Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- root@MQ-WITI:/# /etc/init.d/ipsec restart
- ipsec_setup: Stopping Openswan IPsec...
- ipsec_setup: Starting Openswan IPsec U/K3.10.60-r29...
- ipsec_setup: ipsec_setup: WARNING: cannot flush state/policy database -- `%defaultroute'. Install a newer version of iproute/iproute2 or install the ipsec-tools package to obtain the setkey command.
- root@MQ-WITI:/# ipsec auto --up l2tp
- 002 "l2tp" #1: initiating Main Mode
- 105 "l2tp" #1: STATE_MAIN_I1: initiate
- 003 "l2tp" #1: received Vendor ID payload [RFC 3947] method set to=115
- 003 "l2tp" #1: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 115
- 003 "l2tp" #1: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115
- 003 "l2tp" #1: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115
- 003 "l2tp" #1: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
- 003 "l2tp" #1: received Vendor ID payload [Dead Peer Detection]
- 002 "l2tp" #1: enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal)
- 002 "l2tp" #1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
- 107 "l2tp" #1: STATE_MAIN_I2: sent MI2, expecting MR2
- 003 "l2tp" #1: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): i am NATed
- 002 "l2tp" #1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
- 109 "l2tp" #1: STATE_MAIN_I3: sent MI3, expecting MR3
- 002 "l2tp" #1: Main mode peer ID is ID_IPV4_ADDR: '46.105.221.233'
- 002 "l2tp" #1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
- 004 "l2tp" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_128 prf=oakley_sha group=modp1536}
- 002 "l2tp" #2: initiating Quick Mode PSK+ENCRYPT+UP+IKEv2ALLOW+SAREFTRACK {using isakmp#1 msgid:1cb9d7b5 proposal=defaults pfsgroup=no-pfs}
- 118 "l2tp" #2: STATE_QUICK_I1: initiate
- 003 "l2tp" #2: NAT-Traversal: received 2 NAT-OA. ignored because peer is not NATed
- 002 "l2tp" #2: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
- 004 "l2tp" #2: STATE_QUICK_I2: sent QI2, IPsec SA established transport mode {ESP=>0xeb252cd5 <0x7c8f0313 xfrm=AES_128-HMAC_SHA1 NATOA=none NATD=none DPD=none}
- root@MQ-WITI:/# ifup test
- root@MQ-WITI:/# dmesg | tail -n 20
- [ 1467.212000] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
- [ 1467.212000]
- [ 1471.552000] Rcv Wcid(1) AddBAReq
- [ 1471.556000] Start Seq = 00000083
- [ 1629.300000] === Build IPSec outbound Connection[0] [P0](SPI=38CF93F0)===
- [ 1629.312000] === Build IPSec outbound Connection[0] [P1](SPI=38CF93F0)===
- [ 1629.444000] === Build IPSec inbound Connection[0] [P0](SPI=DC7BF956)===
- [ 1629.460000] === Build IPSec inbound Connection[0] [P1](SPI=DC7BF956)===
- [ 1715.528000] (2182)ipsec_eip93Adapter_free:free spi=38cf93f0
- [ 1715.540000] (2182)ipsec_eip93Adapter_free:free spi=dc7bf956
- [ 1733.968000] eth1: ===> VirtualIF_close
- [ 1733.976000] GDMA2_MAC_ADRH -- : 0x0000000c
- [ 1733.984000] GDMA2_MAC_ADRL -- : 0x4328800a
- [ 1733.996000] GDMA2_MAC_ADRH -- : 0x00000001
- [ 1734.004000] GDMA2_MAC_ADRL -- : 0x020304e5
- [ 1734.012000] eth1: ===> VirtualIF_open
- [ 1784.448000] === Build IPSec outbound Connection[0] [P0](SPI=D52C25EB)===
- [ 1784.464000] === Build IPSec outbound Connection[0] [P1](SPI=D52C25EB)===
- [ 1784.776000] === Build IPSec inbound Connection[0] [P0](SPI=13038F7C)===
- [ 1784.788000] === Build IPSec inbound Connection[0] [P1](SPI=13038F7C)===
- root@MQ-WITI:/# logread | tail -n 40
- Wed Feb 3 23:14:12 2016 daemon.debug pppd[12777]: PPPoL2TP options: debugmask 0
- Wed Feb 3 23:14:12 2016 daemon.debug pppd[12777]: sent [LCP ConfReq id=0x1 <asyncmap 0x0> <magic 0xfd7c6ceb>]
- Wed Feb 3 23:14:12 2016 daemon.debug pppd[12777]: rcvd [LCP ConfReq id=0x0 <auth pap>]
- Wed Feb 3 23:14:12 2016 daemon.debug pppd[12777]: sent [LCP ConfAck id=0x0 <auth pap>]
- Wed Feb 3 23:14:12 2016 daemon.debug pppd[12777]: rcvd [LCP ConfRej id=0x1 <asyncmap 0x0> <magic 0xfd7c6ceb>]
- Wed Feb 3 23:14:12 2016 daemon.debug pppd[12777]: sent [LCP ConfReq id=0x2]
- Wed Feb 3 23:14:12 2016 daemon.debug pppd[12777]: rcvd [LCP ConfAck id=0x2]
- Wed Feb 3 23:14:12 2016 daemon.debug pppd[12777]: PPPoL2TP options: debugmask 0
- Wed Feb 3 23:14:12 2016 daemon.debug pppd[12777]: sent [LCP EchoReq id=0x0 magic=0x0]
- Wed Feb 3 23:14:12 2016 daemon.debug pppd[12777]: sent [PAP AuthReq id=0x1 user="vpn" password=<hidden>]
- Wed Feb 3 23:14:12 2016 daemon.debug pppd[12777]: rcvd [LCP EchoRep id=0x0 magic=0x0]
- Wed Feb 3 23:14:12 2016 daemon.debug pppd[12777]: rcvd [PAP AuthAck id=0x1]
- Wed Feb 3 23:14:12 2016 daemon.notice pppd[12777]: PAP authentication succeeded
- Wed Feb 3 23:14:12 2016 daemon.debug pppd[12777]: sent [IPCP ConfReq id=0x1 <addr 0.0.0.0> <ms-dns1 0.0.0.0> <ms-dns2 0.0.0.0>]
- Wed Feb 3 23:14:12 2016 daemon.debug pppd[12777]: rcvd [IPCP ConfReq id=0x1 <addr 1.0.0.1>]
- Wed Feb 3 23:14:12 2016 daemon.debug pppd[12777]: sent [IPCP ConfAck id=0x1 <addr 1.0.0.1>]
- Wed Feb 3 23:14:13 2016 daemon.debug pppd[12777]: sent [LCP EchoReq id=0x1 magic=0x0]
- Wed Feb 3 23:14:13 2016 daemon.debug pppd[12777]: rcvd [LCP EchoRep id=0x1 magic=0x0]
- Wed Feb 3 23:14:13 2016 daemon.debug pppd[12777]: rcvd [IPCP ConfNak id=0x1 <addr 10.211.1.109> <ms-dns1 10.211.254.254> <ms-dns2 8.8.8.8>]
- Wed Feb 3 23:14:13 2016 daemon.debug pppd[12777]: sent [IPCP ConfReq id=0x2 <addr 10.211.1.109> <ms-dns1 10.211.254.254> <ms-dns2 8.8.8.8>]
- Wed Feb 3 23:14:13 2016 daemon.debug pppd[12777]: rcvd [IPCP ConfAck id=0x2 <addr 10.211.1.109> <ms-dns1 10.211.254.254> <ms-dns2 8.8.8.8>]
- Wed Feb 3 23:14:13 2016 daemon.notice pppd[12777]: local IP address 10.211.1.109
- Wed Feb 3 23:14:13 2016 daemon.notice pppd[12777]: remote IP address 1.0.0.1
- Wed Feb 3 23:14:13 2016 daemon.notice pppd[12777]: primary DNS address 10.211.254.254
- Wed Feb 3 23:14:13 2016 daemon.notice pppd[12777]: secondary DNS address 8.8.8.8
- Wed Feb 3 23:14:13 2016 daemon.debug pppd[12777]: Script /lib/netifd/ppp-up started (pid 12799)
- Wed Feb 3 23:14:14 2016 daemon.notice netifd: Network device 'l2tp-test' link is up
- Wed Feb 3 23:14:14 2016 daemon.notice netifd: Interface 'test' is now up
- Wed Feb 3 23:14:14 2016 daemon.debug pppd[12777]: Script /lib/netifd/ppp-up finished (pid 12799), status = 0x0
- Wed Feb 3 23:14:14 2016 user.notice firewall: Reloading firewall due to ifup of test (l2tp-test)
- Wed Feb 3 23:14:14 2016 daemon.notice miniupnpd[12142]: shutting down MiniUPnPd
- Wed Feb 3 23:14:14 2016 daemon.err miniupnpd[12905]: could not open lease file: /var/upnp.leases
- Wed Feb 3 23:14:14 2016 daemon.notice miniupnpd[12905]: HTTP listening on port 5000
- Wed Feb 3 23:14:14 2016 daemon.notice miniupnpd[12905]: HTTP IPv6 address given to control points : [fdb1:e8bf:81c4::1]
- Wed Feb 3 23:14:14 2016 daemon.notice miniupnpd[12905]: Listening for NAT-PMP/PCP traffic on port 5351
- Wed Feb 3 23:14:23 2016 daemon.info dnsmasq[2625]: reading /tmp/resolv.conf.auto
- Wed Feb 3 23:14:23 2016 daemon.info dnsmasq[2625]: using local addresses only for domain lan
- Wed Feb 3 23:14:23 2016 daemon.info dnsmasq[2625]: using nameserver 10.211.254.254#53
- Wed Feb 3 23:14:23 2016 daemon.info dnsmasq[2625]: using nameserver 8.8.8.8#53
- Wed Feb 3 23:14:23 2016 daemon.info dnsmasq[2625]: using nameserver 10.185.254.1#53
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement