Advertisement
Guest User

Untitled

a guest
Feb 15th, 2023
45
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.22 KB | None | 0 0
  1. Feb 10 22:42:02 nix-adserver ipsec[10226]: 13[ENC] generating ID_PROT response 0 [ KE No CERTREQ CERTREQ NAT-D NAT-D ]
  2. Feb 10 22:42:02 nix-adserver ipsec[10226]: 13[NET] sending packet: from SERVER_IP[500] to CLIENT_IP[500] (665 bytes)
  3. Feb 10 22:42:02 nix-adserver ipsec[10226]: 06[NET] received packet: from CLIENT_IP[4500] to SERVER_IP[4500] (1884 bytes)
  4. Feb 10 22:42:02 nix-adserver ipsec[10226]: 06[ENC] parsed ID_PROT request 0 [ ID CERT SIG CERTREQ ]
  5. Feb 10 22:42:02 nix-adserver ipsec[10226]: 06[IKE] ignoring certificate request without data
  6. Feb 10 22:42:02 nix-adserver ipsec[10226]: 06[IKE] received end entity cert "C=RU, ST=Kurskaya Oblast, L=Kursk, O=ZAO TrainzCity, OU=TrainzCity, CN=glebka_1234@trainzcity.myftp.org, E=glebka_1234@trainzcity.myftp.org"
  7. Feb 10 22:42:02 nix-adserver ipsec[10226]: 06[CFG] looking for RSA signature peer configs matching SERVER_IP...CLIENT_IP[C=RU, ST=Kurskaya Oblast, L=Kursk, O=ZAO TrainzCity, OU=TrainzCity, CN=glebka_1234@trainzcity.myftp.org, E=glebka_1234@trainzcity.myftp.org]
  8. Feb 10 22:42:02 nix-adserver ipsec[10226]: 06[CFG] selected peer config "l2tpvpn"
  9. Feb 10 22:42:02 nix-adserver ipsec[10226]: 06[CFG] using certificate "C=RU, ST=Kurskaya Oblast, L=Kursk, O=ZAO TrainzCity, OU=TrainzCity, CN=glebka_1234@trainzcity.myftp.org, E=glebka_1234@trainzcity.myftp.org"
  10. Feb 10 22:42:02 nix-adserver ipsec[10226]: 06[CFG] using trusted intermediate ca certificate "C=RU, ST=Kurskaya Oblast, O=ZAO TrainzCity, OU=TrainzCity Certificate Authority, CN=TrainzCity Client CA, E=postmaster@trainzcity.myftp.org"
  11. Feb 10 22:42:02 nix-adserver ipsec[10226]: 06[CFG] using trusted ca certificate "C=RU, ST=Kurskaya Oblast, L=Kursk, O=ZAO TrainzCity, OU=TrainzCity Certificate Authority, CN=TrainzCity CA, E=postmaster@trainzcity.myftp.org"
  12. Feb 10 22:42:02 nix-adserver ipsec[10226]: 06[CFG] reached self-signed root ca with a path length of 1
  13. Feb 10 22:42:02 nix-adserver ipsec[10226]: 06[CFG] checking certificate status of "C=RU, ST=Kurskaya Oblast, L=Kursk, O=ZAO TrainzCity, OU=TrainzCity, CN=glebka_1234@trainzcity.myftp.org, E=glebka_1234@trainzcity.myftp.org"
  14. Feb 10 22:42:02 nix-adserver ipsec[10226]: 06[CFG] certificate status is not available
  15. Feb 10 22:42:02 nix-adserver charon: 13[IKE] received retransmit of request with ID 4206929333, but no response to retransmit
  16. Feb 10 22:42:02 nix-adserver ipsec[10226]: 06[CFG] checking certificate status of "C=RU, ST=Kurskaya Oblast, O=ZAO TrainzCity, OU=TrainzCity Certificate Authority, CN=TrainzCity Client CA, E=postmaster@trainzcity.myftp.org"
  17. Feb 10 22:42:02 nix-adserver ipsec[10226]: 06[CFG] certificate status is not available
  18. Feb 10 22:42:02 nix-adserver ipsec[10226]: 06[IKE] authentication of 'C=RU, ST=Kurskaya Oblast, L=Kursk, O=ZAO TrainzCity, OU=TrainzCity, CN=glebka_1234@trainzcity.myftp.org, E=glebka_1234@trainzcity.myftp.org' with RSA_EMSA_PKCS1_NULL successful
  19. Feb 10 22:42:02 nix-adserver ipsec[10226]: 06[IKE] authentication of 'C=RU, ST=Kurskaya Oblast, L=Kursk, O=ZAO TrainzCity, OU=TrainzCity VPN Server, CN=trainzcity.myftp.org, E=postmaster@trainzcity.myftp.org' (myself) successful
  20. Feb 10 22:42:02 nix-adserver ipsec[10226]: 06[IKE] IKE_SA l2tpvpn[14] established between SERVER_IP[C=RU, ST=Kurskaya Oblast, L=Kursk, O=ZAO TrainzCity, OU=TrainzCity VPN Server, CN=trainzcity.myftp.org, E=postmaster@trainzcity.myftp.org]...CLIENT_IP[C=RU, ST=Kurskaya Oblast, L=Kursk, O=ZAO TrainzCity, OU=TrainzCity, CN=glebka_1234@trainzcity.myftp.org, E=glebka_1234@trainzcity.myftp.org]
  21. Feb 10 22:42:02 nix-adserver ipsec[10226]: 06[IKE] sending end entity cert "C=RU, ST=Kurskaya Oblast, L=Kursk, O=ZAO TrainzCity, OU=TrainzCity VPN Server, CN=trainzcity.myftp.org, E=postmaster@trainzcity.myftp.org"
  22. Feb 10 22:42:02 nix-adserver ipsec[10226]: 06[ENC] generating ID_PROT response 0 [ ID CERT SIG ]
  23. Feb 10 22:42:02 nix-adserver ipsec[10226]: 06[ENC] splitting IKE message (1852 bytes) into 2 fragments
  24. Feb 10 22:42:02 nix-adserver ipsec[10226]: 06[ENC] generating ID_PROT response 0 [ FRAG(1) ]
  25. Feb 10 22:42:02 nix-adserver ipsec[10226]: 06[ENC] generating ID_PROT response 0 [ FRAG(2/2) ]
  26. Feb 10 22:42:02 nix-adserver ipsec[10226]: 06[NET] sending packet: from SERVER_IP[4500] to CLIENT_IP[4500] (1248 bytes)
  27. Feb 10 22:42:02 nix-adserver ipsec[10226]: 06[NET] sending packet: from SERVER_IP[4500] to CLIENT_IP[4500] (676 bytes)
  28. Feb 10 22:42:02 nix-adserver ipsec[10226]: 08[NET] received packet: from CLIENT_IP[4500] to SERVER_IP[4500] (124 bytes)
  29. Feb 10 22:42:02 nix-adserver ipsec[10226]: 08[ENC] parsed INFORMATIONAL_V1 request 3079494799 [ HASH N(INITIAL_CONTACT) ]
  30. Feb 10 22:42:02 nix-adserver ipsec[10226]: 07[NET] received packet: from CLIENT_IP[4500] to SERVER_IP[4500] (684 bytes)
  31. Feb 10 22:42:02 nix-adserver ipsec[10226]: 07[ENC] parsed QUICK_MODE request 4206929333 [ HASH SA No ID ID ]
  32. Feb 10 22:42:02 nix-adserver ipsec[10226]: 07[IKE] no matching CHILD_SA config found for CLIENT_IP/32[udp] === SERVER_IP/32[udp/l2f]
  33. Feb 10 22:42:02 nix-adserver ipsec[10226]: 07[ENC] generating INFORMATIONAL_V1 request 42224501 [ HASH N(INVAL_ID) ]
  34. Feb 10 22:42:02 nix-adserver ipsec[10226]: 07[NET] sending packet: from SERVER_IP[4500] to CLIENT_IP[4500] (92 bytes)
  35. Feb 10 22:42:02 nix-adserver ipsec[10226]: 13[NET] received packet: from CLIENT_IP[4500] to SERVER_IP[4500] (684 bytes)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement