Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 21 Feb 2003 09:57:46 +1100
From:      "Scott Penno" <scott.penno@gennex.com.au>
To:        <freebsd-questions@freebsd.org>
Subject:   Re: INVALID-COOKIE msg with racoon
Message-ID:  <000a01c2d933$7e08f170$0203140a@jupiter>

next in thread | raw e-mail | index | archive | help
Just an update.  After some further testing, came to the conclusion that the
problem was with the Windows 2000 box.  I had the people responsible for the
other end replace the box and everything now works fine.

Scott.



----- Original Message -----
From: "Scott Penno" <scott.penno@gennex.com.au>
To: <freebsd-questions@freebsd.org>
Sent: Thursday, January 30, 2003 11:25 PM
Subject: INVALID-COOKIE msg with racoon


Hi all,

Not sure if this is the right forum for this question.  If there is
somewhere more appropriate, please let me know.

So, after a few problems I have racoon up and running.  I'm now getting
messages when communicating with another host about an invalid cookie (log
output attached below).  I have only a vague idea about what this means and
absolutely no idea about how to identify the problem or resolve it.  This
end is a box running 5.0-RC1 and the other end is a Windows 2000 box.  I can
succesfully establish SA's with other hosts from the FreeBSD box and the
Windows box can apparently establish SA's with other hosts as well.  Any
suggestions, much appreciated.

Regards,

Scott.



Foreground mode.
2003-01-30 14:16:27: INFO: main.c:172:main(): @(#)package version
freebsd-20021120a
2003-01-30 14:16:27: INFO: main.c:174:main(): @(#)internal version 20001216
sakane@kame.net
2003-01-30 14:16:27: INFO: main.c:175:main(): @(#)This product linked
OpenSSL 0.9.6g 9 Aug 2002 (http://www.openssl.org/)
2003-01-30 14:16:27: DEBUG: algorithm.c:610:alg_oakley_dhdef():
hmac(modp1024)
2003-01-30 14:16:27: DEBUG: pfkey.c:2243:pk_checkalg(): compression
algorithm can not be checked because sadb message doesn't support it.
2003-01-30 14:16:27: DEBUG: grabmyaddr.c:203:grab_myaddrs(): my interface:
a.b.c.d (bge0)
2003-01-30 14:16:27: DEBUG: grabmyaddr.c:203:grab_myaddrs(): my interface:
127.0.0.1 (lo0)
2003-01-30 14:16:27: DEBUG: grabmyaddr.c:468:autoconf_myaddrsport():
configuring default isakmp port.
2003-01-30 14:16:27: DEBUG: grabmyaddr.c:490:autoconf_myaddrsport(): 2 addrs
are configured successfully
2003-01-30 14:16:27: INFO: isakmp.c:1358:isakmp_open(): 127.0.0.1[500] used
as isakmp port (fd=5)
2003-01-30 14:16:27: INFO: isakmp.c:1358:isakmp_open(): a.b.c.d[500] used as
isakmp port (fd=6)
2003-01-30 14:16:27: DEBUG: pfkey.c:195:pfkey_handler(): get pfkey X_SPDDUMP
message
2003-01-30 14:16:27: DEBUG: pfkey.c:195:pfkey_handler(): get pfkey X_SPDDUMP
message
2003-01-30 14:16:27: DEBUG: policy.c:184:cmpspidxstrict(): sub:0xbfbff8f0:
w.x.y.z/32[0] a.b.c.d/32[0] proto=any dir=in
2003-01-30 14:16:27: DEBUG: policy.c:185:cmpspidxstrict(): db :0x80a2c08:
j.k.l.m/32[0] a.b.c.d/32[0] proto=any dir=in
2003-01-30 14:16:27: DEBUG: pfkey.c:195:pfkey_handler(): get pfkey X_SPDDUMP
message
2003-01-30 14:16:27: DEBUG: policy.c:184:cmpspidxstrict(): sub:0xbfbff8f0:
a.b.c.d/32[0] j.k.l.m/32[0] proto=any dir=out
2003-01-30 14:16:27: DEBUG: policy.c:185:cmpspidxstrict(): db :0x80a2c08:
j.k.l.m/32[0] a.b.c.d/32[0] proto=any dir=in
2003-01-30 14:16:27: DEBUG: policy.c:184:cmpspidxstrict(): sub:0xbfbff8f0:
a.b.c.d/32[0] j.k.l.m/32[0] proto=any dir=out
2003-01-30 14:16:27: DEBUG: policy.c:185:cmpspidxstrict(): db :0x80b5008:
w.x.y.z/32[0] a.b.c.d/32[0] proto=any dir=in
2003-01-30 14:16:27: DEBUG: pfkey.c:195:pfkey_handler(): get pfkey X_SPDDUMP
message
2003-01-30 14:16:27: DEBUG: policy.c:184:cmpspidxstrict(): sub:0xbfbff8f0:
a.b.c.d/32[0] w.x.y.z/32[0] proto=any dir=out
2003-01-30 14:16:27: DEBUG: policy.c:185:cmpspidxstrict(): db :0x80a2c08:
j.k.l.m/32[0] a.b.c.d/32[0] proto=any dir=in
2003-01-30 14:16:27: DEBUG: policy.c:184:cmpspidxstrict(): sub:0xbfbff8f0:
a.b.c.d/32[0] w.x.y.z/32[0] proto=any dir=out
2003-01-30 14:16:27: DEBUG: policy.c:185:cmpspidxstrict(): db :0x80b5008:
w.x.y.z/32[0] a.b.c.d/32[0] proto=any dir=in
2003-01-30 14:16:27: DEBUG: policy.c:184:cmpspidxstrict(): sub:0xbfbff8f0:
a.b.c.d/32[0] w.x.y.z/32[0] proto=any dir=out
2003-01-30 14:16:27: DEBUG: policy.c:185:cmpspidxstrict(): db :0x80b5408:
a.b.c.d/32[0] j.k.l.m/32[0] proto=any dir=out
2003-01-30 14:17:04: DEBUG: isakmp.c:221:isakmp_handler(): ===
2003-01-30 14:17:04: DEBUG: isakmp.c:222:isakmp_handler(): 108 bytes message
received from w.x.y.z[500]
2003-01-30 14:17:04: DEBUG: plog.c:193:plogdump():
ebce80ff c9844274 00000000 00000000 01100200 00000000 0000006c 0d000038
00000001 00000001 0000002c 01010001 00000024 01010000 80010005 80020002
80040002 80030001 800b0001 000c0004 00000258 00000018 1e2b5169 05991c7d
7c96fcbf b587e461 00000002
2003-01-30 14:17:04: DEBUG: isakmp.c:2248:isakmp_printpacket(): begin.
17:04.139186 w.x.y.z:500 -> a.b.c.d:500: isakmp 1.0 msgid 00000000 cookie
ebce80ffc9844274->0000000000000000: phase 1 I ident:
    (sa: doi=ipsec situation=identity
        (p: #1 protoid=isakmp transform=1
            (t: #1 id=ike (type=enc value=3des)(type=hash
value=sha1)(type=group desc value=modp1024)(type=auth
value=preshared)(type=lifetype value=sec)(type=lifeduration len=4
value=00000258))))
    (vid: len=20)
2003-01-30 14:17:04: DEBUG: remoteconf.c:129:getrmconf(): anonymous
configuration selected for w.x.y.z[500].
2003-01-30 14:17:04: DEBUG: isakmp.c:889:isakmp_ph1begin_r(): ===
2003-01-30 14:17:04: INFO: isakmp.c:894:isakmp_ph1begin_r(): respond new
phase 1 negotiation: a.b.c.d[500]<=>w.x.y.z[500]
2003-01-30 14:17:04: INFO: isakmp.c:899:isakmp_ph1begin_r(): begin Identity
Protection mode.
2003-01-30 14:17:04: DEBUG: isakmp.c:1112:isakmp_parsewoh(): begin.
2003-01-30 14:17:04: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen
nptype=1(sa)
2003-01-30 14:17:04: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen
nptype=13(vid)
2003-01-30 14:17:04: DEBUG: isakmp.c:1178:isakmp_parsewoh(): succeed.
2003-01-30 14:17:04: INFO: vendorid.c:128:check_vendorid(): received Vendor
ID: MS NT5 ISAKMPOAKLEY
2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1117:get_proppair(): total SA len=52
2003-01-30 14:17:04: DEBUG: plog.c:193:plogdump():
00000001 00000001 0000002c 01010001 00000024 01010000 80010005 80020002
80040002 80030001 800b0001 000c0004 00000258
2003-01-30 14:17:04: DEBUG: isakmp.c:1112:isakmp_parsewoh(): begin.
2003-01-30 14:17:04: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen
nptype=2(prop)
2003-01-30 14:17:04: DEBUG: isakmp.c:1178:isakmp_parsewoh(): succeed.
2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1170:get_proppair(): proposal #1
len=44
2003-01-30 14:17:04: DEBUG: isakmp.c:1112:isakmp_parsewoh(): begin.
2003-01-30 14:17:04: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen
nptype=3(trns)
2003-01-30 14:17:04: DEBUG: isakmp.c:1178:isakmp_parsewoh(): succeed.
2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1311:get_transform(): transform #1
len=36
2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1870:check_attr_isakmp():
type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
2003-01-30 14:17:04: DEBUG: algorithm.c:382:alg_oakley_encdef():
encription(3des)
2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1870:check_attr_isakmp(): type=Hash
Algorithm, flag=0x8000, lorv=SHA
2003-01-30 14:17:04: DEBUG: algorithm.c:252:alg_oakley_hashdef(): hash(sha1)
2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1870:check_attr_isakmp(): type=Group
Description, flag=0x8000, lorv=1024-bit MODP group
2003-01-30 14:17:04: DEBUG: algorithm.c:610:alg_oakley_dhdef():
hmac(modp1024)
2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1870:check_attr_isakmp():
type=Authentication Method, flag=0x8000, lorv=pre-shared key
2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1870:check_attr_isakmp(): type=Life
Type, flag=0x8000, lorv=seconds
2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1870:check_attr_isakmp(): type=Life
Duration, flag=0x0000, lorv=4
2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1213:get_proppair(): pair 1:
2003-01-30 14:17:04: DEBUG: proposal.c:892:print_proppair0():  0x80a83d0:
next=0x0 tnext=0x0
2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1248:get_proppair(): proposal #1: 1
transform
2003-01-30 14:17:04: DEBUG: ipsec_doi.c:322:get_ph1approvalx(): prop#=1,
prot-id=ISAKMP, spi-size=0, #trns=1
2003-01-30 14:17:04: DEBUG: ipsec_doi.c:327:get_ph1approvalx(): trns#=1,
trns-id=IKE
2003-01-30 14:17:04: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Encryption
Algorithm, flag=0x8000, lorv=3DES-CBC
2003-01-30 14:17:04: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Hash
Algorithm, flag=0x8000, lorv=SHA
2003-01-30 14:17:04: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Group
Description, flag=0x8000, lorv=1024-bit MODP group
2003-01-30 14:17:04: DEBUG: ipsec_doi.c:491:t2isakmpsa():
type=Authentication Method, flag=0x8000, lorv=pre-shared key
2003-01-30 14:17:04: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Life Type,
flag=0x8000, lorv=seconds
2003-01-30 14:17:04: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Life
Duration, flag=0x0000, lorv=4
2003-01-30 14:17:04: DEBUG: ipsec_doi.c:338:get_ph1approvalx(): Compared:
DB:Peer
2003-01-30 14:17:04: DEBUG: ipsec_doi.c:339:get_ph1approvalx(): (lifetime =
600:600)
2003-01-30 14:17:04: DEBUG: ipsec_doi.c:341:get_ph1approvalx(): (lifebyte =
0:0)
2003-01-30 14:17:04: DEBUG: ipsec_doi.c:343:get_ph1approvalx(): enctype =
3DES-CBC:3DES-CBC
2003-01-30 14:17:04: DEBUG: ipsec_doi.c:348:get_ph1approvalx(): (encklen =
0:0)
2003-01-30 14:17:04: DEBUG: ipsec_doi.c:350:get_ph1approvalx(): hashtype =
SHA:SHA
2003-01-30 14:17:04: DEBUG: ipsec_doi.c:355:get_ph1approvalx(): authmethod =
pre-shared key:pre-shared key
2003-01-30 14:17:04: DEBUG: ipsec_doi.c:360:get_ph1approvalx(): dh_group =
1024-bit MODP group:1024-bit MODP group
2003-01-30 14:17:04: DEBUG: ipsec_doi.c:248:get_ph1approval(): an acceptable
proposal found.
2003-01-30 14:17:04: DEBUG: algorithm.c:610:alg_oakley_dhdef():
hmac(modp1024)
2003-01-30 14:17:04: DEBUG: isakmp.c:1996:isakmp_newcookie(): new cookie:
af50325ecf59c5f7
2003-01-30 14:17:04: DEBUG: isakmp.c:2113:set_isakmp_payload(): add payload
of len 52, next type 13
2003-01-30 14:17:04: DEBUG: isakmp.c:2113:set_isakmp_payload(): add payload
of len 16, next type 0
2003-01-30 14:17:04: DEBUG: isakmp.c:2248:isakmp_printpacket(): begin.
17:04.143131 a.b.c.d:500 -> w.x.y.z:500: isakmp 1.0 msgid 00000000 cookie
ebce80ffc9844274->af50325ecf59c5f7: phase 1 ? ident:
    (sa: doi=ipsec situation=identity
        (p: #1 protoid=isakmp transform=1
            (t: #1 id=ike (type=enc value=3des)(type=hash
value=sha1)(type=group desc value=modp1024)(type=auth
value=preshared)(type=lifetype value=sec)(type=lifeduration len=4
value=00000258))))
    (vid: len=16)
2003-01-30 14:17:04: DEBUG: sockmisc.c:421:sendfromto(): sockname
a.b.c.d[500]
2003-01-30 14:17:04: DEBUG: sockmisc.c:423:sendfromto(): send packet from
a.b.c.d[500]
2003-01-30 14:17:04: DEBUG: sockmisc.c:425:sendfromto(): send packet to
w.x.y.z[500]
2003-01-30 14:17:04: DEBUG: sockmisc.c:570:sendfromto(): 1 times of 104
bytes message will be sent to a.b.c.d[500]
2003-01-30 14:17:04: DEBUG: plog.c:193:plogdump():
ebce80ff c9844274 af50325e cf59c5f7 01100200 00000000 00000068 0d000038
00000001 00000001 0000002c 01010001 00000024 01010000 80010005 80020002
80040002 80030001 800b0001 000c0004 00000258 00000014 7003cbc1 097dbe9c
2600ba69 83bc8b35
2003-01-30 14:17:04: DEBUG: isakmp.c:1449:isakmp_ph1resend(): resend phase1
packet ebce80ffc9844274:af50325ecf59c5f7
2003-01-30 14:17:04: DEBUG: isakmp.c:221:isakmp_handler(): ===
2003-01-30 14:17:04: DEBUG: isakmp.c:222:isakmp_handler(): 56 bytes message
received from w.x.y.z[500]
2003-01-30 14:17:04: DEBUG: plog.c:193:plogdump():
ebce80ff c9844274 af50325e cf59c5f7 0b100500 3757cd15 00000038 0000001c
00000001 01100004 ebce80ff c9844274 af50325e cf59c5f7
2003-01-30 14:17:04: DEBUG: isakmp.c:2248:isakmp_printpacket(): begin.
17:04.496813 w.x.y.z:500 -> a.b.c.d:500: isakmp 1.0 msgid 3757cd15 cookie
ebce80ffc9844274->af50325ecf59c5f7: phase 2/others ? inf:
    (n: doi=ipsec proto=isakmp type=INVALID-COOKIE
spi=ebce80ffc9844274af50325ecf59c5f7)
2003-01-30 14:17:04: DEBUG: isakmp_inf.c:115:isakmp_info_recv(): receive
Information.
2003-01-30 14:17:04: DEBUG: isakmp.c:1112:isakmp_parsewoh(): begin.
2003-01-30 14:17:04: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen
nptype=11(notify)
2003-01-30 14:17:04: DEBUG: isakmp.c:1178:isakmp_parsewoh(): succeed.
2003-01-30 14:17:04: ERROR: isakmp_inf.c:776:isakmp_info_recv_n(): unknown
notify message, no phase2 handle found.
2003-01-30 14:17:04: DEBUG: isakmp_inf.c:798:isakmp_info_recv_n():
notification message 4:INVALID-COOKIE, doi=1 proto_id=1 spi=ebce80ffc9844274
af50325ecf59c5f7 (size=16).
2003-01-30 14:17:05: DEBUG: isakmp.c:221:isakmp_handler(): ===
2003-01-30 14:17:05: DEBUG: isakmp.c:222:isakmp_handler(): 108 bytes message
received from w.x.y.z[500]
2003-01-30 14:17:05: DEBUG: plog.c:193:plogdump():
ebce80ff c9844274 00000000 00000000 01100200 00000000 0000006c 0d000038
00000001 00000001 0000002c 01010001 00000024 01010000 80010005 80020002
80040002 80030001 800b0001 000c0004 00000258 00000018 1e2b5169 05991c7d
7c96fcbf b587e461 00000002
2003-01-30 14:17:05: DEBUG: sockmisc.c:421:sendfromto(): sockname
a.b.c.d[500]
2003-01-30 14:17:05: DEBUG: sockmisc.c:423:sendfromto(): send packet from
a.b.c.d[500]
2003-01-30 14:17:05: DEBUG: sockmisc.c:425:sendfromto(): send packet to
w.x.y.z[500]
2003-01-30 14:17:05: DEBUG: sockmisc.c:570:sendfromto(): 1 times of 104
bytes message will be sent to a.b.c.d[500]
2003-01-30 14:17:05: DEBUG: plog.c:193:plogdump():
ebce80ff c9844274 af50325e cf59c5f7 01100200 00000000 00000068 0d000038
00000001 00000001 0000002c 01010001 00000024 01010000 80010005 80020002
80040002 80030001 800b0001 000c0004 00000258 00000014 7003cbc1 097dbe9c
2600ba69 83bc8b35
2003-01-30 14:17:05: NOTIFY: isakmp.c:255:isakmp_handler(): the packet is
retransmitted by w.x.y.z[500].
2003-01-30 14:17:05: DEBUG: isakmp.c:221:isakmp_handler(): ===
2003-01-30 14:17:05: DEBUG: isakmp.c:222:isakmp_handler(): 56 bytes message
received from w.x.y.z[500]
2003-01-30 14:17:05: DEBUG: plog.c:193:plogdump():
ebce80ff c9844274 af50325e cf59c5f7 0b100500 0d1aca76 00000038 0000001c
00000001 01100004 ebce80ff c9844274 af50325e cf59c5f7
2003-01-30 14:17:05: DEBUG: isakmp.c:2248:isakmp_printpacket(): begin.
17:05.544438 w.x.y.z:500 -> a.b.c.d:500: isakmp 1.0 msgid 0d1aca76 cookie
ebce80ffc9844274->af50325ecf59c5f7: phase 2/others ? inf:
    (n: doi=ipsec proto=isakmp type=INVALID-COOKIE
spi=ebce80ffc9844274af50325ecf59c5f7)
2003-01-30 14:17:05: DEBUG: isakmp_inf.c:115:isakmp_info_recv(): receive
Information.
2003-01-30 14:17:05: DEBUG: isakmp.c:1112:isakmp_parsewoh(): begin.
2003-01-30 14:17:05: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen
nptype=11(notify)
2003-01-30 14:17:05: DEBUG: isakmp.c:1178:isakmp_parsewoh(): succeed.
2003-01-30 14:17:05: ERROR: isakmp_inf.c:776:isakmp_info_recv_n(): unknown
notify message, no phase2 handle found.
2003-01-30 14:17:05: DEBUG: isakmp_inf.c:798:isakmp_info_recv_n():
notification message 4:INVALID-COOKIE, doi=1 proto_id=1 spi=ebce80ffc9844274
af50325ecf59c5f7 (size=16).
2003-01-30 14:17:07: DEBUG: isakmp.c:221:isakmp_handler(): ===
2003-01-30 14:17:07: DEBUG: isakmp.c:222:isakmp_handler(): 108 bytes message
received from w.x.y.z[500]
2003-01-30 14:17:07: DEBUG: plog.c:193:plogdump():
ebce80ff c9844274 00000000 00000000 01100200 00000000 0000006c 0d000038
00000001 00000001 0000002c 01010001 00000024 01010000 80010005 80020002
80040002 80030001 800b0001 000c0004 00000258 00000014 7003cbc1 097dbe9c
2600ba69 83bc8b35
2003-01-30 14:17:07: NOTIFY: isakmp.c:255:isakmp_handler(): the packet is
retransmitted by w.x.y.z[500].
2003-01-30 14:17:07: DEBUG: isakmp.c:221:isakmp_handler(): ===
2003-01-30 14:17:07: DEBUG: isakmp.c:222:isakmp_handler(): 56 bytes message
received from w.x.y.z[500]
2003-01-30 14:17:07: DEBUG: plog.c:193:plogdump():
ebce80ff c9844274 af50325e cf59c5f7 0b100500 9d0ce48a 00000038 0000001c
00000001 01100004 ebce80ff c9844274 af50325e cf59c5f7
2003-01-30 14:17:07: DEBUG: isakmp.c:2248:isakmp_printpacket(): begin.
17:07.559022 w.x.y.z:500 -> a.b.c.d:500: isakmp 1.0 msgid 9d0ce48a cookie
ebce80ffc9844274->af50325ecf59c5f7: phase 2/others ? inf:
    (n: doi=ipsec proto=isakmp type=INVALID-COOKIE
spi=ebce80ffc9844274af50325ecf59c5f7)
2003-01-30 14:17:07: DEBUG: isakmp_inf.c:115:isakmp_info_recv(): receive
Information.
2003-01-30 14:17:07: DEBUG: isakmp.c:1112:isakmp_parsewoh(): begin.
2003-01-30 14:17:07: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen
nptype=11(notify)
2003-01-30 14:17:07: DEBUG: isakmp.c:1178:isakmp_parsewoh(): succeed.
2003-01-30 14:17:07: ERROR: isakmp_inf.c:776:isakmp_info_recv_n(): unknown
notify message, no phase2 handle found.
2003-01-30 14:17:07: DEBUG: isakmp_inf.c:798:isakmp_info_recv_n():
notification message 4:INVALID-COOKIE, doi=1 proto_id=1 spi=ebce80ffc9844274
af50325ecf59c5f7 (size=16).
2003-01-30 14:17:11: DEBUG: isakmp.c:221:isakmp_handler(): ===
2003-01-30 14:17:11: DEBUG: isakmp.c:222:isakmp_handler(): 108 bytes message
received from w.x.y.z[500]
2003-01-30 14:17:11: DEBUG: plog.c:193:plogdump():
ebce80ff c9844274 00000000 00000000 01100200 00000000 0000006c 0d000038
00000001 00000001 0000002c 01010001 00000024 01010000 80010005 80020002
80040002 80030001 800b0001 000c0004 00000258 00000018 1e2b5169 05991c7d
7c96fcbf b587e461 00000002
2003-01-30 14:17:11: DEBUG: sockmisc.c:421:sendfromto(): sockname
a.b.c.d[500]
2003-01-30 14:17:11: DEBUG: sockmisc.c:423:sendfromto(): send packet from
a.b.c.d[500]
2003-01-30 14:17:11: DEBUG: sockmisc.c:425:sendfromto(): send packet to
w.x.y.z[500]
2003-01-30 14:17:11: DEBUG: sockmisc.c:570:sendfromto(): 1 times of 104
bytes message will be sent to a.b.c.d[500]
2003-01-30 14:17:11: DEBUG: plog.c:193:plogdump():
ebce80ff c9844274 af50325e cf59c5f7 01100200 00000000 00000068 0d000038
00000001 00000001 0000002c 01010001 00000024 01010000 80010005 80020002
80040002 80030001 800b0001 000c0004 00000258 00000014 7003cbc1 097dbe9c
2600ba69 83bc8b35
2003-01-30 14:17:11: NOTIFY: isakmp.c:255:isakmp_handler(): the packet is
retransmitted by w.x.y.z[500].
2003-01-30 14:17:11: DEBUG: isakmp.c:221:isakmp_handler(): ===
2003-01-30 14:17:11: DEBUG: isakmp.c:222:isakmp_handler(): 56 bytes message
received from w.x.y.z[500]
2003-01-30 14:17:11: DEBUG: plog.c:193:plogdump():
ebce80ff c9844274 af50325e cf59c5f7 0b100500 78707fb7 00000038 0000001c
00000001 01100004 ebce80ff c9844274 af50325e cf59c5f7
2003-01-30 14:17:11: DEBUG: isakmp.c:2248:isakmp_printpacket(): begin.
17:11.553946 w.x.y.z:500 -> a.b.c.d:500: isakmp 1.0 msgid 78707fb7 cookie
ebce80ffc9844274->af50325ecf59c5f7: phase 2/others ? inf:
    (n: doi=ipsec proto=isakmp type=INVALID-COOKIE
spi=ebce80ffc9844274af50325ecf59c5f7)







To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?000a01c2d933$7e08f170$0203140a>