Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 03:51:25 l2tp,ppp,info l2tp-out1: initializing...
- 03:51:25 l2tp,ppp,info l2tp-out1: dialing...
- 03:51:25 l2tp,debug tunnel 81 entering state: wait-ctl-reply
- 03:51:25 l2tp,debug,packet sent control message to XX.XX.XX.XX:1701
- 03:51:25 l2tp,debug,packet tunnel-id=0, session-id=0, ns=0, nr=0
- 03:51:25 l2tp,debug,packet (M) Message-Type=SCCRQ
- 03:51:25 l2tp,debug,packet (M) Protocol-Version=0x01:00
- 03:51:25 l2tp,debug,packet (M) Framing-Capabilities=0x1
- 03:51:25 l2tp,debug,packet (M) Bearer-Capabilities=0x0
- 03:51:25 l2tp,debug,packet Firmware-Revision=0x1
- 03:51:25 l2tp,debug,packet (M) Host-Name="Linux"
- 03:51:25 l2tp,debug,packet Vendor-Name="MikroTik"
- 03:51:25 l2tp,debug,packet (M) Assigned-Tunnel-ID=81
- 03:51:25 l2tp,debug,packet (M) Receive-Window-Size=4
- 03:51:25 l2tp,debug,packet rcvd control message from XX.XX.XX.XX:1701
- 03:51:25 l2tp,debug,packet tunnel-id=81, session-id=0, ns=0, nr=1
- 03:51:25 l2tp,debug,packet (M) Message-Type=StopCCN
- 03:51:25 l2tp,debug,packet (M) Result-Code=2
- 03:51:25 l2tp,debug,packet Error-Code=0
- 03:51:25 l2tp,debug,packet Error-Message="No cc config for Linux"
- 03:51:25 l2tp,debug,packet (M) Assigned-Tunnel-ID=23497
- 03:51:25 l2tp,debug,packet sent control message (ack) to XX.XX.XX.XX:1701
- 03:51:25 l2tp,debug,packet tunnel-id=23497, session-id=0, ns=1, nr=1
- 03:51:26 l2tp,debug,packet sent control message to XX.XX.XX.XX:1701
- 03:51:26 l2tp,debug,packet tunnel-id=0, session-id=0, ns=0, nr=0
- Что касательно ipsec
- 04:39:32 ipsec,debug,packet ===
- 04:39:32 system,info ipsec peer changed by admin
- 04:39:32 ipsec,debug initiate new phase 1 negotiation: ZZ.ZZ.ZZ.ZZ[500]<=>XX.XX.XX.XX[500]
- 04:39:32 ipsec,debug begin Identity Protection mode.
- 04:39:32 ipsec,debug,packet new cookie:
- 04:39:32 ipsec,debug,packet d31c43688cc95e11
- 04:39:32 ipsec,debug,packet add payload of len 56, next type 13
- 04:39:32 ipsec,debug,packet add payload of len 16, next type 13
- 04:39:32 ipsec,debug,packet add payload of len 16, next type 13
- 04:39:32 ipsec,debug,packet add payload of len 16, next type 13
- 04:39:32 ipsec,debug,packet add payload of len 16, next type 13
- 04:39:32 ipsec,debug,packet add payload of len 16, next type 13
- 04:39:32 ipsec,debug,packet add payload of len 16, next type 13
- 04:39:32 ipsec,debug,packet add payload of len 16, next type 13
- 04:39:32 ipsec,debug,packet add payload of len 16, next type 13
- 04:39:32 ipsec,debug,packet add payload of len 16, next type 13
- 04:39:32 ipsec,debug,packet add payload of len 16, next type 13
- 04:39:32 ipsec,debug,packet add payload of len 16, next type 13
- 04:39:32 ipsec,debug,packet add payload of len 16, next type 13
- 04:39:32 ipsec,debug,packet add payload of len 16, next type 0
- 04:39:32 ipsec,debug,packet 348 bytes from ZZ.ZZ.ZZ.ZZ[500] to XX.XX.XX.XX[500]
- 04:39:32 ipsec,debug,packet sockname ZZ.ZZ.ZZ.ZZ[500]
- 04:39:32 ipsec,debug,packet send packet from ZZ.ZZ.ZZ.ZZ[500]
- 04:39:32 ipsec,debug,packet send packet to XX.XX.XX.XX[500]
- 04:39:32 ipsec,debug,packet src4 ZZ.ZZ.ZZ.ZZ[500]
- 04:39:32 ipsec,debug,packet dst4 XX.XX.XX.XX[500]
- 04:39:32 ipsec,debug,packet 1 times of 348 bytes message will be sent to XX.XX.XX.XX[500]
- 04:39:32 ipsec,debug,packet d31c4368 8cc95e11 00000000 00000000 01100200 00000000 0000015c 0d00003c
- 04:39:32 ipsec,debug,packet 00000001 00000001 00000030 01010001 00000028 01010000 800b0001 000c0004
- 04:39:32 ipsec,debug,packet 00015180 80010007 800e0080 80030001 80020002 80040002 0d000014 4a131c81
- 04:39:32 ipsec,debug,packet 07035845 5c5728f2 0e95452f 0d000014 8f8d8382 6d246b6f c7a8a6a4 28c11de8
- 04:39:32 ipsec,debug,packet 0d000014 439b59f8 ba676c4c 7737ae22 eab8f582 0d000014 4d1e0e13 6deafa34
- 04:39:32 ipsec,debug,packet c4f3ea9f 02ec7285 0d000014 80d0bb3d ef54565e e84645d4 c85ce3ee 0d000014
- 04:39:32 ipsec,debug,packet 9909b64e ed937c65 73de52ac e952fa6b 0d000014 7d9419a6 5310ca6f 2c179d92
- 04:39:32 ipsec,debug,packet 15529d56 0d000014 cd604643 35df21f8 7cfdb2fc 68b6a448 0d000014 90cb8091
- 04:39:32 ipsec,debug,packet 3ebb696e 086381b5 ec427b1f 0d000014 16f6ca16 e4a4066d 83821a0f 0aeaa862
- 04:39:32 ipsec,debug,packet 0d000014 4485152d 18b6bbcd 0be8a846 9579ddcc 0d000014 12f5f28c 457168a9
- 04:39:32 ipsec,debug,packet 702d9fe2 74cc0100 00000014 afcad713 68a1f1c9 6b8696fc 77570100
- 04:39:32 ipsec,debug,packet resend phase1 packet d31c43688cc95e11:0000000000000000
- 04:39:33 ipsec,debug,packet ==========
- 04:39:33 ipsec,debug,packet 132 bytes message received from XX.XX.XX.XX[500] to ZZ.ZZ.ZZ.ZZ[500]
- 04:39:33 ipsec,debug,packet d31c4368 8cc95e11 fe6efe88 2c6037a0 01100200 00000000 00000084 0d00003c
- 04:39:33 ipsec,debug,packet 00000001 00000001 00000030 01010001 00000028 01010000 80010007 800e0080
- 04:39:33 ipsec,debug,packet 80020002 80040002 80030001 800b0001 000c0004 00015180 0d000014 90cb8091
- 04:39:33 ipsec,debug,packet 3ebb696e 086381b5 ec427b1f 00000018 4048b7d5 6ebce885 25e7de7f 00d6c2d3
- 04:39:33 ipsec,debug,packet c0000000
- 04:39:33 ipsec,debug,packet begin.
- 04:39:33 ipsec,debug,packet seen nptype=1(sa)
- 04:39:33 ipsec,debug,packet seen nptype=13(vid)
- 04:39:33 ipsec,debug,packet seen nptype=13(vid)
- 04:39:33 ipsec,debug,packet succeed.
- 04:39:33 ipsec,debug received Vendor ID: draft-ietf-ipsec-nat-t-ike-02
- 04:39:33 ipsec,debug
- 04:39:33 ipsec,debug received broken Microsoft ID: FRAGMENTATION
- 04:39:33 ipsec,debug Selected NAT-T version: draft-ietf-ipsec-nat-t-ike-02
- 04:39:33 ipsec,debug
- 04:39:33 ipsec,debug,packet total SA len=56
- 04:39:33 ipsec,debug,packet 00000001 00000001 00000030 01010001 00000028 01010000 80010007 800e0080
- 04:39:33 ipsec,debug,packet 80020002 80040002 80030001 800b0001 000c0004 00015180
- 04:39:33 ipsec,debug,packet begin.
- 04:39:33 ipsec,debug,packet seen nptype=2(prop)
- 04:39:33 ipsec,debug,packet succeed.
- 04:39:33 ipsec,debug,packet proposal #1 len=48
- 04:39:33 ipsec,debug,packet begin.
- 04:39:33 ipsec,debug,packet seen nptype=3(trns)
- 04:39:33 ipsec,debug,packet succeed.
- 04:39:33 ipsec,debug,packet transform #1 len=40
- 04:39:33 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
- 04:39:33 ipsec,debug,packet encryption(aes)
- 04:39:33 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=128
- 04:39:33 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
- 04:39:33 ipsec,debug,packet hash(sha1)
- 04:39:33 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
- 04:39:33 ipsec,debug,packet hmac(modp1024)
- 04:39:33 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
- 04:39:33 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
- 04:39:33 ipsec,debug,packet type=Life Duration, flag=0x0000, lorv=4
- 04:39:33 ipsec,debug,packet pair 1:
- 04:39:33 ipsec,debug,packet 0x4824e0: next=(nil) tnext=(nil)
- 04:39:33 ipsec,debug,packet proposal #1: 1 transform
- 04:39:33 ipsec,debug,packet prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1
- 04:39:33 ipsec,debug,packet trns#=1, trns-id=IKE
- 04:39:33 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
- 04:39:33 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=128
- 04:39:33 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
- 04:39:33 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
- 04:39:33 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
- 04:39:33 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
- 04:39:33 ipsec,debug,packet type=Life Duration, flag=0x0000, lorv=4
- 04:39:33 ipsec,debug,packet Compared: DB:Peer
- 04:39:33 ipsec,debug,packet (lifetime = 86400:86400)
- 04:39:33 ipsec,debug,packet (lifebyte = 0:0)
- 04:39:33 ipsec,debug,packet enctype = AES-CBC:AES-CBC
- 04:39:33 ipsec,debug,packet (encklen = 128:128)
- 04:39:33 ipsec,debug,packet hashtype = SHA:SHA
- 04:39:33 ipsec,debug,packet authmethod = pre-shared key:pre-shared key
- 04:39:33 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
- 04:39:33 ipsec,debug,packet an acceptable proposal found.
- 04:39:33 ipsec,debug,packet hmac(modp1024)
- 04:39:33 ipsec,debug,packet agreed on pre-shared key auth.
- 04:39:33 ipsec,debug,packet ===
- 04:39:33 ipsec,debug,packet compute DH's private.
- 04:39:33 ipsec,debug,packet 52f507f0 edad0835 0fc9a679 c449b9e8 cd67f80e 642263ee 0a75430b 330f3d35
- 04:39:33 ipsec,debug,packet e8c308ae 92f72ff3 153548ed ffcc880a 751b16c8 ccfdf33b 9ba7d115 ace4d234
- 04:39:33 ipsec,debug,packet c80ea968 7028eff8 58ba8a53 5a6d594e 267bbb50 035b8ef3 b568fb59 3615ddaa
- 04:39:33 ipsec,debug,packet d3e97a83 6f423e5c c678fad5 d15e6017 d49dc6f0 b69b4383 3e51ac6c 06c63f24
- 04:39:33 ipsec,debug,packet compute DH's public.
- 04:39:33 ipsec,debug,packet 81037463 ab813413 b628b32f bb3d7fac 8012e55a 24e0a7d7 b38c901e 62ccadf4
- 04:39:33 ipsec,debug,packet 5e075900 881b19de 8b7a8119 752aa706 c10f6207 41ed7254 5aec67b4 5d1b31f8
- 04:39:33 ipsec,debug,packet dfa5e319 420f9e66 89c2b44e 68ef7d28 cb52ec39 a618289e d24a64ca 9defefd2
- 04:39:33 ipsec,debug,packet def9998f 6e7a0b3b 2e471517 be47c84e 3f1ff3c5 6a2fdde7 338cbdbc 945c8501
- 04:39:33 ipsec,debug Hashing XX.XX.XX.XX[500] with algo #2
- 04:39:33 ipsec,debug,packet hash(sha1)
- 04:39:33 ipsec,debug Hashing ZZ.ZZ.ZZ.ZZ[500] with algo #2
- 04:39:33 ipsec,debug,packet hash(sha1)
- 04:39:33 ipsec,debug Adding remote and local NAT-D payloads.
- 04:39:33 ipsec,debug,packet add payload of len 128, next type 10
- 04:39:33 ipsec,debug,packet add payload of len 24, next type 130
- 04:39:33 ipsec,debug,packet add payload of len 20, next type 130
- 04:39:33 ipsec,debug,packet add payload of len 20, next type 0
- 04:39:33 ipsec,debug,packet 236 bytes from ZZ.ZZ.ZZ.ZZ[500] to XX.XX.XX.XX[500]
- 04:39:33 ipsec,debug,packet sockname ZZ.ZZ.ZZ.ZZ[500]
- 04:39:33 ipsec,debug,packet send packet from ZZ.ZZ.ZZ.ZZ[500]
- 04:39:33 ipsec,debug,packet send packet to XX.XX.XX.XX[500]
- 04:39:33 ipsec,debug,packet src4 ZZ.ZZ.ZZ.ZZ[500]
- 04:39:33 ipsec,debug,packet dst4 XX.XX.XX.XX[500]
- 04:39:33 ipsec,debug,packet 1 times of 236 bytes message will be sent to XX.XX.XX.XX[500]
- 04:39:33 ipsec,debug,packet d31c4368 8cc95e11 fe6efe88 2c6037a0 04100200 00000000 000000ec 0a000084
- 04:39:33 ipsec,debug,packet 81037463 ab813413 b628b32f bb3d7fac 8012e55a 24e0a7d7 b38c901e 62ccadf4
- 04:39:33 ipsec,debug,packet 5e075900 881b19de 8b7a8119 752aa706 c10f6207 41ed7254 5aec67b4 5d1b31f8
- 04:39:33 ipsec,debug,packet dfa5e319 420f9e66 89c2b44e 68ef7d28 cb52ec39 a618289e d24a64ca 9defefd2
- 04:39:33 ipsec,debug,packet def9998f 6e7a0b3b 2e471517 be47c84e 3f1ff3c5 6a2fdde7 338cbdbc 945c8501
- 04:39:33 ipsec,debug,packet 8200001c aaa1f707 d23efc4c a1358de7 6e587d3d d3540f6f b937bc8c 82000018
- 04:39:33 ipsec,debug,packet e4d5f0a7 5448cac6 3545ebb8 cc15bf60 8275d116 00000018 f7629206 89343f0c
- 04:39:33 ipsec,debug,packet 302987d0 e7b5648e b7ad2a4c
- 04:39:33 ipsec,debug,packet resend phase1 packet d31c43688cc95e11:fe6efe882c6037a0
- 04:39:33 ipsec,debug,packet ==========
- 04:39:33 ipsec,debug,packet 304 bytes message received from XX.XX.XX.XX[500] to ZZ.ZZ.ZZ.ZZ[500]
- 04:39:33 ipsec,debug,packet d31c4368 8cc95e11 fe6efe88 2c6037a0 04100200 00000000 00000130 0a000084
- 04:39:33 ipsec,debug,packet b9d1080f 9eab0d4d e2d03d2c a7ddf938 a99c0b7b 9665846a 603bc6ea b5320e76
- 04:39:33 ipsec,debug,packet 028cb927 44d6dd3e b154d335 47a15028 23d0cb71 792aba54 5a727194 86075750
- 04:39:33 ipsec,debug,packet 55f0a306 0f291712 23f94e5a dc4cd38d 2f0ea907 2c238416 8a434f19 f55700ba
- 04:39:33 ipsec,debug,packet c7b6eeef f07fcf58 221f0303 bfe6a72e 78f63c17 09667a6b 18e632de 2970ce61
- 04:39:33 ipsec,debug,packet 0d000018 9f90b653 756c7323 ebd1bba0 72ce2974 4e3a8f89 0d000014 12f5f28c
- 04:39:33 ipsec,debug,packet 457168a9 702d9fe2 74cc0100 0d00000c 09002689 dfd6b712 0d000014 0ba95995
- 04:39:33 ipsec,debug,packet 2c6137a0 85b2cecc e605cf78 82000014 1f07f70e aa6514d3 b0fa9654 2a500100
- 04:39:33 ipsec,debug,packet 82000018 26225750 87efa009 d9e6df4c de4ea1ba fdecb766 00000018 7031de9b
- 04:39:33 ipsec,debug,packet 5bd1ecc2 6bcaa435 2fb121bd 20ec6261
- 04:39:33 ipsec,debug,packet begin.
- 04:39:33 ipsec,debug,packet seen nptype=4(ke)
- 04:39:33 ipsec,debug,packet seen nptype=10(nonce)
- 04:39:33 ipsec,debug,packet seen nptype=13(vid)
- 04:39:33 ipsec,debug,packet seen nptype=13(vid)
- 04:39:33 ipsec,debug,packet seen nptype=13(vid)
- 04:39:33 ipsec,debug,packet seen nptype=13(vid)
- 04:39:33 ipsec,debug,packet seen nptype=130(nat-d)
- 04:39:33 ipsec,debug,packet seen nptype=130(nat-d)
- 04:39:33 ipsec,debug,packet succeed.
- 04:39:33 ipsec,debug received Vendor ID: CISCO-UNITY
- 04:39:33 ipsec,debug received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt
- 04:39:33 ipsec,debug,packet received unknown Vendor ID
- 04:39:33 ipsec,debug,packet received unknown Vendor ID
- 04:39:33 ipsec,debug Hashing ZZ.ZZ.ZZ.ZZ[500] with algo #2
- 04:39:33 ipsec,debug,packet hash(sha1)
- 04:39:33 ipsec,debug NAT-D payload #0 doesn't match
- 04:39:33 ipsec,debug Hashing XX.XX.XX.XX[500] with algo #2
- 04:39:33 ipsec,debug,packet hash(sha1)
- 04:39:33 ipsec,debug NAT-D payload #1 doesn't match
- 04:39:33 ipsec,debug NAT detected: ME PEER
- 04:39:33 ipsec,debug KA list add: ZZ.ZZ.ZZ.ZZ[4500]->XX.XX.XX.XX[4500]
- 04:39:33 ipsec,debug,packet ===
- 04:39:33 ipsec,debug,packet compute DH's shared.
- 04:39:33 ipsec,debug,packet
- 04:39:33 ipsec,debug,packet 4818d6c7 b899e908 5cdaf5c7 45897939 79e99aaa 31020c30 6ade3053 3cf2362b
- 04:39:33 ipsec,debug,packet a3cb4f1a c69afcb9 9e88b553 56b03ec4 5a08f27c 7175e4b6 f275cf7c da017a45
- 04:39:33 ipsec,debug,packet 9602fc3f 128f922a a3fe18b8 c115dea8 1c650c67 dd7fed43 b5ba45b9 bdc4e101
- 04:39:33 ipsec,debug,packet 51707cc6 22227ad3 f6580f84 459ad732 45192358 4ea6a0e8 d6d776f3 b41d8ff6
- 04:39:33 ipsec,debug,packet the psk found.
- 04:39:33 ipsec,debug,packet nonce 1:
- 04:39:33 ipsec,debug,packet aaa1f707 d23efc4c a1358de7 6e587d3d d3540f6f b937bc8c
- 04:39:33 ipsec,debug,packet nonce 2:
- 04:39:33 ipsec,debug,packet 9f90b653 756c7323 ebd1bba0 72ce2974 4e3a8f89
- 04:39:33 ipsec,debug,packet hmac(hmac_sha1)
- 04:39:33 ipsec,debug,packet SKEYID computed:
- 04:39:33 ipsec,debug,packet 391dd816 c25f9991 737ab8f3 7d2840b8 1dc69879
- 04:39:33 ipsec,debug,packet hmac(hmac_sha1)
- 04:39:33 ipsec,debug,packet SKEYID_d computed:
- 04:39:33 ipsec,debug,packet b3a02774 d624800f e693cba0 7e98b428 ef5f9452
- 04:39:33 ipsec,debug,packet hmac(hmac_sha1)
- 04:39:33 ipsec,debug,packet SKEYID_a computed:
- 04:39:33 ipsec,debug,packet 1b41848a fa0f2b33 034f0063 e6e04415 c7599afd
- 04:39:33 ipsec,debug,packet hmac(hmac_sha1)
- 04:39:33 ipsec,debug,packet SKEYID_e computed:
- 04:39:33 ipsec,debug,packet 020aaaba 56806ef1 96b9a99f fe1e13de adec08e2
- 04:39:33 ipsec,debug,packet encryption(aes)
- 04:39:33 ipsec,debug,packet hash(sha1)
- 04:39:33 ipsec,debug,packet final encryption key computed:
- 04:39:33 ipsec,debug,packet 020aaaba 56806ef1 96b9a99f fe1e13de
- 04:39:33 ipsec,debug,packet hash(sha1)
- 04:39:33 ipsec,debug,packet encryption(aes)
- 04:39:33 ipsec,debug,packet IV computed:
- 04:39:33 ipsec,debug,packet 031ed535 6319b1a2 0d152454 d8f5e54c
- 04:39:33 ipsec,debug,packet use ID type of IPv4_address
- 04:39:33 ipsec,debug,packet HASH with:
- 04:39:33 ipsec,debug,packet 81037463 ab813413 b628b32f bb3d7fac 8012e55a 24e0a7d7 b38c901e 62ccadf4
- 04:39:33 ipsec,debug,packet 5e075900 881b19de 8b7a8119 752aa706 c10f6207 41ed7254 5aec67b4 5d1b31f8
- 04:39:33 ipsec,debug,packet dfa5e319 420f9e66 89c2b44e 68ef7d28 cb52ec39 a618289e d24a64ca 9defefd2
- 04:39:33 ipsec,debug,packet def9998f 6e7a0b3b 2e471517 be47c84e 3f1ff3c5 6a2fdde7 338cbdbc 945c8501
- 04:39:33 ipsec,debug,packet b9d1080f 9eab0d4d e2d03d2c a7ddf938 a99c0b7b 9665846a 603bc6ea b5320e76
- 04:39:33 ipsec,debug,packet 028cb927 44d6dd3e b154d335 47a15028 23d0cb71 792aba54 5a727194 86075750
- 04:39:33 ipsec,debug,packet 55f0a306 0f291712 23f94e5a dc4cd38d 2f0ea907 2c238416 8a434f19 f55700ba
- 04:39:33 ipsec,debug,packet c7b6eeef f07fcf58 221f0303 bfe6a72e 78f63c17 09667a6b 18e632de 2970ce61
- 04:39:33 ipsec,debug,packet d31c4368 8cc95e11 fe6efe88 2c6037a0 00000001 00000001 00000030 01010001
- 04:39:33 ipsec,debug,packet 00000028 01010000 800b0001 000c0004 00015180 80010007 800e0080 80030001
- 04:39:33 ipsec,debug,packet 80020002 80040002 011101f4 64565d04
- 04:39:33 ipsec,debug,packet hmac(hmac_sha1)
- 04:39:33 ipsec,debug,packet HASH computed:
- 04:39:33 ipsec,debug,packet 0035305c b62cc1d4 87dbf495 543f4ab1 8430ea56
- 04:39:33 ipsec,debug,packet add payload of len 8, next type 8
- 04:39:33 ipsec,debug,packet add payload of len 20, next type 0
- 04:39:33 ipsec,debug,packet begin encryption.
- 04:39:33 ipsec,debug,packet encryption(aes)
- 04:39:33 ipsec,debug,packet pad length = 12
- 04:39:33 ipsec,debug,packet 0800000c 011101f4 64565d04 00000018 0035305c b62cc1d4 87dbf495 543f4ab1
- 04:39:33 ipsec,debug,packet 8430ea56 70029603 beeef3b8 32f3910b
- 04:39:33 ipsec,debug,packet encryption(aes)
- 04:39:33 ipsec,debug,packet with key:
- 04:39:33 ipsec,debug,packet 020aaaba 56806ef1 96b9a99f fe1e13de
- 04:39:33 ipsec,debug,packet encrypted payload by IV:
- 04:39:33 ipsec,debug,packet 031ed535 6319b1a2 0d152454 d8f5e54c
- 04:39:33 ipsec,debug,packet save IV for next:
- 04:39:33 ipsec,debug,packet 448f6799 7b838073 5ea2c22a 977aea51
- 04:39:33 ipsec,debug,packet encrypted.
- 04:39:33 ipsec,debug,packet Adding NON-ESP marker
- 04:39:33 ipsec,debug,packet 80 bytes from ZZ.ZZ.ZZ.ZZ[4500] to XX.XX.XX.XX[4500]
- 04:39:33 ipsec,debug,packet sockname ZZ.ZZ.ZZ.ZZ[4500]
- 04:39:33 ipsec,debug,packet send packet from ZZ.ZZ.ZZ.ZZ[4500]
- 04:39:33 ipsec,debug,packet send packet to XX.XX.XX.XX[4500]
- 04:39:33 ipsec,debug,packet src4 ZZ.ZZ.ZZ.ZZ[4500]
- 04:39:33 ipsec,debug,packet dst4 XX.XX.XX.XX[4500]
- 04:39:33 ipsec,debug,packet 1 times of 80 bytes message will be sent to XX.XX.XX.XX[4500]
- 04:39:33 ipsec,debug,packet 00000000 d31c4368 8cc95e11 fe6efe88 2c6037a0 05100201 00000000 0000004c
- 04:39:33 ipsec,debug,packet 3a5eabee 6dd886ba 74566dfb 5776da4b d5c447cf efc20c12 04ae4cd8 3b545b2b
- 04:39:33 ipsec,debug,packet 448f6799 7b838073 5ea2c22a 977aea51
- 04:39:33 ipsec,debug,packet resend phase1 packet d31c43688cc95e11:fe6efe882c6037a0
- 04:39:33 ipsec,debug,packet ==========
- 04:39:33 ipsec,debug,packet 92 bytes message received from XX.XX.XX.XX[4500] to ZZ.ZZ.ZZ.ZZ[4500]
- 04:39:33 ipsec,debug,packet d31c4368 8cc95e11 fe6efe88 2c6037a0 05100201 00000000 0000005c 57c48a7c
- 04:39:33 ipsec,debug,packet a9ac57f2 0af0b94e 46526ab4 59887d1b cd5b55b7 bdcc3ca2 c5e139ad 859a55f9
- 04:39:33 ipsec,debug,packet 2438254f 9557fd68 d75a454d 18c7509b 526d7475 8d51688b 5dfdc9f3
- 04:39:33 ipsec,debug,packet encryption(aes)
- 04:39:33 ipsec,debug,packet IV was saved for next processing:
- 04:39:33 ipsec,debug,packet 18c7509b 526d7475 8d51688b 5dfdc9f3
- 04:39:33 ipsec,debug,packet encryption(aes)
- 04:39:33 ipsec,debug,packet with key:
- 04:39:33 ipsec,debug,packet 020aaaba 56806ef1 96b9a99f fe1e13de
- 04:39:33 ipsec,debug,packet decrypted payload by IV:
- 04:39:33 ipsec,debug,packet 448f6799 7b838073 5ea2c22a 977aea51
- 04:39:33 ipsec,debug,packet decrypted payload, but not trimed.
- 04:39:33 ipsec,debug,packet 0800000c 01110000 c0a8c802 0d000018 ce6cce19 383b4489 27ce51eb 7419ef0c
- 04:39:33 ipsec,debug,packet 869f9cfd 00000014 afcad713 68a1f1c9 6b8696fc 77570100 00000000 00000000
- 04:39:33 ipsec,debug,packet padding len=1
- 04:39:33 ipsec,debug,packet skip to trim padding.
- 04:39:33 ipsec,debug,packet decrypted.
- 04:39:33 ipsec,debug,packet d31c4368 8cc95e11 fe6efe88 2c6037a0 05100201 00000000 0000005c 0800000c
- 04:39:33 ipsec,debug,packet 01110000 c0a8c802 0d000018 ce6cce19 383b4489 27ce51eb 7419ef0c 869f9cfd
- 04:39:33 ipsec,debug,packet 00000014 afcad713 68a1f1c9 6b8696fc 77570100 00000000 00000000
- 04:39:33 ipsec,debug,packet begin.
- 04:39:33 ipsec,debug,packet seen nptype=5(id)
- 04:39:33 ipsec,debug,packet seen nptype=8(hash)
- 04:39:33 ipsec,debug,packet seen nptype=13(vid)
- 04:39:33 ipsec,debug,packet succeed.
- 04:39:33 ipsec,debug received Vendor ID: DPD
- 04:39:33 ipsec,debug,packet remote supports DPD
- 04:39:33 ipsec,debug,packet HASH received:
- 04:39:33 ipsec,debug,packet ce6cce19 383b4489 27ce51eb 7419ef0c 869f9cfd
- 04:39:33 ipsec,debug,packet HASH with:
- 04:39:33 ipsec,debug,packet b9d1080f 9eab0d4d e2d03d2c a7ddf938 a99c0b7b 9665846a 603bc6ea b5320e76
- 04:39:33 ipsec,debug,packet 028cb927 44d6dd3e b154d335 47a15028 23d0cb71 792aba54 5a727194 86075750
- 04:39:33 ipsec,debug,packet 55f0a306 0f291712 23f94e5a dc4cd38d 2f0ea907 2c238416 8a434f19 f55700ba
- 04:39:33 ipsec,debug,packet c7b6eeef f07fcf58 221f0303 bfe6a72e 78f63c17 09667a6b 18e632de 2970ce61
- 04:39:33 ipsec,debug,packet 81037463 ab813413 b628b32f bb3d7fac 8012e55a 24e0a7d7 b38c901e 62ccadf4
- 04:39:33 ipsec,debug,packet 5e075900 881b19de 8b7a8119 752aa706 c10f6207 41ed7254 5aec67b4 5d1b31f8
- 04:39:33 ipsec,debug,packet dfa5e319 420f9e66 89c2b44e 68ef7d28 cb52ec39 a618289e d24a64ca 9defefd2
- 04:39:33 ipsec,debug,packet def9998f 6e7a0b3b 2e471517 be47c84e 3f1ff3c5 6a2fdde7 338cbdbc 945c8501
- 04:39:33 ipsec,debug,packet fe6efe88 2c6037a0 d31c4368 8cc95e11 00000001 00000001 00000030 01010001
- 04:39:33 ipsec,debug,packet 00000028 01010000 800b0001 000c0004 00015180 80010007 800e0080 80030001
- 04:39:33 ipsec,debug,packet 80020002 80040002 01110000 c0a8c802
- 04:39:33 ipsec,debug,packet hmac(hmac_sha1)
- 04:39:33 ipsec,debug,packet HASH computed:
- 04:39:33 ipsec,debug,packet ce6cce19 383b4489 27ce51eb 7419ef0c 869f9cfd
- 04:39:33 ipsec,debug,packet HASH for PSK validated.
- 04:39:33 ipsec,debug,packet peer's ID:
- 04:39:33 ipsec,debug,packet 01110000 c0a8c802
- 04:39:33 ipsec,debug,packet ===
- 04:39:33 ipsec,debug,packet compute IV for phase2
- 04:39:33 ipsec,debug,packet phase1 last IV:
- 04:39:33 ipsec,debug,packet 18c7509b 526d7475 8d51688b 5dfdc9f3 8781ad57
- 04:39:33 ipsec,debug,packet hash(sha1)
- 04:39:33 ipsec,debug,packet encryption(aes)
- 04:39:33 ipsec,debug,packet phase2 IV computed:
- 04:39:33 ipsec,debug,packet 989657a3 63dee87f aa17ecbd a44ba85a
- 04:39:33 ipsec,debug,packet HASH with:
- 04:39:33 ipsec,debug,packet 8781ad57 0000001c 00000001 01106002 d31c4368 8cc95e11 fe6efe88 2c6037a0
- 04:39:33 ipsec,debug,packet hmac(hmac_sha1)
- 04:39:33 ipsec,debug,packet HASH computed:
- 04:39:33 ipsec,debug,packet 4a2ced41 8ec9bb72 e5654d61 edf476c2 4c89e874
- 04:39:33 ipsec,debug,packet begin encryption.
- 04:39:33 ipsec,debug,packet encryption(aes)
- 04:39:33 ipsec,debug,packet pad length = 12
- 04:39:33 ipsec,debug,packet 0b000018 4a2ced41 8ec9bb72 e5654d61 edf476c2 4c89e874 0000001c 00000001
- 04:39:33 ipsec,debug,packet 01106002 d31c4368 8cc95e11 fe6efe88 2c6037a0 79d5074a b07f336b c604750b
- 04:39:33 ipsec,debug,packet encryption(aes)
- 04:39:33 ipsec,debug,packet with key:
- 04:39:33 ipsec,debug,packet 020aaaba 56806ef1 96b9a99f fe1e13de
- 04:39:33 ipsec,debug,packet encrypted payload by IV:
- 04:39:33 ipsec,debug,packet 989657a3 63dee87f aa17ecbd a44ba85a
- 04:39:33 ipsec,debug,packet save IV for next:
- 04:39:33 ipsec,debug,packet 673d9193 d913d7ce 4ca63a4e b15de204
- 04:39:33 ipsec,debug,packet encrypted.
- 04:39:33 ipsec,debug,packet Adding NON-ESP marker
- 04:39:33 ipsec,debug,packet 96 bytes from ZZ.ZZ.ZZ.ZZ[4500] to XX.XX.XX.XX[4500]
- 04:39:33 ipsec,debug,packet sockname ZZ.ZZ.ZZ.ZZ[4500]
- 04:39:33 ipsec,debug,packet send packet from ZZ.ZZ.ZZ.ZZ[4500]
- 04:39:33 ipsec,debug,packet send packet to XX.XX.XX.XX[4500]
- 04:39:33 ipsec,debug,packet src4 ZZ.ZZ.ZZ.ZZ[4500]
- 04:39:33 ipsec,debug,packet dst4 XX.XX.XX.XX[4500]
- 04:39:33 ipsec,debug,packet 1 times of 96 bytes message will be sent to XX.XX.XX.XX[4500]
- 04:39:33 ipsec,debug,packet 00000000 d31c4368 8cc95e11 fe6efe88 2c6037a0 08100501 8781ad57 0000005c
- 04:39:33 ipsec,debug,packet 8998ad98 e307395c 33fd376a c6a2aa09 6157bb7a 81d2d8b1 c8b9c440 c3fd278e
- 04:39:33 ipsec,debug,packet 725ec779 554689d9 8a29eadd 69b0c526 673d9193 d913d7ce 4ca63a4e b15de204
- 04:39:33 ipsec,debug,packet sendto Information notify.
- 04:39:33 ipsec,debug ISAKMP-SA established ZZ.ZZ.ZZ.ZZ[4500]-XX.XX.XX.XX[4500] spi:d31c43688cc95e11:f
- e6efe882c6037a0
- 04:39:33 ipsec,debug,packet ===
- 04:39:52 ipsec,debug,packet KA: ZZ.ZZ.ZZ.ZZ[4500]->XX.XX.XX.XX[4500]
- 04:39:52 ipsec,debug,packet sockname ZZ.ZZ.ZZ.ZZ[4500]
- 04:39:52 ipsec,debug,packet send packet from ZZ.ZZ.ZZ.ZZ[4500]
- 04:39:52 ipsec,debug,packet send packet to XX.XX.XX.XX[4500]
- 04:39:52 ipsec,debug,packet src4 ZZ.ZZ.ZZ.ZZ[4500]
- 04:39:52 ipsec,debug,packet dst4 XX.XX.XX.XX[4500]
- 04:39:52 ipsec,debug,packet 1 times of 1 bytes message will be sent to XX.XX.XX.XX[4500]
- 04:39:52 ipsec,debug,packet ff
- 04:39:57 system,info ipsec peer changed by admin
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement