Advertisement
Guest User

Untitled

a guest
Jan 22nd, 2013
50
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 11.85 KB | None | 0 0
  1. Jan 22 20:14:21 elisonniven pluto[8471]: |
  2. Jan 22 20:14:21 elisonniven pluto[8471]: | *received 324 bytes from 10.103.2.75:500 on p18p1 (port=500)
  3. Jan 22 20:14:21 elisonniven pluto[8471]: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_AGGR (4)
  4. Jan 22 20:14:21 elisonniven pluto[8471]: packet from 10.103.2.75:500: ignoring unknown Vendor ID payload [4a4340b543e02b84c88a8b96a8af9ebe77d9accc0000000b00000500]
  5. Jan 22 20:14:21 elisonniven pluto[8471]: packet from 10.103.2.75:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
  6. Jan 22 20:14:21 elisonniven pluto[8471]: packet from 10.103.2.75:500: ignoring Vendor ID payload [HeartBeat Notify 386b0100]
  7. Jan 22 20:14:21 elisonniven pluto[8471]: | creating state object #2 at 0x9cba710
  8. Jan 22 20:14:21 elisonniven pluto[8471]: "jun" #2: Aggressive mode peer ID is ID_IPV4_ADDR: '10.103.2.75'
  9. Jan 22 20:14:21 elisonniven pluto[8471]: | started looking for secret for 10.103.6.114->10.103.2.75 of kind PPK_PSK
  10. Jan 22 20:14:21 elisonniven pluto[8471]: | actually looking for secret for 10.103.6.114->10.103.2.75 of kind PPK_PSK
  11. Jan 22 20:14:21 elisonniven pluto[8471]: | 1: compared key 10.103.2.75 to 10.103.6.114 / 10.103.2.75 -> 4
  12. Jan 22 20:14:21 elisonniven pluto[8471]: | 2: compared key 10.103.6.114 to 10.103.6.114 / 10.103.2.75 -> 12
  13. Jan 22 20:14:21 elisonniven pluto[8471]: | line 4: match=12
  14. Jan 22 20:14:21 elisonniven pluto[8471]: | best_match 0>12 best=0x9c8f990 (line=4)
  15. Jan 22 20:14:21 elisonniven pluto[8471]: | concluding with best_match=12 best=0x9c8f990 (lineno=4)
  16. Jan 22 20:14:21 elisonniven pluto[8471]: | offered CA: '%none'
  17. Jan 22 20:14:21 elisonniven pluto[8471]: | processing connection jun
  18. Jan 22 20:14:21 elisonniven pluto[8471]: | ICOOKIE: 3c 2d 3b 1e 5c 83 8d 92
  19. Jan 22 20:14:21 elisonniven pluto[8471]: | RCOOKIE: c2 63 eb 86 90 b0 57 46
  20. Jan 22 20:14:21 elisonniven pluto[8471]: | state hash entry 27
  21. Jan 22 20:14:21 elisonniven pluto[8471]: | inserting state object #2
  22. Jan 22 20:14:21 elisonniven pluto[8471]: | inserting event EVENT_SO_DISCARD, timeout in 0 seconds for #2
  23. Jan 22 20:14:21 elisonniven pluto[8471]: "jun" #2: responding to Aggressive Mode, state #2, connection "jun" from 10.103.2.75
  24. Jan 22 20:14:21 elisonniven pluto[8471]: "jun" #2: enabling possible NAT-traversal with method draft-ietf-ipsec-nat-t-ike-00/01
  25. Jan 22 20:14:21 elisonniven pluto[8471]: | started looking for secret for 10.103.6.114->10.103.2.75 of kind PPK_PSK
  26. Jan 22 20:14:21 elisonniven pluto[8471]: | actually looking for secret for 10.103.6.114->10.103.2.75 of kind PPK_PSK
  27. Jan 22 20:14:21 elisonniven pluto[8471]: | 1: compared key 10.103.2.75 to 10.103.6.114 / 10.103.2.75 -> 4
  28. Jan 22 20:14:21 elisonniven pluto[8471]: | 2: compared key 10.103.6.114 to 10.103.6.114 / 10.103.2.75 -> 12
  29. Jan 22 20:14:21 elisonniven pluto[8471]: | line 4: match=12
  30. Jan 22 20:14:21 elisonniven pluto[8471]: | best_match 0>12 best=0x9c8f990 (line=4)
  31. Jan 22 20:14:21 elisonniven pluto[8471]: | concluding with best_match=12 best=0x9c8f990 (lineno=4)
  32. Jan 22 20:14:21 elisonniven pluto[8471]: | helper -1 doing build_kenonce op id: 0
  33. Jan 22 20:14:21 elisonniven pluto[8471]: | processing connection jun
  34. Jan 22 20:14:21 elisonniven pluto[8471]: | started looking for secret for 10.103.6.114->10.103.2.75 of kind PPK_PSK
  35. Jan 22 20:14:21 elisonniven pluto[8471]: | actually looking for secret for 10.103.6.114->10.103.2.75 of kind PPK_PSK
  36. Jan 22 20:14:21 elisonniven pluto[8471]: | 1: compared key 10.103.2.75 to 10.103.6.114 / 10.103.2.75 -> 4
  37. Jan 22 20:14:21 elisonniven pluto[8471]: | 2: compared key 10.103.6.114 to 10.103.6.114 / 10.103.2.75 -> 12
  38. Jan 22 20:14:21 elisonniven pluto[8471]: | line 4: match=12
  39. Jan 22 20:14:21 elisonniven pluto[8471]: | best_match 0>12 best=0x9c8f990 (line=4)
  40. Jan 22 20:14:21 elisonniven pluto[8471]: | concluding with best_match=12 best=0x9c8f990 (lineno=4)
  41. Jan 22 20:14:21 elisonniven pluto[8471]: | parent1 type: 7 group: 2 len: 2680
  42. Jan 22 20:14:21 elisonniven pluto[8471]: | helper -1 doing compute dh+iv op id: 0
  43. Jan 22 20:14:21 elisonniven pluto[8471]: | processing connection jun
  44. Jan 22 20:14:21 elisonniven pluto[8471]: | thinking about whether to send my certificate:
  45. Jan 22 20:14:21 elisonniven pluto[8471]: | I have RSA key: OAKLEY_PRESHARED_KEY cert.type: CERT_NONE
  46. Jan 22 20:14:21 elisonniven pluto[8471]: | sendcert: CERT_ALWAYSSEND and I did not get a certificate request
  47. Jan 22 20:14:21 elisonniven pluto[8471]: | so do not send cert.
  48. Jan 22 20:14:21 elisonniven pluto[8471]: | I did not send a certificate because digital signatures are not being used. (PSK)
  49. Jan 22 20:14:21 elisonniven pluto[8471]: | I am not sending a certificate request
  50. Jan 22 20:14:21 elisonniven pluto[8471]: | started looking for secret for 10.103.6.114->10.103.2.75 of kind PPK_PSK
  51. Jan 22 20:14:21 elisonniven pluto[8471]: | actually looking for secret for 10.103.6.114->10.103.2.75 of kind PPK_PSK
  52. Jan 22 20:14:21 elisonniven pluto[8471]: | 1: compared key 10.103.2.75 to 10.103.6.114 / 10.103.2.75 -> 4
  53. Jan 22 20:14:21 elisonniven pluto[8471]: | 2: compared key 10.103.6.114 to 10.103.6.114 / 10.103.2.75 -> 12
  54. Jan 22 20:14:21 elisonniven pluto[8471]: | line 4: match=12
  55. Jan 22 20:14:21 elisonniven pluto[8471]: | best_match 0>12 best=0x9c8f990 (line=4)
  56. Jan 22 20:14:21 elisonniven pluto[8471]: | concluding with best_match=12 best=0x9c8f990 (lineno=4)
  57. Jan 22 20:14:21 elisonniven pluto[8471]: | complete state transition with STF_OK
  58. Jan 22 20:14:21 elisonniven pluto[8471]: "jun" #2: transition from state STATE_AGGR_R0 to state STATE_AGGR_R1
  59. Jan 22 20:14:21 elisonniven pluto[8471]: | sending reply packet to 10.103.2.75:500 (from port 500)
  60. Jan 22 20:14:21 elisonniven pluto[8471]: | sending 356 bytes for STATE_AGGR_R0 through p18p1:500 to 10.103.2.75:500 (using #2)
  61. Jan 22 20:14:21 elisonniven pluto[8471]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #2
  62. Jan 22 20:14:21 elisonniven pluto[8471]: "jun" #2: STATE_AGGR_R1: sent AR1, expecting AI2
  63. Jan 22 20:14:21 elisonniven pluto[8471]: | modecfg pull: noquirk policy:push not-client
  64. Jan 22 20:14:21 elisonniven pluto[8471]: | phase 1 is done, looking for phase 2 to unpend
  65. Jan 22 20:14:21 elisonniven pluto[8471]: | complete state transition with STF_INLINE
  66. Jan 22 20:14:21 elisonniven pluto[8471]: | complete state transition with STF_INLINE
  67. Jan 22 20:14:21 elisonniven pluto[8471]: | * processed 0 messages from cryptographic helpers
  68. Jan 22 20:14:21 elisonniven pluto[8471]: | next event EVENT_RETRANSMIT in 10 seconds for #2
  69. Jan 22 20:14:21 elisonniven pluto[8471]: | next event EVENT_RETRANSMIT in 10 seconds for #2
  70. Jan 22 20:14:21 elisonniven pluto[8471]: |
  71. Jan 22 20:14:21 elisonniven pluto[8471]: | *received 100 bytes from 10.103.2.75:500 on p18p1 (port=500)
  72. Jan 22 20:14:21 elisonniven pluto[8471]: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_AGGR (4)
  73. Jan 22 20:14:21 elisonniven pluto[8471]: | ICOOKIE: 3c 2d 3b 1e 5c 83 8d 92
  74. Jan 22 20:14:21 elisonniven pluto[8471]: | RCOOKIE: c2 63 eb 86 90 b0 57 46
  75. Jan 22 20:14:21 elisonniven pluto[8471]: | state hash entry 27
  76. Jan 22 20:14:21 elisonniven pluto[8471]: | v1 peer and cookies match on #2, provided msgid 00000000 vs 00000000
  77. Jan 22 20:14:21 elisonniven pluto[8471]: | v1 state object #2 found, in STATE_AGGR_R1
  78. Jan 22 20:14:21 elisonniven pluto[8471]: | processing connection jun
  79. Jan 22 20:14:21 elisonniven pluto[8471]: "jun" #2: packet rejected: should have been encrypted
  80. Jan 22 20:14:21 elisonniven pluto[8471]: "jun" #2: sending notification INVALID_FLAGS to 10.103.2.75:500
  81. Jan 22 20:14:21 elisonniven pluto[8471]: | sending 40 bytes for notification packet through p18p1:500 to 10.103.2.75:500 (using #2)
  82. Jan 22 20:14:21 elisonniven pluto[8471]: | * processed 0 messages from cryptographic helpers
  83. Jan 22 20:14:21 elisonniven pluto[8471]: | next event EVENT_RETRANSMIT in 10 seconds for #2
  84. Jan 22 20:14:21 elisonniven pluto[8471]: | next event EVENT_RETRANSMIT in 10 seconds for #2
  85. Jan 22 20:14:21 elisonniven pluto[8471]: |
  86. Jan 22 20:14:21 elisonniven pluto[8471]: | *received 348 bytes from 10.103.2.75:500 on p18p1 (port=500)
  87. Jan 22 20:14:21 elisonniven pluto[8471]: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32)
  88. Jan 22 20:14:21 elisonniven pluto[8471]: | ICOOKIE: 3c 2d 3b 1e 5c 83 8d 92
  89. Jan 22 20:14:21 elisonniven pluto[8471]: | RCOOKIE: c2 63 eb 86 90 b0 57 46
  90. Jan 22 20:14:21 elisonniven pluto[8471]: | state hash entry 27
  91. Jan 22 20:14:21 elisonniven pluto[8471]: | v1 peer and cookies match on #2, provided msgid d06d4524 vs 00000000
  92. Jan 22 20:14:21 elisonniven pluto[8471]: | v1 state object not found
  93. Jan 22 20:14:21 elisonniven pluto[8471]: | ICOOKIE: 3c 2d 3b 1e 5c 83 8d 92
  94. Jan 22 20:14:21 elisonniven pluto[8471]: | RCOOKIE: c2 63 eb 86 90 b0 57 46
  95. Jan 22 20:14:21 elisonniven pluto[8471]: | state hash entry 27
  96. Jan 22 20:14:21 elisonniven pluto[8471]: | v1 peer and cookies match on #2, provided msgid 00000000 vs 00000000
  97. Jan 22 20:14:21 elisonniven pluto[8471]: | v1 state object #2 found, in STATE_AGGR_R1
  98. Jan 22 20:14:21 elisonniven pluto[8471]: | processing connection jun
  99. Jan 22 20:14:21 elisonniven pluto[8471]: "jun" #2: Quick Mode message is unacceptable because it is for an incomplete ISAKMP SA
  100. Jan 22 20:14:21 elisonniven pluto[8471]: | payload malformed after IV
  101. Jan 22 20:14:21 elisonniven pluto[8471]: | de 49 0d ec 4c 27 57 e8 de 64 e8 7a f9 f5 bf 55
  102. Jan 22 20:14:21 elisonniven pluto[8471]: | 0e 65 f2 44
  103. Jan 22 20:14:21 elisonniven pluto[8471]: "jun" #2: sending notification PAYLOAD_MALFORMED to 10.103.2.75:500
  104. Jan 22 20:14:21 elisonniven pluto[8471]: | sending 40 bytes for notification packet through p18p1:500 to 10.103.2.75:500 (using #2)
  105. Jan 22 20:14:21 elisonniven pluto[8471]: | * processed 0 messages from cryptographic helpers
  106. Jan 22 20:14:21 elisonniven pluto[8471]: | next event EVENT_RETRANSMIT in 10 seconds for #2
  107. Jan 22 20:14:21 elisonniven pluto[8471]: | next event EVENT_RETRANSMIT in 10 seconds for #2
  108. Jan 22 20:14:25 elisonniven pluto[8471]: |
  109. Jan 22 20:14:25 elisonniven pluto[8471]: | *received 348 bytes from 10.103.2.75:500 on p18p1 (port=500)
  110. Jan 22 20:14:25 elisonniven pluto[8471]: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32)
  111. Jan 22 20:14:25 elisonniven pluto[8471]: | ICOOKIE: 3c 2d 3b 1e 5c 83 8d 92
  112. Jan 22 20:14:25 elisonniven pluto[8471]: | RCOOKIE: c2 63 eb 86 90 b0 57 46
  113. Jan 22 20:14:25 elisonniven pluto[8471]: | state hash entry 27
  114. Jan 22 20:14:25 elisonniven pluto[8471]: | v1 peer and cookies match on #2, provided msgid d06d4524 vs 00000000
  115. Jan 22 20:14:25 elisonniven pluto[8471]: | v1 state object not found
  116. Jan 22 20:14:25 elisonniven pluto[8471]: | ICOOKIE: 3c 2d 3b 1e 5c 83 8d 92
  117. Jan 22 20:14:25 elisonniven pluto[8471]: | RCOOKIE: c2 63 eb 86 90 b0 57 46
  118. Jan 22 20:14:25 elisonniven pluto[8471]: | state hash entry 27
  119. Jan 22 20:14:25 elisonniven pluto[8471]: | v1 peer and cookies match on #2, provided msgid 00000000 vs 00000000
  120. Jan 22 20:14:25 elisonniven pluto[8471]: | v1 state object #2 found, in STATE_AGGR_R1
  121. Jan 22 20:14:25 elisonniven pluto[8471]: | processing connection jun
  122. Jan 22 20:14:25 elisonniven pluto[8471]: "jun" #2: Quick Mode message is unacceptable because it is for an incomplete ISAKMP SA
  123. Jan 22 20:14:25 elisonniven pluto[8471]: | payload malformed after IV
  124. Jan 22 20:14:25 elisonniven pluto[8471]: | de 49 0d ec 4c 27 57 e8 de 64 e8 7a f9 f5 bf 55
  125. Jan 22 20:14:25 elisonniven pluto[8471]: | 0e 65 f2 44
  126. Jan 22 20:14:25 elisonniven pluto[8471]: "jun" #2: sending notification PAYLOAD_MALFORMED to 10.103.2.75:500
  127. Jan 22 20:14:25 elisonniven pluto[8471]: | sending 40 bytes for notification packet through p18p1:500 to 10.103.2.75:500 (using #2)
  128. Jan 22 20:14:25 elisonniven pluto[8471]: | * processed 0 messages from cryptographic helpers
  129. Jan 22 20:14:25 elisonniven pluto[8471]: | next event EVENT_RETRANSMIT in 6 seconds for #2
  130. Jan 22 20:14:25 elisonniven pluto[8471]: | next event EVENT_RETRANSMIT in 6 seconds for #2
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement