Advertisement
Guest User

Untitled

a guest
Dec 14th, 2016
128
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.09 KB | None | 0 0
  1. Dec 14 22:47:29: NSS DB directory: sql:/etc/ipsec.d
  2. Dec 14 22:47:30: NSS initialized
  3. Dec 14 22:47:30: libcap-ng support [disabled]
  4. Dec 14 22:47:30: FIPS HMAC integrity support [disabled]
  5. Dec 14 22:47:30: Linux audit support [disabled]
  6. Dec 14 22:47:30: Starting Pluto (Libreswan Version 3.17 XFRM(netkey) KLIPS USE_FORK USE_PTHREAD_SETSCHEDPRIO NSS XAUTH_PAM NETWORKMANAGER) pid:7944
  7. Dec 14 22:47:30: core dump dir: /var/run/pluto/
  8. Dec 14 22:47:30: secrets file: /etc/ipsec.secrets
  9. Dec 14 22:47:30: leak-detective disabled
  10. Dec 14 22:47:30: NSS crypto [enabled]
  11. Dec 14 22:47:30: XAUTH PAM support [enabled]
  12. Dec 14 22:47:30: NAT-Traversal support [enabled]
  13. Dec 14 22:47:30: ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC_SSH: Ok
  14. Dec 14 22:47:30: ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC: Ok
  15. Dec 14 22:47:30: ike_alg_register_enc(): Activating OAKLEY_SERPENT_CBC: Ok
  16. Dec 14 22:47:30: ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok
  17. Dec 14 22:47:30: ike_alg_register_enc(): Activating OAKLEY_AES_CTR: Ok
  18. Dec 14 22:47:30: ike_alg_register_enc(): Activating OAKLEY_AES_GCM_A: Ok
  19. Dec 14 22:47:30: ike_alg_register_enc(): Activating OAKLEY_AES_GCM_B: Ok
  20. Dec 14 22:47:30: ike_alg_register_enc(): Activating OAKLEY_AES_GCM_C: Ok
  21. Dec 14 22:47:30: ike_alg_register_hash(): Activating DISABLED-OAKLEY_AES_XCBC: Ok
  22. Dec 14 22:47:30: ike_alg_register_enc(): Activating OAKLEY_CAMELLIA_CBC: Ok
  23. Dec 14 22:47:30: ike_alg_register_enc(): Activating OAKLEY_CAMELLIA_CTR: Ok
  24. Dec 14 22:47:30: ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok
  25. Dec 14 22:47:30: ike_alg_register_hash(): Activating OAKLEY_SHA2_384: Ok
  26. Dec 14 22:47:30: ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok
  27. Dec 14 22:47:30: starting up 3 crypto helpers
  28. Dec 14 22:47:30: started thread for crypto helper 0 (master fd 11)
  29. Dec 14 22:47:30: started thread for crypto helper 1 (master fd 13)
  30. Dec 14 22:47:30: started thread for crypto helper 2 (master fd 15)
  31. Dec 14 22:47:30: Using Linux XFRM/NETKEY IPsec interface code on 4.7.10-hardened
  32. Dec 14 22:47:30: ike_alg_register_enc(): Activating aes_ccm_8: Ok
  33. Dec 14 22:47:30: ike_alg_register_enc(): Activating aes_ccm_12: Ok
  34. Dec 14 22:47:30: ike_alg_register_enc(): Activating aes_ccm_16: Ok
  35. Dec 14 22:47:31: added connection description "L2TP-PSK"
  36. Dec 14 22:47:31: listening for IKE messages
  37. Dec 14 22:47:31: adding interface wlp3s0/wlp3s0 192.168.1.2:500
  38. Dec 14 22:47:31: adding interface wlp3s0/wlp3s0 192.168.1.2:4500
  39. Dec 14 22:47:31: adding interface lo/lo 127.0.0.1:500
  40. Dec 14 22:47:31: adding interface lo/lo 127.0.0.1:4500
  41. Dec 14 22:47:31: adding interface lo/lo ::1:500
  42. Dec 14 22:47:31: | setup callback for interface lo:500 fd 24
  43. Dec 14 22:47:31: | setup callback for interface lo:4500 fd 23
  44. Dec 14 22:47:31: | setup callback for interface lo:500 fd 22
  45. Dec 14 22:47:31: | setup callback for interface wlp3s0:4500 fd 21
  46. Dec 14 22:47:31: | setup callback for interface wlp3s0:500 fd 20
  47. Dec 14 22:47:31: loading secrets from "/etc/ipsec.secrets"
  48. Dec 14 22:47:31: reapchild failed with errno=10 No child processes
  49. Dec 14 22:47:32: "L2TP-PSK" #1: initiating Main Mode
  50. Dec 14 22:47:32: "L2TP-PSK" #1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
  51. Dec 14 22:47:32: "L2TP-PSK" #1: STATE_MAIN_I2: sent MI2, expecting MR2
  52. Dec 14 22:47:32: "L2TP-PSK" #1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
  53. Dec 14 22:47:32: "L2TP-PSK" #1: STATE_MAIN_I3: sent MI3, expecting MR3
  54. Dec 14 22:47:33: "L2TP-PSK" #1: Main mode peer ID is ID_IPV4_ADDR: '123.123.123.123'
  55. Dec 14 22:47:33: "L2TP-PSK" #1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
  56. Dec 14 22:47:33: "L2TP-PSK" #1: STATE_MAIN_I4: ISAKMP SA established {auth=PRESHARED_KEY cipher=aes_256 integ=sha group=MODP1024}
  57. Dec 14 22:47:33: "L2TP-PSK" #2: initiating Quick Mode PSK+ENCRYPT+UP+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO {using isakmp#1 msgid:d2783074 proposal=defaults pfsgroup=no-pfs}
  58. Dec 14 22:47:33: "L2TP-PSK" #1: ignoring informational payload IPSEC_INITIAL_CONTACT, msgid=00000000, length=28
  59. Dec 14 22:47:33: | ISAKMP Notification Payload
  60. Dec 14 22:47:33: | 00 00 00 1c 00 00 00 01 01 10 60 02
  61. Dec 14 22:47:33: "L2TP-PSK" #1: received and ignored informational message
  62. Dec 14 22:47:33: "L2TP-PSK" #2: byte 7 of ISAKMP NAT-OA Payload should have been zero, but was not (ignored)
  63. Dec 14 22:47:33: "L2TP-PSK" #2: byte 8 of ISAKMP NAT-OA Payload should have been zero, but was not (ignored)
  64. Dec 14 22:47:33: "L2TP-PSK" #2: byte 7 of ISAKMP NAT-OA Payload should have been zero, but was not (ignored)
  65. Dec 14 22:47:33: "L2TP-PSK" #2: byte 8 of ISAKMP NAT-OA Payload should have been zero, but was not (ignored)
  66. Dec 14 22:47:33: "L2TP-PSK" #2: NAT-Traversal: received 2 NAT-OA. Ignored because peer is not NATed
  67. Dec 14 22:47:33: "L2TP-PSK" #2: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
  68. Dec 14 22:47:33: "L2TP-PSK" #2: STATE_QUICK_I2: sent QI2, IPsec SA established transport mode {ESP/NAT=>0x002797e8 <0x02230efc xfrm=AES_128-HMAC_SHA1 NATOA=none NATD=123.123.123.123:4500 DPD=active}
  69. Dec 14 22:50:44: forgetting secrets
  70. Dec 14 22:50:44: loading secrets from "/etc/ipsec.secrets"
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement