Advertisement
Guest User

Untitled

a guest
Feb 3rd, 2016
170
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.20 KB | None | 0 0
  1. root@MQ-WITI:/# /etc/init.d/ipsec restart
  2. ipsec_setup: Stopping Openswan IPsec...
  3.  
  4. ipsec_setup: Starting Openswan IPsec U/K3.10.60-r29...
  5.  
  6. ipsec_setup: ipsec_setup: WARNING: cannot flush state/policy database -- `%defaultroute'. Install a newer version of iproute/iproute2 or install the ipsec-tools package to obtain the setkey command.
  7.  
  8. root@MQ-WITI:/# ipsec auto --up l2tp
  9. 002 "l2tp" #1: initiating Main Mode
  10. 105 "l2tp" #1: STATE_MAIN_I1: initiate
  11. 003 "l2tp" #1: received Vendor ID payload [RFC 3947] method set to=115
  12. 003 "l2tp" #1: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 115
  13. 003 "l2tp" #1: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115
  14. 003 "l2tp" #1: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115
  15. 003 "l2tp" #1: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
  16. 003 "l2tp" #1: received Vendor ID payload [Dead Peer Detection]
  17. 002 "l2tp" #1: enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal)
  18. 002 "l2tp" #1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
  19. 107 "l2tp" #1: STATE_MAIN_I2: sent MI2, expecting MR2
  20. 003 "l2tp" #1: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): i am NATed
  21. 002 "l2tp" #1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
  22. 109 "l2tp" #1: STATE_MAIN_I3: sent MI3, expecting MR3
  23. 002 "l2tp" #1: Main mode peer ID is ID_IPV4_ADDR: '46.105.221.233'
  24. 002 "l2tp" #1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
  25. 004 "l2tp" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_128 prf=oakley_sha group=modp1536}
  26. 002 "l2tp" #2: initiating Quick Mode PSK+ENCRYPT+UP+IKEv2ALLOW+SAREFTRACK {using isakmp#1 msgid:1cb9d7b5 proposal=defaults pfsgroup=no-pfs}
  27. 118 "l2tp" #2: STATE_QUICK_I1: initiate
  28. 003 "l2tp" #2: NAT-Traversal: received 2 NAT-OA. ignored because peer is not NATed
  29. 002 "l2tp" #2: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
  30. 004 "l2tp" #2: STATE_QUICK_I2: sent QI2, IPsec SA established transport mode {ESP=>0xeb252cd5 <0x7c8f0313 xfrm=AES_128-HMAC_SHA1 NATOA=none NATD=none DPD=none}
  31.  
  32. root@MQ-WITI:/# ifup test
  33.  
  34. root@MQ-WITI:/# dmesg | tail -n 20
  35. [ 1467.212000] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
  36. [ 1467.212000]
  37. [ 1471.552000] Rcv Wcid(1) AddBAReq
  38. [ 1471.556000] Start Seq = 00000083
  39. [ 1629.300000] === Build IPSec outbound Connection[0] [P0](SPI=38CF93F0)===
  40. [ 1629.312000] === Build IPSec outbound Connection[0] [P1](SPI=38CF93F0)===
  41. [ 1629.444000] === Build IPSec inbound Connection[0] [P0](SPI=DC7BF956)===
  42. [ 1629.460000] === Build IPSec inbound Connection[0] [P1](SPI=DC7BF956)===
  43. [ 1715.528000] (2182)ipsec_eip93Adapter_free:free spi=38cf93f0
  44. [ 1715.540000] (2182)ipsec_eip93Adapter_free:free spi=dc7bf956
  45. [ 1733.968000] eth1: ===> VirtualIF_close
  46. [ 1733.976000] GDMA2_MAC_ADRH -- : 0x0000000c
  47. [ 1733.984000] GDMA2_MAC_ADRL -- : 0x4328800a
  48. [ 1733.996000] GDMA2_MAC_ADRH -- : 0x00000001
  49. [ 1734.004000] GDMA2_MAC_ADRL -- : 0x020304e5
  50. [ 1734.012000] eth1: ===> VirtualIF_open
  51. [ 1784.448000] === Build IPSec outbound Connection[0] [P0](SPI=D52C25EB)===
  52. [ 1784.464000] === Build IPSec outbound Connection[0] [P1](SPI=D52C25EB)===
  53. [ 1784.776000] === Build IPSec inbound Connection[0] [P0](SPI=13038F7C)===
  54. [ 1784.788000] === Build IPSec inbound Connection[0] [P1](SPI=13038F7C)===
  55.  
  56. root@MQ-WITI:/# logread | tail -n 40
  57. Wed Feb 3 23:14:12 2016 daemon.debug pppd[12777]: PPPoL2TP options: debugmask 0
  58. Wed Feb 3 23:14:12 2016 daemon.debug pppd[12777]: sent [LCP ConfReq id=0x1 <asyncmap 0x0> <magic 0xfd7c6ceb>]
  59. Wed Feb 3 23:14:12 2016 daemon.debug pppd[12777]: rcvd [LCP ConfReq id=0x0 <auth pap>]
  60. Wed Feb 3 23:14:12 2016 daemon.debug pppd[12777]: sent [LCP ConfAck id=0x0 <auth pap>]
  61. Wed Feb 3 23:14:12 2016 daemon.debug pppd[12777]: rcvd [LCP ConfRej id=0x1 <asyncmap 0x0> <magic 0xfd7c6ceb>]
  62. Wed Feb 3 23:14:12 2016 daemon.debug pppd[12777]: sent [LCP ConfReq id=0x2]
  63. Wed Feb 3 23:14:12 2016 daemon.debug pppd[12777]: rcvd [LCP ConfAck id=0x2]
  64. Wed Feb 3 23:14:12 2016 daemon.debug pppd[12777]: PPPoL2TP options: debugmask 0
  65. Wed Feb 3 23:14:12 2016 daemon.debug pppd[12777]: sent [LCP EchoReq id=0x0 magic=0x0]
  66. Wed Feb 3 23:14:12 2016 daemon.debug pppd[12777]: sent [PAP AuthReq id=0x1 user="vpn" password=<hidden>]
  67. Wed Feb 3 23:14:12 2016 daemon.debug pppd[12777]: rcvd [LCP EchoRep id=0x0 magic=0x0]
  68. Wed Feb 3 23:14:12 2016 daemon.debug pppd[12777]: rcvd [PAP AuthAck id=0x1]
  69. Wed Feb 3 23:14:12 2016 daemon.notice pppd[12777]: PAP authentication succeeded
  70. Wed Feb 3 23:14:12 2016 daemon.debug pppd[12777]: sent [IPCP ConfReq id=0x1 <addr 0.0.0.0> <ms-dns1 0.0.0.0> <ms-dns2 0.0.0.0>]
  71. Wed Feb 3 23:14:12 2016 daemon.debug pppd[12777]: rcvd [IPCP ConfReq id=0x1 <addr 1.0.0.1>]
  72. Wed Feb 3 23:14:12 2016 daemon.debug pppd[12777]: sent [IPCP ConfAck id=0x1 <addr 1.0.0.1>]
  73. Wed Feb 3 23:14:13 2016 daemon.debug pppd[12777]: sent [LCP EchoReq id=0x1 magic=0x0]
  74. Wed Feb 3 23:14:13 2016 daemon.debug pppd[12777]: rcvd [LCP EchoRep id=0x1 magic=0x0]
  75. Wed Feb 3 23:14:13 2016 daemon.debug pppd[12777]: rcvd [IPCP ConfNak id=0x1 <addr 10.211.1.109> <ms-dns1 10.211.254.254> <ms-dns2 8.8.8.8>]
  76. Wed Feb 3 23:14:13 2016 daemon.debug pppd[12777]: sent [IPCP ConfReq id=0x2 <addr 10.211.1.109> <ms-dns1 10.211.254.254> <ms-dns2 8.8.8.8>]
  77. Wed Feb 3 23:14:13 2016 daemon.debug pppd[12777]: rcvd [IPCP ConfAck id=0x2 <addr 10.211.1.109> <ms-dns1 10.211.254.254> <ms-dns2 8.8.8.8>]
  78. Wed Feb 3 23:14:13 2016 daemon.notice pppd[12777]: local IP address 10.211.1.109
  79. Wed Feb 3 23:14:13 2016 daemon.notice pppd[12777]: remote IP address 1.0.0.1
  80. Wed Feb 3 23:14:13 2016 daemon.notice pppd[12777]: primary DNS address 10.211.254.254
  81. Wed Feb 3 23:14:13 2016 daemon.notice pppd[12777]: secondary DNS address 8.8.8.8
  82. Wed Feb 3 23:14:13 2016 daemon.debug pppd[12777]: Script /lib/netifd/ppp-up started (pid 12799)
  83. Wed Feb 3 23:14:14 2016 daemon.notice netifd: Network device 'l2tp-test' link is up
  84. Wed Feb 3 23:14:14 2016 daemon.notice netifd: Interface 'test' is now up
  85. Wed Feb 3 23:14:14 2016 daemon.debug pppd[12777]: Script /lib/netifd/ppp-up finished (pid 12799), status = 0x0
  86. Wed Feb 3 23:14:14 2016 user.notice firewall: Reloading firewall due to ifup of test (l2tp-test)
  87. Wed Feb 3 23:14:14 2016 daemon.notice miniupnpd[12142]: shutting down MiniUPnPd
  88. Wed Feb 3 23:14:14 2016 daemon.err miniupnpd[12905]: could not open lease file: /var/upnp.leases
  89. Wed Feb 3 23:14:14 2016 daemon.notice miniupnpd[12905]: HTTP listening on port 5000
  90. Wed Feb 3 23:14:14 2016 daemon.notice miniupnpd[12905]: HTTP IPv6 address given to control points : [fdb1:e8bf:81c4::1]
  91. Wed Feb 3 23:14:14 2016 daemon.notice miniupnpd[12905]: Listening for NAT-PMP/PCP traffic on port 5351
  92. Wed Feb 3 23:14:23 2016 daemon.info dnsmasq[2625]: reading /tmp/resolv.conf.auto
  93. Wed Feb 3 23:14:23 2016 daemon.info dnsmasq[2625]: using local addresses only for domain lan
  94. Wed Feb 3 23:14:23 2016 daemon.info dnsmasq[2625]: using nameserver 10.211.254.254#53
  95. Wed Feb 3 23:14:23 2016 daemon.info dnsmasq[2625]: using nameserver 8.8.8.8#53
  96. Wed Feb 3 23:14:23 2016 daemon.info dnsmasq[2625]: using nameserver 10.185.254.1#53
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement