Advertisement
Guest User

Untitled

a guest
Jan 5th, 2015
378
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.08 KB | None | 0 0
  1. Plutorun started on Mon Jan 5 22:22:03 YEKT 2015
  2. adjusting ipsec.d to /etc/ipsec.d
  3. Starting Pluto (Openswan Version 2.6.37; Vendor ID OEu\134d\134jy\134\134ap) pid:14580
  4. LEAK_DETECTIVE support [disabled]
  5. OCF support for IKE [disabled]
  6. SAref support [disabled]: Protocol not available
  7. SAbind support [disabled]: Protocol not available
  8. NSS support [disabled]
  9. HAVE_STATSD notification support not compiled in
  10. Setting NAT-Traversal port-4500 floating to on
  11. port floating activation criteria nat_t=1/port_float=1
  12. NAT-Traversal support [enabled]
  13. using /dev/urandom as source of random entropy
  14. ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
  15. starting up 1 cryptographic helpers
  16. started helper pid=14586 (fd:4)
  17. Using Linux 2.6 IPsec interface code on 3.2.0-4-amd64 (experimental code)
  18. using /dev/urandom as source of random entropy
  19. ike_alg_register_enc(): Activating aes_ccm_8: Ok (ret=0)
  20. ike_alg_add(): ERROR: Algorithm already exists
  21. ike_alg_register_enc(): Activating aes_ccm_12: FAILED (ret=-17)
  22. ike_alg_add(): ERROR: Algorithm already exists
  23. ike_alg_register_enc(): Activating aes_ccm_16: FAILED (ret=-17)
  24. ike_alg_add(): ERROR: Algorithm already exists
  25. ike_alg_register_enc(): Activating aes_gcm_8: FAILED (ret=-17)
  26. ike_alg_add(): ERROR: Algorithm already exists
  27. ike_alg_register_enc(): Activating aes_gcm_12: FAILED (ret=-17)
  28. ike_alg_add(): ERROR: Algorithm already exists
  29. ike_alg_register_enc(): Activating aes_gcm_16: FAILED (ret=-17)
  30. Changed path to directory '/etc/ipsec.d/cacerts'
  31. Changed path to directory '/etc/ipsec.d/aacerts'
  32. Changed path to directory '/etc/ipsec.d/ocspcerts'
  33. Changing to directory '/etc/ipsec.d/crls'
  34. Warning: empty directory
  35. added connection description "L2TP-PSK-NAT"
  36. added connection description "L2TP-PSK-noNAT"
  37. added connection description "passthrough-for-non-l2tp"
  38. listening for IKE messages
  39. adding interface eth0/eth0 192.168.0.103:500
  40. adding interface eth0/eth0 192.168.0.103:4500
  41. adding interface lo/lo 127.0.0.1:500
  42. adding interface lo/lo 127.0.0.1:4500
  43. adding interface lo/lo ::1:500
  44. loading secrets from "/etc/ipsec.secrets"
  45. loading secrets from "/var/lib/openswan/ipsec.secrets.inc"
  46. packet from 89.204.112.133:500: received Vendor ID payload [RFC 3947] method set to=109
  47. packet from 89.204.112.133:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 109
  48. packet from 89.204.112.133:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 109
  49. packet from 89.204.112.133:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
  50. packet from 89.204.112.133:500: ignoring Vendor ID payload [FRAGMENTATION 80000000]
  51. packet from 89.204.112.133:500: received Vendor ID payload [Dead Peer Detection]
  52. "L2TP-PSK-NAT"[1] 89.204.112.133 #1: responding to Main Mode from unknown peer 89.204.112.133
  53. "L2TP-PSK-NAT"[1] 89.204.112.133 #1: OAKLEY_SHA2_256 is not supported. Attribute OAKLEY_HASH_ALGORITHM
  54. "L2TP-PSK-NAT"[1] 89.204.112.133 #1: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
  55. "L2TP-PSK-NAT"[1] 89.204.112.133 #1: STATE_MAIN_R1: sent MR1, expecting MI2
  56. "L2TP-PSK-NAT"[1] 89.204.112.133 #1: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): both are NATed
  57. "L2TP-PSK-NAT"[1] 89.204.112.133 #1: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
  58. "L2TP-PSK-NAT"[1] 89.204.112.133 #1: STATE_MAIN_R2: sent MR2, expecting MI3
  59. "L2TP-PSK-NAT"[1] 89.204.112.133 #1: Main mode peer ID is ID_IPV4_ADDR: '10.100.159.81'
  60. "L2TP-PSK-NAT"[1] 89.204.112.133 #1: switched from "L2TP-PSK-NAT" to "L2TP-PSK-NAT"
  61. "L2TP-PSK-NAT"[2] 89.204.112.133 #1: deleting connection "L2TP-PSK-NAT" instance with peer 89.204.112.133 {isakmp=#0/ipsec=#0}
  62. "L2TP-PSK-NAT"[2] 89.204.112.133 #1: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
  63. "L2TP-PSK-NAT"[2] 89.204.112.133 #1: new NAT mapping for #1, was 89.204.112.133:500, now 89.204.112.133:4500
  64. "L2TP-PSK-NAT"[2] 89.204.112.133 #1: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_256 prf=oakley_sha group=modp1024}
  65. "L2TP-PSK-NAT"[2] 89.204.112.133 #1: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000
  66. "L2TP-PSK-NAT"[2] 89.204.112.133 #1: received and ignored informational message
  67. "L2TP-PSK-NAT"[2] 89.204.112.133 #1: the peer proposed: 89.179.3.113/32:17/1701 -> 10.100.159.81/32:17/0
  68. "L2TP-PSK-NAT"[2] 89.204.112.133 #2: responding to Quick Mode proposal {msgid:431046d6}
  69. "L2TP-PSK-NAT"[2] 89.204.112.133 #2: us: 192.168.0.103<192.168.0.103>[+S=C]:17/1701
  70. "L2TP-PSK-NAT"[2] 89.204.112.133 #2: them: 89.204.112.133[10.100.159.81,+S=C]:17/0===10.100.159.81/32
  71. "L2TP-PSK-NAT"[2] 89.204.112.133 #2: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
  72. "L2TP-PSK-NAT"[2] 89.204.112.133 #2: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
  73. "L2TP-PSK-NAT"[2] 89.204.112.133 #2: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
  74. "L2TP-PSK-NAT"[2] 89.204.112.133 #2: STATE_QUICK_R2: IPsec SA established transport mode {ESP=>0x0afebfd6 <0x9d2a0aad xfrm=AES_256-HMAC_SHA2_256 NATOA=none NATD=89.204.112.133:4500 DPD=none}
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement