Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Dec 14 22:47:29: NSS DB directory: sql:/etc/ipsec.d
- Dec 14 22:47:30: NSS initialized
- Dec 14 22:47:30: libcap-ng support [disabled]
- Dec 14 22:47:30: FIPS HMAC integrity support [disabled]
- Dec 14 22:47:30: Linux audit support [disabled]
- Dec 14 22:47:30: Starting Pluto (Libreswan Version 3.17 XFRM(netkey) KLIPS USE_FORK USE_PTHREAD_SETSCHEDPRIO NSS XAUTH_PAM NETWORKMANAGER) pid:7944
- Dec 14 22:47:30: core dump dir: /var/run/pluto/
- Dec 14 22:47:30: secrets file: /etc/ipsec.secrets
- Dec 14 22:47:30: leak-detective disabled
- Dec 14 22:47:30: NSS crypto [enabled]
- Dec 14 22:47:30: XAUTH PAM support [enabled]
- Dec 14 22:47:30: NAT-Traversal support [enabled]
- Dec 14 22:47:30: ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC_SSH: Ok
- Dec 14 22:47:30: ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC: Ok
- Dec 14 22:47:30: ike_alg_register_enc(): Activating OAKLEY_SERPENT_CBC: Ok
- Dec 14 22:47:30: ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok
- Dec 14 22:47:30: ike_alg_register_enc(): Activating OAKLEY_AES_CTR: Ok
- Dec 14 22:47:30: ike_alg_register_enc(): Activating OAKLEY_AES_GCM_A: Ok
- Dec 14 22:47:30: ike_alg_register_enc(): Activating OAKLEY_AES_GCM_B: Ok
- Dec 14 22:47:30: ike_alg_register_enc(): Activating OAKLEY_AES_GCM_C: Ok
- Dec 14 22:47:30: ike_alg_register_hash(): Activating DISABLED-OAKLEY_AES_XCBC: Ok
- Dec 14 22:47:30: ike_alg_register_enc(): Activating OAKLEY_CAMELLIA_CBC: Ok
- Dec 14 22:47:30: ike_alg_register_enc(): Activating OAKLEY_CAMELLIA_CTR: Ok
- Dec 14 22:47:30: ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok
- Dec 14 22:47:30: ike_alg_register_hash(): Activating OAKLEY_SHA2_384: Ok
- Dec 14 22:47:30: ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok
- Dec 14 22:47:30: starting up 3 crypto helpers
- Dec 14 22:47:30: started thread for crypto helper 0 (master fd 11)
- Dec 14 22:47:30: started thread for crypto helper 1 (master fd 13)
- Dec 14 22:47:30: started thread for crypto helper 2 (master fd 15)
- Dec 14 22:47:30: Using Linux XFRM/NETKEY IPsec interface code on 4.7.10-hardened
- Dec 14 22:47:30: ike_alg_register_enc(): Activating aes_ccm_8: Ok
- Dec 14 22:47:30: ike_alg_register_enc(): Activating aes_ccm_12: Ok
- Dec 14 22:47:30: ike_alg_register_enc(): Activating aes_ccm_16: Ok
- Dec 14 22:47:31: added connection description "L2TP-PSK"
- Dec 14 22:47:31: listening for IKE messages
- Dec 14 22:47:31: adding interface wlp3s0/wlp3s0 192.168.1.2:500
- Dec 14 22:47:31: adding interface wlp3s0/wlp3s0 192.168.1.2:4500
- Dec 14 22:47:31: adding interface lo/lo 127.0.0.1:500
- Dec 14 22:47:31: adding interface lo/lo 127.0.0.1:4500
- Dec 14 22:47:31: adding interface lo/lo ::1:500
- Dec 14 22:47:31: | setup callback for interface lo:500 fd 24
- Dec 14 22:47:31: | setup callback for interface lo:4500 fd 23
- Dec 14 22:47:31: | setup callback for interface lo:500 fd 22
- Dec 14 22:47:31: | setup callback for interface wlp3s0:4500 fd 21
- Dec 14 22:47:31: | setup callback for interface wlp3s0:500 fd 20
- Dec 14 22:47:31: loading secrets from "/etc/ipsec.secrets"
- Dec 14 22:47:31: reapchild failed with errno=10 No child processes
- Dec 14 22:47:32: "L2TP-PSK" #1: initiating Main Mode
- Dec 14 22:47:32: "L2TP-PSK" #1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
- Dec 14 22:47:32: "L2TP-PSK" #1: STATE_MAIN_I2: sent MI2, expecting MR2
- Dec 14 22:47:32: "L2TP-PSK" #1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
- Dec 14 22:47:32: "L2TP-PSK" #1: STATE_MAIN_I3: sent MI3, expecting MR3
- Dec 14 22:47:33: "L2TP-PSK" #1: Main mode peer ID is ID_IPV4_ADDR: '123.123.123.123'
- Dec 14 22:47:33: "L2TP-PSK" #1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
- Dec 14 22:47:33: "L2TP-PSK" #1: STATE_MAIN_I4: ISAKMP SA established {auth=PRESHARED_KEY cipher=aes_256 integ=sha group=MODP1024}
- Dec 14 22:47:33: "L2TP-PSK" #2: initiating Quick Mode PSK+ENCRYPT+UP+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO {using isakmp#1 msgid:d2783074 proposal=defaults pfsgroup=no-pfs}
- Dec 14 22:47:33: "L2TP-PSK" #1: ignoring informational payload IPSEC_INITIAL_CONTACT, msgid=00000000, length=28
- Dec 14 22:47:33: | ISAKMP Notification Payload
- Dec 14 22:47:33: | 00 00 00 1c 00 00 00 01 01 10 60 02
- Dec 14 22:47:33: "L2TP-PSK" #1: received and ignored informational message
- Dec 14 22:47:33: "L2TP-PSK" #2: byte 7 of ISAKMP NAT-OA Payload should have been zero, but was not (ignored)
- Dec 14 22:47:33: "L2TP-PSK" #2: byte 8 of ISAKMP NAT-OA Payload should have been zero, but was not (ignored)
- Dec 14 22:47:33: "L2TP-PSK" #2: byte 7 of ISAKMP NAT-OA Payload should have been zero, but was not (ignored)
- Dec 14 22:47:33: "L2TP-PSK" #2: byte 8 of ISAKMP NAT-OA Payload should have been zero, but was not (ignored)
- Dec 14 22:47:33: "L2TP-PSK" #2: NAT-Traversal: received 2 NAT-OA. Ignored because peer is not NATed
- Dec 14 22:47:33: "L2TP-PSK" #2: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
- Dec 14 22:47:33: "L2TP-PSK" #2: STATE_QUICK_I2: sent QI2, IPsec SA established transport mode {ESP/NAT=>0x002797e8 <0x02230efc xfrm=AES_128-HMAC_SHA1 NATOA=none NATD=123.123.123.123:4500 DPD=active}
- Dec 14 22:50:44: forgetting secrets
- Dec 14 22:50:44: loading secrets from "/etc/ipsec.secrets"
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement