Hi,
I'm currently facing a problem establishing IKEv2 site-to-site VPN between
OpenBSD and a Juniper SRX firewall.
The tunnel can be sucessfully established if it is initiated by the Juniper SRX
firewall. If I configure OpenIKED to actively initiate the tunnel, the SRX
firewall complains about a syntax error.
OpenBSD version:
****************
root@openbsd:~# uname -a
OpenBSD openbsd.test.loc 5.8 GENERIC#1170 amd64
root@openbsd:~#
Juniper SRX version:
********************
{primary:node0}[edit]
superman@juniper_srx-node0# run show version
node0:
--------------------------------------------------------------------------
Hostname: juniper_srx-node0
Model: srx240h2
JUNOS Software Release [12.3X48-D20.4]
node1:
--------------------------------------------------------------------------
Hostname: juniper_srx-node1
Model: srx240h2
JUNOS Software Release [12.3X48-D20.4]
{primary:node0}[edit]
superman@juniper_srx-node0#
OpenIKED acting as initiator:
*****************************
OpenIKED configuration:
=======================
ikev2 vpn_corp active esp \
from 172.16.0.0/16 to 172.17.0.0/16 \
local 1.1.1.1 peer 2.2.2.2 \
ikesa auth hmac-sha2-256 enc aes-256 group modp2048 \
childsa auth hmac-sha2-256 enc aes-256 group modp2048 \
srcid 1.1.1.1 dstid 2.2.2.2 \
ikelifetime 28800 lifetime 3600 \
psk ********
OpenIKED log:
=============
ca_privkey_serialize: type RSA_KEY length 1190
ca_pubkey_serialize: type RSA_KEY length 270
/etc/iked.conf: loaded 1 configuration rules
config_getpolicy: received policy
ikev2 "vpn_corp" active esp inet from 172.16.0.0/16 to 172.17.0.0/16 local
1.1.1.1 peer 2.2.2.2 ikesa enc aes-256 prf hmac-sha2-256,hmac-sha1,hmac-md5
auth hmac-sha2-256 group modp2048 childsa enc aes-256 auth hmac-sha2-256 group
modp2048 srcid 1.1.1.1 dstid 2.2.2.2 ikelifetime 28800 lifetime 3600 bytes
536870912 psk 0x********************************************
config_getpfkey: received pfkey fd 3
config_getcompile: compilation done
config_getsocket: received socket fd 4
config_getsocket: received socket fd 5
config_getsocket: received socket fd 7
config_getsocket: received socket fd 8
ca_reload: local cert type RSA_KEY
config_getocsp: ocsp_url none
ikev2_dispatch_cert: updated local CERTREQ type RSA_KEY length 0
ikev2_init_ike_sa: initiating "vpn_corp"
ikev2_policy2id: srcid IPV4/1.1.1.1 length 8
ikev2_add_proposals: length 60
ikev2_next_payload: length 64 nextpayload KE
ikev2_next_payload: length 264 nextpayload NONCE
ikev2_next_payload: length 36 nextpayload NOTIFY
ikev2_nat_detection: local source 0x08e787c5d31f442f 0x0000000000000000
1.1.1.1:500
ikev2_next_payload: length 28 nextpayload NOTIFY
ikev2_nat_detection: local destination 0x08e787c5d31f442f 0x0000000000000000
2.2.2.2:500
ikev2_next_payload: length 28 nextpayload NOTIFY
ikev2_next_payload: length 14 nextpayload NONE
ikev2_pld_parse: header ispi 0x08e787c5d31f442f rspi 0x0000000000000000
nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x08 msgid 0 length 462
response 0
ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 64
ikev2_pld_sa: more 0 reserved 0 length 60 proposal #1 protoid IKE spisize 0
xforms 6 spi 0
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_2048
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1
ikev2_pld_xform: more 0 reserved 0 length 8 type PRF id HMAC_MD5
ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 264
ikev2_pld_ke: dh group MODP_2048 reserved 0
ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 36
ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28
ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP
ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28
ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP
ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00 length 14
ikev2_pld_notify: protoid NONE spisize 0 type SIGNATURE_HASH_ALGORITHMS
ikev2_msg_send: IKE_SA_INIT request from 1.1.1.1:500 to 2.2.2.2:500 msgid 0,
462 bytes
sa_state: INIT -> SA_INIT
ikev2_recv: IKE_SA_INIT response from responder 2.2.2.2:500 to 1.1.1.1:500
policy 'vpn_corp' id 0, 474 bytes
ikev2_recv: ispi 0x08e787c5d31f442f rspi 0x9d7d95f32328d0ac
ikev2_recv: updated SA to peer 2.2.2.2:500 local 1.1.1.1:500
ikev2_pld_parse: header ispi 0x08e787c5d31f442f rspi 0x9d7d95f32328d0ac
nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x20 msgid 0 length 474
response 1
ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 48
ikev2_pld_sa: more 0 reserved 0 length 44 proposal #1 protoid IKE spisize 0
xforms 4 spi 0
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048
ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 264
ikev2_pld_ke: dh group MODP_2048 reserved 0
ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 36
ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28
ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP
ikev2_nat_detection: peer source 0x08e787c5d31f442f 0x9d7d95f32328d0ac
2.2.2.2:500
ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28
ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP
ikev2_nat_detection: peer destination 0x08e787c5d31f442f 0x9d7d95f32328d0ac
1.1.1.1:500
ikev2_pld_payloads: payload NOTIFY nextpayload VENDOR critical 0x00 length 10
ikev2_pld_notify: protoid NONE spisize 0 type <UNKNOWN:40002>
ikev2_pld_payloads: payload VENDOR nextpayload NONE critical 0x00 length 32
ikev2_sa_negotiate: score 4
sa_stateok: SA_INIT flags 0x00, require 0x04 auth
ikev2_sa_keys: SKEYSEED with 32 bytes
ikev2_sa_keys: S with 80 bytes
ikev2_prfplus: T1 with 32 bytes
ikev2_prfplus: T2 with 32 bytes
ikev2_prfplus: T3 with 32 bytes
ikev2_prfplus: T4 with 32 bytes
ikev2_prfplus: T5 with 32 bytes
ikev2_prfplus: T6 with 32 bytes
ikev2_prfplus: T7 with 32 bytes
ikev2_prfplus: Tn with 224 bytes
ikev2_sa_keys: SK_d with 32 bytes
ikev2_sa_keys: SK_ai with 32 bytes
ikev2_sa_keys: SK_ar with 32 bytes
ikev2_sa_keys: SK_ei with 32 bytes
ikev2_sa_keys: SK_er with 32 bytes
ikev2_sa_keys: SK_pi with 32 bytes
ikev2_sa_keys: SK_pr with 32 bytes
ikev2_msg_auth: initiator auth data length 526
sa_stateok: SA_INIT flags 0x04, require 0x04 auth
ikev2_next_payload: length 12 nextpayload AUTH
ikev2_next_payload: length 40 nextpayload SA
pfkey_sa_getspi: spi 0x54b417b8
pfkey_sa_init: new spi 0x54b417b8
ikev2_add_proposals: length 56
ikev2_next_payload: length 60 nextpayload TSi
ikev2_next_payload: length 24 nextpayload TSr
ikev2_next_payload: length 24 nextpayload NONE
ikev2_msg_encrypt: decrypted length 160
ikev2_msg_encrypt: padded length 176
ikev2_msg_encrypt: length 161, padding 15, output length 208
ikev2_next_payload: length 212 nextpayload IDi
ikev2_msg_integr: message length 240
ikev2_msg_integr: integrity checksum length 16
ikev2_pld_parse: header ispi 0x08e787c5d31f442f rspi 0x9d7d95f32328d0ac
nextpayload SK version 0x20 exchange IKE_AUTH flags 0x08 msgid 1 length 240
response 0
ikev2_pld_payloads: payload SK nextpayload IDi critical 0x00 length 212
ikev2_msg_decrypt: IV length 16
ikev2_msg_decrypt: encrypted payload length 176
ikev2_msg_decrypt: integrity checksum length 16
ikev2_msg_decrypt: integrity check succeeded
ikev2_msg_decrypt: decrypted payload length 176/176 padding 15
ikev2_pld_payloads: decrypted payload IDi nextpayload AUTH critical 0x00 length
12
ikev2_pld_id: id IPV4/1.1.1.1 length 8
ikev2_pld_payloads: decrypted payload AUTH nextpayload SA critical 0x00 length
40
ikev2_pld_auth: method SHARED_KEY_MIC length 32
ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00 length 60
ikev2_pld_sa: more 0 reserved 0 length 56 proposal #2 protoid ESP spisize 4
xforms 5 spi 0x54b417b8
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_2048
ikev2_pld_xform: more 3 reserved 0 length 8 type ESN id ESN
ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE
ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length
24
ikev2_pld_ts: count 1 length 16
ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535
ikev2_pld_ts: start 172.16.0.0 end 172.16.255.255
ikev2_pld_payloads: decrypted payload TSr nextpayload NONE critical 0x00 length
24
ikev2_pld_ts: count 1 length 16
ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535
ikev2_pld_ts: start 172.17.0.0 end 172.17.255.255
ikev2_msg_send: IKE_AUTH request from 1.1.1.1:500 to 2.2.2.2:500 msgid 1, 240
bytes
config_free_proposals: free 0x16b5efa61e80
Juniper SRX configuration:
==========================
{primary:node0}[edit]
superman@juniper_srx-node0# show security ike
proposal ike-aes265-sha256-dh14-psk-28800 {
authentication-method pre-shared-keys;
dh-group group14;
authentication-algorithm sha-256;
encryption-algorithm aes-256-cbc;
lifetime-seconds 28800;
}
policy ikepol-vpn-corp {
mode main;
proposals ike-aes265-sha256-dh14-psk-28800;
pre-shared-key hexadecimal "*******************************************";
## SECRET-DATA
}
gateway gw-corp {
ike-policy ikepol-vpn-corp;
address 1.1.1.1;
external-interface reth0.1051;
local-address 2.2.2.2;
version v2-only;
}
{primary:node0}[edit]
superman@juniper_srx-node0# show security ipsec
proposal ipsec-aes256-sha256-3600 {
protocol esp;
authentication-algorithm hmac-sha-256-128;
encryption-algorithm aes-256-cbc;
lifetime-seconds 3600;
}
policy ipsecpol-vpn-corp {
perfect-forward-secrecy {
keys group14;
}
proposals ipsec-aes256-sha256-3600;
}
vpn ipsec-vpn-corp {
bind-interface st0.0;
ike {
gateway gw-corp;
proxy-identity {
local 172.17.0.0/16;
remote 172.16.0.0/16;
}
ipsec-policy ipsecpol-vpn-corp;
}
establish-tunnels on-traffic;
}
{primary:node0}[edit]
superman@juniper_srx-node0#
Juniper SRX log:
================
[Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] P1 SA 8381945 start timer. timer
duration 30, reason 1.
[Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_forward:
[104a400/10b1800] R: IKE SA REFCNT: 1
[Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] ikev2_decode_packet: [104a400/10b1800]
Setting ed pkt ctx from VR id 65535 to VR id 0)
[Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_received - START
[Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_received:
Received Unauthenticated notification payload NAT detection source IP from
local:2.2.2.2 remote:1.1.1.1 IKEv2 for P1 SA 8381945
[Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_received - START
[Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_received:
Received Unauthenticated notification payload NAT detection destination IP from
local:2.2.2.2 remote:1.1.1.1 IKEv2 for P1 SA 8381945
[Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_received - START
[Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_received:
Received Unauthenticated notification payload unknown from local:2.2.2.2
remote:1.1.1.1 IKEv2 for P1 SA 8381945
[Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for
local:2.2.2.2, remote:1.1.1.1 IKEv2
[Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] Ignoring notification of type 16431
[Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] Ignoring notification of type 16389
[Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] Ignoring notification of type 16388
[Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr:
Found SA-CFG ipsec-vpn-corp by ip address for local:2.2.2.2, remote:1.1.1.1
IKEv2 remote_port:500 ksa_cfg_remote_port=0
[Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] Peer's proposed IKE SA payload is
SA([0](id = 1) protocol = IKE (1), HMAC-SHA256-128, AES CBC key len = 256, 2048
bit MODP, HMAC-SHA256 PRF, HMAC-SHA1 PRF, HMAC-MD5 PRF; )
[Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] Configured proposal is SA([0](id = 1)
protocol = IKE (1), AES CBC key len = 256, HMAC-SHA256-128, 2048 bit MODP,
HMAC-SHA256 PRF; )
[Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sa_select: SA_SELECT:
Selecting IKEv2 proposal.
[Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sa_select: SA_SELECT:
Considering policy proposal 1 and input proposal 1.
[Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] ikev2_udp_window_update:
[104a400/10b1800] Stored packet into window fb3c80
[Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet
104a800 from freelist
[Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] ikev2_udp_window_update:
[104a800/10b1800] Stored packet into window fb3ce0
[Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp
[Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 2048
[Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 14
[Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH
group 14
[Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys
using hardware for DH group 14
[Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1]
juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [28061]
[Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1]
juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request Parse
notification paylad in last received pkt
[Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for
local:2.2.2.2, remote:1.1.1.1 IKEv2
[Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] Ignoring notification of type 16431
[Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] Ignoring notification of type 16389
[Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] Ignoring notification of type 16388
[Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request send
NHTB_SUPPORTED
[Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] ikev2_udp_send_packet: [104a800/0]
Sending packet using VR id 0
[Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_forward:
[104ac00/10b1800] R: IKE SA REFCNT: 1
[Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] ikev2_packet_done: [104a400/0]
Destroyed already. Thread completed. Freeing now.
[Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] ikev2_udp_window_update:
[104ac00/10b1800] Stored packet into window fb3c80
[Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] ikev2_decode_sa: [104ac00/10b1800]
Proposal number(2) should be 0
[Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] iked_pv_audit_callback: Empty SSH audit
event
[Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] ikev2_state_error: [104ac00/10b1800]
Negotiation failed because of error Invalid syntax (7)
[Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] IKE negotiation fail for local:2.2.2.2,
remote:1.1.1.1 IKEv2 with status: Invalid syntax
[Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] Inside iked_pm_ipsec_sa_done
[Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] IPSec negotiation failed for SA-CFG
ipsec-vpn-corp for local:2.2.2.2, remote:1.1.1.1 IKEv2. status: Invalid syntax
[Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] P2 ed info: flags 0x800, P2 error:
Error ok
[Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] ikev2_packet_done: [104ac00/10b1800]
Not destroyed; running to end state and terminating there.
[Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] ikev2_packet_done: [104a800/0] Not
destroyed; running to end state and terminating there.
[Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 8381945
(ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv2
[Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] P1 SA 8381945 stop timer. timer
duration 30, reason 1.
[Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 8381945
(ref cnt 0), waiting_for_del 0x0
SRX acting as initiator:
************************
OpenIKED configuration:
=======================
ikev2 vpn_corp passive esp \
from 172.16.0.0/16 to 172.17.0.0/16 \
local 1.1.1.1 peer 2.2.2.2 \
ikesa auth hmac-sha2-256 enc aes-256 group modp2048 \
childsa auth hmac-sha2-256 enc aes-256 group modp2048 \
srcid 1.1.1.1 dstid 2.2.2.2 \
ikelifetime 28800 lifetime 3600 \
psk ********
OpenIKED log:
=============
ca_privkey_serialize: type RSA_KEY length 1190
ca_pubkey_serialize: type RSA_KEY length 270
/etc/iked.conf: loaded 1 configuration rules
config_getpolicy: received policy
ikev2 "vpn_corp" passive esp inet from 172.16.0.0/16 to 172.17.0.0/16 local
1.1.1.1 peer 2.2.2.2 ikesa enc aes-256 prf hmac-sha2-256,hmac-sha1,hmac-md5
auth hmac-sha2-256 group modp2048 childsa enc aes-256 auth hmac-sha2-256 group
modp2048 srcid 1.1.1.1 dstid 2.2.2.2 ikelifetime 28800 lifetime 3600 bytes
536870912 psk 0x********************************************
config_getpfkey: received pfkey fd 3
config_getcompile: compilation done
config_getsocket: received socket fd 4
config_getsocket: received socket fd 5
config_getsocket: received socket fd 7
config_getsocket: received socket fd 8
ca_reload: local cert type RSA_KEY
config_getocsp: ocsp_url none
ikev2_dispatch_cert: updated local CERTREQ type RSA_KEY length 0
ikev2_recv: IKE_SA_INIT request from initiator 2.2.2.2:500 to 1.1.1.1:500
policy 'vpn_corp' id 0, 474 bytes
ikev2_recv: ispi 0x4f2c7380eaddd91b rspi 0x0000000000000000
ikev2_policy2id: srcid IPV4/1.1.1.1 length 8
ikev2_pld_parse: header ispi 0x4f2c7380eaddd91b rspi 0x0000000000000000
nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x08 msgid 0 length 474
response 0
ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 48
ikev2_pld_sa: more 0 reserved 0 length 44 proposal #1 protoid IKE spisize 0
xforms 4 spi 0
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_2048
ikev2_pld_xform: more 0 reserved 0 length 8 type PRF id HMAC_SHA2_256
ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 264
ikev2_pld_ke: dh group MODP_2048 reserved 0
ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 36
ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28
ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP
ikev2_nat_detection: peer source 0x4f2c7380eaddd91b 0x0000000000000000
2.2.2.2:500
ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28
ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP
ikev2_nat_detection: peer destination 0x4f2c7380eaddd91b 0x0000000000000000
1.1.1.1:500
ikev2_pld_payloads: payload NOTIFY nextpayload VENDOR critical 0x00 length 10
ikev2_pld_notify: protoid NONE spisize 0 type <UNKNOWN:40002>
ikev2_pld_payloads: payload VENDOR nextpayload NONE critical 0x00 length 32
sa_state: INIT -> SA_INIT
ikev2_sa_negotiate: score 4
sa_stateok: SA_INIT flags 0x00, require 0x00
sa_stateflags: 0x00 -> 0x10 sa (required 0x00 )
ikev2_sa_keys: SKEYSEED with 32 bytes
ikev2_sa_keys: S with 80 bytes
ikev2_prfplus: T1 with 32 bytes
ikev2_prfplus: T2 with 32 bytes
ikev2_prfplus: T3 with 32 bytes
ikev2_prfplus: T4 with 32 bytes
ikev2_prfplus: T5 with 32 bytes
ikev2_prfplus: T6 with 32 bytes
ikev2_prfplus: T7 with 32 bytes
ikev2_prfplus: Tn with 224 bytes
ikev2_sa_keys: SK_d with 32 bytes
ikev2_sa_keys: SK_ai with 32 bytes
ikev2_sa_keys: SK_ar with 32 bytes
ikev2_sa_keys: SK_ei with 32 bytes
ikev2_sa_keys: SK_er with 32 bytes
ikev2_sa_keys: SK_pi with 32 bytes
ikev2_sa_keys: SK_pr with 32 bytes
ikev2_add_proposals: length 44
ikev2_next_payload: length 48 nextpayload KE
ikev2_next_payload: length 264 nextpayload NONCE
ikev2_next_payload: length 36 nextpayload NOTIFY
ikev2_nat_detection: local source 0x4f2c7380eaddd91b 0x3018825632b6f34b
1.1.1.1:500
ikev2_next_payload: length 28 nextpayload NOTIFY
ikev2_nat_detection: local destination 0x4f2c7380eaddd91b 0x3018825632b6f34b
2.2.2.2:500
ikev2_next_payload: length 28 nextpayload NONE
ikev2_pld_parse: header ispi 0x4f2c7380eaddd91b rspi 0x3018825632b6f34b
nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x20 msgid 0 length 432
response 1
ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 48
ikev2_pld_sa: more 0 reserved 0 length 44 proposal #1 protoid IKE spisize 0
xforms 4 spi 0
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048
ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 264
ikev2_pld_ke: dh group MODP_2048 reserved 0
ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 36
ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28
ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP
ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00 length 28
ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP
ikev2_msg_send: IKE_SA_INIT response from 1.1.1.1:500 to 2.2.2.2:500 msgid 0,
432 bytes
config_free_proposals: free 0xd0bbfa23480
ikev2_recv: IKE_AUTH request from initiator 2.2.2.2:500 to 1.1.1.1:500 policy
'vpn_corp' id 1, 256 bytes
ikev2_recv: ispi 0x4f2c7380eaddd91b rspi 0x3018825632b6f34b
ikev2_recv: updated SA to peer 2.2.2.2:500 local 1.1.1.1:500
ikev2_pld_parse: header ispi 0x4f2c7380eaddd91b rspi 0x3018825632b6f34b
nextpayload SK version 0x20 exchange IKE_AUTH flags 0x08 msgid 1 length 256
response 0
ikev2_pld_payloads: payload SK nextpayload IDi critical 0x00 length 228
ikev2_msg_decrypt: IV length 16
ikev2_msg_decrypt: encrypted payload length 192
ikev2_msg_decrypt: integrity checksum length 16
ikev2_msg_decrypt: integrity check succeeded
ikev2_msg_decrypt: decrypted payload length 192/192 padding 15
ikev2_pld_payloads: decrypted payload IDi nextpayload IDr critical 0x00 length
12
ikev2_pld_id: id IPV4/2.2.2.2 length 8
ikev2_pld_payloads: decrypted payload IDr nextpayload AUTH critical 0x00 length
12
ikev2_pld_id: id IPV4/1.1.1.1 length 8
ikev2_pld_id: unexpected id payload
ikev2_pld_payloads: decrypted payload AUTH nextpayload SA critical 0x00 length
40
ikev2_pld_auth: method SHARED_KEY_MIC length 32
sa_state: SA_INIT -> AUTH_REQUEST
ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00 length 44
ikev2_pld_sa: more 0 reserved 0 length 40 proposal #1 protoid ESP spisize 4
xforms 3 spi 0x436645cd
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE
ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length
24
ikev2_pld_ts: count 1 length 16
ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535
ikev2_pld_ts: start 172.17.0.0 end 172.17.255.255
ikev2_pld_payloads: decrypted payload TSr nextpayload NOTIFY critical 0x00
length 24
ikev2_pld_ts: count 1 length 16
ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535
ikev2_pld_ts: start 172.16.0.0 end 172.16.255.255
ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NOTIFY critical 0x00
length 8
ikev2_pld_notify: protoid NONE spisize 0 type INITIAL_CONTACT
ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NONE critical 0x00
length 12
ikev2_pld_notify: protoid NONE spisize 0 type SET_WINDOW_SIZE
sa_stateok: SA_INIT flags 0x00, require 0x00
policy_lookup: peerid '2.2.2.2'
ikev2_msg_auth: responder auth data length 496
ikev2_msg_auth: initiator auth data length 538
ikev2_msg_authverify: method SHARED_KEY_MIC keylen 32 type NONE
ikev2_msg_authverify: authentication successful
sa_state: AUTH_REQUEST -> AUTH_SUCCESS
sa_stateflags: 0x14 -> 0x1c auth,authvalid,sa (required 0x1c auth,authvalid,sa)
ikev2_sa_negotiate: score 4
sa_stateflags: 0x1c -> 0x1c auth,authvalid,sa (required 0x1c auth,authvalid,sa)
sa_stateok: VALID flags 0x1c, require 0x1c auth,authvalid,sa
sa_state: AUTH_SUCCESS -> VALID
sa_stateok: VALID flags 0x1c, require 0x1c auth,authvalid,sa
sa_stateok: VALID flags 0x1c, require 0x1c auth,authvalid,sa
ikev2_sa_tag: (0)
ikev2_childsa_negotiate: proposal 1
ikev2_childsa_negotiate: key material length 128
ikev2_prfplus: T1 with 32 bytes
ikev2_prfplus: T2 with 32 bytes
ikev2_prfplus: T3 with 32 bytes
ikev2_prfplus: T4 with 32 bytes
ikev2_prfplus: Tn with 128 bytes
pfkey_sa_getspi: spi 0xd67849f9
pfkey_sa_init: new spi 0xd67849f9
sa_stateok: VALID flags 0x1c, require 0x1c auth,authvalid,sa
ikev2_next_payload: length 12 nextpayload AUTH
ikev2_next_payload: length 40 nextpayload SA
ikev2_add_proposals: length 40
ikev2_next_payload: length 44 nextpayload TSi
ikev2_next_payload: length 24 nextpayload TSr
ikev2_next_payload: length 24 nextpayload NONE
ikev2_msg_encrypt: decrypted length 144
ikev2_msg_encrypt: padded length 160
ikev2_msg_encrypt: length 145, padding 15, output length 192
ikev2_next_payload: length 196 nextpayload IDr
ikev2_msg_integr: message length 224
ikev2_msg_integr: integrity checksum length 16
ikev2_pld_parse: header ispi 0x4f2c7380eaddd91b rspi 0x3018825632b6f34b
nextpayload SK version 0x20 exchange IKE_AUTH flags 0x20 msgid 1 length 224
response 1
ikev2_pld_payloads: payload SK nextpayload IDr critical 0x00 length 196
ikev2_msg_decrypt: IV length 16
ikev2_msg_decrypt: encrypted payload length 160
ikev2_msg_decrypt: integrity checksum length 16
ikev2_msg_decrypt: integrity check succeeded
ikev2_msg_decrypt: decrypted payload length 160/160 padding 15
ikev2_pld_payloads: decrypted payload IDr nextpayload AUTH critical 0x00 length
12
ikev2_pld_id: id IPV4/1.1.1.1 length 8
ikev2_pld_payloads: decrypted payload AUTH nextpayload SA critical 0x00 length
40
ikev2_pld_auth: method SHARED_KEY_MIC length 32
ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00 length 44
ikev2_pld_sa: more 0 reserved 0 length 40 proposal #1 protoid ESP spisize 4
xforms 3 spi 0xd67849f9
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE
ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length
24
ikev2_pld_ts: count 1 length 16
ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535
ikev2_pld_ts: start 172.17.0.0 end 172.17.255.255
ikev2_pld_payloads: decrypted payload TSr nextpayload NONE critical 0x00 length
24
ikev2_pld_ts: count 1 length 16
ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535
ikev2_pld_ts: start 172.16.0.0 end 172.16.255.255
ikev2_msg_send: IKE_AUTH response from 1.1.1.1:500 to 2.2.2.2:500 msgid 1, 224
bytes
pfkey_sa_add: update spi 0xd67849f9
ikev2_childsa_enable: loaded CHILD SA spi 0xd67849f9
pfkey_sa_add: add spi 0x436645cd
ikev2_childsa_enable: loaded CHILD SA spi 0x436645cd
ikev2_childsa_enable: loaded flow 0xd0b2fd22800
ikev2_childsa_enable: loaded flow 0xd0b2fd22c00
sa_state: VALID -> ESTABLISHED from 2.2.2.2:500 to 1.1.1.1:500 policy 'vpn_corp'
config_free_proposals: free 0xd0b17405c00
ca exiting, pid 32477
ikev1 exiting, pid 16823
ikev2 exiting, pid 30323
parent terminating
Juniper SRX configuration:
==========================
{primary:node0}[edit]
superman@juniper_srx-node0# show security ike
proposal ike-aes265-sha256-dh14-psk-28800 {
authentication-method pre-shared-keys;
dh-group group14;
authentication-algorithm sha-256;
encryption-algorithm aes-256-cbc;
lifetime-seconds 28800;
}
policy ikepol-vpn-corp {
mode main;
proposals ike-aes265-sha256-dh14-psk-28800;
pre-shared-key hexadecimal "*******************************************";
## SECRET-DATA
}
gateway gw-corp {
ike-policy ikepol-vpn-corp;
address 1.1.1.1;
external-interface reth0.1051;
local-address 2.2.2.2;
version v2-only;
}
{primary:node0}[edit]
superman@juniper_srx-node0# show security ipsec
proposal ipsec-aes256-sha256-3600 {
protocol esp;
authentication-algorithm hmac-sha-256-128;
encryption-algorithm aes-256-cbc;
lifetime-seconds 3600;
}
policy ipsecpol-vpn-corp {
perfect-forward-secrecy {
keys group14;
}
proposals ipsec-aes256-sha256-3600;
}
vpn ipsec-vpn-corp {
bind-interface st0.0;
ike {
gateway gw-corp;
proxy-identity {
local 172.17.0.0/16;
remote 172.16.0.0/16;
}
ipsec-policy ipsecpol-vpn-corp;
}
establish-tunnels immediately;
}
{primary:node0}[edit]
superman@juniper_srx-node0#
Juniper SRX log:
================
Mar 16 08:49:59 juniper_srx-node0 clear-log[18132]: logfile cleared
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_config_process_sa_cfg Find action
on ipsec-vpn-corp
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_config_process_sa_cfg action=1
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Found existing config for SA
ipsec-vpn-corp
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] kmd_ipsec_apply_sacfg: Resetting VPN
Monitoring parameters
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] sa_cfg = ipsec-vpn-corp and gateway =
gw-corp are linked, sa_cfg local addrss is: 2.2.2.2
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] S2S dist_id(0) gw_id(0) copied from
gateway to sa_cfg
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_config_stage_update_and_activate
update_required for sa_cfg = ipsec-vpn-corp
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1]
iked_sa_cfg_get_parent_sa_cfg_child_sas_count No parent for sa_cfg
ipsec-vpn-corp count is 0
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_deactivate_bind_interface: No more
NHTB entries are active for st0.0. Bringing down the interface
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] kmd_update_tunnel_interface:
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_update_tunnel_interface_by_ifname:
update ifl st0.0 status DOWN
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_stop_vpnm_timer: processing SA
ipsec-vpn-corp
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for
ipsec-vpn-corp config block
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer
entry for gateway gw-corp, local_port=500, remote_port=500
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_create_peer_entry: Created peer
entry 0x10c5e00 for local 2.2.2.2:500 remote 1.1.1.1:500
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_fetch_or_create_peer_entry: Create
peer entry 0x10c5e00 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw-corp, VR
id 0
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer
entry for gateway gw-corp
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Initiating new P1 SA for gateway gw-corp
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] P1 SA 8381946 start timer. timer
duration 30, reason 1.
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Set p2_ed
in sa_cfg=ipsec-vpn-corp
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_peer_insert_p1sa_entry: Insert p1
sa 8381946 in peer entry 0x10c5e00
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Convert
traffic selectors from V1 format to V2 format for narrowing/matching selectors
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet
104b000 from freelist
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_udp_window_update:
[104b000/10b1800] Stored packet into window fb3cc0
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ipsec_send: Started IPsec SA
creation 1.1.1.1;500
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] IKE SA fill called for negotiation of
local:2.2.2.2, remote:1.1.1.1 IKEv2
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 2048
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 14
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH
group 14
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys
using hardware for DH group 14
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1]
juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [44146]
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1]
juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request Parse
notification paylad in last received pkt
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for
local:2.2.2.2, remote:1.1.1.1 IKEv2
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request send
NHTB_SUPPORTED
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_udp_send_packet:
[104b000/10b1800] Sending packet using VR id 0
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_send: Registering
timeout at 10000 (10.0)
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_forward:
[104b400/10b1800] R: IKE SA REFCNT: 3
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_received - START
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_received:
Received Unauthenticated notification payload NAT detection source IP from
local:2.2.2.2 remote:1.1.1.1 IKEv2 for P1 SA 8381946
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_received - START
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_received:
Received Unauthenticated notification payload NAT detection destination IP from
local:2.2.2.2 remote:1.1.1.1 IKEv2 for P1 SA 8381946
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_decode_packet: [104b400/10b1800]
Updating responder IKE SPI to IKE SA 10b1800 I 4f2c7380 eaddd91b R 30188256
32b6f34b
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_udp_window_update:
[104b400/10b1800] STOP-RETRANSMIT: Response to request 104b000 with m-id 0
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_udp_window_update:
[104b400/10b1800] Stored packet into window fb3d20
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet
104b800 from freelist
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_udp_window_update:
[104b800/10b1800] Stored packet into window fb3cc0
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 2048
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 14
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH
group 14
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Peer public key has length 256
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async:
DH Compute Secs [0] USecs [30689]
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async:
Computed DH using hardware
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate:
local:2.2.2.2, remote:1.1.1.1 IKEv2
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Added (spi=0x436645cd, protocol=0)
entry to the spi table
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for
local:2.2.2.2, remote:1.1.1.1 IKEv2
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Ignoring notification of type 16389
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Ignoring notification of type 16388
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_conf_request: SA-CFG
ipsec-vpn-corp not configured for config payload. Skipping...
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request Parse
notification paylad in last received pkt
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for
local:2.2.2.2, remote:1.1.1.1 IKEv2
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Ignoring notification of type 16389
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Ignoring notification of type 16388
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request: Sending
Initial contact
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Sending IKE window size notification
for IKE SA of size 1
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Construction NHTB payload for
local:2.2.2.2, remote:1.1.1.1 IKEv2 P1 SA index 8381946 sa-cfg ipsec-vpn-corp
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Peer router vendor is not Juniper. Not
sending NHTB payload for sa-cfg ipsec-vpn-corp, p1_sa=8381946
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_udp_send_packet:
[104b800/10b1800] Sending packet using VR id 0
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_send: Registering
timeout at 10000 (10.0)
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_forward:
[104bc00/10b1800] R: IKE SA REFCNT: 3
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_done: [104b400/0]
Destroyed already. Thread completed. Freeing now.
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_udp_window_update:
[104bc00/10b1800] STOP-RETRANSMIT: Response to request 104b800 with m-id 1
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_udp_window_update:
[104bc00/10b1800] Stored packet into window fb3d20
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_sa_install:
local:2.2.2.2, remote:1.1.1.1 IKEv2 for SA-CFG ipsec-vpn-corp, rekey-ikev2:no
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for
local:2.2.2.2, remote:1.1.1.1 IKEv2
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Ignoring notification of type 16389
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Ignoring notification of type 16388
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_update_sa_cfg_port
sa_cfg(ipsec-vpn-corp) local_port(0) and remote_port(500)
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Setting lifetime 3600 and lifesize 0
for IPSec SA
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_sa_create: encr key len
32, auth key len: 32, salt len: 0
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Creating a SA spi=0x436645cd, proto=ESP
pair_index = 1
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Added (spi=0x436645cd, protocol=ESP
dst=2.2.2.2) entry to the peer hash table
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_peer_insert_sa_cfg_entry: insert
sa_cfg tunnel_id entry 131073 into peer entry 0x10c5e00
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Creating a SA spi=0xd67849f9, proto=ESP
pair_index = 1
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Added (spi=0xd67849f9, protocol=ESP
dst=1.1.1.1) entry to the peer hash table
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_nhtb_update_on_sa_create:
Interface st0.0 is P2P for sa_cfg ipsec-vpn-corp. Thus ignoring NHTB
notification message
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_sa_install: NHTB add
passed for sa-cfg ipsec-vpn-corp
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Hardlife timer started for inbound
ipsec-vpn-corp with 3600 seconds/0 kilobytes
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Softlife timer started for inbound
ipsec-vpn-corp with 2967 seconds/0 kilobytes
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] In iked_fill_sa_bundle
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ipsec-vpn-corp : VPN Monitor
Interval=0(0) Optimized=0(0)
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_fill_sa_bundle : DPD Interval=0
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] SA bundle remote gateway: IP 1.1.1.1
chosen
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] SA bundle local gateway: IP 2.2.2.2
chosen
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] In iked_fill_ipsec_ipc_sa_pair
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] In iked_fill_ipc_sa_keys
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] In iked_fill_ipc_sa_keys
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] In iked_fill_ipc_sa_keys
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] In iked_fill_ipc_sa_keys
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ----------------Voyager ipsec SA
BUNDLE-------------------
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] SA pair update request for:
Tunnel index: 131073
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Local Gateway address: 2.2.2.2
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Primary remote Gateway address:
1.1.1.1
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Backup remote Gateway State: Active
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Anti replay: counter-based enabled
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Window_size: 64
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Server Time: 0
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Peer : Static
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Mode : Tunnel
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] VPN Type : route-based
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Tunnel mtu: 0
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] DF bit: 0
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] local-if ifl idx: 74
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] tunnel-if ifl idx: 92
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Tunnel mtu: 0
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] DPD interval: 0
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] policy id: 0
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] NATT enabled: 0
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] NATT version: 0
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] NAT position: 0
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] SA Idle time: 0
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] SA Outbound install delay time: 1
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] IKED ID: 0
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] DIST ID: 0
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Keepalive interval: 0
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] VPN monitoring interval: 0
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] VPN monitoring optimized: 0
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Respond-bad-SPI: 0
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] seq_out: 0
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Local port: 0
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Remote port: 500
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] SA CFG name: ipsec-vpn-corp
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Dial-up IKE ID:
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] RG ID: 0
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Group template tunnel ID: 0
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ----------------Incoming SA
-------------------
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] SPI: 0x436645cd Protocol: 2
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Algorithm: 516 Auth key.
length: 32
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Encr key. length; 32
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ----------------Outgoing SA
-------------------
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] SPI: 0xd67849f9 Protocol: 2
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Algorithm: 516 Auth key.
length: 32
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Encr key. length; 32
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] In iked_ipsec_sa_pair_add Adding GENCFG
msg with key; Tunnel = 131073;SPI-In = 0x436645cd
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Added dependency on SA config blob with
tunnelid = 131073
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Successfully added ipsec SA PAIR
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Adding Phase2 Blob for Tunnel Id:
131073 SPI: 1130776013
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] kmd_update_tunnel_interface:
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_update_tunnel_interface_by_ifname:
update ifl st0.0 status UP
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2,
remote:1.1.1.1 IKEv2
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] IKE negotiation done for local:2.2.2.2,
remote:1.1.1.1 IKEv2 with status: Error ok
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for
local:2.2.2.2, remote:1.1.1.1 IKEv2
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Ignoring notification of type 16389
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Ignoring notification of type 16388
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: Success to create
or find peer_entry for local:2.2.2.2:500, remote:1.1.1.1:500 in ike sa done
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] P1 SA 8381946 stop timer. timer
duration 30, reason 1.
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] P1 SA 8381946 start timer. timer
duration 28800, reason 2.
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] lifetime timers started for p1_sa index
8381946 (hard 28800, soft 28221 secs)
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Preparing phase1 HA blob for p1-sa
8381946
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_prepare_phase1_ha_blob: P1 SA
8381946, phase1_blob->lifetime 28800, p1_sa->lifetime 28800
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Adding Phase 1 HA blob for P1 SA 8381946
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Inside iked_pm_ipsec_sa_done
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] IPSec negotiation done successfully
for SA-CFG ipsec-vpn-corp for local:2.2.2.2, remote:1.1.1.1 IKEv2
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] IPSec SA done callback. ed 10c4028.
status: Error ok
[Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: F: IKE SA REFCNT:
1
Regards,
Bernd