Advertisement
Guest User

Log Bintec R230a VPN Certificate

a guest
Feb 21st, 2014
65
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. 14/02/21 09:11:01 ## : IKE Daemon, ver 2.2.2
  2. 14/02/21 09:11:01 ## : Copyright 2013 Shrew Soft Inc.
  3. 14/02/21 09:11:01 ## : This product linked OpenSSL 1.0.1c 10 May 2012
  4. 14/02/21 09:11:01 ii : opened 'C:\Program Files\ShrewSoft\VPN Client\debug\iked.log'
  5. 14/02/21 09:11:01 ii : opened 'C:\Program Files\ShrewSoft\VPN Client/debug/dump-ike-decrypt.cap'
  6. 14/02/21 09:11:01 ii : opened 'C:\Program Files\ShrewSoft\VPN Client/debug/dump-ike-encrypt.cap'
  7. 14/02/21 09:11:01 ii : rebuilding vnet device list ...
  8. 14/02/21 09:11:01 ii : device ROOT\VNET\0000 disabled
  9. 14/02/21 09:11:01 ii : network process thread begin ...
  10. 14/02/21 09:11:01 ii : pfkey process thread begin ...
  11. 14/02/21 09:11:01 ii : ipc server process thread begin ...
  12. 14/02/21 09:11:07 ii : ipc client process thread begin ...
  13. 14/02/21 09:11:07 <A : peer config add message
  14. 14/02/21 09:11:07 <A : proposal config message
  15. 14/02/21 09:11:07 <A : proposal config message
  16. 14/02/21 09:11:07 <A : client config message
  17. 14/02/21 09:11:07 <A : local id 'vpncert' message
  18. 14/02/21 09:11:07 <A : remote id 'vpncert' message
  19. 14/02/21 09:11:07 <A : remote certificate data message
  20. 14/02/21 09:11:07 ii : remote certificate read complete ( 710 bytes )
  21. 14/02/21 09:11:07 <A : local certificate data message
  22. 14/02/21 09:11:07 !! : libeay : .\crypto\pkcs12\p12_kiss.c:110
  23. 14/02/21 09:11:07 !! : error:23076071:PKCS12 routines:PKCS12_parse:mac verify failure
  24. 14/02/21 09:11:07 !! : local certificate read failed, requesting password
  25. 14/02/21 09:11:09 <A : file password
  26. 14/02/21 09:11:09 <A : local certificate data message
  27. 14/02/21 09:11:09 ii : local certificate read complete ( 529 bytes )
  28. 14/02/21 09:11:09 <A : local key data message
  29. 14/02/21 09:11:09 ii : local key read complete ( 610 bytes )
  30. 14/02/21 09:11:09 <A : peer tunnel enable message
  31. 14/02/21 09:11:09 DB : peer ref increment ( ref count = 1, obj count = 0 )
  32. 14/02/21 09:11:09 DB : peer added ( obj count = 1 )
  33. 14/02/21 09:11:09 ii : local address 192.168.0.29 selected for peer
  34. 14/02/21 09:11:09 DB : peer ref increment ( ref count = 2, obj count = 1 )
  35. 14/02/21 09:11:09 DB : tunnel ref increment ( ref count = 1, obj count = 0 )
  36. 14/02/21 09:11:09 DB : tunnel added ( obj count = 1 )
  37. 14/02/21 09:11:09 DB : tunnel ref increment ( ref count = 2, obj count = 1 )
  38. 14/02/21 09:11:09 !! : failed to generate local asn1-dn id from 'vpncert'
  39. 14/02/21 09:11:09 DB : new phase1 ( ISAKMP initiator )
  40. 14/02/21 09:11:09 DB : exchange type is identity protect
  41. 14/02/21 09:11:09 DB : 192.168.0.29:500 <-> y.y.y.y:500
  42. 14/02/21 09:11:09 DB : a15f8ca7177416df:0000000000000000
  43. 14/02/21 09:11:09 DB : phase1 ref increment ( ref count = 1, obj count = 0 )
  44. 14/02/21 09:11:09 DB : phase1 added ( obj count = 1 )
  45. 14/02/21 09:11:09 >> : security association payload
  46. 14/02/21 09:11:09 >> : - proposal #1 payload
  47. 14/02/21 09:11:09 >> : -- transform #1 payload
  48. 14/02/21 09:11:09 >> : -- transform #2 payload
  49. 14/02/21 09:11:09 >> : -- transform #3 payload
  50. 14/02/21 09:11:09 >> : vendor id payload
  51. 14/02/21 09:11:09 ii : local supports nat-t ( draft v00 )
  52. 14/02/21 09:11:09 >> : vendor id payload
  53. 14/02/21 09:11:09 ii : local supports nat-t ( draft v01 )
  54. 14/02/21 09:11:09 >> : vendor id payload
  55. 14/02/21 09:11:09 ii : local supports nat-t ( draft v02 )
  56. 14/02/21 09:11:09 >> : vendor id payload
  57. 14/02/21 09:11:09 ii : local supports nat-t ( draft v03 )
  58. 14/02/21 09:11:09 >> : vendor id payload
  59. 14/02/21 09:11:09 ii : local supports nat-t ( rfc )
  60. 14/02/21 09:11:09 >> : vendor id payload
  61. 14/02/21 09:11:09 ii : local is SHREW SOFT compatible
  62. 14/02/21 09:11:09 >> : vendor id payload
  63. 14/02/21 09:11:09 ii : local is NETSCREEN compatible
  64. 14/02/21 09:11:09 >> : vendor id payload
  65. 14/02/21 09:11:09 ii : local is SIDEWINDER compatible
  66. 14/02/21 09:11:09 >> : vendor id payload
  67. 14/02/21 09:11:09 ii : local is CISCO UNITY compatible
  68. 14/02/21 09:11:09 >= : cookies a15f8ca7177416df:0000000000000000
  69. 14/02/21 09:11:09 >= : message 00000000
  70. 14/02/21 09:11:09 -> : send IKE packet 192.168.0.29:500 -> y.y.y.y:500 ( 380 bytes )
  71. 14/02/21 09:11:09 0x : 4500017c 4eab0000 401119fb c0a8001d d96c7699 01f401f4 0168b0fb a15f8ca7
  72. 14/02/21 09:11:09 0x : 177416df 00000000 00000000 01100200 00000000 00000160 0d00008c 00000001
  73. 14/02/21 09:11:09 0x : 00000001 00000080 01010003 03000028 01010000 80010003 800e0100 80020001
  74. 14/02/21 09:11:09 0x : 80040002 80030003 800b0001 000c0004 00000bb8 03000028 02010000 80010003
  75. 14/02/21 09:11:09 0x : 800e00c0 80020001 80040002 80030003 800b0001 000c0004 00000bb8 00000028
  76. 14/02/21 09:11:09 0x : 03010000 80010003 800e0080 80020001 80040002 80030003 800b0001 000c0004
  77. 14/02/21 09:11:09 0x : 00000bb8 0d000014 4485152d 18b6bbcd 0be8a846 9579ddcc 0d000014 16f6ca16
  78. 14/02/21 09:11:09 0x : e4a4066d 83821a0f 0aeaa862 0d000014 90cb8091 3ebb696e 086381b5 ec427b1f
  79. 14/02/21 09:11:09 0x : 0d000014 7d9419a6 5310ca6f 2c179d92 15529d56 0d000014 4a131c81 07035845
  80. 14/02/21 09:11:09 0x : 5c5728f2 0e95452f 0d000014 f14b94b7 bff1fef0 2773b8c4 9feded26 0d000018
  81. 14/02/21 09:11:09 0x : 166f932d 55eb64d8 e4df4fd3 7e2313f0 d0fd8451 0d000014 8404adf9 cda05760
  82. 14/02/21 09:11:09 0x : b2ca292e 4bff537b 00000014 12f5f28c 457168a9 702d9fe2 74cc0100
  83. 14/02/21 09:11:09 DB : phase1 resend event scheduled ( ref count = 2 )
  84. 14/02/21 09:11:09 DB : phase1 ref decrement ( ref count = 1, obj count = 1 )
  85. 14/02/21 09:11:09 <- : recv IKE packet y.y.y.y:500 -> 192.168.0.29:500 ( 102 bytes )
  86. 14/02/21 09:11:09 0x : a15f8ca7 177416df 1486ca8b cdd43878 0b100500 f75d2cea 00000066 0000004a
  87. 14/02/21 09:11:09 0x : 00000001 0110000e a15f8ca7 177416df 1486ca8b cdd43878 800c0001 00060022
  88. 14/02/21 09:11:09 0x : 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73
  89. 14/02/21 09:11:09 0x : 616c8008 0000
  90. 14/02/21 09:11:09 DB : phase1 found
  91. 14/02/21 09:11:09 DB : phase1 ref increment ( ref count = 2, obj count = 1 )
  92. 14/02/21 09:11:09 ii : processing informational packet ( 102 bytes )
  93. 14/02/21 09:11:09 =< : cookies a15f8ca7177416df:1486ca8bcdd43878
  94. 14/02/21 09:11:09 =< : message f75d2cea
  95. 14/02/21 09:11:09 << : notification payload
  96. 14/02/21 09:11:09 ii : received peer NO-PROPOSAL-CHOSEN notification
  97. 14/02/21 09:11:09 ii : - y.y.y.y:500 -> 192.168.0.29:500
  98. 14/02/21 09:11:09 ii : - isakmp spi = a15f8ca7177416df:1486ca8bcdd43878
  99. 14/02/21 09:11:09 ii : - data size 46
  100. 14/02/21 09:11:09 DB : phase1 ref decrement ( ref count = 1, obj count = 1 )
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement