Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Jun 07 13:39:51.251 ipsec_setup: Starting Openswan IPsec U2.6.37/K3.5.0-32-generic...
- Jun 07 13:39:51.405 ipsec__plutorun: Starting Pluto subsystem...
- Jun 07 13:39:51.416 ipsec__plutorun: adjusting ipsec.d to /etc/ipsec.d
- Jun 07 13:39:51.423 recvref[30]: Protocol not available
- Jun 07 13:39:51.424 xl2tpd[17148]: This binary does not support kernel L2TP.
- Jun 07 13:39:51.426 Starting xl2tpd: xl2tpd.
- Jun 07 13:39:51.426 xl2tpd[17154]: xl2tpd version xl2tpd-1.3.1 started on santiago-HP PID:17154
- Jun 07 13:39:51.427 xl2tpd[17154]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc.
- Jun 07 13:39:51.427 xl2tpd[17154]: Forked by Scott Balmos and David Stipp, (C) 2001
- Jun 07 13:39:51.429 xl2tpd[17154]: Inherited by Jeff McAdams, (C) 2002
- Jun 07 13:39:51.429 xl2tpd[17154]: Forked again by Xelerance (www.xelerance.com) (C) 2006
- Jun 07 13:39:51.429 xl2tpd[17154]: Listening on IP address 0.0.0.0, port 1701
- Jun 07 13:39:51.547 ipsec__plutorun: 002 added connection description "Telepuerto"
- Jun 07 13:41:01.846 104 "Telepuerto" #1: STATE_MAIN_I1: initiate
- Jun 07 13:41:01.846 003 "Telepuerto" #1: received Vendor ID payload [RFC 3947] method set to=109
- Jun 07 13:41:01.847 003 "Telepuerto" #1: received Vendor ID payload [Dead Peer Detection]
- Jun 07 13:41:01.847 106 "Telepuerto" #1: STATE_MAIN_I2: sent MI2, expecting MR2
- Jun 07 13:41:01.847 003 "Telepuerto" #1: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): i am NATed
- Jun 07 13:41:01.848 108 "Telepuerto" #1: STATE_MAIN_I3: sent MI3, expecting MR3
- Jun 07 13:41:01.848 004 "Telepuerto" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1024}
- Jun 07 13:41:01.849 117 "Telepuerto" #2: STATE_QUICK_I1: initiate
- Jun 07 13:41:01.849 003 "Telepuerto" #2: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
- Jun 07 13:41:01.850 003 "Telepuerto" #2: malformed payload in packet
- Jun 07 13:41:01.850 010 "Telepuerto" #2: STATE_QUICK_I1: retransmission; will wait 20s for response
- Jun 07 13:41:01.850 003 "Telepuerto" #2: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
- Jun 07 13:41:01.851 003 "Telepuerto" #2: malformed payload in packet
- Jun 07 13:41:01.851 003 "Telepuerto" #2: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
- Jun 07 13:41:01.851 003 "Telepuerto" #2: malformed payload in packet
- Jun 07 13:41:01.851 003 "Telepuerto" #2: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
- Jun 07 13:41:01.852 003 "Telepuerto" #2: malformed payload in packet
- Jun 07 13:41:01.852 010 "Telepuerto" #2: STATE_QUICK_I1: retransmission; will wait 40s for response
- Jun 07 13:41:01.852 003 "Telepuerto" #2: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
- Jun 07 13:41:01.853 003 "Telepuerto" #2: malformed payload in packet
- Jun 07 13:41:01.853 031 "Telepuerto" #2: max number of retransmissions (2) reached STATE_QUICK_I1. No acceptable response to our first Quick Mode message: perhaps peer likes no proposal
- Jun 07 13:41:01.853 000 "Telepuerto" #2: starting keying attempt 2 of at most 3, but releasing whack
- Jun 07 13:41:01.857 [ERROR 300] 'IPsec' failed to negotiate or establish security associations
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement