Advertisement
philip_h

LOGFILE

Jul 6th, 2015
54
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 54.57 KB | None | 0 0
  1. Jan 1 03:26:24 IPU-0004338 authpriv.info ipsec_starter[807]: Starting strongSwan 5.3.2 IPsec [starter]...
  2. Jan 1 03:26:25 IPU-0004338 daemon.info charon: 00[DMN] Starting IKE charon daemon (strongSwan 5.3.2, Linux 2.6.37, armv7l)
  3. Jan 1 03:26:25 IPU-0004338 daemon.info charon: 00[LIB] plugin 'aes': loaded successfully
  4. Jan 1 03:26:25 IPU-0004338 daemon.info charon: 00[LIB] plugin 'des': loaded successfully
  5. Jan 1 03:26:25 IPU-0004338 daemon.info charon: 00[LIB] plugin 'rc2': loaded successfully
  6. Jan 1 03:26:25 IPU-0004338 daemon.info charon: 00[LIB] plugin 'sha1': loaded successfully
  7. Jan 1 03:26:26 IPU-0004338 daemon.info charon: 00[LIB] plugin 'sha2': loaded successfully
  8. Jan 1 03:26:26 IPU-0004338 daemon.info charon: 00[LIB] plugin 'md5': loaded successfully
  9. Jan 1 03:26:26 IPU-0004338 daemon.info charon: 00[LIB] plugin 'random': loaded successfully
  10. Jan 1 03:26:26 IPU-0004338 daemon.info charon: 00[LIB] plugin 'nonce': loaded successfully
  11. Jan 1 03:26:26 IPU-0004338 daemon.info charon: 00[LIB] plugin 'x509': loaded successfully
  12. Jan 1 03:26:26 IPU-0004338 daemon.info charon: 00[LIB] plugin 'revocation': loaded successfully
  13. Jan 1 03:26:26 IPU-0004338 daemon.info charon: 00[LIB] plugin 'constraints': loaded successfully
  14. Jan 1 03:26:26 IPU-0004338 daemon.info charon: 00[LIB] plugin 'pubkey': loaded successfully
  15. Jan 1 03:26:26 IPU-0004338 daemon.info charon: 00[LIB] plugin 'pkcs1': loaded successfully
  16. Jan 1 03:26:26 IPU-0004338 daemon.info charon: 00[LIB] plugin 'pkcs7': loaded successfully
  17. Jan 1 03:26:26 IPU-0004338 daemon.info charon: 00[LIB] plugin 'pkcs8': loaded successfully
  18. Jan 1 03:26:26 IPU-0004338 daemon.info charon: 00[LIB] plugin 'pkcs12': loaded successfully
  19. Jan 1 03:26:26 IPU-0004338 daemon.info charon: 00[LIB] plugin 'pgp': loaded successfully
  20. Jan 1 03:26:26 IPU-0004338 daemon.info charon: 00[LIB] plugin 'dnskey': loaded successfully
  21. Jan 1 03:26:26 IPU-0004338 daemon.info charon: 00[LIB] plugin 'sshkey': loaded successfully
  22. Jan 1 03:26:26 IPU-0004338 daemon.info charon: 00[LIB] plugin 'pem': loaded successfully
  23. Jan 1 03:26:27 IPU-0004338 daemon.info charon: 00[LIB] plugin 'openssl': loaded successfully
  24. Jan 1 03:26:27 IPU-0004338 daemon.info charon: 00[LIB] plugin 'fips-prf': loaded successfully
  25. Jan 1 03:26:27 IPU-0004338 daemon.info charon: 00[LIB] plugin 'xcbc': loaded successfully
  26. Jan 1 03:26:27 IPU-0004338 daemon.info charon: 00[LIB] plugin 'cmac': loaded successfully
  27. Jan 1 03:26:27 IPU-0004338 daemon.info charon: 00[LIB] plugin 'hmac': loaded successfully
  28. Jan 1 03:26:27 IPU-0004338 daemon.info charon: 00[LIB] plugin 'attr': loaded successfully
  29. Jan 1 03:26:27 IPU-0004338 daemon.info charon: 00[LIB] plugin 'kernel-netlink': loaded successfully
  30. Jan 1 03:26:27 IPU-0004338 daemon.info charon: 00[LIB] plugin 'resolve': loaded successfully
  31. Jan 1 03:26:27 IPU-0004338 daemon.info charon: 00[LIB] plugin 'socket-default': loaded successfully
  32. Jan 1 03:26:27 IPU-0004338 daemon.info charon: 00[LIB] plugin 'stroke': loaded successfully
  33. Jan 1 03:26:27 IPU-0004338 daemon.info charon: 00[LIB] plugin 'vici': loaded successfully
  34. Jan 1 03:26:27 IPU-0004338 daemon.info charon: 00[LIB] plugin 'updown': loaded successfully
  35. Jan 1 03:26:27 IPU-0004338 daemon.info charon: 00[LIB] plugin 'xauth-generic': loaded successfully
  36. Jan 1 03:26:27 IPU-0004338 daemon.info charon: 00[LIB] plugin 'systime-fix': loaded successfully
  37. Jan 1 03:26:27 IPU-0004338 daemon.info charon: 00[LIB] plugin 'unity': loaded successfully
  38. Jan 1 03:26:27 IPU-0004338 daemon.info charon: 00[NET] could not open socket: Address family not supported by protocol
  39. Jan 1 03:26:27 IPU-0004338 daemon.info charon: 00[NET] could not open IPv6 socket, IPv6 disabled
  40. Jan 1 03:26:27 IPU-0004338 daemon.info charon: 00[KNL] detected Linux 2.6.37, no support for RTA_PREFSRC for IPv6 routes
  41. Jan 1 03:26:27 IPU-0004338 daemon.info charon: 00[KNL] known interfaces and IP addresses:
  42. Jan 1 03:26:27 IPU-0004338 daemon.info charon: 00[KNL] usb1
  43. Jan 1 03:26:27 IPU-0004338 daemon.info charon: 00[KNL] 10.255.96.3
  44. Jan 1 03:26:27 IPU-0004338 daemon.info charon: 00[KNL] received netlink error: Operation not supported (95)
  45. Jan 1 03:26:27 IPU-0004338 daemon.info charon: 00[KNL] unable to create IPv4 routing table rule
  46. Jan 1 03:26:27 IPU-0004338 daemon.info charon: 00[KNL] received netlink error: Operation not supported (95)
  47. Jan 1 03:26:27 IPU-0004338 daemon.info charon: 00[KNL] unable to create IPv6 routing table rule
  48. Jan 1 03:26:27 IPU-0004338 daemon.info charon: 00[LIB] feature PUBKEY:DSA in plugin 'pem' has unmet dependency: PUBKEY:DSA
  49. Jan 1 03:26:27 IPU-0004338 daemon.info charon: 00[LIB] feature PRIVKEY:DSA in plugin 'pem' has unmet dependency: PRIVKEY:DSA
  50. Jan 1 03:26:27 IPU-0004338 daemon.info charon: 00[LIB] feature PRIVKEY:BLISS in plugin 'pem' has unmet dependency: PRIVKEY:BLISS
  51. Jan 1 03:26:27 IPU-0004338 daemon.info charon: 00[LIB] feature CERT_DECODE:X509_OCSP_REQUEST in plugin 'pem' has unmet dependency: CERT_DECODE:X509_OCSP_REQUEST
  52. Jan 1 03:26:27 IPU-0004338 daemon.info charon: 00[LIB] feature PRF:PRF_CAMELLIA128_XCBC in plugin 'xcbc' has unmet dependency: CRYPTER:CAMELLIA_CBC-16
  53. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 00[LIB] feature SIGNER:CAMELLIA_XCBC_96 in plugin 'xcbc' has unmet dependency: CRYPTER:CAMELLIA_CBC-16
  54. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 00[CFG] loading ca certificates from '/SAB/etc/ipsec.d/cacerts'
  55. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 00[CFG] loading aa certificates from '/SAB/etc/ipsec.d/aacerts'
  56. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 00[CFG] loading ocsp signer certificates from '/SAB/etc/ipsec.d/ocspcerts'
  57. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 00[CFG] loading attribute certificates from '/SAB/etc/ipsec.d/acerts'
  58. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 00[CFG] loading crls from '/SAB/etc/ipsec.d/crls'
  59. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 00[CFG] loading secrets from '/SAB/etc/ipsec.secrets'
  60. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 00[CFG] loaded IKE secret for %any
  61. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 00[CFG] loaded EAP secret for user-pass
  62. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 00[CFG] loaded EAP secret for userid
  63. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 00[CFG] enabling systime-fix, threshold: Wed Jan 1 00:00:00 2003
  64. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 00[CFG]
  65. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 00[CFG] starting systime check, interval: 10s
  66. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 00[LIB] loaded plugins: charon aes des rc2 sha1 sha2 md5 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl fips-prf xcbc cmac hmac attr kernel-netlink resolve socket-default
  67. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 00[LIB] unable to load 6 plugin features (6 due to unmet dependencies)
  68. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 00[JOB] spawning 16 worker threads
  69. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 03[LIB] created thread 03 [831]
  70. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 04[LIB] created thread 04 [832]
  71. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 02[LIB] created thread 02 [830]
  72. Jan 1 03:26:28 IPU-0004338 authpriv.info ipsec_starter[820]: charon (822) started after 1640 ms
  73. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 02[NET] waiting for data on sockets
  74. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 05[LIB] created thread 05 [833]
  75. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 06[LIB] created thread 06 [834]
  76. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 01[LIB] created thread 01 [829]
  77. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 07[LIB] created thread 07 [835]
  78. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 09[LIB] created thread 09 [837]
  79. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 08[LIB] created thread 08 [836]
  80. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 10[LIB] created thread 10 [838]
  81. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 11[LIB] created thread 11 [839]
  82. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 12[LIB] created thread 12 [840]
  83. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 13[LIB] created thread 13 [841]
  84. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 14[LIB] created thread 14 [842]
  85. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 15[LIB] created thread 15 [843]
  86. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 16[LIB] created thread 16 [844]
  87. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 10[CFG] received stroke: add connection 'home'
  88. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 10[CFG] conn home
  89. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 10[CFG] left=%any
  90. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 10[CFG] leftsourceip=%config
  91. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 10[CFG] leftauth=psk
  92. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 10[CFG] leftauth2=xauth
  93. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 10[CFG] leftid=SERVER
  94. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 10[CFG] leftupdown=/SAB/scripts/sab_updown.sh
  95. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 10[CFG] right=10.3.0.2
  96. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 10[CFG] rightsubnet=0.0.0.0/0
  97. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 10[CFG] rightauth=psk
  98. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 10[CFG] xauth_identity=user-pass
  99. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 10[CFG] ike=aes-sha1-modp1024
  100. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 10[CFG] esp=aes128-sha1-modp1024
  101. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 10[CFG] dpddelay=30
  102. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 10[CFG] dpdtimeout=150
  103. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 10[CFG] dpdaction=3
  104. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 10[CFG] mediation=no
  105. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 10[CFG] keyexchange=ikev1
  106. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 10[KNL] 10.3.0.2 is not a local address or the interface is down
  107. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 10[CFG] left nor right host is our side, assuming left=local
  108. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 10[CFG] added configuration 'home'
  109. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 07[CFG] received stroke: route 'home'
  110. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 07[KNL] using 10.255.96.3 as address to reach 10.3.0.2/32
  111. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 07[CFG] proposing traffic selectors for us:
  112. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 07[CFG] 10.255.96.3/32
  113. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 07[CFG] proposing traffic selectors for other:
  114. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 07[CFG] 0.0.0.0/0
  115. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 07[CFG] configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/BLOWFISH_CBC_256/HMAC_SHA1_96/AES_XCBC_96/HMAC_MD5_96/NO_EXT_SEQ
  116. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 07[KNL] adding policy 10.255.96.3/32 === 0.0.0.0/0 out (mark 0/0x00000000)
  117. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 07[KNL] adding policy 0.0.0.0/0 === 10.255.96.3/32 in (mark 0/0x00000000)
  118. Jan 1 03:26:28 IPU-0004338 daemon.info charon: 07[KNL] adding policy 0.0.0.0/0 === 10.255.96.3/32 fwd (mark 0/0x00000000)
  119. Jan 1 03:26:28 IPU-0004338 authpriv.info ipsec_starter[820]: 'home' routed
  120. Jan 1 03:26:28 IPU-0004338 authpriv.info ipsec_starter[820]:
  121. Jan 1 03:26:34 IPU-0004338 daemon.info charon: 08[CFG] received stroke: initiate 'home'
  122. Jan 1 03:26:34 IPU-0004338 daemon.info charon: 01[MGR] checkout IKE_SA by config
  123. Jan 1 03:26:34 IPU-0004338 daemon.info charon: 01[MGR] created IKE_SA (unnamed)[1]
  124. Jan 1 03:26:34 IPU-0004338 daemon.info charon: 01[KNL] using 10.255.96.3 as address to reach 10.3.0.2/32
  125. Jan 1 03:26:34 IPU-0004338 daemon.info charon: 01[IKE] queueing ISAKMP_VENDOR task
  126. Jan 1 03:26:34 IPU-0004338 daemon.info charon: 01[IKE] queueing ISAKMP_CERT_PRE task
  127. Jan 1 03:26:34 IPU-0004338 daemon.info charon: 01[IKE] queueing AGGRESSIVE_MODE task
  128. Jan 1 03:26:34 IPU-0004338 daemon.info charon: 01[IKE] queueing ISAKMP_CERT_POST task
  129. Jan 1 03:26:34 IPU-0004338 daemon.info charon: 01[IKE] queueing ISAKMP_NATD task
  130. Jan 1 03:26:34 IPU-0004338 daemon.info charon: 01[IKE] queueing QUICK_MODE task
  131. Jan 1 03:26:34 IPU-0004338 daemon.info charon: 01[IKE] activating new tasks
  132. Jan 1 03:26:34 IPU-0004338 daemon.info charon: 01[IKE] activating ISAKMP_VENDOR task
  133. Jan 1 03:26:34 IPU-0004338 daemon.info charon: 01[IKE] activating ISAKMP_CERT_PRE task
  134. Jan 1 03:26:34 IPU-0004338 daemon.info charon: 01[IKE] activating AGGRESSIVE_MODE task
  135. Jan 1 03:26:34 IPU-0004338 daemon.info charon: 01[IKE] activating ISAKMP_CERT_POST task
  136. Jan 1 03:26:34 IPU-0004338 daemon.info charon: 01[IKE] activating ISAKMP_NATD task
  137. Jan 1 03:26:34 IPU-0004338 daemon.info charon: 01[IKE] sending strongSwan vendor ID
  138. Jan 1 03:26:34 IPU-0004338 daemon.info charon: 01[IKE] sending XAuth vendor ID
  139. Jan 1 03:26:34 IPU-0004338 daemon.info charon: 01[IKE] sending DPD vendor ID
  140. Jan 1 03:26:34 IPU-0004338 daemon.info charon: 01[IKE] sending NAT-T (RFC 3947) vendor ID
  141. Jan 1 03:26:34 IPU-0004338 daemon.info charon: 01[IKE] sending draft-ietf-ipsec-nat-t-ike-02\n vendor ID
  142. Jan 1 03:26:34 IPU-0004338 daemon.info charon: 01[IKE] initiating Aggressive Mode IKE_SA home[1] to 10.3.0.2
  143. Jan 1 03:26:34 IPU-0004338 authpriv.info charon: 01[IKE] initiating Aggressive Mode IKE_SA home[1] to 10.3.0.2
  144. Jan 1 03:26:34 IPU-0004338 daemon.info charon: 01[IKE] IKE_SA home[1] state change: CREATED => CONNECTING
  145. Jan 1 03:26:34 IPU-0004338 daemon.info charon: 01[CFG] configured proposals: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/HMAC_MD5_96/HMAC_SHA1_96/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/AES_XCBC_96/AES
  146. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 01[LIB] size of DH secret exponent: 1023 bits
  147. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 01[ENC] generating AGGRESSIVE request 0 [ SA KE No ID V V V V V ]
  148. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 01[NET] sending packet: from 10.255.96.3[500] to 10.3.0.2[500] (400 bytes)
  149. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 05[NET] sending packet: from 10.255.96.3[500] to 10.3.0.2[500]
  150. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 01[MGR] checkin IKE_SA home[1]
  151. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 02[NET] received packet: from 10.3.0.2[500] to 10.255.96.3[500]
  152. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 11[MGR] checkout IKE_SA by message
  153. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 11[MGR] IKE_SA home[1] successfully checked out
  154. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 11[NET] received packet: from 10.3.0.2[500] to 10.255.96.3[500] (444 bytes)
  155. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 02[NET] waiting for data on sockets
  156. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 11[ENC] parsed AGGRESSIVE response 0 [ SA KE No ID HASH V V V V NAT-D NAT-D V V ]
  157. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 11[IKE] received Cisco Unity vendor ID
  158. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 11[IKE] received XAuth vendor ID
  159. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 11[IKE] received DPD vendor ID
  160. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 11[IKE] received NAT-T (RFC 3947) vendor ID
  161. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 11[IKE] received FRAGMENTATION vendor ID
  162. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 11[ENC] received unknown vendor ID: 1f:07:f7:0e:aa:65:14:d3:b0:fa:96:54:2a:50:01:00
  163. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 11[CFG] selecting proposal:
  164. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 11[CFG] proposal matches
  165. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 11[CFG] received proposals: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
  166. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 11[CFG] configured proposals: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/HMAC_MD5_96/HMAC_SHA1_96/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/AES_XCBC_96/AES
  167. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 11[CFG] selected proposal: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
  168. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 11[IKE] reinitiating already active tasks
  169. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 11[IKE] ISAKMP_VENDOR task
  170. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 11[IKE] AGGRESSIVE_MODE task
  171. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 11[IKE] queueing MODE_CONFIG task
  172. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 11[ENC] generating AGGRESSIVE request 0 [ NAT-D NAT-D HASH ]
  173. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 11[NET] sending packet: from 10.255.96.3[500] to 10.3.0.2[500] (108 bytes)
  174. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 05[NET] sending packet: from 10.255.96.3[500] to 10.3.0.2[500]
  175. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 11[IKE] activating new tasks
  176. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 11[IKE] nothing to initiate
  177. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 11[MGR] checkin IKE_SA home[1]
  178. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 11[MGR] check-in of IKE_SA successful.
  179. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 02[NET] received packet: from 10.3.0.2[500] to 10.255.96.3[500]
  180. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 12[MGR] checkout IKE_SA by message
  181. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 12[MGR] IKE_SA home[1] successfully checked out
  182. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 12[NET] received packet: from 10.3.0.2[500] to 10.255.96.3[500] (76 bytes)
  183. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 02[NET] waiting for data on sockets
  184. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 12[ENC] parsed TRANSACTION request 2566364016 [ HASH CPRQ(X_TYPE X_USER X_PWD) ]
  185. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 12[ENC] generating TRANSACTION response 2566364016 [ HASH CPRP(X_USER X_PWD) ]
  186. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 12[NET] sending packet: from 10.255.96.3[500] to 10.3.0.2[500] (108 bytes)
  187. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 05[NET] sending packet: from 10.255.96.3[500] to 10.3.0.2[500]
  188. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 12[MGR] checkin IKE_SA home[1]
  189. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 12[MGR] check-in of IKE_SA successful.
  190. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 02[NET] received packet: from 10.3.0.2[500] to 10.255.96.3[500]
  191. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 13[MGR] checkout IKE_SA by message
  192. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 13[MGR] IKE_SA home[1] successfully checked out
  193. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 13[NET] received packet: from 10.3.0.2[500] to 10.255.96.3[500] (76 bytes)
  194. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 13[ENC] parsed TRANSACTION request 3588005981 [ HASH CPS(X_STATUS) ]
  195. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 02[NET] waiting for data on sockets
  196. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 13[IKE] XAuth authentication of 'user-pass' (myself) successful
  197. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 13[IKE] IKE_SA home[1] established between 10.255.96.3[SERVER]...10.3.0.2[10.3.0.2]
  198. Jan 1 03:26:35 IPU-0004338 authpriv.info charon: 13[IKE] IKE_SA home[1] established between 10.255.96.3[SERVER]...10.3.0.2[10.3.0.2]
  199. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 13[IKE] IKE_SA home[1] state change: CONNECTING => ESTABLISHED
  200. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 13[IKE] scheduling reauthentication in 86087s
  201. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 13[IKE] maximum IKE_SA lifetime 86267s
  202. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 13[ENC] generating TRANSACTION response 3588005981 [ HASH CPA(X_STATUS) ]
  203. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 13[NET] sending packet: from 10.255.96.3[500] to 10.3.0.2[500] (76 bytes)
  204. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 05[NET] sending packet: from 10.255.96.3[500] to 10.3.0.2[500]
  205. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 13[IKE] activating new tasks
  206. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 13[IKE] activating MODE_CONFIG task
  207. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 13[ENC] generating TRANSACTION request 2602673129 [ HASH CPRQ(ADDR DNS U_SPLITINC U_LOCALLAN) ]
  208. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 13[NET] sending packet: from 10.255.96.3[500] to 10.3.0.2[500] (92 bytes)
  209. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 05[NET] sending packet: from 10.255.96.3[500] to 10.3.0.2[500]
  210. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 13[MGR] checkin IKE_SA home[1]
  211. Jan 1 03:26:35 IPU-0004338 daemon.info charon: 13[MGR] check-in of IKE_SA successful.
  212. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 02[NET] received packet: from 10.3.0.2[500] to 10.255.96.3[500]
  213. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 14[MGR] checkout IKE_SA by message
  214. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 14[MGR] IKE_SA home[1] successfully checked out
  215. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 14[NET] received packet: from 10.3.0.2[500] to 10.255.96.3[500] (92 bytes)
  216. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 02[NET] waiting for data on sockets
  217. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 14[ENC] parsed TRANSACTION response 2602673129 [ HASH CPRP(ADDR DNS DNS) ]
  218. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 14[IKE] processing INTERNAL_IP4_ADDRESS attribute
  219. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 14[IKE] processing INTERNAL_IP4_DNS attribute
  220. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 14[IKE] installing DNS server 10.0.12.61 to /etc/resolv.conf
  221. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 14[IKE] processing INTERNAL_IP4_DNS attribute
  222. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 14[IKE] installing DNS server 10.0.12.60 to /etc/resolv.conf
  223. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 14[KNL] 10.255.96.3 is on interface usb1
  224. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 14[IKE] installing new virtual IP 10.3.10.8
  225. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 14[KNL] virtual IP 10.3.10.8 installed on dummy0
  226. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 14[IKE] activating new tasks
  227. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 14[IKE] activating QUICK_MODE task
  228. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 14[CFG] configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/MODP_1024/NO_EXT_SEQ, ESP:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/BLOWFISH_CBC_256/HMAC_SHA1_96/AES_XCBC_96/HMAC_MD5_96/NO_EXT_SEQ
  229. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 14[KNL] got SPI cc69791e
  230. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 14[CFG] configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/MODP_1024/NO_EXT_SEQ, ESP:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/BLOWFISH_CBC_256/HMAC_SHA1_96/AES_XCBC_96/HMAC_MD5_96/NO_EXT_SEQ
  231. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 14[LIB] size of DH secret exponent: 1023 bits
  232. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 14[CFG] proposing traffic selectors for us:
  233. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 14[CFG] 10.3.10.8/32
  234. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 14[CFG] proposing traffic selectors for other:
  235. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 14[CFG] 0.0.0.0/0
  236. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 14[ENC] generating QUICK_MODE request 2485067236 [ HASH SA No KE ID ID ]
  237. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 14[NET] sending packet: from 10.255.96.3[500] to 10.3.0.2[500] (316 bytes)
  238. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 05[NET] sending packet: from 10.255.96.3[500] to 10.3.0.2[500]
  239. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 14[MGR] checkin IKE_SA home[1]
  240. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 14[MGR] check-in of IKE_SA successful.
  241. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 02[NET] received packet: from 10.3.0.2[500] to 10.255.96.3[500]
  242. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[MGR] checkout IKE_SA by message
  243. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[MGR] IKE_SA home[1] successfully checked out
  244. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[NET] received packet: from 10.3.0.2[500] to 10.255.96.3[500] (332 bytes)
  245. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 02[NET] waiting for data on sockets
  246. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[ENC] parsed QUICK_MODE response 2485067236 [ HASH SA No KE ID ID N((24576)) ]
  247. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[CFG] selecting proposal:
  248. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[CFG] proposal matches
  249. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[CFG] received proposals: ESP:AES_CBC_128/HMAC_SHA1_96/MODP_1024/NO_EXT_SEQ
  250. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[CFG] configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/MODP_1024/NO_EXT_SEQ, ESP:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/BLOWFISH_CBC_256/HMAC_SHA1_96/AES_XCBC_96/HMAC_MD5_96/NO_EXT_SEQ
  251. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[CFG] selected proposal: ESP:AES_CBC_128/HMAC_SHA1_96/MODP_1024/NO_EXT_SEQ
  252. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[CFG] selecting traffic selectors for other:
  253. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[CFG] config: 0.0.0.0/0, received: 0.0.0.0/0 => match: 0.0.0.0/0
  254. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[CHD] using AES_CBC for encryption
  255. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[CHD] using HMAC_SHA1_96 for integrity
  256. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[CHD] adding inbound ESP SA
  257. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[CHD] SPI 0xcc69791e, src 10.3.0.2 dst 10.255.96.3
  258. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[KNL] adding SAD entry with SPI cc69791e and reqid {1} (mark 0/0x00000000)
  259. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[KNL] using encryption algorithm AES_CBC with key size 128
  260. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[KNL] using integrity algorithm HMAC_SHA1_96 with key size 160
  261. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[KNL] using replay window of 32 packets
  262. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[CHD] adding outbound ESP SA
  263. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[CHD] SPI 0x712ee4da, src 10.255.96.3 dst 10.3.0.2
  264. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[KNL] adding SAD entry with SPI 712ee4da and reqid {1} (mark 0/0x00000000)
  265. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[KNL] using encryption algorithm AES_CBC with key size 128
  266. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[KNL] using integrity algorithm HMAC_SHA1_96 with key size 160
  267. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[KNL] using replay window of 32 packets
  268. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[KNL] adding policy 10.3.10.8/32 === 0.0.0.0/0 out (mark 0/0x00000000)
  269. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[KNL] adding policy 0.0.0.0/0 === 10.3.10.8/32 in (mark 0/0x00000000)
  270. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[KNL] adding policy 0.0.0.0/0 === 10.3.10.8/32 fwd (mark 0/0x00000000)
  271. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[KNL] policy 10.3.10.8/32 === 0.0.0.0/0 out (mark 0/0x00000000) already exists, increasing refcount
  272. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[KNL] updating policy 10.3.10.8/32 === 0.0.0.0/0 out (mark 0/0x00000000)
  273. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[KNL] policy 0.0.0.0/0 === 10.3.10.8/32 in (mark 0/0x00000000) already exists, increasing refcount
  274. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[KNL] updating policy 0.0.0.0/0 === 10.3.10.8/32 in (mark 0/0x00000000)
  275. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[KNL] policy 0.0.0.0/0 === 10.3.10.8/32 fwd (mark 0/0x00000000) already exists, increasing refcount
  276. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[KNL] updating policy 0.0.0.0/0 === 10.3.10.8/32 fwd (mark 0/0x00000000)
  277. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[IKE] CHILD_SA home{2} established with SPIs cc69791e_i 712ee4da_o and TS 10.3.10.8/32 === 0.0.0.0/0
  278. Jan 1 03:26:36 IPU-0004338 authpriv.info charon: 10[IKE] CHILD_SA home{2} established with SPIs cc69791e_i 712ee4da_o and TS 10.3.10.8/32 === 0.0.0.0/0
  279. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[KNL] querying SAD entry with SPI cc69791e (mark 0/0x00000000)
  280. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[KNL] querying SAD entry with SPI 712ee4da (mark 0/0x00000000)
  281. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[KNL] 10.255.96.3 is on interface usb1
  282. Jan 1 03:26:36 IPU-0004338 daemon.info charon: 10[CHD] updown: -------------------------------- in the -n
  283. Jan 1 03:26:37 IPU-0004338 daemon.info charon: 10[IKE] reinitiating already active tasks
  284. Jan 1 03:26:37 IPU-0004338 daemon.info charon: 10[IKE] QUICK_MODE task
  285. Jan 1 03:26:37 IPU-0004338 daemon.info charon: 10[ENC] generating QUICK_MODE request 2485067236 [ HASH ]
  286. Jan 1 03:26:37 IPU-0004338 daemon.info charon: 10[NET] sending packet: from 10.255.96.3[500] to 10.3.0.2[500] (60 bytes)
  287. Jan 1 03:26:37 IPU-0004338 daemon.info charon: 05[NET] sending packet: from 10.255.96.3[500] to 10.3.0.2[500]
  288. Jan 1 03:26:37 IPU-0004338 daemon.info charon: 10[IKE] activating new tasks
  289. Jan 1 03:26:37 IPU-0004338 daemon.info charon: 10[IKE] nothing to initiate
  290. Jan 1 03:26:37 IPU-0004338 daemon.info charon: 10[MGR] checkin IKE_SA home[1]
  291. Jan 1 03:26:37 IPU-0004338 daemon.info charon: 10[MGR] check-in of IKE_SA successful.
  292. Jan 1 03:26:37 IPU-0004338 daemon.info charon: 01[KNL] creating roam job due to route change
  293. Jan 1 03:26:37 IPU-0004338 daemon.info charon: 01[MGR] checkout IKE_SA
  294. Jan 1 03:26:37 IPU-0004338 daemon.info charon: 01[MGR] IKE_SA home[1] successfully checked out
  295. Jan 1 03:26:37 IPU-0004338 daemon.info charon: 01[KNL] no address found to reach 10.3.0.2/32
  296. Jan 1 03:26:37 IPU-0004338 daemon.info charon: 01[IKE] old path is not available anymore, try to find another
  297. Jan 1 03:26:37 IPU-0004338 daemon.info charon: 01[IKE] looking for a route to 10.3.0.2 ...
  298. Jan 1 03:26:37 IPU-0004338 daemon.info charon: 01[KNL] no address found to reach 10.3.0.2/32
  299. Jan 1 03:26:37 IPU-0004338 daemon.info charon: 01[IKE] no route found to reach 10.3.0.2, MOBIKE update deferred
  300. Jan 1 03:26:37 IPU-0004338 daemon.info charon: 01[MGR] checkin IKE_SA home[1]
  301. Jan 1 03:26:37 IPU-0004338 daemon.info charon: 01[MGR] check-in of IKE_SA successful.
  302. Jan 1 03:26:38 IPU-0004338 daemon.info charon: 12[CFG] systime not valid, rechecking in 10s
  303. Jan 1 03:26:39 IPU-0004338 daemon.info charon: 13[MGR] checkout IKE_SA
  304. Jan 1 03:26:39 IPU-0004338 daemon.info charon: 13[MGR] IKE_SA home[1] successfully checked out
  305. Jan 1 03:26:39 IPU-0004338 daemon.info charon: 13[MGR] checkin IKE_SA home[1]
  306. Jan 1 03:26:39 IPU-0004338 daemon.info charon: 13[MGR] check-in of IKE_SA successful.
  307. Jan 1 03:26:39 IPU-0004338 daemon.info charon: 15[MGR] checkout IKE_SA
  308. Jan 1 03:26:39 IPU-0004338 daemon.info charon: 15[MGR] IKE_SA home[1] successfully checked out
  309. Jan 1 03:26:39 IPU-0004338 daemon.info charon: 15[MGR] checkin IKE_SA home[1]
  310. Jan 1 03:26:39 IPU-0004338 daemon.info charon: 15[MGR] check-in of IKE_SA successful.
  311. Jan 1 03:26:40 IPU-0004338 daemon.info charon: 16[MGR] checkout IKE_SA
  312. Jan 1 03:26:40 IPU-0004338 daemon.info charon: 16[MGR] IKE_SA home[1] successfully checked out
  313. Jan 1 03:26:40 IPU-0004338 daemon.info charon: 16[MGR] checkin IKE_SA home[1]
  314. Jan 1 03:26:40 IPU-0004338 daemon.info charon: 16[MGR] check-in of IKE_SA successful.
  315. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 09[KNL] received a XFRM_MSG_EXPIRE
  316. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 09[KNL] creating delete job for CHILD_SA ESP/0x712ee4da/10.3.0.2
  317. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 14[MGR] checkout IKE_SA
  318. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 14[MGR] IKE_SA home[1] successfully checked out
  319. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 14[IKE] queueing QUICK_DELETE task
  320. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 14[IKE] activating new tasks
  321. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 14[IKE] activating QUICK_DELETE task
  322. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 14[IKE] closing expired CHILD_SA home{2} with SPIs cc69791e_i 712ee4da_o and TS 10.3.10.8/32 === 0.0.0.0/0
  323. Jul 6 21:16:03 IPU-0004338 authpriv.info charon: 14[IKE] closing expired CHILD_SA home{2} with SPIs cc69791e_i 712ee4da_o and TS 10.3.10.8/32 === 0.0.0.0/0
  324. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 08[KNL] received a XFRM_MSG_EXPIRE
  325. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 08[KNL] creating delete job for CHILD_SA ESP/0xcc69791e/10.255.96.3
  326. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 07[MGR] checkout IKE_SA
  327. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 14[KNL] deleting policy 10.3.10.8/32 === 0.0.0.0/0 out (mark 0/0x00000000)
  328. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 14[KNL] policy still used by another CHILD_SA, not removed
  329. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 14[KNL] updating policy 10.3.10.8/32 === 0.0.0.0/0 out (mark 0/0x00000000)
  330. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 14[KNL] deleting policy 0.0.0.0/0 === 10.3.10.8/32 in (mark 0/0x00000000)
  331. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 14[KNL] policy still used by another CHILD_SA, not removed
  332. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 14[KNL] updating policy 0.0.0.0/0 === 10.3.10.8/32 in (mark 0/0x00000000)
  333. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 14[KNL] deleting policy 0.0.0.0/0 === 10.3.10.8/32 fwd (mark 0/0x00000000)
  334. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 14[KNL] policy still used by another CHILD_SA, not removed
  335. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 14[KNL] updating policy 0.0.0.0/0 === 10.3.10.8/32 fwd (mark 0/0x00000000)
  336. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 14[KNL] deleting policy 10.3.10.8/32 === 0.0.0.0/0 out (mark 0/0x00000000)
  337. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 14[KNL] deleting policy 0.0.0.0/0 === 10.3.10.8/32 in (mark 0/0x00000000)
  338. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 14[KNL] deleting policy 0.0.0.0/0 === 10.3.10.8/32 fwd (mark 0/0x00000000)
  339. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 14[KNL] deleting SAD entry with SPI cc69791e (mark 0/0x00000000)
  340. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 14[KNL] deleting SAD entry with SPI 712ee4da (mark 0/0x00000000)
  341. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 14[IKE] sending DELETE for ESP CHILD_SA with SPI cc69791e
  342. Jul 6 21:16:03 IPU-0004338 daemon.notice ntpd[909]: ntpd 4.2.4p8@1.1612 Tue Sep 3 19:08:48 UTC 2013 (1)
  343. Jul 6 21:16:03 IPU-0004338 daemon.notice ntpd[909]: logging to file /var/log/ntpd.log
  344. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 14[ENC] generating INFORMATIONAL_V1 request 1453053986 [ HASH D ]
  345. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 14[NET] sending packet: from 10.255.96.3[500] to 10.3.0.2[500] (76 bytes)
  346. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 01[KNL] creating roam job due to route change
  347. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 05[NET] sending packet: from 10.255.96.3[500] to 10.3.0.2[500]
  348. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 14[IKE] activating new tasks
  349. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 14[IKE] nothing to initiate
  350. Jul 6 21:16:03 IPU-0004338 daemon.info charon: 14[MGR] checkin IKE_SA home[1]
  351. Jul 6 21:16:04 IPU-0004338 daemon.info charon: 14[MGR] check-in of IKE_SA successful.
  352. Jul 6 21:16:04 IPU-0004338 daemon.info charon: 07[MGR] IKE_SA home[1] successfully checked out
  353. Jul 6 21:16:04 IPU-0004338 daemon.info charon: 07[MGR] checkin IKE_SA home[1]
  354. Jul 6 21:16:04 IPU-0004338 daemon.info charon: 07[MGR] check-in of IKE_SA successful.
  355. Jul 6 21:16:04 IPU-0004338 daemon.info charon: 07[JOB] CHILD_SA ESP/0xcc69791e/10.255.96.3 not found for delete
  356. Jul 6 21:16:04 IPU-0004338 daemon.info charon: 01[MGR] checkout IKE_SA
  357. Jul 6 21:16:04 IPU-0004338 daemon.info charon: 01[MGR] IKE_SA home[1] successfully checked out
  358. Jul 6 21:16:04 IPU-0004338 daemon.info charon: 01[KNL] using 10.255.96.3 as address to reach 10.3.0.2/32
  359. Jul 6 21:16:04 IPU-0004338 daemon.info charon: 01[IKE] keeping connection path 10.255.96.3 - 10.3.0.2
  360. Jul 6 21:16:04 IPU-0004338 daemon.info charon: 01[MGR] checkin IKE_SA home[1]
  361. Jul 6 21:16:04 IPU-0004338 daemon.info charon: 01[MGR] check-in of IKE_SA successful.
  362. Jul 6 21:16:04 IPU-0004338 daemon.info charon: 02[NET] received packet: from 10.3.0.2[500] to 10.255.96.3[500]
  363. Jul 6 21:16:04 IPU-0004338 daemon.info charon: 02[NET] waiting for data on sockets
  364. Jul 6 21:16:04 IPU-0004338 daemon.info charon: 12[MGR] checkout IKE_SA by message
  365. Jul 6 21:16:04 IPU-0004338 daemon.info charon: 12[MGR] IKE_SA home[1] successfully checked out
  366. Jul 6 21:16:04 IPU-0004338 daemon.info charon: 12[NET] received packet: from 10.3.0.2[500] to 10.255.96.3[500] (92 bytes)
  367. Jul 6 21:16:04 IPU-0004338 daemon.info charon: 12[ENC] parsed INFORMATIONAL_V1 request 2617192048 [ HASH D ]
  368. Jul 6 21:16:04 IPU-0004338 daemon.info charon: 12[IKE] received DELETE for IKE_SA home[1]
  369. Jul 6 21:16:04 IPU-0004338 daemon.info charon: 12[IKE] deleting IKE_SA home[1] between 10.255.96.3[SERVER]...10.3.0.2[10.3.0.2]
  370. Jul 6 21:16:04 IPU-0004338 authpriv.info charon: 12[IKE] deleting IKE_SA home[1] between 10.255.96.3[SERVER]...10.3.0.2[10.3.0.2]
  371. Jul 6 21:16:04 IPU-0004338 daemon.info charon: 12[IKE] IKE_SA home[1] state change: ESTABLISHED => DELETING
  372. Jul 6 21:16:04 IPU-0004338 daemon.info charon: 12[IKE] IKE_SA home[1] state change: DELETING => DELETING
  373. Jul 6 21:16:04 IPU-0004338 daemon.info charon: 12[MGR] checkin and destroy IKE_SA home[1]
  374. Jul 6 21:16:04 IPU-0004338 daemon.info charon: 12[IKE] IKE_SA home[1] state change: DELETING => DESTROYING
  375. Jul 6 21:16:04 IPU-0004338 daemon.info charon: 12[IKE] removing DNS server 10.0.12.60 from /etc/resolv.conf
  376. Jul 6 21:16:04 IPU-0004338 daemon.info charon: 12[IKE] removing DNS server 10.0.12.61 from /etc/resolv.conf
  377. Jul 6 21:16:04 IPU-0004338 daemon.info charon: 12[KNL] deleting virtual IP 10.3.10.8
  378. Jul 6 21:16:04 IPU-0004338 daemon.info charon: 12[MGR] check-in and destroy of IKE_SA successful
  379. Jul 6 21:16:06 IPU-0004338 daemon.info charon: 16[CFG] system time got valid, rechecking certificates
  380. Jul 6 21:16:16 IPU-0004338 daemon.info charon: 09[CFG] received stroke: initiate 'home'
  381. Jul 6 21:16:16 IPU-0004338 daemon.info charon: 06[MGR] checkout IKE_SA by config
  382. Jul 6 21:16:16 IPU-0004338 daemon.info charon: 06[MGR] created IKE_SA (unnamed)[2]
  383. Jul 6 21:16:16 IPU-0004338 daemon.info charon: 06[KNL] using 10.255.96.3 as address to reach 10.3.0.2/32
  384. Jul 6 21:16:16 IPU-0004338 daemon.info charon: 06[IKE] queueing ISAKMP_VENDOR task
  385. Jul 6 21:16:16 IPU-0004338 daemon.info charon: 06[IKE] queueing ISAKMP_CERT_PRE task
  386. Jul 6 21:16:16 IPU-0004338 daemon.info charon: 06[IKE] queueing AGGRESSIVE_MODE task
  387. Jul 6 21:16:16 IPU-0004338 daemon.info charon: 06[IKE] queueing ISAKMP_CERT_POST task
  388. Jul 6 21:16:16 IPU-0004338 daemon.info charon: 06[IKE] queueing ISAKMP_NATD task
  389. Jul 6 21:16:16 IPU-0004338 daemon.info charon: 06[IKE] queueing QUICK_MODE task
  390. Jul 6 21:16:16 IPU-0004338 daemon.info charon: 06[IKE] activating new tasks
  391. Jul 6 21:16:16 IPU-0004338 daemon.info charon: 06[IKE] activating ISAKMP_VENDOR task
  392. Jul 6 21:16:16 IPU-0004338 daemon.info charon: 06[IKE] activating ISAKMP_CERT_PRE task
  393. Jul 6 21:16:16 IPU-0004338 daemon.info charon: 06[IKE] activating AGGRESSIVE_MODE task
  394. Jul 6 21:16:16 IPU-0004338 daemon.info charon: 06[IKE] activating ISAKMP_CERT_POST task
  395. Jul 6 21:16:16 IPU-0004338 daemon.info charon: 06[IKE] activating ISAKMP_NATD task
  396. Jul 6 21:16:16 IPU-0004338 daemon.info charon: 06[IKE] sending strongSwan vendor ID
  397. Jul 6 21:16:16 IPU-0004338 daemon.info charon: 06[IKE] sending XAuth vendor ID
  398. Jul 6 21:16:16 IPU-0004338 daemon.info charon: 06[IKE] sending DPD vendor ID
  399. Jul 6 21:16:16 IPU-0004338 daemon.info charon: 06[IKE] sending NAT-T (RFC 3947) vendor ID
  400. Jul 6 21:16:16 IPU-0004338 daemon.info charon: 06[IKE] sending draft-ietf-ipsec-nat-t-ike-02\n vendor ID
  401. Jul 6 21:16:16 IPU-0004338 daemon.info charon: 06[IKE] initiating Aggressive Mode IKE_SA home[2] to 10.3.0.2
  402. Jul 6 21:16:16 IPU-0004338 authpriv.info charon: 06[IKE] initiating Aggressive Mode IKE_SA home[2] to 10.3.0.2
  403. Jul 6 21:16:16 IPU-0004338 daemon.info charon: 06[IKE] IKE_SA home[2] state change: CREATED => CONNECTING
  404. Jul 6 21:16:16 IPU-0004338 daemon.info charon: 06[CFG] configured proposals: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/HMAC_MD5_96/HMAC_SHA1_96/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/AES_XCBC_96/AES
  405. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 06[LIB] size of DH secret exponent: 1023 bits
  406. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 06[ENC] generating AGGRESSIVE request 0 [ SA KE No ID V V V V V ]
  407. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 06[NET] sending packet: from 10.255.96.3[500] to 10.3.0.2[500] (400 bytes)
  408. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 05[NET] sending packet: from 10.255.96.3[500] to 10.3.0.2[500]
  409. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 06[MGR] checkin IKE_SA home[2]
  410. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 02[NET] received packet: from 10.3.0.2[500] to 10.255.96.3[500]
  411. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 10[MGR] checkout IKE_SA by message
  412. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 10[MGR] IKE_SA home[2] successfully checked out
  413. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 10[NET] received packet: from 10.3.0.2[500] to 10.255.96.3[500] (444 bytes)
  414. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 02[NET] waiting for data on sockets
  415. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 10[ENC] parsed AGGRESSIVE response 0 [ SA KE No ID HASH V V V V NAT-D NAT-D V V ]
  416. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 10[IKE] received Cisco Unity vendor ID
  417. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 10[IKE] received XAuth vendor ID
  418. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 10[IKE] received DPD vendor ID
  419. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 10[IKE] received NAT-T (RFC 3947) vendor ID
  420. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 10[IKE] received FRAGMENTATION vendor ID
  421. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 10[ENC] received unknown vendor ID: 1f:07:f7:0e:aa:65:14:d3:b0:fa:96:54:2a:50:01:00
  422. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 10[CFG] selecting proposal:
  423. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 10[CFG] proposal matches
  424. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 10[CFG] received proposals: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
  425. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 10[CFG] configured proposals: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/HMAC_MD5_96/HMAC_SHA1_96/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/AES_XCBC_96/AES
  426. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 10[CFG] selected proposal: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
  427. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 10[IKE] reinitiating already active tasks
  428. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 10[IKE] ISAKMP_VENDOR task
  429. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 10[IKE] AGGRESSIVE_MODE task
  430. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 10[IKE] queueing MODE_CONFIG task
  431. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 10[ENC] generating AGGRESSIVE request 0 [ NAT-D NAT-D HASH ]
  432. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 10[NET] sending packet: from 10.255.96.3[500] to 10.3.0.2[500] (108 bytes)
  433. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 05[NET] sending packet: from 10.255.96.3[500] to 10.3.0.2[500]
  434. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 10[IKE] activating new tasks
  435. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 10[IKE] nothing to initiate
  436. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 10[MGR] checkin IKE_SA home[2]
  437. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 10[MGR] check-in of IKE_SA successful.
  438. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 02[NET] received packet: from 10.3.0.2[500] to 10.255.96.3[500]
  439. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 11[MGR] checkout IKE_SA by message
  440. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 11[MGR] IKE_SA home[2] successfully checked out
  441. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 11[NET] received packet: from 10.3.0.2[500] to 10.255.96.3[500] (76 bytes)
  442. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 02[NET] waiting for data on sockets
  443. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 11[ENC] parsed TRANSACTION request 939939365 [ HASH CPRQ(X_TYPE X_USER X_PWD) ]
  444. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 11[ENC] generating TRANSACTION response 939939365 [ HASH CPRP(X_USER X_PWD) ]
  445. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 11[NET] sending packet: from 10.255.96.3[500] to 10.3.0.2[500] (108 bytes)
  446. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 05[NET] sending packet: from 10.255.96.3[500] to 10.3.0.2[500]
  447. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 11[MGR] checkin IKE_SA home[2]
  448. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 11[MGR] check-in of IKE_SA successful.
  449. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 02[NET] received packet: from 10.3.0.2[500] to 10.255.96.3[500]
  450. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 14[MGR] checkout IKE_SA by message
  451. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 14[MGR] IKE_SA home[2] successfully checked out
  452. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 14[NET] received packet: from 10.3.0.2[500] to 10.255.96.3[500] (76 bytes)
  453. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 02[NET] waiting for data on sockets
  454. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 14[ENC] parsed TRANSACTION request 3468152901 [ HASH CPS(X_STATUS) ]
  455. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 14[IKE] XAuth authentication of 'user-pass' (myself) successful
  456. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 14[IKE] IKE_SA home[2] established between 10.255.96.3[SERVER]...10.3.0.2[10.3.0.2]
  457. Jul 6 21:16:17 IPU-0004338 authpriv.info charon: 14[IKE] IKE_SA home[2] established between 10.255.96.3[SERVER]...10.3.0.2[10.3.0.2]
  458. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 14[IKE] IKE_SA home[2] state change: CONNECTING => ESTABLISHED
  459. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 14[IKE] scheduling reauthentication in 86084s
  460. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 14[IKE] maximum IKE_SA lifetime 86264s
  461. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 14[ENC] generating TRANSACTION response 3468152901 [ HASH CPA(X_STATUS) ]
  462. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 14[NET] sending packet: from 10.255.96.3[500] to 10.3.0.2[500] (76 bytes)
  463. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 05[NET] sending packet: from 10.255.96.3[500] to 10.3.0.2[500]
  464. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 14[IKE] activating new tasks
  465. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 14[IKE] activating MODE_CONFIG task
  466. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 14[ENC] generating TRANSACTION request 1534937380 [ HASH CPRQ(ADDR DNS U_SPLITINC U_LOCALLAN) ]
  467. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 14[NET] sending packet: from 10.255.96.3[500] to 10.3.0.2[500] (92 bytes)
  468. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 05[NET] sending packet: from 10.255.96.3[500] to 10.3.0.2[500]
  469. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 14[MGR] checkin IKE_SA home[2]
  470. Jul 6 21:16:17 IPU-0004338 daemon.info charon: 14[MGR] check-in of IKE_SA successful.
  471. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 02[NET] received packet: from 10.3.0.2[500] to 10.255.96.3[500]
  472. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 07[MGR] checkout IKE_SA by message
  473. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 07[MGR] IKE_SA home[2] successfully checked out
  474. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 07[NET] received packet: from 10.3.0.2[500] to 10.255.96.3[500] (92 bytes)
  475. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 02[NET] waiting for data on sockets
  476. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 07[ENC] parsed TRANSACTION response 1534937380 [ HASH CPRP(ADDR DNS DNS) ]
  477. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 07[IKE] processing INTERNAL_IP4_ADDRESS attribute
  478. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 07[IKE] processing INTERNAL_IP4_DNS attribute
  479. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 07[IKE] installing DNS server 10.0.12.61 to /etc/resolv.conf
  480. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 07[IKE] processing INTERNAL_IP4_DNS attribute
  481. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 07[IKE] installing DNS server 10.0.12.60 to /etc/resolv.conf
  482. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 07[KNL] 10.255.96.3 is on interface usb1
  483. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 07[IKE] installing new virtual IP 10.3.10.8
  484. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 07[KNL] virtual IP 10.3.10.8 installed on dummy0
  485. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 07[IKE] activating new tasks
  486. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 07[IKE] activating QUICK_MODE task
  487. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 07[CFG] configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/MODP_1024/NO_EXT_SEQ, ESP:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/BLOWFISH_CBC_256/HMAC_SHA1_96/AES_XCBC_96/HMAC_MD5_96/NO_EXT_SEQ
  488. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 07[KNL] got SPI c5e6c79b
  489. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 07[CFG] configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/MODP_1024/NO_EXT_SEQ, ESP:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/BLOWFISH_CBC_256/HMAC_SHA1_96/AES_XCBC_96/HMAC_MD5_96/NO_EXT_SEQ
  490. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 07[LIB] size of DH secret exponent: 1023 bits
  491. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 07[CFG] proposing traffic selectors for us:
  492. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 07[CFG] 10.3.10.8/32
  493. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 07[CFG] proposing traffic selectors for other:
  494. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 07[CFG] 0.0.0.0/0
  495. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 07[ENC] generating QUICK_MODE request 361860045 [ HASH SA No KE ID ID ]
  496. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 07[NET] sending packet: from 10.255.96.3[500] to 10.3.0.2[500] (316 bytes)
  497. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 05[NET] sending packet: from 10.255.96.3[500] to 10.3.0.2[500]
  498. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 07[MGR] checkin IKE_SA home[2]
  499. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 07[MGR] check-in of IKE_SA successful.
  500. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 02[NET] received packet: from 10.3.0.2[500] to 10.255.96.3[500]
  501. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[MGR] checkout IKE_SA by message
  502. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[MGR] IKE_SA home[2] successfully checked out
  503. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[NET] received packet: from 10.3.0.2[500] to 10.255.96.3[500] (332 bytes)
  504. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 02[NET] waiting for data on sockets
  505. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[ENC] parsed QUICK_MODE response 361860045 [ HASH SA No KE ID ID N((24576)) ]
  506. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[CFG] selecting proposal:
  507. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[CFG] proposal matches
  508. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[CFG] received proposals: ESP:AES_CBC_128/HMAC_SHA1_96/MODP_1024/NO_EXT_SEQ
  509. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[CFG] configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/MODP_1024/NO_EXT_SEQ, ESP:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/BLOWFISH_CBC_256/HMAC_SHA1_96/AES_XCBC_96/HMAC_MD5_96/NO_EXT_SEQ
  510. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[CFG] selected proposal: ESP:AES_CBC_128/HMAC_SHA1_96/MODP_1024/NO_EXT_SEQ
  511. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[CFG] selecting traffic selectors for other:
  512. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[CFG] config: 0.0.0.0/0, received: 0.0.0.0/0 => match: 0.0.0.0/0
  513. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[CHD] using AES_CBC for encryption
  514. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[CHD] using HMAC_SHA1_96 for integrity
  515. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[CHD] adding inbound ESP SA
  516. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[CHD] SPI 0xc5e6c79b, src 10.3.0.2 dst 10.255.96.3
  517. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[KNL] adding SAD entry with SPI c5e6c79b and reqid {1} (mark 0/0x00000000)
  518. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[KNL] using encryption algorithm AES_CBC with key size 128
  519. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[KNL] using integrity algorithm HMAC_SHA1_96 with key size 160
  520. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[KNL] using replay window of 32 packets
  521. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[CHD] adding outbound ESP SA
  522. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[CHD] SPI 0x9e633426, src 10.255.96.3 dst 10.3.0.2
  523. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[KNL] adding SAD entry with SPI 9e633426 and reqid {1} (mark 0/0x00000000)
  524. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[KNL] using encryption algorithm AES_CBC with key size 128
  525. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[KNL] using integrity algorithm HMAC_SHA1_96 with key size 160
  526. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[KNL] using replay window of 32 packets
  527. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[KNL] adding policy 10.3.10.8/32 === 0.0.0.0/0 out (mark 0/0x00000000)
  528. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[KNL] adding policy 0.0.0.0/0 === 10.3.10.8/32 in (mark 0/0x00000000)
  529. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[KNL] adding policy 0.0.0.0/0 === 10.3.10.8/32 fwd (mark 0/0x00000000)
  530. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[KNL] policy 10.3.10.8/32 === 0.0.0.0/0 out (mark 0/0x00000000) already exists, increasing refcount
  531. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[KNL] updating policy 10.3.10.8/32 === 0.0.0.0/0 out (mark 0/0x00000000)
  532. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[KNL] policy 0.0.0.0/0 === 10.3.10.8/32 in (mark 0/0x00000000) already exists, increasing refcount
  533. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[KNL] updating policy 0.0.0.0/0 === 10.3.10.8/32 in (mark 0/0x00000000)
  534. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[KNL] policy 0.0.0.0/0 === 10.3.10.8/32 fwd (mark 0/0x00000000) already exists, increasing refcount
  535. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[KNL] updating policy 0.0.0.0/0 === 10.3.10.8/32 fwd (mark 0/0x00000000)
  536. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[IKE] CHILD_SA home{3} established with SPIs c5e6c79b_i 9e633426_o and TS 10.3.10.8/32 === 0.0.0.0/0
  537. Jul 6 21:16:18 IPU-0004338 authpriv.info charon: 12[IKE] CHILD_SA home{3} established with SPIs c5e6c79b_i 9e633426_o and TS 10.3.10.8/32 === 0.0.0.0/0
  538. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[KNL] querying SAD entry with SPI c5e6c79b (mark 0/0x00000000)
  539. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[KNL] querying SAD entry with SPI 9e633426 (mark 0/0x00000000)
  540. Jul 6 21:16:18 IPU-0004338 daemon.info charon: 12[KNL] 10.255.96.3 is on interface usb1
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement