Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- gateway.helios.lan
- Thu Aug 26 17:09:25 CEST 2010
- + _________________________ version
- + ipsec --version
- Linux Openswan U2.6.28/K2.6.18-194.8.1.v5 (netkey)
- See `ipsec --copyright' for copyright information.
- + _________________________ /proc/version
- + cat /proc/version
- Linux version 2.6.18-194.8.1.v5 (devel@clearos5x.lan) (gcc version 4.1.2 20080704 (Red Hat 4.1.2-48)) #1 SMP Thu Jul 15 01:14:04 EDT 2010
- + _________________________ /proc/net/ipsec_eroute
- + test -r /proc/net/ipsec_eroute
- + _________________________ netstat-rn
- + netstat -nr
- + head -n 100
- Kernel IP routing table
- Destination Gateway Genmask Flags MSS Window irtt Iface
- 10.81.9.204 0.0.0.0 255.255.255.255 UH 0 0 0 eth0
- 10.81.9.203 0.0.0.0 255.255.255.255 UH 0 0 0 eth0
- 10.97.10.0 0.0.0.0 255.255.255.0 U 0 0 0 eth1
- 85.145.148.0 0.0.0.0 255.255.252.0 U 0 0 0 eth0
- 0.0.0.0 85.145.148.1 0.0.0.0 UG 0 0 0 eth0
- + _________________________ /proc/net/ipsec_spi
- + test -r /proc/net/ipsec_spi
- + _________________________ /proc/net/ipsec_spigrp
- + test -r /proc/net/ipsec_spigrp
- + _________________________ /proc/net/ipsec_tncfg
- + test -r /proc/net/ipsec_tncfg
- + _________________________ /proc/net/pfkey
- + test -r /proc/net/pfkey
- + cat /proc/net/pfkey
- sk RefCnt Rmem Wmem User Inode
- + _________________________ ip-xfrm-state
- + ip xfrm state
- src 85.145.148.106 dst 95.96.10.129
- proto esp spi 0x428a7ae2 reqid 16409 mode tunnel
- replay-window 32 flag 20
- auth hmac(sha1) 0x80355ad1d31366f2d48aec500b31499cc7b13699
- enc cbc(aes) 0xf826a6f97b576c3f2645afa4f7ed7a6f
- encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
- src 85.145.148.106 dst 95.96.10.129
- proto esp spi 0x21bdff69 reqid 16405 mode tunnel
- replay-window 32 flag 20
- auth hmac(sha1) 0x5953d63e870a1dc036bd0d321f1887c54ab4490c
- enc cbc(aes) 0x8d9df67c3a606bee54dae8da20a270c8
- encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
- src 85.145.148.106 dst 95.96.10.129
- proto esp spi 0xad585a15 reqid 16409 mode tunnel
- replay-window 32 flag 20
- auth hmac(sha1) 0x744809d95ffc3caa317c5e8a15f28802556ab3bc
- enc cbc(aes) 0xaae9e3b4d3614e94d24acde4057e75ae
- encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
- src 95.96.10.129 dst 85.145.148.106
- proto esp spi 0x5b0be685 reqid 16409 mode tunnel
- replay-window 32 flag 20
- auth hmac(sha1) 0xa5aedbc37f2f2a3f33686b82d37893d9f86740ab
- enc cbc(aes) 0x808100be2786db9c1cd291da27e12b7e
- encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
- src 95.96.10.129 dst 85.145.148.106
- proto esp spi 0x099a2dc4 reqid 16405 mode tunnel
- replay-window 32 flag 20
- auth hmac(sha1) 0x05962134deeb653c881e2c3b644c493042704ef1
- enc cbc(aes) 0xec4e63dd515788a2e3e4418c449b20c2
- encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
- src 95.96.10.129 dst 85.145.148.106
- proto esp spi 0xad22afb1 reqid 16409 mode tunnel
- replay-window 32 flag 20
- auth hmac(sha1) 0xac919a02df53a5f0376c099de97d6d697380cd08
- enc cbc(aes) 0x212cce4a983bab0eee881d3a974d5412
- encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
- + _________________________ ip-xfrm-policy
- + ip xfrm policy
- src 10.81.9.204/32 dst 10.97.10.0/24
- dir in priority 2336
- tmpl src 95.96.10.129 dst 85.145.148.106
- proto esp reqid 16409 mode tunnel
- src 10.81.9.203/32 dst 10.97.10.0/24
- dir in priority 2336
- tmpl src 95.96.10.129 dst 85.145.148.106
- proto esp reqid 16405 mode tunnel
- src 10.97.10.0/24 dst 10.81.9.203/32
- dir out priority 2336
- tmpl src 85.145.148.106 dst 95.96.10.129
- proto esp reqid 16405 mode tunnel
- src 10.97.10.0/24 dst 10.81.9.204/32
- dir out priority 2336
- tmpl src 85.145.148.106 dst 95.96.10.129
- proto esp reqid 16409 mode tunnel
- src 10.81.9.204/32 dst 10.97.10.0/24
- dir fwd priority 2336
- tmpl src 95.96.10.129 dst 85.145.148.106
- proto esp reqid 16409 mode tunnel
- src 10.81.9.203/32 dst 10.97.10.0/24
- dir fwd priority 2336
- tmpl src 95.96.10.129 dst 85.145.148.106
- proto esp reqid 16405 mode tunnel
- src ::/0 dst ::/0
- dir in priority 0
- src 0.0.0.0/0 dst 0.0.0.0/0
- dir in priority 0
- src 0.0.0.0/0 dst 0.0.0.0/0
- dir in priority 0
- src 0.0.0.0/0 dst 0.0.0.0/0
- dir in priority 0
- src 0.0.0.0/0 dst 0.0.0.0/0
- dir in priority 0
- src 0.0.0.0/0 dst 0.0.0.0/0
- dir in priority 0
- src 0.0.0.0/0 dst 0.0.0.0/0
- dir in priority 0
- src ::/0 dst ::/0
- dir out priority 0
- src 0.0.0.0/0 dst 0.0.0.0/0
- dir out priority 0
- src 0.0.0.0/0 dst 0.0.0.0/0
- dir out priority 0
- src 0.0.0.0/0 dst 0.0.0.0/0
- dir out priority 0
- src 0.0.0.0/0 dst 0.0.0.0/0
- dir out priority 0
- src 0.0.0.0/0 dst 0.0.0.0/0
- dir out priority 0
- src 0.0.0.0/0 dst 0.0.0.0/0
- dir out priority 0
- + _________________________ /proc/crypto
- + test -r /proc/crypto
- + cat /proc/crypto
- name : deflate
- driver : deflate-generic
- module : deflate
- priority : 0
- type : compression
- name : tnepres
- driver : tnepres-generic
- module : serpent
- priority : 0
- type : cipher
- blocksize : 16
- min keysize : 0
- max keysize : 32
- name : serpent
- driver : serpent-generic
- module : serpent
- priority : 0
- type : cipher
- blocksize : 16
- min keysize : 0
- max keysize : 32
- name : blowfish
- driver : blowfish-generic
- module : blowfish
- priority : 0
- type : cipher
- blocksize : 8
- min keysize : 4
- max keysize : 56
- name : twofish
- driver : twofish-generic
- module : twofish
- priority : 0
- type : cipher
- blocksize : 16
- min keysize : 16
- max keysize : 32
- name : md5
- driver : md5-generic
- module : md5
- priority : 0
- type : digest
- blocksize : 64
- digestsize : 16
- name : sha256
- driver : sha256-generic
- module : sha256
- priority : 0
- type : digest
- blocksize : 64
- digestsize : 32
- name : sha512
- driver : sha512-generic
- module : sha512
- priority : 0
- type : digest
- blocksize : 128
- digestsize : 64
- name : sha384
- driver : sha384-generic
- module : sha512
- priority : 0
- type : digest
- blocksize : 128
- digestsize : 48
- name : des3_ede
- driver : des3_ede-generic
- module : des
- priority : 0
- type : cipher
- blocksize : 8
- min keysize : 24
- max keysize : 24
- name : des
- driver : des-generic
- module : des
- priority : 0
- type : cipher
- blocksize : 8
- min keysize : 8
- max keysize : 8
- name : aes
- driver : aes-generic
- module : aes_generic
- priority : 100
- type : cipher
- blocksize : 16
- min keysize : 16
- max keysize : 32
- name : aes
- driver : aes-i586
- module : aes_i586
- priority : 200
- type : cipher
- blocksize : 16
- min keysize : 16
- max keysize : 32
- name : arc4
- driver : arc4-generic
- module : arc4
- priority : 0
- type : cipher
- blocksize : 1
- min keysize : 1
- max keysize : 256
- name : crc32c
- driver : crc32c-generic
- module : kernel
- priority : 0
- type : digest
- blocksize : 32
- digestsize : 4
- name : sha1
- driver : sha1-generic
- module : kernel
- priority : 0
- type : digest
- blocksize : 64
- digestsize : 20
- + __________________________/proc/sys/net/core/xfrm-star
- /usr/local/libexec/ipsec/barf: line 191: __________________________/proc/sys/net/core/xfrm-star: No such file or directory
- + for i in '/proc/sys/net/core/xfrm_*'
- + echo -n '/proc/sys/net/core/xfrm_acq_expires: '
- /proc/sys/net/core/xfrm_acq_expires: + cat /proc/sys/net/core/xfrm_acq_expires
- 30
- + for i in '/proc/sys/net/core/xfrm_*'
- + echo -n '/proc/sys/net/core/xfrm_aevent_etime: '
- /proc/sys/net/core/xfrm_aevent_etime: + cat /proc/sys/net/core/xfrm_aevent_etime
- 10
- + for i in '/proc/sys/net/core/xfrm_*'
- + echo -n '/proc/sys/net/core/xfrm_aevent_rseqth: '
- /proc/sys/net/core/xfrm_aevent_rseqth: + cat /proc/sys/net/core/xfrm_aevent_rseqth
- 2
- + for i in '/proc/sys/net/core/xfrm_*'
- + echo -n '/proc/sys/net/core/xfrm_larval_drop: '
- /proc/sys/net/core/xfrm_larval_drop: + cat /proc/sys/net/core/xfrm_larval_drop
- 0
- + _________________________ /proc/sys/net/ipsec-star
- + test -d /proc/sys/net/ipsec
- + _________________________ ipsec/status
- + ipsec auto --status
- 000 using kernel interface: netkey
- 000 interface lo/lo ::1
- 000 interface lo/lo 127.0.0.1
- 000 interface lo/lo 127.0.0.1
- 000 interface eth1/eth1 10.97.10.1
- 000 interface eth1/eth1 10.97.10.1
- 000 interface eth0/eth0 85.145.148.106
- 000 interface eth0/eth0 85.145.148.106
- 000 %myid = (none)
- 000 debug none
- 000
- 000 virtual_private (%priv):
- 000 - allowed 3 subnets: 10.0.0.0/8, 192.168.0.0/16, 172.16.0.0/12
- 000 - disallowed 1 subnet: 10.97.10.0/24
- 000
- 000 algorithm ESP encrypt: id=2, name=ESP_DES, ivlen=8, keysizemin=64, keysizemax=64
- 000 algorithm ESP encrypt: id=3, name=ESP_3DES, ivlen=8, keysizemin=192, keysizemax=192
- 000 algorithm ESP encrypt: id=6, name=ESP_CAST, ivlen=8, keysizemin=40, keysizemax=128
- 000 algorithm ESP encrypt: id=7, name=ESP_BLOWFISH, ivlen=8, keysizemin=40, keysizemax=448
- 000 algorithm ESP encrypt: id=11, name=ESP_NULL, ivlen=0, keysizemin=0, keysizemax=0
- 000 algorithm ESP encrypt: id=12, name=ESP_AES, ivlen=8, keysizemin=128, keysizemax=256
- 000 algorithm ESP encrypt: id=13, name=ESP_AES_CTR, ivlen=8, keysizemin=128, keysizemax=256
- 000 algorithm ESP encrypt: id=14, name=ESP_AES_CCM_A, ivlen=8, keysizemin=128, keysizemax=256
- 000 algorithm ESP encrypt: id=15, name=ESP_AES_CCM_B, ivlen=8, keysizemin=128, keysizemax=256
- 000 algorithm ESP encrypt: id=16, name=ESP_AES_CCM_C, ivlen=8, keysizemin=128, keysizemax=256
- 000 algorithm ESP encrypt: id=18, name=ESP_AES_GCM_A, ivlen=8, keysizemin=128, keysizemax=256
- 000 algorithm ESP encrypt: id=19, name=ESP_AES_GCM_B, ivlen=8, keysizemin=128, keysizemax=256
- 000 algorithm ESP encrypt: id=20, name=ESP_AES_GCM_C, ivlen=8, keysizemin=128, keysizemax=256
- 000 algorithm ESP encrypt: id=252, name=ESP_SERPENT, ivlen=8, keysizemin=128, keysizemax=256
- 000 algorithm ESP encrypt: id=253, name=ESP_TWOFISH, ivlen=8, keysizemin=128, keysizemax=256
- 000 algorithm ESP auth attr: id=1, name=AUTH_ALGORITHM_HMAC_MD5, keysizemin=128, keysizemax=128
- 000 algorithm ESP auth attr: id=2, name=AUTH_ALGORITHM_HMAC_SHA1, keysizemin=160, keysizemax=160
- 000 algorithm ESP auth attr: id=5, name=AUTH_ALGORITHM_HMAC_SHA2_256, keysizemin=256, keysizemax=256
- 000 algorithm ESP auth attr: id=8, name=AUTH_ALGORITHM_HMAC_RIPEMD, keysizemin=160, keysizemax=160
- 000 algorithm ESP auth attr: id=9, name=AUTH_ALGORITHM_AES_CBC, keysizemin=128, keysizemax=128
- 000 algorithm ESP auth attr: id=251, name=(null), keysizemin=0, keysizemax=0
- 000
- 000 algorithm IKE encrypt: id=0, name=(null), blocksize=16, keydeflen=131
- 000 algorithm IKE encrypt: id=3, name=OAKLEY_BLOWFISH_CBC, blocksize=8, keydeflen=128
- 000 algorithm IKE encrypt: id=5, name=OAKLEY_3DES_CBC, blocksize=8, keydeflen=192
- 000 algorithm IKE encrypt: id=7, name=OAKLEY_AES_CBC, blocksize=16, keydeflen=128
- 000 algorithm IKE encrypt: id=65004, name=OAKLEY_SERPENT_CBC, blocksize=16, keydeflen=128
- 000 algorithm IKE encrypt: id=65005, name=OAKLEY_TWOFISH_CBC, blocksize=16, keydeflen=128
- 000 algorithm IKE encrypt: id=65289, name=OAKLEY_TWOFISH_CBC_SSH, blocksize=16, keydeflen=128
- 000 algorithm IKE hash: id=1, name=OAKLEY_MD5, hashsize=16
- 000 algorithm IKE hash: id=2, name=OAKLEY_SHA1, hashsize=20
- 000 algorithm IKE hash: id=4, name=OAKLEY_SHA2_256, hashsize=32
- 000 algorithm IKE hash: id=6, name=OAKLEY_SHA2_512, hashsize=64
- 000 algorithm IKE dh group: id=2, name=OAKLEY_GROUP_MODP1024, bits=1024
- 000 algorithm IKE dh group: id=5, name=OAKLEY_GROUP_MODP1536, bits=1536
- 000 algorithm IKE dh group: id=14, name=OAKLEY_GROUP_MODP2048, bits=2048
- 000 algorithm IKE dh group: id=15, name=OAKLEY_GROUP_MODP3072, bits=3072
- 000 algorithm IKE dh group: id=16, name=OAKLEY_GROUP_MODP4096, bits=4096
- 000 algorithm IKE dh group: id=17, name=OAKLEY_GROUP_MODP6144, bits=6144
- 000 algorithm IKE dh group: id=18, name=OAKLEY_GROUP_MODP8192, bits=8192
- 000
- 000 stats db_ops: {curr_cnt, total_cnt, maxsz} :context={0,0,0} trans={0,0,0} attrs={0,0,0}
- 000
- 000 "LAN": 10.97.10.0/24===85.145.148.106<85.145.148.106>[C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Left1024, E=admin@testingcorporation.nl,+S=C]...%virtual[C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl,+S=C]===?; unrouted; eroute owner: #0
- 000 "LAN": myip=10.97.10.1; hisip=unset; mycert=Left1024-cert.pem;
- 000 "LAN": CAs: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Testing1024, E=admin@testingcorporation.nl'...'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Testing1024, E=admin@testingcorporation.nl'
- 000 "LAN": ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0
- 000 "LAN": policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEv2ALLOW; prio: 24,32; interface: eth0;
- 000 "LAN": newest ISAKMP SA: #0; newest IPsec SA: #0;
- 000 "LAN"[5]: 10.97.10.0/24===85.145.148.106<85.145.148.106>[C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Left1024, E=admin@testingcorporation.nl,+S=C]...95.96.10.129[C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl,+S=C]===10.81.9.203/32; erouted; eroute owner: #80
- 000 "LAN"[5]: myip=10.97.10.1; hisip=unset; mycert=Left1024-cert.pem;
- 000 "LAN"[5]: CAs: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Testing1024, E=admin@testingcorporation.nl'...'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Testing1024, E=admin@testingcorporation.nl'
- 000 "LAN"[5]: ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0
- 000 "LAN"[5]: policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEv2ALLOW; prio: 24,32; interface: eth0;
- 000 "LAN"[5]: newest ISAKMP SA: #101; newest IPsec SA: #80;
- 000 "LAN"[5]: IKE algorithm newest: AES_CBC_128-SHA1-MODP2048
- 000 "LAN"[6]: 10.97.10.0/24===85.145.148.106<85.145.148.106>[C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Left1024, E=admin@testingcorporation.nl,+S=C]...95.96.10.129[C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl,+S=C]===10.81.9.204/32; erouted; eroute owner: #97
- 000 "LAN"[6]: myip=10.97.10.1; hisip=unset; mycert=Left1024-cert.pem;
- 000 "LAN"[6]: CAs: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Testing1024, E=admin@testingcorporation.nl'...'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Testing1024, E=admin@testingcorporation.nl'
- 000 "LAN"[6]: ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0
- 000 "LAN"[6]: policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEv2ALLOW; prio: 24,32; interface: eth0;
- 000 "LAN"[6]: newest ISAKMP SA: #102; newest IPsec SA: #97;
- 000 "LAN"[6]: IKE algorithm newest: AES_CBC_128-SHA1-MODP2048
- 000
- 000 #80: "LAN"[5] 95.96.10.129:4500 STATE_QUICK_I2 (sent QI2, IPsec SA established); EVENT_SA_REPLACE in 7913s; newest IPSEC; eroute owner; isakmp#77; idle; import:not set
- 000 #80: "LAN"[5] 95.96.10.129 esp.21bdff69@95.96.10.129 esp.99a2dc4@85.145.148.106 tun.0@95.96.10.129 tun.0@85.145.148.106 ref=0 refhim=4294901761
- 000 #101: "LAN"[5] 95.96.10.129:4500 STATE_MAIN_I4 (ISAKMP SA established); EVENT_SA_REPLACE in 2324s; newest ISAKMP; lastdpd=-1s(seq in:0 out:0); idle; import:not set
- 000 #97: "LAN"[6] 95.96.10.129:4500 STATE_QUICK_R2 (IPsec SA established); EVENT_SA_REPLACE in 21445s; newest IPSEC; eroute owner; isakmp#96; idle; import:not set
- 000 #97: "LAN"[6] 95.96.10.129 esp.428a7ae2@95.96.10.129 esp.5b0be685@85.145.148.106 tun.0@95.96.10.129 tun.0@85.145.148.106 ref=0 refhim=4294901761
- 000 #79: "LAN"[6] 95.96.10.129:4500 STATE_QUICK_R2 (IPsec SA established); EVENT_SA_REPLACE in 8264s; isakmp#78; idle; import:not set
- 000 #79: "LAN"[6] 95.96.10.129 esp.ad585a15@95.96.10.129 esp.ad22afb1@85.145.148.106 tun.0@95.96.10.129 tun.0@85.145.148.106 ref=0 refhim=4294901761
- 000 #103: "LAN"[6] 95.96.10.129:4500 STATE_MAIN_R3 (sent MR3, ISAKMP SA established); EVENT_SA_REPLACE in 2957s; lastdpd=-1s(seq in:0 out:0); idle; import:not set
- 000 #102: "LAN"[6] 95.96.10.129:4500 STATE_MAIN_I4 (ISAKMP SA established); EVENT_SA_REPLACE in 2419s; newest ISAKMP; lastdpd=-1s(seq in:0 out:0); idle; import:not set
- 000
- + _________________________ ifconfig-a
- + ifconfig -a
- eth0 Link encap:Ethernet HWaddr 00:04:75:E5:5B:18
- inet addr:85.145.148.106 Bcast:85.145.151.255 Mask:255.255.252.0
- inet6 addr: fe80::204:75ff:fee5:5b18/64 Scope:Link
- UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
- RX packets:481065 errors:0 dropped:0 overruns:0 frame:0
- TX packets:466750 errors:0 dropped:0 overruns:0 carrier:0
- collisions:0 txqueuelen:1000
- RX bytes:410535641 (391.5 MiB) TX bytes:78958682 (75.3 MiB)
- Interrupt:201 Base address:0x6000
- eth1 Link encap:Ethernet HWaddr 00:0C:6E:3E:22:A9
- inet addr:10.97.10.1 Bcast:10.97.10.255 Mask:255.255.255.0
- inet6 addr: fe80::20c:6eff:fe3e:22a9/64 Scope:Link
- UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
- RX packets:478536 errors:0 dropped:0 overruns:0 frame:0
- TX packets:445295 errors:0 dropped:0 overruns:0 carrier:0
- collisions:0 txqueuelen:1000
- RX bytes:80839662 (77.0 MiB) TX bytes:335371910 (319.8 MiB)
- Interrupt:201 Base address:0x9800
- imq0 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
- NOARP MTU:16000 Metric:1
- RX packets:0 errors:0 dropped:0 overruns:0 frame:0
- TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
- collisions:0 txqueuelen:11000
- RX bytes:0 (0.0 b) TX bytes:0 (0.0 b)
- imq1 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
- NOARP MTU:16000 Metric:1
- RX packets:0 errors:0 dropped:0 overruns:0 frame:0
- TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
- collisions:0 txqueuelen:11000
- RX bytes:0 (0.0 b) TX bytes:0 (0.0 b)
- lo Link encap:Local Loopback
- inet addr:127.0.0.1 Mask:255.0.0.0
- inet6 addr: ::1/128 Scope:Host
- UP LOOPBACK RUNNING MTU:16436 Metric:1
- RX packets:5606 errors:0 dropped:0 overruns:0 frame:0
- TX packets:5606 errors:0 dropped:0 overruns:0 carrier:0
- collisions:0 txqueuelen:0
- RX bytes:2629695 (2.5 MiB) TX bytes:2629695 (2.5 MiB)
- sit0 Link encap:IPv6-in-IPv4
- NOARP MTU:1480 Metric:1
- RX packets:0 errors:0 dropped:0 overruns:0 frame:0
- TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
- collisions:0 txqueuelen:0
- RX bytes:0 (0.0 b) TX bytes:0 (0.0 b)
- + _________________________ ip-addr-list
- + ip addr list
- 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue
- link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
- inet 127.0.0.1/8 scope host lo
- inet6 ::1/128 scope host
- valid_lft forever preferred_lft forever
- 2: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000
- link/ether 00:0c:6e:3e:22:a9 brd ff:ff:ff:ff:ff:ff
- inet 10.97.10.1/24 brd 10.97.10.255 scope global eth1
- inet6 fe80::20c:6eff:fe3e:22a9/64 scope link
- valid_lft forever preferred_lft forever
- 3: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000
- link/ether 00:04:75:e5:5b:18 brd ff:ff:ff:ff:ff:ff
- inet 85.145.148.106/22 brd 85.145.151.255 scope global eth0
- inet6 fe80::204:75ff:fee5:5b18/64 scope link
- valid_lft forever preferred_lft forever
- 4: imq0: <NOARP> mtu 16000 qdisc noop qlen 11000
- link/void
- 5: imq1: <NOARP> mtu 16000 qdisc noop qlen 11000
- link/void
- 6: sit0: <NOARP> mtu 1480 qdisc noop
- link/sit 0.0.0.0 brd 0.0.0.0
- + _________________________ ip-route-list
- + ip route list
- 10.81.9.204 dev eth0 scope link src 10.97.10.1
- 10.81.9.203 dev eth0 scope link src 10.97.10.1
- 10.97.10.0/24 dev eth1 proto kernel scope link src 10.97.10.1
- 85.145.148.0/22 dev eth0 proto kernel scope link src 85.145.148.106
- default via 85.145.148.1 dev eth0
- + _________________________ ip-rule-list
- + ip rule list
- 0: from all lookup 255
- 32766: from all lookup main
- 32767: from all lookup default
- + _________________________ ipsec_verify
- + ipsec verify --nocolour
- Checking your system to see if IPsec got installed and started correctly:
- Version check and ipsec on-path [OK]
- Linux Openswan U2.6.28/K2.6.18-194.8.1.v5 (netkey)
- Checking for IPsec support in kernel [OK]
- NETKEY detected, testing for disabled ICMP send_redirects [OK]
- NETKEY detected, testing for disabled ICMP accept_redirects [OK]
- Checking that pluto is running [OK]
- Pluto listening for IKE on udp 500 [OK]
- Pluto listening for NAT-T on udp 4500 [OK]
- Two or more interfaces found, checking IP forwarding [OK]
- Checking NAT and MASQUERADEing
- Checking for 'ip' command [OK]
- Checking for 'iptables' command [OK]
- Opportunistic Encryption Support [DISABLED]
- + _________________________ mii-tool
- + '[' -x /sbin/mii-tool ']'
- + /sbin/mii-tool -v
- eth0: negotiated 100baseTx-FD flow-control, link ok
- product info: vendor 00:10:5a, model 0 rev 0
- basic mode: autonegotiation enabled
- basic status: autonegotiation complete, link ok
- capabilities: 100baseTx-FD 100baseTx-HD 10baseT-FD 10baseT-HD
- advertising: 100baseTx-FD 100baseTx-HD 10baseT-FD 10baseT-HD flow-control
- link partner: 100baseTx-FD 100baseTx-HD 10baseT-FD 10baseT-HD flow-control
- eth1: negotiated 100baseTx-FD, link ok
- product info: vendor 00:00:20, model 32 rev 1
- basic mode: autonegotiation enabled
- basic status: autonegotiation complete, link ok
- capabilities: 100baseTx-FD 100baseTx-HD 10baseT-FD 10baseT-HD
- advertising: 100baseTx-FD 100baseTx-HD 10baseT-FD 10baseT-HD
- link partner: 100baseTx-FD 100baseTx-HD 10baseT-FD 10baseT-HD flow-control
- + _________________________ ipsec/directory
- + ipsec --directory
- /usr/local/lib/ipsec
- + _________________________ hostname/fqdn
- + hostname --fqdn
- gateway.helios.lan
- + _________________________ hostname/ipaddress
- + hostname --ip-address
- 10.97.10.1
- + _________________________ uptime
- + uptime
- 17:09:25 up 1 day, 4:03, 3 users, load average: 0.00, 0.06, 0.05
- + _________________________ ps
- + ps alxwf
- + egrep -i 'ppid|pluto|ipsec|klips'
- F UID PID PPID PRI NI VSZ RSS WCHAN STAT TTY TIME COMMAND
- 0 0 3467 29365 24 0 4572 1220 wait S+ pts/0 0:00 | \_ /bin/sh /usr/local/libexec/ipsec/barf
- 0 0 3551 3467 25 0 432 144 - R+ pts/0 0:00 | \_ egrep -i ppid|pluto|ipsec|klips
- 1 0 19909 1 24 0 2488 416 wait S ? 0:00 /bin/sh /usr/local/lib/ipsec/_plutorun --debug --uniqueids yes --force_busy no --nocrsend no --strictcrlpolicy no --nat_traversal yes --keep_alive --protostack netkey --force_keepalive no --disable_port_floating no --virtual_private %v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12,%4:!10.97.10.0/24 --crlcheckinterval 0 --ocspuri --nhelpers --dump --opts --stderrlog --wait no --pre --post --log daemon.error --plutorestartoncrash true --pid /var/run/pluto/pluto.pid
- 1 0 19910 19909 24 0 2488 640 wait S ? 0:00 \_ /bin/sh /usr/local/lib/ipsec/_plutorun --debug --uniqueids yes --force_busy no --nocrsend no --strictcrlpolicy no --nat_traversal yes --keep_alive --protostack netkey --force_keepalive no --disable_port_floating no --virtual_private %v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12,%4:!10.97.10.0/24 --crlcheckinterval 0 --ocspuri --nhelpers --dump --opts --stderrlog --wait no --pre --post --log daemon.error --plutorestartoncrash true --pid /var/run/pluto/pluto.pid
- 4 0 19911 19910 15 0 3436 1840 - S ? 0:00 | \_ /usr/local/libexec/ipsec/pluto --nofork --secretsfile /etc/ipsec.secrets --ipsecdir /etc/ipsec.d --use-netkey --uniqueids --nat_traversal --virtual_private %v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12,%4:!10.97.10.0/24
- 1 0 19917 19911 32 10 3372 764 - SN ? 0:00 | \_ pluto helper # 0
- 0 0 19930 19911 25 0 1680 284 - S ? 0:00 | \_ _pluto_adns
- 0 0 19912 19909 24 0 2488 1036 pipe_w S ? 0:00 \_ /bin/sh /usr/local/lib/ipsec/_plutoload --wait no --post
- 0 0 19914 1 23 0 1736 528 pipe_w S ? 0:00 logger -s -p daemon.error -t ipsec__plutorun
- + _________________________ ipsec/showdefaults
- + ipsec showdefaults
- routephys=eth0
- routevirt=none
- routeaddr=85.145.148.106
- routenexthop=85.145.148.1
- + _________________________ ipsec/conf
- + ipsec _include /etc/ipsec.conf
- + ipsec _keycensor
- #< /etc/ipsec.conf 1
- # /etc/ipsec.conf - Openswan IPsec configuration file
- # This file: /usr/local/share/doc/openswan/ipsec.conf-sample
- #
- # Manual: ipsec.conf.5
- version 2.0 # conforms to second version of ipsec.conf specification
- # basic configuration
- config setup
- # Do not set debug options to debug configuration issues!
- # plutodebug / klipsdebug = "all", "none" or a combation from below:
- # "raw crypt parsing emitting control klips pfkey natt x509 dpd private"
- # eg:
- # plutodebug="control parsing"
- #
- # enable to get logs per-peer
- # plutoopts="--perpeerlog"
- #
- # Again: only enable plutodebug or klipsdebug when asked by a developer
- #
- # NAT-TRAVERSAL support, see README.NAT-Traversal
- nat_traversal=yes
- # exclude networks used on server side by adding %v4:!a.b.c.0/24
- virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12,%4:!10.97.10.0/24
- # OE is now off by default. Uncomment and change to on, to enable.
- oe=off
- # which IPsec stack to use. auto will try netkey, then klips then mast
- protostack=netkey
- # Add connections here
- # sample VPN connection
- # for more examples, see /etc/ipsec.d/examples/
- #conn sample
- # # Left security gateway, subnet behind it, nexthop toward right.
- # left=10.0.0.1
- # leftsubnet=172.16.0.0/24
- # leftnexthop=10.22.33.44
- # # Right security gateway, subnet behind it, nexthop toward left.
- # right=10.12.12.1
- # rightsubnet=192.168.0.0/24
- # rightnexthop=10.101.102.103
- # # To authorize this connection, but not actually start it,
- # # at startup, uncomment this.
- # #auto=add
- conn LAN
- left=85.145.148.106
- leftsourceip=10.97.10.1
- leftsubnet=10.97.10.0/24
- leftrsasigkey=%cert
- leftcert="Left1024-cert.pem"
- leftid="/C=NL/ST=Utrecht/L=Utrecht/O=Testing Corporation/OU=Research and Development/CN=Left1024/emailAddress=admin@testingcorporation.nl"
- right=%any
- rightsubnet=vhost:%priv,%no
- rightrsasigkey=%cert
- rightid="/C=NL/ST=Utrecht/L=Utrecht/O=Testing Corporation/OU=Research and Development/CN=Right1024/emailAddress=admin@testingcorporation.nl"
- rightca=%same
- auto=add
- + _________________________ ipsec/secrets
- + ipsec _include /etc/ipsec.secrets
- + ipsec _secretcensor
- #< /etc/ipsec.secrets 1
- : RSA /etc/ipsec.d/private/Left1024-key.pem "[sums to 2867...]"
- + _________________________ ipsec/listall
- + ipsec auto --listall
- 000
- 000 List of Public Keys:
- 000
- 000 Aug 26 17:03:46 2010, 1024 RSA Key AwEAAcuUr (no private key), until Aug 21 23:40:19 2011 ok
- 000 ID_USER_FQDN 'admin@testingcorporation.nl'
- 000 Issuer 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Testing1024, E=admin@testingcorporation.nl'
- 000 Aug 26 17:03:46 2010, 1024 RSA Key AwEAAcuUr (no private key), until Aug 21 23:40:19 2011 ok
- 000 ID_DER_ASN1_DN 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl'
- 000 Issuer 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Testing1024, E=admin@testingcorporation.nl'
- 000 Aug 25 13:46:45 2010, 1024 RSA Key AwEAAac0u (has private key), until Aug 21 23:39:52 2011 ok
- 000 ID_DER_ASN1_DN 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Left1024, E=admin@testingcorporation.nl'
- 000 Issuer 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Testing1024, E=admin@testingcorporation.nl'
- 000 List of Pre-shared secrets (from /etc/ipsec.secrets)
- 000 1: RSA (none) (none)
- 000
- 000 List of X.509 End Certificates:
- 000
- 000 Aug 25 13:46:45 2010, count: 3
- 000 subject: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Left1024, E=admin@testingcorporation.nl'
- 000 issuer: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Testing1024, E=admin@testingcorporation.nl'
- 000 serial: 01
- 000 pubkey: 1024 RSA Key AwEAAac0u, has private key
- 000 validity: not before Aug 21 23:39:52 2010 ok
- 000 not after Aug 21 23:39:52 2011 ok
- 000 subjkey: b6:31:11:23:ce:2e:44:da:37:b6:ad:28:db:29:76:5f:f9:99:3e:d3
- 000 authkey: 9a:fb:f6:09:95:a1:9f:9a:63:b6:be:c5:76:bc:65:8b:92:94:cb:9d
- 000 aserial: 00:b2:89:a7:f2:67:f8:fd:55
- 000
- 000 List of X.509 CA Certificates:
- 000
- 000 Aug 25 13:46:44 2010, count: 1
- 000 subject: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Testing1024, E=admin@testingcorporation.nl'
- 000 issuer: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Testing1024, E=admin@testingcorporation.nl'
- 000 serial: 00:b2:89:a7:f2:67:f8:fd:55
- 000 pubkey: 1024 RSA Key AwEAAeKdH
- 000 validity: not before Aug 21 23:39:28 2010 ok
- 000 not after Aug 18 23:39:28 2020 ok
- 000 subjkey: 9a:fb:f6:09:95:a1:9f:9a:63:b6:be:c5:76:bc:65:8b:92:94:cb:9d
- 000 authkey: 9a:fb:f6:09:95:a1:9f:9a:63:b6:be:c5:76:bc:65:8b:92:94:cb:9d
- 000 aserial: 00:b2:89:a7:f2:67:f8:fd:55
- 000
- 000 List of X.509 CRLs:
- 000
- 000 Aug 25 13:46:44 2010, revoked certs: 0
- 000 issuer: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Testing1024, E=admin@testingcorporation.nl'
- 000 updates: this Aug 21 23:42:15 2010
- 000 next Sep 20 23:42:15 2010 ok
- + '[' /etc/ipsec.d/policies ']'
- + for policy in '$POLICIES/*'
- ++ basename /etc/ipsec.d/policies/block
- + base=block
- + _________________________ ipsec/policies/block
- + cat /etc/ipsec.d/policies/block
- # This file defines the set of CIDRs (network/mask-length) to which
- # communication should never be allowed.
- #
- # See /usr/share/doc/openswan/policygroups.html for details.
- #
- # $Id: block.in,v 1.4 2003/02/17 02:22:15 mcr Exp $
- #
- + for policy in '$POLICIES/*'
- ++ basename /etc/ipsec.d/policies/clear
- + base=clear
- + _________________________ ipsec/policies/clear
- + cat /etc/ipsec.d/policies/clear
- # This file defines the set of CIDRs (network/mask-length) to which
- # communication should always be in the clear.
- #
- # See /usr/share/doc/openswan/policygroups.html for details.
- #
- # root name servers should be in the clear
- 192.58.128.30/32
- 198.41.0.4/32
- 192.228.79.201/32
- 192.33.4.12/32
- 128.8.10.90/32
- 192.203.230.10/32
- 192.5.5.241/32
- 192.112.36.4/32
- 128.63.2.53/32
- 192.36.148.17/32
- 193.0.14.129/32
- 199.7.83.42/32
- 202.12.27.33/32
- + for policy in '$POLICIES/*'
- ++ basename /etc/ipsec.d/policies/clear-or-private
- + base=clear-or-private
- + _________________________ ipsec/policies/clear-or-private
- + cat /etc/ipsec.d/policies/clear-or-private
- # This file defines the set of CIDRs (network/mask-length) to which
- # we will communicate in the clear, or, if the other side initiates IPSEC,
- # using encryption. This behaviour is also called "Opportunistic Responder".
- #
- # See /usr/share/doc/openswan/policygroups.html for details.
- #
- # $Id: clear-or-private.in,v 1.4 2003/02/17 02:22:15 mcr Exp $
- #
- + for policy in '$POLICIES/*'
- ++ basename /etc/ipsec.d/policies/private
- + base=private
- + _________________________ ipsec/policies/private
- + cat /etc/ipsec.d/policies/private
- # This file defines the set of CIDRs (network/mask-length) to which
- # communication should always be private (i.e. encrypted).
- # See /usr/share/doc/openswan/policygroups.html for details.
- #
- # $Id: private.in,v 1.4 2003/02/17 02:22:15 mcr Exp $
- #
- + for policy in '$POLICIES/*'
- ++ basename /etc/ipsec.d/policies/private-or-clear
- + base=private-or-clear
- + _________________________ ipsec/policies/private-or-clear
- + cat /etc/ipsec.d/policies/private-or-clear
- # This file defines the set of CIDRs (network/mask-length) to which
- # communication should be private, if possible, but in the clear otherwise.
- #
- # If the target has a TXT (later IPSECKEY) record that specifies
- # authentication material, we will require private (i.e. encrypted)
- # communications. If no such record is found, communications will be
- # in the clear.
- #
- # See /usr/share/doc/openswan/policygroups.html for details.
- #
- # $Id: private-or-clear.in,v 1.5 2003/02/17 02:22:15 mcr Exp $
- #
- 0.0.0.0/0
- + _________________________ ipsec/ls-libdir
- + ls -l /usr/local/lib/ipsec
- total 128
- -rwxr-xr-x 1 root root 12196 Aug 25 13:38 _copyright
- -rwxr-xr-x 1 root root 2379 Aug 25 13:38 _include
- -rwxr-xr-x 1 root root 1475 Aug 25 13:38 _keycensor
- -rwxr-xr-x 1 root root 2632 Aug 25 13:38 _plutoload
- -rwxr-xr-x 1 root root 8221 Aug 25 13:38 _plutorun
- -rwxr-xr-x 1 root root 12951 Aug 25 13:38 _realsetup
- -rwxr-xr-x 1 root root 1975 Aug 25 13:38 _secretcensor
- -rwxr-xr-x 1 root root 9314 Aug 25 13:38 _startklips
- -rwxr-xr-x 1 root root 6042 Aug 25 13:38 _startnetkey
- -rwxr-xr-x 1 root root 4886 Aug 25 13:38 _updown
- -rwxr-xr-x 1 root root 16182 Aug 25 13:38 _updown.klips
- -rwxr-xr-x 1 root root 15372 Aug 25 13:38 _updown.mast
- -rwxr-xr-x 1 root root 11551 Aug 25 13:38 _updown.netkey
- + _________________________ ipsec/ls-execdir
- + ls -l /usr/local/libexec/ipsec
- total 4960
- -rwxr-xr-x 1 root root 21910 Aug 25 13:38 _pluto_adns
- -rwxr-xr-x 1 root root 387796 Aug 25 13:38 addconn
- -rwxr-xr-x 1 root root 6015 Aug 25 13:38 auto
- -rwxr-xr-x 1 root root 10828 Aug 25 13:38 barf
- -rwxr-xr-x 1 root root 175646 Aug 25 13:38 eroute
- -rwxr-xr-x 1 root root 48916 Aug 25 13:38 ikeping
- -rwxr-xr-x 1 root root 115332 Aug 25 13:38 klipsdebug
- -rwxr-xr-x 1 root root 2591 Aug 25 13:38 look
- -rwxr-xr-x 1 root root 2182 Aug 25 13:38 newhostkey
- -rwxr-xr-x 1 root root 105844 Aug 25 13:38 pf_key
- -rwxr-xr-x 1 root root 2816403 Aug 25 13:38 pluto
- -rwxr-xr-x 1 root root 16799 Aug 25 13:38 ranbits
- -rwxr-xr-x 1 root root 37046 Aug 25 13:38 rsasigkey
- -rwxr-xr-x 1 root root 766 Aug 25 13:38 secrets
- lrwxrwxrwx 1 root root 22 Aug 25 13:38 setup -> /etc/rc.d/init.d/ipsec
- -rwxr-xr-x 1 root root 1054 Aug 25 13:38 showdefaults
- -rwxr-xr-x 1 root root 483277 Aug 25 13:38 showhostkey
- -rwxr-xr-x 1 root root 63622 Aug 25 13:38 showpolicy
- -rwxr-xr-x 1 root root 291460 Aug 25 13:38 spi
- -rwxr-xr-x 1 root root 151281 Aug 25 13:38 spigrp
- -rwxr-xr-x 1 root root 126834 Aug 25 13:38 tncfg
- -rwxr-xr-x 1 root root 13452 Aug 25 13:38 verify
- -rwxr-xr-x 1 root root 112726 Aug 25 13:38 whack
- + _________________________ /proc/net/dev
- + cat /proc/net/dev
- Inter-| Receive | Transmit
- face |bytes packets errs drop fifo frame compressed multicast|bytes packets errs drop fifo colls carrier compressed
- lo: 2629695 5606 0 0 0 0 0 0 2629695 5606 0 0 0 0 0 0
- eth1:80839662 478536 0 0 0 0 0 0 335372024 445296 0 0 0 0 0 0
- eth0:410535953 481068 0 0 0 0 0 0 78958856 466752 0 0 0 0 0 0
- imq0: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
- imq1: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
- sit0: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
- + _________________________ /proc/net/route
- + cat /proc/net/route
- Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT
- eth0 CC09510A 00000000 0005 0 0 0 FFFFFFFF 0 0 0
- eth0 CB09510A 00000000 0005 0 0 0 FFFFFFFF 0 0 0
- eth1 000A610A 00000000 0001 0 0 0 00FFFFFF 0 0 0
- eth0 00949155 00000000 0001 0 0 0 00FCFFFF 0 0 0
- eth0 00000000 01949155 0003 0 0 0 00000000 0 0 0
- + _________________________ /proc/sys/net/ipv4/ip_no_pmtu_disc
- + cat /proc/sys/net/ipv4/ip_no_pmtu_disc
- 0
- + _________________________ /proc/sys/net/ipv4/ip_forward
- + cat /proc/sys/net/ipv4/ip_forward
- 1
- + _________________________ /proc/sys/net/ipv4/tcp_ecn
- + cat /proc/sys/net/ipv4/tcp_ecn
- 0
- + _________________________ /proc/sys/net/ipv4/conf/star-rp_filter
- + cd /proc/sys/net/ipv4/conf
- + egrep '^' all/rp_filter default/rp_filter eth0/rp_filter eth1/rp_filter lo/rp_filter
- all/rp_filter:0
- default/rp_filter:1
- eth0/rp_filter:1
- eth1/rp_filter:1
- lo/rp_filter:0
- + _________________________ /proc/sys/net/ipv4/conf/star-star-redirects
- + cd /proc/sys/net/ipv4/conf
- + egrep '^' all/accept_redirects all/secure_redirects all/send_redirects default/accept_redirects default/secure_redirects default/send_redirects eth0/accept_redirects eth0/secure_redirects eth0/send_redirects eth1/accept_redirects eth1/secure_redirects eth1/send_redirects lo/accept_redirects lo/secure_redirects lo/send_redirects
- all/accept_redirects:0
- all/secure_redirects:0
- all/send_redirects:0
- default/accept_redirects:0
- default/secure_redirects:0
- default/send_redirects:0
- eth0/accept_redirects:0
- eth0/secure_redirects:0
- eth0/send_redirects:0
- eth1/accept_redirects:0
- eth1/secure_redirects:0
- eth1/send_redirects:0
- lo/accept_redirects:0
- lo/secure_redirects:0
- lo/send_redirects:0
- + _________________________ /proc/sys/net/ipv4/tcp_window_scaling
- + cat /proc/sys/net/ipv4/tcp_window_scaling
- 1
- + _________________________ /proc/sys/net/ipv4/tcp_adv_win_scale
- + cat /proc/sys/net/ipv4/tcp_adv_win_scale
- 2
- + _________________________ uname-a
- + uname -a
- Linux gateway.helios.lan 2.6.18-194.8.1.v5 #1 SMP Thu Jul 15 01:14:04 EDT 2010 i686 i686 i386 GNU/Linux
- + _________________________ config-built-with
- + test -r /proc/config_built_with
- + _________________________ distro-release
- + for distro in /etc/redhat-release /etc/debian-release /etc/SuSE-release /etc/mandrake-release /etc/mandriva-release /etc/gentoo-release
- + test -f /etc/redhat-release
- + cat /etc/redhat-release
- CentOS release 5.4 (Final)
- + for distro in /etc/redhat-release /etc/debian-release /etc/SuSE-release /etc/mandrake-release /etc/mandriva-release /etc/gentoo-release
- + test -f /etc/debian-release
- + for distro in /etc/redhat-release /etc/debian-release /etc/SuSE-release /etc/mandrake-release /etc/mandriva-release /etc/gentoo-release
- + test -f /etc/SuSE-release
- + for distro in /etc/redhat-release /etc/debian-release /etc/SuSE-release /etc/mandrake-release /etc/mandriva-release /etc/gentoo-release
- + test -f /etc/mandrake-release
- + for distro in /etc/redhat-release /etc/debian-release /etc/SuSE-release /etc/mandrake-release /etc/mandriva-release /etc/gentoo-release
- + test -f /etc/mandriva-release
- + for distro in /etc/redhat-release /etc/debian-release /etc/SuSE-release /etc/mandrake-release /etc/mandriva-release /etc/gentoo-release
- + test -f /etc/gentoo-release
- + _________________________ /proc/net/ipsec_version
- + test -r /proc/net/ipsec_version
- + test -r /proc/net/pfkey
- ++ uname -r
- + echo 'NETKEY (2.6.18-194.8.1.v5) support detected '
- NETKEY (2.6.18-194.8.1.v5) support detected
- + _________________________ iptables
- + test -r /sbin/iptables
- + iptables -L -v -n
- Chain INPUT (policy DROP 226 packets, 13483 bytes)
- pkts bytes target prot opt in out source destination
- 1 52 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID
- 0 0 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x12/0x12 state NEW reject-with tcp-reset
- 10 2428 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:!0x17/0x02 state NEW
- 0 0 DROP all -- eth0 * 127.0.0.0/8 0.0.0.0/0
- 0 0 DROP all -- eth0 * 169.254.0.0/16 0.0.0.0/0
- 76 6144 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
- 0 0 ACCEPT all -- pptp+ * 0.0.0.0/0 0.0.0.0/0
- 0 0 ACCEPT all -- tun+ * 0.0.0.0/0 0.0.0.0/0
- 5985 504K ACCEPT all -- eth1 * 0.0.0.0/0 0.0.0.0/0
- 157 4553 ACCEPT icmp -- eth0 * 0.0.0.0/0 0.0.0.0/0 icmp type 0
- 6 576 ACCEPT icmp -- eth0 * 0.0.0.0/0 0.0.0.0/0 icmp type 3
- 0 0 ACCEPT icmp -- eth0 * 0.0.0.0/0 0.0.0.0/0 icmp type 8
- 0 0 ACCEPT icmp -- eth0 * 0.0.0.0/0 0.0.0.0/0 icmp type 11
- 1 328 ACCEPT udp -- eth0 * 0.0.0.0/0 0.0.0.0/0 udp spt:67 dpt:68
- 0 0 ACCEPT tcp -- eth0 * 0.0.0.0/0 0.0.0.0/0 tcp spt:67 dpt:68
- 821 49232 ACCEPT udp -- * * 0.0.0.0/0 85.145.148.106 udp dpt:4500
- 0 0 ACCEPT udp -- * * 0.0.0.0/0 85.145.148.106 udp dpt:5000
- 18 7452 ACCEPT udp -- * * 0.0.0.0/0 85.145.148.106 udp dpt:500
- 0 0 ACCEPT tcp -- * * 0.0.0.0/0 85.145.148.106 tcp dpt:443
- 0 0 ACCEPT udp -- * * 0.0.0.0/0 85.145.148.106 udp dpt:443
- 0 0 ACCEPT udp -- * * 0.0.0.0/0 85.145.148.106 udp spt:500 dpt:500
- 0 0 ACCEPT esp -- * * 0.0.0.0/0 85.145.148.106
- 0 0 ACCEPT ah -- * * 0.0.0.0/0 85.145.148.106
- 0 0 ACCEPT all -- * * 0.0.0.0/0 85.145.148.106 MARK match 0x64
- 0 0 ACCEPT all -- * * 0.0.0.0/0 10.97.10.1 MARK match 0x64
- 226 29147 ACCEPT udp -- eth0 * 0.0.0.0/0 0.0.0.0/0 udp dpts:1024:65535 state RELATED,ESTABLISHED
- 52 30154 ACCEPT tcp -- eth0 * 0.0.0.0/0 0.0.0.0/0 tcp dpts:1024:65535 state RELATED,ESTABLISHED
- Chain FORWARD (policy DROP 0 packets, 0 bytes)
- pkts bytes target prot opt in out source destination
- 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 MARK match 0x64
- 16132 1370K ACCEPT tcp -- * eth1 0.0.0.0/0 10.97.10.102 tcp dpt:22
- 8 613 ACCEPT tcp -- * eth1 0.0.0.0/0 10.97.10.102 tcp dpt:443
- 0 0 ACCEPT udp -- * eth1 0.0.0.0/0 10.97.10.102 udp dpt:443
- 39637 10M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
- 1825 104K ACCEPT all -- eth1 * 0.0.0.0/0 0.0.0.0/0
- 0 0 ACCEPT all -- pptp+ * 0.0.0.0/0 0.0.0.0/0
- 0 0 ACCEPT all -- tun+ * 0.0.0.0/0 0.0.0.0/0
- Chain OUTPUT (policy DROP 0 packets, 0 bytes)
- pkts bytes target prot opt in out source destination
- 87 8624 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0
- 0 0 ACCEPT all -- * pptp+ 0.0.0.0/0 0.0.0.0/0
- 0 0 ACCEPT all -- * tun+ 0.0.0.0/0 0.0.0.0/0
- 4133 597K ACCEPT all -- * eth1 0.0.0.0/0 0.0.0.0/0
- 162 5367 ACCEPT icmp -- * eth0 0.0.0.0/0 0.0.0.0/0
- 1 328 ACCEPT udp -- * eth0 0.0.0.0/0 0.0.0.0/0 udp spt:68 dpt:67
- 0 0 ACCEPT tcp -- * eth0 0.0.0.0/0 0.0.0.0/0 tcp spt:68 dpt:67
- 32 18640 ACCEPT udp -- * eth0 85.145.148.106 0.0.0.0/0 udp spt:4500
- 0 0 ACCEPT udp -- * eth0 85.145.148.106 0.0.0.0/0 udp spt:5000
- 200 121K ACCEPT udp -- * eth0 85.145.148.106 0.0.0.0/0 udp spt:500
- 0 0 ACCEPT tcp -- * eth0 85.145.148.106 0.0.0.0/0 tcp spt:443
- 0 0 ACCEPT udp -- * eth0 85.145.148.106 0.0.0.0/0 udp spt:443
- 0 0 ACCEPT udp -- * eth0 85.145.148.106 0.0.0.0/0 udp spt:500 dpt:500
- 0 0 ACCEPT esp -- * eth0 85.145.148.106 0.0.0.0/0
- 0 0 ACCEPT ah -- * eth0 85.145.148.106 0.0.0.0/0
- 306 23160 ACCEPT all -- * eth0 0.0.0.0/0 0.0.0.0/0
- Chain drop-lan (0 references)
- pkts bytes target prot opt in out source destination
- 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
- + _________________________ iptables-nat
- + iptables -t nat -L -v -n
- Chain PREROUTING (policy ACCEPT 40907 packets, 3965K bytes)
- pkts bytes target prot opt in out source destination
- 22 1320 DNAT tcp -- * * 0.0.0.0/0 85.145.148.106 tcp dpt:22 to:10.97.10.102:22
- 2 120 DNAT tcp -- * * 0.0.0.0/0 85.145.148.106 tcp dpt:443 to:10.97.10.102:443
- 0 0 DNAT udp -- * * 0.0.0.0/0 85.145.148.106 udp dpt:443 to:10.97.10.102:443
- Chain POSTROUTING (policy ACCEPT 4502 packets, 238K bytes)
- pkts bytes target prot opt in out source destination
- 0 0 ACCEPT esp -- * eth0 0.0.0.0/0 0.0.0.0/0
- 0 0 ACCEPT ah -- * eth0 0.0.0.0/0 0.0.0.0/0
- 0 0 ACCEPT all -- * tun+ 0.0.0.0/0 0.0.0.0/0
- 0 0 SNAT tcp -- * * 10.97.10.0/24 10.97.10.102 tcp dpt:22 to:10.97.10.1
- 0 0 SNAT tcp -- * * 10.97.10.0/24 10.97.10.102 tcp dpt:443 to:10.97.10.1
- 0 0 SNAT udp -- * * 10.97.10.0/24 10.97.10.102 udp dpt:443 to:10.97.10.1
- 1034 85183 MASQUERADE all -- * eth0 0.0.0.0/0 0.0.0.0/0
- Chain OUTPUT (policy ACCEPT 8808 packets, 1259K bytes)
- pkts bytes target prot opt in out source destination
- + _________________________ iptables-mangle
- + iptables -t mangle -L -v -n
- Chain PREROUTING (policy ACCEPT 954K packets, 478M bytes)
- pkts bytes target prot opt in out source destination
- 0 0 MARK esp -- * * 0.0.0.0/0 0.0.0.0/0 MARK set 0x64
- Chain INPUT (policy ACCEPT 117K packets, 88M bytes)
- pkts bytes target prot opt in out source destination
- Chain FORWARD (policy ACCEPT 836K packets, 390M bytes)
- pkts bytes target prot opt in out source destination
- Chain OUTPUT (policy ACCEPT 69968 packets, 12M bytes)
- pkts bytes target prot opt in out source destination
- Chain POSTROUTING (policy ACCEPT 906K packets, 402M bytes)
- pkts bytes target prot opt in out source destination
- + _________________________ /proc/modules
- + test -f /proc/modules
- + cat /proc/modules
- xt_mark 5888 3 - Live 0xe0d2c000 (U)
- xt_MARK 6400 1 - Live 0xe0d26000 (U)
- krng 6016 1 - Live 0xe0d23000 (U)
- ansi_cprng 9604 0 - Live 0xe0d1f000 (U)
- chainiv 9088 6 - Live 0xe0d1b000 (U)
- rng 7688 3 krng,ansi_cprng,chainiv, Live 0xe0d18000 (U)
- authenc 10368 6 - Live 0xe0d14000 (U)
- hmac 8704 6 - Live 0xe0cff000 (U)
- cryptomgr 7552 0 - Live 0xe0c00000 (U)
- ah6 10368 0 - Live 0xe0c6c000 (U)
- ah4 10240 0 - Live 0xe0c63000 (U)
- esp6 12160 0 - Live 0xe0c5f000 (U)
- esp4 12288 6 - Live 0xe0c5b000 (U)
- xfrm4_tunnel 6528 0 - Live 0xe0c53000 (U)
- xfrm4_mode_tunnel 6784 6 - Live 0xe0c4c000 (U)
- xfrm4_mode_transport 6016 0 - Live 0xe0c46000 (U)
- xfrm6_mode_transport 6144 0 - Live 0xe0c43000 (U)
- xfrm6_mode_tunnel 6656 0 - Live 0xe0c40000 (U)
- ipcomp 11400 0 - Live 0xe0c3c000 (U)
- ipcomp6 11912 0 - Live 0xe0c24000 (U)
- xfrm6_tunnel 11040 1 ipcomp6, Live 0xe0c28000 (U)
- af_key 40720 0 - Live 0xe0c31000 (U)
- deflate 7808 0 - Live 0xe0cde000 (U)
- zlib_deflate 21912 1 deflate, Live 0xe0d0d000 (U)
- ccm 13440 0 - Live 0xe0ce8000 (U)
- serpent 29184 0 - Live 0xe0d04000 (U)
- blowfish 12544 0 - Live 0xe0ce3000 (U)
- twofish 45952 0 - Live 0xe0cee000 (U)
- ecb 7552 0 - Live 0xe0cdb000 (U)
- xcbc 9856 0 - Live 0xe0cd7000 (U)
- crypto_hash 6272 2 hmac,xcbc, Live 0xe0cd4000 (U)
- cbc 8192 6 - Live 0xe0cd1000 (U)
- md5 8064 0 - Live 0xe0cce000 (U)
- sha256 15232 0 - Live 0xe0c09000 (U)
- sha512 13056 0 - Live 0xe0c67000 (U)
- des 20352 0 - Live 0xe0cc8000 (U)
- aes_generic 31680 0 - Live 0xe0cbf000 (U)
- aes_i586 36992 6 - Live 0xe0cb4000 (U)
- xfrm6_esp 9472 1 esp6, Live 0xe0c57000 (U)
- xfrm4_esp 9728 1 esp4, Live 0xe0c4f000 (U)
- tunnel4 7300 1 xfrm4_tunnel, Live 0xe0c49000 (U)
- tunnel6 7300 1 xfrm6_tunnel, Live 0xe0c21000 (U)
- ipv6 270368 35 ah6,esp6,xfrm6_mode_transport,ipcomp6,xfrm6_tunnel,xfrm6_esp,tunnel6, Live 0xe0c70000 (U)
- xfrm_nalgo 13316 7 ah6,ah4,esp6,esp4,xfrm6_esp,xfrm4_esp,ipv6, Live 0xe0c1c000 (U)
- xt_tcpudp 7040 29 - Live 0xe0c03000 (U)
- xt_state 6144 6 - Live 0xe0c06000 (U)
- ip_nat_h323 11008 0 - Live 0xe0be6000 (U)
- ip_conntrack_h323 51356 1 ip_nat_h323, Live 0xe0c0e000 (U)
- ip_nat_pptp 9732 0 - Live 0xe0bfc000 (U)
- ip_nat_irc 6656 0 - Live 0xe0bea000 (U)
- ip_nat_ftp 7296 0 - Live 0xe0bbd000 (U)
- ipt_MASQUERADE 8192 1 - Live 0xe0b84000 (U)
- ipt_IMQ 6016 0 - Live 0xe0bba000 (U)
- imq 8964 0 - Live 0xe0be2000 (U)
- ip_conntrack_pptp 15376 1 ip_nat_pptp, Live 0xe0bdd000 (U)
- testmgr_cipher 6784 0 - Live 0xe0b2c000 (U)
- testmgr 52272 1 testmgr_cipher, Live 0xe0bee000 (U)
- aead 11776 5 authenc,esp6,esp4,ccm,testmgr, Live 0xe0b79000 (U)
- crypto_blkcipher 17536 6 chainiv,authenc,ccm,ecb,cbc,testmgr, Live 0xe0bce000 (U)
- crypto_algapi 22784 13 krng,ansi_cprng,chainiv,authenc,hmac,cryptomgr,ccm,ecb,xcbc,cbc,testmgr,aead,crypto_blkcipher, Live 0xe0bd6000 (U)
- crypto_api 12544 12 rng,authenc,ah6,ah4,esp6,esp4,ccm,xfrm_nalgo,testmgr,aead,crypto_blkcipher,crypto_algapi, Live 0xe0bc9000 (U)
- arc4 6016 0 - Live 0xe0b76000 (U)
- ppp_mppe 10372 0 - Live 0xe0bb6000 (U)
- ppp_generic 29972 1 ppp_mppe, Live 0xe0bc0000 (U)
- slhc 10240 1 ppp_generic, Live 0xe0bb2000 (U)
- ip_conntrack_irc 10480 1 ip_nat_irc, Live 0xe0bae000 (U)
- ip_conntrack_ftp 11504 1 ip_nat_ftp, Live 0xe0baa000 (U)
- ipt_REJECT 9600 1 - Live 0xe0ba6000 (U)
- ipt_LOG 9856 0 - Live 0xe0ba2000 (U)
- iptable_nat 11140 1 - Live 0xe0b9e000 (U)
- ip_nat 21548 6 ip_nat_h323,ip_nat_pptp,ip_nat_irc,ip_nat_ftp,ipt_MASQUERADE,iptable_nat, Live 0xe0b7d000 (U)
- ip_conntrack 53216 12 xt_state,ip_nat_h323,ip_conntrack_h323,ip_nat_pptp,ip_nat_irc,ip_nat_ftp,ipt_MASQUERADE,ip_conntrack_pptp,ip_conntrack_irc,ip_conntrack_ftp,iptable_nat,ip_nat, Live 0xe0b87000 (U)
- nfnetlink 10648 2 ip_nat,ip_conntrack, Live 0xe0b02000 (U)
- iptable_mangle 6784 1 - Live 0xe0b06000 (U)
- iptable_filter 7040 1 - Live 0xe0a59000 (U)
- ip_tables 16964 3 iptable_nat,iptable_mangle,iptable_filter, Live 0xe0b26000 (U)
- x_tables 17284 10 xt_mark,xt_MARK,xt_tcpudp,xt_state,ipt_MASQUERADE,ipt_IMQ,ipt_REJECT,ipt_LOG,iptable_nat,ip_tables, Live 0xe0b20000 (U)
- ib_iser 37208 0 - Live 0xe0b6b000 (U)
- rdma_cm 35384 1 ib_iser, Live 0xe0b61000 (U)
- ib_cm 39148 1 rdma_cm, Live 0xe0b56000 (U)
- iw_cm 13060 1 rdma_cm, Live 0xe0b1b000 (U)
- ib_sa 39028 2 rdma_cm,ib_cm, Live 0xe0b4b000 (U)
- ib_mad 37780 2 ib_cm,ib_sa, Live 0xe0b40000 (U)
- ib_core 63620 6 ib_iser,rdma_cm,ib_cm,iw_cm,ib_sa,ib_mad, Live 0xe0b2f000 (U)
- ib_addr 11780 1 rdma_cm, Live 0xe0b17000 (U)
- iscsi_tcp 19848 0 - Live 0xe0b11000 (U)
- libiscsi_tcp 21892 1 iscsi_tcp, Live 0xe0b0a000 (U)
- libiscsi2 42628 3 ib_iser,iscsi_tcp,libiscsi_tcp, Live 0xe0aea000 (U)
- scsi_transport_iscsi2 37644 4 ib_iser,iscsi_tcp,libiscsi2, Live 0xe0af7000 (U)
- scsi_transport_iscsi 6020 1 scsi_transport_iscsi2, Live 0xe0a5c000 (U)
- dm_mirror 24328 0 - Live 0xe0a61000 (U)
- dm_multipath 25356 0 - Live 0xe0a46000 (U)
- scsi_dh 12032 1 dm_multipath, Live 0xe0a55000 (U)
- video 21128 0 - Live 0xe0a4e000 (U)
- backlight 9984 1 video, Live 0xe0a04000 (U)
- sbs 18468 0 - Live 0xe0a3a000 (U)
- power_meter 16396 0 - Live 0xe0a40000 (U)
- hwmon 7300 1 power_meter, Live 0xe0a17000 (U)
- i2c_ec 8960 1 sbs, Live 0xe0a36000 (U)
- dell_wmi 8336 0 - Live 0xe0a08000 (U)
- wmi 12072 1 dell_wmi, Live 0xe0a32000 (U)
- button 10512 0 - Live 0xe09fc000 (U)
- battery 13572 0 - Live 0xe0a12000 (U)
- asus_acpi 19224 0 - Live 0xe0a0c000 (U)
- ac 9092 0 - Live 0xe0a00000 (U)
- lp 15784 0 - Live 0xe0990000 (U)
- snd_intel8x0 35356 0 - Live 0xe09b9000 (U)
- snd_ac97_codec 92832 1 snd_intel8x0, Live 0xe0a1a000 (U)
- ac97_bus 6272 1 snd_ac97_codec, Live 0xe09b6000 (U)
- snd_seq_dummy 7812 0 - Live 0xe09b3000 (U)
- snd_seq_oss 32512 0 - Live 0xe099c000 (U)
- snd_seq_midi_event 10880 1 snd_seq_oss, Live 0xe097c000 (U)
- snd_seq 49520 5 snd_seq_dummy,snd_seq_oss,snd_seq_midi_event, Live 0xe09ee000 (U)
- snd_pcm_oss 42752 0 - Live 0xe09e2000 (U)
- 3c59x 44584 0 - Live 0xe09d6000 (U)
- snd_mixer_oss 18944 1 snd_pcm_oss, Live 0xe09ad000 (U)
- snd_pcm 72068 3 snd_intel8x0,snd_ac97_codec,snd_pcm_oss, Live 0xe09c3000 (U)
- pcspkr 7040 0 - Live 0xe08bd000 (U)
- sis900 25984 0 - Live 0xe09a5000 (U)
- mii 9216 2 3c59x,sis900, Live 0xe098c000 (U)
- snd_timer 24452 2 snd_seq,snd_pcm, Live 0xe0995000 (U)
- i2c_sis96x 9348 0 - Live 0xe0980000 (U)
- i2c_core 23936 2 i2c_ec,i2c_sis96x, Live 0xe0985000 (U)
- snd_page_alloc 14216 2 snd_intel8x0,snd_pcm, Live 0xe090d000 (U)
- snd_mpu401 12200 0 - Live 0xe0978000 (U)
- snd_mpu401_uart 12032 1 snd_mpu401, Live 0xe0974000 (U)
- snd_rawmidi 26368 1 snd_mpu401_uart, Live 0xe095d000 (U)
- snd_seq_device 11660 4 snd_seq_dummy,snd_seq_oss,snd_seq,snd_rawmidi, Live 0xe0959000 (U)
- ns558 8960 0 - Live 0xe0912000 (U)
- gameport 18568 2 ns558, Live 0xe0953000 (U)
- snd 55684 12 snd_intel8x0,snd_ac97_codec,snd_seq_oss,snd_seq,snd_pcm_oss,snd_mixer_oss,snd_pcm,snd_timer,snd_mpu401,snd_mpu401_uart,snd_rawmidi,snd_seq_device, Live 0xe0965000 (U)
- soundcore 11488 1 snd, Live 0xe08ca000 (U)
- parport_pc 29092 1 - Live 0xe0918000 (U)
- parport 37448 2 lp,parport_pc, Live 0xe0948000 (U)
- ide_cd 40096 0 - Live 0xe093d000 (U)
- cdrom 36512 1 ide_cd, Live 0xe0933000 (U)
- serio_raw 10628 0 - Live 0xe084e000 (U)
- dm_raid45 67080 0 - Live 0xe0921000 (U)
- dm_message 6912 1 dm_raid45, Live 0xe08ba000 (U)
- dm_region_hash 15616 1 dm_raid45, Live 0xe08c5000 (U)
- dm_log 14592 3 dm_mirror,dm_raid45,dm_region_hash, Live 0xe08c0000 (U)
- dm_mod 63160 4 dm_mirror,dm_multipath,dm_raid45,dm_log, Live 0xe08ce000 (U)
- dm_mem_cache 9472 1 dm_raid45, Live 0xe0852000 (U)
- pata_sis 15620 0 - Live 0xe08b5000 (U)
- libata 157252 1 pata_sis, Live 0xe08e5000 (U)
- sd_mod 25216 0 - Live 0xe0857000 (U)
- scsi_mod 141908 7 ib_iser,iscsi_tcp,libiscsi2,scsi_transport_iscsi2,scsi_dh,libata,sd_mod, Live 0xe0870000 (U)
- ext3 125448 2 - Live 0xe0895000 (U)
- jbd 57256 1 ext3, Live 0xe0861000 (U)
- uhci_hcd 25356 0 - Live 0xe0834000 (U)
- ohci_hcd 24872 0 - Live 0xe0846000 (U)
- ehci_hcd 33804 0 - Live 0xe083c000 (U)
- + _________________________ /proc/meminfo
- + cat /proc/meminfo
- MemTotal: 515380 kB
- MemFree: 33520 kB
- Buffers: 92708 kB
- Cached: 203164 kB
- SwapCached: 0 kB
- Active: 258976 kB
- Inactive: 137132 kB
- HighTotal: 0 kB
- HighFree: 0 kB
- LowTotal: 515380 kB
- LowFree: 33520 kB
- SwapTotal: 1052248 kB
- SwapFree: 1052120 kB
- Dirty: 76 kB
- Writeback: 0 kB
- AnonPages: 100216 kB
- Mapped: 43868 kB
- Slab: 77600 kB
- PageTables: 2216 kB
- NFS_Unstable: 0 kB
- Bounce: 0 kB
- CommitLimit: 1309936 kB
- Committed_AS: 400992 kB
- VmallocTotal: 507896 kB
- VmallocUsed: 5196 kB
- VmallocChunk: 502588 kB
- HugePages_Total: 0
- HugePages_Free: 0
- HugePages_Rsvd: 0
- Hugepagesize: 4096 kB
- + _________________________ /proc/net/ipsec-ls
- + test -f /proc/net/ipsec_version
- + _________________________ usr/src/linux/.config
- + test -f /proc/config.gz
- ++ uname -r
- + test -f /lib/modules/2.6.18-194.8.1.v5/build/.config
- ++ uname -r
- + cat /lib/modules/2.6.18-194.8.1.v5/build/.config
- + egrep 'CONFIG_IPSEC|CONFIG_KLIPS|CONFIG_NET_KEY|CONFIG_INET|CONFIG_IP|CONFIG_HW_RANDOM|CONFIG_CRYPTO_DEV|_XFRM'
- CONFIG_XFRM=y
- CONFIG_XFRM_NALGO=m
- CONFIG_XFRM_USER=y
- CONFIG_NET_KEY=m
- CONFIG_INET=y
- CONFIG_IP_MULTICAST=y
- CONFIG_IP_ADVANCED_ROUTER=y
- # CONFIG_IP_FIB_TRIE is not set
- CONFIG_IP_FIB_HASH=y
- CONFIG_IP_MULTIPLE_TABLES=y
- CONFIG_IP_ROUTE_FWMARK=y
- CONFIG_IP_ROUTE_MULTIPATH=y
- # CONFIG_IP_ROUTE_MULTIPATH_CACHED is not set
- CONFIG_IP_ROUTE_VERBOSE=y
- # CONFIG_IP_PNP is not set
- CONFIG_IP_MROUTE=y
- CONFIG_IP_PIMSM_V1=y
- CONFIG_IP_PIMSM_V2=y
- CONFIG_INET_AH=m
- CONFIG_INET_ESP=m
- CONFIG_INET_IPCOMP=m
- CONFIG_INET_XFRM_TUNNEL=m
- CONFIG_INET_TUNNEL=m
- CONFIG_INET_XFRM_MODE_TRANSPORT=m
- CONFIG_INET_XFRM_MODE_TUNNEL=m
- CONFIG_INET_DIAG=m
- CONFIG_INET_TCP_DIAG=m
- CONFIG_INET_LRO=y
- CONFIG_IP_VS=m
- # CONFIG_IP_VS_DEBUG is not set
- CONFIG_IP_VS_TAB_BITS=12
- CONFIG_IP_VS_PROTO_TCP=y
- CONFIG_IP_VS_PROTO_UDP=y
- CONFIG_IP_VS_PROTO_ESP=y
- CONFIG_IP_VS_PROTO_AH=y
- CONFIG_IP_VS_RR=m
- CONFIG_IP_VS_WRR=m
- CONFIG_IP_VS_LC=m
- CONFIG_IP_VS_WLC=m
- CONFIG_IP_VS_LBLC=m
- CONFIG_IP_VS_LBLCR=m
- CONFIG_IP_VS_DH=m
- CONFIG_IP_VS_SH=m
- CONFIG_IP_VS_SED=m
- CONFIG_IP_VS_NQ=m
- CONFIG_IP_VS_FTP=m
- CONFIG_IPV6=m
- CONFIG_IPV6_PRIVACY=y
- CONFIG_IPV6_ROUTER_PREF=y
- CONFIG_IPV6_ROUTE_INFO=y
- CONFIG_IPV6_OPTIMISTIC_DAD=y
- CONFIG_INET6_AH=m
- CONFIG_INET6_ESP=m
- CONFIG_INET6_IPCOMP=m
- CONFIG_INET6_XFRM_TUNNEL=m
- CONFIG_INET6_TUNNEL=m
- CONFIG_INET6_XFRM_MODE_TRANSPORT=m
- CONFIG_INET6_XFRM_MODE_TUNNEL=m
- CONFIG_IPV6_TUNNEL=m
- # CONFIG_IPV6_SUBTREES is not set
- CONFIG_IPV6_MULTIPLE_TABLES=y
- CONFIG_IPV6_ROUTE_FWMARK=y
- CONFIG_IP_NF_CONNTRACK=m
- CONFIG_IP_NF_CT_ACCT=y
- CONFIG_IP_NF_CONNTRACK_MARK=y
- CONFIG_IP_NF_CONNTRACK_SECMARK=y
- CONFIG_IP_NF_CONNTRACK_EVENTS=y
- CONFIG_IP_NF_CONNTRACK_NETLINK=m
- CONFIG_IP_NF_CT_PROTO_SCTP=m
- CONFIG_IP_NF_FTP=m
- CONFIG_IP_NF_IRC=m
- CONFIG_IP_NF_NETBIOS_NS=m
- CONFIG_IP_NF_TFTP=m
- CONFIG_IP_NF_AMANDA=m
- CONFIG_IP_NF_PPTP=m
- CONFIG_IP_NF_H323=m
- CONFIG_IP_NF_SIP=m
- CONFIG_IP_NF_QUEUE=m
- CONFIG_IP_NF_IPTABLES=m
- CONFIG_IP_NF_MATCH_IPRANGE=m
- CONFIG_IP_NF_MATCH_TOS=m
- CONFIG_IP_NF_MATCH_RECENT=m
- CONFIG_IP_NF_MATCH_ECN=m
- CONFIG_IP_NF_MATCH_DSCP=m
- CONFIG_IP_NF_MATCH_AH=m
- CONFIG_IP_NF_MATCH_TTL=m
- CONFIG_IP_NF_MATCH_OWNER=m
- CONFIG_IP_NF_MATCH_ADDRTYPE=m
- CONFIG_IP_NF_MATCH_HASHLIMIT=m
- CONFIG_IP_NF_FILTER=m
- CONFIG_IP_NF_TARGET_REJECT=m
- CONFIG_IP_NF_TARGET_LOG=m
- CONFIG_IP_NF_TARGET_ULOG=m
- CONFIG_IP_NF_TARGET_TCPMSS=m
- CONFIG_IP_NF_NAT=m
- CONFIG_IP_NF_NAT_NEEDED=y
- CONFIG_IP_NF_TARGET_MASQUERADE=m
- CONFIG_IP_NF_TARGET_REDIRECT=m
- CONFIG_IP_NF_TARGET_NETMAP=m
- CONFIG_IP_NF_TARGET_SAME=m
- CONFIG_IP_NF_NAT_SNMP_BASIC=m
- CONFIG_IP_NF_NAT_IRC=m
- CONFIG_IP_NF_NAT_FTP=m
- CONFIG_IP_NF_NAT_TFTP=m
- CONFIG_IP_NF_NAT_AMANDA=m
- CONFIG_IP_NF_NAT_PPTP=m
- CONFIG_IP_NF_NAT_H323=m
- CONFIG_IP_NF_NAT_SIP=m
- CONFIG_IP_NF_MANGLE=m
- CONFIG_IP_NF_TARGET_IMQ=m
- CONFIG_IP_NF_TARGET_TOS=m
- CONFIG_IP_NF_TARGET_ECN=m
- CONFIG_IP_NF_TARGET_DSCP=m
- CONFIG_IP_NF_TARGET_TTL=m
- CONFIG_IP_NF_TARGET_CLUSTERIP=m
- CONFIG_IP_NF_RAW=m
- CONFIG_IP_NF_ARPTABLES=m
- CONFIG_IP_NF_ARPFILTER=m
- CONFIG_IP_NF_ARP_MANGLE=m
- CONFIG_IP_NF_MATCH_IPP2P=m
- CONFIG_IP6_NF_QUEUE=m
- CONFIG_IP6_NF_IPTABLES=m
- CONFIG_IP6_NF_MATCH_RT=m
- CONFIG_IP6_NF_MATCH_OPTS=m
- CONFIG_IP6_NF_MATCH_FRAG=m
- CONFIG_IP6_NF_MATCH_HL=m
- CONFIG_IP6_NF_MATCH_OWNER=m
- CONFIG_IP6_NF_MATCH_IPV6HEADER=m
- CONFIG_IP6_NF_MATCH_AH=m
- CONFIG_IP6_NF_MATCH_EUI64=m
- CONFIG_IP6_NF_FILTER=m
- CONFIG_IP6_NF_TARGET_LOG=m
- CONFIG_IP6_NF_TARGET_REJECT=m
- CONFIG_IP6_NF_MANGLE=m
- CONFIG_IP6_NF_TARGET_IMQ=m
- CONFIG_IP6_NF_TARGET_HL=m
- CONFIG_IP6_NF_RAW=m
- CONFIG_IP_DCCP=m
- CONFIG_INET_DCCP_DIAG=m
- CONFIG_IP_DCCP_ACKVEC=y
- CONFIG_IP_DCCP_CCID2=m
- CONFIG_IP_DCCP_CCID3=m
- CONFIG_IP_DCCP_TFRC_LIB=m
- # CONFIG_IP_DCCP_DEBUG is not set
- CONFIG_IP_SCTP=m
- CONFIG_IPX=m
- # CONFIG_IPX_INTERN is not set
- CONFIG_IPW2100=m
- CONFIG_IPW2100_MONITOR=y
- # CONFIG_IPW2100_DEBUG is not set
- CONFIG_IPW2200=m
- CONFIG_IPW2200_MONITOR=y
- CONFIG_IPW2200_RADIOTAP=y
- CONFIG_IPW2200_PROMISCUOUS=y
- CONFIG_IPW2200_QOS=y
- # CONFIG_IPW2200_DEBUG is not set
- CONFIG_IPPP_FILTER=y
- CONFIG_IPMI_HANDLER=m
- CONFIG_IPMI_PANIC_EVENT=y
- CONFIG_IPMI_PANIC_STRING=y
- CONFIG_IPMI_DEVICE_INTERFACE=m
- CONFIG_IPMI_SI=m
- CONFIG_IPMI_WATCHDOG=m
- CONFIG_IPMI_POWEROFF=m
- CONFIG_HW_RANDOM=y
- CONFIG_HW_RANDOM_INTEL=m
- CONFIG_HW_RANDOM_AMD=m
- CONFIG_HW_RANDOM_GEODE=m
- CONFIG_HW_RANDOM_VIA=m
- CONFIG_SECURITY_NETWORK_XFRM=y
- CONFIG_CRYPTO_DEV_PADLOCK=m
- CONFIG_CRYPTO_DEV_PADLOCK_AES=y
- + _________________________ etc/syslog.conf
- + _________________________ etc/syslog-ng/syslog-ng.conf
- + cat /etc/syslog-ng/syslog-ng.conf
- cat: /etc/syslog-ng/syslog-ng.conf: No such file or directory
- + cat /etc/syslog.conf
- # Log all kernel messages to the console.
- # Logging much else clutters up the screen.
- #kern.* /dev/console
- # Log anything (except mail) of level info or higher.
- # Don't log private authentication messages!
- *.info;mail.none;authpriv.none;cron.none;local6.none;local5.none;local0.none /var/log/messages
- # The authpriv file has restricted access.
- authpriv.* /var/log/secure
- # Log all the mail messages in one place.
- mail.info -/var/log/maillog
- # Log cron stuff
- cron.* /var/log/cron
- # Everybody gets emergency messages
- *.emerg *
- # Save news errors of level crit and higher in a special file.
- uucp,news.crit /var/log/spooler
- # Save boot messages also to boot.log
- local7.* /var/log/boot.log
- local6.* /var/log/system
- local5.* /var/log/compliance
- local0.* /var/log/suva
- + _________________________ etc/resolv.conf
- + cat /etc/resolv.conf
- ; generated by /sbin/dhclient-script
- search orange.nl
- nameserver 194.134.5.5
- nameserver 194.134.0.97
- + _________________________ lib/modules-ls
- + ls -ltr /lib/modules
- total 8
- drwxr-xr-x 6 root root 4096 Aug 25 19:00 2.6.18-194.8.1.v5
- + _________________________ fipscheck
- + cat /proc/sys/crypto/fips_enabled
- 0
- + _________________________ /proc/ksyms-netif_rx
- + test -r /proc/ksyms
- + test -r /proc/kallsyms
- + egrep netif_rx /proc/kallsyms
- c05c5d1c T __netif_rx_schedule
- c05c70bb T netif_rx
- c05c85c1 T netif_rx_ni
- c05c70bb U netif_rx [xfrm6_esp]
- c05c70bb U netif_rx [xfrm4_esp]
- c05c70bb U netif_rx [ipv6]
- c05c70bb U netif_rx [ppp_generic]
- c05c70bb U netif_rx [3c59x]
- c05c70bb U netif_rx [sis900]
- + _________________________ lib/modules-netif_rx
- + modulegoo kernel/net/ipv4/ipip.o netif_rx
- + set +x
- 2.6.18-194.8.1.v5:
- + _________________________ kern.debug
- + test -f /var/log/kern.debug
- + _________________________ klog
- + sed -n '483,$p' /var/log/messages
- + egrep -i 'ipsec|klips|pluto'
- + case "$1" in
- + cat
- Aug 25 13:46:44 system ipsec_setup: Starting Openswan IPsec U2.6.28/K2.6.18-194.8.1.v5...
- Aug 25 13:46:44 system pluto: adjusting ipsec.d to /etc/ipsec.d
- Aug 25 13:46:44 system ipsec__plutorun: adjusting ipsec.d to /etc/ipsec.d
- Aug 25 13:46:44 system ipsec_setup: ...Openswan IPsec started
- Aug 25 13:46:45 system ipsec__plutorun: 002 loading certificate from Left1024-cert.pem
- Aug 25 13:46:45 system ipsec__plutorun: 002 loaded host cert file '/etc/ipsec.d/certs/Left1024-cert.pem' (1635 bytes)
- Aug 25 13:46:45 system ipsec__plutorun: 002 added connection description "LAN"
- Aug 25 13:46:45 system ipsec__plutorun: 003 NAT-Traversal: Trying new style NAT-T
- Aug 25 13:46:45 system ipsec__plutorun: 003 NAT-Traversal: ESPINUDP(1) setup failed for new style NAT-T family IPv4 (errno=19)
- Aug 25 13:46:45 system ipsec__plutorun: 003 NAT-Traversal: Trying old style NAT-T
- + _________________________ plog
- + sed -n '139,$p' /var/log/secure
- + egrep -i pluto
- + case "$1" in
- + cat
- Aug 25 13:46:44 system ipsec__plutorun: Starting Pluto subsystem...
- Aug 25 13:46:44 system pluto[19911]: Starting Pluto (Openswan Version 2.6.28; Vendor ID OEQ{O\177nez{CQ) pid:19911
- Aug 25 13:46:44 system pluto[19911]: SAref support [disabled]: Protocol not available
- Aug 25 13:46:44 system pluto[19911]: SAbind support [disabled]: Protocol not available
- Aug 25 13:46:44 system pluto[19911]: Setting NAT-Traversal port-4500 floating to on
- Aug 25 13:46:44 system pluto[19911]: port floating activation criteria nat_t=1/port_float=1
- Aug 25 13:46:44 system pluto[19911]: NAT-Traversal support [enabled]
- Aug 25 13:46:44 system pluto[19911]: fixup for bad virtual_private entry '%4:!10.97.10.0/24', please fix your virtual_private line!
- Aug 25 13:46:44 system pluto[19911]: fixup for bad virtual_private entry '%4:!10.97.10.0/24', please fix your virtual_private line!
- Aug 25 13:46:44 system pluto[19911]: using /dev/urandom as source of random entropy
- Aug 25 13:46:44 system pluto[19911]: ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC_SSH: Ok (ret=0)
- Aug 25 13:46:44 system pluto[19911]: ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC: Ok (ret=0)
- Aug 25 13:46:44 system pluto[19911]: ike_alg_register_enc(): Activating OAKLEY_SERPENT_CBC: Ok (ret=0)
- Aug 25 13:46:44 system pluto[19911]: ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
- Aug 25 13:46:44 system pluto[19911]: ike_alg_register_enc(): Activating OAKLEY_BLOWFISH_CBC: Ok (ret=0)
- Aug 25 13:46:44 system pluto[19911]: ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0)
- Aug 25 13:46:44 system pluto[19911]: ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0)
- Aug 25 13:46:44 system pluto[19911]: starting up 1 cryptographic helpers
- Aug 25 13:46:44 system pluto[19917]: using /dev/urandom as source of random entropy
- Aug 25 13:46:44 system pluto[19911]: started helper pid=19917 (fd:7)
- Aug 25 13:46:44 system pluto[19911]: Using Linux 2.6 IPsec interface code on 2.6.18-194.8.1.v5 (experimental code)
- Aug 25 13:46:44 system pluto[19911]: ike_alg_register_enc(): Activating aes_ccm_8: Ok (ret=0)
- Aug 25 13:46:44 system pluto[19911]: ike_alg_add(): ERROR: Algorithm already exists
- Aug 25 13:46:44 system pluto[19911]: ike_alg_register_enc(): Activating aes_ccm_12: FAILED (ret=-17)
- Aug 25 13:46:44 system pluto[19911]: ike_alg_add(): ERROR: Algorithm already exists
- Aug 25 13:46:44 system pluto[19911]: ike_alg_register_enc(): Activating aes_ccm_16: FAILED (ret=-17)
- Aug 25 13:46:44 system pluto[19911]: ike_alg_add(): ERROR: Algorithm already exists
- Aug 25 13:46:44 system pluto[19911]: ike_alg_register_enc(): Activating aes_gcm_8: FAILED (ret=-17)
- Aug 25 13:46:44 system pluto[19911]: ike_alg_add(): ERROR: Algorithm already exists
- Aug 25 13:46:44 system pluto[19911]: ike_alg_register_enc(): Activating aes_gcm_12: FAILED (ret=-17)
- Aug 25 13:46:44 system pluto[19911]: ike_alg_add(): ERROR: Algorithm already exists
- Aug 25 13:46:44 system pluto[19911]: ike_alg_register_enc(): Activating aes_gcm_16: FAILED (ret=-17)
- Aug 25 13:46:44 system pluto[19911]: Changed path to directory '/etc/ipsec.d/cacerts'
- Aug 25 13:46:44 system pluto[19911]: loaded CA cert file 'Testing1024-crl.pem' (568 bytes)
- Aug 25 13:46:44 system pluto[19911]: error in X.509 certificate Testing1024-crl.pem
- Aug 25 13:46:44 system pluto[19911]: loaded CA cert file 'Testing1024-cacert.pem' (1639 bytes)
- Aug 25 13:46:44 system pluto[19911]: Changed path to directory '/etc/ipsec.d/aacerts'
- Aug 25 13:46:44 system pluto[19911]: Changed path to directory '/etc/ipsec.d/ocspcerts'
- Aug 25 13:46:44 system pluto[19911]: Changing to directory '/etc/ipsec.d/crls'
- Aug 25 13:46:44 system pluto[19911]: loaded crl file 'Testing1024-crl.pem' (568 bytes)
- Aug 25 13:46:44 system pluto[19911]: loading certificate from Left1024-cert.pem
- Aug 25 13:46:44 system pluto[19911]: loaded host cert file '/etc/ipsec.d/certs/Left1024-cert.pem' (1635 bytes)
- Aug 25 13:46:45 system pluto[19911]: added connection description "LAN"
- Aug 25 13:46:45 system pluto[19911]: listening for IKE messages
- Aug 25 13:46:45 system pluto[19911]: NAT-Traversal: Trying new style NAT-T
- Aug 25 13:46:45 system pluto[19911]: NAT-Traversal: ESPINUDP(1) setup failed for new style NAT-T family IPv4 (errno=19)
- Aug 25 13:46:45 system pluto[19911]: NAT-Traversal: Trying old style NAT-T
- Aug 25 13:46:45 system pluto[19911]: adding interface eth0/eth0 85.145.148.106:500
- Aug 25 13:46:45 system pluto[19911]: adding interface eth0/eth0 85.145.148.106:4500
- Aug 25 13:46:45 system pluto[19911]: adding interface eth1/eth1 10.97.10.1:500
- Aug 25 13:46:45 system pluto[19911]: adding interface eth1/eth1 10.97.10.1:4500
- Aug 25 13:46:45 system pluto[19911]: adding interface lo/lo 127.0.0.1:500
- Aug 25 13:46:45 system pluto[19911]: adding interface lo/lo 127.0.0.1:4500
- Aug 25 13:46:45 system pluto[19911]: adding interface lo/lo ::1:500
- Aug 25 13:46:45 system pluto[19911]: loading secrets from "/etc/ipsec.secrets"
- Aug 25 13:46:45 system pluto[19911]: loaded private key file '/etc/ipsec.d/private/Left1024-key.pem' (963 bytes)
- Aug 25 13:46:45 system pluto[19911]: loaded private key for keyid: PPK_RSA:AwEAAac0u
- Aug 25 13:49:16 system pluto[19911]: packet from 62.140.137.121:37386: received Vendor ID payload [Openswan (this version) 2.6.28 ]
- Aug 25 13:49:16 system pluto[19911]: packet from 62.140.137.121:37386: received Vendor ID payload [Dead Peer Detection]
- Aug 25 13:49:16 system pluto[19911]: packet from 62.140.137.121:37386: received Vendor ID payload [RFC 3947] method set to=109
- Aug 25 13:49:16 system pluto[19911]: packet from 62.140.137.121:37386: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 109
- Aug 25 13:49:16 system pluto[19911]: packet from 62.140.137.121:37386: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 109
- Aug 25 13:49:16 system pluto[19911]: packet from 62.140.137.121:37386: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 109
- Aug 25 13:49:16 system pluto[19911]: packet from 62.140.137.121:37386: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
- Aug 25 13:49:16 system pluto[19911]: "LAN"[1] 62.140.137.121 #1: responding to Main Mode from unknown peer 62.140.137.121
- Aug 25 13:49:16 system pluto[19911]: "LAN"[1] 62.140.137.121 #1: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
- Aug 25 13:49:16 system pluto[19911]: "LAN"[1] 62.140.137.121 #1: STATE_MAIN_R1: sent MR1, expecting MI2
- Aug 25 13:49:17 system pluto[19911]: "LAN"[1] 62.140.137.121 #1: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): peer is NATed
- Aug 25 13:49:17 system pluto[19911]: "LAN"[1] 62.140.137.121 #1: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
- Aug 25 13:49:17 system pluto[19911]: "LAN"[1] 62.140.137.121 #1: STATE_MAIN_R2: sent MR2, expecting MI3
- Aug 25 13:49:17 system pluto[19911]: "LAN"[1] 62.140.137.121 #1: Main mode peer ID is ID_DER_ASN1_DN: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl'
- Aug 25 13:49:17 system pluto[19911]: "LAN"[1] 62.140.137.121 #1: I am sending my cert
- Aug 25 13:49:17 system pluto[19911]: "LAN"[1] 62.140.137.121 #1: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
- Aug 25 13:49:17 system pluto[19911]: "LAN"[1] 62.140.137.121 #1: new NAT mapping for #1, was 62.140.137.121:37386, now 62.140.137.121:37394
- Aug 25 13:49:17 system pluto[19911]: "LAN"[1] 62.140.137.121 #1: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=aes_128 prf=oakley_sha group=modp2048}
- Aug 25 13:49:17 system pluto[19911]: "LAN"[1] 62.140.137.121 #1: the peer proposed: 10.97.10.0/24:0/0 -> 192.168.0.102/32:0/0
- Aug 25 13:49:17 system pluto[19911]: "LAN"[1] 62.140.137.121 #2: responding to Quick Mode proposal {msgid:d5514e4c}
- Aug 25 13:49:17 system pluto[19911]: "LAN"[1] 62.140.137.121 #2: us: 10.97.10.0/24===85.145.148.106<85.145.148.106>[C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Left1024, E=admin@testingcorporation.nl,+S=C]
- Aug 25 13:49:17 system pluto[19911]: "LAN"[1] 62.140.137.121 #2: them: 62.140.137.121[C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl,+S=C]===192.168.0.102/32
- Aug 25 13:49:17 system pluto[19911]: "LAN"[1] 62.140.137.121 #2: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
- Aug 25 13:49:17 system pluto[19911]: "LAN"[1] 62.140.137.121 #2: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
- Aug 25 13:49:17 system pluto[19911]: "LAN"[1] 62.140.137.121 #2: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
- Aug 25 13:49:17 system pluto[19911]: "LAN"[1] 62.140.137.121 #2: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP=>0x2bb0ea5d <0xbf822e57 xfrm=AES_128-HMAC_SHA1 NATOA=none NATD=62.140.137.121:37394 DPD=none}
- Aug 25 13:49:40 system pluto[19911]: "LAN"[1] 62.140.137.121 #1: received Delete SA(0x2bb0ea5d) payload: deleting IPSEC State #2
- Aug 25 13:49:40 system pluto[19911]: "LAN"[1] 62.140.137.121 #1: received and ignored informational message
- Aug 25 13:49:41 system pluto[19911]: "LAN"[1] 62.140.137.121 #1: received Delete SA payload: deleting ISAKMP State #1
- Aug 25 13:49:41 system pluto[19911]: "LAN"[1] 62.140.137.121: deleting connection "LAN" instance with peer 62.140.137.121 {isakmp=#0/ipsec=#0}
- Aug 25 13:49:41 system pluto[19911]: packet from 62.140.137.121:37394: received and ignored informational message
- Aug 25 13:49:46 system pluto[19911]: packet from 62.140.137.121:37386: received Vendor ID payload [Openswan (this version) 2.6.28 ]
- Aug 25 13:49:46 system pluto[19911]: packet from 62.140.137.121:37386: received Vendor ID payload [Dead Peer Detection]
- Aug 25 13:49:46 system pluto[19911]: packet from 62.140.137.121:37386: received Vendor ID payload [RFC 3947] method set to=109
- Aug 25 13:49:46 system pluto[19911]: packet from 62.140.137.121:37386: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 109
- Aug 25 13:49:46 system pluto[19911]: packet from 62.140.137.121:37386: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 109
- Aug 25 13:49:46 system pluto[19911]: packet from 62.140.137.121:37386: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 109
- Aug 25 13:49:46 system pluto[19911]: packet from 62.140.137.121:37386: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
- Aug 25 13:49:46 system pluto[19911]: "LAN"[2] 62.140.137.121 #3: responding to Main Mode from unknown peer 62.140.137.121
- Aug 25 13:49:46 system pluto[19911]: "LAN"[2] 62.140.137.121 #3: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
- Aug 25 13:49:46 system pluto[19911]: "LAN"[2] 62.140.137.121 #3: STATE_MAIN_R1: sent MR1, expecting MI2
- Aug 25 13:49:47 system pluto[19911]: "LAN"[2] 62.140.137.121 #3: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): peer is NATed
- Aug 25 13:49:47 system pluto[19911]: "LAN"[2] 62.140.137.121 #3: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
- Aug 25 13:49:47 system pluto[19911]: "LAN"[2] 62.140.137.121 #3: STATE_MAIN_R2: sent MR2, expecting MI3
- Aug 25 13:49:47 system pluto[19911]: "LAN"[2] 62.140.137.121 #3: Main mode peer ID is ID_DER_ASN1_DN: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl'
- Aug 25 13:49:47 system pluto[19911]: "LAN"[2] 62.140.137.121 #3: I am sending my cert
- Aug 25 13:49:47 system pluto[19911]: "LAN"[2] 62.140.137.121 #3: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
- Aug 25 13:49:47 system pluto[19911]: "LAN"[2] 62.140.137.121 #3: new NAT mapping for #3, was 62.140.137.121:37386, now 62.140.137.121:37394
- Aug 25 13:49:47 system pluto[19911]: "LAN"[2] 62.140.137.121 #3: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=aes_128 prf=oakley_sha group=modp2048}
- Aug 25 13:49:47 system pluto[19911]: "LAN"[2] 62.140.137.121 #3: the peer proposed: 10.97.10.0/24:0/0 -> 192.168.0.102/32:0/0
- Aug 25 13:49:47 system pluto[19911]: "LAN"[2] 62.140.137.121 #4: responding to Quick Mode proposal {msgid:4c1352e9}
- Aug 25 13:49:47 system pluto[19911]: "LAN"[2] 62.140.137.121 #4: us: 10.97.10.0/24===85.145.148.106<85.145.148.106>[C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Left1024, E=admin@testingcorporation.nl,+S=C]
- Aug 25 13:49:47 system pluto[19911]: "LAN"[2] 62.140.137.121 #4: them: 62.140.137.121[C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl,+S=C]===192.168.0.102/32
- Aug 25 13:49:47 system pluto[19911]: "LAN"[2] 62.140.137.121 #4: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
- Aug 25 13:49:47 system pluto[19911]: "LAN"[2] 62.140.137.121 #4: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
- Aug 25 13:49:47 system pluto[19911]: "LAN"[2] 62.140.137.121 #4: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
- Aug 25 13:49:47 system pluto[19911]: "LAN"[2] 62.140.137.121 #4: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP=>0x3a9de822 <0xdd30e5b2 xfrm=AES_128-HMAC_SHA1 NATOA=none NATD=62.140.137.121:37394 DPD=none}
- Aug 25 13:52:29 system pluto[19911]: "LAN"[2] 62.140.137.121 #3: received Delete SA(0x3a9de822) payload: deleting IPSEC State #4
- Aug 25 13:52:29 system pluto[19911]: "LAN"[2] 62.140.137.121 #3: received and ignored informational message
- Aug 25 13:52:29 system pluto[19911]: "LAN"[2] 62.140.137.121 #3: received Delete SA payload: deleting ISAKMP State #3
- Aug 25 13:52:29 system pluto[19911]: "LAN"[2] 62.140.137.121: deleting connection "LAN" instance with peer 62.140.137.121 {isakmp=#0/ipsec=#0}
- Aug 25 13:52:29 system pluto[19911]: packet from 62.140.137.121:37394: received and ignored informational message
- Aug 25 13:52:29 system pluto[19911]: packet from 62.140.137.121:45638: received Vendor ID payload [Openswan (this version) 2.6.28 ]
- Aug 25 13:52:29 system pluto[19911]: packet from 62.140.137.121:45638: received Vendor ID payload [Dead Peer Detection]
- Aug 25 13:52:29 system pluto[19911]: packet from 62.140.137.121:45638: received Vendor ID payload [RFC 3947] method set to=109
- Aug 25 13:52:29 system pluto[19911]: packet from 62.140.137.121:45638: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 109
- Aug 25 13:52:29 system pluto[19911]: packet from 62.140.137.121:45638: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 109
- Aug 25 13:52:29 system pluto[19911]: packet from 62.140.137.121:45638: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 109
- Aug 25 13:52:29 system pluto[19911]: packet from 62.140.137.121:45638: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
- Aug 25 13:52:29 system pluto[19911]: "LAN"[3] 62.140.137.121 #5: responding to Main Mode from unknown peer 62.140.137.121
- Aug 25 13:52:29 system pluto[19911]: "LAN"[3] 62.140.137.121 #5: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
- Aug 25 13:52:29 system pluto[19911]: "LAN"[3] 62.140.137.121 #5: STATE_MAIN_R1: sent MR1, expecting MI2
- Aug 25 13:52:29 system pluto[19911]: "LAN"[3] 62.140.137.121 #5: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): peer is NATed
- Aug 25 13:52:29 system pluto[19911]: "LAN"[3] 62.140.137.121 #5: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
- Aug 25 13:52:29 system pluto[19911]: "LAN"[3] 62.140.137.121 #5: STATE_MAIN_R2: sent MR2, expecting MI3
- Aug 25 13:52:29 system pluto[19911]: "LAN"[3] 62.140.137.121 #5: Main mode peer ID is ID_DER_ASN1_DN: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl'
- Aug 25 13:52:29 system pluto[19911]: "LAN"[3] 62.140.137.121 #5: I am sending my cert
- Aug 25 13:52:29 system pluto[19911]: "LAN"[3] 62.140.137.121 #5: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
- Aug 25 13:52:29 system pluto[19911]: "LAN"[3] 62.140.137.121 #5: new NAT mapping for #5, was 62.140.137.121:45638, now 62.140.137.121:37394
- Aug 25 13:52:29 system pluto[19911]: "LAN"[3] 62.140.137.121 #5: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=aes_128 prf=oakley_sha group=modp2048}
- Aug 25 13:52:29 system pluto[19911]: "LAN"[3] 62.140.137.121 #5: the peer proposed: 10.97.10.0/24:0/0 -> 192.168.0.102/32:0/0
- Aug 25 13:52:29 system pluto[19911]: "LAN"[3] 62.140.137.121 #6: responding to Quick Mode proposal {msgid:b08d5d9b}
- Aug 25 13:52:29 system pluto[19911]: "LAN"[3] 62.140.137.121 #6: us: 10.97.10.0/24===85.145.148.106<85.145.148.106>[C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Left1024, E=admin@testingcorporation.nl,+S=C]
- Aug 25 13:52:29 system pluto[19911]: "LAN"[3] 62.140.137.121 #6: them: 62.140.137.121[C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl,+S=C]===192.168.0.102/32
- Aug 25 13:52:29 system pluto[19911]: "LAN"[3] 62.140.137.121 #6: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
- Aug 25 13:52:29 system pluto[19911]: "LAN"[3] 62.140.137.121 #6: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
- Aug 25 13:52:29 system pluto[19911]: "LAN"[3] 62.140.137.121 #6: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
- Aug 25 13:52:29 system pluto[19911]: "LAN"[3] 62.140.137.121 #6: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP=>0x7f608526 <0x4045a59d xfrm=AES_128-HMAC_SHA1 NATOA=none NATD=62.140.137.121:37394 DPD=none}
- Aug 25 13:52:38 system pluto[19911]: "LAN"[3] 62.140.137.121 #5: received Delete SA(0x7f608526) payload: deleting IPSEC State #6
- Aug 25 13:52:38 system pluto[19911]: "LAN"[3] 62.140.137.121 #5: received and ignored informational message
- Aug 25 13:52:38 system pluto[19911]: "LAN"[3] 62.140.137.121 #5: received Delete SA payload: deleting ISAKMP State #5
- Aug 25 13:52:38 system pluto[19911]: "LAN"[3] 62.140.137.121: deleting connection "LAN" instance with peer 62.140.137.121 {isakmp=#0/ipsec=#0}
- Aug 25 13:52:38 system pluto[19911]: packet from 62.140.137.121:37394: received and ignored informational message
- Aug 25 18:21:31 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [Openswan (this version) 2.6.28 ]
- Aug 25 18:21:31 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [Dead Peer Detection]
- Aug 25 18:21:31 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [RFC 3947] method set to=109
- Aug 25 18:21:31 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 109
- Aug 25 18:21:31 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 109
- Aug 25 18:21:31 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 109
- Aug 25 18:21:31 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
- Aug 25 18:21:31 system pluto[19911]: "LAN"[4] 95.96.10.129 #7: responding to Main Mode from unknown peer 95.96.10.129
- Aug 25 18:21:31 system pluto[19911]: "LAN"[4] 95.96.10.129 #7: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
- Aug 25 18:21:31 system pluto[19911]: "LAN"[4] 95.96.10.129 #7: STATE_MAIN_R1: sent MR1, expecting MI2
- Aug 25 18:21:31 system pluto[19911]: "LAN"[4] 95.96.10.129 #7: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): peer is NATed
- Aug 25 18:21:31 system pluto[19911]: "LAN"[4] 95.96.10.129 #7: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
- Aug 25 18:21:31 system pluto[19911]: "LAN"[4] 95.96.10.129 #7: STATE_MAIN_R2: sent MR2, expecting MI3
- Aug 25 18:21:31 system pluto[19911]: "LAN"[4] 95.96.10.129 #7: Main mode peer ID is ID_DER_ASN1_DN: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl'
- Aug 25 18:21:31 system pluto[19911]: "LAN"[4] 95.96.10.129 #7: I am sending my cert
- Aug 25 18:21:31 system pluto[19911]: "LAN"[4] 95.96.10.129 #7: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
- Aug 25 18:21:31 system pluto[19911]: "LAN"[4] 95.96.10.129 #7: new NAT mapping for #7, was 95.96.10.129:500, now 95.96.10.129:4500
- Aug 25 18:21:31 system pluto[19911]: "LAN"[4] 95.96.10.129 #7: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=aes_128 prf=oakley_sha group=modp2048}
- Aug 25 18:21:31 system pluto[19911]: "LAN"[4] 95.96.10.129 #7: the peer proposed: 10.97.10.0/24:0/0 -> 192.168.0.102/32:0/0
- Aug 25 18:21:31 system pluto[19911]: "LAN"[4] 95.96.10.129 #8: responding to Quick Mode proposal {msgid:f13d1a3f}
- Aug 25 18:21:31 system pluto[19911]: "LAN"[4] 95.96.10.129 #8: us: 10.97.10.0/24===85.145.148.106<85.145.148.106>[C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Left1024, E=admin@testingcorporation.nl,+S=C]
- Aug 25 18:21:31 system pluto[19911]: "LAN"[4] 95.96.10.129 #8: them: 95.96.10.129[C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl,+S=C]===192.168.0.102/32
- Aug 25 18:21:31 system pluto[19911]: "LAN"[4] 95.96.10.129 #8: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
- Aug 25 18:21:31 system pluto[19911]: "LAN"[4] 95.96.10.129 #8: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
- Aug 25 18:21:32 system pluto[19911]: "LAN"[4] 95.96.10.129 #8: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
- Aug 25 18:21:32 system pluto[19911]: "LAN"[4] 95.96.10.129 #8: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP=>0xdf8a45ef <0x138a332a xfrm=AES_128-HMAC_SHA1 NATOA=none NATD=95.96.10.129:4500 DPD=none}
- Aug 25 19:07:28 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [Openswan (this version) 2.6.28 ]
- Aug 25 19:07:28 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [Dead Peer Detection]
- Aug 25 19:07:28 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [RFC 3947] method set to=109
- Aug 25 19:07:28 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 109
- Aug 25 19:07:28 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 109
- Aug 25 19:07:28 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 109
- Aug 25 19:07:28 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
- Aug 25 19:07:28 system pluto[19911]: "LAN"[4] 95.96.10.129 #9: responding to Main Mode from unknown peer 95.96.10.129
- Aug 25 19:07:28 system pluto[19911]: "LAN"[4] 95.96.10.129 #9: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
- Aug 25 19:07:28 system pluto[19911]: "LAN"[4] 95.96.10.129 #9: STATE_MAIN_R1: sent MR1, expecting MI2
- Aug 25 19:07:28 system pluto[19911]: "LAN"[4] 95.96.10.129 #9: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): peer is NATed
- Aug 25 19:07:28 system pluto[19911]: "LAN"[4] 95.96.10.129 #9: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
- Aug 25 19:07:28 system pluto[19911]: "LAN"[4] 95.96.10.129 #9: STATE_MAIN_R2: sent MR2, expecting MI3
- Aug 25 19:07:29 system pluto[19911]: "LAN"[4] 95.96.10.129 #9: Main mode peer ID is ID_DER_ASN1_DN: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl'
- Aug 25 19:07:29 system pluto[19911]: "LAN"[4] 95.96.10.129 #9: I am sending my cert
- Aug 25 19:07:29 system pluto[19911]: "LAN"[4] 95.96.10.129 #9: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
- Aug 25 19:07:29 system pluto[19911]: "LAN"[4] 95.96.10.129 #9: new NAT mapping for #9, was 95.96.10.129:500, now 95.96.10.129:4500
- Aug 25 19:07:29 system pluto[19911]: "LAN"[4] 95.96.10.129 #9: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=aes_128 prf=oakley_sha group=modp2048}
- Aug 25 19:21:31 system pluto[19911]: "LAN"[4] 95.96.10.129 #7: received Delete SA payload: deleting ISAKMP State #7
- Aug 25 19:21:31 system pluto[19911]: packet from 95.96.10.129:4500: received and ignored informational message
- Aug 25 19:24:07 system pluto[19911]: "LAN"[4] 95.96.10.129 #9: received Delete SA(0xdf8a45ef) payload: deleting IPSEC State #8
- Aug 25 19:24:07 system pluto[19911]: "LAN"[4] 95.96.10.129 #9: received and ignored informational message
- Aug 25 19:24:07 system pluto[19911]: "LAN"[4] 95.96.10.129 #9: received Delete SA payload: deleting ISAKMP State #9
- Aug 25 19:24:07 system pluto[19911]: "LAN"[4] 95.96.10.129: deleting connection "LAN" instance with peer 95.96.10.129 {isakmp=#0/ipsec=#0}
- Aug 25 19:24:07 system pluto[19911]: packet from 95.96.10.129:4500: received and ignored informational message
- Aug 25 19:41:18 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [Openswan (this version) 2.6.28 ]
- Aug 25 19:41:18 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [Dead Peer Detection]
- Aug 25 19:41:18 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [RFC 3947] method set to=109
- Aug 25 19:41:18 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 109
- Aug 25 19:41:18 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 109
- Aug 25 19:41:18 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 109
- Aug 25 19:41:18 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
- Aug 25 19:41:18 system pluto[19911]: "LAN"[5] 95.96.10.129 #10: responding to Main Mode from unknown peer 95.96.10.129
- Aug 25 19:41:18 system pluto[19911]: "LAN"[5] 95.96.10.129 #10: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
- Aug 25 19:41:18 system pluto[19911]: "LAN"[5] 95.96.10.129 #10: STATE_MAIN_R1: sent MR1, expecting MI2
- Aug 25 19:41:18 system pluto[19911]: "LAN"[5] 95.96.10.129 #10: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): peer is NATed
- Aug 25 19:41:18 system pluto[19911]: "LAN"[5] 95.96.10.129 #10: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
- Aug 25 19:41:18 system pluto[19911]: "LAN"[5] 95.96.10.129 #10: STATE_MAIN_R2: sent MR2, expecting MI3
- Aug 25 19:41:19 system pluto[19911]: "LAN"[5] 95.96.10.129 #10: Main mode peer ID is ID_DER_ASN1_DN: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl'
- Aug 25 19:41:19 system pluto[19911]: "LAN"[5] 95.96.10.129 #10: I am sending my cert
- Aug 25 19:41:19 system pluto[19911]: "LAN"[5] 95.96.10.129 #10: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
- Aug 25 19:41:19 system pluto[19911]: "LAN"[5] 95.96.10.129 #10: new NAT mapping for #10, was 95.96.10.129:500, now 95.96.10.129:4500
- Aug 25 19:41:19 system pluto[19911]: "LAN"[5] 95.96.10.129 #10: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=aes_128 prf=oakley_sha group=modp2048}
- Aug 25 19:41:19 system pluto[19911]: "LAN"[5] 95.96.10.129 #10: the peer proposed: 10.97.10.0/24:0/0 -> 10.81.9.203/32:0/0
- Aug 25 19:41:19 system pluto[19911]: "LAN"[5] 95.96.10.129 #11: responding to Quick Mode proposal {msgid:3b170279}
- Aug 25 19:41:19 system pluto[19911]: "LAN"[5] 95.96.10.129 #11: us: 10.97.10.0/24===85.145.148.106<85.145.148.106>[C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Left1024, E=admin@testingcorporation.nl,+S=C]
- Aug 25 19:41:19 system pluto[19911]: "LAN"[5] 95.96.10.129 #11: them: 95.96.10.129[C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl,+S=C]===10.81.9.203/32
- Aug 25 19:41:19 system pluto[19911]: "LAN"[5] 95.96.10.129 #11: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
- Aug 25 19:41:19 system pluto[19911]: "LAN"[5] 95.96.10.129 #11: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
- Aug 25 19:41:19 system pluto[19911]: "LAN"[5] 95.96.10.129 #11: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
- Aug 25 19:41:19 system pluto[19911]: "LAN"[5] 95.96.10.129 #11: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP=>0xcf518acc <0x9999a0c7 xfrm=AES_128-HMAC_SHA1 NATOA=none NATD=95.96.10.129:4500 DPD=none}
- Aug 25 20:29:04 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [Openswan (this version) 2.6.28 ]
- Aug 25 20:29:04 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [Dead Peer Detection]
- Aug 25 20:29:04 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [RFC 3947] method set to=109
- Aug 25 20:29:04 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 109
- Aug 25 20:29:04 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 109
- Aug 25 20:29:04 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 109
- Aug 25 20:29:04 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
- Aug 25 20:29:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #12: responding to Main Mode from unknown peer 95.96.10.129
- Aug 25 20:29:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #12: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
- Aug 25 20:29:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #12: STATE_MAIN_R1: sent MR1, expecting MI2
- Aug 25 20:29:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #12: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): peer is NATed
- Aug 25 20:29:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #12: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
- Aug 25 20:29:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #12: STATE_MAIN_R2: sent MR2, expecting MI3
- Aug 25 20:29:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #12: Main mode peer ID is ID_DER_ASN1_DN: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl'
- Aug 25 20:29:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #12: I am sending my cert
- Aug 25 20:29:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #12: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
- Aug 25 20:29:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #12: new NAT mapping for #12, was 95.96.10.129:500, now 95.96.10.129:4500
- Aug 25 20:29:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #12: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=aes_128 prf=oakley_sha group=modp2048}
- Aug 25 21:24:34 system pluto[19911]: "LAN"[5] 95.96.10.129 #13: initiating Main Mode to replace #12
- Aug 25 21:29:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #12: ISAKMP SA expired (LATEST!)
- Aug 25 21:37:44 system pluto[19911]: "LAN"[5] 95.96.10.129 #13: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 25 21:37:44 system pluto[19911]: "LAN"[5] 95.96.10.129 #13: starting keying attempt 2 of an unlimited number
- Aug 25 21:37:44 system pluto[19911]: "LAN"[5] 95.96.10.129 #14: initiating Main Mode to replace #13
- Aug 25 21:50:54 system pluto[19911]: "LAN"[5] 95.96.10.129 #14: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 25 21:50:54 system pluto[19911]: "LAN"[5] 95.96.10.129 #14: starting keying attempt 3 of an unlimited number
- Aug 25 21:50:54 system pluto[19911]: "LAN"[5] 95.96.10.129 #15: initiating Main Mode to replace #14
- Aug 25 22:04:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #15: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 25 22:04:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #15: starting keying attempt 4 of an unlimited number
- Aug 25 22:04:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #16: initiating Main Mode to replace #15
- Aug 25 22:17:14 system pluto[19911]: "LAN"[5] 95.96.10.129 #16: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 25 22:17:14 system pluto[19911]: "LAN"[5] 95.96.10.129 #16: starting keying attempt 5 of an unlimited number
- Aug 25 22:17:14 system pluto[19911]: "LAN"[5] 95.96.10.129 #17: initiating Main Mode to replace #16
- Aug 25 22:30:24 system pluto[19911]: "LAN"[5] 95.96.10.129 #17: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 25 22:30:24 system pluto[19911]: "LAN"[5] 95.96.10.129 #17: starting keying attempt 6 of an unlimited number
- Aug 25 22:30:24 system pluto[19911]: "LAN"[5] 95.96.10.129 #18: initiating Main Mode to replace #17
- Aug 25 22:43:34 system pluto[19911]: "LAN"[5] 95.96.10.129 #18: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 25 22:43:34 system pluto[19911]: "LAN"[5] 95.96.10.129 #18: starting keying attempt 7 of an unlimited number
- Aug 25 22:43:34 system pluto[19911]: "LAN"[5] 95.96.10.129 #19: initiating Main Mode to replace #18
- Aug 25 22:56:44 system pluto[19911]: "LAN"[5] 95.96.10.129 #19: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 25 22:56:44 system pluto[19911]: "LAN"[5] 95.96.10.129 #19: starting keying attempt 8 of an unlimited number
- Aug 25 22:56:44 system pluto[19911]: "LAN"[5] 95.96.10.129 #20: initiating Main Mode to replace #19
- Aug 25 23:09:54 system pluto[19911]: "LAN"[5] 95.96.10.129 #20: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 25 23:09:54 system pluto[19911]: "LAN"[5] 95.96.10.129 #20: starting keying attempt 9 of an unlimited number
- Aug 25 23:09:54 system pluto[19911]: "LAN"[5] 95.96.10.129 #21: initiating Main Mode to replace #20
- Aug 25 23:23:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #21: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 25 23:23:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #21: starting keying attempt 10 of an unlimited number
- Aug 25 23:23:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #22: initiating Main Mode to replace #21
- Aug 25 23:36:14 system pluto[19911]: "LAN"[5] 95.96.10.129 #22: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 25 23:36:14 system pluto[19911]: "LAN"[5] 95.96.10.129 #22: starting keying attempt 11 of an unlimited number
- Aug 25 23:36:14 system pluto[19911]: "LAN"[5] 95.96.10.129 #23: initiating Main Mode to replace #22
- Aug 25 23:49:24 system pluto[19911]: "LAN"[5] 95.96.10.129 #23: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 25 23:49:24 system pluto[19911]: "LAN"[5] 95.96.10.129 #23: starting keying attempt 12 of an unlimited number
- Aug 25 23:49:24 system pluto[19911]: "LAN"[5] 95.96.10.129 #24: initiating Main Mode to replace #23
- Aug 26 00:02:34 system pluto[19911]: "LAN"[5] 95.96.10.129 #24: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 00:02:34 system pluto[19911]: "LAN"[5] 95.96.10.129 #24: starting keying attempt 13 of an unlimited number
- Aug 26 00:02:34 system pluto[19911]: "LAN"[5] 95.96.10.129 #25: initiating Main Mode to replace #24
- Aug 26 00:15:44 system pluto[19911]: "LAN"[5] 95.96.10.129 #25: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 00:15:44 system pluto[19911]: "LAN"[5] 95.96.10.129 #25: starting keying attempt 14 of an unlimited number
- Aug 26 00:15:44 system pluto[19911]: "LAN"[5] 95.96.10.129 #26: initiating Main Mode to replace #25
- Aug 26 00:28:54 system pluto[19911]: "LAN"[5] 95.96.10.129 #26: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 00:28:54 system pluto[19911]: "LAN"[5] 95.96.10.129 #26: starting keying attempt 15 of an unlimited number
- Aug 26 00:28:54 system pluto[19911]: "LAN"[5] 95.96.10.129 #27: initiating Main Mode to replace #26
- Aug 26 00:42:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #27: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 00:42:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #27: starting keying attempt 16 of an unlimited number
- Aug 26 00:42:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #28: initiating Main Mode to replace #27
- Aug 26 00:55:14 system pluto[19911]: "LAN"[5] 95.96.10.129 #28: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 00:55:14 system pluto[19911]: "LAN"[5] 95.96.10.129 #28: starting keying attempt 17 of an unlimited number
- Aug 26 00:55:14 system pluto[19911]: "LAN"[5] 95.96.10.129 #29: initiating Main Mode to replace #28
- Aug 26 01:08:24 system pluto[19911]: "LAN"[5] 95.96.10.129 #29: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 01:08:24 system pluto[19911]: "LAN"[5] 95.96.10.129 #29: starting keying attempt 18 of an unlimited number
- Aug 26 01:08:24 system pluto[19911]: "LAN"[5] 95.96.10.129 #30: initiating Main Mode to replace #29
- Aug 26 01:21:34 system pluto[19911]: "LAN"[5] 95.96.10.129 #30: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 01:21:34 system pluto[19911]: "LAN"[5] 95.96.10.129 #30: starting keying attempt 19 of an unlimited number
- Aug 26 01:21:34 system pluto[19911]: "LAN"[5] 95.96.10.129 #31: initiating Main Mode to replace #30
- Aug 26 01:34:44 system pluto[19911]: "LAN"[5] 95.96.10.129 #31: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 01:34:44 system pluto[19911]: "LAN"[5] 95.96.10.129 #31: starting keying attempt 20 of an unlimited number
- Aug 26 01:34:44 system pluto[19911]: "LAN"[5] 95.96.10.129 #32: initiating Main Mode to replace #31
- Aug 26 01:47:54 system pluto[19911]: "LAN"[5] 95.96.10.129 #32: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 01:47:54 system pluto[19911]: "LAN"[5] 95.96.10.129 #32: starting keying attempt 21 of an unlimited number
- Aug 26 01:47:54 system pluto[19911]: "LAN"[5] 95.96.10.129 #33: initiating Main Mode to replace #32
- Aug 26 02:01:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #33: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 02:01:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #33: starting keying attempt 22 of an unlimited number
- Aug 26 02:01:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #34: initiating Main Mode to replace #33
- Aug 26 02:14:14 system pluto[19911]: "LAN"[5] 95.96.10.129 #34: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 02:14:14 system pluto[19911]: "LAN"[5] 95.96.10.129 #34: starting keying attempt 23 of an unlimited number
- Aug 26 02:14:14 system pluto[19911]: "LAN"[5] 95.96.10.129 #35: initiating Main Mode to replace #34
- Aug 26 02:27:24 system pluto[19911]: "LAN"[5] 95.96.10.129 #35: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 02:27:24 system pluto[19911]: "LAN"[5] 95.96.10.129 #35: starting keying attempt 24 of an unlimited number
- Aug 26 02:27:24 system pluto[19911]: "LAN"[5] 95.96.10.129 #36: initiating Main Mode to replace #35
- Aug 26 02:40:34 system pluto[19911]: "LAN"[5] 95.96.10.129 #36: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 02:40:34 system pluto[19911]: "LAN"[5] 95.96.10.129 #36: starting keying attempt 25 of an unlimited number
- Aug 26 02:40:34 system pluto[19911]: "LAN"[5] 95.96.10.129 #37: initiating Main Mode to replace #36
- Aug 26 02:53:44 system pluto[19911]: "LAN"[5] 95.96.10.129 #37: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 02:53:44 system pluto[19911]: "LAN"[5] 95.96.10.129 #37: starting keying attempt 26 of an unlimited number
- Aug 26 02:53:44 system pluto[19911]: "LAN"[5] 95.96.10.129 #38: initiating Main Mode to replace #37
- Aug 26 03:06:54 system pluto[19911]: "LAN"[5] 95.96.10.129 #38: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 03:06:54 system pluto[19911]: "LAN"[5] 95.96.10.129 #38: starting keying attempt 27 of an unlimited number
- Aug 26 03:06:54 system pluto[19911]: "LAN"[5] 95.96.10.129 #39: initiating Main Mode to replace #38
- Aug 26 03:20:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #39: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 03:20:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #39: starting keying attempt 28 of an unlimited number
- Aug 26 03:20:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #40: initiating Main Mode to replace #39
- Aug 26 03:33:14 system pluto[19911]: "LAN"[5] 95.96.10.129 #40: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 03:33:14 system pluto[19911]: "LAN"[5] 95.96.10.129 #40: starting keying attempt 29 of an unlimited number
- Aug 26 03:33:14 system pluto[19911]: "LAN"[5] 95.96.10.129 #41: initiating Main Mode to replace #40
- Aug 26 03:41:19 system pluto[19911]: "LAN"[5] 95.96.10.129 #11: IPsec SA expired (LATEST!)
- Aug 26 03:46:24 system pluto[19911]: "LAN"[5] 95.96.10.129 #41: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 03:46:24 system pluto[19911]: "LAN"[5] 95.96.10.129 #41: starting keying attempt 30 of an unlimited number
- Aug 26 03:46:24 system pluto[19911]: "LAN"[5] 95.96.10.129 #42: initiating Main Mode to replace #41
- Aug 26 03:59:34 system pluto[19911]: "LAN"[5] 95.96.10.129 #42: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 03:59:34 system pluto[19911]: "LAN"[5] 95.96.10.129 #42: starting keying attempt 31 of an unlimited number
- Aug 26 03:59:34 system pluto[19911]: "LAN"[5] 95.96.10.129 #43: initiating Main Mode to replace #42
- Aug 26 04:12:44 system pluto[19911]: "LAN"[5] 95.96.10.129 #43: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 04:12:44 system pluto[19911]: "LAN"[5] 95.96.10.129 #43: starting keying attempt 32 of an unlimited number
- Aug 26 04:12:44 system pluto[19911]: "LAN"[5] 95.96.10.129 #44: initiating Main Mode to replace #43
- Aug 26 04:25:54 system pluto[19911]: "LAN"[5] 95.96.10.129 #44: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 04:25:54 system pluto[19911]: "LAN"[5] 95.96.10.129 #44: starting keying attempt 33 of an unlimited number
- Aug 26 04:25:54 system pluto[19911]: "LAN"[5] 95.96.10.129 #45: initiating Main Mode to replace #44
- Aug 26 04:39:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #45: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 04:39:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #45: starting keying attempt 34 of an unlimited number
- Aug 26 04:39:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #46: initiating Main Mode to replace #45
- Aug 26 04:52:14 system pluto[19911]: "LAN"[5] 95.96.10.129 #46: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 04:52:14 system pluto[19911]: "LAN"[5] 95.96.10.129 #46: starting keying attempt 35 of an unlimited number
- Aug 26 04:52:14 system pluto[19911]: "LAN"[5] 95.96.10.129 #47: initiating Main Mode to replace #46
- Aug 26 05:05:24 system pluto[19911]: "LAN"[5] 95.96.10.129 #47: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 05:05:24 system pluto[19911]: "LAN"[5] 95.96.10.129 #47: starting keying attempt 36 of an unlimited number
- Aug 26 05:05:24 system pluto[19911]: "LAN"[5] 95.96.10.129 #48: initiating Main Mode to replace #47
- Aug 26 05:18:34 system pluto[19911]: "LAN"[5] 95.96.10.129 #48: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 05:18:34 system pluto[19911]: "LAN"[5] 95.96.10.129 #48: starting keying attempt 37 of an unlimited number
- Aug 26 05:18:34 system pluto[19911]: "LAN"[5] 95.96.10.129 #49: initiating Main Mode to replace #48
- Aug 26 05:31:44 system pluto[19911]: "LAN"[5] 95.96.10.129 #49: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 05:31:44 system pluto[19911]: "LAN"[5] 95.96.10.129 #49: starting keying attempt 38 of an unlimited number
- Aug 26 05:31:44 system pluto[19911]: "LAN"[5] 95.96.10.129 #50: initiating Main Mode to replace #49
- Aug 26 05:44:54 system pluto[19911]: "LAN"[5] 95.96.10.129 #50: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 05:44:54 system pluto[19911]: "LAN"[5] 95.96.10.129 #50: starting keying attempt 39 of an unlimited number
- Aug 26 05:44:54 system pluto[19911]: "LAN"[5] 95.96.10.129 #51: initiating Main Mode to replace #50
- Aug 26 05:58:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #51: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 05:58:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #51: starting keying attempt 40 of an unlimited number
- Aug 26 05:58:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #52: initiating Main Mode to replace #51
- Aug 26 06:11:14 system pluto[19911]: "LAN"[5] 95.96.10.129 #52: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 06:11:14 system pluto[19911]: "LAN"[5] 95.96.10.129 #52: starting keying attempt 41 of an unlimited number
- Aug 26 06:11:14 system pluto[19911]: "LAN"[5] 95.96.10.129 #53: initiating Main Mode to replace #52
- Aug 26 06:24:24 system pluto[19911]: "LAN"[5] 95.96.10.129 #53: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 06:24:24 system pluto[19911]: "LAN"[5] 95.96.10.129 #53: starting keying attempt 42 of an unlimited number
- Aug 26 06:24:24 system pluto[19911]: "LAN"[5] 95.96.10.129 #54: initiating Main Mode to replace #53
- Aug 26 06:37:34 system pluto[19911]: "LAN"[5] 95.96.10.129 #54: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 06:37:34 system pluto[19911]: "LAN"[5] 95.96.10.129 #54: starting keying attempt 43 of an unlimited number
- Aug 26 06:37:34 system pluto[19911]: "LAN"[5] 95.96.10.129 #55: initiating Main Mode to replace #54
- Aug 26 06:50:44 system pluto[19911]: "LAN"[5] 95.96.10.129 #55: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 06:50:44 system pluto[19911]: "LAN"[5] 95.96.10.129 #55: starting keying attempt 44 of an unlimited number
- Aug 26 06:50:44 system pluto[19911]: "LAN"[5] 95.96.10.129 #56: initiating Main Mode to replace #55
- Aug 26 07:03:54 system pluto[19911]: "LAN"[5] 95.96.10.129 #56: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 07:03:54 system pluto[19911]: "LAN"[5] 95.96.10.129 #56: starting keying attempt 45 of an unlimited number
- Aug 26 07:03:54 system pluto[19911]: "LAN"[5] 95.96.10.129 #57: initiating Main Mode to replace #56
- Aug 26 07:17:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #57: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 07:17:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #57: starting keying attempt 46 of an unlimited number
- Aug 26 07:17:04 system pluto[19911]: "LAN"[5] 95.96.10.129 #58: initiating Main Mode to replace #57
- Aug 26 07:30:14 system pluto[19911]: "LAN"[5] 95.96.10.129 #58: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 07:30:14 system pluto[19911]: "LAN"[5] 95.96.10.129 #58: starting keying attempt 47 of an unlimited number
- Aug 26 07:30:14 system pluto[19911]: "LAN"[5] 95.96.10.129 #59: initiating Main Mode to replace #58
- Aug 26 07:43:24 system pluto[19911]: "LAN"[5] 95.96.10.129 #59: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 07:43:24 system pluto[19911]: "LAN"[5] 95.96.10.129 #59: starting keying attempt 48 of an unlimited number
- Aug 26 07:43:24 system pluto[19911]: "LAN"[5] 95.96.10.129 #60: initiating Main Mode to replace #59
- Aug 26 07:56:34 system pluto[19911]: "LAN"[5] 95.96.10.129 #60: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 07:56:34 system pluto[19911]: "LAN"[5] 95.96.10.129 #60: starting keying attempt 49 of an unlimited number
- Aug 26 07:56:34 system pluto[19911]: "LAN"[5] 95.96.10.129 #61: initiating Main Mode to replace #60
- Aug 26 08:09:47 system pluto[19911]: "LAN"[5] 95.96.10.129 #61: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 08:09:47 system pluto[19911]: "LAN"[5] 95.96.10.129 #61: starting keying attempt 50 of an unlimited number
- Aug 26 08:09:47 system pluto[19911]: "LAN"[5] 95.96.10.129 #62: initiating Main Mode to replace #61
- Aug 26 08:22:57 system pluto[19911]: "LAN"[5] 95.96.10.129 #62: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 08:22:57 system pluto[19911]: "LAN"[5] 95.96.10.129 #62: starting keying attempt 51 of an unlimited number
- Aug 26 08:22:57 system pluto[19911]: "LAN"[5] 95.96.10.129 #63: initiating Main Mode to replace #62
- Aug 26 08:36:07 system pluto[19911]: "LAN"[5] 95.96.10.129 #63: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 08:36:07 system pluto[19911]: "LAN"[5] 95.96.10.129 #63: starting keying attempt 52 of an unlimited number
- Aug 26 08:36:07 system pluto[19911]: "LAN"[5] 95.96.10.129 #64: initiating Main Mode to replace #63
- Aug 26 08:49:17 system pluto[19911]: "LAN"[5] 95.96.10.129 #64: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 08:49:17 system pluto[19911]: "LAN"[5] 95.96.10.129 #64: starting keying attempt 53 of an unlimited number
- Aug 26 08:49:17 system pluto[19911]: "LAN"[5] 95.96.10.129 #65: initiating Main Mode to replace #64
- Aug 26 09:02:27 system pluto[19911]: "LAN"[5] 95.96.10.129 #65: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 09:02:27 system pluto[19911]: "LAN"[5] 95.96.10.129 #65: starting keying attempt 54 of an unlimited number
- Aug 26 09:02:27 system pluto[19911]: "LAN"[5] 95.96.10.129 #66: initiating Main Mode to replace #65
- Aug 26 09:15:37 system pluto[19911]: "LAN"[5] 95.96.10.129 #66: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 09:15:37 system pluto[19911]: "LAN"[5] 95.96.10.129 #66: starting keying attempt 55 of an unlimited number
- Aug 26 09:15:37 system pluto[19911]: "LAN"[5] 95.96.10.129 #67: initiating Main Mode to replace #66
- Aug 26 09:28:47 system pluto[19911]: "LAN"[5] 95.96.10.129 #67: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 09:28:47 system pluto[19911]: "LAN"[5] 95.96.10.129 #67: starting keying attempt 56 of an unlimited number
- Aug 26 09:28:47 system pluto[19911]: "LAN"[5] 95.96.10.129 #68: initiating Main Mode to replace #67
- Aug 26 09:41:57 system pluto[19911]: "LAN"[5] 95.96.10.129 #68: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 09:41:57 system pluto[19911]: "LAN"[5] 95.96.10.129 #68: starting keying attempt 57 of an unlimited number
- Aug 26 09:41:57 system pluto[19911]: "LAN"[5] 95.96.10.129 #69: initiating Main Mode to replace #68
- Aug 26 09:55:07 system pluto[19911]: "LAN"[5] 95.96.10.129 #69: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 09:55:07 system pluto[19911]: "LAN"[5] 95.96.10.129 #69: starting keying attempt 58 of an unlimited number
- Aug 26 09:55:07 system pluto[19911]: "LAN"[5] 95.96.10.129 #70: initiating Main Mode to replace #69
- Aug 26 10:08:17 system pluto[19911]: "LAN"[5] 95.96.10.129 #70: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 10:08:17 system pluto[19911]: "LAN"[5] 95.96.10.129 #70: starting keying attempt 59 of an unlimited number
- Aug 26 10:08:17 system pluto[19911]: "LAN"[5] 95.96.10.129 #71: initiating Main Mode to replace #70
- Aug 26 10:21:27 system pluto[19911]: "LAN"[5] 95.96.10.129 #71: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 10:21:27 system pluto[19911]: "LAN"[5] 95.96.10.129 #71: starting keying attempt 60 of an unlimited number
- Aug 26 10:21:27 system pluto[19911]: "LAN"[5] 95.96.10.129 #72: initiating Main Mode to replace #71
- Aug 26 10:34:37 system pluto[19911]: "LAN"[5] 95.96.10.129 #72: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 10:34:37 system pluto[19911]: "LAN"[5] 95.96.10.129 #72: starting keying attempt 61 of an unlimited number
- Aug 26 10:34:37 system pluto[19911]: "LAN"[5] 95.96.10.129 #73: initiating Main Mode to replace #72
- Aug 26 10:47:47 system pluto[19911]: "LAN"[5] 95.96.10.129 #73: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 10:47:47 system pluto[19911]: "LAN"[5] 95.96.10.129 #73: starting keying attempt 62 of an unlimited number
- Aug 26 10:47:47 system pluto[19911]: "LAN"[5] 95.96.10.129 #74: initiating Main Mode to replace #73
- Aug 26 11:00:57 system pluto[19911]: "LAN"[5] 95.96.10.129 #74: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 11:00:57 system pluto[19911]: "LAN"[5] 95.96.10.129 #74: starting keying attempt 63 of an unlimited number
- Aug 26 11:00:57 system pluto[19911]: "LAN"[5] 95.96.10.129 #75: initiating Main Mode to replace #74
- Aug 26 11:14:07 system pluto[19911]: "LAN"[5] 95.96.10.129 #75: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 11:14:07 system pluto[19911]: "LAN"[5] 95.96.10.129 #75: starting keying attempt 64 of an unlimited number
- Aug 26 11:14:07 system pluto[19911]: "LAN"[5] 95.96.10.129 #76: initiating Main Mode to replace #75
- Aug 26 11:27:17 system pluto[19911]: "LAN"[5] 95.96.10.129 #76: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 11:27:17 system pluto[19911]: "LAN"[5] 95.96.10.129 #76: starting keying attempt 65 of an unlimited number
- Aug 26 11:27:17 system pluto[19911]: "LAN"[5] 95.96.10.129 #77: initiating Main Mode to replace #76
- Aug 26 11:31:39 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [Openswan (this version) 2.6.28 ]
- Aug 26 11:31:39 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [Dead Peer Detection]
- Aug 26 11:31:39 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [RFC 3947] method set to=109
- Aug 26 11:31:39 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 109
- Aug 26 11:31:39 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 109
- Aug 26 11:31:39 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 109
- Aug 26 11:31:39 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
- Aug 26 11:31:39 system pluto[19911]: "LAN"[5] 95.96.10.129 #78: responding to Main Mode from unknown peer 95.96.10.129
- Aug 26 11:31:39 system pluto[19911]: "LAN"[5] 95.96.10.129 #78: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
- Aug 26 11:31:39 system pluto[19911]: "LAN"[5] 95.96.10.129 #78: STATE_MAIN_R1: sent MR1, expecting MI2
- Aug 26 11:31:39 system pluto[19911]: "LAN"[5] 95.96.10.129 #78: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): peer is NATed
- Aug 26 11:31:39 system pluto[19911]: "LAN"[5] 95.96.10.129 #78: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
- Aug 26 11:31:39 system pluto[19911]: "LAN"[5] 95.96.10.129 #78: STATE_MAIN_R2: sent MR2, expecting MI3
- Aug 26 11:31:39 system pluto[19911]: "LAN"[5] 95.96.10.129 #78: Main mode peer ID is ID_DER_ASN1_DN: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl'
- Aug 26 11:31:39 system pluto[19911]: "LAN"[5] 95.96.10.129 #78: I am sending my cert
- Aug 26 11:31:39 system pluto[19911]: "LAN"[5] 95.96.10.129 #78: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
- Aug 26 11:31:39 system pluto[19911]: "LAN"[5] 95.96.10.129 #78: new NAT mapping for #78, was 95.96.10.129:500, now 95.96.10.129:4500
- Aug 26 11:31:39 system pluto[19911]: "LAN"[5] 95.96.10.129 #78: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=aes_128 prf=oakley_sha group=modp2048}
- Aug 26 11:31:39 system pluto[19911]: "LAN"[5] 95.96.10.129 #78: the peer proposed: 10.97.10.0/24:0/0 -> 10.81.9.204/32:0/0
- Aug 26 11:31:39 system pluto[19911]: "LAN"[6] 95.96.10.129 #79: responding to Quick Mode proposal {msgid:d6aad545}
- Aug 26 11:31:39 system pluto[19911]: "LAN"[6] 95.96.10.129 #79: us: 10.97.10.0/24===85.145.148.106<85.145.148.106>[C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Left1024, E=admin@testingcorporation.nl,+S=C]
- Aug 26 11:31:39 system pluto[19911]: "LAN"[6] 95.96.10.129 #79: them: 95.96.10.129[C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl,+S=C]===10.81.9.204/32
- Aug 26 11:31:39 system pluto[19911]: "LAN"[6] 95.96.10.129 #79: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
- Aug 26 11:31:39 system pluto[19911]: "LAN"[6] 95.96.10.129 #79: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
- Aug 26 11:31:39 system pluto[19911]: "LAN"[6] 95.96.10.129 #79: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
- Aug 26 11:31:39 system pluto[19911]: "LAN"[6] 95.96.10.129 #79: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP=>0xad585a15 <0xad22afb1 xfrm=AES_128-HMAC_SHA1 NATOA=none NATD=95.96.10.129:4500 DPD=none}
- Aug 26 11:31:47 system pluto[19911]: "LAN"[5] 95.96.10.129 #77: received Vendor ID payload [Openswan (this version) 2.6.28 ]
- Aug 26 11:31:47 system pluto[19911]: "LAN"[5] 95.96.10.129 #77: received Vendor ID payload [Dead Peer Detection]
- Aug 26 11:31:47 system pluto[19911]: "LAN"[5] 95.96.10.129 #77: received Vendor ID payload [RFC 3947] method set to=109
- Aug 26 11:31:47 system pluto[19911]: "LAN"[5] 95.96.10.129 #77: enabling possible NAT-traversal with method 4
- Aug 26 11:31:47 system pluto[19911]: "LAN"[5] 95.96.10.129 #77: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
- Aug 26 11:31:47 system pluto[19911]: "LAN"[5] 95.96.10.129 #77: STATE_MAIN_I2: sent MI2, expecting MR2
- Aug 26 11:31:47 system pluto[19911]: "LAN"[5] 95.96.10.129 #77: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): peer is NATed
- Aug 26 11:31:47 system pluto[19911]: "LAN"[5] 95.96.10.129 #77: I am sending my cert
- Aug 26 11:31:47 system pluto[19911]: "LAN"[5] 95.96.10.129 #77: I am sending a certificate request
- Aug 26 11:31:47 system pluto[19911]: "LAN"[5] 95.96.10.129 #77: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
- Aug 26 11:31:47 system pluto[19911]: "LAN"[5] 95.96.10.129 #77: STATE_MAIN_I3: sent MI3, expecting MR3
- Aug 26 11:31:47 system pluto[19911]: "LAN"[5] 95.96.10.129 #77: received Vendor ID payload [CAN-IKEv2]
- Aug 26 11:31:47 system pluto[19911]: "LAN"[5] 95.96.10.129 #77: Main mode peer ID is ID_DER_ASN1_DN: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl'
- Aug 26 11:31:47 system pluto[19911]: "LAN"[5] 95.96.10.129 #77: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
- Aug 26 11:31:47 system pluto[19911]: "LAN"[5] 95.96.10.129 #77: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=aes_128 prf=oakley_sha group=modp2048}
- Aug 26 11:31:47 system pluto[19911]: "LAN"[5] 95.96.10.129 #80: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+IKEv2ALLOW to replace #11 {using isakmp#77 msgid:7c188bcd proposal=defaults pfsgroup=OAKLEY_GROUP_MODP2048}
- Aug 26 11:31:47 system pluto[19911]: "LAN"[5] 95.96.10.129 #80: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
- Aug 26 11:31:47 system pluto[19911]: "LAN"[5] 95.96.10.129 #80: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP=>0x21bdff69 <0x099a2dc4 xfrm=AES_128-HMAC_SHA1 NATOA=none NATD=95.96.10.129:4500 DPD=none}
- Aug 26 12:20:19 system pluto[19911]: "LAN"[5] 95.96.10.129 #81: initiating Main Mode to replace #77
- Aug 26 12:27:17 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [Openswan (this version) 2.6.28 ]
- Aug 26 12:27:17 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [Dead Peer Detection]
- Aug 26 12:27:17 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [RFC 3947] method set to=109
- Aug 26 12:27:17 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 109
- Aug 26 12:27:17 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 109
- Aug 26 12:27:17 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 109
- Aug 26 12:27:17 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
- Aug 26 12:27:17 system pluto[19911]: "LAN"[6] 95.96.10.129 #82: responding to Main Mode from unknown peer 95.96.10.129
- Aug 26 12:27:17 system pluto[19911]: "LAN"[6] 95.96.10.129 #82: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
- Aug 26 12:27:17 system pluto[19911]: "LAN"[6] 95.96.10.129 #82: STATE_MAIN_R1: sent MR1, expecting MI2
- Aug 26 12:27:17 system pluto[19911]: "LAN"[6] 95.96.10.129 #82: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): peer is NATed
- Aug 26 12:27:17 system pluto[19911]: "LAN"[6] 95.96.10.129 #82: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
- Aug 26 12:27:17 system pluto[19911]: "LAN"[6] 95.96.10.129 #82: STATE_MAIN_R2: sent MR2, expecting MI3
- Aug 26 12:27:17 system pluto[19911]: "LAN"[6] 95.96.10.129 #82: Main mode peer ID is ID_DER_ASN1_DN: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl'
- Aug 26 12:27:17 system pluto[19911]: "LAN"[6] 95.96.10.129 #82: I am sending my cert
- Aug 26 12:27:17 system pluto[19911]: "LAN"[6] 95.96.10.129 #82: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
- Aug 26 12:27:17 system pluto[19911]: "LAN"[6] 95.96.10.129 #82: new NAT mapping for #82, was 95.96.10.129:500, now 95.96.10.129:4500
- Aug 26 12:27:17 system pluto[19911]: "LAN"[6] 95.96.10.129 #82: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=aes_128 prf=oakley_sha group=modp2048}
- Aug 26 12:27:29 system pluto[19911]: "LAN"[5] 95.96.10.129 #81: received Vendor ID payload [Openswan (this version) 2.6.28 ]
- Aug 26 12:27:29 system pluto[19911]: "LAN"[5] 95.96.10.129 #81: received Vendor ID payload [Dead Peer Detection]
- Aug 26 12:27:29 system pluto[19911]: "LAN"[5] 95.96.10.129 #81: received Vendor ID payload [RFC 3947] method set to=109
- Aug 26 12:27:29 system pluto[19911]: "LAN"[5] 95.96.10.129 #81: enabling possible NAT-traversal with method 4
- Aug 26 12:27:29 system pluto[19911]: "LAN"[5] 95.96.10.129 #81: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
- Aug 26 12:27:29 system pluto[19911]: "LAN"[5] 95.96.10.129 #81: STATE_MAIN_I2: sent MI2, expecting MR2
- Aug 26 12:27:29 system pluto[19911]: "LAN"[5] 95.96.10.129 #81: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): peer is NATed
- Aug 26 12:27:29 system pluto[19911]: "LAN"[5] 95.96.10.129 #81: I am sending my cert
- Aug 26 12:27:29 system pluto[19911]: "LAN"[5] 95.96.10.129 #81: I am sending a certificate request
- Aug 26 12:27:29 system pluto[19911]: "LAN"[5] 95.96.10.129 #81: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
- Aug 26 12:27:29 system pluto[19911]: "LAN"[5] 95.96.10.129 #81: STATE_MAIN_I3: sent MI3, expecting MR3
- Aug 26 12:27:29 system pluto[19911]: "LAN"[5] 95.96.10.129 #81: received Vendor ID payload [CAN-IKEv2]
- Aug 26 12:27:29 system pluto[19911]: "LAN"[5] 95.96.10.129 #81: Main mode peer ID is ID_DER_ASN1_DN: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl'
- Aug 26 12:27:29 system pluto[19911]: "LAN"[5] 95.96.10.129 #81: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
- Aug 26 12:27:29 system pluto[19911]: "LAN"[5] 95.96.10.129 #81: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=aes_128 prf=oakley_sha group=modp2048}
- Aug 26 12:31:39 system pluto[19911]: "LAN"[5] 95.96.10.129 #78: received Delete SA payload: deleting ISAKMP State #78
- Aug 26 12:31:39 system pluto[19911]: packet from 95.96.10.129:4500: received and ignored informational message
- Aug 26 12:31:47 system pluto[19911]: packet from 95.96.10.129:4500: Informational Exchange is for an unknown (expired?) SA with MSGID:0x9e17f018
- Aug 26 13:12:23 system pluto[19911]: "LAN"[5] 95.96.10.129 #83: initiating Main Mode to replace #81
- Aug 26 13:22:47 system pluto[19911]: "LAN"[6] 95.96.10.129 #84: initiating Main Mode to replace #82
- Aug 26 13:23:00 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [Openswan (this version) 2.6.28 ]
- Aug 26 13:23:00 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [Dead Peer Detection]
- Aug 26 13:23:00 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [RFC 3947] method set to=109
- Aug 26 13:23:00 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 109
- Aug 26 13:23:00 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 109
- Aug 26 13:23:00 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 109
- Aug 26 13:23:00 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
- Aug 26 13:23:00 system pluto[19911]: "LAN"[6] 95.96.10.129 #85: responding to Main Mode from unknown peer 95.96.10.129
- Aug 26 13:23:00 system pluto[19911]: "LAN"[6] 95.96.10.129 #85: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
- Aug 26 13:23:00 system pluto[19911]: "LAN"[6] 95.96.10.129 #85: STATE_MAIN_R1: sent MR1, expecting MI2
- Aug 26 13:23:00 system pluto[19911]: "LAN"[6] 95.96.10.129 #85: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): peer is NATed
- Aug 26 13:23:00 system pluto[19911]: "LAN"[6] 95.96.10.129 #85: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
- Aug 26 13:23:00 system pluto[19911]: "LAN"[6] 95.96.10.129 #85: STATE_MAIN_R2: sent MR2, expecting MI3
- Aug 26 13:23:00 system pluto[19911]: "LAN"[6] 95.96.10.129 #85: Main mode peer ID is ID_DER_ASN1_DN: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl'
- Aug 26 13:23:00 system pluto[19911]: "LAN"[6] 95.96.10.129 #85: I am sending my cert
- Aug 26 13:23:00 system pluto[19911]: "LAN"[6] 95.96.10.129 #85: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
- Aug 26 13:23:00 system pluto[19911]: "LAN"[6] 95.96.10.129 #85: new NAT mapping for #85, was 95.96.10.129:500, now 95.96.10.129:4500
- Aug 26 13:23:00 system pluto[19911]: "LAN"[6] 95.96.10.129 #85: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=aes_128 prf=oakley_sha group=modp2048}
- Aug 26 13:23:17 system pluto[19911]: "LAN"[6] 95.96.10.129 #84: received Vendor ID payload [Openswan (this version) 2.6.28 ]
- Aug 26 13:23:17 system pluto[19911]: "LAN"[6] 95.96.10.129 #84: received Vendor ID payload [Dead Peer Detection]
- Aug 26 13:23:17 system pluto[19911]: "LAN"[6] 95.96.10.129 #84: received Vendor ID payload [RFC 3947] method set to=109
- Aug 26 13:23:17 system pluto[19911]: "LAN"[6] 95.96.10.129 #84: enabling possible NAT-traversal with method 4
- Aug 26 13:23:17 system pluto[19911]: "LAN"[6] 95.96.10.129 #84: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
- Aug 26 13:23:17 system pluto[19911]: "LAN"[6] 95.96.10.129 #84: STATE_MAIN_I2: sent MI2, expecting MR2
- Aug 26 13:23:17 system pluto[19911]: "LAN"[6] 95.96.10.129 #84: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): peer is NATed
- Aug 26 13:23:17 system pluto[19911]: "LAN"[6] 95.96.10.129 #84: I am sending my cert
- Aug 26 13:23:17 system pluto[19911]: "LAN"[6] 95.96.10.129 #84: I am sending a certificate request
- Aug 26 13:23:17 system pluto[19911]: "LAN"[6] 95.96.10.129 #84: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
- Aug 26 13:23:17 system pluto[19911]: "LAN"[6] 95.96.10.129 #84: STATE_MAIN_I3: sent MI3, expecting MR3
- Aug 26 13:23:17 system pluto[19911]: "LAN"[6] 95.96.10.129 #84: received Vendor ID payload [CAN-IKEv2]
- Aug 26 13:23:17 system pluto[19911]: "LAN"[6] 95.96.10.129 #84: Main mode peer ID is ID_DER_ASN1_DN: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl'
- Aug 26 13:23:17 system pluto[19911]: "LAN"[6] 95.96.10.129 #84: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
- Aug 26 13:23:17 system pluto[19911]: "LAN"[6] 95.96.10.129 #84: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=aes_128 prf=oakley_sha group=modp2048}
- Aug 26 13:23:33 system pluto[19911]: "LAN"[5] 95.96.10.129 #83: received Vendor ID payload [Openswan (this version) 2.6.28 ]
- Aug 26 13:23:33 system pluto[19911]: "LAN"[5] 95.96.10.129 #83: received Vendor ID payload [Dead Peer Detection]
- Aug 26 13:23:33 system pluto[19911]: "LAN"[5] 95.96.10.129 #83: received Vendor ID payload [RFC 3947] method set to=109
- Aug 26 13:23:33 system pluto[19911]: "LAN"[5] 95.96.10.129 #83: enabling possible NAT-traversal with method 4
- Aug 26 13:23:33 system pluto[19911]: "LAN"[5] 95.96.10.129 #83: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
- Aug 26 13:23:33 system pluto[19911]: "LAN"[5] 95.96.10.129 #83: STATE_MAIN_I2: sent MI2, expecting MR2
- Aug 26 13:23:33 system pluto[19911]: "LAN"[5] 95.96.10.129 #83: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): peer is NATed
- Aug 26 13:23:33 system pluto[19911]: "LAN"[5] 95.96.10.129 #83: I am sending my cert
- Aug 26 13:23:33 system pluto[19911]: "LAN"[5] 95.96.10.129 #83: I am sending a certificate request
- Aug 26 13:23:33 system pluto[19911]: "LAN"[5] 95.96.10.129 #83: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
- Aug 26 13:23:33 system pluto[19911]: "LAN"[5] 95.96.10.129 #83: STATE_MAIN_I3: sent MI3, expecting MR3
- Aug 26 13:23:33 system pluto[19911]: "LAN"[5] 95.96.10.129 #83: received Vendor ID payload [CAN-IKEv2]
- Aug 26 13:23:33 system pluto[19911]: "LAN"[5] 95.96.10.129 #83: Main mode peer ID is ID_DER_ASN1_DN: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl'
- Aug 26 13:23:33 system pluto[19911]: "LAN"[5] 95.96.10.129 #83: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
- Aug 26 13:23:33 system pluto[19911]: "LAN"[5] 95.96.10.129 #83: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=aes_128 prf=oakley_sha group=modp2048}
- Aug 26 13:27:17 system pluto[19911]: packet from 95.96.10.129:4500: Informational Exchange is for an unknown (expired?) SA with MSGID:0x46f7947e
- Aug 26 13:27:29 system pluto[19911]: packet from 95.96.10.129:4500: Informational Exchange is for an unknown (expired?) SA with MSGID:0x96284328
- Aug 26 14:07:42 system pluto[19911]: "LAN"[6] 95.96.10.129 #86: initiating Main Mode to replace #84
- Aug 26 14:13:48 system pluto[19911]: "LAN"[5] 95.96.10.129 #87: initiating Main Mode to replace #83
- Aug 26 14:20:52 system pluto[19911]: "LAN"[6] 95.96.10.129 #86: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 14:20:52 system pluto[19911]: "LAN"[6] 95.96.10.129 #86: starting keying attempt 2 of an unlimited number
- Aug 26 14:20:52 system pluto[19911]: "LAN"[6] 95.96.10.129 #88: initiating Main Mode to replace #86
- Aug 26 14:23:17 system pluto[19911]: "LAN"[6] 95.96.10.129 #84: ISAKMP SA expired (LATEST!)
- Aug 26 14:23:33 system pluto[19911]: "LAN"[5] 95.96.10.129 #83: ISAKMP SA expired (LATEST!)
- Aug 26 14:26:58 system pluto[19911]: "LAN"[5] 95.96.10.129 #87: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 14:26:58 system pluto[19911]: "LAN"[5] 95.96.10.129 #87: starting keying attempt 2 of an unlimited number
- Aug 26 14:26:58 system pluto[19911]: "LAN"[5] 95.96.10.129 #89: initiating Main Mode to replace #87
- Aug 26 14:34:02 system pluto[19911]: "LAN"[6] 95.96.10.129 #88: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 14:34:02 system pluto[19911]: "LAN"[6] 95.96.10.129 #88: starting keying attempt 3 of an unlimited number
- Aug 26 14:34:02 system pluto[19911]: "LAN"[6] 95.96.10.129 #90: initiating Main Mode to replace #88
- Aug 26 14:40:08 system pluto[19911]: "LAN"[5] 95.96.10.129 #89: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 14:40:08 system pluto[19911]: "LAN"[5] 95.96.10.129 #89: starting keying attempt 3 of an unlimited number
- Aug 26 14:40:08 system pluto[19911]: "LAN"[5] 95.96.10.129 #91: initiating Main Mode to replace #89
- Aug 26 14:47:12 system pluto[19911]: "LAN"[6] 95.96.10.129 #90: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 14:47:12 system pluto[19911]: "LAN"[6] 95.96.10.129 #90: starting keying attempt 4 of an unlimited number
- Aug 26 14:47:12 system pluto[19911]: "LAN"[6] 95.96.10.129 #92: initiating Main Mode to replace #90
- Aug 26 14:53:18 system pluto[19911]: "LAN"[5] 95.96.10.129 #91: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 14:53:18 system pluto[19911]: "LAN"[5] 95.96.10.129 #91: starting keying attempt 4 of an unlimited number
- Aug 26 14:53:18 system pluto[19911]: "LAN"[5] 95.96.10.129 #93: initiating Main Mode to replace #91
- Aug 26 15:00:22 system pluto[19911]: "LAN"[6] 95.96.10.129 #92: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 15:00:22 system pluto[19911]: "LAN"[6] 95.96.10.129 #92: starting keying attempt 5 of an unlimited number
- Aug 26 15:00:22 system pluto[19911]: "LAN"[6] 95.96.10.129 #94: initiating Main Mode to replace #92
- Aug 26 15:06:28 system pluto[19911]: "LAN"[5] 95.96.10.129 #93: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
- Aug 26 15:06:28 system pluto[19911]: "LAN"[5] 95.96.10.129 #93: starting keying attempt 5 of an unlimited number
- Aug 26 15:06:28 system pluto[19911]: "LAN"[5] 95.96.10.129 #95: initiating Main Mode to replace #93
- Aug 26 15:11:19 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [Openswan (this version) 2.6.28 ]
- Aug 26 15:11:19 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [Dead Peer Detection]
- Aug 26 15:11:19 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [RFC 3947] method set to=109
- Aug 26 15:11:19 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 109
- Aug 26 15:11:19 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 109
- Aug 26 15:11:19 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 109
- Aug 26 15:11:19 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
- Aug 26 15:11:19 system pluto[19911]: "LAN"[6] 95.96.10.129 #96: responding to Main Mode from unknown peer 95.96.10.129
- Aug 26 15:11:19 system pluto[19911]: "LAN"[6] 95.96.10.129 #96: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
- Aug 26 15:11:19 system pluto[19911]: "LAN"[6] 95.96.10.129 #96: STATE_MAIN_R1: sent MR1, expecting MI2
- Aug 26 15:11:19 system pluto[19911]: "LAN"[6] 95.96.10.129 #96: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): peer is NATed
- Aug 26 15:11:19 system pluto[19911]: "LAN"[6] 95.96.10.129 #96: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
- Aug 26 15:11:19 system pluto[19911]: "LAN"[6] 95.96.10.129 #96: STATE_MAIN_R2: sent MR2, expecting MI3
- Aug 26 15:11:19 system pluto[19911]: "LAN"[6] 95.96.10.129 #96: Main mode peer ID is ID_DER_ASN1_DN: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl'
- Aug 26 15:11:19 system pluto[19911]: "LAN"[6] 95.96.10.129 #96: I am sending my cert
- Aug 26 15:11:19 system pluto[19911]: "LAN"[6] 95.96.10.129 #96: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
- Aug 26 15:11:19 system pluto[19911]: "LAN"[6] 95.96.10.129 #96: new NAT mapping for #96, was 95.96.10.129:500, now 95.96.10.129:4500
- Aug 26 15:11:19 system pluto[19911]: "LAN"[6] 95.96.10.129 #96: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=aes_128 prf=oakley_sha group=modp2048}
- Aug 26 15:11:19 system pluto[19911]: "LAN"[6] 95.96.10.129 #96: the peer proposed: 10.97.10.0/24:0/0 -> 10.81.9.204/32:0/0
- Aug 26 15:11:19 system pluto[19911]: "LAN"[6] 95.96.10.129 #97: responding to Quick Mode proposal {msgid:59d6b2bd}
- Aug 26 15:11:19 system pluto[19911]: "LAN"[6] 95.96.10.129 #97: us: 10.97.10.0/24===85.145.148.106<85.145.148.106>[C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Left1024, E=admin@testingcorporation.nl,+S=C]
- Aug 26 15:11:19 system pluto[19911]: "LAN"[6] 95.96.10.129 #97: them: 95.96.10.129[C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl,+S=C]===10.81.9.204/32
- Aug 26 15:11:19 system pluto[19911]: "LAN"[6] 95.96.10.129 #97: keeping refhim=4294901761 during rekey
- Aug 26 15:11:19 system pluto[19911]: "LAN"[6] 95.96.10.129 #97: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
- Aug 26 15:11:19 system pluto[19911]: "LAN"[6] 95.96.10.129 #97: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
- Aug 26 15:11:20 system pluto[19911]: "LAN"[6] 95.96.10.129 #97: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
- Aug 26 15:11:20 system pluto[19911]: "LAN"[6] 95.96.10.129 #97: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP=>0x428a7ae2 <0x5b0be685 xfrm=AES_128-HMAC_SHA1 NATOA=none NATD=95.96.10.129:4500 DPD=none}
- Aug 26 15:11:32 system pluto[19911]: "LAN"[6] 95.96.10.129 #94: received Vendor ID payload [Openswan (this version) 2.6.28 ]
- Aug 26 15:11:32 system pluto[19911]: "LAN"[6] 95.96.10.129 #94: received Vendor ID payload [Dead Peer Detection]
- Aug 26 15:11:32 system pluto[19911]: "LAN"[6] 95.96.10.129 #94: received Vendor ID payload [RFC 3947] method set to=109
- Aug 26 15:11:32 system pluto[19911]: "LAN"[6] 95.96.10.129 #94: enabling possible NAT-traversal with method 4
- Aug 26 15:11:32 system pluto[19911]: "LAN"[6] 95.96.10.129 #94: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
- Aug 26 15:11:32 system pluto[19911]: "LAN"[6] 95.96.10.129 #94: STATE_MAIN_I2: sent MI2, expecting MR2
- Aug 26 15:11:32 system pluto[19911]: "LAN"[6] 95.96.10.129 #94: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): peer is NATed
- Aug 26 15:11:32 system pluto[19911]: "LAN"[6] 95.96.10.129 #94: I am sending my cert
- Aug 26 15:11:32 system pluto[19911]: "LAN"[6] 95.96.10.129 #94: I am sending a certificate request
- Aug 26 15:11:32 system pluto[19911]: "LAN"[6] 95.96.10.129 #94: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
- Aug 26 15:11:32 system pluto[19911]: "LAN"[6] 95.96.10.129 #94: STATE_MAIN_I3: sent MI3, expecting MR3
- Aug 26 15:11:32 system pluto[19911]: "LAN"[6] 95.96.10.129 #94: received Vendor ID payload [CAN-IKEv2]
- Aug 26 15:11:32 system pluto[19911]: "LAN"[6] 95.96.10.129 #94: Main mode peer ID is ID_DER_ASN1_DN: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl'
- Aug 26 15:11:32 system pluto[19911]: "LAN"[6] 95.96.10.129 #94: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
- Aug 26 15:11:32 system pluto[19911]: "LAN"[6] 95.96.10.129 #94: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=aes_128 prf=oakley_sha group=modp2048}
- Aug 26 15:11:38 system pluto[19911]: "LAN"[5] 95.96.10.129 #95: received Vendor ID payload [Openswan (this version) 2.6.28 ]
- Aug 26 15:11:38 system pluto[19911]: "LAN"[5] 95.96.10.129 #95: received Vendor ID payload [Dead Peer Detection]
- Aug 26 15:11:38 system pluto[19911]: "LAN"[5] 95.96.10.129 #95: received Vendor ID payload [RFC 3947] method set to=109
- Aug 26 15:11:38 system pluto[19911]: "LAN"[5] 95.96.10.129 #95: enabling possible NAT-traversal with method 4
- Aug 26 15:11:38 system pluto[19911]: "LAN"[5] 95.96.10.129 #95: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
- Aug 26 15:11:38 system pluto[19911]: "LAN"[5] 95.96.10.129 #95: STATE_MAIN_I2: sent MI2, expecting MR2
- Aug 26 15:11:38 system pluto[19911]: "LAN"[5] 95.96.10.129 #95: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): peer is NATed
- Aug 26 15:11:38 system pluto[19911]: "LAN"[5] 95.96.10.129 #95: I am sending my cert
- Aug 26 15:11:38 system pluto[19911]: "LAN"[5] 95.96.10.129 #95: I am sending a certificate request
- Aug 26 15:11:38 system pluto[19911]: "LAN"[5] 95.96.10.129 #95: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
- Aug 26 15:11:38 system pluto[19911]: "LAN"[5] 95.96.10.129 #95: STATE_MAIN_I3: sent MI3, expecting MR3
- Aug 26 15:11:38 system pluto[19911]: "LAN"[5] 95.96.10.129 #95: received Vendor ID payload [CAN-IKEv2]
- Aug 26 15:11:38 system pluto[19911]: "LAN"[5] 95.96.10.129 #95: Main mode peer ID is ID_DER_ASN1_DN: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl'
- Aug 26 15:11:38 system pluto[19911]: "LAN"[5] 95.96.10.129 #95: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
- Aug 26 15:11:38 system pluto[19911]: "LAN"[5] 95.96.10.129 #95: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=aes_128 prf=oakley_sha group=modp2048}
- Aug 26 15:59:12 system pluto[19911]: "LAN"[5] 95.96.10.129 #98: initiating Main Mode to replace #95
- Aug 26 16:00:28 system pluto[19911]: "LAN"[6] 95.96.10.129 #99: initiating Main Mode to replace #94
- Aug 26 16:07:07 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [Openswan (this version) 2.6.28 ]
- Aug 26 16:07:07 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [Dead Peer Detection]
- Aug 26 16:07:07 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [RFC 3947] method set to=109
- Aug 26 16:07:07 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 109
- Aug 26 16:07:07 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 109
- Aug 26 16:07:07 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 109
- Aug 26 16:07:07 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
- Aug 26 16:07:07 system pluto[19911]: "LAN"[6] 95.96.10.129 #100: responding to Main Mode from unknown peer 95.96.10.129
- Aug 26 16:07:07 system pluto[19911]: "LAN"[6] 95.96.10.129 #100: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
- Aug 26 16:07:07 system pluto[19911]: "LAN"[6] 95.96.10.129 #100: STATE_MAIN_R1: sent MR1, expecting MI2
- Aug 26 16:07:07 system pluto[19911]: "LAN"[6] 95.96.10.129 #100: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): peer is NATed
- Aug 26 16:07:07 system pluto[19911]: "LAN"[6] 95.96.10.129 #100: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
- Aug 26 16:07:07 system pluto[19911]: "LAN"[6] 95.96.10.129 #100: STATE_MAIN_R2: sent MR2, expecting MI3
- Aug 26 16:07:07 system pluto[19911]: "LAN"[6] 95.96.10.129 #100: Main mode peer ID is ID_DER_ASN1_DN: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl'
- Aug 26 16:07:07 system pluto[19911]: "LAN"[6] 95.96.10.129 #100: I am sending my cert
- Aug 26 16:07:07 system pluto[19911]: "LAN"[6] 95.96.10.129 #100: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
- Aug 26 16:07:07 system pluto[19911]: "LAN"[6] 95.96.10.129 #100: new NAT mapping for #100, was 95.96.10.129:500, now 95.96.10.129:4500
- Aug 26 16:07:07 system pluto[19911]: "LAN"[6] 95.96.10.129 #100: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=aes_128 prf=oakley_sha group=modp2048}
- Aug 26 16:07:38 system pluto[19911]: "LAN"[6] 95.96.10.129 #99: received Vendor ID payload [Openswan (this version) 2.6.28 ]
- Aug 26 16:07:38 system pluto[19911]: "LAN"[6] 95.96.10.129 #99: received Vendor ID payload [Dead Peer Detection]
- Aug 26 16:07:38 system pluto[19911]: "LAN"[6] 95.96.10.129 #99: received Vendor ID payload [RFC 3947] method set to=109
- Aug 26 16:07:38 system pluto[19911]: "LAN"[6] 95.96.10.129 #99: enabling possible NAT-traversal with method 4
- Aug 26 16:07:38 system pluto[19911]: "LAN"[6] 95.96.10.129 #99: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
- Aug 26 16:07:38 system pluto[19911]: "LAN"[6] 95.96.10.129 #99: STATE_MAIN_I2: sent MI2, expecting MR2
- Aug 26 16:07:38 system pluto[19911]: "LAN"[6] 95.96.10.129 #99: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): peer is NATed
- Aug 26 16:07:38 system pluto[19911]: "LAN"[6] 95.96.10.129 #99: I am sending my cert
- Aug 26 16:07:38 system pluto[19911]: "LAN"[6] 95.96.10.129 #99: I am sending a certificate request
- Aug 26 16:07:38 system pluto[19911]: "LAN"[6] 95.96.10.129 #99: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
- Aug 26 16:07:38 system pluto[19911]: "LAN"[6] 95.96.10.129 #99: STATE_MAIN_I3: sent MI3, expecting MR3
- Aug 26 16:07:38 system pluto[19911]: "LAN"[6] 95.96.10.129 #99: received Vendor ID payload [CAN-IKEv2]
- Aug 26 16:07:38 system pluto[19911]: "LAN"[6] 95.96.10.129 #99: Main mode peer ID is ID_DER_ASN1_DN: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl'
- Aug 26 16:07:38 system pluto[19911]: "LAN"[6] 95.96.10.129 #99: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
- Aug 26 16:07:38 system pluto[19911]: "LAN"[6] 95.96.10.129 #99: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=aes_128 prf=oakley_sha group=modp2048}
- Aug 26 16:07:42 system pluto[19911]: "LAN"[5] 95.96.10.129 #98: received Vendor ID payload [Openswan (this version) 2.6.28 ]
- Aug 26 16:07:42 system pluto[19911]: "LAN"[5] 95.96.10.129 #98: received Vendor ID payload [Dead Peer Detection]
- Aug 26 16:07:42 system pluto[19911]: "LAN"[5] 95.96.10.129 #98: received Vendor ID payload [RFC 3947] method set to=109
- Aug 26 16:07:42 system pluto[19911]: "LAN"[5] 95.96.10.129 #98: enabling possible NAT-traversal with method 4
- Aug 26 16:07:42 system pluto[19911]: "LAN"[5] 95.96.10.129 #98: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
- Aug 26 16:07:42 system pluto[19911]: "LAN"[5] 95.96.10.129 #98: STATE_MAIN_I2: sent MI2, expecting MR2
- Aug 26 16:07:42 system pluto[19911]: "LAN"[5] 95.96.10.129 #98: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): peer is NATed
- Aug 26 16:07:42 system pluto[19911]: "LAN"[5] 95.96.10.129 #98: I am sending my cert
- Aug 26 16:07:42 system pluto[19911]: "LAN"[5] 95.96.10.129 #98: I am sending a certificate request
- Aug 26 16:07:42 system pluto[19911]: "LAN"[5] 95.96.10.129 #98: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
- Aug 26 16:07:42 system pluto[19911]: "LAN"[5] 95.96.10.129 #98: STATE_MAIN_I3: sent MI3, expecting MR3
- Aug 26 16:07:43 system pluto[19911]: "LAN"[5] 95.96.10.129 #98: received Vendor ID payload [CAN-IKEv2]
- Aug 26 16:07:43 system pluto[19911]: "LAN"[5] 95.96.10.129 #98: Main mode peer ID is ID_DER_ASN1_DN: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl'
- Aug 26 16:07:43 system pluto[19911]: "LAN"[5] 95.96.10.129 #98: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
- Aug 26 16:07:43 system pluto[19911]: "LAN"[5] 95.96.10.129 #98: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=aes_128 prf=oakley_sha group=modp2048}
- Aug 26 16:11:19 system pluto[19911]: "LAN"[6] 95.96.10.129 #96: received Delete SA payload: deleting ISAKMP State #96
- Aug 26 16:11:19 system pluto[19911]: packet from 95.96.10.129:4500: received and ignored informational message
- Aug 26 16:11:31 system pluto[19911]: "LAN"[6] 95.96.10.129 #94: received Delete SA payload: deleting ISAKMP State #94
- Aug 26 16:11:31 system pluto[19911]: packet from 95.96.10.129:4500: received and ignored informational message
- Aug 26 16:11:37 system pluto[19911]: "LAN"[5] 95.96.10.129 #95: received Delete SA payload: deleting ISAKMP State #95
- Aug 26 16:11:37 system pluto[19911]: packet from 95.96.10.129:4500: received and ignored informational message
- Aug 26 16:51:16 system pluto[19911]: "LAN"[5] 95.96.10.129 #101: initiating Main Mode to replace #98
- Aug 26 16:56:11 system pluto[19911]: "LAN"[6] 95.96.10.129 #102: initiating Main Mode to replace #99
- Aug 26 17:03:12 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [Openswan (this version) 2.6.28 ]
- Aug 26 17:03:12 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [Dead Peer Detection]
- Aug 26 17:03:12 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [RFC 3947] method set to=109
- Aug 26 17:03:12 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 109
- Aug 26 17:03:12 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 109
- Aug 26 17:03:12 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 109
- Aug 26 17:03:12 system pluto[19911]: packet from 95.96.10.129:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
- Aug 26 17:03:12 system pluto[19911]: "LAN"[6] 95.96.10.129 #103: responding to Main Mode from unknown peer 95.96.10.129
- Aug 26 17:03:12 system pluto[19911]: "LAN"[6] 95.96.10.129 #103: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
- Aug 26 17:03:12 system pluto[19911]: "LAN"[6] 95.96.10.129 #103: STATE_MAIN_R1: sent MR1, expecting MI2
- Aug 26 17:03:12 system pluto[19911]: "LAN"[6] 95.96.10.129 #103: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): peer is NATed
- Aug 26 17:03:12 system pluto[19911]: "LAN"[6] 95.96.10.129 #103: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
- Aug 26 17:03:12 system pluto[19911]: "LAN"[6] 95.96.10.129 #103: STATE_MAIN_R2: sent MR2, expecting MI3
- Aug 26 17:03:12 system pluto[19911]: "LAN"[6] 95.96.10.129 #103: Main mode peer ID is ID_DER_ASN1_DN: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl'
- Aug 26 17:03:12 system pluto[19911]: "LAN"[6] 95.96.10.129 #103: I am sending my cert
- Aug 26 17:03:12 system pluto[19911]: "LAN"[6] 95.96.10.129 #103: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
- Aug 26 17:03:12 system pluto[19911]: "LAN"[6] 95.96.10.129 #103: new NAT mapping for #103, was 95.96.10.129:500, now 95.96.10.129:4500
- Aug 26 17:03:12 system pluto[19911]: "LAN"[6] 95.96.10.129 #103: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=aes_128 prf=oakley_sha group=modp2048}
- Aug 26 17:03:21 system pluto[19911]: "LAN"[6] 95.96.10.129 #102: received Vendor ID payload [Openswan (this version) 2.6.28 ]
- Aug 26 17:03:21 system pluto[19911]: "LAN"[6] 95.96.10.129 #102: received Vendor ID payload [Dead Peer Detection]
- Aug 26 17:03:21 system pluto[19911]: "LAN"[6] 95.96.10.129 #102: received Vendor ID payload [RFC 3947] method set to=109
- Aug 26 17:03:21 system pluto[19911]: "LAN"[6] 95.96.10.129 #102: enabling possible NAT-traversal with method 4
- Aug 26 17:03:21 system pluto[19911]: "LAN"[6] 95.96.10.129 #102: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
- Aug 26 17:03:21 system pluto[19911]: "LAN"[6] 95.96.10.129 #102: STATE_MAIN_I2: sent MI2, expecting MR2
- Aug 26 17:03:21 system pluto[19911]: "LAN"[6] 95.96.10.129 #102: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): peer is NATed
- Aug 26 17:03:21 system pluto[19911]: "LAN"[6] 95.96.10.129 #102: I am sending my cert
- Aug 26 17:03:21 system pluto[19911]: "LAN"[6] 95.96.10.129 #102: I am sending a certificate request
- Aug 26 17:03:21 system pluto[19911]: "LAN"[6] 95.96.10.129 #102: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
- Aug 26 17:03:21 system pluto[19911]: "LAN"[6] 95.96.10.129 #102: STATE_MAIN_I3: sent MI3, expecting MR3
- Aug 26 17:03:21 system pluto[19911]: "LAN"[6] 95.96.10.129 #102: received Vendor ID payload [CAN-IKEv2]
- Aug 26 17:03:21 system pluto[19911]: "LAN"[6] 95.96.10.129 #102: Main mode peer ID is ID_DER_ASN1_DN: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl'
- Aug 26 17:03:21 system pluto[19911]: "LAN"[6] 95.96.10.129 #102: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
- Aug 26 17:03:21 system pluto[19911]: "LAN"[6] 95.96.10.129 #102: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=aes_128 prf=oakley_sha group=modp2048}
- Aug 26 17:03:46 system pluto[19911]: "LAN"[5] 95.96.10.129 #101: received Vendor ID payload [Openswan (this version) 2.6.28 ]
- Aug 26 17:03:46 system pluto[19911]: "LAN"[5] 95.96.10.129 #101: received Vendor ID payload [Dead Peer Detection]
- Aug 26 17:03:46 system pluto[19911]: "LAN"[5] 95.96.10.129 #101: received Vendor ID payload [RFC 3947] method set to=109
- Aug 26 17:03:46 system pluto[19911]: "LAN"[5] 95.96.10.129 #101: enabling possible NAT-traversal with method 4
- Aug 26 17:03:46 system pluto[19911]: "LAN"[5] 95.96.10.129 #101: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
- Aug 26 17:03:46 system pluto[19911]: "LAN"[5] 95.96.10.129 #101: STATE_MAIN_I2: sent MI2, expecting MR2
- Aug 26 17:03:46 system pluto[19911]: "LAN"[5] 95.96.10.129 #101: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): peer is NATed
- Aug 26 17:03:46 system pluto[19911]: "LAN"[5] 95.96.10.129 #101: I am sending my cert
- Aug 26 17:03:46 system pluto[19911]: "LAN"[5] 95.96.10.129 #101: I am sending a certificate request
- Aug 26 17:03:46 system pluto[19911]: "LAN"[5] 95.96.10.129 #101: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
- Aug 26 17:03:46 system pluto[19911]: "LAN"[5] 95.96.10.129 #101: STATE_MAIN_I3: sent MI3, expecting MR3
- Aug 26 17:03:46 system pluto[19911]: "LAN"[5] 95.96.10.129 #101: received Vendor ID payload [CAN-IKEv2]
- Aug 26 17:03:46 system pluto[19911]: "LAN"[5] 95.96.10.129 #101: Main mode peer ID is ID_DER_ASN1_DN: 'C=NL, ST=Utrecht, L=Utrecht, O=Testing Corporation, OU=Research and Development, CN=Right1024, E=admin@testingcorporation.nl'
- Aug 26 17:03:46 system pluto[19911]: "LAN"[5] 95.96.10.129 #101: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
- Aug 26 17:03:46 system pluto[19911]: "LAN"[5] 95.96.10.129 #101: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=aes_128 prf=oakley_sha group=modp2048}
- Aug 26 17:07:06 system pluto[19911]: "LAN"[6] 95.96.10.129 #100: received Delete SA payload: deleting ISAKMP State #100
- Aug 26 17:07:06 system pluto[19911]: packet from 95.96.10.129:4500: received and ignored informational message
- Aug 26 17:07:37 system pluto[19911]: "LAN"[6] 95.96.10.129 #99: received Delete SA payload: deleting ISAKMP State #99
- Aug 26 17:07:37 system pluto[19911]: packet from 95.96.10.129:4500: received and ignored informational message
- Aug 26 17:07:42 system pluto[19911]: "LAN"[5] 95.96.10.129 #98: received Delete SA payload: deleting ISAKMP State #98
- Aug 26 17:07:42 system pluto[19911]: packet from 95.96.10.129:4500: received and ignored informational message
- + _________________________ date
- + date
- Thu Aug 26 17:09:26 CEST 2010
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement