Advertisement
Guest User

Untitled

a guest
Dec 6th, 2014
120
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.72 KB | None | 0 0
  1. Dec 6 15:41:18 ip-172-31-26-153 charon: 13[NET] received packet: from 76.126.165.62[57295] to 172.31.26.153[500] (996 bytes)
  2. Dec 6 15:41:18 ip-172-31-26-153 charon: 13[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N((16430)) ]
  3. Dec 6 15:41:18 ip-172-31-26-153 charon: 13[IKE] 76.126.165.62 is initiating an IKE_SA
  4. Dec 6 15:41:18 ip-172-31-26-153 charon: 13[IKE] local host is behind NAT, sending keep alives
  5. Dec 6 15:41:18 ip-172-31-26-153 charon: 13[IKE] remote host is behind NAT
  6. Dec 6 15:41:18 ip-172-31-26-153 charon: 13[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(MULT_AUTH) ]
  7. Dec 6 15:41:18 ip-172-31-26-153 charon: 13[NET] sending packet: from 172.31.26.153[500] to 76.126.165.62[57295] (440 bytes)
  8. Dec 6 15:41:20 ip-172-31-26-153 charon: 04[NET] received packet: from 76.126.165.62[57295] to 172.31.26.153[500] (996 bytes)
  9. Dec 6 15:41:20 ip-172-31-26-153 charon: 04[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N((16430)) ]
  10. Dec 6 15:41:20 ip-172-31-26-153 charon: 04[IKE] received retransmit of request with ID 0, retransmitting response
  11. Dec 6 15:41:20 ip-172-31-26-153 charon: 04[NET] sending packet: from 172.31.26.153[500] to 76.126.165.62[57295] (440 bytes)
  12. Dec 6 15:41:21 ip-172-31-26-153 charon: 01[NET] received packet: from 76.126.165.62[54892] to 172.31.26.153[4500] (3068 bytes)
  13. Dec 6 15:41:21 ip-172-31-26-153 charon: 01[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) CERTREQ CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(MULT_AUTH) N(EAP_ONLY) ]
  14. Dec 6 15:41:21 ip-172-31-26-153 charon: 01[IKE] received 128 cert requests for an unknown ca
  15. Dec 6 15:41:21 ip-172-31-26-153 charon: 01[CFG] looking for peer configs matching 172.31.26.153[%any]...76.126.165.62[app]
  16. Dec 6 15:41:21 ip-172-31-26-153 charon: 01[CFG] selected peer config 'android'
  17. Dec 6 15:41:21 ip-172-31-26-153 charon: 01[IKE] initiating EAP_IDENTITY method (id 0x00)
  18. Dec 6 15:41:21 ip-172-31-26-153 charon: 01[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
  19. Dec 6 15:41:21 ip-172-31-26-153 charon: 01[IKE] peer supports MOBIKE
  20. Dec 6 15:41:21 ip-172-31-26-153 charon: 01[IKE] authentication of 'OU=Domain Control Validated, CN=vpn.*****.com' (myself) with RSA signature successful
  21. Dec 6 15:41:21 ip-172-31-26-153 charon: 01[IKE] sending end entity cert "OU=Domain Control Validated, CN=vpn.*****.com"
  22. Dec 6 15:41:21 ip-172-31-26-153 charon: 01[IKE] sending issuer cert "C=US, ST=Arizona, L=Scottsdale, O=GoDaddy.com, Inc., OU=http://certs.godaddy.com/repository/, CN=Go Daddy Secure Certificate Authority - G2"
  23. Dec 6 15:41:21 ip-172-31-26-153 charon: 01[ENC] generating IKE_AUTH response 1 [ IDr CERT CERT AUTH EAP/REQ/ID ]
  24. Dec 6 15:41:21 ip-172-31-26-153 charon: 01[NET] sending packet: from 172.31.26.153[4500] to 76.126.165.62[54892] (2988 bytes)
  25. Dec 6 15:41:23 ip-172-31-26-153 charon: 16[NET] received packet: from 76.126.165.62[54892] to 172.31.26.153[4500] (3068 bytes)
  26. Dec 6 15:41:23 ip-172-31-26-153 charon: 16[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) CERTREQ CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(MULT_AUTH) N(EAP_ONLY) ]
  27. Dec 6 15:41:23 ip-172-31-26-153 charon: 16[IKE] received retransmit of request with ID 1, retransmitting response
  28. Dec 6 15:41:23 ip-172-31-26-153 charon: 16[NET] sending packet: from 172.31.26.153[4500] to 76.126.165.62[54892] (2988 bytes)
  29. Dec 6 15:41:23 ip-172-31-26-153 charon: 05[NET] received packet: from 76.126.165.62[54892] to 172.31.26.153[4500] (76 bytes)
  30. Dec 6 15:41:23 ip-172-31-26-153 charon: 05[ENC] parsed IKE_AUTH request 2 [ EAP/RES/ID ]
  31. Dec 6 15:41:23 ip-172-31-26-153 charon: 05[IKE] received EAP identity 'app'
  32. Dec 6 15:41:23 ip-172-31-26-153 charon: 05[IKE] initiating EAP_MSCHAPV2 method (id 0xCA)
  33. Dec 6 15:41:23 ip-172-31-26-153 charon: 05[ENC] generating IKE_AUTH response 2 [ EAP/REQ/MSCHAPV2 ]
  34. Dec 6 15:41:23 ip-172-31-26-153 charon: 05[NET] sending packet: from 172.31.26.153[4500] to 76.126.165.62[54892] (108 bytes)
  35. Dec 6 15:41:23 ip-172-31-26-153 charon: 06[NET] received packet: from 76.126.165.62[54892] to 172.31.26.153[4500] (140 bytes)
  36. Dec 6 15:41:23 ip-172-31-26-153 charon: 06[ENC] parsed IKE_AUTH request 3 [ EAP/RES/MSCHAPV2 ]
  37. Dec 6 15:41:23 ip-172-31-26-153 charon: 06[ENC] generating IKE_AUTH response 3 [ EAP/REQ/MSCHAPV2 ]
  38. Dec 6 15:41:23 ip-172-31-26-153 charon: 06[NET] sending packet: from 172.31.26.153[4500] to 76.126.165.62[54892] (140 bytes)
  39. Dec 6 15:41:23 ip-172-31-26-153 charon: 14[NET] received packet: from 76.126.165.62[54892] to 172.31.26.153[4500] (76 bytes)
  40. Dec 6 15:41:23 ip-172-31-26-153 charon: 14[ENC] parsed IKE_AUTH request 4 [ EAP/RES/MSCHAPV2 ]
  41. Dec 6 15:41:23 ip-172-31-26-153 charon: 14[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established
  42. Dec 6 15:41:23 ip-172-31-26-153 charon: 14[ENC] generating IKE_AUTH response 4 [ EAP/SUCC ]
  43. Dec 6 15:41:23 ip-172-31-26-153 charon: 14[NET] sending packet: from 172.31.26.153[4500] to 76.126.165.62[54892] (76 bytes)
  44. Dec 6 15:41:24 ip-172-31-26-153 charon: 12[NET] received packet: from 76.126.165.62[54892] to 172.31.26.153[4500] (92 bytes)
  45. Dec 6 15:41:24 ip-172-31-26-153 charon: 12[ENC] parsed IKE_AUTH request 5 [ AUTH ]
  46. Dec 6 15:41:24 ip-172-31-26-153 charon: 12[IKE] authentication of 'app' with EAP successful
  47. Dec 6 15:41:24 ip-172-31-26-153 charon: 12[IKE] authentication of 'OU=Domain Control Validated, CN=vpn.*****.com' (myself) with EAP
  48. Dec 6 15:41:24 ip-172-31-26-153 charon: 12[IKE] IKE_SA android[39] established between 172.31.26.153[OU=Domain Control Validated, CN=vpn.*****.com]...76.126.165.62[app]
  49. Dec 6 15:41:24 ip-172-31-26-153 charon: 12[IKE] scheduling reauthentication in 3361s
  50. Dec 6 15:41:24 ip-172-31-26-153 charon: 12[IKE] maximum IKE_SA lifetime 3541s
  51. Dec 6 15:41:24 ip-172-31-26-153 charon: 12[IKE] peer requested virtual IP %any
  52. Dec 6 15:41:24 ip-172-31-26-153 charon: 12[CFG] reassigning offline lease to 'app'
  53. Dec 6 15:41:24 ip-172-31-26-153 charon: 12[IKE] assigning virtual IP 10.0.0.1 to peer 'app'
  54. Dec 6 15:41:24 ip-172-31-26-153 charon: 12[IKE] peer requested virtual IP %any6
  55. Dec 6 15:41:24 ip-172-31-26-153 charon: 12[IKE] no virtual IP found for %any6 requested by 'app'
  56. Dec 6 15:41:24 ip-172-31-26-153 charon: 12[IKE] CHILD_SA android{31} established with SPIs c8f3f855_i f1646114_o and TS 0.0.0.0/0 === 10.0.0.1/32
  57. Dec 6 15:41:24 ip-172-31-26-153 charon: 12[ENC] generating IKE_AUTH response 5 [ AUTH CPRP(ADDR DNS) SA TSi TSr N(AUTH_LFT) N(MOBIKE_SUP) N(NO_ADD_ADDR) ]
  58. Dec 6 15:41:24 ip-172-31-26-153 charon: 12[NET] sending packet: from 172.31.26.153[4500] to 76.126.165.62[54892] (236 bytes)
  59. Dec 6 15:41:47 ip-172-31-26-153 charon: 02[IKE] sending keep alive to 76.126.165.62[54892]
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement