From owner-freebsd-questions Thu Feb 20 14:58:13 2003 Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 5AF1C37B401 for ; Thu, 20 Feb 2003 14:58:04 -0800 (PST) Received: from mercury.gennex.com.au (CPE-144-132-31-160.vic.bigpond.net.au [144.132.31.160]) by mx1.FreeBSD.org (Postfix) with ESMTP id 295B343FA3 for ; Thu, 20 Feb 2003 14:58:01 -0800 (PST) (envelope-from scott.penno@gennex.com.au) Received: from jupiter (atimel.gennex.com.au [210.50.122.178]) by mercury.gennex.com.au (8.12.3/8.12.3) with SMTP id h1KMvllp039936 for ; Fri, 21 Feb 2003 09:57:54 +1100 (EST) (envelope-from scott.penno@gennex.com.au) Message-ID: <000a01c2d933$7e08f170$0203140a@jupiter> From: "Scott Penno" To: Subject: Re: INVALID-COOKIE msg with racoon Date: Fri, 21 Feb 2003 09:57:46 +1100 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2800.1106 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106 Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG Just an update. After some further testing, came to the conclusion that the problem was with the Windows 2000 box. I had the people responsible for the other end replace the box and everything now works fine. Scott. ----- Original Message ----- From: "Scott Penno" To: Sent: Thursday, January 30, 2003 11:25 PM Subject: INVALID-COOKIE msg with racoon Hi all, Not sure if this is the right forum for this question. If there is somewhere more appropriate, please let me know. So, after a few problems I have racoon up and running. I'm now getting messages when communicating with another host about an invalid cookie (log output attached below). I have only a vague idea about what this means and absolutely no idea about how to identify the problem or resolve it. This end is a box running 5.0-RC1 and the other end is a Windows 2000 box. I can succesfully establish SA's with other hosts from the FreeBSD box and the Windows box can apparently establish SA's with other hosts as well. Any suggestions, much appreciated. Regards, Scott. Foreground mode. 2003-01-30 14:16:27: INFO: main.c:172:main(): @(#)package version freebsd-20021120a 2003-01-30 14:16:27: INFO: main.c:174:main(): @(#)internal version 20001216 sakane@kame.net 2003-01-30 14:16:27: INFO: main.c:175:main(): @(#)This product linked OpenSSL 0.9.6g 9 Aug 2002 (http://www.openssl.org/) 2003-01-30 14:16:27: DEBUG: algorithm.c:610:alg_oakley_dhdef(): hmac(modp1024) 2003-01-30 14:16:27: DEBUG: pfkey.c:2243:pk_checkalg(): compression algorithm can not be checked because sadb message doesn't support it. 2003-01-30 14:16:27: DEBUG: grabmyaddr.c:203:grab_myaddrs(): my interface: a.b.c.d (bge0) 2003-01-30 14:16:27: DEBUG: grabmyaddr.c:203:grab_myaddrs(): my interface: 127.0.0.1 (lo0) 2003-01-30 14:16:27: DEBUG: grabmyaddr.c:468:autoconf_myaddrsport(): configuring default isakmp port. 2003-01-30 14:16:27: DEBUG: grabmyaddr.c:490:autoconf_myaddrsport(): 2 addrs are configured successfully 2003-01-30 14:16:27: INFO: isakmp.c:1358:isakmp_open(): 127.0.0.1[500] used as isakmp port (fd=5) 2003-01-30 14:16:27: INFO: isakmp.c:1358:isakmp_open(): a.b.c.d[500] used as isakmp port (fd=6) 2003-01-30 14:16:27: DEBUG: pfkey.c:195:pfkey_handler(): get pfkey X_SPDDUMP message 2003-01-30 14:16:27: DEBUG: pfkey.c:195:pfkey_handler(): get pfkey X_SPDDUMP message 2003-01-30 14:16:27: DEBUG: policy.c:184:cmpspidxstrict(): sub:0xbfbff8f0: w.x.y.z/32[0] a.b.c.d/32[0] proto=any dir=in 2003-01-30 14:16:27: DEBUG: policy.c:185:cmpspidxstrict(): db :0x80a2c08: j.k.l.m/32[0] a.b.c.d/32[0] proto=any dir=in 2003-01-30 14:16:27: DEBUG: pfkey.c:195:pfkey_handler(): get pfkey X_SPDDUMP message 2003-01-30 14:16:27: DEBUG: policy.c:184:cmpspidxstrict(): sub:0xbfbff8f0: a.b.c.d/32[0] j.k.l.m/32[0] proto=any dir=out 2003-01-30 14:16:27: DEBUG: policy.c:185:cmpspidxstrict(): db :0x80a2c08: j.k.l.m/32[0] a.b.c.d/32[0] proto=any dir=in 2003-01-30 14:16:27: DEBUG: policy.c:184:cmpspidxstrict(): sub:0xbfbff8f0: a.b.c.d/32[0] j.k.l.m/32[0] proto=any dir=out 2003-01-30 14:16:27: DEBUG: policy.c:185:cmpspidxstrict(): db :0x80b5008: w.x.y.z/32[0] a.b.c.d/32[0] proto=any dir=in 2003-01-30 14:16:27: DEBUG: pfkey.c:195:pfkey_handler(): get pfkey X_SPDDUMP message 2003-01-30 14:16:27: DEBUG: policy.c:184:cmpspidxstrict(): sub:0xbfbff8f0: a.b.c.d/32[0] w.x.y.z/32[0] proto=any dir=out 2003-01-30 14:16:27: DEBUG: policy.c:185:cmpspidxstrict(): db :0x80a2c08: j.k.l.m/32[0] a.b.c.d/32[0] proto=any dir=in 2003-01-30 14:16:27: DEBUG: policy.c:184:cmpspidxstrict(): sub:0xbfbff8f0: a.b.c.d/32[0] w.x.y.z/32[0] proto=any dir=out 2003-01-30 14:16:27: DEBUG: policy.c:185:cmpspidxstrict(): db :0x80b5008: w.x.y.z/32[0] a.b.c.d/32[0] proto=any dir=in 2003-01-30 14:16:27: DEBUG: policy.c:184:cmpspidxstrict(): sub:0xbfbff8f0: a.b.c.d/32[0] w.x.y.z/32[0] proto=any dir=out 2003-01-30 14:16:27: DEBUG: policy.c:185:cmpspidxstrict(): db :0x80b5408: a.b.c.d/32[0] j.k.l.m/32[0] proto=any dir=out 2003-01-30 14:17:04: DEBUG: isakmp.c:221:isakmp_handler(): === 2003-01-30 14:17:04: DEBUG: isakmp.c:222:isakmp_handler(): 108 bytes message received from w.x.y.z[500] 2003-01-30 14:17:04: DEBUG: plog.c:193:plogdump(): ebce80ff c9844274 00000000 00000000 01100200 00000000 0000006c 0d000038 00000001 00000001 0000002c 01010001 00000024 01010000 80010005 80020002 80040002 80030001 800b0001 000c0004 00000258 00000018 1e2b5169 05991c7d 7c96fcbf b587e461 00000002 2003-01-30 14:17:04: DEBUG: isakmp.c:2248:isakmp_printpacket(): begin. 17:04.139186 w.x.y.z:500 -> a.b.c.d:500: isakmp 1.0 msgid 00000000 cookie ebce80ffc9844274->0000000000000000: phase 1 I ident: (sa: doi=ipsec situation=identity (p: #1 protoid=isakmp transform=1 (t: #1 id=ike (type=enc value=3des)(type=hash value=sha1)(type=group desc value=modp1024)(type=auth value=preshared)(type=lifetype value=sec)(type=lifeduration len=4 value=00000258)))) (vid: len=20) 2003-01-30 14:17:04: DEBUG: remoteconf.c:129:getrmconf(): anonymous configuration selected for w.x.y.z[500]. 2003-01-30 14:17:04: DEBUG: isakmp.c:889:isakmp_ph1begin_r(): === 2003-01-30 14:17:04: INFO: isakmp.c:894:isakmp_ph1begin_r(): respond new phase 1 negotiation: a.b.c.d[500]<=>w.x.y.z[500] 2003-01-30 14:17:04: INFO: isakmp.c:899:isakmp_ph1begin_r(): begin Identity Protection mode. 2003-01-30 14:17:04: DEBUG: isakmp.c:1112:isakmp_parsewoh(): begin. 2003-01-30 14:17:04: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=1(sa) 2003-01-30 14:17:04: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=13(vid) 2003-01-30 14:17:04: DEBUG: isakmp.c:1178:isakmp_parsewoh(): succeed. 2003-01-30 14:17:04: INFO: vendorid.c:128:check_vendorid(): received Vendor ID: MS NT5 ISAKMPOAKLEY 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1117:get_proppair(): total SA len=52 2003-01-30 14:17:04: DEBUG: plog.c:193:plogdump(): 00000001 00000001 0000002c 01010001 00000024 01010000 80010005 80020002 80040002 80030001 800b0001 000c0004 00000258 2003-01-30 14:17:04: DEBUG: isakmp.c:1112:isakmp_parsewoh(): begin. 2003-01-30 14:17:04: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=2(prop) 2003-01-30 14:17:04: DEBUG: isakmp.c:1178:isakmp_parsewoh(): succeed. 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1170:get_proppair(): proposal #1 len=44 2003-01-30 14:17:04: DEBUG: isakmp.c:1112:isakmp_parsewoh(): begin. 2003-01-30 14:17:04: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=3(trns) 2003-01-30 14:17:04: DEBUG: isakmp.c:1178:isakmp_parsewoh(): succeed. 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1311:get_transform(): transform #1 len=36 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1870:check_attr_isakmp(): type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC 2003-01-30 14:17:04: DEBUG: algorithm.c:382:alg_oakley_encdef(): encription(3des) 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1870:check_attr_isakmp(): type=Hash Algorithm, flag=0x8000, lorv=SHA 2003-01-30 14:17:04: DEBUG: algorithm.c:252:alg_oakley_hashdef(): hash(sha1) 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1870:check_attr_isakmp(): type=Group Description, flag=0x8000, lorv=1024-bit MODP group 2003-01-30 14:17:04: DEBUG: algorithm.c:610:alg_oakley_dhdef(): hmac(modp1024) 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1870:check_attr_isakmp(): type=Authentication Method, flag=0x8000, lorv=pre-shared key 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1870:check_attr_isakmp(): type=Life Type, flag=0x8000, lorv=seconds 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1870:check_attr_isakmp(): type=Life Duration, flag=0x0000, lorv=4 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1213:get_proppair(): pair 1: 2003-01-30 14:17:04: DEBUG: proposal.c:892:print_proppair0(): 0x80a83d0: next=0x0 tnext=0x0 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1248:get_proppair(): proposal #1: 1 transform 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:322:get_ph1approvalx(): prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:327:get_ph1approvalx(): trns#=1, trns-id=IKE 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Hash Algorithm, flag=0x8000, lorv=SHA 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Group Description, flag=0x8000, lorv=1024-bit MODP group 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Authentication Method, flag=0x8000, lorv=pre-shared key 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Life Type, flag=0x8000, lorv=seconds 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Life Duration, flag=0x0000, lorv=4 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:338:get_ph1approvalx(): Compared: DB:Peer 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:339:get_ph1approvalx(): (lifetime = 600:600) 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:341:get_ph1approvalx(): (lifebyte = 0:0) 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:343:get_ph1approvalx(): enctype = 3DES-CBC:3DES-CBC 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:348:get_ph1approvalx(): (encklen = 0:0) 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:350:get_ph1approvalx(): hashtype = SHA:SHA 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:355:get_ph1approvalx(): authmethod = pre-shared key:pre-shared key 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:360:get_ph1approvalx(): dh_group = 1024-bit MODP group:1024-bit MODP group 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:248:get_ph1approval(): an acceptable proposal found. 2003-01-30 14:17:04: DEBUG: algorithm.c:610:alg_oakley_dhdef(): hmac(modp1024) 2003-01-30 14:17:04: DEBUG: isakmp.c:1996:isakmp_newcookie(): new cookie: af50325ecf59c5f7 2003-01-30 14:17:04: DEBUG: isakmp.c:2113:set_isakmp_payload(): add payload of len 52, next type 13 2003-01-30 14:17:04: DEBUG: isakmp.c:2113:set_isakmp_payload(): add payload of len 16, next type 0 2003-01-30 14:17:04: DEBUG: isakmp.c:2248:isakmp_printpacket(): begin. 17:04.143131 a.b.c.d:500 -> w.x.y.z:500: isakmp 1.0 msgid 00000000 cookie ebce80ffc9844274->af50325ecf59c5f7: phase 1 ? ident: (sa: doi=ipsec situation=identity (p: #1 protoid=isakmp transform=1 (t: #1 id=ike (type=enc value=3des)(type=hash value=sha1)(type=group desc value=modp1024)(type=auth value=preshared)(type=lifetype value=sec)(type=lifeduration len=4 value=00000258)))) (vid: len=16) 2003-01-30 14:17:04: DEBUG: sockmisc.c:421:sendfromto(): sockname a.b.c.d[500] 2003-01-30 14:17:04: DEBUG: sockmisc.c:423:sendfromto(): send packet from a.b.c.d[500] 2003-01-30 14:17:04: DEBUG: sockmisc.c:425:sendfromto(): send packet to w.x.y.z[500] 2003-01-30 14:17:04: DEBUG: sockmisc.c:570:sendfromto(): 1 times of 104 bytes message will be sent to a.b.c.d[500] 2003-01-30 14:17:04: DEBUG: plog.c:193:plogdump(): ebce80ff c9844274 af50325e cf59c5f7 01100200 00000000 00000068 0d000038 00000001 00000001 0000002c 01010001 00000024 01010000 80010005 80020002 80040002 80030001 800b0001 000c0004 00000258 00000014 7003cbc1 097dbe9c 2600ba69 83bc8b35 2003-01-30 14:17:04: DEBUG: isakmp.c:1449:isakmp_ph1resend(): resend phase1 packet ebce80ffc9844274:af50325ecf59c5f7 2003-01-30 14:17:04: DEBUG: isakmp.c:221:isakmp_handler(): === 2003-01-30 14:17:04: DEBUG: isakmp.c:222:isakmp_handler(): 56 bytes message received from w.x.y.z[500] 2003-01-30 14:17:04: DEBUG: plog.c:193:plogdump(): ebce80ff c9844274 af50325e cf59c5f7 0b100500 3757cd15 00000038 0000001c 00000001 01100004 ebce80ff c9844274 af50325e cf59c5f7 2003-01-30 14:17:04: DEBUG: isakmp.c:2248:isakmp_printpacket(): begin. 17:04.496813 w.x.y.z:500 -> a.b.c.d:500: isakmp 1.0 msgid 3757cd15 cookie ebce80ffc9844274->af50325ecf59c5f7: phase 2/others ? inf: (n: doi=ipsec proto=isakmp type=INVALID-COOKIE spi=ebce80ffc9844274af50325ecf59c5f7) 2003-01-30 14:17:04: DEBUG: isakmp_inf.c:115:isakmp_info_recv(): receive Information. 2003-01-30 14:17:04: DEBUG: isakmp.c:1112:isakmp_parsewoh(): begin. 2003-01-30 14:17:04: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=11(notify) 2003-01-30 14:17:04: DEBUG: isakmp.c:1178:isakmp_parsewoh(): succeed. 2003-01-30 14:17:04: ERROR: isakmp_inf.c:776:isakmp_info_recv_n(): unknown notify message, no phase2 handle found. 2003-01-30 14:17:04: DEBUG: isakmp_inf.c:798:isakmp_info_recv_n(): notification message 4:INVALID-COOKIE, doi=1 proto_id=1 spi=ebce80ffc9844274 af50325ecf59c5f7 (size=16). 2003-01-30 14:17:05: DEBUG: isakmp.c:221:isakmp_handler(): === 2003-01-30 14:17:05: DEBUG: isakmp.c:222:isakmp_handler(): 108 bytes message received from w.x.y.z[500] 2003-01-30 14:17:05: DEBUG: plog.c:193:plogdump(): ebce80ff c9844274 00000000 00000000 01100200 00000000 0000006c 0d000038 00000001 00000001 0000002c 01010001 00000024 01010000 80010005 80020002 80040002 80030001 800b0001 000c0004 00000258 00000018 1e2b5169 05991c7d 7c96fcbf b587e461 00000002 2003-01-30 14:17:05: DEBUG: sockmisc.c:421:sendfromto(): sockname a.b.c.d[500] 2003-01-30 14:17:05: DEBUG: sockmisc.c:423:sendfromto(): send packet from a.b.c.d[500] 2003-01-30 14:17:05: DEBUG: sockmisc.c:425:sendfromto(): send packet to w.x.y.z[500] 2003-01-30 14:17:05: DEBUG: sockmisc.c:570:sendfromto(): 1 times of 104 bytes message will be sent to a.b.c.d[500] 2003-01-30 14:17:05: DEBUG: plog.c:193:plogdump(): ebce80ff c9844274 af50325e cf59c5f7 01100200 00000000 00000068 0d000038 00000001 00000001 0000002c 01010001 00000024 01010000 80010005 80020002 80040002 80030001 800b0001 000c0004 00000258 00000014 7003cbc1 097dbe9c 2600ba69 83bc8b35 2003-01-30 14:17:05: NOTIFY: isakmp.c:255:isakmp_handler(): the packet is retransmitted by w.x.y.z[500]. 2003-01-30 14:17:05: DEBUG: isakmp.c:221:isakmp_handler(): === 2003-01-30 14:17:05: DEBUG: isakmp.c:222:isakmp_handler(): 56 bytes message received from w.x.y.z[500] 2003-01-30 14:17:05: DEBUG: plog.c:193:plogdump(): ebce80ff c9844274 af50325e cf59c5f7 0b100500 0d1aca76 00000038 0000001c 00000001 01100004 ebce80ff c9844274 af50325e cf59c5f7 2003-01-30 14:17:05: DEBUG: isakmp.c:2248:isakmp_printpacket(): begin. 17:05.544438 w.x.y.z:500 -> a.b.c.d:500: isakmp 1.0 msgid 0d1aca76 cookie ebce80ffc9844274->af50325ecf59c5f7: phase 2/others ? inf: (n: doi=ipsec proto=isakmp type=INVALID-COOKIE spi=ebce80ffc9844274af50325ecf59c5f7) 2003-01-30 14:17:05: DEBUG: isakmp_inf.c:115:isakmp_info_recv(): receive Information. 2003-01-30 14:17:05: DEBUG: isakmp.c:1112:isakmp_parsewoh(): begin. 2003-01-30 14:17:05: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=11(notify) 2003-01-30 14:17:05: DEBUG: isakmp.c:1178:isakmp_parsewoh(): succeed. 2003-01-30 14:17:05: ERROR: isakmp_inf.c:776:isakmp_info_recv_n(): unknown notify message, no phase2 handle found. 2003-01-30 14:17:05: DEBUG: isakmp_inf.c:798:isakmp_info_recv_n(): notification message 4:INVALID-COOKIE, doi=1 proto_id=1 spi=ebce80ffc9844274 af50325ecf59c5f7 (size=16). 2003-01-30 14:17:07: DEBUG: isakmp.c:221:isakmp_handler(): === 2003-01-30 14:17:07: DEBUG: isakmp.c:222:isakmp_handler(): 108 bytes message received from w.x.y.z[500] 2003-01-30 14:17:07: DEBUG: plog.c:193:plogdump(): ebce80ff c9844274 00000000 00000000 01100200 00000000 0000006c 0d000038 00000001 00000001 0000002c 01010001 00000024 01010000 80010005 80020002 80040002 80030001 800b0001 000c0004 00000258 00000014 7003cbc1 097dbe9c 2600ba69 83bc8b35 2003-01-30 14:17:07: NOTIFY: isakmp.c:255:isakmp_handler(): the packet is retransmitted by w.x.y.z[500]. 2003-01-30 14:17:07: DEBUG: isakmp.c:221:isakmp_handler(): === 2003-01-30 14:17:07: DEBUG: isakmp.c:222:isakmp_handler(): 56 bytes message received from w.x.y.z[500] 2003-01-30 14:17:07: DEBUG: plog.c:193:plogdump(): ebce80ff c9844274 af50325e cf59c5f7 0b100500 9d0ce48a 00000038 0000001c 00000001 01100004 ebce80ff c9844274 af50325e cf59c5f7 2003-01-30 14:17:07: DEBUG: isakmp.c:2248:isakmp_printpacket(): begin. 17:07.559022 w.x.y.z:500 -> a.b.c.d:500: isakmp 1.0 msgid 9d0ce48a cookie ebce80ffc9844274->af50325ecf59c5f7: phase 2/others ? inf: (n: doi=ipsec proto=isakmp type=INVALID-COOKIE spi=ebce80ffc9844274af50325ecf59c5f7) 2003-01-30 14:17:07: DEBUG: isakmp_inf.c:115:isakmp_info_recv(): receive Information. 2003-01-30 14:17:07: DEBUG: isakmp.c:1112:isakmp_parsewoh(): begin. 2003-01-30 14:17:07: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=11(notify) 2003-01-30 14:17:07: DEBUG: isakmp.c:1178:isakmp_parsewoh(): succeed. 2003-01-30 14:17:07: ERROR: isakmp_inf.c:776:isakmp_info_recv_n(): unknown notify message, no phase2 handle found. 2003-01-30 14:17:07: DEBUG: isakmp_inf.c:798:isakmp_info_recv_n(): notification message 4:INVALID-COOKIE, doi=1 proto_id=1 spi=ebce80ffc9844274 af50325ecf59c5f7 (size=16). 2003-01-30 14:17:11: DEBUG: isakmp.c:221:isakmp_handler(): === 2003-01-30 14:17:11: DEBUG: isakmp.c:222:isakmp_handler(): 108 bytes message received from w.x.y.z[500] 2003-01-30 14:17:11: DEBUG: plog.c:193:plogdump(): ebce80ff c9844274 00000000 00000000 01100200 00000000 0000006c 0d000038 00000001 00000001 0000002c 01010001 00000024 01010000 80010005 80020002 80040002 80030001 800b0001 000c0004 00000258 00000018 1e2b5169 05991c7d 7c96fcbf b587e461 00000002 2003-01-30 14:17:11: DEBUG: sockmisc.c:421:sendfromto(): sockname a.b.c.d[500] 2003-01-30 14:17:11: DEBUG: sockmisc.c:423:sendfromto(): send packet from a.b.c.d[500] 2003-01-30 14:17:11: DEBUG: sockmisc.c:425:sendfromto(): send packet to w.x.y.z[500] 2003-01-30 14:17:11: DEBUG: sockmisc.c:570:sendfromto(): 1 times of 104 bytes message will be sent to a.b.c.d[500] 2003-01-30 14:17:11: DEBUG: plog.c:193:plogdump(): ebce80ff c9844274 af50325e cf59c5f7 01100200 00000000 00000068 0d000038 00000001 00000001 0000002c 01010001 00000024 01010000 80010005 80020002 80040002 80030001 800b0001 000c0004 00000258 00000014 7003cbc1 097dbe9c 2600ba69 83bc8b35 2003-01-30 14:17:11: NOTIFY: isakmp.c:255:isakmp_handler(): the packet is retransmitted by w.x.y.z[500]. 2003-01-30 14:17:11: DEBUG: isakmp.c:221:isakmp_handler(): === 2003-01-30 14:17:11: DEBUG: isakmp.c:222:isakmp_handler(): 56 bytes message received from w.x.y.z[500] 2003-01-30 14:17:11: DEBUG: plog.c:193:plogdump(): ebce80ff c9844274 af50325e cf59c5f7 0b100500 78707fb7 00000038 0000001c 00000001 01100004 ebce80ff c9844274 af50325e cf59c5f7 2003-01-30 14:17:11: DEBUG: isakmp.c:2248:isakmp_printpacket(): begin. 17:11.553946 w.x.y.z:500 -> a.b.c.d:500: isakmp 1.0 msgid 78707fb7 cookie ebce80ffc9844274->af50325ecf59c5f7: phase 2/others ? inf: (n: doi=ipsec proto=isakmp type=INVALID-COOKIE spi=ebce80ffc9844274af50325ecf59c5f7) To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message