Advertisement
Guest User

Win32

a guest
Jul 23rd, 2013
77
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.08 KB | None | 0 0
  1. Jul 23 09:23:55 strongswan charon: 00[CFG] loaded RSA private key from '/etc/ipsec.d/private/serverKey.pem'
  2. Jul 23 09:23:55 strongswan charon: 00[CFG] loaded RSA private key from '/etc/ipsec.d/private/ssKey.key'
  3. Jul 23 09:23:55 strongswan charon: 00[CFG] loaded EAP secret for andyxauth
  4. Jul 23 09:23:55 strongswan charon: 00[DMN] loaded plugins: charon aes des sha1 sha2 md5 random nonce x509 revocation constraints pubkey pkcs1 pkcs8 pgp dnskey pem fips-prf gmp xcbc cmac hmac attr kernel-netlink resolve socket-default stroke updown xauth-generic
  5. Jul 23 09:23:55 strongswan charon: 00[JOB] spawning 16 worker threads
  6. Jul 23 09:23:55 strongswan charon: 13[CFG] received stroke: add connection 'windows8'
  7. Jul 23 09:23:55 strongswan charon: 13[CFG] adding virtual IP address pool 10.5.100.0/24
  8. Jul 23 09:23:55 strongswan charon: 13[CFG] loaded certificate "C=EN, O=Corp, OU=Dev, CN=10.1.0.2" from 'ssCert.cer'
  9. Jul 23 09:23:55 strongswan charon: 13[CFG] id 'C=EN, O=Atlas, CN=10.1.0.2' not confirmed by certificate, defaulting to 'C=EN, O=Corp, OU=Dev, CN=10.1.0.2'
  10. Jul 23 09:23:55 strongswan charon: 13[CFG] added configuration 'windows8'
  11. Jul 23 09:24:25 strongswan charon: 15[NET] received packet: from 10.1.0.1[1012] to 10.1.0.2[500] (616 bytes)
  12. Jul 23 09:24:25 strongswan charon: 15[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) V V V V ]
  13. Jul 23 09:24:25 strongswan charon: 15[ENC] received unknown vendor ID: 1e:2b:51:69:05:99:1c:7d:7c:96:fc:bf:b5:87:e4:61:00:00:00:09
  14. Jul 23 09:24:25 strongswan charon: 15[ENC] received unknown vendor ID: fb:1d:e3:cd:f3:41:b7:ea:16:b7:e5:be:08:55:f1:20
  15. Jul 23 09:24:25 strongswan charon: 15[ENC] received unknown vendor ID: 26:24:4d:38:ed:db:61:b3:17:2a:36:e3:d0:cf:b8:19
  16. Jul 23 09:24:25 strongswan charon: 15[ENC] received unknown vendor ID: 01:52:8b:bb:c0:06:96:12:18:49:ab:9a:1c:5b:2a:51:00:00:00:02
  17. Jul 23 09:24:25 strongswan charon: 15[IKE] 10.1.0.1 is initiating an IKE_SA
  18. Jul 23 09:24:25 strongswan charon: 15[IKE] IKE_SA (unnamed)[1] state change: CREATED => CONNECTING
  19. Jul 23 09:24:25 strongswan charon: 15[IKE] natd_chunk => 22 bytes @ 0x2241470
  20. Jul 23 09:24:25 strongswan charon: 15[IKE] 0: 6C CC 65 DE 1A 13 28 B5 00 00 00 00 00 00 00 00 l.e...(.........
  21. Jul 23 09:24:25 strongswan charon: 15[IKE] 16: 0A 01 00 02 01 F4 ......
  22. Jul 23 09:24:25 strongswan charon: 15[IKE] natd_hash => 20 bytes @ 0x22414d0
  23. Jul 23 09:24:25 strongswan charon: 15[IKE] 0: 12 C5 03 FB B5 A3 E5 32 D1 8F 51 13 7A 7E A3 7B .......2..Q.z~.{
  24. Jul 23 09:24:25 strongswan charon: 15[IKE] 16: 81 99 87 E4 ....
  25. Jul 23 09:24:25 strongswan charon: 15[IKE] natd_chunk => 22 bytes @ 0x2241470
  26. Jul 23 09:24:25 strongswan charon: 15[IKE] 0: 6C CC 65 DE 1A 13 28 B5 00 00 00 00 00 00 00 00 l.e...(.........
  27. Jul 23 09:24:25 strongswan charon: 15[IKE] 16: 0A 01 00 01 03 F4 ......
  28. Jul 23 09:24:25 strongswan charon: 15[IKE] natd_hash => 20 bytes @ 0x223ed20
  29. Jul 23 09:24:25 strongswan charon: 15[IKE] 0: 84 7F EA 03 9B 56 C3 44 99 7B 63 77 6E 4A 1E 13 .....V.D.{cwnJ..
  30. Jul 23 09:24:25 strongswan charon: 15[IKE] 16: 76 67 A4 95 vg..
  31. Jul 23 09:24:25 strongswan charon: 15[IKE] precalculated src_hash => 20 bytes @ 0x223ed20
  32. Jul 23 09:24:25 strongswan charon: 15[IKE] 0: 84 7F EA 03 9B 56 C3 44 99 7B 63 77 6E 4A 1E 13 .....V.D.{cwnJ..
  33. Jul 23 09:24:25 strongswan charon: 15[IKE] 16: 76 67 A4 95 vg..
  34. Jul 23 09:24:25 strongswan charon: 15[IKE] precalculated dst_hash => 20 bytes @ 0x22414d0
  35. Jul 23 09:24:25 strongswan charon: 15[IKE] 0: 12 C5 03 FB B5 A3 E5 32 D1 8F 51 13 7A 7E A3 7B .......2..Q.z~.{
  36. Jul 23 09:24:25 strongswan charon: 15[IKE] 16: 81 99 87 E4 ....
  37. Jul 23 09:24:25 strongswan charon: 15[IKE] received src_hash => 20 bytes @ 0x223de70
  38. Jul 23 09:24:25 strongswan charon: 15[IKE] 0: 86 26 E1 01 00 F6 26 FF AE 2E B4 AE 06 C2 57 8B .&....&.......W.
  39. Jul 23 09:24:25 strongswan charon: 15[IKE] 16: B6 0D 06 8B ....
  40. Jul 23 09:24:25 strongswan charon: 15[IKE] received dst_hash => 20 bytes @ 0x223df90
  41. Jul 23 09:24:25 strongswan charon: 15[IKE] 0: 12 C5 03 FB B5 A3 E5 32 D1 8F 51 13 7A 7E A3 7B .......2..Q.z~.{
  42. Jul 23 09:24:25 strongswan charon: 15[IKE] 16: 81 99 87 E4 ....
  43. Jul 23 09:24:25 strongswan charon: 15[IKE] remote host is behind NAT
  44. Jul 23 09:24:25 strongswan charon: 15[IKE] natd_chunk => 22 bytes @ 0x2241970
  45. Jul 23 09:24:25 strongswan charon: 15[IKE] 0: 6C CC 65 DE 1A 13 28 B5 41 98 A8 2E D0 35 5F C2 l.e...(.A....5_.
  46. Jul 23 09:24:25 strongswan charon: 15[IKE] 16: 0A 01 00 02 01 F4 ......
  47. Jul 23 09:24:25 strongswan charon: 15[IKE] natd_hash => 20 bytes @ 0x2241950
  48. Jul 23 09:24:25 strongswan charon: 15[IKE] 0: A6 6C 73 14 0C EA E6 C4 D1 00 BB 49 23 16 DE A5 .ls........I#...
  49. Jul 23 09:24:25 strongswan charon: 15[IKE] 16: FC 09 38 B9 ..8.
  50. Jul 23 09:24:25 strongswan charon: 15[IKE] natd_chunk => 22 bytes @ 0x2241450
  51. Jul 23 09:24:25 strongswan charon: 15[IKE] 0: 6C CC 65 DE 1A 13 28 B5 41 98 A8 2E D0 35 5F C2 l.e...(.A....5_.
  52. Jul 23 09:24:25 strongswan charon: 15[IKE] 16: 0A 01 00 01 03 F4 ......
  53. Jul 23 09:24:25 strongswan charon: 15[IKE] natd_hash => 20 bytes @ 0x223b470
  54. Jul 23 09:24:25 strongswan charon: 15[IKE] 0: 0E 09 7B 88 C5 44 9F 48 5C 84 FA 46 59 74 2D AB ..{..D.H\..FYt-.
  55. Jul 23 09:24:25 strongswan charon: 15[IKE] 16: 8B 6B 72 AC .kr.
  56. Jul 23 09:24:25 strongswan charon: 15[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(MULT_AUTH) ]
  57. Jul 23 09:24:25 strongswan charon: 15[NET] sending packet: from 10.1.0.2[500] to 10.1.0.1[1012] (312 bytes)
  58. Jul 23 09:24:25 strongswan charon: 16[NET] received packet: from 10.1.0.1[53431] to 10.1.0.2[4500] (2336 bytes)
  59. Jul 23 09:24:25 strongswan charon: 16[ENC] parsed IKE_AUTH request 1 [ IDi CERT CERTREQ AUTH N(MOBIKE_SUP) CP(ADDR DNS NBNS SRV) SA TSi TSr ]
  60. Jul 23 09:24:25 strongswan charon: 16[IKE] received cert request for unknown ca with keyid 0e:ac:82:60:40:56:27:97:e5:25:13:fc:2a:e1:0a:53:95:59:e4:a4
  61. Jul 23 09:24:25 strongswan charon: 16[IKE] received cert request for unknown ca with keyid dd:bc:bd:86:9c:3f:07:ed:40:e3:1b:08:ef:ce:c4:d1:88:cd:3b:15
  62. Jul 23 09:24:25 strongswan charon: 16[IKE] received cert request for unknown ca with keyid 4a:5c:75:22:aa:46:bf:a4:08:9d:39:97:4e:bd:b4:a3:60:f7:a0:1d
  63. Jul 23 09:24:25 strongswan charon: 16[IKE] received cert request for unknown ca with keyid 6a:47:a2:67:c9:2e:2f:19:68:8b:9b:86:61:66:95:ed:c1:2c:13:00
  64. Jul 23 09:24:25 strongswan charon: 16[IKE] received cert request for unknown ca with keyid 01:f0:33:4c:1a:a1:d9:ee:5b:7b:a9:de:43:bc:02:7d:57:09:33:fb
  65. Jul 23 09:24:25 strongswan charon: 16[IKE] received cert request for "DC=uk, DC=mil, DC=r, DC=diif, CN=testCA"
  66. Jul 23 09:24:25 strongswan charon: 16[IKE] received cert request for unknown ca with keyid 88:a9:5a:ef:c0:84:fc:13:74:41:6b:b1:63:32:c2:cf:92:59:bb:3b
  67. Jul 23 09:24:25 strongswan charon: 16[IKE] received cert request for unknown ca with keyid 34:4f:30:2d:25:69:31:91:ea:f7:73:5c:ab:f5:86:8d:37:82:40:ec
  68. Jul 23 09:24:25 strongswan charon: 16[IKE] received cert request for unknown ca with keyid 3e:df:29:0c:c1:f5:cc:73:2c:eb:3d:24:e1:7e:52:da:bd:27:e2:f0
  69. Jul 23 09:24:25 strongswan charon: 16[IKE] received cert request for unknown ca with keyid da:ed:64:74:14:9c:14:3c:ab:dd:99:a9:bd:5b:28:4d:8b:3c:c9:d8
  70. Jul 23 09:24:25 strongswan charon: 16[IKE] received cert request for unknown ca with keyid e2:7f:7b:d8:77:d5:df:9e:0a:3f:9e:b4:cb:0e:2e:a9:ef:db:69:77
  71. Jul 23 09:24:25 strongswan charon: 16[IKE] received cert request for unknown ca with keyid e2:7f:7b:d8:77:d5:df:9e:0a:3f:9e:b4:cb:0e:2e:a9:ef:db:69:77
  72. Jul 23 09:24:25 strongswan charon: 16[IKE] received cert request for unknown ca with keyid b1:81:08:1a:19:a4:c0:94:1f:fa:e8:95:28:c1:24:c9:9b:34:ac:c7
  73. Jul 23 09:24:25 strongswan charon: 16[IKE] received 12 cert requests for an unknown ca
  74. Jul 23 09:24:25 strongswan charon: 16[IKE] received end entity cert "C=EN, O=Corp, OU=Dev, CN=Client"
  75. Jul 23 09:24:25 strongswan charon: 16[CFG] looking for peer configs matching 10.1.0.2[%any]...10.1.0.1[192.168.211.128]
  76. Jul 23 09:24:25 strongswan charon: 16[CFG] no matching peer config found
  77. Jul 23 09:24:25 strongswan charon: 16[IKE] processing INTERNAL_IP4_ADDRESS attribute
  78. Jul 23 09:24:25 strongswan charon: 16[IKE] processing INTERNAL_IP4_DNS attribute
  79. Jul 23 09:24:25 strongswan charon: 16[IKE] processing INTERNAL_IP4_NBNS attribute
  80. Jul 23 09:24:25 strongswan charon: 16[IKE] processing INTERNAL_IP4_SERVER attribute
  81. Jul 23 09:24:25 strongswan charon: 16[IKE] peer supports MOBIKE
  82. Jul 23 09:24:25 strongswan charon: 16[ENC] generating IKE_AUTH response 1 [ N(AUTH_FAILED) ]
  83. Jul 23 09:24:25 strongswan charon: 16[NET] sending packet: from 10.1.0.2[4500] to 10.1.0.1[53431] (80 bytes)
  84. Jul 23 09:24:25 strongswan charon: 16[IKE] IKE_SA (unnamed)[1] state change: CONNECTING => DESTROYING
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement