Advertisement
Guest User

Untitled

a guest
Jun 24th, 2015
439
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 10.30 KB | None | 0 0
  1. 06[NET] sending packet: from 203.0.113.1[500] to 203.0.113.2[500] (248 bytes)
  2. 13[NET] received packet: from 203.0.113.2[500] to 203.0.113.1[500] (200 bytes)
  3. 13[IKE] received NAT-T (RFC 3947) vendor ID
  4. 13[IKE] received draft-ietf-ipsec-nat-t-ike-03 vendor ID
  5. 13[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
  6. 13[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor ID
  7. 13[IKE] received draft-ietf-ipsec-nat-t-ike-00 vendor ID
  8. 13[IKE] received DPD vendor ID
  9. 13[CFG] selecting proposal:
  10. 13[CFG] no acceptable ENCRYPTION_ALGORITHM found
  11. 13[CFG] selecting proposal:
  12. 13[CFG] proposal matches
  13. 13[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536
  14. 13[CFG] configured proposals: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/AES_CTR_128/AES_CTR_192/AES_CTR_256/CAMELLIA_CTR_128/CAMELLIA_CTR_192/CAMELLIA_CTR_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/HMAC_MD5_96/HMAC_SHA1_96/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_MD5/PRF_HMAC_SHA1/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/MODP_2048/MODP_2048_224/MODP_2048_256/MODP_1536/MODP_3072/MODP_4096/MODP_8192/MODP_1024/MODP_1024_160/ECP_256/ECP_384/ECP_521/ECP_224/ECP_192/ECP_224_BP/ECP_256_BP/ECP_384_BP/ECP_512_BP, IKE:AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_CCM_8_128/AES_CCM_8_192/AES_CCM_8_256/AES_CCM_12_128/AES_CCM_12_192/AES_CCM_12_256/AES_CCM_16_128/AES_CCM_16_192/AES_CCM_16_256/CAMELLIA_CCM_8_128/CAMELLIA_CCM_8_192/CAMELLIA_CCM_8_256/CAMELLIA_CCM_12_128/CAMELLIA_CCM_12_192/CAMELLIA_CCM_12_256/CAMELLIA_CCM_16_128/CAMELLIA_CCM_16_192/CAMELLIA_CCM_16_256/PRF_HMAC_MD5/PRF_HMAC_SHA1/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/MODP_2048/MODP_2048_224/MODP_2048_256/MODP_1536/MODP_3072/MODP_4096/MODP_8192/MODP_1024/MODP_1024_160/ECP_256/ECP_384/ECP_521/ECP_224/ECP_192/ECP_224_BP/ECP_256_BP/ECP_384_BP/ECP_512_BP
  15. 13[CFG] selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536
  16. 13[LIB] size of DH secret exponent: 1535 bits
  17. 13[NET] sending packet: from 203.0.113.1[500] to 203.0.113.2[500] (308 bytes)
  18. 04[NET] received packet: from 203.0.113.2[500] to 203.0.113.1[500] (292 bytes)
  19. 04[IKE] local host is behind NAT, sending keep alives
  20. 04[NET] sending packet: from 203.0.113.1[4500] to 203.0.113.2[4500] (68 bytes)
  21. 03[NET] received packet: from 203.0.113.2[4500] to 203.0.113.1[4500] (68 bytes)
  22. 03[IKE] IKE_SA example[2] established between 203.0.113.1[203.0.113.1]...203.0.113.2[203.0.113.2]
  23. 03[IKE] scheduling reauthentication in 10114s
  24. 03[IKE] maximum IKE_SA lifetime 10654s
  25. 03[CFG] configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/BLOWFISH_CBC_256/HMAC_SHA1_96/AES_XCBC_96/HMAC_MD5_96/NO_EXT_SEQ
  26. 03[CFG] configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/BLOWFISH_CBC_256/HMAC_SHA1_96/AES_XCBC_96/HMAC_MD5_96/NO_EXT_SEQ
  27. 03[CFG] proposing traffic selectors for us:
  28. 03[CFG] 203.0.113.1/32
  29. 03[CFG] proposing traffic selectors for other:
  30. 03[CFG] 203.0.113.2/32
  31. 03[NET] sending packet: from 203.0.113.1[4500] to 203.0.113.2[4500] (244 bytes)
  32. 02[NET] received packet: from 203.0.113.2[4500] to 203.0.113.1[4500] (172 bytes)
  33. 02[CFG] selecting proposal:
  34. 02[CFG] proposal matches
  35. 02[CFG] received proposals: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ
  36. 02[CFG] configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/BLOWFISH_CBC_256/HMAC_SHA1_96/AES_XCBC_96/HMAC_MD5_96/NO_EXT_SEQ
  37. 02[CFG] selected proposal: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ
  38. 02[CHD] using AES_CBC for encryption
  39. 02[CHD] using HMAC_SHA1_96 for integrity
  40. 02[CHD] adding inbound ESP SA
  41. 02[CHD] SPI 0xcfb8af4d, src 203.0.113.2 dst 203.0.113.1
  42. 02[KNL] received netlink error: Function not implemented (89)
  43. 02[KNL] unable to add SAD entry with SPI cfb8af4d
  44. 02[CHD] adding outbound ESP SA
  45. 02[CHD] SPI 0x9d0f9d0e, src 203.0.113.1 dst 203.0.113.2
  46. 02[KNL] received netlink error: Function not implemented (89)
  47. 02[KNL] unable to add SAD entry with SPI 9d0f9d0e
  48. 02[IKE] unable to install inbound and outbound IPsec SA (SAD) in kernel
  49. 02[NET] sending packet: from 203.0.113.1[4500] to 203.0.113.2[4500] (76 bytes)
  50. 05[NET] received packet: from 203.0.113.2[4500] to 203.0.113.1[4500] (172 bytes)
  51. 05[CFG] looking for a child config for 203.0.113.1/32 === 203.0.113.2/32
  52. 05[CFG] proposing traffic selectors for us:
  53. 05[CFG] 203.0.113.1/32
  54. 05[CFG] proposing traffic selectors for other:
  55. 05[CFG] 203.0.113.2/32
  56. 05[CFG] candidate "example" with prio 5+5
  57. 05[CFG] found matching child config "example" with prio 10
  58. 05[CFG] selecting traffic selectors for other:
  59. 05[CFG] config: 203.0.113.2/32, received: 203.0.113.2/32 => match: 203.0.113.2/32
  60. 05[CFG] selecting traffic selectors for us:
  61. 05[CFG] config: 203.0.113.1/32, received: 203.0.113.1/32 => match: 203.0.113.1/32
  62. 05[CFG] selecting proposal:
  63. 05[CFG] proposal matches
  64. 05[CFG] received proposals: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ
  65. 05[CFG] configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/BLOWFISH_CBC_256/HMAC_SHA1_96/AES_XCBC_96/HMAC_MD5_96/NO_EXT_SEQ
  66. 05[CFG] selected proposal: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ
  67. 05[NET] sending packet: from 203.0.113.1[4500] to 203.0.113.2[4500] (196 bytes)
  68. 10[NET] received packet: from 203.0.113.2[4500] to 203.0.113.1[4500] (52 bytes)
  69. 10[CHD] using AES_CBC for encryption
  70. 10[CHD] using HMAC_SHA1_96 for integrity
  71. 10[CHD] adding inbound ESP SA
  72. 10[CHD] SPI 0xc542ebf7, src 203.0.113.2 dst 203.0.113.1
  73. 10[KNL] received netlink error: Function not implemented (89)
  74. 10[KNL] unable to add SAD entry with SPI c542ebf7
  75. 10[CHD] adding outbound ESP SA
  76. 10[CHD] SPI 0x0e417cab, src 203.0.113.1 dst 203.0.113.2
  77. 10[KNL] received netlink error: Function not implemented (89)
  78. 10[KNL] unable to add SAD entry with SPI 0e417cab
  79. 10[IKE] unable to install inbound and outbound IPsec SA (SAD) in kernel
  80. 10[IKE] sending DELETE for ESP CHILD_SA with SPI 0e417cab
  81. 10[NET] sending packet: from 203.0.113.1[4500] to 203.0.113.2[4500] (76 bytes)
  82. 01[NET] received packet: from 203.0.113.2[4500] to 203.0.113.1[4500] (172 bytes)
  83. 01[IKE] received retransmit of response with ID 933239508, but next request already sent
  84. 14[NET] received packet: from 203.0.113.2[4500] to 203.0.113.1[4500] (68 bytes)
  85. 14[IKE] received DELETE for ESP CHILD_SA with SPI 0e417cab
  86. 14[IKE] CHILD_SA not found, ignored
  87. 03[NET] received packet: from 203.0.113.2[4500] to 203.0.113.1[4500] (172 bytes)
  88. 03[CFG] looking for a child config for 203.0.113.1/32 === 203.0.113.2/32
  89. 03[CFG] proposing traffic selectors for us:
  90. 03[CFG] 203.0.113.1/32
  91. 03[CFG] proposing traffic selectors for other:
  92. 03[CFG] 203.0.113.2/32
  93. 03[CFG] candidate "example" with prio 5+5
  94. 03[CFG] found matching child config "example" with prio 10
  95. 03[CFG] selecting traffic selectors for other:
  96. 03[CFG] config: 203.0.113.2/32, received: 203.0.113.2/32 => match: 203.0.113.2/32
  97. 03[CFG] selecting traffic selectors for us:
  98. 03[CFG] config: 203.0.113.1/32, received: 203.0.113.1/32 => match: 203.0.113.1/32
  99. 03[CFG] selecting proposal:
  100. 03[CFG] proposal matches
  101. 03[CFG] received proposals: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ
  102. 03[CFG] configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/BLOWFISH_CBC_256/HMAC_SHA1_96/AES_XCBC_96/HMAC_MD5_96/NO_EXT_SEQ
  103. 03[CFG] selected proposal: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ
  104. 03[NET] sending packet: from 203.0.113.1[4500] to 203.0.113.2[4500] (196 bytes)
  105. 11[NET] received packet: from 203.0.113.2[4500] to 203.0.113.1[4500] (52 bytes)
  106. 11[CHD] using AES_CBC for encryption
  107. 11[CHD] using HMAC_SHA1_96 for integrity
  108. 11[CHD] adding inbound ESP SA
  109. 11[CHD] SPI 0xc13a2fe4, src 203.0.113.2 dst 203.0.113.1
  110. 11[KNL] received netlink error: Function not implemented (89)
  111. 11[KNL] unable to add SAD entry with SPI c13a2fe4
  112. 11[CHD] adding outbound ESP SA
  113. 11[CHD] SPI 0xc8d0229d, src 203.0.113.1 dst 203.0.113.2
  114. 11[KNL] received netlink error: Function not implemented (89)
  115. 11[KNL] unable to add SAD entry with SPI c8d0229d
  116. 11[IKE] unable to install inbound and outbound IPsec SA (SAD) in kernel
  117. 11[IKE] sending DELETE for ESP CHILD_SA with SPI c8d0229d
  118. 11[NET] sending packet: from 203.0.113.1[4500] to 203.0.113.2[4500] (76 bytes)
  119. 05[NET] received packet: from 203.0.113.2[4500] to 203.0.113.1[4500] (52 bytes)
  120. 05[IKE] message parsing failed
  121. 05[NET] sending packet: from 203.0.113.1[4500] to 203.0.113.2[4500] (68 bytes)
  122. 05[IKE] QUICK_MODE request with message ID 1960429676 processing failed
  123. 10[NET] received packet: from 203.0.113.2[4500] to 203.0.113.1[4500] (172 bytes)
  124. 10[IKE] received retransmit of response with ID 933239508, but next request already sent
  125. 01[NET] received packet: from 203.0.113.2[4500] to 203.0.113.1[4500] (68 bytes)
  126. 01[IKE] received DELETE for ESP CHILD_SA with SPI c8d0229d
  127. 01[IKE] CHILD_SA not found, ignored
  128. 06[NET] received packet: from 203.0.113.2[4500] to 203.0.113.1[4500] (172 bytes)
  129. 06[CFG] looking for a child config for 203.0.113.1/32 === 203.0.113.2/32
  130. 06[CFG] proposing traffic selectors for us:
  131. 06[CFG] 203.0.113.1/32
  132. 06[CFG] proposing traffic selectors for other:
  133. 06[CFG] 203.0.113.2/32
  134. 06[CFG] candidate "example" with prio 5+5
  135. 06[CFG] found matching child config "example" with prio 10
  136. 06[CFG] selecting traffic selectors for other:
  137. 06[CFG] config: 203.0.113.2/32, received: 203.0.113.2/32 => match: 203.0.113.2/32
  138. 06[CFG] selecting traffic selectors for us:
  139. 06[CFG] config: 203.0.113.1/32, received: 203.0.113.1/32 => match: 203.0.113.1/32
  140. 06[CFG] selecting proposal:
  141. 06[CFG] proposal matches
  142. 06[CFG] received proposals: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ
  143. 06[CFG] configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/BLOWFISH_CBC_256/HMAC_SHA1_96/AES_XCBC_96/HMAC_MD5_96/NO_EXT_SEQ
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement