Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- *************************
- ** -=SMOOTHWALL3=- **
- ** /var/log/secure **
- *************************
- ======VPN WORKS, NO ALIASES====================================================================
- Nov 17 14:38:30 smoothwall3 pluto[20583]: packet from 200.0.0.1:500: Informational Exchange is for an unknown (expired?) SA
- Nov 17 14:47:31 smoothwall3 pluto[20583]: "vpntest2" #7: received Delete SA payload: replace IPSEC State #4 in 10 seconds
- Nov 17 14:47:31 smoothwall3 pluto[20583]: "vpntest2" #7: received and ignored informational message
- Nov 17 14:47:31 smoothwall3 pluto[20583]: "vpntest2" #7: received Delete SA payload: deleting ISAKMP State #7
- Nov 17 14:47:31 smoothwall3 pluto[20583]: packet from 200.0.0.1:500: received and ignored informational message
- Nov 17 14:47:34 smoothwall3 pluto[20583]: packet from 200.0.0.1:500: received Vendor ID payload [Openswan (this version) 2.4.15 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR]
- Nov 17 14:47:34 smoothwall3 pluto[20583]: packet from 200.0.0.1:500: received Vendor ID payload [Dead Peer Detection]
- Nov 17 14:47:34 smoothwall3 pluto[20583]: "vpntest2" #8: responding to Main Mode
- Nov 17 14:47:34 smoothwall3 pluto[20583]: "vpntest2" #8: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
- Nov 17 14:47:34 smoothwall3 pluto[20583]: "vpntest2" #8: STATE_MAIN_R1: sent MR1, expecting MI2
- Nov 17 14:47:34 smoothwall3 pluto[20583]: "vpntest2" #8: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
- Nov 17 14:47:34 smoothwall3 pluto[20583]: "vpntest2" #8: STATE_MAIN_R2: sent MR2, expecting MI3
- Nov 17 14:47:34 smoothwall3 pluto[20583]: "vpntest2" #8: Main mode peer ID is ID_IPV4_ADDR: '200.0.0.1'
- Nov 17 14:47:34 smoothwall3 pluto[20583]: "vpntest2" #8: I did not send a certificate because I do not have one.
- Nov 17 14:47:34 smoothwall3 pluto[20583]: "vpntest2" #8: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
- Nov 17 14:47:34 smoothwall3 pluto[20583]: "vpntest2" #8: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}
- Nov 17 14:47:35 smoothwall3 pluto[20583]: "vpntest2" #9: responding to Quick Mode {msgid:717017dc}
- Nov 17 14:47:35 smoothwall3 pluto[20583]: "vpntest2" #9: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
- Nov 17 14:47:35 smoothwall3 pluto[20583]: "vpntest2" #9: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
- Nov 17 14:47:35 smoothwall3 pluto[20583]: "vpntest2" #9: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
- Nov 17 14:47:35 smoothwall3 pluto[20583]: "vpntest2" #9: STATE_QUICK_R2: IPsec SA established {ESP=>0x98e5f394 <0x8308be7b xfrm=3DES_0-HMAC_MD5 NATD=none DPD=none}
- Nov 17 14:47:37 smoothwall3 pluto[20583]: shutting down
- Nov 17 14:47:37 smoothwall3 pluto[20583]: forgetting secrets
- Nov 17 14:47:37 smoothwall3 pluto[20583]: "vpntest2": deleting connection
- Nov 17 14:47:37 smoothwall3 pluto[20583]: "vpntest2" #4: deleting state (STATE_QUICK_R2)
- Nov 17 14:47:37 smoothwall3 pluto[20583]: "vpntest2" #9: deleting state (STATE_QUICK_R2)
- Nov 17 14:47:37 smoothwall3 pluto[20583]: "vpntest2" #8: deleting state (STATE_MAIN_R3)
- Nov 17 14:47:37 smoothwall3 pluto[20583]: shutting down interface ipsec0/eth0 201.0.0.1:500
- Nov 17 14:47:41 smoothwall3 ipsec__plutorun: Starting Pluto subsystem...
- Nov 17 14:47:41 smoothwall3 pluto[23610]: Starting Pluto (Openswan Version 2.4.15 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR; Vendor ID OE}xT`Pu{prE)
- Nov 17 14:47:41 smoothwall3 pluto[23610]: Setting NAT-Traversal port-4500 floating to off
- Nov 17 14:47:41 smoothwall3 pluto[23610]: port floating activation criteria nat_t=0/port_fload=1
- Nov 17 14:47:41 smoothwall3 pluto[23610]: including NAT-Traversal patch (Version 0.6c) [disabled]
- Nov 17 14:47:41 smoothwall3 pluto[23610]: ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
- Nov 17 14:47:41 smoothwall3 pluto[23610]: starting up 1 cryptographic helpers
- Nov 17 14:47:41 smoothwall3 pluto[23610]: started helper pid=23611 (fd:5)
- Nov 17 14:47:41 smoothwall3 pluto[23610]: Using KLIPS IPsec interface code on 2.6.16.60-1
- Nov 17 14:47:41 smoothwall3 pluto[23610]: Changing to directory '/usr/etc/ipsec.d/cacerts'
- Nov 17 14:47:41 smoothwall3 pluto[23610]: Changing to directory '/usr/etc/ipsec.d/aacerts'
- Nov 17 14:47:41 smoothwall3 pluto[23610]: Changing to directory '/usr/etc/ipsec.d/ocspcerts'
- Nov 17 14:47:41 smoothwall3 pluto[23610]: Changing to directory '/usr/etc/ipsec.d/crls'
- Nov 17 14:47:41 smoothwall3 pluto[23610]: Warning: empty directory
- Nov 17 14:47:41 smoothwall3 ipsec__plutorun: Unknown default RSA hostkey scheme, not generating a default hostkey
- Nov 17 14:47:41 smoothwall3 pluto[23610]: loading secrets from "/usr/etc/ipsec.secrets"
- Nov 17 14:47:41 smoothwall3 pluto[23610]: added connection description "vpntest2"
- Nov 17 14:47:41 smoothwall3 pluto[23610]: listening for IKE messages
- Nov 17 14:47:41 smoothwall3 pluto[23610]: adding interface ipsec0/eth0 201.0.0.1:500
- Nov 17 14:47:41 smoothwall3 pluto[23610]: forgetting secrets
- Nov 17 14:47:41 smoothwall3 pluto[23610]: loading secrets from "/usr/etc/ipsec.secrets"
- Nov 17 14:47:42 smoothwall3 pluto[23610]: "vpntest2" #1: initiating Main Mode
- Nov 17 14:47:42 smoothwall3 pluto[23610]: "vpntest2" #1: received Vendor ID payload [Openswan (this version) 2.4.15 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR]
- Nov 17 14:47:42 smoothwall3 pluto[23610]: "vpntest2" #1: received Vendor ID payload [Dead Peer Detection]
- Nov 17 14:47:42 smoothwall3 pluto[23610]: "vpntest2" #1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
- Nov 17 14:47:42 smoothwall3 pluto[23610]: "vpntest2" #1: STATE_MAIN_I2: sent MI2, expecting MR2
- Nov 17 14:47:42 smoothwall3 pluto[23610]: "vpntest2" #1: I did not send a certificate because I do not have one.
- Nov 17 14:47:42 smoothwall3 pluto[23610]: "vpntest2" #1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
- Nov 17 14:47:42 smoothwall3 pluto[23610]: "vpntest2" #1: STATE_MAIN_I3: sent MI3, expecting MR3
- Nov 17 14:47:42 smoothwall3 pluto[23610]: "vpntest2" #1: Main mode peer ID is ID_IPV4_ADDR: '200.0.0.1'
- Nov 17 14:47:42 smoothwall3 pluto[23610]: "vpntest2" #1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
- Nov 17 14:47:42 smoothwall3 pluto[23610]: "vpntest2" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}
- Nov 17 14:47:42 smoothwall3 pluto[23610]: "vpntest2" #2: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+UP {using isakmp#1}
- Nov 17 14:47:42 smoothwall3 pluto[23610]: "vpntest2" #2: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
- Nov 17 14:47:42 smoothwall3 pluto[23610]: "vpntest2" #2: STATE_QUICK_I2: sent QI2, IPsec SA established {ESP=>0x98e5f395 <0x6a38c720 xfrm=3DES_0-HMAC_MD5 NATD=none DPD=none}
- Nov 17 14:47:57 smoothwall3 pluto[23610]: "vpntest2" #1: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x98e5f394) not found (maybe expired)
- Nov 17 14:47:57 smoothwall3 pluto[23610]: "vpntest2" #1: received and ignored informational message
- =========== VPN WITH ALIASES====================================
- Nov 17 15:18:16 smoothwall3 pluto[23610]: shutting down
- Nov 17 15:18:16 smoothwall3 pluto[23610]: forgetting secrets
- Nov 17 15:18:16 smoothwall3 pluto[23610]: "vpntest2": deleting connection
- Nov 17 15:18:16 smoothwall3 pluto[23610]: "vpntest2" #2: deleting state (STATE_QUICK_I2)
- Nov 17 15:18:16 smoothwall3 pluto[23610]: "vpntest2" #1: deleting state (STATE_MAIN_I4)
- Nov 17 15:18:17 smoothwall3 pluto[23610]: shutting down interface ipsec0/eth0 201.0.0.1:500
- Nov 17 15:18:20 smoothwall3 ipsec__plutorun: Starting Pluto subsystem...
