Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 06[NET] sending packet: from 203.0.113.1[500] to 203.0.113.2[500] (248 bytes)
- 13[NET] received packet: from 203.0.113.2[500] to 203.0.113.1[500] (200 bytes)
- 13[IKE] received NAT-T (RFC 3947) vendor ID
- 13[IKE] received draft-ietf-ipsec-nat-t-ike-03 vendor ID
- 13[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
- 13[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor ID
- 13[IKE] received draft-ietf-ipsec-nat-t-ike-00 vendor ID
- 13[IKE] received DPD vendor ID
- 13[CFG] selecting proposal:
- 13[CFG] no acceptable ENCRYPTION_ALGORITHM found
- 13[CFG] selecting proposal:
- 13[CFG] proposal matches
- 13[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536
- 13[CFG] configured proposals: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/AES_CTR_128/AES_CTR_192/AES_CTR_256/CAMELLIA_CTR_128/CAMELLIA_CTR_192/CAMELLIA_CTR_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/HMAC_MD5_96/HMAC_SHA1_96/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_MD5/PRF_HMAC_SHA1/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/MODP_2048/MODP_2048_224/MODP_2048_256/MODP_1536/MODP_3072/MODP_4096/MODP_8192/MODP_1024/MODP_1024_160/ECP_256/ECP_384/ECP_521/ECP_224/ECP_192/ECP_224_BP/ECP_256_BP/ECP_384_BP/ECP_512_BP, IKE:AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_CCM_8_128/AES_CCM_8_192/AES_CCM_8_256/AES_CCM_12_128/AES_CCM_12_192/AES_CCM_12_256/AES_CCM_16_128/AES_CCM_16_192/AES_CCM_16_256/CAMELLIA_CCM_8_128/CAMELLIA_CCM_8_192/CAMELLIA_CCM_8_256/CAMELLIA_CCM_12_128/CAMELLIA_CCM_12_192/CAMELLIA_CCM_12_256/CAMELLIA_CCM_16_128/CAMELLIA_CCM_16_192/CAMELLIA_CCM_16_256/PRF_HMAC_MD5/PRF_HMAC_SHA1/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/MODP_2048/MODP_2048_224/MODP_2048_256/MODP_1536/MODP_3072/MODP_4096/MODP_8192/MODP_1024/MODP_1024_160/ECP_256/ECP_384/ECP_521/ECP_224/ECP_192/ECP_224_BP/ECP_256_BP/ECP_384_BP/ECP_512_BP
- 13[CFG] selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536
- 13[LIB] size of DH secret exponent: 1535 bits
- 13[NET] sending packet: from 203.0.113.1[500] to 203.0.113.2[500] (308 bytes)
- 04[NET] received packet: from 203.0.113.2[500] to 203.0.113.1[500] (292 bytes)
- 04[IKE] local host is behind NAT, sending keep alives
- 04[NET] sending packet: from 203.0.113.1[4500] to 203.0.113.2[4500] (68 bytes)
- 03[NET] received packet: from 203.0.113.2[4500] to 203.0.113.1[4500] (68 bytes)
- 03[IKE] IKE_SA example[2] established between 203.0.113.1[203.0.113.1]...203.0.113.2[203.0.113.2]
- 03[IKE] scheduling reauthentication in 10114s
- 03[IKE] maximum IKE_SA lifetime 10654s
- 03[CFG] configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/BLOWFISH_CBC_256/HMAC_SHA1_96/AES_XCBC_96/HMAC_MD5_96/NO_EXT_SEQ
- 03[CFG] configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/BLOWFISH_CBC_256/HMAC_SHA1_96/AES_XCBC_96/HMAC_MD5_96/NO_EXT_SEQ
- 03[CFG] proposing traffic selectors for us:
- 03[CFG] 203.0.113.1/32
- 03[CFG] proposing traffic selectors for other:
- 03[CFG] 203.0.113.2/32
- 03[NET] sending packet: from 203.0.113.1[4500] to 203.0.113.2[4500] (244 bytes)
- 02[NET] received packet: from 203.0.113.2[4500] to 203.0.113.1[4500] (172 bytes)
- 02[CFG] selecting proposal:
- 02[CFG] proposal matches
- 02[CFG] received proposals: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ
- 02[CFG] configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/BLOWFISH_CBC_256/HMAC_SHA1_96/AES_XCBC_96/HMAC_MD5_96/NO_EXT_SEQ
- 02[CFG] selected proposal: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ
- 02[CHD] using AES_CBC for encryption
- 02[CHD] using HMAC_SHA1_96 for integrity
- 02[CHD] adding inbound ESP SA
- 02[CHD] SPI 0xcfb8af4d, src 203.0.113.2 dst 203.0.113.1
- 02[KNL] received netlink error: Function not implemented (89)
- 02[KNL] unable to add SAD entry with SPI cfb8af4d
- 02[CHD] adding outbound ESP SA
- 02[CHD] SPI 0x9d0f9d0e, src 203.0.113.1 dst 203.0.113.2
- 02[KNL] received netlink error: Function not implemented (89)
- 02[KNL] unable to add SAD entry with SPI 9d0f9d0e
- 02[IKE] unable to install inbound and outbound IPsec SA (SAD) in kernel
- 02[NET] sending packet: from 203.0.113.1[4500] to 203.0.113.2[4500] (76 bytes)
- 05[NET] received packet: from 203.0.113.2[4500] to 203.0.113.1[4500] (172 bytes)
- 05[CFG] looking for a child config for 203.0.113.1/32 === 203.0.113.2/32
- 05[CFG] proposing traffic selectors for us:
- 05[CFG] 203.0.113.1/32
- 05[CFG] proposing traffic selectors for other:
- 05[CFG] 203.0.113.2/32
- 05[CFG] candidate "example" with prio 5+5
- 05[CFG] found matching child config "example" with prio 10
- 05[CFG] selecting traffic selectors for other:
- 05[CFG] config: 203.0.113.2/32, received: 203.0.113.2/32 => match: 203.0.113.2/32
- 05[CFG] selecting traffic selectors for us:
- 05[CFG] config: 203.0.113.1/32, received: 203.0.113.1/32 => match: 203.0.113.1/32
- 05[CFG] selecting proposal:
- 05[CFG] proposal matches
- 05[CFG] received proposals: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ
- 05[CFG] configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/BLOWFISH_CBC_256/HMAC_SHA1_96/AES_XCBC_96/HMAC_MD5_96/NO_EXT_SEQ
- 05[CFG] selected proposal: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ
- 05[NET] sending packet: from 203.0.113.1[4500] to 203.0.113.2[4500] (196 bytes)
- 10[NET] received packet: from 203.0.113.2[4500] to 203.0.113.1[4500] (52 bytes)
- 10[CHD] using AES_CBC for encryption
- 10[CHD] using HMAC_SHA1_96 for integrity
- 10[CHD] adding inbound ESP SA
- 10[CHD] SPI 0xc542ebf7, src 203.0.113.2 dst 203.0.113.1
- 10[KNL] received netlink error: Function not implemented (89)
- 10[KNL] unable to add SAD entry with SPI c542ebf7
- 10[CHD] adding outbound ESP SA
- 10[CHD] SPI 0x0e417cab, src 203.0.113.1 dst 203.0.113.2
- 10[KNL] received netlink error: Function not implemented (89)
- 10[KNL] unable to add SAD entry with SPI 0e417cab
- 10[IKE] unable to install inbound and outbound IPsec SA (SAD) in kernel
- 10[IKE] sending DELETE for ESP CHILD_SA with SPI 0e417cab
- 10[NET] sending packet: from 203.0.113.1[4500] to 203.0.113.2[4500] (76 bytes)
- 01[NET] received packet: from 203.0.113.2[4500] to 203.0.113.1[4500] (172 bytes)
- 01[IKE] received retransmit of response with ID 933239508, but next request already sent
- 14[NET] received packet: from 203.0.113.2[4500] to 203.0.113.1[4500] (68 bytes)
- 14[IKE] received DELETE for ESP CHILD_SA with SPI 0e417cab
- 14[IKE] CHILD_SA not found, ignored
- 03[NET] received packet: from 203.0.113.2[4500] to 203.0.113.1[4500] (172 bytes)
- 03[CFG] looking for a child config for 203.0.113.1/32 === 203.0.113.2/32
- 03[CFG] proposing traffic selectors for us:
- 03[CFG] 203.0.113.1/32
- 03[CFG] proposing traffic selectors for other:
- 03[CFG] 203.0.113.2/32
- 03[CFG] candidate "example" with prio 5+5
- 03[CFG] found matching child config "example" with prio 10
- 03[CFG] selecting traffic selectors for other:
- 03[CFG] config: 203.0.113.2/32, received: 203.0.113.2/32 => match: 203.0.113.2/32
- 03[CFG] selecting traffic selectors for us:
- 03[CFG] config: 203.0.113.1/32, received: 203.0.113.1/32 => match: 203.0.113.1/32
- 03[CFG] selecting proposal:
- 03[CFG] proposal matches
- 03[CFG] received proposals: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ
- 03[CFG] configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/BLOWFISH_CBC_256/HMAC_SHA1_96/AES_XCBC_96/HMAC_MD5_96/NO_EXT_SEQ
- 03[CFG] selected proposal: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ
- 03[NET] sending packet: from 203.0.113.1[4500] to 203.0.113.2[4500] (196 bytes)
- 11[NET] received packet: from 203.0.113.2[4500] to 203.0.113.1[4500] (52 bytes)
- 11[CHD] using AES_CBC for encryption
- 11[CHD] using HMAC_SHA1_96 for integrity
- 11[CHD] adding inbound ESP SA
- 11[CHD] SPI 0xc13a2fe4, src 203.0.113.2 dst 203.0.113.1
- 11[KNL] received netlink error: Function not implemented (89)
- 11[KNL] unable to add SAD entry with SPI c13a2fe4
- 11[CHD] adding outbound ESP SA
- 11[CHD] SPI 0xc8d0229d, src 203.0.113.1 dst 203.0.113.2
- 11[KNL] received netlink error: Function not implemented (89)
- 11[KNL] unable to add SAD entry with SPI c8d0229d
- 11[IKE] unable to install inbound and outbound IPsec SA (SAD) in kernel
- 11[IKE] sending DELETE for ESP CHILD_SA with SPI c8d0229d
- 11[NET] sending packet: from 203.0.113.1[4500] to 203.0.113.2[4500] (76 bytes)
- 05[NET] received packet: from 203.0.113.2[4500] to 203.0.113.1[4500] (52 bytes)
- 05[IKE] message parsing failed
- 05[NET] sending packet: from 203.0.113.1[4500] to 203.0.113.2[4500] (68 bytes)
- 05[IKE] QUICK_MODE request with message ID 1960429676 processing failed
- 10[NET] received packet: from 203.0.113.2[4500] to 203.0.113.1[4500] (172 bytes)
- 10[IKE] received retransmit of response with ID 933239508, but next request already sent
- 01[NET] received packet: from 203.0.113.2[4500] to 203.0.113.1[4500] (68 bytes)
- 01[IKE] received DELETE for ESP CHILD_SA with SPI c8d0229d
- 01[IKE] CHILD_SA not found, ignored
- 06[NET] received packet: from 203.0.113.2[4500] to 203.0.113.1[4500] (172 bytes)
- 06[CFG] looking for a child config for 203.0.113.1/32 === 203.0.113.2/32
- 06[CFG] proposing traffic selectors for us:
- 06[CFG] 203.0.113.1/32
- 06[CFG] proposing traffic selectors for other:
- 06[CFG] 203.0.113.2/32
- 06[CFG] candidate "example" with prio 5+5
- 06[CFG] found matching child config "example" with prio 10
- 06[CFG] selecting traffic selectors for other:
- 06[CFG] config: 203.0.113.2/32, received: 203.0.113.2/32 => match: 203.0.113.2/32
- 06[CFG] selecting traffic selectors for us:
- 06[CFG] config: 203.0.113.1/32, received: 203.0.113.1/32 => match: 203.0.113.1/32
- 06[CFG] selecting proposal:
- 06[CFG] proposal matches
- 06[CFG] received proposals: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ
- 06[CFG] configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/BLOWFISH_CBC_256/HMAC_SHA1_96/AES_XCBC_96/HMAC_MD5_96/NO_EXT_SEQ
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement