Advertisement
Guest User

логи микротика

a guest
Sep 6th, 2013
124
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 24.32 KB | None | 0 0
  1. 03:51:25 l2tp,ppp,info l2tp-out1: initializing...
  2. 03:51:25 l2tp,ppp,info l2tp-out1: dialing...
  3. 03:51:25 l2tp,debug tunnel 81 entering state: wait-ctl-reply
  4. 03:51:25 l2tp,debug,packet sent control message to XX.XX.XX.XX:1701
  5. 03:51:25 l2tp,debug,packet tunnel-id=0, session-id=0, ns=0, nr=0
  6. 03:51:25 l2tp,debug,packet (M) Message-Type=SCCRQ
  7. 03:51:25 l2tp,debug,packet (M) Protocol-Version=0x01:00
  8. 03:51:25 l2tp,debug,packet (M) Framing-Capabilities=0x1
  9. 03:51:25 l2tp,debug,packet (M) Bearer-Capabilities=0x0
  10. 03:51:25 l2tp,debug,packet Firmware-Revision=0x1
  11. 03:51:25 l2tp,debug,packet (M) Host-Name="Linux"
  12. 03:51:25 l2tp,debug,packet Vendor-Name="MikroTik"
  13. 03:51:25 l2tp,debug,packet (M) Assigned-Tunnel-ID=81
  14. 03:51:25 l2tp,debug,packet (M) Receive-Window-Size=4
  15. 03:51:25 l2tp,debug,packet rcvd control message from XX.XX.XX.XX:1701
  16. 03:51:25 l2tp,debug,packet tunnel-id=81, session-id=0, ns=0, nr=1
  17. 03:51:25 l2tp,debug,packet (M) Message-Type=StopCCN
  18. 03:51:25 l2tp,debug,packet (M) Result-Code=2
  19. 03:51:25 l2tp,debug,packet Error-Code=0
  20. 03:51:25 l2tp,debug,packet Error-Message="No cc config for Linux"
  21. 03:51:25 l2tp,debug,packet (M) Assigned-Tunnel-ID=23497
  22. 03:51:25 l2tp,debug,packet sent control message (ack) to XX.XX.XX.XX:1701
  23. 03:51:25 l2tp,debug,packet tunnel-id=23497, session-id=0, ns=1, nr=1
  24. 03:51:26 l2tp,debug,packet sent control message to XX.XX.XX.XX:1701
  25. 03:51:26 l2tp,debug,packet tunnel-id=0, session-id=0, ns=0, nr=0
  26.  
  27.  
  28. Что касательно ipsec
  29. 04:39:32 ipsec,debug,packet ===
  30. 04:39:32 system,info ipsec peer changed by admin
  31. 04:39:32 ipsec,debug initiate new phase 1 negotiation: ZZ.ZZ.ZZ.ZZ[500]<=>XX.XX.XX.XX[500]
  32. 04:39:32 ipsec,debug begin Identity Protection mode.
  33. 04:39:32 ipsec,debug,packet new cookie:
  34. 04:39:32 ipsec,debug,packet d31c43688cc95e11
  35. 04:39:32 ipsec,debug,packet add payload of len 56, next type 13
  36. 04:39:32 ipsec,debug,packet add payload of len 16, next type 13
  37. 04:39:32 ipsec,debug,packet add payload of len 16, next type 13
  38. 04:39:32 ipsec,debug,packet add payload of len 16, next type 13
  39. 04:39:32 ipsec,debug,packet add payload of len 16, next type 13
  40. 04:39:32 ipsec,debug,packet add payload of len 16, next type 13
  41. 04:39:32 ipsec,debug,packet add payload of len 16, next type 13
  42. 04:39:32 ipsec,debug,packet add payload of len 16, next type 13
  43. 04:39:32 ipsec,debug,packet add payload of len 16, next type 13
  44. 04:39:32 ipsec,debug,packet add payload of len 16, next type 13
  45. 04:39:32 ipsec,debug,packet add payload of len 16, next type 13
  46. 04:39:32 ipsec,debug,packet add payload of len 16, next type 13
  47. 04:39:32 ipsec,debug,packet add payload of len 16, next type 13
  48. 04:39:32 ipsec,debug,packet add payload of len 16, next type 0
  49. 04:39:32 ipsec,debug,packet 348 bytes from ZZ.ZZ.ZZ.ZZ[500] to XX.XX.XX.XX[500]
  50. 04:39:32 ipsec,debug,packet sockname ZZ.ZZ.ZZ.ZZ[500]
  51. 04:39:32 ipsec,debug,packet send packet from ZZ.ZZ.ZZ.ZZ[500]
  52. 04:39:32 ipsec,debug,packet send packet to XX.XX.XX.XX[500]
  53. 04:39:32 ipsec,debug,packet src4 ZZ.ZZ.ZZ.ZZ[500]
  54. 04:39:32 ipsec,debug,packet dst4 XX.XX.XX.XX[500]
  55. 04:39:32 ipsec,debug,packet 1 times of 348 bytes message will be sent to XX.XX.XX.XX[500]
  56. 04:39:32 ipsec,debug,packet d31c4368 8cc95e11 00000000 00000000 01100200 00000000 0000015c 0d00003c
  57. 04:39:32 ipsec,debug,packet 00000001 00000001 00000030 01010001 00000028 01010000 800b0001 000c0004
  58. 04:39:32 ipsec,debug,packet 00015180 80010007 800e0080 80030001 80020002 80040002 0d000014 4a131c81
  59. 04:39:32 ipsec,debug,packet 07035845 5c5728f2 0e95452f 0d000014 8f8d8382 6d246b6f c7a8a6a4 28c11de8
  60. 04:39:32 ipsec,debug,packet 0d000014 439b59f8 ba676c4c 7737ae22 eab8f582 0d000014 4d1e0e13 6deafa34
  61. 04:39:32 ipsec,debug,packet c4f3ea9f 02ec7285 0d000014 80d0bb3d ef54565e e84645d4 c85ce3ee 0d000014
  62. 04:39:32 ipsec,debug,packet 9909b64e ed937c65 73de52ac e952fa6b 0d000014 7d9419a6 5310ca6f 2c179d92
  63. 04:39:32 ipsec,debug,packet 15529d56 0d000014 cd604643 35df21f8 7cfdb2fc 68b6a448 0d000014 90cb8091
  64. 04:39:32 ipsec,debug,packet 3ebb696e 086381b5 ec427b1f 0d000014 16f6ca16 e4a4066d 83821a0f 0aeaa862
  65. 04:39:32 ipsec,debug,packet 0d000014 4485152d 18b6bbcd 0be8a846 9579ddcc 0d000014 12f5f28c 457168a9
  66. 04:39:32 ipsec,debug,packet 702d9fe2 74cc0100 00000014 afcad713 68a1f1c9 6b8696fc 77570100
  67. 04:39:32 ipsec,debug,packet resend phase1 packet d31c43688cc95e11:0000000000000000
  68. 04:39:33 ipsec,debug,packet ==========
  69. 04:39:33 ipsec,debug,packet 132 bytes message received from XX.XX.XX.XX[500] to ZZ.ZZ.ZZ.ZZ[500]
  70. 04:39:33 ipsec,debug,packet d31c4368 8cc95e11 fe6efe88 2c6037a0 01100200 00000000 00000084 0d00003c
  71. 04:39:33 ipsec,debug,packet 00000001 00000001 00000030 01010001 00000028 01010000 80010007 800e0080
  72. 04:39:33 ipsec,debug,packet 80020002 80040002 80030001 800b0001 000c0004 00015180 0d000014 90cb8091
  73. 04:39:33 ipsec,debug,packet 3ebb696e 086381b5 ec427b1f 00000018 4048b7d5 6ebce885 25e7de7f 00d6c2d3
  74. 04:39:33 ipsec,debug,packet c0000000
  75. 04:39:33 ipsec,debug,packet begin.
  76. 04:39:33 ipsec,debug,packet seen nptype=1(sa)
  77. 04:39:33 ipsec,debug,packet seen nptype=13(vid)
  78. 04:39:33 ipsec,debug,packet seen nptype=13(vid)
  79. 04:39:33 ipsec,debug,packet succeed.
  80. 04:39:33 ipsec,debug received Vendor ID: draft-ietf-ipsec-nat-t-ike-02
  81. 04:39:33 ipsec,debug
  82. 04:39:33 ipsec,debug received broken Microsoft ID: FRAGMENTATION
  83. 04:39:33 ipsec,debug Selected NAT-T version: draft-ietf-ipsec-nat-t-ike-02
  84. 04:39:33 ipsec,debug
  85. 04:39:33 ipsec,debug,packet total SA len=56
  86. 04:39:33 ipsec,debug,packet 00000001 00000001 00000030 01010001 00000028 01010000 80010007 800e0080
  87. 04:39:33 ipsec,debug,packet 80020002 80040002 80030001 800b0001 000c0004 00015180
  88. 04:39:33 ipsec,debug,packet begin.
  89. 04:39:33 ipsec,debug,packet seen nptype=2(prop)
  90. 04:39:33 ipsec,debug,packet succeed.
  91. 04:39:33 ipsec,debug,packet proposal #1 len=48
  92. 04:39:33 ipsec,debug,packet begin.
  93. 04:39:33 ipsec,debug,packet seen nptype=3(trns)
  94. 04:39:33 ipsec,debug,packet succeed.
  95. 04:39:33 ipsec,debug,packet transform #1 len=40
  96. 04:39:33 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
  97. 04:39:33 ipsec,debug,packet encryption(aes)
  98. 04:39:33 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=128
  99. 04:39:33 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
  100. 04:39:33 ipsec,debug,packet hash(sha1)
  101. 04:39:33 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
  102. 04:39:33 ipsec,debug,packet hmac(modp1024)
  103. 04:39:33 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
  104. 04:39:33 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
  105. 04:39:33 ipsec,debug,packet type=Life Duration, flag=0x0000, lorv=4
  106. 04:39:33 ipsec,debug,packet pair 1:
  107. 04:39:33 ipsec,debug,packet 0x4824e0: next=(nil) tnext=(nil)
  108. 04:39:33 ipsec,debug,packet proposal #1: 1 transform
  109. 04:39:33 ipsec,debug,packet prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1
  110. 04:39:33 ipsec,debug,packet trns#=1, trns-id=IKE
  111. 04:39:33 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
  112. 04:39:33 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=128
  113. 04:39:33 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
  114. 04:39:33 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
  115. 04:39:33 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
  116. 04:39:33 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
  117. 04:39:33 ipsec,debug,packet type=Life Duration, flag=0x0000, lorv=4
  118. 04:39:33 ipsec,debug,packet Compared: DB:Peer
  119. 04:39:33 ipsec,debug,packet (lifetime = 86400:86400)
  120. 04:39:33 ipsec,debug,packet (lifebyte = 0:0)
  121. 04:39:33 ipsec,debug,packet enctype = AES-CBC:AES-CBC
  122. 04:39:33 ipsec,debug,packet (encklen = 128:128)
  123. 04:39:33 ipsec,debug,packet hashtype = SHA:SHA
  124. 04:39:33 ipsec,debug,packet authmethod = pre-shared key:pre-shared key
  125. 04:39:33 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
  126. 04:39:33 ipsec,debug,packet an acceptable proposal found.
  127. 04:39:33 ipsec,debug,packet hmac(modp1024)
  128. 04:39:33 ipsec,debug,packet agreed on pre-shared key auth.
  129. 04:39:33 ipsec,debug,packet ===
  130. 04:39:33 ipsec,debug,packet compute DH's private.
  131. 04:39:33 ipsec,debug,packet 52f507f0 edad0835 0fc9a679 c449b9e8 cd67f80e 642263ee 0a75430b 330f3d35
  132. 04:39:33 ipsec,debug,packet e8c308ae 92f72ff3 153548ed ffcc880a 751b16c8 ccfdf33b 9ba7d115 ace4d234
  133. 04:39:33 ipsec,debug,packet c80ea968 7028eff8 58ba8a53 5a6d594e 267bbb50 035b8ef3 b568fb59 3615ddaa
  134. 04:39:33 ipsec,debug,packet d3e97a83 6f423e5c c678fad5 d15e6017 d49dc6f0 b69b4383 3e51ac6c 06c63f24
  135. 04:39:33 ipsec,debug,packet compute DH's public.
  136. 04:39:33 ipsec,debug,packet 81037463 ab813413 b628b32f bb3d7fac 8012e55a 24e0a7d7 b38c901e 62ccadf4
  137. 04:39:33 ipsec,debug,packet 5e075900 881b19de 8b7a8119 752aa706 c10f6207 41ed7254 5aec67b4 5d1b31f8
  138. 04:39:33 ipsec,debug,packet dfa5e319 420f9e66 89c2b44e 68ef7d28 cb52ec39 a618289e d24a64ca 9defefd2
  139. 04:39:33 ipsec,debug,packet def9998f 6e7a0b3b 2e471517 be47c84e 3f1ff3c5 6a2fdde7 338cbdbc 945c8501
  140. 04:39:33 ipsec,debug Hashing XX.XX.XX.XX[500] with algo #2
  141. 04:39:33 ipsec,debug,packet hash(sha1)
  142. 04:39:33 ipsec,debug Hashing ZZ.ZZ.ZZ.ZZ[500] with algo #2
  143. 04:39:33 ipsec,debug,packet hash(sha1)
  144. 04:39:33 ipsec,debug Adding remote and local NAT-D payloads.
  145. 04:39:33 ipsec,debug,packet add payload of len 128, next type 10
  146. 04:39:33 ipsec,debug,packet add payload of len 24, next type 130
  147. 04:39:33 ipsec,debug,packet add payload of len 20, next type 130
  148. 04:39:33 ipsec,debug,packet add payload of len 20, next type 0
  149. 04:39:33 ipsec,debug,packet 236 bytes from ZZ.ZZ.ZZ.ZZ[500] to XX.XX.XX.XX[500]
  150. 04:39:33 ipsec,debug,packet sockname ZZ.ZZ.ZZ.ZZ[500]
  151. 04:39:33 ipsec,debug,packet send packet from ZZ.ZZ.ZZ.ZZ[500]
  152. 04:39:33 ipsec,debug,packet send packet to XX.XX.XX.XX[500]
  153. 04:39:33 ipsec,debug,packet src4 ZZ.ZZ.ZZ.ZZ[500]
  154. 04:39:33 ipsec,debug,packet dst4 XX.XX.XX.XX[500]
  155. 04:39:33 ipsec,debug,packet 1 times of 236 bytes message will be sent to XX.XX.XX.XX[500]
  156. 04:39:33 ipsec,debug,packet d31c4368 8cc95e11 fe6efe88 2c6037a0 04100200 00000000 000000ec 0a000084
  157. 04:39:33 ipsec,debug,packet 81037463 ab813413 b628b32f bb3d7fac 8012e55a 24e0a7d7 b38c901e 62ccadf4
  158. 04:39:33 ipsec,debug,packet 5e075900 881b19de 8b7a8119 752aa706 c10f6207 41ed7254 5aec67b4 5d1b31f8
  159. 04:39:33 ipsec,debug,packet dfa5e319 420f9e66 89c2b44e 68ef7d28 cb52ec39 a618289e d24a64ca 9defefd2
  160. 04:39:33 ipsec,debug,packet def9998f 6e7a0b3b 2e471517 be47c84e 3f1ff3c5 6a2fdde7 338cbdbc 945c8501
  161. 04:39:33 ipsec,debug,packet 8200001c aaa1f707 d23efc4c a1358de7 6e587d3d d3540f6f b937bc8c 82000018
  162. 04:39:33 ipsec,debug,packet e4d5f0a7 5448cac6 3545ebb8 cc15bf60 8275d116 00000018 f7629206 89343f0c
  163. 04:39:33 ipsec,debug,packet 302987d0 e7b5648e b7ad2a4c
  164. 04:39:33 ipsec,debug,packet resend phase1 packet d31c43688cc95e11:fe6efe882c6037a0
  165. 04:39:33 ipsec,debug,packet ==========
  166. 04:39:33 ipsec,debug,packet 304 bytes message received from XX.XX.XX.XX[500] to ZZ.ZZ.ZZ.ZZ[500]
  167. 04:39:33 ipsec,debug,packet d31c4368 8cc95e11 fe6efe88 2c6037a0 04100200 00000000 00000130 0a000084
  168. 04:39:33 ipsec,debug,packet b9d1080f 9eab0d4d e2d03d2c a7ddf938 a99c0b7b 9665846a 603bc6ea b5320e76
  169. 04:39:33 ipsec,debug,packet 028cb927 44d6dd3e b154d335 47a15028 23d0cb71 792aba54 5a727194 86075750
  170. 04:39:33 ipsec,debug,packet 55f0a306 0f291712 23f94e5a dc4cd38d 2f0ea907 2c238416 8a434f19 f55700ba
  171. 04:39:33 ipsec,debug,packet c7b6eeef f07fcf58 221f0303 bfe6a72e 78f63c17 09667a6b 18e632de 2970ce61
  172. 04:39:33 ipsec,debug,packet 0d000018 9f90b653 756c7323 ebd1bba0 72ce2974 4e3a8f89 0d000014 12f5f28c
  173. 04:39:33 ipsec,debug,packet 457168a9 702d9fe2 74cc0100 0d00000c 09002689 dfd6b712 0d000014 0ba95995
  174. 04:39:33 ipsec,debug,packet 2c6137a0 85b2cecc e605cf78 82000014 1f07f70e aa6514d3 b0fa9654 2a500100
  175. 04:39:33 ipsec,debug,packet 82000018 26225750 87efa009 d9e6df4c de4ea1ba fdecb766 00000018 7031de9b
  176. 04:39:33 ipsec,debug,packet 5bd1ecc2 6bcaa435 2fb121bd 20ec6261
  177. 04:39:33 ipsec,debug,packet begin.
  178. 04:39:33 ipsec,debug,packet seen nptype=4(ke)
  179. 04:39:33 ipsec,debug,packet seen nptype=10(nonce)
  180. 04:39:33 ipsec,debug,packet seen nptype=13(vid)
  181. 04:39:33 ipsec,debug,packet seen nptype=13(vid)
  182. 04:39:33 ipsec,debug,packet seen nptype=13(vid)
  183. 04:39:33 ipsec,debug,packet seen nptype=13(vid)
  184. 04:39:33 ipsec,debug,packet seen nptype=130(nat-d)
  185. 04:39:33 ipsec,debug,packet seen nptype=130(nat-d)
  186. 04:39:33 ipsec,debug,packet succeed.
  187. 04:39:33 ipsec,debug received Vendor ID: CISCO-UNITY
  188. 04:39:33 ipsec,debug received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt
  189. 04:39:33 ipsec,debug,packet received unknown Vendor ID
  190. 04:39:33 ipsec,debug,packet received unknown Vendor ID
  191. 04:39:33 ipsec,debug Hashing ZZ.ZZ.ZZ.ZZ[500] with algo #2
  192. 04:39:33 ipsec,debug,packet hash(sha1)
  193. 04:39:33 ipsec,debug NAT-D payload #0 doesn't match
  194. 04:39:33 ipsec,debug Hashing XX.XX.XX.XX[500] with algo #2
  195. 04:39:33 ipsec,debug,packet hash(sha1)
  196. 04:39:33 ipsec,debug NAT-D payload #1 doesn't match
  197. 04:39:33 ipsec,debug NAT detected: ME PEER
  198. 04:39:33 ipsec,debug KA list add: ZZ.ZZ.ZZ.ZZ[4500]->XX.XX.XX.XX[4500]
  199. 04:39:33 ipsec,debug,packet ===
  200. 04:39:33 ipsec,debug,packet compute DH's shared.
  201. 04:39:33 ipsec,debug,packet
  202. 04:39:33 ipsec,debug,packet 4818d6c7 b899e908 5cdaf5c7 45897939 79e99aaa 31020c30 6ade3053 3cf2362b
  203. 04:39:33 ipsec,debug,packet a3cb4f1a c69afcb9 9e88b553 56b03ec4 5a08f27c 7175e4b6 f275cf7c da017a45
  204. 04:39:33 ipsec,debug,packet 9602fc3f 128f922a a3fe18b8 c115dea8 1c650c67 dd7fed43 b5ba45b9 bdc4e101
  205. 04:39:33 ipsec,debug,packet 51707cc6 22227ad3 f6580f84 459ad732 45192358 4ea6a0e8 d6d776f3 b41d8ff6
  206. 04:39:33 ipsec,debug,packet the psk found.
  207. 04:39:33 ipsec,debug,packet nonce 1:
  208. 04:39:33 ipsec,debug,packet aaa1f707 d23efc4c a1358de7 6e587d3d d3540f6f b937bc8c
  209. 04:39:33 ipsec,debug,packet nonce 2:
  210. 04:39:33 ipsec,debug,packet 9f90b653 756c7323 ebd1bba0 72ce2974 4e3a8f89
  211. 04:39:33 ipsec,debug,packet hmac(hmac_sha1)
  212. 04:39:33 ipsec,debug,packet SKEYID computed:
  213. 04:39:33 ipsec,debug,packet 391dd816 c25f9991 737ab8f3 7d2840b8 1dc69879
  214. 04:39:33 ipsec,debug,packet hmac(hmac_sha1)
  215. 04:39:33 ipsec,debug,packet SKEYID_d computed:
  216. 04:39:33 ipsec,debug,packet b3a02774 d624800f e693cba0 7e98b428 ef5f9452
  217. 04:39:33 ipsec,debug,packet hmac(hmac_sha1)
  218. 04:39:33 ipsec,debug,packet SKEYID_a computed:
  219. 04:39:33 ipsec,debug,packet 1b41848a fa0f2b33 034f0063 e6e04415 c7599afd
  220. 04:39:33 ipsec,debug,packet hmac(hmac_sha1)
  221. 04:39:33 ipsec,debug,packet SKEYID_e computed:
  222. 04:39:33 ipsec,debug,packet 020aaaba 56806ef1 96b9a99f fe1e13de adec08e2
  223. 04:39:33 ipsec,debug,packet encryption(aes)
  224. 04:39:33 ipsec,debug,packet hash(sha1)
  225. 04:39:33 ipsec,debug,packet final encryption key computed:
  226. 04:39:33 ipsec,debug,packet 020aaaba 56806ef1 96b9a99f fe1e13de
  227. 04:39:33 ipsec,debug,packet hash(sha1)
  228. 04:39:33 ipsec,debug,packet encryption(aes)
  229. 04:39:33 ipsec,debug,packet IV computed:
  230. 04:39:33 ipsec,debug,packet 031ed535 6319b1a2 0d152454 d8f5e54c
  231. 04:39:33 ipsec,debug,packet use ID type of IPv4_address
  232. 04:39:33 ipsec,debug,packet HASH with:
  233. 04:39:33 ipsec,debug,packet 81037463 ab813413 b628b32f bb3d7fac 8012e55a 24e0a7d7 b38c901e 62ccadf4
  234. 04:39:33 ipsec,debug,packet 5e075900 881b19de 8b7a8119 752aa706 c10f6207 41ed7254 5aec67b4 5d1b31f8
  235. 04:39:33 ipsec,debug,packet dfa5e319 420f9e66 89c2b44e 68ef7d28 cb52ec39 a618289e d24a64ca 9defefd2
  236. 04:39:33 ipsec,debug,packet def9998f 6e7a0b3b 2e471517 be47c84e 3f1ff3c5 6a2fdde7 338cbdbc 945c8501
  237. 04:39:33 ipsec,debug,packet b9d1080f 9eab0d4d e2d03d2c a7ddf938 a99c0b7b 9665846a 603bc6ea b5320e76
  238. 04:39:33 ipsec,debug,packet 028cb927 44d6dd3e b154d335 47a15028 23d0cb71 792aba54 5a727194 86075750
  239. 04:39:33 ipsec,debug,packet 55f0a306 0f291712 23f94e5a dc4cd38d 2f0ea907 2c238416 8a434f19 f55700ba
  240. 04:39:33 ipsec,debug,packet c7b6eeef f07fcf58 221f0303 bfe6a72e 78f63c17 09667a6b 18e632de 2970ce61
  241. 04:39:33 ipsec,debug,packet d31c4368 8cc95e11 fe6efe88 2c6037a0 00000001 00000001 00000030 01010001
  242. 04:39:33 ipsec,debug,packet 00000028 01010000 800b0001 000c0004 00015180 80010007 800e0080 80030001
  243. 04:39:33 ipsec,debug,packet 80020002 80040002 011101f4 64565d04
  244. 04:39:33 ipsec,debug,packet hmac(hmac_sha1)
  245. 04:39:33 ipsec,debug,packet HASH computed:
  246. 04:39:33 ipsec,debug,packet 0035305c b62cc1d4 87dbf495 543f4ab1 8430ea56
  247. 04:39:33 ipsec,debug,packet add payload of len 8, next type 8
  248. 04:39:33 ipsec,debug,packet add payload of len 20, next type 0
  249. 04:39:33 ipsec,debug,packet begin encryption.
  250. 04:39:33 ipsec,debug,packet encryption(aes)
  251. 04:39:33 ipsec,debug,packet pad length = 12
  252. 04:39:33 ipsec,debug,packet 0800000c 011101f4 64565d04 00000018 0035305c b62cc1d4 87dbf495 543f4ab1
  253. 04:39:33 ipsec,debug,packet 8430ea56 70029603 beeef3b8 32f3910b
  254. 04:39:33 ipsec,debug,packet encryption(aes)
  255. 04:39:33 ipsec,debug,packet with key:
  256. 04:39:33 ipsec,debug,packet 020aaaba 56806ef1 96b9a99f fe1e13de
  257. 04:39:33 ipsec,debug,packet encrypted payload by IV:
  258. 04:39:33 ipsec,debug,packet 031ed535 6319b1a2 0d152454 d8f5e54c
  259. 04:39:33 ipsec,debug,packet save IV for next:
  260. 04:39:33 ipsec,debug,packet 448f6799 7b838073 5ea2c22a 977aea51
  261. 04:39:33 ipsec,debug,packet encrypted.
  262. 04:39:33 ipsec,debug,packet Adding NON-ESP marker
  263. 04:39:33 ipsec,debug,packet 80 bytes from ZZ.ZZ.ZZ.ZZ[4500] to XX.XX.XX.XX[4500]
  264. 04:39:33 ipsec,debug,packet sockname ZZ.ZZ.ZZ.ZZ[4500]
  265. 04:39:33 ipsec,debug,packet send packet from ZZ.ZZ.ZZ.ZZ[4500]
  266. 04:39:33 ipsec,debug,packet send packet to XX.XX.XX.XX[4500]
  267. 04:39:33 ipsec,debug,packet src4 ZZ.ZZ.ZZ.ZZ[4500]
  268. 04:39:33 ipsec,debug,packet dst4 XX.XX.XX.XX[4500]
  269. 04:39:33 ipsec,debug,packet 1 times of 80 bytes message will be sent to XX.XX.XX.XX[4500]
  270. 04:39:33 ipsec,debug,packet 00000000 d31c4368 8cc95e11 fe6efe88 2c6037a0 05100201 00000000 0000004c
  271. 04:39:33 ipsec,debug,packet 3a5eabee 6dd886ba 74566dfb 5776da4b d5c447cf efc20c12 04ae4cd8 3b545b2b
  272. 04:39:33 ipsec,debug,packet 448f6799 7b838073 5ea2c22a 977aea51
  273. 04:39:33 ipsec,debug,packet resend phase1 packet d31c43688cc95e11:fe6efe882c6037a0
  274. 04:39:33 ipsec,debug,packet ==========
  275. 04:39:33 ipsec,debug,packet 92 bytes message received from XX.XX.XX.XX[4500] to ZZ.ZZ.ZZ.ZZ[4500]
  276. 04:39:33 ipsec,debug,packet d31c4368 8cc95e11 fe6efe88 2c6037a0 05100201 00000000 0000005c 57c48a7c
  277. 04:39:33 ipsec,debug,packet a9ac57f2 0af0b94e 46526ab4 59887d1b cd5b55b7 bdcc3ca2 c5e139ad 859a55f9
  278. 04:39:33 ipsec,debug,packet 2438254f 9557fd68 d75a454d 18c7509b 526d7475 8d51688b 5dfdc9f3
  279. 04:39:33 ipsec,debug,packet encryption(aes)
  280. 04:39:33 ipsec,debug,packet IV was saved for next processing:
  281. 04:39:33 ipsec,debug,packet 18c7509b 526d7475 8d51688b 5dfdc9f3
  282. 04:39:33 ipsec,debug,packet encryption(aes)
  283. 04:39:33 ipsec,debug,packet with key:
  284. 04:39:33 ipsec,debug,packet 020aaaba 56806ef1 96b9a99f fe1e13de
  285. 04:39:33 ipsec,debug,packet decrypted payload by IV:
  286. 04:39:33 ipsec,debug,packet 448f6799 7b838073 5ea2c22a 977aea51
  287. 04:39:33 ipsec,debug,packet decrypted payload, but not trimed.
  288. 04:39:33 ipsec,debug,packet 0800000c 01110000 c0a8c802 0d000018 ce6cce19 383b4489 27ce51eb 7419ef0c
  289. 04:39:33 ipsec,debug,packet 869f9cfd 00000014 afcad713 68a1f1c9 6b8696fc 77570100 00000000 00000000
  290. 04:39:33 ipsec,debug,packet padding len=1
  291. 04:39:33 ipsec,debug,packet skip to trim padding.
  292. 04:39:33 ipsec,debug,packet decrypted.
  293. 04:39:33 ipsec,debug,packet d31c4368 8cc95e11 fe6efe88 2c6037a0 05100201 00000000 0000005c 0800000c
  294. 04:39:33 ipsec,debug,packet 01110000 c0a8c802 0d000018 ce6cce19 383b4489 27ce51eb 7419ef0c 869f9cfd
  295. 04:39:33 ipsec,debug,packet 00000014 afcad713 68a1f1c9 6b8696fc 77570100 00000000 00000000
  296. 04:39:33 ipsec,debug,packet begin.
  297. 04:39:33 ipsec,debug,packet seen nptype=5(id)
  298. 04:39:33 ipsec,debug,packet seen nptype=8(hash)
  299. 04:39:33 ipsec,debug,packet seen nptype=13(vid)
  300. 04:39:33 ipsec,debug,packet succeed.
  301. 04:39:33 ipsec,debug received Vendor ID: DPD
  302. 04:39:33 ipsec,debug,packet remote supports DPD
  303. 04:39:33 ipsec,debug,packet HASH received:
  304. 04:39:33 ipsec,debug,packet ce6cce19 383b4489 27ce51eb 7419ef0c 869f9cfd
  305. 04:39:33 ipsec,debug,packet HASH with:
  306. 04:39:33 ipsec,debug,packet b9d1080f 9eab0d4d e2d03d2c a7ddf938 a99c0b7b 9665846a 603bc6ea b5320e76
  307. 04:39:33 ipsec,debug,packet 028cb927 44d6dd3e b154d335 47a15028 23d0cb71 792aba54 5a727194 86075750
  308. 04:39:33 ipsec,debug,packet 55f0a306 0f291712 23f94e5a dc4cd38d 2f0ea907 2c238416 8a434f19 f55700ba
  309. 04:39:33 ipsec,debug,packet c7b6eeef f07fcf58 221f0303 bfe6a72e 78f63c17 09667a6b 18e632de 2970ce61
  310. 04:39:33 ipsec,debug,packet 81037463 ab813413 b628b32f bb3d7fac 8012e55a 24e0a7d7 b38c901e 62ccadf4
  311. 04:39:33 ipsec,debug,packet 5e075900 881b19de 8b7a8119 752aa706 c10f6207 41ed7254 5aec67b4 5d1b31f8
  312. 04:39:33 ipsec,debug,packet dfa5e319 420f9e66 89c2b44e 68ef7d28 cb52ec39 a618289e d24a64ca 9defefd2
  313. 04:39:33 ipsec,debug,packet def9998f 6e7a0b3b 2e471517 be47c84e 3f1ff3c5 6a2fdde7 338cbdbc 945c8501
  314. 04:39:33 ipsec,debug,packet fe6efe88 2c6037a0 d31c4368 8cc95e11 00000001 00000001 00000030 01010001
  315. 04:39:33 ipsec,debug,packet 00000028 01010000 800b0001 000c0004 00015180 80010007 800e0080 80030001
  316. 04:39:33 ipsec,debug,packet 80020002 80040002 01110000 c0a8c802
  317. 04:39:33 ipsec,debug,packet hmac(hmac_sha1)
  318. 04:39:33 ipsec,debug,packet HASH computed:
  319. 04:39:33 ipsec,debug,packet ce6cce19 383b4489 27ce51eb 7419ef0c 869f9cfd
  320. 04:39:33 ipsec,debug,packet HASH for PSK validated.
  321. 04:39:33 ipsec,debug,packet peer's ID:
  322. 04:39:33 ipsec,debug,packet 01110000 c0a8c802
  323. 04:39:33 ipsec,debug,packet ===
  324. 04:39:33 ipsec,debug,packet compute IV for phase2
  325. 04:39:33 ipsec,debug,packet phase1 last IV:
  326. 04:39:33 ipsec,debug,packet 18c7509b 526d7475 8d51688b 5dfdc9f3 8781ad57
  327. 04:39:33 ipsec,debug,packet hash(sha1)
  328. 04:39:33 ipsec,debug,packet encryption(aes)
  329. 04:39:33 ipsec,debug,packet phase2 IV computed:
  330. 04:39:33 ipsec,debug,packet 989657a3 63dee87f aa17ecbd a44ba85a
  331. 04:39:33 ipsec,debug,packet HASH with:
  332. 04:39:33 ipsec,debug,packet 8781ad57 0000001c 00000001 01106002 d31c4368 8cc95e11 fe6efe88 2c6037a0
  333. 04:39:33 ipsec,debug,packet hmac(hmac_sha1)
  334. 04:39:33 ipsec,debug,packet HASH computed:
  335. 04:39:33 ipsec,debug,packet 4a2ced41 8ec9bb72 e5654d61 edf476c2 4c89e874
  336. 04:39:33 ipsec,debug,packet begin encryption.
  337. 04:39:33 ipsec,debug,packet encryption(aes)
  338. 04:39:33 ipsec,debug,packet pad length = 12
  339. 04:39:33 ipsec,debug,packet 0b000018 4a2ced41 8ec9bb72 e5654d61 edf476c2 4c89e874 0000001c 00000001
  340. 04:39:33 ipsec,debug,packet 01106002 d31c4368 8cc95e11 fe6efe88 2c6037a0 79d5074a b07f336b c604750b
  341. 04:39:33 ipsec,debug,packet encryption(aes)
  342. 04:39:33 ipsec,debug,packet with key:
  343. 04:39:33 ipsec,debug,packet 020aaaba 56806ef1 96b9a99f fe1e13de
  344. 04:39:33 ipsec,debug,packet encrypted payload by IV:
  345. 04:39:33 ipsec,debug,packet 989657a3 63dee87f aa17ecbd a44ba85a
  346. 04:39:33 ipsec,debug,packet save IV for next:
  347. 04:39:33 ipsec,debug,packet 673d9193 d913d7ce 4ca63a4e b15de204
  348. 04:39:33 ipsec,debug,packet encrypted.
  349. 04:39:33 ipsec,debug,packet Adding NON-ESP marker
  350. 04:39:33 ipsec,debug,packet 96 bytes from ZZ.ZZ.ZZ.ZZ[4500] to XX.XX.XX.XX[4500]
  351. 04:39:33 ipsec,debug,packet sockname ZZ.ZZ.ZZ.ZZ[4500]
  352. 04:39:33 ipsec,debug,packet send packet from ZZ.ZZ.ZZ.ZZ[4500]
  353. 04:39:33 ipsec,debug,packet send packet to XX.XX.XX.XX[4500]
  354. 04:39:33 ipsec,debug,packet src4 ZZ.ZZ.ZZ.ZZ[4500]
  355. 04:39:33 ipsec,debug,packet dst4 XX.XX.XX.XX[4500]
  356. 04:39:33 ipsec,debug,packet 1 times of 96 bytes message will be sent to XX.XX.XX.XX[4500]
  357. 04:39:33 ipsec,debug,packet 00000000 d31c4368 8cc95e11 fe6efe88 2c6037a0 08100501 8781ad57 0000005c
  358. 04:39:33 ipsec,debug,packet 8998ad98 e307395c 33fd376a c6a2aa09 6157bb7a 81d2d8b1 c8b9c440 c3fd278e
  359. 04:39:33 ipsec,debug,packet 725ec779 554689d9 8a29eadd 69b0c526 673d9193 d913d7ce 4ca63a4e b15de204
  360. 04:39:33 ipsec,debug,packet sendto Information notify.
  361. 04:39:33 ipsec,debug ISAKMP-SA established ZZ.ZZ.ZZ.ZZ[4500]-XX.XX.XX.XX[4500] spi:d31c43688cc95e11:f
  362. e6efe882c6037a0
  363. 04:39:33 ipsec,debug,packet ===
  364. 04:39:52 ipsec,debug,packet KA: ZZ.ZZ.ZZ.ZZ[4500]->XX.XX.XX.XX[4500]
  365. 04:39:52 ipsec,debug,packet sockname ZZ.ZZ.ZZ.ZZ[4500]
  366. 04:39:52 ipsec,debug,packet send packet from ZZ.ZZ.ZZ.ZZ[4500]
  367. 04:39:52 ipsec,debug,packet send packet to XX.XX.XX.XX[4500]
  368. 04:39:52 ipsec,debug,packet src4 ZZ.ZZ.ZZ.ZZ[4500]
  369. 04:39:52 ipsec,debug,packet dst4 XX.XX.XX.XX[4500]
  370. 04:39:52 ipsec,debug,packet 1 times of 1 bytes message will be sent to XX.XX.XX.XX[4500]
  371. 04:39:52 ipsec,debug,packet ff
  372. 04:39:57 system,info ipsec peer changed by admin
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement