsi[0] fitrange_i 65536, tsr[0] fitrange_r 65536, matchiness 131072
|     port_fitness 131072
|   port fitness found better match c parker1--jj2, tsi[0],tsr[0]
| protocol 0 and tsi[0].ipprotoid 0: exact match
| protocol 0 and tsr[0].ipprotoid 0: exact match
|     best protocol fit so far: tsi[0] fitrange_i 255, tsr[0] fitrange_r 255, matchiness 510
|     protocol_fitness 510
|    protocol fitness found better match c parker1--jj2, tsi[0],tsr[0]
| found an acceptable TSi/TSr Traffic Selector
| printing contents struct traffic_selector
|   ts_type: IKEv2_TS_IPV6_ADDR_RANGE
|   ipprotoid: 0
|   startport: 0
|   endport: 65535
|   ip low: fd68:c9f9:4157:2:0:1::
|   ip high: fd68:c9f9:4157:2:0:1:ffff:ffff
| printing contents struct traffic_selector
|   ts_type: IKEv2_TS_IPV6_ADDR_RANGE
|   ipprotoid: 0
|   startport: 0
|   endport: 65535
|   ip low: fd68:c9f9:4157::
|   ip high: fd68:c9f9:4157:0:ffff:ffff:ffff:ffff
| empty esp_info, returning defaults
| processor 'initiator-auth-process' returned STF_OK (3)
| #2 complete v2 state transition with STF_OK
./rekey-no-reply-I1 transition from state STATE_CHILD_C0_KEYING to state STATE_CHILD_C1_KEYED
| v2_state_transition: st is #2; pst is #0; transition_st is #0
./rekey-no-reply-I1 STATE_CHILD_C1_KEYED: CHILD SA established (msgid: 00000001/4294967295)
./rekey-no-reply-I1 negotiated tunnel [fd68:c9f9:4157:2:0:1::,fd68:c9f9:4157:2:0:1:ffff:ffff proto:0 port:0-65535] -> [fd68:c9f9:4157::,fd68:c9f9:4157:0:ffff:ffff:ffff:ffff proto:0 port:0-65535]
./rekey-no-reply-I1 STATE_CHILD_C1_KEYED: CHILD SA established tunnel mode {ESP=>0x12345678 <0x12345678 xfrm=AES_128-HMAC_SHA1 NATOA=none NATD=none DPD=none}
| releasing whack for #X (sock=Y)
| releasing whack for #X (sock=Y)



now pretend (1) that the keylife timer is up, and rekey the connection
RC=0 #2: "parker1--jj2":500 IKEv2.0 STATE_CHILD_C1_KEYED (CHILD SA established); none in -1s; newest IPSEC; nodpd; msgid=1; idle; import:admin initiate
RC=0 #1: "parker1--jj2":500 IKEv2.0 STATE_PARENT_I3 (PARENT SA established); none in -1s; newest ISAKMP; nodpd; retranscnt=0,outorder=0,last=1,next=2,recv=-1; msgid=0; idle; import:admin initiate
| duplicating state object #1
| creating state object #3 at Z
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  de bc 58 3a  8f 40 d0 cf
| state hash entry 28
| inserting state object #3 bucket: 28
| ikev2 child outC1: calculating g^{xy}, sending C1
./rekey-no-reply-I1 starting rekey of CHILD SA for state=#2 (expired) using PARENT SA #1 as INITIATOR
| **emit ISAKMP Message:
|    initiator cookie:
|   80 01 02 03  04 05 06 07
|    responder cookie:
|   de bc 58 3a  8f 40 d0 cf
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996)
|    exchange type: ISAKMP_v2_CHILD_SA
|    flags: ISAKMP_FLAG_ENCRYPTION+ISAKMP_FLAG_INIT
|    message ID:  00 00 00 02
|    next-payload: ISAKMP_NEXT_v2E [@16=0x2e]
| ***emit IKEv2 Encryption Payload:
|    critical bit: none
| emitting 16 zero bytes of iv into IKEv2 Encryption Payload
|    next-payload: ISAKMP_NEXT_v2KE [@-20=0x22]
| *****emit IKEv2 Key Exchange Payload:
|    critical bit: none
|    transform type: 14
| emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload
| ikev2 g^x  3d a6 6a 81  e2 92 09 be  18 4f a0 1e  5c ed ea 7c
|   7d 7b 3a 21  3e 15 0d 53  5d 17 6a be  1b c5 70 ab
|   34 47 bc 09  14 7c aa 91  9c 8f 81 dc  1e f9 87 cd
|   6a ec fa f3  a5 9e 37 bc  ac 3d fd e1  32 8e e8 b3
|   fe d3 8b f4  7b 50 34 13  33 7a 93 ea  e9 3c 0e 8b
|   bd 48 18 9c  9e 03 70 f2  55 ce 45 22  9f c7 c9 48
|   43 a3 e2 64  b5 5d 43 38  c8 fe f1 d3  06 43 f0 0a
|   e8 6d 61 8c  60 78 d9 98  d3 1b 3b 5e  f5 a6 e8 2f
|   ef 56 ac b4  33 bd 1e 62  b2 3e 0b 17  af 6c b8 31
|   08 d7 19 5a  7b c4 54 c2  13 47 98 c2  cc d2 16 29
|   75 6c 03 fb  1e 9c 9d 21  0c a1 e6 c2  f3 f2 49 2c
|   f6 06 73 c1  96 1e ce 58  81 01 1c cb  16 dc f9 fc
|   c7 93 08 75  58 16 57 71  69 96 66 b7  a9 81 7f f7
|   37 4d 7c 41  38 62 a6 39  00 81 ca 3d  1d fc f7 b5
|   08 38 d4 34  70 22 6c 21  d2 5b 20 a1  d2 ba 2a d1
|   89 f3 20 79  ce ac 1e c2  ec 7d ae 76  94 40 39 a0
| emitting length of IKEv2 Key Exchange Payload: 264
|    next-payload: ISAKMP_NEXT_v2Ni [@0=0x28]
| *****emit IKEv2 Nonce Payload:
|    critical bit: none
| emitting 16 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload
| IKEv2 nonce  20 98 9d 37  a8 14 a6 4d  8f f0 7c 08  d3 20 e9 e3
| emitting length of IKEv2 Nonce Payload: 20
| empty esp_info, returning defaults
|    next-payload: ISAKMP_NEXT_v2SA [@264=0x21]
| *****emit IKEv2 Security Association Payload:
|    critical bit: none
| ******emit IKEv2 Proposal Substructure Payload:
|    prop #: 1
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  34 56 78 12
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 1
|    transform ID: 12
| ********emit IKEv2 Attribute Substructure Payload:
|    af+type: KEY_LENGTH
|    length/value: 128
|     [128 is 128??]
| emitting length of IKEv2 Transform Substructure Payload: 12
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 3
|    transform ID: 2
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 40
| ******emit IKEv2 Proposal Substructure Payload:
|    prop #: 2
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  34 56 78 12
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 1
|    transform ID: 12
| ********emit IKEv2 Attribute Substructure Payload:
|    af+type: KEY_LENGTH
|    length/value: 128
|     [128 is 128??]
| emitting length of IKEv2 Transform Substructure Payload: 12
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 3
|    transform ID: 1
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 40
| ******emit IKEv2 Proposal Substructure Payload:
|    prop #: 3
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  34 56 78 12
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 1
|    transform ID: 3
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 3
|    transform ID: 2
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 36
| ******emit IKEv2 Proposal Substructure Payload:
|    prop #: 4
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  34 56 78 12
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 1
|    transform ID: 3
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 3
|    transform ID: 1
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 36
| emitting length of IKEv2 Security Association Payload: 156
|    next-payload: ISAKMP_NEXT_v2TSi [@284=0x2c]
| *****emit IKEv2 Traffic Selector Payload:
|    critical bit: none
|    number of TS: 1
| ******emit IKEv2 Traffic Selector:
|    TS type: IKEv2_TS_IPV6_ADDR_RANGE
|    IP Protocol ID: 0
|    start port: 0
|    end port: 65535
| emitting 16 raw bytes of ipv6 low into IKEv2 Traffic Selector
| ipv6 low  fd 68 c9 f9  41 57 00 02  00 00 00 01  00 00 00 00
| emitting 16 raw bytes of ipv6 high into IKEv2 Traffic Selector
| ipv6 high  fd 68 c9 f9  41 57 00 02  00 00 00 01  ff ff ff ff
| emitting length of IKEv2 Traffic Selector: 40
| emitting length of IKEv2 Traffic Selector Payload: 48
|    next-payload: ISAKMP_NEXT_v2TSr [@440=0x2d]
| *****emit IKEv2 Traffic Selector Payload:
|    critical bit: none
|    number of TS: 1
| ******emit IKEv2 Traffic Selector:
|    TS type: IKEv2_TS_IPV6_ADDR_RANGE
|    IP Protocol ID: 0
|    start port: 0
|    end port: 65535
| emitting 16 raw bytes of ipv6 low into IKEv2 Traffic Selector
| ipv6 low  fd 68 c9 f9  41 57 00 00  00 00 00 00  00 00 00 00
| emitting 16 raw bytes of ipv6 high into IKEv2 Traffic Selector
| ipv6 high  fd 68 c9 f9  41 57 00 00  ff ff ff ff  ff ff ff ff
| emitting length of IKEv2 Traffic Selector: 40
| emitting length of IKEv2 Traffic Selector Payload: 48
| emitting 8 raw bytes of padding and length into cleartext
| padding and length  00 01 02 03  04 05 06 07
| emitting 12 zero bytes of length of truncated HMAC into IKEv2 Encryption Payload
| emitting length of IKEv2 Encryption Payload: 576
| emitting length of ISAKMP Message: 604
| encrypting as INITIATOR, parent SA #1
| data before encryption:
|   28 00 01 08  00 0e 00 00  3d a6 6a 81  e2 92 09 be
|   18 4f a0 1e  5c ed ea 7c  7d 7b 3a 21  3e 15 0d 53
|   5d 17 6a be  1b c5 70 ab  34 47 bc 09  14 7c aa 91
|   9c 8f 81 dc  1e f9 87 cd  6a ec fa f3  a5 9e 37 bc
|   ac 3d fd e1  32 8e e8 b3  fe d3 8b f4  7b 50 34 13
|   33 7a 93 ea  e9 3c 0e 8b  bd 48 18 9c  9e 03 70 f2
|   55 ce 45 22  9f c7 c9 48  43 a3 e2 64  b5 5d 43 38
|   c8 fe f1 d3  06 43 f0 0a  e8 6d 61 8c  60 78 d9 98
|   d3 1b 3b 5e  f5 a6 e8 2f  ef 56 ac b4  33 bd 1e 62
|   b2 3e 0b 17  af 6c b8 31  08 d7 19 5a  7b c4 54 c2
|   13 47 98 c2  cc d2 16 29  75 6c 03 fb  1e 9c 9d 21
|   0c a1 e6 c2  f3 f2 49 2c  f6 06 73 c1  96 1e ce 58
|   81 01 1c cb  16 dc f9 fc  c7 93 08 75  58 16 57 71
|   69 96 66 b7  a9 81 7f f7  37 4d 7c 41  38 62 a6 39
|   00 81 ca 3d  1d fc f7 b5  08 38 d4 34  70 22 6c 21
|   d2 5b 20 a1  d2 ba 2a d1  89 f3 20 79  ce ac 1e c2
|   ec 7d ae 76  94 40 39 a0  21 00 00 14  20 98 9d 37
|   a8 14 a6 4d  8f f0 7c 08  d3 20 e9 e3  2c 00 00 9c
|   02 00 00 28  01 03 04 03  34 56 78 12  03 00 00 0c
|   01 00 00 0c  80 0e 00 80  03 00 00 08  03 00 00 02
|   00 00 00 08  05 00 00 00  02 00 00 28  02 03 04 03
|   34 56 78 12  03 00 00 0c  01 00 00 0c  80 0e 00 80
|   03 00 00 08  03 00 00 01  00 00 00 08  05 00 00 00
|   02 00 00 24  03 03 04 03  34 56 78 12  03 00 00 08
|   01 00 00 03  03 00 00 08  03 00 00 02  00 00 00 08
|   05 00 00 00  00 00 00 24  04 03 04 03  34 56 78 12
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 01
|   00 00 00 08  05 00 00 00  2d 00 00 30  01 00 00 00
|   08 00 00 28  00 00 ff ff  fd 68 c9 f9  41 57 00 02
|   00 00 00 01  00 00 00 00  fd 68 c9 f9  41 57 00 02
|   00 00 00 01  ff ff ff ff  00 00 00 30  01 00 00 00
|   08 00 00 28  00 00 ff ff  fd 68 c9 f9  41 57 00 00
|   00 00 00 00  00 00 00 00  fd 68 c9 f9  41 57 00 00
|   ff ff ff ff  ff ff ff ff  00 01 02 03  04 05 06 07
| data after encryption:
|   73 8a 8f 42  ea 98 37 99  13 4b bb 29  ba 1d e2 de
|   2b 85 7a cc  55 e8 fc 4a  3f b2 be 15  1b fc a1 28
|   59 c7 83 3d  1d 3e 87 02  ce d7 61 79  4b 8d 4b c4
|   ff 36 93 7c  92 37 83 fc  5f 16 c2 35  0f 66 12 e2
|   ea 2b 36 dd  d4 8b 0c 3f  c6 f0 0d ac  ba 49 32 cb
|   e0 62 70 92  3b 70 79 bd  44 e6 29 ce  82 2a d6 3c
|   5e 73 62 3f  f7 0e 3e f6  90 67 13 19  70 22 b3 e5
|   da 1b d8 43  aa c4 78 d1  52 37 87 29  cc 15 58 bd
|   83 57 0c 0c  95 9f a0 ba  f2 81 6b 11  f9 4d 29 4f
|   76 df 64 86  21 6a ae 93  ff 31 af 1d  6a 4b b1 2e
|   41 b1 46 99  59 f4 1b ed  e7 65 2f 0d  2b 35 84 62
|   83 be 60 80  94 78 b1 77  6d dc fb 94  27 75 59 5a
|   e6 f1 e8 b0  9a 89 f4 b7  0a 23 17 1c  43 91 f0 6c
|   d7 5e 40 b8  2a 3c 54 57  c3 84 b3 25  28 12 d4 5c
|   53 c3 18 44  21 6b de 28  1d bb b7 23  af 5b 51 05
|   e0 7c 61 26  3a 4a 03 d4  33 57 d8 be  04 05 89 7f
|   09 55 3d 38  5b fb bd 22  b8 40 86 73  97 0b f8 98
|   85 6f 8a c2  fa fc 31 50  00 0d 13 88  66 c9 47 23
|   11 68 7e b2  76 53 5f 4d  47 e0 a0 a4  98 21 b9 88
|   07 f2 dc 02  81 ac 93 92  3a 5c 53 91  03 ac a5 9b
|   e1 5c d6 aa  a3 92 3f 0e  33 21 08 d8  c0 d8 ca d4
|   c8 28 80 99  e5 1a 56 31  3c f8 60 66  9f 8a 8a 19
|   d6 2f 9e 6e  3f f9 4f 01  71 3f de b8  ae 3c 0f 62
|   29 bd c1 84  66 03 43 be  cf 73 6b 70  14 05 ae c7
|   0f a1 d7 f2  f2 98 06 18  e3 38 62 f4  a7 a1 51 d0
|   df 8f f9 b0  24 31 3c fb  50 7c 72 fb  9e e0 c8 8d
|   1b 42 a2 ff  91 71 5c f8  09 59 05 ff  c9 9e 05 56
|   33 29 92 ac  a3 5f ae 07  4b a3 1b 88  47 0e 83 67
|   1d 74 be 28  fb 01 b9 cb  8d ab 8e 56  eb 1d 02 0a
|   09 90 09 09  f5 b5 05 c0  46 e0 9b bf  cb 04 8b e1
|   54 98 74 7d  35 12 fd ce  6a 05 75 97  ad 60 e4 a7
|   6f 97 03 a1  3f 3e 62 72  54 b6 7a 78  85 a7 3d 47
|   36 bf 90 fe  39 a7 8b 65  a5 fe 53 5e  ad 4a a3 99
|   6c 5f f9 e1  f2 06 d9 bc  65 33 0c 10  94 3d b2 50
| data being hmac:  80 01 02 03  04 05 06 07  de bc 58 3a  8f 40 d0 cf
|   2e 20 24 09  00 00 00 02  00 00 02 5c  22 00 02 40
|   80 01 02 03  04 05 06 07  08 09 0a 0b  0c 0d 0e 0f
|   73 8a 8f 42  ea 98 37 99  13 4b bb 29  ba 1d e2 de
|   2b 85 7a cc  55 e8 fc 4a  3f b2 be 15  1b fc a1 28
|   59 c7 83 3d  1d 3e 87 02  ce d7 61 79  4b 8d 4b c4
|   ff 36 93 7c  92 37 83 fc  5f 16 c2 35  0f 66 12 e2
|   ea 2b 36 dd  d4 8b 0c 3f  c6 f0 0d ac  ba 49 32 cb
|   e0 62 70 92  3b 70 79 bd  44 e6 29 ce  82 2a d6 3c
|   5e 73 62 3f  f7 0e 3e f6  90 67 13 19  70 22 b3 e5
|   da 1b d8 43  aa c4 78 d1  52 37 87 29  cc 15 58 bd
|   83 57 0c 0c  95 9f a0 ba  f2 81 6b 11  f9 4d 29 4f
|   76 df 64 86  21 6a ae 93  ff 31 af 1d  6a 4b b1 2e
|   41 b1 46 99  59 f4 1b ed  e7 65 2f 0d  2b 35 84 62
|   83 be 60 80  94 78 b1 77  6d dc fb 94  27 75 59 5a
|   e6 f1 e8 b0  9a 89 f4 b7  0a 23 17 1c  43 91 f0 6c
|   d7 5e 40 b8  2a 3c 54 57  c3 84 b3 25  28 12 d4 5c
|   53 c3 18 44  21 6b de 28  1d bb b7 23  af 5b 51 05
|   e0 7c 61 26  3a 4a 03 d4  33 57 d8 be  04 05 89 7f
|   09 55 3d 38  5b fb bd 22  b8 40 86 73  97 0b f8 98
|   85 6f 8a c2  fa fc 31 50  00 0d 13 88  66 c9 47 23
|   11 68 7e b2  76 53 5f 4d  47 e0 a0 a4  98 21 b9 88
|   07 f2 dc 02  81 ac 93 92  3a 5c 53 91  03 ac a5 9b
|   e1 5c d6 aa  a3 92 3f 0e  33 21 08 d8  c0 d8 ca d4
|   c8 28 80 99  e5 1a 56 31  3c f8 60 66  9f 8a 8a 19
|   d6 2f 9e 6e  3f f9 4f 01  71 3f de b8  ae 3c 0f 62
|   29 bd c1 84  66 03 43 be  cf 73 6b 70  14 05 ae c7
|   0f a1 d7 f2  f2 98 06 18  e3 38 62 f4  a7 a1 51 d0
|   df 8f f9 b0  24 31 3c fb  50 7c 72 fb  9e e0 c8 8d
|   1b 42 a2 ff  91 71 5c f8  09 59 05 ff  c9 9e 05 56
|   33 29 92 ac  a3 5f ae 07  4b a3 1b 88  47 0e 83 67
|   1d 74 be 28  fb 01 b9 cb  8d ab 8e 56  eb 1d 02 0a
|   09 90 09 09  f5 b5 05 c0  46 e0 9b bf  cb 04 8b e1
|   54 98 74 7d  35 12 fd ce  6a 05 75 97  ad 60 e4 a7
|   6f 97 03 a1  3f 3e 62 72  54 b6 7a 78  85 a7 3d 47
|   36 bf 90 fe  39 a7 8b 65  a5 fe 53 5e  ad 4a a3 99
|   6c 5f f9 e1  f2 06 d9 bc  65 33 0c 10  94 3d b2 50
| out calculated auth:
|   46 a9 39 bb  76 03 01 5b  69 c4 7f 6e
sending 604 bytes for ikev2child_outC1_tail through eth0:500 [192.168.1.1:500] to 132.213.238.7:500 (using #3)
|   80 01 02 03  04 05 06 07  de bc 58 3a  8f 40 d0 cf
|   2e 20 24 09  00 00 00 02  00 00 02 5c  22 00 02 40
|   80 01 02 03  04 05 06 07  08 09 0a 0b  0c 0d 0e 0f
|   73 8a 8f 42  ea 98 37 99  13 4b bb 29  ba 1d e2 de
|   2b 85 7a cc  55 e8 fc 4a  3f b2 be 15  1b fc a1 28
|   59 c7 83 3d  1d 3e 87 02  ce d7 61 79  4b 8d 4b c4
|   ff 36 93 7c  92 37 83 fc  5f 16 c2 35  0f 66 12 e2
|   ea 2b 36 dd  d4 8b 0c 3f  c6 f0 0d ac  ba 49 32 cb
|   e0 62 70 92  3b 70 79 bd  44 e6 29 ce  82 2a d6 3c
|   5e 73 62 3f  f7 0e 3e f6  90 67 13 19  70 22 b3 e5
|   da 1b d8 43  aa c4 78 d1  52 37 87 29  cc 15 58 bd
|   83 57 0c 0c  95 9f a0 ba  f2 81 6b 11  f9 4d 29 4f
|   76 df 64 86  21 6a ae 93  ff 31 af 1d  6a 4b b1 2e
|   41 b1 46 99  59 f4 1b ed  e7 65 2f 0d  2b 35 84 62
|   83 be 60 80  94 78 b1 77  6d dc fb 94  27 75 59 5a
|   e6 f1 e8 b0  9a 89 f4 b7  0a 23 17 1c  43 91 f0 6c
|   d7 5e 40 b8  2a 3c 54 57  c3 84 b3 25  28 12 d4 5c
|   53 c3 18 44  21 6b de 28  1d bb b7 23  af 5b 51 05
|   e0 7c 61 26  3a 4a 03 d4  33 57 d8 be  04 05 89 7f
|   09 55 3d 38  5b fb bd 22  b8 40 86 73  97 0b f8 98
|   85 6f 8a c2  fa fc 31 50  00 0d 13 88  66 c9 47 23
|   11 68 7e b2  76 53 5f 4d  47 e0 a0 a4  98 21 b9 88
|   07 f2 dc 02  81 ac 93 92  3a 5c 53 91  03 ac a5 9b
|   e1 5c d6 aa  a3 92 3f 0e  33 21 08 d8  c0 d8 ca d4
|   c8 28 80 99  e5 1a 56 31  3c f8 60 66  9f 8a 8a 19
|   d6 2f 9e 6e  3f f9 4f 01  71 3f de b8  ae 3c 0f 62
|   29 bd c1 84  66 03 43 be  cf 73 6b 70  14 05 ae c7
|   0f a1 d7 f2  f2 98 06 18  e3 38 62 f4  a7 a1 51 d0
|   df 8f f9 b0  24 31 3c fb  50 7c 72 fb  9e e0 c8 8d
|   1b 42 a2 ff  91 71 5c f8  09 59 05 ff  c9 9e 05 56
|   33 29 92 ac  a3 5f ae 07  4b a3 1b 88  47 0e 83 67
|   1d 74 be 28  fb 01 b9 cb  8d ab 8e 56  eb 1d 02 0a
|   09 90 09 09  f5 b5 05 c0  46 e0 9b bf  cb 04 8b e1
|   54 98 74 7d  35 12 fd ce  6a 05 75 97  ad 60 e4 a7
|   6f 97 03 a1  3f 3e 62 72  54 b6 7a 78  85 a7 3d 47
|   36 bf 90 fe  39 a7 8b 65  a5 fe 53 5e  ad 4a a3 99
|   6c 5f f9 e1  f2 06 d9 bc  65 33 0c 10  94 3d b2 50
|   46 a9 39 bb  76 03 01 5b  69 c4 7f 6e
| #3 complete v2 state transition with STF_OK
./rekey-no-reply-I1 transition from state STATE_CHILD_C1_REKEY to state STATE_CHILD_C1_REKEY
| v2_state_transition: st is #3; pst is #0; transition_st is #3
./rekey-no-reply-I1 STATE_CHILD_C1_REKEY: CHILD SA being rekeyed (msgid: 00000000/4294967295)
Newly created state is #3



now pretend (2) that the keylife timer is up, and rekey the connection
RC=0 #3: "parker1--jj2":500 IKEv2.0 STATE_CHILD_C1_REKEY (CHILD SA being rekeyed); none in -1s; nodpd; msgid=2; idle; import:admin initiate
RC=0 #2: "parker1--jj2":500 IKEv2.0 STATE_CHILD_C1_KEYED (CHILD SA established); none in -1s; newest IPSEC; nodpd; msgid=1; idle; import:admin initiate
RC=0 #1: "parker1--jj2":500 IKEv2.0 STATE_PARENT_I3 (PARENT SA established); none in -1s; newest ISAKMP; nodpd; retranscnt=0,outorder=0,last=1,next=3,recv=-1; msgid=0; idle; import:admin initiate
| duplicating state object #1
| creating state object #4 at Z
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  de bc 58 3a  8f 40 d0 cf
| state hash entry 28
| inserting state object #4 bucket: 28
| ikev2 child outC1: calculating g^{xy}, sending C1
./rekey-no-reply-I1 starting rekey of CHILD SA for state=#3 (expired) using PARENT SA #1 as INITIATOR
| **emit ISAKMP Message:
|    initiator cookie:
|   80 01 02 03  04 05 06 07
|    responder cookie:
|   de bc 58 3a  8f 40 d0 cf
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996)
|    exchange type: ISAKMP_v2_CHILD_SA
|    flags: ISAKMP_FLAG_ENCRYPTION+ISAKMP_FLAG_INIT
|    message ID:  00 00 00 03
|    next-payload: ISAKMP_NEXT_v2E [@16=0x2e]
| ***emit IKEv2 Encryption Payload:
|    critical bit: none
| emitting 16 zero bytes of iv into IKEv2 Encryption Payload
|    next-payload: ISAKMP_NEXT_v2KE [@-20=0x22]
| *****emit IKEv2 Key Exchange Payload:
|    critical bit: none
|    transform type: 14
| emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload
| ikev2 g^x  3d a6 6a 81  e2 92 09 be  18 4f a0 1e  5c ed ea 7c
|   7d 7b 3a 21  3e 15 0d 53  5d 17 6a be  1b c5 70 ab
|   34 47 bc 09  14 7c aa 91  9c 8f 81 dc  1e f9 87 cd
|   6a ec fa f3  a5 9e 37 bc  ac 3d fd e1  32 8e e8 b3
|   fe d3 8b f4  7b 50 34 13  33 7a 93 ea  e9 3c 0e 8b
|   bd 48 18 9c  9e 03 70 f2  55 ce 45 22  9f c7 c9 48
|   43 a3 e2 64  b5 5d 43 38  c8 fe f1 d3  06 43 f0 0a
|   e8 6d 61 8c  60 78 d9 98  d3 1b 3b 5e  f5 a6 e8 2f
|   ef 56 ac b4  33 bd 1e 62  b2 3e 0b 17  af 6c b8 31
|   08 d7 19 5a  7b c4 54 c2  13 47 98 c2  cc d2 16 29
|   75 6c 03 fb  1e 9c 9d 21  0c a1 e6 c2  f3 f2 49 2c
|   f6 06 73 c1  96 1e ce 58  81 01 1c cb  16 dc f9 fc
|   c7 93 08 75  58 16 57 71  69 96 66 b7  a9 81 7f f7
|   37 4d 7c 41  38 62 a6 39  00 81 ca 3d  1d fc f7 b5
|   08 38 d4 34  70 22 6c 21  d2 5b 20 a1  d2 ba 2a d1
|   89 f3 20 79  ce ac 1e c2  ec 7d ae 76  94 40 39 a0
| emitting length of IKEv2 Key Exchange Payload: 264
|    next-payload: ISAKMP_NEXT_v2Ni [@0=0x28]
| *****emit IKEv2 Nonce Payload:
|    critical bit: none
| emitting 16 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload
| IKEv2 nonce  20 98 9d 37  a8 14 a6 4d  8f f0 7c 08  d3 20 e9 e3
| emitting length of IKEv2 Nonce Payload: 20
| empty esp_info, returning defaults
|    next-payload: ISAKMP_NEXT_v2SA [@264=0x21]
| *****emit IKEv2 Security Association Payload:
|    critical bit: none
| ******emit IKEv2 Proposal Substructure Payload:
|    prop #: 1
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  56 78 12 34
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 1
|    transform ID: 12
| ********emit IKEv2 Attribute Substructure Payload:
|    af+type: KEY_LENGTH
|    length/value: 128
|     [128 is 128??]
| emitting length of IKEv2 Transform Substructure Payload: 12
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 3
|    transform ID: 2
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 40
| ******emit IKEv2 Proposal Substructure Payload:
|    prop #: 2
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  56 78 12 34
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 1
|    transform ID: 12
| ********emit IKEv2 Attribute Substructure Payload:
|    af+type: KEY_LENGTH
|    length/value: 128
|     [128 is 128??]
| emitting length of IKEv2 Transform Substructure Payload: 12
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 3
|    transform ID: 1
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 40
| ******emit IKEv2 Proposal Substructure Payload:
|    prop #: 3
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  56 78 12 34
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 1
|    transform ID: 3
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 3
|    transform ID: 2
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 36
| ******emit IKEv2 Proposal Substructure Payload:
|    prop #: 4
|    proto ID: 3
|    spi size: 4
|    # transforms: 3
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  56 78 12 34
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 1
|    transform ID: 3
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 3
|    transform ID: 1
| emitting length of IKEv2 Transform Substructure Payload: 8
| *******emit IKEv2 Transform Substructure Payload:
|    transform type: 5
|    transform ID: 0
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 36
| emitting length of IKEv2 Security Association Payload: 156
|    next-payload: ISAKMP_NEXT_v2TSi [@284=0x2c]
| *****emit IKEv2 Traffic Selector Payload:
|    critical bit: none
|    number of TS: 1
| ******emit IKEv2 Traffic Selector:
|    TS type: IKEv2_TS_IPV6_ADDR_RANGE
|    IP Protocol ID: 0
|    start port: 0
|    end port: 65535
| emitting 16 raw bytes of ipv6 low into IKEv2 Traffic Selector
| ipv6 low  fd 68 c9 f9  41 57 00 02  00 00 00 01  00 00 00 00
| emitting 16 raw bytes of ipv6 high into IKEv2 Traffic Selector
| ipv6 high  fd 68 c9 f9  41 57 00 02  00 00 00 01  ff ff ff ff
| emitting length of IKEv2 Traffic Selector: 40
| emitting length of IKEv2 Traffic Selector Payload: 48
|    next-payload: ISAKMP_NEXT_v2TSr [@440=0x2d]
| *****emit IKEv2 Traffic Selector Payload:
|    critical bit: none
|    number of TS: 1
| ******emit IKEv2 Traffic Selector:
|    TS type: IKEv2_TS_IPV6_ADDR_RANGE
|    IP Protocol ID: 0
|    start port: 0
|    end port: 65535
| emitting 16 raw bytes of ipv6 low into IKEv2 Traffic Selector
| ipv6 low  fd 68 c9 f9  41 57 00 00  00 00 00 00  00 00 00 00
| emitting 16 raw bytes of ipv6 high into IKEv2 Traffic Selector
| ipv6 high  fd 68 c9 f9  41 57 00 00  ff ff ff ff  ff ff ff ff
| emitting length of IKEv2 Traffic Selector: 40
| emitting length of IKEv2 Traffic Selector Payload: 48
| emitting 8 raw bytes of padding and length into cleartext
| padding and length  00 01 02 03  04 05 06 07
| emitting 12 zero bytes of length of truncated HMAC into IKEv2 Encryption Payload
| emitting length of IKEv2 Encryption Payload: 576
| emitting length of ISAKMP Message: 604
| encrypting as INITIATOR, parent SA #1
| data before encryption:
|   28 00 01 08  00 0e 00 00  3d a6 6a 81  e2 92 09 be
|   18 4f a0 1e  5c ed ea 7c  7d 7b 3a 21  3e 15 0d 53
|   5d 17 6a be  1b c5 70 ab  34 47 bc 09  14 7c aa 91
|   9c 8f 81 dc  1e f9 87 cd  6a ec fa f3  a5 9e 37 bc
|   ac 3d fd e1  32 8e e8 b3  fe d3 8b f4  7b 50 34 13
|   33 7a 93 ea  e9 3c 0e 8b  bd 48 18 9c  9e 03 70 f2
|   55 ce 45 22  9f c7 c9 48  43 a3 e2 64  b5 5d 43 38
|   c8 fe f1 d3  06 43 f0 0a  e8 6d 61 8c  60 78 d9 98
|   d3 1b 3b 5e  f5 a6 e8 2f  ef 56 ac b4  33 bd 1e 62
|   b2 3e 0b 17  af 6c b8 31  08 d7 19 5a  7b c4 54 c2
|   13 47 98 c2  cc d2 16 29  75 6c 03 fb  1e 9c 9d 21
|   0c a1 e6 c2  f3 f2 49 2c  f6 06 73 c1  96 1e ce 58
|   81 01 1c cb  16 dc f9 fc  c7 93 08 75  58 16 57 71
|   69 96 66 b7  a9 81 7f f7  37 4d 7c 41  38 62 a6 39
|   00 81 ca 3d  1d fc f7 b5  08 38 d4 34  70 22 6c 21
|   d2 5b 20 a1  d2 ba 2a d1  89 f3 20 79  ce ac 1e c2
|   ec 7d ae 76  94 40 39 a0  21 00 00 14  20 98 9d 37
|   a8 14 a6 4d  8f f0 7c 08  d3 20 e9 e3  2c 00 00 9c
|   02 00 00 28  01 03 04 03  56 78 12 34  03 00 00 0c
|   01 00 00 0c  80 0e 00 80  03 00 00 08  03 00 00 02
|   00 00 00 08  05 00 00 00  02 00 00 28  02 03 04 03
|   56 78 12 34  03 00 00 0c  01 00 00 0c  80 0e 00 80
|   03 00 00 08  03 00 00 01  00 00 00 08  05 00 00 00
|   02 00 00 24  03 03 04 03  56 78 12 34  03 00 00 08
|   01 00 00 03  03 00 00 08  03 00 00 02  00 00 00 08
|   05 00 00 00  00 00 00 24  04 03 04 03  56 78 12 34
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 01
|   00 00 00 08  05 00 00 00  2d 00 00 30  01 00 00 00
|   08 00 00 28  00 00 ff ff  fd 68 c9 f9  41 57 00 02
|   00 00 00 01  00 00 00 00  fd 68 c9 f9  41 57 00 02
|   00 00 00 01  ff ff ff ff  00 00 00 30  01 00 00 00
|   08 00 00 28  00 00 ff ff  fd 68 c9 f9  41 57 00 00
|   00 00 00 00  00 00 00 00  fd 68 c9 f9  41 57 00 00
|   ff ff ff ff  ff ff ff ff  00 01 02 03  04 05 06 07
| data after encryption:
|   73 8a 8f 42  ea 98 37 99  13 4b bb 29  ba 1d e2 de
|   2b 85 7a cc  55 e8 fc 4a  3f b2 be 15  1b fc a1 28
|   59 c7 83 3d  1d 3e 87 02  ce d7 61 79  4b 8d 4b c4
|   ff 36 93 7c  92 37 83 fc  5f 16 c2 35  0f 66 12 e2
|   ea 2b 36 dd  d4 8b 0c 3f  c6 f0 0d ac  ba 49 32 cb
|   e0 62 70 92  3b 70 79 bd  44 e6 29 ce  82 2a d6 3c
|   5e 73 62 3f  f7 0e 3e f6  90 67 13 19  70 22 b3 e5
|   da 1b d8 43  aa c4 78 d1  52 37 87 29  cc 15 58 bd
|   83 57 0c 0c  95 9f a0 ba  f2 81 6b 11  f9 4d 29 4f
|   76 df 64 86  21 6a ae 93  ff 31 af 1d  6a 4b b1 2e
|   41 b1 46 99  59 f4 1b ed  e7 65 2f 0d  2b 35 84 62
|   83 be 60 80  94 78 b1 77  6d dc fb 94  27 75 59 5a
|   e6 f1 e8 b0  9a 89 f4 b7  0a 23 17 1c  43 91 f0 6c
|   d7 5e 40 b8  2a 3c 54 57  c3 84 b3 25  28 12 d4 5c
|   53 c3 18 44  21 6b de 28  1d bb b7 23  af 5b 51 05
|   e0 7c 61 26  3a 4a 03 d4  33 57 d8 be  04 05 89 7f
|   09 55 3d 38  5b fb bd 22  b8 40 86 73  97 0b f8 98
|   85 6f 8a c2  fa fc 31 50  00 0d 13 88  66 c9 47 23
|   82 f1 aa 3b  47 a6 cd 1c  05 34 49 52  c7 33 0b 55
|   d5 98 ab a8  26 05 13 6c  27 1d 39 2b  7a fc 0c bf
|   89 1b b9 31  51 11 3a 99  73 e1 89 b3  9b c9 5a 41
|   47 c2 3c e6  19 21 00 76  f0 ce 53 8f  fc 99 1b f0
|   1d 32 57 b5  3f 2f e8 6d  76 64 1a 5b  e6 9b 66 4a
|   ed 82 90 6a  19 f6 9c a7  d5 6f 1e d1  8e cb ae 27
|   04 7e 27 e8  d1 de be 19  85 a7 a9 8a  8f 8e 8a 0b
|   ac a0 2d af  f4 29 db f1  01 63 13 9c  d7 50 7b f2
|   2f 07 ec fd  b7 c6 94 c0  37 cc 02 a0  ac 6e 8c ef
|   09 b8 bd ca  46 de 07 1b  5e b5 3d 69  19 4d 27 7b
|   90 58 06 60  3a 67 19 35  fb fd 35 39  c6 e4 9d f1
|   12 16 ec 6b  77 15 ad a0  a9 37 cd 42  af 51 8f dc
|   bc f0 1f 3e  d7 60 b6 b1  7f bc bb 50  89 3e c9 a9
|   af f6 b9 5d  c4 9e d6 72  47 a3 e9 35  ed 77 38 c0
|   09 a9 6c 00  74 17 3a fc  d0 d3 23 b0  f0 11 24 0f
|   03 35 63 77  11 65 95 1c  20 df 65 3d  6b e3 58 7c
| data being hmac:  80 01 02 03  04 05 06 07  de bc 58 3a  8f 40 d0 cf
|   2e 20 24 09  00 00 00 03  00 00 02 5c  22 00 02 40
|   80 01 02 03  04 05 06 07  08 09 0a 0b  0c 0d 0e 0f
|   73 8a 8f 42  ea 98 37 99  13 4b bb 29  ba 1d e2 de
|   2b 85 7a cc  55 e8 fc 4a  3f b2 be 15  1b fc a1 28
|   59 c7 83 3d  1d 3e 87 02  ce d7 61 79  4b 8d 4b c4
|   ff 36 93 7c  92 37 83 fc  5f 16 c2 35  0f 66 12 e2
|   ea 2b 36 dd  d4 8b 0c 3f  c6 f0 0d ac  ba 49 32 cb
|   e0 62 70 92  3b 70 79 bd  44 e6 29 ce  82 2a d6 3c
|   5e 73 62 3f  f7 0e 3e f6  90 67 13 19  70 22 b3 e5
|   da 1b d8 43  aa c4 78 d1  52 37 87 29  cc 15 58 bd
|   83 57 0c 0c  95 9f a0 ba  f2 81 6b 11  f9 4d 29 4f
|   76 df 64 86  21 6a ae 93  ff 31 af 1d  6a 4b b1 2e
|   41 b1 46 99  59 f4 1b ed  e7 65 2f 0d  2b 35 84 62
|   83 be 60 80  94 78 b1 77  6d dc fb 94  27 75 59 5a
|   e6 f1 e8 b0  9a 89 f4 b7  0a 23 17 1c  43 91 f0 6c
|   d7 5e 40 b8  2a 3c 54 57  c3 84 b3 25  28 12 d4 5c
|   53 c3 18 44  21 6b de 28  1d bb b7 23  af 5b 51 05
|   e0 7c 61 26  3a 4a 03 d4  33 57 d8 be  04 05 89 7f
|   09 55 3d 38  5b fb bd 22  b8 40 86 73  97 0b f8 98
|   85 6f 8a c2  fa fc 31 50  00 0d 13 88  66 c9 47 23
|   82 f1 aa 3b  47 a6 cd 1c  05 34 49 52  c7 33 0b 55
|   d5 98 ab a8  26 05 13 6c  27 1d 39 2b  7a fc 0c bf
|   89 1b b9 31  51 11 3a 99  73 e1 89 b3  9b c9 5a 41
|   47 c2 3c e6  19 21 00 76  f0 ce 53 8f  fc 99 1b f0
|   1d 32 57 b5  3f 2f e8 6d  76 64 1a 5b  e6 9b 66 4a
|   ed 82 90 6a  19 f6 9c a7  d5 6f 1e d1  8e cb ae 27
|   04 7e 27 e8  d1 de be 19  85 a7 a9 8a  8f 8e 8a 0b
|   ac a0 2d af  f4 29 db f1  01 63 13 9c  d7 50 7b f2
|   2f 07 ec fd  b7 c6 94 c0  37 cc 02 a0  ac 6e 8c ef
|   09 b8 bd ca  46 de 07 1b  5e b5 3d 69  19 4d 27 7b
|   90 58 06 60  3a 67 19 35  fb fd 35 39  c6 e4 9d f1
|   12 16 ec 6b  77 15 ad a0  a9 37 cd 42  af 51 8f dc
|   bc f0 1f 3e  d7 60 b6 b1  7f bc bb 50  89 3e c9 a9
|   af f6 b9 5d  c4 9e d6 72  47 a3 e9 35  ed 77 38 c0
|   09 a9 6c 00  74 17 3a fc  d0 d3 23 b0  f0 11 24 0f
|   03 35 63 77  11 65 95 1c  20 df 65 3d  6b e3 58 7c
| out calculated auth:
|   c9 3e 6e 86  b3 d7 58 ed  d7 36 18 44
sending 604 bytes for ikev2child_outC1_tail through eth0:500 [192.168.1.1:500] to 132.213.238.7:500 (using #4)
|   80 01 02 03  04 05 06 07  de bc 58 3a  8f 40 d0 cf
|   2e 20 24 09  00 00 00 03  00 00 02 5c  22 00 02 40
|   80 01 02 03  04 05 06 07  08 09 0a 0b  0c 0d 0e 0f
|   73 8a 8f 42  ea 98 37 99  13 4b bb 29  ba 1d e2 de
|   2b 85 7a cc  55 e8 fc 4a  3f b2 be 15  1b fc a1 28
|   59 c7 83 3d  1d 3e 87 02  ce d7 61 79  4b 8d 4b c4
|   ff 36 93 7c  92 37 83 fc  5f 16 c2 35  0f 66 12 e2
|   ea 2b 36 dd  d4 8b 0c 3f  c6 f0 0d ac  ba 49 32 cb
|   e0 62 70 92  3b 70 79 bd  44 e6 29 ce  82 2a d6 3c
|   5e 73 62 3f  f7 0e 3e f6  90 67 13 19  70 22 b3 e5
|   da 1b d8 43  aa c4 78 d1  52 37 87 29  cc 15 58 bd
|   83 57 0c 0c  95 9f a0 ba  f2 81 6b 11  f9 4d 29 4f
|   76 df 64 86  21 6a ae 93  ff 31 af 1d  6a 4b b1 2e
|   41 b1 46 99  59 f4 1b ed  e7 65 2f 0d  2b 35 84 62
|   83 be 60 80  94 78 b1 77  6d dc fb 94  27 75 59 5a
|   e6 f1 e8 b0  9a 89 f4 b7  0a 23 17 1c  43 91 f0 6c
|   d7 5e 40 b8  2a 3c 54 57  c3 84 b3 25  28 12 d4 5c
|   53 c3 18 44  21 6b de 28  1d bb b7 23  af 5b 51 05
|   e0 7c 61 26  3a 4a 03 d4  33 57 d8 be  04 05 89 7f
|   09 55 3d 38  5b fb bd 22  b8 40 86 73  97 0b f8 98
|   85 6f 8a c2  fa fc 31 50  00 0d 13 88  66 c9 47 23
|   82 f1 aa 3b  47 a6 cd 1c  05 34 49 52  c7 33 0b 55
|   d5 98 ab a8  26 05 13 6c  27 1d 39 2b  7a fc 0c bf
|   89 1b b9 31  51 11 3a 99  73 e1 89 b3  9b c9 5a 41
|   47 c2 3c e6  19 21 00 76  f0 ce 53 8f  fc 99 1b f0
|   1d 32 57 b5  3f 2f e8 6d  76 64 1a 5b  e6 9b 66 4a
|   ed 82 90 6a  19 f6 9c a7  d5 6f 1e d1  8e cb ae 27
|   04 7e 27 e8  d1 de be 19  85 a7 a9 8a  8f 8e 8a 0b
|   ac a0 2d af  f4 29 db f1  01 63 13 9c  d7 50 7b f2
|   2f 07 ec fd  b7 c6 94 c0  37 cc 02 a0  ac 6e 8c ef
|   09 b8 bd ca  46 de 07 1b  5e b5 3d 69  19 4d 27 7b
|   90 58 06 60  3a 67 19 35  fb fd 35 39  c6 e4 9d f1
|   12 16 ec 6b  77 15 ad a0  a9 37 cd 42  af 51 8f dc
|   bc f0 1f 3e  d7 60 b6 b1  7f bc bb 50  89 3e c9 a9
|   af f6 b9 5d  c4 9e d6 72  47 a3 e9 35  ed 77 38 c0
|   09 a9 6c 00  74 17 3a fc  d0 d3 23 b0  f0 11 24 0f
|   03 35 63 77  11 65 95 1c  20 df 65 3d  6b e3 58 7c
|   c9 3e 6e 86  b3 d7 58 ed  d7 36 18 44
| #4 complete v2 state transition with STF_OK
./rekey-no-reply-I1 transition from state STATE_CHILD_C1_REKEY to state STATE_CHILD_C1_REKEY
| v2_state_transition: st is #4; pst is #0; transition_st is #4
./rekey-no-reply-I1 STATE_CHILD_C1_REKEY: CHILD SA being rekeyed (msgid: 00000000/4294967295)
Newly created state is #4
RC=0 #4: "parker1--jj2":500 IKEv2.0 STATE_CHILD_C1_REKEY (CHILD SA being rekeyed); none in -1s; nodpd; msgid=3; idle; import:admin initiate
RC=0 #3: "parker1--jj2":500 IKEv2.0 STATE_CHILD_C1_REKEY (CHILD SA being rekeyed); none in -1s; nodpd; msgid=2; idle; import:admin initiate
RC=0 #2: "parker1--jj2":500 IKEv2.0 STATE_CHILD_C1_KEYED (CHILD SA established); none in -1s; newest IPSEC; nodpd; msgid=1; idle; import:admin initiate
RC=0 #1: "parker1--jj2":500 IKEv2.0 STATE_PARENT_I3 (PARENT SA established); none in -1s; newest ISAKMP; nodpd; retranscnt=0,outorder=0,last=1,next=4,recv=-1; msgid=0; idle; import:admin initiate
./rekey-no-reply-I1 deleting connection
| pass 0: considering CHILD SAs to delete
./rekey-no-reply-I1 deleting state #4 (STATE_CHILD_C1_REKEY)
| received request to delete child state
| removing state object #4
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  de bc 58 3a  8f 40 d0 cf
| state hash entry 28
./rekey-no-reply-I1 deleting state #3 (STATE_CHILD_C1_REKEY)
| received request to delete child state
| removing state object #3
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  de bc 58 3a  8f 40 d0 cf
| state hash entry 28
./rekey-no-reply-I1 deleting state #2 (STATE_CHILD_C1_KEYED)
| received request to delete child state
| sending Child SA delete request
| **emit ISAKMP Message:
|    initiator cookie:
|   80 01 02 03  04 05 06 07
|    responder cookie:
|   de bc 58 3a  8f 40 d0 cf
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996)
|    exchange type: ISAKMP_v2_INFORMATIONAL
|    flags: ISAKMP_FLAG_INIT
|    message ID:  00 00 00 04
| ***emit IKEv2 Encryption Payload:
|    critical bit: none
| emitting 16 zero bytes of iv into IKEv2 Encryption Payload
| *****emit IKEv2 Delete Payload:
|    critical bit: none
|    protocol ID: 3
|    SPI size: 4
|    number of SPIs: 1
| emitting 4 raw bytes of local spis into IKEv2 Delete Payload
| local spis  12 34 56 78
| emitting length of IKEv2 Delete Payload: 12
| emitting 4 raw bytes of padding and length into cleartext
| padding and length  00 01 02 03
| emitting 12 zero bytes of length of truncated HMAC into IKEv2 Encryption Payload
| emitting length of IKEv2 Encryption Payload: 48
| emitting length of ISAKMP Message: 76
| encrypting as INITIATOR, parent SA #1
| data before encryption:
|   00 00 00 0c  03 04 00 01  12 34 56 78  00 01 02 03
| data after encryption:
|   b5 fc a4 92  84 aa c2 c2  26 45 c4 84  4b 67 04 77
| data being hmac:  80 01 02 03  04 05 06 07  de bc 58 3a  8f 40 d0 cf
|   2e 20 25 08  00 00 00 04  00 00 00 4c  2a 00 00 30
|   80 01 02 03  04 05 06 07  08 09 0a 0b  0c 0d 0e 0f
|   b5 fc a4 92  84 aa c2 c2  26 45 c4 84  4b 67 04 77
| out calculated auth:
|   d8 28 80 26  76 d3 5c b5  ac de 1a 26
sending 76 bytes for ikev2_delete_out through eth0:500 [192.168.1.1:500] to 132.213.238.7:500 (using #1)
|   80 01 02 03  04 05 06 07  de bc 58 3a  8f 40 d0 cf
|   2e 20 25 08  00 00 00 04  00 00 00 4c  2a 00 00 30
|   80 01 02 03  04 05 06 07  08 09 0a 0b  0c 0d 0e 0f
|   b5 fc a4 92  84 aa c2 c2  26 45 c4 84  4b 67 04 77
|   d8 28 80 26  76 d3 5c b5  ac de 1a 26
| pass 1: considering PARENT SAs to delete
./rekey-no-reply-I1 deleting state #1 (STATE_PARENT_I3)
| considering request to delete IKE parent state
| sending IKE SA delete request
| **emit ISAKMP Message:
|    initiator cookie:
|   80 01 02 03  04 05 06 07
|    responder cookie:
|   de bc 58 3a  8f 40 d0 cf
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996)
|    exchange type: ISAKMP_v2_INFORMATIONAL
|    flags: ISAKMP_FLAG_INIT
|    message ID:  00 00 00 05
| ***emit IKEv2 Encryption Payload:
|    critical bit: none
| emitting 16 zero bytes of iv into IKEv2 Encryption Payload
| *****emit IKEv2 Delete Payload:
|    critical bit: none
|    protocol ID: 1
|    SPI size: 0
|    number of SPIs: 0
| emitting length of IKEv2 Delete Payload: 8
| emitting 8 raw bytes of padding and length into cleartext
| padding and length  00 01 02 03  04 05 06 07
| emitting 12 zero bytes of length of truncated HMAC into IKEv2 Encryption Payload
| emitting length of IKEv2 Encryption Payload: 48
| emitting length of ISAKMP Message: 76
| encrypting as INITIATOR, parent SA #1
| data before encryption:
|   00 00 00 08  01 00 00 00  00 01 02 03  04 05 06 07
| data after encryption:
|   23 56 8c 9a  7c 01 7c 8e  c1 2a 91 9a  c4 da 80 c2
| data being hmac:  80 01 02 03  04 05 06 07  de bc 58 3a  8f 40 d0 cf
|   2e 20 25 08  00 00 00 05  00 00 00 4c  2a 00 00 30
|   80 01 02 03  04 05 06 07  08 09 0a 0b  0c 0d 0e 0f
|   23 56 8c 9a  7c 01 7c 8e  c1 2a 91 9a  c4 da 80 c2
| out calculated auth:
|   df 06 d4 89  4c 60 85 1d  b7 60 27 8e
sending 76 bytes for ikev2_delete_out through eth0:500 [192.168.1.1:500] to 132.213.238.7:500 (using #1)
|   80 01 02 03  04 05 06 07  de bc 58 3a  8f 40 d0 cf
|   2e 20 25 08  00 00 00 05  00 00 00 4c  2a 00 00 30
|   80 01 02 03  04 05 06 07  08 09 0a 0b  0c 0d 0e 0f
|   23 56 8c 9a  7c 01 7c 8e  c1 2a 91 9a  c4 da 80 c2
|   df 06 d4 89  4c 60 85 1d  b7 60 27 8e
| freeing state object #1
./rekey-no-reply-I1 leak: reply packet for ikev2_out_C1_tail, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_v2_prop, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_attrs, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_attrs, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: 4 * sa copy attrs array, item size: X
./rekey-no-reply-I1 leak: sa copy trans array, item size: X
./rekey-no-reply-I1 leak: sa copy prop array, item size: X
./rekey-no-reply-I1 leak: sa copy prop conj array, item size: X
./rekey-no-reply-I1 leak: sa copy prop_conj, item size: X
./rekey-no-reply-I1 leak: initiator nonce, item size: X
./rekey-no-reply-I1 leak: long term secret, item size: X
./rekey-no-reply-I1 leak: saved gi value, item size: X
./rekey-no-reply-I1 leak: ikev2child_outC1 KE, item size: X
./rekey-no-reply-I1 leak: st_nr in duplicate_state, item size: X
./rekey-no-reply-I1 leak: st_skey_pr in duplicate_state, item size: X
./rekey-no-reply-I1 leak: st_skey_pi in duplicate_state, item size: X
./rekey-no-reply-I1 leak: st_skey_er in duplicate_state, item size: X
./rekey-no-reply-I1 leak: st_skey_ei in duplicate_state, item size: X
./rekey-no-reply-I1 leak: st_skey_ar in duplicate_state, item size: X
./rekey-no-reply-I1 leak: st_skey_ai in duplicate_state, item size: X
./rekey-no-reply-I1 leak: st_skey_d in duplicate_state, item size: X
./rekey-no-reply-I1 leak: st_skeyseed in duplicate_state, item size: X
./rekey-no-reply-I1 leak: st_enc_key in duplicate_state, item size: X
./rekey-no-reply-I1 leak: struct state in new_state(), item size: X
./rekey-no-reply-I1 leak: reply packet for ikev2_out_C1_tail, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_v2_prop, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_attrs, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_attrs, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: 4 * sa copy attrs array, item size: X
./rekey-no-reply-I1 leak: sa copy trans array, item size: X
./rekey-no-reply-I1 leak: sa copy prop array, item size: X
./rekey-no-reply-I1 leak: sa copy prop conj array, item size: X
./rekey-no-reply-I1 leak: sa copy prop_conj, item size: X
./rekey-no-reply-I1 leak: initiator nonce, item size: X
./rekey-no-reply-I1 leak: long term secret, item size: X
./rekey-no-reply-I1 leak: saved gi value, item size: X
./rekey-no-reply-I1 leak: ikev2child_outC1 KE, item size: X
./rekey-no-reply-I1 leak: st_nr in duplicate_state, item size: X
./rekey-no-reply-I1 leak: st_skey_pr in duplicate_state, item size: X
./rekey-no-reply-I1 leak: st_skey_pi in duplicate_state, item size: X
./rekey-no-reply-I1 leak: st_skey_er in duplicate_state, item size: X
./rekey-no-reply-I1 leak: st_skey_ei in duplicate_state, item size: X
./rekey-no-reply-I1 leak: st_skey_ar in duplicate_state, item size: X
./rekey-no-reply-I1 leak: st_skey_ai in duplicate_state, item size: X
./rekey-no-reply-I1 leak: st_skey_d in duplicate_state, item size: X
./rekey-no-reply-I1 leak: st_skeyseed in duplicate_state, item size: X
./rekey-no-reply-I1 leak: st_enc_key in duplicate_state, item size: X
./rekey-no-reply-I1 leak: struct state in new_state(), item size: X
./rekey-no-reply-I1 leak: skeyseed_t1, item size: X
./rekey-no-reply-I1 leak: responder keys, item size: X
./rekey-no-reply-I1 leak: initiator keys, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_v2_prop, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_attrs, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_attrs, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: 4 * sa copy attrs array, item size: X
./rekey-no-reply-I1 leak: sa copy trans array, item size: X
./rekey-no-reply-I1 leak: sa copy prop array, item size: X
./rekey-no-reply-I1 leak: sa copy prop conj array, item size: X
./rekey-no-reply-I1 leak: sa copy prop_conj, item size: X
./rekey-no-reply-I1 leak: reply packet, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_v2_prop, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_attrs, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_attrs, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: 4 * sa copy attrs array, item size: X
./rekey-no-reply-I1 leak: sa copy trans array, item size: X
./rekey-no-reply-I1 leak: sa copy prop array, item size: X
./rekey-no-reply-I1 leak: sa copy prop conj array, item size: X
./rekey-no-reply-I1 leak: sa copy prop_conj, item size: X
./rekey-no-reply-I1 leak: st_nr in duplicate_state, item size: X
./rekey-no-reply-I1 leak: st_ni in duplicate_state, item size: X
./rekey-no-reply-I1 leak: st_skey_pr in duplicate_state, item size: X
./rekey-no-reply-I1 leak: st_skey_pi in duplicate_state, item size: X
./rekey-no-reply-I1 leak: st_skey_er in duplicate_state, item size: X
./rekey-no-reply-I1 leak: st_skey_ei in duplicate_state, item size: X
./rekey-no-reply-I1 leak: st_skey_ar in duplicate_state, item size: X
./rekey-no-reply-I1 leak: st_skey_ai in duplicate_state, item size: X
./rekey-no-reply-I1 leak: st_skey_d in duplicate_state, item size: X
./rekey-no-reply-I1 leak: st_skeyseed in duplicate_state, item size: X
./rekey-no-reply-I1 leak: st_enc_key in duplicate_state, item size: X
./rekey-no-reply-I1 leak: struct state in new_state(), item size: X
./rekey-no-reply-I1 leak: ikev2_inR1outI2 KE, item size: X
./rekey-no-reply-I1 leak: db_attrs, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_v2_prop, item size: X
./rekey-no-reply-I1 leak: db_attrs, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_attrs, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_attrs, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_attrs, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_attrs, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: msg_digest, item size: X
./rekey-no-reply-I1 leak: ikev2_outI1 KE, item size: X
./rekey-no-reply-I1 leak: db_attrs, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_v2_prop, item size: X
./rekey-no-reply-I1 leak: db_attrs, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_attrs, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_attrs, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_attrs, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: db_attrs, item size: X
./rekey-no-reply-I1 leak: db_v2_trans, item size: X
./rekey-no-reply-I1 leak: db_v2_prop_conj, item size: X
./rekey-no-reply-I1 leak: keep id name, item size: X
./rekey-no-reply-I1 leak: pubkey entry, item size: X
./rekey-no-reply-I1 leak: rfc3110 format of public key, item size: X
./rekey-no-reply-I1 leak: pubkey, item size: X
./rekey-no-reply-I1 leak: keep id name, item size: X
./rekey-no-reply-I1 leak: pubkey entry, item size: X
./rekey-no-reply-I1 leak: rfc3110 format of public key, item size: X
./rekey-no-reply-I1 leak: pubkey, item size: X
./rekey-no-reply-I1 leak: policies path, item size: X
./rekey-no-reply-I1 leak: ocspcerts path, item size: X
./rekey-no-reply-I1 leak: aacerts path, item size: X
./rekey-no-reply-I1 leak: certs path, item size: X
./rekey-no-reply-I1 leak: private path, item size: X
./rekey-no-reply-I1 leak: crls path, item size: X
./rekey-no-reply-I1 leak: cacert path, item size: X
./rekey-no-reply-I1 leak: acert path, item size: X
./rekey-no-reply-I1 leak: default conf var_dir, item size: X
./rekey-no-reply-I1 leak: default conf conffile, item size: X
./rekey-no-reply-I1 leak: default conf ipsecd_dir, item size: X
./rekey-no-reply-I1 leak: default conf ipsec_conf_dir, item size: X
./rekey-no-reply-I1 leak: 2 * id list, item size: X
./rekey-no-reply-I1 leak: rfc3110 format of public key [created], item size: X
./rekey-no-reply-I1 leak: pubkey, item size: X
./rekey-no-reply-I1 leak: secret, item size: X
./rekey-no-reply-I1 leak: 2 * hasher name, item size: X
./rekey-no-reply-I1 leak detective found Z leaks, total size X
