Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- root@li384-240:/var/log# cat auth.log
- Oct 15 02:51:19 localhost pluto[7733]: packet from 122.228.136.174:1968: received Vendor ID payload [RFC 3947] method set to=109
- Oct 15 02:51:19 localhost pluto[7733]: packet from 122.228.136.174:1968: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
- Oct 15 02:51:19 localhost pluto[7733]: packet from 122.228.136.174:1968: ignoring unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
- Oct 15 02:51:19 localhost pluto[7733]: packet from 122.228.136.174:1968: ignoring unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
- Oct 15 02:51:19 localhost pluto[7733]: packet from 122.228.136.174:1968: ignoring unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
- Oct 15 02:51:19 localhost pluto[7733]: packet from 122.228.136.174:1968: ignoring unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
- Oct 15 02:51:19 localhost pluto[7733]: packet from 122.228.136.174:1968: ignoring unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
- Oct 15 02:51:19 localhost pluto[7733]: packet from 122.228.136.174:1968: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 110
- Oct 15 02:51:19 localhost pluto[7733]: packet from 122.228.136.174:1968: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 110
- Oct 15 02:51:19 localhost pluto[7733]: packet from 122.228.136.174:1968: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 110
- Oct 15 02:51:19 localhost pluto[7733]: packet from 122.228.136.174:1968: received Vendor ID payload [Dead Peer Detection]
- Oct 15 02:51:19 localhost pluto[7733]: "L2TP-PSK-NAT"[1] 122.228.136.174 #1: responding to Main Mode from unknown peer 122.228.136.174
- Oct 15 02:51:19 localhost pluto[7733]: "L2TP-PSK-NAT"[1] 122.228.136.174 #1: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
- Oct 15 02:51:19 localhost pluto[7733]: "L2TP-PSK-NAT"[1] 122.228.136.174 #1: STATE_MAIN_R1: sent MR1, expecting MI2
- Oct 15 02:51:28 localhost pluto[7733]: "L2TP-PSK-NAT"[1] 122.228.136.174 #1: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): peer is NATed
- Oct 15 02:51:28 localhost pluto[7733]: "L2TP-PSK-NAT"[1] 122.228.136.174 #1: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
- Oct 15 02:51:28 localhost pluto[7733]: "L2TP-PSK-NAT"[1] 122.228.136.174 #1: STATE_MAIN_R2: sent MR2, expecting MI3
- Oct 15 02:51:29 localhost pluto[7733]: "L2TP-PSK-NAT"[1] 122.228.136.174 #1: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000
- Oct 15 02:51:29 localhost pluto[7733]: "L2TP-PSK-NAT"[1] 122.228.136.174 #1: Main mode peer ID is ID_IPV4_ADDR: '192.168.237.102'
- Oct 15 02:51:29 localhost pluto[7733]: "L2TP-PSK-NAT"[1] 122.228.136.174 #1: switched from "L2TP-PSK-NAT" to "L2TP-PSK-NAT"
- Oct 15 02:51:29 localhost pluto[7733]: "L2TP-PSK-NAT"[2] 122.228.136.174 #1: deleting connection "L2TP-PSK-NAT" instance with peer 122.228.136.174 {isakmp=#0/ipsec=#0}
- Oct 15 02:51:29 localhost pluto[7733]: "L2TP-PSK-NAT"[2] 122.228.136.174 #1: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
- Oct 15 02:51:29 localhost pluto[7733]: "L2TP-PSK-NAT"[2] 122.228.136.174 #1: new NAT mapping for #1, was 122.228.136.174:1968, now 122.228.136.174:2570
- Oct 15 02:51:29 localhost pluto[7733]: "L2TP-PSK-NAT"[2] 122.228.136.174 #1: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_256 prf=oakley_sha group=modp1024}
- Oct 15 02:51:29 localhost pluto[7733]: "L2TP-PSK-NAT"[2] 122.228.136.174 #1: Dead Peer Detection (RFC 3706): enabled
- Oct 15 02:51:30 localhost pluto[7733]: "L2TP-PSK-NAT"[2] 122.228.136.174 #1: the peer proposed: 106.187.41.240/32:17/1701 -> 192.168.237.102/32:17/0
- Oct 15 02:51:30 localhost pluto[7733]: "L2TP-PSK-NAT"[2] 122.228.136.174 #2: responding to Quick Mode proposal {msgid:dd95f84c}
- Oct 15 02:51:30 localhost pluto[7733]: "L2TP-PSK-NAT"[2] 122.228.136.174 #2: us: 106.187.41.240<106.187.41.240>[+S=C]:17/1701---106.187.41.1
- Oct 15 02:51:30 localhost pluto[7733]: "L2TP-PSK-NAT"[2] 122.228.136.174 #2: them: 122.228.136.174[192.168.237.102,+S=C]:17/54905===192.168.237.102/32
- Oct 15 02:51:30 localhost pluto[7733]: "L2TP-PSK-NAT"[2] 122.228.136.174 #2: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
- Oct 15 02:51:30 localhost pluto[7733]: "L2TP-PSK-NAT"[2] 122.228.136.174 #2: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
- Oct 15 02:51:30 localhost pluto[7733]: "L2TP-PSK-NAT"[2] 122.228.136.174 #2: Dead Peer Detection (RFC 3706): enabled
- Oct 15 02:51:30 localhost pluto[7733]: "L2TP-PSK-NAT"[2] 122.228.136.174 #2: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
- Oct 15 02:51:30 localhost pluto[7733]: "L2TP-PSK-NAT"[2] 122.228.136.174 #2: STATE_QUICK_R2: IPsec SA established transport mode {ESP=>0x0fcf26aa <0x71e96215 xfrm=AES_256-HMAC_SHA1 NATOA=none NATD=122.228.136.174:2570 DPD=enabled}
- Oct 15 02:52:10 localhost pluto[7733]: ERROR: asynchronous network error report on eth0 (sport=4500) for message to 192.168.237.102 port 4500, complainant 122.228.136.174: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)]
Add Comment
Please, Sign In to add comment