- Nov 17 15:18:20 smoothwall3 pluto[24469]: Starting Pluto (Openswan Version 2.4.15 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR; Vendor ID OE}xT`Pu{prE)
- Nov 17 15:18:20 smoothwall3 pluto[24469]: Setting NAT-Traversal port-4500 floating to off
- Nov 17 15:18:20 smoothwall3 pluto[24469]: port floating activation criteria nat_t=0/port_fload=1
- Nov 17 15:18:20 smoothwall3 pluto[24469]: including NAT-Traversal patch (Version 0.6c) [disabled]
- Nov 17 15:18:20 smoothwall3 pluto[24469]: ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
- Nov 17 15:18:20 smoothwall3 pluto[24469]: starting up 1 cryptographic helpers
- Nov 17 15:18:20 smoothwall3 pluto[24469]: started helper pid=24470 (fd:5)
- Nov 17 15:18:20 smoothwall3 pluto[24469]: Using KLIPS IPsec interface code on 2.6.16.60-1
- Nov 17 15:18:20 smoothwall3 pluto[24469]: Changing to directory '/usr/etc/ipsec.d/cacerts'
- Nov 17 15:18:20 smoothwall3 pluto[24469]: Changing to directory '/usr/etc/ipsec.d/aacerts'
- Nov 17 15:18:20 smoothwall3 pluto[24469]: Changing to directory '/usr/etc/ipsec.d/ocspcerts'
- Nov 17 15:18:20 smoothwall3 pluto[24469]: Changing to directory '/usr/etc/ipsec.d/crls'
- Nov 17 15:18:20 smoothwall3 pluto[24469]: Warning: empty directory
- Nov 17 15:18:20 smoothwall3 ipsec__plutorun: Unknown default RSA hostkey scheme, not generating a default hostkey
- Nov 17 15:18:20 smoothwall3 pluto[24469]: loading secrets from "/usr/etc/ipsec.secrets"
- Nov 17 15:18:20 smoothwall3 pluto[24469]: added connection description "vpntest2"
- Nov 17 15:18:21 smoothwall3 pluto[24469]: listening for IKE messages
- Nov 17 15:18:21 smoothwall3 pluto[24469]: adding interface ipsec0/eth0 201.0.0.1:500
- Nov 17 15:18:21 smoothwall3 pluto[24469]: forgetting secrets
- Nov 17 15:18:21 smoothwall3 pluto[24469]: loading secrets from "/usr/etc/ipsec.secrets"
- Nov 17 15:18:21 smoothwall3 pluto[24469]: "vpntest2" #1: initiating Main Mode
- Nov 17 15:18:21 smoothwall3 pluto[24469]: "vpntest2" #1: received Vendor ID payload [Openswan (this version) 2.4.15 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR]
- Nov 17 15:18:21 smoothwall3 pluto[24469]: "vpntest2" #1: received Vendor ID payload [Dead Peer Detection]
- Nov 17 15:18:21 smoothwall3 pluto[24469]: "vpntest2" #1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
- Nov 17 15:18:21 smoothwall3 pluto[24469]: "vpntest2" #1: STATE_MAIN_I2: sent MI2, expecting MR2
- Nov 17 15:18:21 smoothwall3 pluto[24469]: "vpntest2" #1: I did not send a certificate because I do not have one.
- Nov 17 15:18:21 smoothwall3 pluto[24469]: "vpntest2" #1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
- Nov 17 15:18:21 smoothwall3 pluto[24469]: "vpntest2" #1: STATE_MAIN_I3: sent MI3, expecting MR3
- Nov 17 15:18:21 smoothwall3 pluto[24469]: "vpntest2" #1: Main mode peer ID is ID_IPV4_ADDR: '200.0.0.1'
- Nov 17 15:18:21 smoothwall3 pluto[24469]: "vpntest2" #1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
- Nov 17 15:18:21 smoothwall3 pluto[24469]: "vpntest2" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}
- Nov 17 15:18:21 smoothwall3 pluto[24469]: "vpntest2" #2: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+UP {using isakmp#1}
- Nov 17 15:18:21 smoothwall3 pluto[24469]: "vpntest2" #2: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
- Nov 17 15:18:21 smoothwall3 pluto[24469]: "vpntest2" #2: STATE_QUICK_I2: sent QI2, IPsec SA established {ESP=>0x98e5f396 <0xa6cb03e8 xfrm=3DES_0-HMAC_MD5 NATD=none DPD=none}
- Nov 17 15:18:33 smoothwall3 pluto[24469]: "vpntest2" #1: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x98e5f395) not found (maybe expired)
- Nov 17 15:18:33 smoothwall3 pluto[24469]: "vpntest2" #1: received and ignored informational message
- Nov 17 15:18:33 smoothwall3 pluto[24469]: "vpntest2" #1: received Delete SA payload: replace IPSEC State #2 in 10 seconds
- Nov 17 15:18:33 smoothwall3 pluto[24469]: "vpntest2" #1: received and ignored informational message
- Nov 17 15:18:33 smoothwall3 pluto[24469]: "vpntest2" #1: received Delete SA payload: deleting ISAKMP State #1
- Nov 17 15:18:33 smoothwall3 pluto[24469]: packet from 200.0.0.1:500: received and ignored informational message
- Nov 17 15:18:36 smoothwall3 pluto[24469]: packet from 200.0.0.1:500: received Vendor ID payload [Openswan (this version) 2.4.15 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR]
- Nov 17 15:18:36 smoothwall3 pluto[24469]: packet from 200.0.0.1:500: received Vendor ID payload [Dead Peer Detection]
- Nov 17 15:18:36 smoothwall3 pluto[24469]: "vpntest2" #3: responding to Main Mode
- Nov 17 15:18:36 smoothwall3 pluto[24469]: "vpntest2" #3: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
- Nov 17 15:18:36 smoothwall3 pluto[24469]: "vpntest2" #3: STATE_MAIN_R1: sent MR1, expecting MI2
- Nov 17 15:18:36 smoothwall3 pluto[24469]: "vpntest2" #3: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
- Nov 17 15:18:36 smoothwall3 pluto[24469]: "vpntest2" #3: STATE_MAIN_R2: sent MR2, expecting MI3
- Nov 17 15:18:36 smoothwall3 pluto[24469]: "vpntest2" #3: Main mode peer ID is ID_IPV4_ADDR: '200.0.0.1'
- Nov 17 15:18:36 smoothwall3 pluto[24469]: "vpntest2" #3: I did not send a certificate because I do not have one.
- Nov 17 15:18:36 smoothwall3 pluto[24469]: "vpntest2" #3: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
- Nov 17 15:18:36 smoothwall3 pluto[24469]: "vpntest2" #3: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}
- Nov 17 15:18:36 smoothwall3 pluto[24469]: "vpntest2" #4: responding to Quick Mode {msgid:2493ada3}
- Nov 17 15:18:36 smoothwall3 pluto[24469]: "vpntest2" #4: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
- Nov 17 15:18:36 smoothwall3 pluto[24469]: "vpntest2" #4: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
- Nov 17 15:18:36 smoothwall3 pluto[24469]: "vpntest2" #4: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
- Nov 17 15:18:36 smoothwall3 pluto[24469]: "vpntest2" #4: STATE_QUICK_R2: IPsec SA established {ESP=>0xef1e8171 <0xa6cb03e9 xfrm=3DES_0-HMAC_MD5 NATD=none DPD=none}
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement