Advertisement
Guest User

log

a guest
Jan 7th, 2015
460
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.63 KB | None | 0 0
  1. Thu Jan 8 04:15:05 2015 authpriv.info ipsec_starter[3345]: Starting strongSwan 5.2.1 IPsec [starter]...
  2. Thu Jan 8 04:15:05 2015 user.err syslog: ah4 is already loaded
  3. Thu Jan 8 04:15:05 2015 user.err syslog: esp4 is already loaded
  4. Thu Jan 8 04:15:05 2015 user.err syslog: ipcomp is already loaded
  5. Thu Jan 8 04:15:05 2015 user.err syslog: xfrm4_tunnel is already loaded
  6. Thu Jan 8 04:15:05 2015 user.err syslog: xfrm_user is already loaded
  7. Thu Jan 8 04:15:05 2015 daemon.info syslog: 00[DMN] Starting IKE charon daemon (strongSwan 5.2.1, Linux 3.10.58, mips)
  8. Thu Jan 8 04:15:05 2015 daemon.info syslog: 00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts'
  9. Thu Jan 8 04:15:05 2015 daemon.info syslog: 00[CFG] loaded ca certificate "C=RU, O=MyOrg-for-ca, CN=MyCA-cn" from '/etc/ipsec.d/cacerts/caCert.pem'
  10. Thu Jan 8 04:15:05 2015 daemon.info syslog: 00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts'
  11. Thu Jan 8 04:15:05 2015 daemon.info syslog: 00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts'
  12. Thu Jan 8 04:15:05 2015 daemon.info syslog: 00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts'
  13. Thu Jan 8 04:15:05 2015 daemon.info syslog: 00[CFG] loading crls from '/etc/ipsec.d/crls'
  14. Thu Jan 8 04:15:05 2015 daemon.info syslog: 00[CFG] loading secrets from '/etc/ipsec.secrets'
  15. Thu Jan 8 04:15:05 2015 daemon.info syslog: 00[CFG] loaded RSA private key from '/etc/ipsec.d/private/serverKey-mm22.pem'
  16. Thu Jan 8 04:15:05 2015 daemon.info syslog: 00[CFG] loaded EAP secret for ddayb
  17. Thu Jan 8 04:15:05 2015 daemon.info syslog: 00[LIB] loaded plugins: charon aes des sha1 sha2 md5 random nonce x509 revocation constraints pubkey pkcs1 pgp dnskey pem fips-prf gmp xcbc hmac attr kernel-netlink resolve socket-default stroke updown xauth-generic
  18. Thu Jan 8 04:15:05 2015 daemon.info syslog: 00[LIB] unable to load 8 plugin features (8 due to unmet dependencies)
  19. Thu Jan 8 04:15:05 2015 daemon.info syslog: 00[JOB] spawning 16 worker threads
  20. Thu Jan 8 04:15:05 2015 authpriv.info ipsec_starter[3358]: charon (3359) started after 100 ms
  21. Thu Jan 8 04:15:05 2015 daemon.info syslog: 10[CFG] received stroke: add connection 'ios8-cert'
  22. Thu Jan 8 04:15:05 2015 daemon.info syslog: 10[CFG] adding virtual IP address pool 192.168.3.100/24
  23. Thu Jan 8 04:15:05 2015 daemon.info syslog: 10[CFG] loaded certificate "C=RU, O=mm22.o, CN=mm22.no-ip.org" from 'serverCert-mm22.pem'
  24. Thu Jan 8 04:15:05 2015 daemon.info syslog: 10[CFG] id '192.168.1.70' not confirmed by certificate, defaulting to 'C=RU, O=mm22.o, CN=mm22.no-ip.org'
  25. Thu Jan 8 04:15:05 2015 daemon.info syslog: 10[CFG] added configuration 'ios8-cert'
  26. Thu Jan 8 04:15:15 2015 daemon.info syslog: 08[NET] received packet: from 82.208.101.28[29098] to 192.168.1.70[500] (416 bytes)
  27. Thu Jan 8 04:15:15 2015 daemon.info syslog: 08[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) ]
  28. Thu Jan 8 04:15:15 2015 daemon.info syslog: 08[IKE] 82.208.101.28 is initiating an IKE_SA
  29. Thu Jan 8 04:15:15 2015 authpriv.info syslog: 08[IKE] 82.208.101.28 is initiating an IKE_SA
  30. Thu Jan 8 04:15:16 2015 daemon.info syslog: 08[IKE] local host is behind NAT, sending keep alives
  31. Thu Jan 8 04:15:16 2015 daemon.info syslog: 08[IKE] remote host is behind NAT
  32. Thu Jan 8 04:15:16 2015 daemon.info syslog: 08[IKE] sending cert request for "C=RU, O=MyOrg-for-ca, CN=MyCA-cn"
  33. Thu Jan 8 04:15:16 2015 daemon.info syslog: 08[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(MULT_AUTH) ]
  34. Thu Jan 8 04:15:16 2015 daemon.info syslog: 08[NET] sending packet: from 192.168.1.70[500] to 82.208.101.28[29098] (465 bytes)
  35. Thu Jan 8 04:15:17 2015 daemon.info syslog: 12[NET] received packet: from 82.208.101.28[29099] to 192.168.1.70[4500] (1420 bytes)
  36. Thu Jan 8 04:15:17 2015 daemon.info syslog: 12[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH CERT CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ]
  37. Thu Jan 8 04:15:17 2015 daemon.info syslog: 12[IKE] received end entity cert "C=RU, O=myOrg-for-client, CN=SmPhone"
  38. Thu Jan 8 04:15:17 2015 daemon.info syslog: 12[CFG] looking for peer configs matching 192.168.1.70[mm22.no-ip.org]...82.208.101.28[SmPhone]
  39. Thu Jan 8 04:15:17 2015 daemon.info syslog: 12[CFG] no matching peer config found
  40. Thu Jan 8 04:15:17 2015 daemon.info syslog: 12[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
  41. Thu Jan 8 04:15:17 2015 daemon.info syslog: 12[ENC] generating IKE_AUTH response 1 [ N(AUTH_FAILED) ]
  42. Thu Jan 8 04:15:17 2015 daemon.info syslog: 12[NET] sending packet: from 192.168.1.70[4500] to 82.208.101.28[29099] (76 bytes)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement