Guest User

Untitled

a guest
Jan 22nd, 2018
132
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.15 KB | None | 0 0
  1.  
  2. root@li384-240:/var/log# cat auth.log
  3. Oct 15 02:51:19 localhost pluto[7733]: packet from 122.228.136.174:1968: received Vendor ID payload [RFC 3947] method set to=109
  4. Oct 15 02:51:19 localhost pluto[7733]: packet from 122.228.136.174:1968: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
  5. Oct 15 02:51:19 localhost pluto[7733]: packet from 122.228.136.174:1968: ignoring unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
  6. Oct 15 02:51:19 localhost pluto[7733]: packet from 122.228.136.174:1968: ignoring unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
  7. Oct 15 02:51:19 localhost pluto[7733]: packet from 122.228.136.174:1968: ignoring unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
  8. Oct 15 02:51:19 localhost pluto[7733]: packet from 122.228.136.174:1968: ignoring unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
  9. Oct 15 02:51:19 localhost pluto[7733]: packet from 122.228.136.174:1968: ignoring unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
  10. Oct 15 02:51:19 localhost pluto[7733]: packet from 122.228.136.174:1968: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 110
  11. Oct 15 02:51:19 localhost pluto[7733]: packet from 122.228.136.174:1968: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 110
  12. Oct 15 02:51:19 localhost pluto[7733]: packet from 122.228.136.174:1968: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 110
  13. Oct 15 02:51:19 localhost pluto[7733]: packet from 122.228.136.174:1968: received Vendor ID payload [Dead Peer Detection]
  14. Oct 15 02:51:19 localhost pluto[7733]: "L2TP-PSK-NAT"[1] 122.228.136.174 #1: responding to Main Mode from unknown peer 122.228.136.174
  15. Oct 15 02:51:19 localhost pluto[7733]: "L2TP-PSK-NAT"[1] 122.228.136.174 #1: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
  16. Oct 15 02:51:19 localhost pluto[7733]: "L2TP-PSK-NAT"[1] 122.228.136.174 #1: STATE_MAIN_R1: sent MR1, expecting MI2
  17. Oct 15 02:51:28 localhost pluto[7733]: "L2TP-PSK-NAT"[1] 122.228.136.174 #1: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): peer is NATed
  18. Oct 15 02:51:28 localhost pluto[7733]: "L2TP-PSK-NAT"[1] 122.228.136.174 #1: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
  19. Oct 15 02:51:28 localhost pluto[7733]: "L2TP-PSK-NAT"[1] 122.228.136.174 #1: STATE_MAIN_R2: sent MR2, expecting MI3
  20. Oct 15 02:51:29 localhost pluto[7733]: "L2TP-PSK-NAT"[1] 122.228.136.174 #1: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000
  21. Oct 15 02:51:29 localhost pluto[7733]: "L2TP-PSK-NAT"[1] 122.228.136.174 #1: Main mode peer ID is ID_IPV4_ADDR: '192.168.237.102'
  22. Oct 15 02:51:29 localhost pluto[7733]: "L2TP-PSK-NAT"[1] 122.228.136.174 #1: switched from "L2TP-PSK-NAT" to "L2TP-PSK-NAT"
  23. Oct 15 02:51:29 localhost pluto[7733]: "L2TP-PSK-NAT"[2] 122.228.136.174 #1: deleting connection "L2TP-PSK-NAT" instance with peer 122.228.136.174 {isakmp=#0/ipsec=#0}
  24. Oct 15 02:51:29 localhost pluto[7733]: "L2TP-PSK-NAT"[2] 122.228.136.174 #1: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
  25. Oct 15 02:51:29 localhost pluto[7733]: "L2TP-PSK-NAT"[2] 122.228.136.174 #1: new NAT mapping for #1, was 122.228.136.174:1968, now 122.228.136.174:2570
  26. Oct 15 02:51:29 localhost pluto[7733]: "L2TP-PSK-NAT"[2] 122.228.136.174 #1: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_256 prf=oakley_sha group=modp1024}
  27. Oct 15 02:51:29 localhost pluto[7733]: "L2TP-PSK-NAT"[2] 122.228.136.174 #1: Dead Peer Detection (RFC 3706): enabled
  28. Oct 15 02:51:30 localhost pluto[7733]: "L2TP-PSK-NAT"[2] 122.228.136.174 #1: the peer proposed: 106.187.41.240/32:17/1701 -> 192.168.237.102/32:17/0
  29. Oct 15 02:51:30 localhost pluto[7733]: "L2TP-PSK-NAT"[2] 122.228.136.174 #2: responding to Quick Mode proposal {msgid:dd95f84c}
  30. Oct 15 02:51:30 localhost pluto[7733]: "L2TP-PSK-NAT"[2] 122.228.136.174 #2: us: 106.187.41.240<106.187.41.240>[+S=C]:17/1701---106.187.41.1
  31. Oct 15 02:51:30 localhost pluto[7733]: "L2TP-PSK-NAT"[2] 122.228.136.174 #2: them: 122.228.136.174[192.168.237.102,+S=C]:17/54905===192.168.237.102/32
  32. Oct 15 02:51:30 localhost pluto[7733]: "L2TP-PSK-NAT"[2] 122.228.136.174 #2: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
  33. Oct 15 02:51:30 localhost pluto[7733]: "L2TP-PSK-NAT"[2] 122.228.136.174 #2: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
  34. Oct 15 02:51:30 localhost pluto[7733]: "L2TP-PSK-NAT"[2] 122.228.136.174 #2: Dead Peer Detection (RFC 3706): enabled
  35. Oct 15 02:51:30 localhost pluto[7733]: "L2TP-PSK-NAT"[2] 122.228.136.174 #2: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
  36. Oct 15 02:51:30 localhost pluto[7733]: "L2TP-PSK-NAT"[2] 122.228.136.174 #2: STATE_QUICK_R2: IPsec SA established transport mode {ESP=>0x0fcf26aa <0x71e96215 xfrm=AES_256-HMAC_SHA1 NATOA=none NATD=122.228.136.174:2570 DPD=enabled}
  37. Oct 15 02:52:10 localhost pluto[7733]: ERROR: asynchronous network error report on eth0 (sport=4500) for message to 192.168.237.102 port 4500, complainant 122.228.136.174: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)]
Add Comment
Please, Sign In to add comment