Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Jan 11 20:14:46 TANNHAUSER charon: 04[NET] <12> received packet: from 24.xxx.xxx.xxx[500] to 99.xxx.xxx.xxx[500] (300 bytes)
- Jan 11 20:14:46 TANNHAUSER charon: 04[ENC] <12> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ]
- Jan 11 20:14:46 TANNHAUSER charon: 04[IKE] <12> 24.xxx.xxx.xxx is initiating an IKE_SA
- Jan 11 20:14:46 TANNHAUSER charon: 04[IKE] <12> remote host is behind NAT
- Jan 11 20:14:46 TANNHAUSER charon: 04[IKE] <12> sending cert request for "C=US, ST=California, L=Fairfield, O=MyCompany, E=services@company.com, CN=companyVPN"
- Jan 11 20:14:46 TANNHAUSER charon: 04[ENC] <12> generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(MULT_AUTH) ]
- Jan 11 20:14:46 TANNHAUSER charon: 04[NET] <12> sending packet: from 99.xxx.xxx.xxx[500] to 24.xxx.xxx.xxx[500] (341 bytes)
- Jan 11 20:14:46 TANNHAUSER charon: 10[NET] <12> received packet: from 24.xxx.xxx.xxx[45543] to 99.xxx.xxx.xxx[4500] (332 bytes)
- Jan 11 20:14:46 TANNHAUSER charon: 10[ENC] <12> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ]
- Jan 11 20:14:46 TANNHAUSER charon: 10[CFG] <12> looking for peer configs matching 99.xxx.xxx.xxx[invoice.company.com]...24.xxx.xxx.xxx[172.16.27.254]
- Jan 11 20:14:46 TANNHAUSER charon: 10[CFG] <con1|12> selected peer config 'con1'
- Jan 11 20:14:46 TANNHAUSER charon: 10[IKE] <con1|12> initiating EAP_IDENTITY method (id 0x00)
- Jan 11 20:14:46 TANNHAUSER charon: 10[IKE] <con1|12> received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
- Jan 11 20:14:46 TANNHAUSER charon: 10[IKE] <con1|12> peer supports MOBIKE, but disabled in config
- Jan 11 20:14:46 TANNHAUSER charon: 10[IKE] <con1|12> authentication of 'invoice.company.com' (myself) with RSA signature successful
- Jan 11 20:14:46 TANNHAUSER charon: 10[IKE] <con1|12> sending end entity cert "C=US, ST=California, L=Fairfield, O=MyCompany, E=services@company.com, CN=invoice.company.com"
- Jan 11 20:14:46 TANNHAUSER charon: 10[ENC] <con1|12> generating IKE_AUTH response 1 [ IDr CERT AUTH EAP/REQ/ID ]
- Jan 11 20:14:46 TANNHAUSER charon: 10[ENC] <con1|12> splitting IKE message with length of 2468 bytes into 5 fragments
- Jan 11 20:14:46 TANNHAUSER charon: 10[ENC] <con1|12> generating IKE_AUTH response 1 [ EF(1/5) ]
- Jan 11 20:14:46 TANNHAUSER charon: 10[ENC] <con1|12> generating IKE_AUTH response 1 [ EF(2/5) ]
- Jan 11 20:14:46 TANNHAUSER charon: 10[ENC] <con1|12> generating IKE_AUTH response 1 [ EF(3/5) ]
- Jan 11 20:14:46 TANNHAUSER charon: 10[ENC] <con1|12> generating IKE_AUTH response 1 [ EF(4/5) ]
- Jan 11 20:14:46 TANNHAUSER charon: 10[ENC] <con1|12> generating IKE_AUTH response 1 [ EF(5/5) ]
- Jan 11 20:14:46 TANNHAUSER charon: 10[NET] <con1|12> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[45543] (544 bytes)
- Jan 11 20:14:46 TANNHAUSER charon: 10[NET] <con1|12> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[45543] (544 bytes)
- Jan 11 20:14:46 TANNHAUSER charon: 10[NET] <con1|12> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[45543] (544 bytes)
- Jan 11 20:14:46 TANNHAUSER charon: 10[NET] <con1|12> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[45543] (544 bytes)
- Jan 11 20:14:46 TANNHAUSER charon: 10[NET] <con1|12> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[45543] (528 bytes)
- Jan 11 20:14:46 TANNHAUSER charon: 07[NET] <con1|12> received packet: from 24.xxx.xxx.xxx[45543] to 99.xxx.xxx.xxx[4500] (84 bytes)
- Jan 11 20:14:46 TANNHAUSER charon: 07[ENC] <con1|12> parsed IKE_AUTH request 2 [ EAP/RES/ID ]
- Jan 11 20:14:46 TANNHAUSER charon: 07[IKE] <con1|12> received EAP identity 'kyle@company.com'
- Jan 11 20:14:46 TANNHAUSER charon: 07[IKE] <con1|12> initiating EAP_MSCHAPV2 method (id 0x3E)
- Jan 11 20:14:46 TANNHAUSER charon: 07[ENC] <con1|12> generating IKE_AUTH response 2 [ EAP/REQ/MSCHAPV2 ]
- Jan 11 20:14:46 TANNHAUSER charon: 07[NET] <con1|12> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[45543] (100 bytes)
- Jan 11 20:14:46 TANNHAUSER charon: 08[NET] <con1|12> received packet: from 24.xxx.xxx.xxx[45543] to 99.xxx.xxx.xxx[4500] (140 bytes)
- Jan 11 20:14:46 TANNHAUSER charon: 08[ENC] <con1|12> parsed IKE_AUTH request 3 [ EAP/RES/MSCHAPV2 ]
- Jan 11 20:14:46 TANNHAUSER charon: 08[ENC] <con1|12> generating IKE_AUTH response 3 [ EAP/REQ/MSCHAPV2 ]
- Jan 11 20:14:46 TANNHAUSER charon: 08[NET] <con1|12> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[45543] (132 bytes)
- Jan 11 20:14:46 TANNHAUSER charon: 08[NET] <con1|12> received packet: from 24.xxx.xxx.xxx[45543] to 99.xxx.xxx.xxx[4500] (68 bytes)
- Jan 11 20:14:46 TANNHAUSER charon: 08[ENC] <con1|12> parsed IKE_AUTH request 4 [ EAP/RES/MSCHAPV2 ]
- Jan 11 20:14:46 TANNHAUSER charon: 08[IKE] <con1|12> EAP method EAP_MSCHAPV2 succeeded, MSK established
- Jan 11 20:14:46 TANNHAUSER charon: 08[ENC] <con1|12> generating IKE_AUTH response 4 [ EAP/SUCC ]
- Jan 11 20:14:46 TANNHAUSER charon: 08[NET] <con1|12> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[45543] (68 bytes)
- Jan 11 20:14:46 TANNHAUSER charon: 07[NET] <con1|12> received packet: from 24.xxx.xxx.xxx[45543] to 99.xxx.xxx.xxx[4500] (84 bytes)
- Jan 11 20:14:46 TANNHAUSER charon: 07[ENC] <con1|12> parsed IKE_AUTH request 5 [ AUTH ]
- Jan 11 20:14:46 TANNHAUSER charon: 07[IKE] <con1|12> authentication of '172.16.27.254' with EAP successful
- Jan 11 20:14:46 TANNHAUSER charon: 07[IKE] <con1|12> authentication of 'invoice.company.com' (myself) with EAP
- Jan 11 20:14:46 TANNHAUSER charon: 07[IKE] <con1|11> deleting duplicate IKE_SA for peer 'kyle@company.com' due to uniqueness policy
- Jan 11 20:14:46 TANNHAUSER charon: 07[IKE] <con1|11> deleting IKE_SA con1[11] between 99.xxx.xxx.xxx[invoice.company.com]...24.xxx.xxx.xxx[172.16.27.254]
- Jan 11 20:14:46 TANNHAUSER charon: 07[IKE] <con1|11> sending DELETE for IKE_SA con1[11]
- Jan 11 20:14:46 TANNHAUSER charon: 07[ENC] <con1|11> generating INFORMATIONAL request 0 [ D ]
- Jan 11 20:14:46 TANNHAUSER charon: 07[NET] <con1|11> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[33410] (68 bytes)
- Jan 11 20:14:46 TANNHAUSER charon: 07[IKE] <con1|12> IKE_SA con1[12] established between 99.xxx.xxx.xxx[invoice.company.com]...24.xxx.xxx.xxx[172.16.27.254]
- Jan 11 20:14:46 TANNHAUSER charon: 07[IKE] <con1|12> scheduling reauthentication in 28238s
- Jan 11 20:14:46 TANNHAUSER charon: 07[IKE] <con1|12> maximum IKE_SA lifetime 28778s
- Jan 11 20:14:46 TANNHAUSER charon: 07[IKE] <con1|12> peer requested virtual IP %any
- Jan 11 20:14:46 TANNHAUSER charon: 07[CFG] <con1|12> assigning new lease to 'kyle@company.com'
- Jan 11 20:14:46 TANNHAUSER charon: 07[IKE] <con1|12> assigning virtual IP 192.0.2.2 to peer 'kyle@company.com'
- Jan 11 20:14:46 TANNHAUSER charon: 07[IKE] <con1|12> peer requested virtual IP %any6
- Jan 11 20:14:46 TANNHAUSER charon: 07[IKE] <con1|12> no virtual IP found for %any6 requested by 'kyle@company.com'
- Jan 11 20:14:46 TANNHAUSER charon: 07[IKE] <con1|12> CHILD_SA con1{19} established with SPIs c97dc5af_i 03582f5b_o and TS 10.10.0.0/16|/0 === 192.0.2.2/32|/0
- Jan 11 20:14:46 TANNHAUSER charon: 07[ENC] <con1|12> generating IKE_AUTH response 5 [ AUTH CPRP(ADDR SUBNET U_SPLITINC U_PFS) N(ESP_TFC_PAD_N) SA TSi TSr N(AUTH_LFT) ]
- Jan 11 20:14:46 TANNHAUSER charon: 07[NET] <con1|12> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[45543] (236 bytes)
- Jan 11 20:14:50 TANNHAUSER charon: 09[IKE] <con1|11> retransmit 1 of request with message ID 0
- Jan 11 20:14:50 TANNHAUSER charon: 09[NET] <con1|11> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[33410] (68 bytes)
- Jan 11 20:14:57 TANNHAUSER charon: 14[IKE] <con1|11> retransmit 2 of request with message ID 0
- Jan 11 20:14:57 TANNHAUSER charon: 14[NET] <con1|11> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[33410] (68 bytes)
- Jan 11 20:15:10 TANNHAUSER charon: 09[IKE] <con1|11> retransmit 3 of request with message ID 0
- Jan 11 20:15:10 TANNHAUSER charon: 09[NET] <con1|11> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[33410] (68 bytes)
- Jan 11 20:15:33 TANNHAUSER charon: 09[IKE] <con1|11> retransmit 4 of request with message ID 0
- Jan 11 20:15:33 TANNHAUSER charon: 09[NET] <con1|11> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[33410] (68 bytes)
- Jan 11 20:16:15 TANNHAUSER charon: 14[IKE] <con1|11> retransmit 5 of request with message ID 0
- Jan 11 20:16:15 TANNHAUSER charon: 14[NET] <con1|11> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[33410] (68 bytes)
- Jan 11 20:17:31 TANNHAUSER charon: 14[IKE] <con1|11> giving up after 5 retransmits
- Jan 11 20:17:31 TANNHAUSER charon: 14[IKE] <con1|11> proper IKE_SA delete failed, peer not responding
- Jan 11 20:17:31 TANNHAUSER charon: 14[CFG] <con1|11> lease 192.0.2.1 by 'kyle@company.com' went offline
- Jan 11 20:24:46 TANNHAUSER charon: 16[NET] <con1|12> received packet: from 24.xxx.xxx.xxx[45543] to 99.xxx.xxx.xxx[4500] (60 bytes)
- Jan 11 20:24:46 TANNHAUSER charon: 16[ENC] <con1|12> parsed INFORMATIONAL request 6 [ ]
- Jan 11 20:24:46 TANNHAUSER charon: 16[ENC] <con1|12> generating INFORMATIONAL response 6 [ ]
- Jan 11 20:24:46 TANNHAUSER charon: 16[NET] <con1|12> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[45543] (60 bytes)
- Jan 11 20:34:46 TANNHAUSER charon: 16[NET] <con1|12> received packet: from 24.xxx.xxx.xxx[45543] to 99.xxx.xxx.xxx[4500] (60 bytes)
- Jan 11 20:34:46 TANNHAUSER charon: 16[ENC] <con1|12> parsed INFORMATIONAL request 7 [ ]
- Jan 11 20:34:46 TANNHAUSER charon: 16[ENC] <con1|12> generating INFORMATIONAL response 7 [ ]
- Jan 11 20:34:46 TANNHAUSER charon: 16[NET] <con1|12> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[45543] (60 bytes)
- Jan 11 20:38:47 TANNHAUSER charon: 10[NET] <con1|12> received packet: from 24.xxx.xxx.xxx[45543] to 99.xxx.xxx.xxx[4500] (180 bytes)
- Jan 11 20:38:47 TANNHAUSER charon: 10[ENC] <con1|12> parsed CREATE_CHILD_SA request 8 [ N(REKEY_SA) SA No TSi TSr ]
- Jan 11 20:38:47 TANNHAUSER charon: 10[CFG] <con1|12> received proposals: ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ
- Jan 11 20:38:47 TANNHAUSER charon: 10[CFG] <con1|12> configured proposals: ESP:AES_CBC_256/HMAC_SHA1_96/MODP_1024/NO_EXT_SEQ, ESP:AES_CBC_256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ, ESP:AES_CBC_192/HMAC_SHA1_96/MODP_1024/NO_EXT_SEQ, ESP:AES_CBC_192/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_SHA1_96/MODP_1024/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/MODP_1024/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
- Jan 11 20:38:47 TANNHAUSER charon: 10[IKE] <con1|12> no acceptable proposal found
- Jan 11 20:38:47 TANNHAUSER charon: 10[IKE] <con1|12> failed to establish CHILD_SA, keeping IKE_SA
- Jan 11 20:38:47 TANNHAUSER charon: 10[ENC] <con1|12> generating CREATE_CHILD_SA response 8 [ N(NO_PROP) ]
- Jan 11 20:38:47 TANNHAUSER charon: 10[NET] <con1|12> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[45543] (68 bytes)
- Jan 11 20:38:47 TANNHAUSER charon: 11[NET] <con1|12> received packet: from 24.xxx.xxx.xxx[45543] to 99.xxx.xxx.xxx[4500] (68 bytes)
- Jan 11 20:38:47 TANNHAUSER charon: 11[ENC] <con1|12> parsed INFORMATIONAL request 9 [ D ]
- Jan 11 20:38:47 TANNHAUSER charon: 11[IKE] <con1|12> received DELETE for IKE_SA con1[12]
- Jan 11 20:38:47 TANNHAUSER charon: 11[IKE] <con1|12> deleting IKE_SA con1[12] between 99.xxx.xxx.xxx[invoice.company.com]...24.xxx.xxx.xxx[172.16.27.254]
- Jan 11 20:38:47 TANNHAUSER charon: 11[IKE] <con1|12> IKE_SA deleted
- Jan 11 20:38:47 TANNHAUSER charon: 11[ENC] <con1|12> generating INFORMATIONAL response 9 [ ]
- Jan 11 20:38:47 TANNHAUSER charon: 11[NET] <con1|12> sending packet: from 99.xxx.xxx.xxx[4500] to 24.xxx.xxx.xxx[45543] (60 bytes)
- Jan 11 20:38:47 TANNHAUSER charon: 11[CFG] <con1|12> lease 192.0.2.2 by 'kyle@company.com' went offline
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement