000 interface eth1/eth1 fec1::1:500 000 interface eth0/eth0 fec0::1:500 000 interface lo/lo ::1:500 000 interface lo/lo 127.0.0.1:500 000 interface eth0/eth0 192.168.0.1:500 000 interface eth1/eth1 10.1.0.1:500 000 %myid = (none) 000 debug crypt+control 000 000 "rw": 10.1.0.0/16===192.168.0.1[@moon.strongswan.org]...%any[carol@strongswan.org]; unrouted; eroute owner: #0 000 "rw": CAs: 'C=CH, O=Linux strongSwan, CN=strongSwan Root CA'...'%any' 000 "rw": ike_life: 3600s; ipsec_life: 1200s; rekey_margin: 180s; rekey_fuzz: 100%; keyingtries: 1 000 "rw": policy: RSASIG+ENCRYPT+TUNNEL+PFS; prio: 16,32; interface: eth0; 000 "rw": newest ISAKMP SA: #0; newest IPsec SA: #0; 000 "rw": IKE algorithms wanted: 7_192-5-16, strict 000 "rw": IKE algorithms found: 7_192-5_384-16, 000 "rw": ESP algorithms wanted: 12_192-5, strict 000 "rw": ESP algorithms loaded: 12_192-5_256, 000 "rw"[1]: 10.1.0.0/16===192.168.0.1[@moon.strongswan.org]...192.168.0.100[carol@strongswan.org]; erouted; eroute owner: #2 000 "rw"[1]: CAs: 'C=CH, O=Linux strongSwan, CN=strongSwan Root CA'...'%any' 000 "rw"[1]: ike_life: 3600s; ipsec_life: 1200s; rekey_margin: 180s; rekey_fuzz: 100%; keyingtries: 1 000 "rw"[1]: policy: RSASIG+ENCRYPT+TUNNEL+PFS; prio: 16,32; interface: eth0; 000 "rw"[1]: newest ISAKMP SA: #1; newest IPsec SA: #2; 000 "rw"[1]: IKE algorithms wanted: 7_192-5-16, strict 000 "rw"[1]: IKE algorithms found: 7_192-5_384-16, 000 "rw"[1]: IKE algorithm newest: AES_CBC_192-SHA2_384-MODP4096 000 "rw"[1]: ESP algorithms wanted: 12_192-5, strict 000 "rw"[1]: ESP algorithms loaded: 12_192-5_256, 000 "rw"[1]: ESP algorithm newest: AES_192-HMAC_SHA2_256; pfsgroup=<Phase1> 000 000 #2: "rw"[1] 192.168.0.100 STATE_QUICK_R2 (IPsec SA established); EVENT_SA_REPLACE in 1108s; newest IPSEC; eroute owner 000 #2: "rw"[1] 192.168.0.100 esp.175cdc77@192.168.0.100 (84 bytes, 0s ago) esp.e33001e@192.168.0.1 (84 bytes, 0s ago); tunnel 000 #1: "rw"[1] 192.168.0.100 STATE_MAIN_R3 (sent MR3, ISAKMP SA established); EVENT_SA_REPLACE in 3499s; newest ISAKMP 000