Advertisement
Guest User

VPN Log

a guest
Jan 13th, 2016
37
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 11.68 KB | None | 0 0
  1. Jan 11 20:14:46 TANNHAUSER charon: 04[NET] <12> received packet: from 24.xxx.xxx.xxx[500] to 99.xxx.xxx.xxx[500] (300 bytes)
  2. Jan 11 20:14:46 TANNHAUSER charon: 04[ENC] <12> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ]
  3. Jan 11 20:14:46 TANNHAUSER charon: 04[IKE] <12> 24.xxx.xxx.xxx is initiating an IKE_SA
  4. Jan 11 20:14:46 TANNHAUSER charon: 04[IKE] <12> remote host is behind NAT
  5. Jan 11 20:14:46 TANNHAUSER charon: 04[IKE] <12> sending cert request for "C=US, ST=California, L=Fairfield, O=MyCompany, E=services@company.com, CN=companyVPN"
  6. Jan 11 20:14:46 TANNHAUSER charon: 04[ENC] <12> generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(MULT_AUTH) ]
  7. Jan 11 20:14:46 TANNHAUSER charon: 04[NET] <12> sending packet: from 99.xxx.xxx.xxx[500] to 24.xxx.xxx.xxx[500] (341 bytes)
  8. Jan 11 20:14:46 TANNHAUSER charon: 10[NET] <12> received packet: from 24.xxx.xxx.xxx[45543] to 99.xxx.xxx.xxx[4500] (332 bytes)
  9. Jan 11 20:14:46 TANNHAUSER charon: 10[ENC] <12> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ]
  10. Jan 11 20:14:46 TANNHAUSER charon: 10[CFG] <12> looking for peer configs matching 99.xxx.xxx.xxx[invoice.company.com]...24.xxx.xxx.xxx[172.16.27.254]
  11. Jan 11 20:14:46 TANNHAUSER charon: 10[CFG] <con1|12> selected peer config 'con1'
  12. Jan 11 20:14:46 TANNHAUSER charon: 10[IKE] <con1|12> initiating EAP_IDENTITY method (id 0x00)
  13. Jan 11 20:14:46 TANNHAUSER charon: 10[IKE] <con1|12> received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
  14. Jan 11 20:14:46 TANNHAUSER charon: 10[IKE] <con1|12> peer supports MOBIKE, but disabled in config
  15. Jan 11 20:14:46 TANNHAUSER charon: 10[IKE] <con1|12> authentication of 'invoice.company.com' (myself) with RSA signature successful
  16. Jan 11 20:14:46 TANNHAUSER charon: 10[IKE] <con1|12> sending end entity cert "C=US, ST=California, L=Fairfield, O=MyCompany, E=services@company.com, CN=invoice.company.com"
  17. Jan 11 20:14:46 TANNHAUSER charon: 10[ENC] <con1|12> generating IKE_AUTH response 1 [ IDr CERT AUTH EAP/REQ/ID ]
  18. Jan 11 20:14:46 TANNHAUSER charon: 10[ENC] <con1|12> splitting IKE message with length of 2468 bytes into 5 fragments
  19. Jan 11 20:14:46 TANNHAUSER charon: 10[ENC] <con1|12> generating IKE_AUTH response 1 [ EF(1/5) ]
  20. Jan 11 20:14:46 TANNHAUSER charon: 10[ENC] <con1|12> generating IKE_AUTH response 1 [ EF(2/5) ]
  21. Jan 11 20:14:46 TANNHAUSER charon: 10[ENC] <con1|12> generating IKE_AUTH response 1 [ EF(3/5) ]
  22. Jan 11 20:14:46 TANNHAUSER charon: 10[ENC] <con1|12> generating IKE_AUTH response 1 [ EF(4/5) ]
  23. Jan 11 20:14:46 TANNHAUSER charon: 10[ENC] <con1|12> generating IKE_AUTH response 1 [ EF(5/5) ]
  24. Jan 11 20:14:46 TANNHAUSER charon: 10[NET] <con1|12> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[45543] (544 bytes)
  25. Jan 11 20:14:46 TANNHAUSER charon: 10[NET] <con1|12> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[45543] (544 bytes)
  26. Jan 11 20:14:46 TANNHAUSER charon: 10[NET] <con1|12> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[45543] (544 bytes)
  27. Jan 11 20:14:46 TANNHAUSER charon: 10[NET] <con1|12> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[45543] (544 bytes)
  28. Jan 11 20:14:46 TANNHAUSER charon: 10[NET] <con1|12> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[45543] (528 bytes)
  29. Jan 11 20:14:46 TANNHAUSER charon: 07[NET] <con1|12> received packet: from 24.xxx.xxx.xxx[45543] to 99.xxx.xxx.xxx[4500] (84 bytes)
  30. Jan 11 20:14:46 TANNHAUSER charon: 07[ENC] <con1|12> parsed IKE_AUTH request 2 [ EAP/RES/ID ]
  31. Jan 11 20:14:46 TANNHAUSER charon: 07[IKE] <con1|12> received EAP identity 'kyle@company.com'
  32. Jan 11 20:14:46 TANNHAUSER charon: 07[IKE] <con1|12> initiating EAP_MSCHAPV2 method (id 0x3E)
  33. Jan 11 20:14:46 TANNHAUSER charon: 07[ENC] <con1|12> generating IKE_AUTH response 2 [ EAP/REQ/MSCHAPV2 ]
  34. Jan 11 20:14:46 TANNHAUSER charon: 07[NET] <con1|12> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[45543] (100 bytes)
  35. Jan 11 20:14:46 TANNHAUSER charon: 08[NET] <con1|12> received packet: from 24.xxx.xxx.xxx[45543] to 99.xxx.xxx.xxx[4500] (140 bytes)
  36. Jan 11 20:14:46 TANNHAUSER charon: 08[ENC] <con1|12> parsed IKE_AUTH request 3 [ EAP/RES/MSCHAPV2 ]
  37. Jan 11 20:14:46 TANNHAUSER charon: 08[ENC] <con1|12> generating IKE_AUTH response 3 [ EAP/REQ/MSCHAPV2 ]
  38. Jan 11 20:14:46 TANNHAUSER charon: 08[NET] <con1|12> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[45543] (132 bytes)
  39. Jan 11 20:14:46 TANNHAUSER charon: 08[NET] <con1|12> received packet: from 24.xxx.xxx.xxx[45543] to 99.xxx.xxx.xxx[4500] (68 bytes)
  40. Jan 11 20:14:46 TANNHAUSER charon: 08[ENC] <con1|12> parsed IKE_AUTH request 4 [ EAP/RES/MSCHAPV2 ]
  41. Jan 11 20:14:46 TANNHAUSER charon: 08[IKE] <con1|12> EAP method EAP_MSCHAPV2 succeeded, MSK established
  42. Jan 11 20:14:46 TANNHAUSER charon: 08[ENC] <con1|12> generating IKE_AUTH response 4 [ EAP/SUCC ]
  43. Jan 11 20:14:46 TANNHAUSER charon: 08[NET] <con1|12> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[45543] (68 bytes)
  44. Jan 11 20:14:46 TANNHAUSER charon: 07[NET] <con1|12> received packet: from 24.xxx.xxx.xxx[45543] to 99.xxx.xxx.xxx[4500] (84 bytes)
  45. Jan 11 20:14:46 TANNHAUSER charon: 07[ENC] <con1|12> parsed IKE_AUTH request 5 [ AUTH ]
  46. Jan 11 20:14:46 TANNHAUSER charon: 07[IKE] <con1|12> authentication of '172.16.27.254' with EAP successful
  47. Jan 11 20:14:46 TANNHAUSER charon: 07[IKE] <con1|12> authentication of 'invoice.company.com' (myself) with EAP
  48. Jan 11 20:14:46 TANNHAUSER charon: 07[IKE] <con1|11> deleting duplicate IKE_SA for peer 'kyle@company.com' due to uniqueness policy
  49. Jan 11 20:14:46 TANNHAUSER charon: 07[IKE] <con1|11> deleting IKE_SA con1[11] between 99.xxx.xxx.xxx[invoice.company.com]...24.xxx.xxx.xxx[172.16.27.254]
  50. Jan 11 20:14:46 TANNHAUSER charon: 07[IKE] <con1|11> sending DELETE for IKE_SA con1[11]
  51. Jan 11 20:14:46 TANNHAUSER charon: 07[ENC] <con1|11> generating INFORMATIONAL request 0 [ D ]
  52. Jan 11 20:14:46 TANNHAUSER charon: 07[NET] <con1|11> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[33410] (68 bytes)
  53. Jan 11 20:14:46 TANNHAUSER charon: 07[IKE] <con1|12> IKE_SA con1[12] established between 99.xxx.xxx.xxx[invoice.company.com]...24.xxx.xxx.xxx[172.16.27.254]
  54. Jan 11 20:14:46 TANNHAUSER charon: 07[IKE] <con1|12> scheduling reauthentication in 28238s
  55. Jan 11 20:14:46 TANNHAUSER charon: 07[IKE] <con1|12> maximum IKE_SA lifetime 28778s
  56. Jan 11 20:14:46 TANNHAUSER charon: 07[IKE] <con1|12> peer requested virtual IP %any
  57. Jan 11 20:14:46 TANNHAUSER charon: 07[CFG] <con1|12> assigning new lease to 'kyle@company.com'
  58. Jan 11 20:14:46 TANNHAUSER charon: 07[IKE] <con1|12> assigning virtual IP 192.0.2.2 to peer 'kyle@company.com'
  59. Jan 11 20:14:46 TANNHAUSER charon: 07[IKE] <con1|12> peer requested virtual IP %any6
  60. Jan 11 20:14:46 TANNHAUSER charon: 07[IKE] <con1|12> no virtual IP found for %any6 requested by 'kyle@company.com'
  61. Jan 11 20:14:46 TANNHAUSER charon: 07[IKE] <con1|12> CHILD_SA con1{19} established with SPIs c97dc5af_i 03582f5b_o and TS 10.10.0.0/16|/0 === 192.0.2.2/32|/0
  62. Jan 11 20:14:46 TANNHAUSER charon: 07[ENC] <con1|12> generating IKE_AUTH response 5 [ AUTH CPRP(ADDR SUBNET U_SPLITINC U_PFS) N(ESP_TFC_PAD_N) SA TSi TSr N(AUTH_LFT) ]
  63. Jan 11 20:14:46 TANNHAUSER charon: 07[NET] <con1|12> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[45543] (236 bytes)
  64. Jan 11 20:14:50 TANNHAUSER charon: 09[IKE] <con1|11> retransmit 1 of request with message ID 0
  65. Jan 11 20:14:50 TANNHAUSER charon: 09[NET] <con1|11> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[33410] (68 bytes)
  66. Jan 11 20:14:57 TANNHAUSER charon: 14[IKE] <con1|11> retransmit 2 of request with message ID 0
  67. Jan 11 20:14:57 TANNHAUSER charon: 14[NET] <con1|11> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[33410] (68 bytes)
  68. Jan 11 20:15:10 TANNHAUSER charon: 09[IKE] <con1|11> retransmit 3 of request with message ID 0
  69. Jan 11 20:15:10 TANNHAUSER charon: 09[NET] <con1|11> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[33410] (68 bytes)
  70. Jan 11 20:15:33 TANNHAUSER charon: 09[IKE] <con1|11> retransmit 4 of request with message ID 0
  71. Jan 11 20:15:33 TANNHAUSER charon: 09[NET] <con1|11> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[33410] (68 bytes)
  72. Jan 11 20:16:15 TANNHAUSER charon: 14[IKE] <con1|11> retransmit 5 of request with message ID 0
  73. Jan 11 20:16:15 TANNHAUSER charon: 14[NET] <con1|11> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[33410] (68 bytes)
  74. Jan 11 20:17:31 TANNHAUSER charon: 14[IKE] <con1|11> giving up after 5 retransmits
  75. Jan 11 20:17:31 TANNHAUSER charon: 14[IKE] <con1|11> proper IKE_SA delete failed, peer not responding
  76. Jan 11 20:17:31 TANNHAUSER charon: 14[CFG] <con1|11> lease 192.0.2.1 by 'kyle@company.com' went offline
  77. Jan 11 20:24:46 TANNHAUSER charon: 16[NET] <con1|12> received packet: from 24.xxx.xxx.xxx[45543] to 99.xxx.xxx.xxx[4500] (60 bytes)
  78. Jan 11 20:24:46 TANNHAUSER charon: 16[ENC] <con1|12> parsed INFORMATIONAL request 6 [ ]
  79. Jan 11 20:24:46 TANNHAUSER charon: 16[ENC] <con1|12> generating INFORMATIONAL response 6 [ ]
  80. Jan 11 20:24:46 TANNHAUSER charon: 16[NET] <con1|12> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[45543] (60 bytes)
  81. Jan 11 20:34:46 TANNHAUSER charon: 16[NET] <con1|12> received packet: from 24.xxx.xxx.xxx[45543] to 99.xxx.xxx.xxx[4500] (60 bytes)
  82. Jan 11 20:34:46 TANNHAUSER charon: 16[ENC] <con1|12> parsed INFORMATIONAL request 7 [ ]
  83. Jan 11 20:34:46 TANNHAUSER charon: 16[ENC] <con1|12> generating INFORMATIONAL response 7 [ ]
  84. Jan 11 20:34:46 TANNHAUSER charon: 16[NET] <con1|12> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[45543] (60 bytes)
  85. Jan 11 20:38:47 TANNHAUSER charon: 10[NET] <con1|12> received packet: from 24.xxx.xxx.xxx[45543] to 99.xxx.xxx.xxx[4500] (180 bytes)
  86. Jan 11 20:38:47 TANNHAUSER charon: 10[ENC] <con1|12> parsed CREATE_CHILD_SA request 8 [ N(REKEY_SA) SA No TSi TSr ]
  87. Jan 11 20:38:47 TANNHAUSER charon: 10[CFG] <con1|12> received proposals: ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ
  88. Jan 11 20:38:47 TANNHAUSER charon: 10[CFG] <con1|12> configured proposals: ESP:AES_CBC_256/HMAC_SHA1_96/MODP_1024/NO_EXT_SEQ, ESP:AES_CBC_256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ, ESP:AES_CBC_192/HMAC_SHA1_96/MODP_1024/NO_EXT_SEQ, ESP:AES_CBC_192/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_SHA1_96/MODP_1024/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/MODP_1024/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
  89. Jan 11 20:38:47 TANNHAUSER charon: 10[IKE] <con1|12> no acceptable proposal found
  90. Jan 11 20:38:47 TANNHAUSER charon: 10[IKE] <con1|12> failed to establish CHILD_SA, keeping IKE_SA
  91. Jan 11 20:38:47 TANNHAUSER charon: 10[ENC] <con1|12> generating CREATE_CHILD_SA response 8 [ N(NO_PROP) ]
  92. Jan 11 20:38:47 TANNHAUSER charon: 10[NET] <con1|12> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[45543] (68 bytes)
  93. Jan 11 20:38:47 TANNHAUSER charon: 11[NET] <con1|12> received packet: from 24.xxx.xxx.xxx[45543] to 99.xxx.xxx.xxx[4500] (68 bytes)
  94. Jan 11 20:38:47 TANNHAUSER charon: 11[ENC] <con1|12> parsed INFORMATIONAL request 9 [ D ]
  95. Jan 11 20:38:47 TANNHAUSER charon: 11[IKE] <con1|12> received DELETE for IKE_SA con1[12]
  96. Jan 11 20:38:47 TANNHAUSER charon: 11[IKE] <con1|12> deleting IKE_SA con1[12] between 99.xxx.xxx.xxx[invoice.company.com]...24.xxx.xxx.xxx[172.16.27.254]
  97. Jan 11 20:38:47 TANNHAUSER charon: 11[IKE] <con1|12> IKE_SA deleted
  98. Jan 11 20:38:47 TANNHAUSER charon: 11[ENC] <con1|12> generating INFORMATIONAL response 9 [ ]
  99. Jan 11 20:38:47 TANNHAUSER charon: 11[NET] <con1|12> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[45543] (60 bytes)
  100. Jan 11 20:38:47 TANNHAUSER charon: 11[CFG] <con1|12> lease 192.0.2.2 by 'kyle@company.com' went offline
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement