Hi, All
I''m into my 2nd day of trying to diagnose why my IPSEC setup
isn''t
working, and I was hoping somebody would have some insight.  Me
repeatedly banging my head against the wall doesn''t seem to be working
(this time). ;)
I''m trying to set up Super Freeswan (with x.509 certificates) +
Shorewall to build IPSEC tunnels between both (1) the Internet
(zone=net, eth0) and (2) a wireless network (zone=air, eth4), to (3) the
corporate LAN (zone=loc, eth1).  This is a "roadwarrior" setup,
connecting Win2k to Super Freeswan.  I''m using Marcus Muller''s
Win2k
IPSEC tool from <http://vpn.ebootis.de/>.
Involved interfaces:
NET ZONE
eth0      Link encap:Ethernet  HWaddr 00:05:5D:30:08:08
          inet addr:<PUBLIC_IP_1>  Bcast:<PUBLIC_IP_2> 
	Mask:255.255.255.224
LOC ZONE        
eth1      Link encap:Ethernet  HWaddr 00:05:5D:30:15:1C
          inet addr:192.168.0.1  Bcast:192.168.0.255  Mask:255.255.255.0
AIR ZONE
eth4      Link encap:Ethernet  HWaddr 00:C0:4F:79:55:F1
          inet addr:192.168.30.1  Bcast:192.168.30.255 
Mask:255.255.255.0
VPN ZONE 
ipsec0    Link encap:Ethernet  HWaddr 00:05:5D:30:08:08
          inet addr:<PUBLIC_IP_2>  Mask:255.255.255.224
When I create an IPSEC tunnel from a host in the air zone, the traffic
is dropped by Shorewall, which believes the packet is originating from
the air zone -- not the vpn zone I created (configuration details are
below).  I can''t figure out why that traffic is not being considered
part of the vpn zone, even though the KLIPS debug logs show the packets
coming into KLIPS, being de-encapsulated, etc.  So, I allowed all
traffic from air to loc.  I can now see a complete flow between the
involved physical interfaces (using tcpdump), and I can see the
de-encapsulation/re-encapsulation of packets by KLIPS.  However, I never
get a response back at the client when I send ICMP pings.  I''m getting
similar results from an IP in the net zone that the firewall is not
using.  I''m waiting on a laptop that''s been borrowed so I can
try from
an IP in the wild that''s not in our ISP-assigned block, by using a
dialup service.
This is the sequence I''m trying:
(1)  Start the IPSEC tunnel from the host in the air zone to the
firewall''s public IP -- successful, certificate works, SA is good.
(2)  Ping a host in the loc zone -- Win2k ping comes back and says
"Negotiating IP Security"
(3)  Wait a few seconds...
(4)  Ping that same host again -- "request timed out"
Below is my configuration:
--> I''ve set up a vpn zone in /etc/shorewall/zones:
#ZONE   DISPLAY       COMMENTS
net     Net             Internet
loc     Local          Local networks (Corporate Network)
dmz     DMZ             Web Server DMZ
dat     DATA-NET       Data server Network
air     802.11b        802.11b Network
vpn     ipsec0         IPSEC VPN tunnels
--> In /etc/shorewall/policy, I have these lines:
air             loc             ACCEPT          info **
loc             air             ACCEPT          info **
vpn             loc             ACCEPT          info
** ONLY PRESENT BECAUSE IPSEC TRAFFIC ISN''T BEING CLASSIFIED IN
''VPN''
ZONE
--> I added these rules in /etc/shorewall/rules:
##################################################
# ipsec vpn rules                                          #
##################################################
ACCEPT  net                     fw      udp     500
ACCEPT  fw                      net     udp     500  --> unnecessary?
ACCEPT  air                     fw      udp     500
ACCEPT  fw                      air     udp     500  --> unnecessary?
ACCEPT  net                     fw      50
ACCEPT  air                     fw      50
ACCEPT  net                     fw      51
ACCEPT  air                     fw      51
--> /etc/shorewall/interfaces:
net     eth0            detect         
dropunclean,routefilter,norfc1918,blacklist
loc     eth1            detect          dropunclean
dmz     eth2            detect          dropunclean,routeback
dat     eth3            detect          dropunclean
air     eth4            detect          dropunclean
vpn     ipsec0
--> /etc/shorewall/tunnels:
# TYPE                  ZONE    GATEWAY         GATEWAY ZONE    PORT
ipsec                   air     192.168.30.0/24 vpn
ipsec                   net     0.0.0.0/0       vpn
The logging from the Win2k IPSEC client (oakley.log) is very
uninteresting -- it''s not giving any errors.
I''ve provided some logging below.
Thanks in advance!
Regards,
Mike
--
Logging stuff:  (note -- public IP replaced by XX.YY.ZZ.162)
Jan 14 22:27:02 firewall pluto[22877]: | *received 216 bytes from
192.168.30.99:500 on eth0
Jan 14 22:27:02 firewall pluto[22877]: packet from 192.168.30.99:500:
ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000002]
Jan 14 22:27:02 firewall pluto[22877]: | instantiated
"w2k-road-warriors-mferraro" for 192.168.30.99
Jan 14 22:27:02 firewall pluto[22877]: "w2k-road-warriors-mferraro"[1]
192.168.30.99 #1: responding to Main Mode from unknown peer
192.168.30.99
Jan 14 22:27:02 firewall pluto[22877]: | sending 84 bytes for
STATE_MAIN_R0 through eth0 to 192.168.30.99:500:
Jan 14 22:27:02 firewall pluto[22877]: | *received 184 bytes from
192.168.30.99:500 on eth0
Jan 14 22:27:02 firewall pluto[22877]: | sending 188 bytes for
STATE_MAIN_R1 through eth0 to 192.168.30.99:500:
Jan 14 22:27:02 firewall pluto[22877]: | *received 1932 bytes from
192.168.30.99:500 on eth0
Jan 14 22:27:02 firewall pluto[22877]: | received encrypted packet from
192.168.30.99:500
Jan 14 22:27:03 firewall pluto[22877]: "w2k-road-warriors-mferraro"[1]
192.168.30.99 #1: Main mode peer ID is ID_DER_ASN1_DN: ''C=US,
ST=California, L=My Town, O=MyComPanYnAmE, OU=Technical Operations,
CN=Michael Ferraro, E=my@email.com''
Jan 14 22:27:04 firewall pluto[22877]: | sending 1764 bytes for
STATE_MAIN_R2 through eth0 to 192.168.30.99:500:
Jan 14 22:27:04 firewall pluto[22877]: "w2k-road-warriors-mferraro"[1]
192.168.30.99 #1: sent MR3, ISAKMP SA established
Jan 14 22:27:04 firewall pluto[22877]: | *received 1932 bytes from
192.168.30.99:500 on eth0
Jan 14 22:27:05 firewall pluto[22877]: "w2k-road-warriors-mferraro"[1]
192.168.30.99 #1: retransmitting in response to duplicate packet;
already STATE_MAIN_R3
Jan 14 22:27:05 firewall pluto[22877]: | sending 1764 bytes for
retransmit in response to duplicate through eth0 to 192.168.30.99:500:
Jan 14 22:27:05 firewall pluto[22877]: | *received 308 bytes from
192.168.30.99:500 on eth0
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_process:
found address family=2, AF_INET, 192.168.30.99. 
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_build: found
address=192.168.30.99:0. 
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_process:
found address family=2, AF_INET, 192.168.30.99. 
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_ipsec_sa_init: (pfkey
defined) IPIP tdb set for 192.168.30.99->XX.YY.ZZ.162. 
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_build: found
address=192.168.30.99:0. 
Jan 14 22:27:06 firewall kernel: klips_debug:   IP: ihl:20 ver:4 tos:0
tlen:112 id:2048 frag_off:0 ttl:128 proto:50 chk:63570
saddr:192.168.30.99 daddr:XX.YY.ZZ.162 
Jan 14 22:27:06 firewall kernel: klips_debug:ipsec_rcv:
SA:esp0x67a15c15@XX.YY.ZZ.162, src=192.168.30.99 of pkt agrees with
expected SA source address policy. 
Jan 14 22:27:05 firewall pluto[22877]: | received encrypted packet from
192.168.30.99:500
Jan 14 22:27:05 firewall pluto[22877]: | peer client is 192.168.30.99/32
Jan 14 22:27:05 firewall pluto[22877]: "w2k-road-warriors-mferraro"[1]
192.168.30.99 #2: responding to Quick Mode
Jan 14 22:27:06 firewall pluto[22877]: | finish_pfkey_msg: SADB_ADD
message 6 for Add IPIP SA tun.1001@192.168.30.99
Jan 14 22:27:06 firewall pluto[22877]: | sending 300 bytes for
STATE_QUICK_R0 through eth0 to 192.168.30.99:500:
Jan 14 22:27:06 firewall pluto[22877]: | *received 308 bytes from
192.168.30.99:500 on eth0
Jan 14 22:27:06 firewall pluto[22877]: "w2k-road-warriors-mferraro"[1]
192.168.30.99 #2: discarding duplicate packet; already STATE_QUICK_R1
Jan 14 22:27:06 firewall pluto[22877]: | *received 52 bytes from
192.168.30.99:500 on eth0
Jan 14 22:27:06 firewall kernel: klips_debug:ipsec_rcv: packet from
192.168.30.99 received with seq=1 (iv)=0x3af1f109600ba8f8 iplen=112
esplen=80 sa=esp0x67a15c15@XX.YY.ZZ.162 
Jan 14 22:27:06 firewall kernel: klips_debug:ipsec_rcv: packet decrypted
from 192.168.30.99: next_header = 4, padding = 2 
Jan 14 22:27:06 firewall kernel: klips_debug:   IP: ihl:20 ver:4 tos:0
tlen:80 id:2048 frag_off:0 ttl:128 proto:4 chk:63648 saddr:192.168.30.99
daddr:XX.YY.ZZ.162 
Jan 14 22:27:06 firewall kernel: klips_debug:   IP: ihl:20 ver:4 tos:0
tlen:60 id:293 frag_off:0 ttl:128 proto:1 (ICMP) chk:39370
saddr:192.168.30.99 daddr:192.168.0.30 type:code=8:0 
Jan 14 22:27:06 firewall kernel: Shorewall:air2loc:ACCEPT:IN=eth4
OUT=eth1 SRC=192.168.30.99 DST=192.168.0.30 LEN=60 TOS=0x00 PREC=0x00
TTL=127 ID=293 PROTO=ICMP TYPE=8 CODE=0 ID=512 SEQ=5888  
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_process:
found address family=2, AF_INET, 192.168.30.99. 
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_process:
tdb_said.dst set to 192.168.30.99. 
Jan 14 22:27:06 firewall kernel: klips_debug:gettdb: linked entry in tdb
table for hash=196 of SA:esp0x350b79e4@192.168.30.99 requested. 
Jan 14 22:27:06 firewall kernel: klips_debug:gettdb: no entries in tdb
table for hash=196 of SA:esp0x350b79e4@192.168.30.99. 
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_add_parse: existing
Tunnel Descriptor Block not found (this is good) for
SAesp0x350b79e4@192.168.30.99, out-bound, allocating. 
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_ipsec_sa_init: (pfkey
defined) called for SA:esp0x350b79e4@192.168.30.99 
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_build: found
address=192.168.30.99:0. 
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_add_parse: successful
for SA: esp0x350b79e4@192.168.30.99 
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_process:
found address family=2, AF_INET, 192.168.30.99. 
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_process:
tdb_said.dst set to 192.168.30.99. 
Jan 14 22:27:06 firewall kernel: klips_debug:gettdb: linked entry in tdb
table for hash=230 of SA:tun0x1002@192.168.30.99 requested. 
Jan 14 22:27:06 firewall kernel: klips_debug:gettdb: no entries in tdb
table for hash=230 of SA:tun0x1002@192.168.30.99. 
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_add_parse: existing
Tunnel Descriptor Block not found (this is good) for
SAtun0x1002@192.168.30.99, out-bound, allocating. 
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_ipsec_sa_init: (pfkey
defined) called for SA:tun0x1002@192.168.30.99 
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_ipsec_sa_init: (pfkey
defined) IPIP tdb set for XX.YY.ZZ.162->192.168.30.99. 
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_build: found
address=192.168.30.99:0. 
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_add_parse: successful
for SA: tun0x1002@192.168.30.99 
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_process:
found address family=2, AF_INET, 192.168.30.99. 
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_process:
tdb_said.dst set to 192.168.30.99. 
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_process:
found address family=2, AF_INET, 192.168.30.99. 
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_process:
tdb_said.dst set to 192.168.30.99. 
Jan 14 22:27:06 firewall kernel: klips_debug:gettdb: linked entry in tdb
table for hash=230 of SA:tun0x1002@192.168.30.99 requested. 
Jan 14 22:27:06 firewall kernel: klips_debug:gettdb: linked entry in tdb
table for hash=196 of SA:esp0x350b79e4@192.168.30.99 requested. 
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_build: found
address=192.168.30.99:0. 
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_build: found
address=192.168.30.99:0. 
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_process:
found address family=2, AF_INET, 192.168.30.99. 
Jan 14 22:27:07 firewall kernel: klips_debug:pfkey_address_process:
tdb_said.dst set to 192.168.30.99. 
Jan 14 22:27:07 firewall kernel: klips_debug:pfkey_address_process:
found address family=2, AF_INET, 192.168.30.99. 
Jan 14 22:27:07 firewall kernel: klips_debug:pfkey_address_parse:
extr->eroute set to 192.168.0.0/0:0->192.168.30.99/0:0 
Jan 14 22:27:07 firewall kernel: klips_debug:pfkey_address_parse:
extr->eroute set to 192.168.0.0/24:0->192.168.30.99/0:0 
Jan 14 22:27:07 firewall kernel: klips_debug:pfkey_address_parse:
extr->eroute set to 192.168.0.0/24:0->192.168.30.99/32:0 
Jan 14 22:27:07 firewall kernel: klips_debug:pfkey_x_addflow_parse:
calling breakeroute and/or makeroute for
192.168.0.0/24->192.168.30.99/32 
Jan 14 22:27:07 firewall kernel: klips_debug:ipsec_makeroute: attempting
to insert eroute for 192.168.0.0/24:0->192.168.30.99/32:0 0, SA:
tun0x1002@192.168.30.99, PID:22877, skb=00000000, ident:NULL->NULL 
Jan 14 22:27:07 firewall kernel: klips_debug:pfkey_address_build: found
address=192.168.30.99:0. 
Jan 14 22:27:07 firewall kernel: klips_debug:pfkey_address_build: found
address=192.168.30.99:0. 
Jan 14 22:27:06 firewall pluto[22877]: | received encrypted packet from
192.168.30.99:500
Jan 14 22:27:06 firewall pluto[22877]: | finish_pfkey_msg: SADB_ADD
message 8 for Add ESP SA esp.350b79e4@192.168.30.99
Jan 14 22:27:06 firewall pluto[22877]: | finish_pfkey_msg: SADB_ADD
message 9 for Add IPIP SA tun.1002@192.168.30.99
Jan 14 22:27:06 firewall pluto[22877]: | grouping tun.1002@192.168.30.99
and esp.350b79e4@192.168.30.99
Jan 14 22:27:06 firewall pluto[22877]: | finish_pfkey_msg: SADB_X_GRPSA
message 10 for group tun.1002@192.168.30.99
Jan 14 22:27:06 firewall pluto[22877]: | add eroute 192.168.0.0/24:0 ->
192.168.30.99/32:0 => tun.1002@192.168.30.99:0
Jan 14 22:27:06 firewall pluto[22877]: | finish_pfkey_msg:
SADB_X_ADDFLOW message 11 for flow tun.1002@192.168.30.99
Jan 14 22:27:06 firewall pluto[22877]: | executing up-client: 2>&1
PLUTO_VERSION=''1.1'' PLUTO_VERB=''up-client''
PLUTO_CONNECTION=''w2k-road-warriors-mferraro''
PLUTO_NEXT_HOP=''XX.YY.ZZ.161''
PLUTO_INTERFACE=''ipsec0''
PLUTO_ME=''XX.YY.ZZ.162'' PLUTO_MY_ID=''C=US,
ST=California, L=My Town,
O=MyComPanYnAmE, OU=Technical Operations, CN=FiReWaLLnAmE.here.com,
E=my@email.com'' PLUTO_MY_CLIENT=''192.168.0.0/24''
PLUTO_MY_CLIENT_NET=''192.168.0.0''
PLUTO_MY_CLIENT_MASK=''255.255.255.0''
PLUTO_MY_PORT=''0'' PLUTO_MY_PROTOCOL=''0''
PLUTO_PEER=''192.168.30.99''
PLUTO_PEER_ID=''C=US, ST=California, L=My Town, O=MyComPanYnAmE,
OU=Technical Operations, CN=Michael Ferraro, E=my@email.com''
PLUTO_PEER_CLIENT=''192.168.30.99/32''
PLUTO_PEER_CLIENT_NET=''192.168.30.99''
PLUTO_PEER_CLIENT_MASK=''255.255.255.255''
PLUTO_PEER_PORT=''0''
PLUTO_PEER_PROTOCOL=''0'' PLUTO_PEER_CA=''C=US,
ST=California, L=My Town,
O=MyComPanYnAmE, OU=Technical Operations, E=my@email.com'' ipsec _updown
Jan 14 22:27:06 firewall pluto[22877]: | executing prepare-client: 2>&1
PLUTO_VERSION=''1.1''
PLUTO_VERB=''prepare-client''
PLUTO_CONNECTION=''w2k-road-warriors-mferraro''
PLUTO_NEXT_HOP=''XX.YY.ZZ.161''
PLUTO_INTERFACE=''ipsec0''
PLUTO_ME=''XX.YY.ZZ.162'' PLUTO_MY_ID=''C=US,
ST=California, L=My Town,
O=MyComPanYnAmE, OU=Technical Operations, CN=FiReWaLLnAmE.here.com,
E=my@email.com'' PLUTO_MY_CLIENT=''192.168.0.0/24''
PLUTO_MY_CLIENT_NET=''192.168.0.0''
PLUTO_MY_CLIENT_MASK=''255.255.255.0''
PLUTO_MY_PORT=''0'' PLUTO_MY_PROTOCOL=''0''
PLUTO_PEER=''192.168.30.99''
PLUTO_PEER_ID=''C=US, ST=California, L=My Town, O=MyComPanYnAmE,
OU=Technical Operations, CN=Michael Ferraro, E=my@email.com''
PLUTO_PEER_CLIENT=''192.168.30.99/32''
PLUTO_PEER_CLIENT_NET=''192.168.30.99''
PLUTO_PEER_CLIENT_MASK=''255.255.255.255''
PLUTO_PEER_PORT=''0''
PLUTO_PEER_PROTOCOL=''0'' PLUTO_PEER_CA=''C=US,
ST=California, L=My Town,
O=MyComPanYnAmE, OU=Technical Operations, E=my@email.com'' ipsec _updown
Jan 14 22:27:06 firewall pluto[22877]: | executing route-client: 2>&1
PLUTO_VERSION=''1.1''
PLUTO_VERB=''route-client''
PLUTO_CONNECTION=''w2k-road-warriors-mferraro''
PLUTO_NEXT_HOP=''XX.YY.ZZ.161''
PLUTO_INTERFACE=''ipsec0''
PLUTO_ME=''XX.YY.ZZ.162'' PLUTO_MY_ID=''C=US,
ST=California, L=My Town,
O=MyComPanYnAmE, OU=Technical Operations, CN=FiReWaLLnAmE.here.com,
E=my@email.com'' PLUTO_MY_CLIENT=''192.168.0.0/24''
PLUTO_MY_CLIENT_NET=''192.168.0.0''
PLUTO_MY_CLIENT_MASK=''255.255.255.0''
PLUTO_MY_PORT=''0'' PLUTO_MY_PROTOCOL=''0''
PLUTO_PEER=''192.168.30.99''
PLUTO_PEER_ID=''C=US, ST=California, L=My Town, O=MyComPanYnAmE,
OU=Technical Operations, CN=Michael Ferraro, E=my@email.com''
PLUTO_PEER_CLIENT=''192.168.30.99/32''
PLUTO_PEER_CLIENT_NET=''192.168.30.99''
PLUTO_PEER_CLIENT_MASK=''255.255.255.255''
PLUTO_PEER_PORT=''0''
PLUTO_PEER_PROTOCOL=''0'' PLUTO_PEER_CA=''C=US,
ST=California, L=My Town,
O=MyComPanYnAmE, OU=Technical Operations, E=my@email.com'' ipsec _updown
Jan 14 22:27:06 firewall pluto[22877]: "w2k-road-warriors-mferraro"[1]
192.168.30.99 #2: IPsec SA established
Jan 14 22:27:12 firewall kernel: klips_debug:   IP: ihl:20 ver:4 tos:0
tlen:112 id:2304 frag_off:0 ttl:128 proto:50 chk:63314
saddr:192.168.30.99 daddr:XX.YY.ZZ.162 
Jan 14 22:27:12 firewall kernel: klips_debug:ipsec_rcv:
SA:esp0x67a15c15@XX.YY.ZZ.162, src=192.168.30.99 of pkt agrees with
expected SA source address policy. 
Jan 14 22:27:12 firewall kernel: klips_debug:ipsec_rcv: packet from
192.168.30.99 received with seq=2 (iv)=0x5f6b516537032fc2 iplen=112
esplen=80 sa=esp0x67a15c15@XX.YY.ZZ.162 
Jan 14 22:27:12 firewall kernel: klips_debug:ipsec_rcv: packet decrypted
from 192.168.30.99: next_header = 4, padding = 2 
Jan 14 22:27:12 firewall kernel: klips_debug:   IP: ihl:20 ver:4 tos:0
tlen:80 id:2304 frag_off:0 ttl:128 proto:4 chk:63392 saddr:192.168.30.99
daddr:XX.YY.ZZ.162 
Jan 14 22:27:12 firewall kernel: klips_debug:   IP: ihl:20 ver:4 tos:0
tlen:60 id:301 frag_off:0 ttl:128 proto:1 (ICMP) chk:39362
saddr:192.168.30.99 daddr:192.168.0.30 type:code=8:0 
Jan 14 22:27:12 firewall kernel: Shorewall:air2loc:ACCEPT:IN=eth4
OUT=eth1 SRC=192.168.30.99 DST=192.168.0.30 LEN=60 TOS=0x00 PREC=0x00
TTL=127 ID=301 PROTO=ICMP TYPE=8 CODE=0 ID=512 SEQ=6144  
Jan 14 22:27:12 firewall kernel: klips_debug:   IP: ihl:20 ver:4 tos:0
tlen:60 id:51413 frag_off:0 ttl:63 proto:1 (ICMP) chk:4890
saddr:192.168.0.30 daddr:192.168.30.99 type:code=0:0 
Jan 14 22:27:12 firewall kernel: klips_debug:ipsec_findroute:
192.168.0.30:0->192.168.30.99:0 1 
Jan 14 22:27:12 firewall kernel: klips_debug:gettdb: linked entry in tdb
table for hash=230 of SA:tun0x1002@192.168.30.99 requested. 
Jan 14 22:27:12 firewall kernel: klips_debug:ipsec_tunnel_start_xmit:
found Tunnel Descriptor Block -- SA:<IPIP> tun0x1002@192.168.30.99 
Jan 14 22:27:12 firewall kernel: klips_debug:ipsec_tunnel_start_xmit:
calling room for <IPIP>, SA:tun0x1002@192.168.30.99 
Jan 14 22:27:12 firewall kernel: klips_debug:ipsec_tunnel_start_xmit:
calling room for <ESP_3DES_HMAC_MD5>, SA:esp0x350b79e4@192.168.30.99 
Jan 14 22:27:12 firewall kernel: klips_debug:   IP: ihl:20 ver:4 tos:0
tlen:60 id:51413 frag_off:0 ttl:63 proto:1 (ICMP) chk:4890
saddr:192.168.0.30 daddr:192.168.30.99 type:code=0:0 
Jan 14 22:27:12 firewall kernel: klips_debug:ipsec_tunnel_start_xmit:
calling output for <IPIP>, SA:tun0x1002@192.168.30.99 
Jan 14 22:27:12 firewall kernel: klips_debug:ipsec_tunnel_start_xmit:
after <IPIP>, SA:tun0x1002@192.168.30.99: 
Jan 14 22:27:12 firewall kernel: klips_debug:   IP: ihl:20 ver:4 tos:0
tlen:80 id:17916 frag_off:0 ttl:64 proto:4 chk:64164 saddr:XX.YY.ZZ.162
daddr:192.168.30.99 
Jan 14 22:27:12 firewall kernel: klips_debug:ipsec_tunnel_start_xmit:
calling output for <ESP_3DES_HMAC_MD5>, SA:esp0x350b79e4@192.168.30.99 
Jan 14 22:27:12 firewall kernel: klips_debug:ipsec_tunnel_start_xmit:
after <ESP_3DES_HMAC_MD5>, SA:esp0x350b79e4@192.168.30.99: 
Jan 14 22:27:12 firewall kernel: klips_debug:   IP: ihl:20 ver:4 tos:0
tlen:112 id:17916 frag_off:0 ttl:64 proto:50 chk:64086
saddr:XX.YY.ZZ.162 daddr:192.168.30.99 
Jan 14 22:27:12 firewall kernel: klips_debug:ipsec_findroute:
XX.YY.ZZ.162:0->192.168.30.99:0 50 
Jan 14 22:27:12 firewall kernel: klips_debug:   IP: ihl:20 ver:4 tos:0
tlen:112 id:17916 frag_off:0 ttl:64 proto:50 chk:64086
saddr:XX.YY.ZZ.162 daddr:192.168.30.99 
Jan 14 22:27:17 firewall kernel: klips_debug:   IP: ihl:20 ver:4 tos:0
tlen:96 id:54110 DF frag_off:0 ttl:64 proto:17 (UDP) chk:11557
saddr:XX.YY.ZZ.162:500 daddr:192.168.30.99:500 
Jan 14 22:27:17 firewall kernel: klips_debug:ipsec_findroute:
XX.YY.ZZ.162:500->192.168.30.99:500 17 
Jan 14 22:27:17 firewall kernel: klips_debug:   IP: ihl:20 ver:4 tos:0
tlen:96 id:54110 DF frag_off:0 ttl:64 proto:17 (UDP) chk:11557
saddr:XX.YY.ZZ.162:500 daddr:192.168.30.99:500 
Jan 14 22:27:17 firewall kernel: klips_debug:pfkey_address_process:
found address family=2, AF_INET, 192.168.30.99. 
Jan 14 22:27:17 firewall kernel: klips_debug:pfkey_address_process:
tdb_said.dst set to 192.168.30.99. 
Jan 14 22:27:17 firewall kernel: klips_debug:gettdb: linked entry in tdb
table for hash=196 of SA:esp0x350b79e4@192.168.30.99 requested. 
Jan 14 22:27:17 firewall kernel: klips_debug:deltdbchain: passed
SA:esp0x350b79e4@192.168.30.99 
Jan 14 22:27:17 firewall kernel: klips_debug:deltdbchain: unlinking and
delting SA:esp0x350b79e4@192.168.30.99<6>,
inext=tun0x1002@192.168.30.99<6>. 
Jan 14 22:27:17 firewall kernel: klips_debug:deltdb: deleting
SA:esp0x350b79e4@192.168.30.99, hashval=196. 
Jan 14 22:27:17 firewall kernel: klips_debug:deltdbchain: unlinking and
delting SA:tun0x1002@192.168.30.99<6>. 
Jan 14 22:27:17 firewall kernel: klips_debug:deltdb: deleting
SA:tun0x1002@192.168.30.99, hashval=230. 
Jan 14 22:27:17 firewall kernel: klips_debug:pfkey_address_build: found
address=192.168.30.99:0. 
Jan 14 22:27:17 firewall kernel: klips_debug:pfkey_address_process:
found address family=2, AF_INET, 192.168.30.99. 
Jan 14 22:27:17 firewall pluto[22877]: | *received 68 bytes from
192.168.30.99:500 on eth0
Jan 14 22:27:17 firewall pluto[22877]: | received encrypted packet from
192.168.30.99:500
Jan 14 22:27:17 firewall pluto[22877]: "w2k-road-warriors-mferraro"[1]
192.168.30.99 #1: received Delete SA payload: deleting IPSEC State #2
Jan 14 22:27:17 firewall pluto[22877]: | sending 68 bytes for delete
notify through eth0 to 192.168.30.99:500:
Jan 14 22:27:17 firewall pluto[22877]: | executing down-client: 2>&1
PLUTO_VERSION=''1.1'' PLUTO_VERB=''down-client''
PLUTO_CONNECTION=''w2k-road-warriors-mferraro''
PLUTO_NEXT_HOP=''XX.YY.ZZ.161''
PLUTO_INTERFACE=''ipsec0''
PLUTO_ME=''XX.YY.ZZ.162'' PLUTO_MY_ID=''C=US,
ST=California, L=My Town,
O=MyComPanYnAmE, OU=Technical Operations, CN=FiReWaLLnAmE.here.com,
E=my@email.com'' PLUTO_MY_CLIENT=''192.168.0.0/24''
PLUTO_MY_CLIENT_NET=''192.168.0.0''
PLUTO_MY_CLIENT_MASK=''255.255.255.0''
PLUTO_MY_PORT=''0'' PLUTO_MY_PROTOCOL=''0''
PLUTO_PEER=''192.168.30.99''
PLUTO_PEER_ID=''C=US, ST=California, L=My Town, O=MyComPanYnAmE,
OU=Technical Operations, CN=Michael Ferraro, E=my@email.com''
PLUTO_PEER_CLIENT=''192.168.30.99/32''
PLUTO_PEER_CLIENT_NET=''192.168.30.99''
PLUTO_PEER_CLIENT_MASK=''255.255.255.255''
PLUTO_PEER_PORT=''0''
PLUTO_PEER_PROTOCOL=''0'' PLUTO_PEER_CA=''C=US,
ST=California, L=My Town,
O=MyComPanYnAmE, OU=Technical Operations, E=my@email.com'' ipsec _updown
Jan 14 22:27:17 firewall pluto[22877]: | replace with shunt eroute
192.168.0.0/24:0 -> 192.168.30.99/32:0 => %trap:0
Jan 14 22:27:17 firewall pluto[22877]: | delete
esp.350b79e4@192.168.30.99
Jan 14 22:27:17 firewall pluto[22877]: | finish_pfkey_msg: SADB_DELETE
message 13 for Delete SA esp.350b79e4@192.168.30.99
Jan 14 22:27:17 firewall pluto[22877]: | *received 84 bytes from
192.168.30.99:500 on eth0
Jan 14 22:27:17 firewall pluto[22877]: | received encrypted packet from
192.168.30.99:500
Jan 14 22:27:17 firewall kernel: klips_debug:pfkey_address_build: found
address=192.168.30.99:0. 
Jan 14 22:27:17 firewall kernel: klips_debug:   IP: ihl:20 ver:4 tos:0
tlen:112 id:40735 DF frag_off:0 ttl:64 proto:17 (UDP) chk:24916
saddr:XX.YY.ZZ.162:500 daddr:192.168.30.99:500 
Jan 14 22:27:17 firewall kernel: klips_debug:ipsec_findroute:
XX.YY.ZZ.162:500->192.168.30.99:500 17 
Jan 14 22:27:17 firewall kernel: klips_debug:   IP: ihl:20 ver:4 tos:0
tlen:112 id:40735 DF frag_off:0 ttl:64 proto:17 (UDP) chk:24916
saddr:XX.YY.ZZ.162:500 daddr:192.168.30.99:500 
Jan 14 22:27:17 firewall kernel: klips_debug:pfkey_address_process:
found address family=2, AF_INET, 192.168.30.99. 
Jan 14 22:27:17 firewall kernel: klips_debug:pfkey_address_parse:
extr->eroute set to 192.168.0.0/0:0->192.168.30.99/0:0 
Jan 14 22:27:17 firewall kernel: klips_debug:pfkey_address_parse:
extr->eroute set to 192.168.0.0/24:0->192.168.30.99/0:0 
Jan 14 22:27:17 firewall kernel: klips_debug:pfkey_address_parse:
extr->eroute set to 192.168.0.0/24:0