Advertisement
Guest User

Untitled

a guest
Jun 7th, 2013
44
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.13 KB | None | 0 0
  1. Jun 07 13:39:51.251 ipsec_setup: Starting Openswan IPsec U2.6.37/K3.5.0-32-generic...
  2. Jun 07 13:39:51.405 ipsec__plutorun: Starting Pluto subsystem...
  3. Jun 07 13:39:51.416 ipsec__plutorun: adjusting ipsec.d to /etc/ipsec.d
  4. Jun 07 13:39:51.423 recvref[30]: Protocol not available
  5. Jun 07 13:39:51.424 xl2tpd[17148]: This binary does not support kernel L2TP.
  6. Jun 07 13:39:51.426 Starting xl2tpd: xl2tpd.
  7. Jun 07 13:39:51.426 xl2tpd[17154]: xl2tpd version xl2tpd-1.3.1 started on santiago-HP PID:17154
  8. Jun 07 13:39:51.427 xl2tpd[17154]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc.
  9. Jun 07 13:39:51.427 xl2tpd[17154]: Forked by Scott Balmos and David Stipp, (C) 2001
  10. Jun 07 13:39:51.429 xl2tpd[17154]: Inherited by Jeff McAdams, (C) 2002
  11. Jun 07 13:39:51.429 xl2tpd[17154]: Forked again by Xelerance (www.xelerance.com) (C) 2006
  12. Jun 07 13:39:51.429 xl2tpd[17154]: Listening on IP address 0.0.0.0, port 1701
  13. Jun 07 13:39:51.547 ipsec__plutorun: 002 added connection description "Telepuerto"
  14. Jun 07 13:41:01.846 104 "Telepuerto" #1: STATE_MAIN_I1: initiate
  15. Jun 07 13:41:01.846 003 "Telepuerto" #1: received Vendor ID payload [RFC 3947] method set to=109
  16. Jun 07 13:41:01.847 003 "Telepuerto" #1: received Vendor ID payload [Dead Peer Detection]
  17. Jun 07 13:41:01.847 106 "Telepuerto" #1: STATE_MAIN_I2: sent MI2, expecting MR2
  18. Jun 07 13:41:01.847 003 "Telepuerto" #1: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): i am NATed
  19. Jun 07 13:41:01.848 108 "Telepuerto" #1: STATE_MAIN_I3: sent MI3, expecting MR3
  20. Jun 07 13:41:01.848 004 "Telepuerto" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1024}
  21. Jun 07 13:41:01.849 117 "Telepuerto" #2: STATE_QUICK_I1: initiate
  22. Jun 07 13:41:01.849 003 "Telepuerto" #2: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
  23. Jun 07 13:41:01.850 003 "Telepuerto" #2: malformed payload in packet
  24. Jun 07 13:41:01.850 010 "Telepuerto" #2: STATE_QUICK_I1: retransmission; will wait 20s for response
  25. Jun 07 13:41:01.850 003 "Telepuerto" #2: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
  26. Jun 07 13:41:01.851 003 "Telepuerto" #2: malformed payload in packet
  27. Jun 07 13:41:01.851 003 "Telepuerto" #2: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
  28. Jun 07 13:41:01.851 003 "Telepuerto" #2: malformed payload in packet
  29. Jun 07 13:41:01.851 003 "Telepuerto" #2: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
  30. Jun 07 13:41:01.852 003 "Telepuerto" #2: malformed payload in packet
  31. Jun 07 13:41:01.852 010 "Telepuerto" #2: STATE_QUICK_I1: retransmission; will wait 40s for response
  32. Jun 07 13:41:01.852 003 "Telepuerto" #2: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
  33. Jun 07 13:41:01.853 003 "Telepuerto" #2: malformed payload in packet
  34. Jun 07 13:41:01.853 031 "Telepuerto" #2: max number of retransmissions (2) reached STATE_QUICK_I1. No acceptable response to our first Quick Mode message: perhaps peer likes no proposal
  35. Jun 07 13:41:01.853 000 "Telepuerto" #2: starting keying attempt 2 of at most 3, but releasing whack
  36. Jun 07 13:41:01.857 [ERROR 300] 'IPsec' failed to negotiate or establish security associations
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement