Advertisement
Guest User

Untitled

a guest
Apr 14th, 2016
941
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 21.33 KB | None | 0 0
  1. 04/13/2016 21:10:08 [9006] set the loglevel to 3
  2. 04/13/2016 21:10:08 [9008] set the loglevel to 3
  3. 04/13/2016 21:10:08 [9008] sslvpn connection version:4.0.2289
  4. 04/13/2016 21:10:08 [9008] rcv cmd:0 at state[0]
  5. 04/13/2016 21:10:08 [9008] starting ssl vpn tunnel[4.0.2289]
  6. gateway for 1.1.1.1:91.245.35.33 for 178.207.157.170:91.245.35.33
  7. if has single route record for 1.1.1.1:0 for 178.207.157.170:1
  8. 04/13/2016 21:10:08 [9030] execl /usr/src/forticlientsslvpn/./helper/get_fortisslvpn_info /usr/src/forticlientsslvpn/./helper 178.207.157.170 10443 ...
  9. 04/13/2016 21:10:08 [9030] trusted CA dir: /root/.fctsslvpn_trustca
  10. 04/13/2016 21:10:08 [9030] set loglevel to 3
  11. 04/13/2016 21:10:08 [9030] Peer's certificate is not valid. action is 1
  12. 04/13/2016 21:10:08 [9030] peer's certificate:
  13. Version: 3 (0x2)$ Serial Number:$ da:f6:36:b4:43:d4:a5:8b$ Signature Algorithm: sha256WithRSAEncryption$ Issuer: C=US, ST=California, L=Sunnyvale, O=Fortinet, OU=Certificate Authority, CN=support/emailAddress=support@fortinet.com$ Validity$ Not Before: Jul 16 22:34:39 2015 GMT$ Not After : Jan 19 22:34:39 2038 GMT$ Subject: C=US, ST=California, L=Sunnyvale, O=Fortinet, OU=Certificate Authority, CN=support/emailAddress=support@fortinet.com$ Subject Public Key Info:$ Public Key Algorithm: rsaEncryption$ Public-Key: (2048 bit)$ Modulus:$ ....
  14. b8:1f:23:a1:ce:91:c1:d8:2f:f5:db:31:49:2d:7b:$ 1d:63$ Exponent: 65537 (0x10001)$ X509v3 extensions:$ X509v3 Basic Constraints: $ CA:TRUE$ Signature Algorithm: sha256WithRSAEncryption$ ....
  15. 92:8c:b8:87$
  16. 04/13/2016 21:10:08 [9008] rcv from grab web:2|Certificate: Version: 3 (0x2)$ Serial Number:$ da:f6:36:b4:43:d4:a5:8b$ Signature Algorithm: ...$ Issuer: C=US, ST=California, L=Sunnyvale, O=Fortinet, OU=Certificate Authority, CN=support/emailAddress=support@fortinet.com$ Validity$ Not Before: Jul 16 22:34:39 2015 GMT$ Not After : Jan 19 22:34:39 2038 GMT$ Subject: C=US, ST=California, L=Sunnyvale, O=Fortinet, OU=Certificate Authority, CN=support/emailAddress=support@fortinet.com$ Subject Public Key Info:$ Public Key Algorithm: rsaEncryption$ Public-Key: (2048 bit)$ Modulus:$ 00:d4:3b:51:73:d0:35:12:12:c8:c3:4e:59:41:48:$ .....
  17. c4:d0:50:67:99:f1:3d:13:45:4b:6e:8b:75:ee:5d:$ b8:1f:23:a1:ce:91:c1:d8:2f:f5:db:31:49:2d:7b:$ 1d:63$ Exponent: 65537 (0x10001)$ X509v3 extensions:$ X509v3 Basic Constraints: $ CA:TRUE$ Signature Algorithm: sha256WithRSAEncryption$ 87:17:fb:8d:ec:67:4a:b4:cd:b2:1a:69:5e:98:8c:9a:52:b9:$
  18. ....
  19. 58:94:75:a9:0e:c7:4f:94:3d:b5:52:c2:af:fa:8e:9c:41:c4:$ 92:8c:b8:87$
  20.  
  21. 04/13/2016 21:10:08 [9008] send GUI:Certificate: Version: 3 (0x2)$ Serial Number:$ da:f6:36:b4:43:d4:a5:8b$ Signature Algorithm: sha256WithRSAEncryption$ Issuer: C=US, ST=California, L=Sunnyvale, O=Fortinet, OU=Certificate Authority, CN=support/emailAddress=support@fortinet.com$ Validity$ Not Before: Jul 16 22:34:39 2015 GMT$ Not After : Jan 19 22:34:39 2038 GMT$ Subject: C=US, ST=California, L=Sunnyvale, O=Fortinet, OU=Certificate Authority, CN=support/emailAddress=support@fortinet.com$ Subject Public Key Info:$ Public Key Algorithm: rsaEncryption$ Public-Key: (2048 bit)$ Modulus:$ 00:d4:3b:51:73:d0:35:12:12:c8:c3:4e:59:41:48:$
  22. ......
  23. c4:d0:50:67:99:f1:3d:13:45:4b:6e:8b:75:ee:5d:$ b8:1f:23:a1:ce:91:c1:d8:2f:f5:db:31:49:2d:7b:$ 1d:63$ Exponent: 65537 (0x10001)$ X509v3 extensions:$ X509v3 Basic Constraints: $ CA:TRUE$ Signature Algorithm: sha256WithRSAEncryption$ 87:17:fb:8d:ec:67:4a:b4:cd:b2:1a:69:5e:98:8c:9a:52:b9:$
  24. .....
  25. 58:94:75:a9:0e:c7:4f:94:3d:b5:52:c2:af:fa:8e:9c:41:c4:$ 92:8c:b8:87$
  26.  
  27. 04/13/2016 21:10:08 [9008] receive input from GUI:1
  28. 04/13/2016 21:10:08 [9030] user accepted this invalid peer certificate: 1
  29. 04/13/2016 21:10:08 [9030] realm is enabled:
  30. 04/13/2016 21:10:08 [9030] get login page
  31. 04/13/2016 21:10:08 [9030] GET[194]:
  32. GET /remote/login HTTP/1.1
  33. Host: 178.207.157.170:10443
  34. User-Agent: Mozilla/5.0 SV1
  35. Accept: text/plain
  36. Accept-Encoding: identify
  37. Content-Type: application/x-www-form-urlencoded
  38. Cookie:
  39.  
  40.  
  41. 04/13/2016 21:10:08 [9030] get response
  42. 04/13/2016 21:10:08 [9030] no Content-Length
  43. 04/13/2016 21:10:08 [9030] RESPONSE[3883]:
  44. HTTP/1.1 200 OK
  45. Date: Thu, 14 Apr 2016 13:35:08 GMT
  46. Set-Cookie: SVPNCOOKIE=; path=/; expires=Thu, 14-Apr-2016 13:35:08 GMT; secure; httponly;
  47. Set-Cookie: SVPNNETWORKCOOKIE=; path=/remote/network; expires=Thu, 14-Apr-2016 13:35:08 GMT; secure; httponly
  48. X-UA-Compatible: requiresActiveX=true
  49. Transfer-Encoding: chunked
  50. Content-Type: text/html; charset=utf-8
  51. X-Frame-Options: SAMEORIGIN
  52.  
  53. <html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><title>login</title><meta http-equiv="Pragma" content="no-cache"><meta http-equiv="cache-control" content="no-cache"><meta http-equiv="cache-control" content="must-revalidate"><link href="/sslvpn/css/login.css" rel="stylesheet" type="text/css"><script type="text/javascript">if (top && top.location != window.location) top.location = top.location;if (window.opener && window.opener.top) { window.opener.top.location = window.opener.top.location; self.close(); }</script></head><body class="main"><center><table width="100%" height="100%" align="center" class="container" valign="middle" cellpadding="0" cellspacing="0"><tr valign=middle><td><form action="/remote/logincheck" method="post" name="f" autocomplete="off"><table class="list" cellpadding=10 cellspacing=0 align=center width=400 height=180><tr class="dark"><td colspan=2><b>Please Login</b></td></tr><!--remoteauthtimeout=5-->
  54. <tr><td width=40% style="padding-left:10px"><b>Name:</b></td><td width=60%><input type=text maxlength=128 name=username id=username></td></tr><tr><td width=40% style="padding-left:10px"><b>Password:</b></td><td width=60%><input type=password autocomplete="off" maxlength=128 name=credential id=credential></td></tr><tr id=token_msg style="display:none;"><td colspan=2 id="token_label" style="text-align: left; font-size: 10px; padding-left: 10px"></td></tr>
  55. <tr id=chal_input style="display:none;"><td id=chal_inputlabel width=40% style="padding-left:10px; font-weight: bold;"></td><td width=60%><input type=password autocomplete="off" maxlength=128 name=credential2 id=credential2></td></tr><tr id=chal_input2 style="display:none;"><td id=chal_inputlabel2 width=40% style="padding-left:10px; font-weight: bold;"></td><td width=60%><input type=password autocomplete="off" maxlength=128 name=credential3 id=credential3></td></tr><tr id=fortitoken style="display:none;"><td width=40% style="padding-left:10px"><b id=codelabel>FortiToken Code:</b></td><td width=60%><input type=password autocomplete="off" maxlength=8 name=code id=code></td></tr><tr id=driftmsg style="display:none;"><td colspan=2 style="padding-left:10px">FortiToken clock drift detected. Please input the next code and continue.</td></tr><tr id=fortitoken2 style="display:none;"><td width=40% style="padding-left:10px"><b id=codelabel2>Next FortiToken Code:</b></td><td width=60%><input type=password autocomplete="off" maxlength=8 name=code2 id=code2></td></tr><tr><td></td><td id=login><input type=button name=login_button id=login_button value="Login" onClick="try_login()" border=0></td></tr></table><input type=hidden name=just_logged_in value=1><input type=hidden name=magic id=magic_id value=""><input type=hidden name=reqid id=reqid_id value="0"><input type=hidden name=grpid id=grpid_id value=""><input type=hidden name=realm id=realm_id value=""><input type=hidden name=redir value="/sslvpn/portal.html"><script type="text/javascript" src="/sslvpn/js/login.js?q=19748"></script><script type="text/javascript" src="/lang/en.js"></script><script>document.onkeydown = key_pressdown;function load_login_strings() {var tmp = document.getElementById("err_str");if (tmp) {tmp.innerHTML = fgt_lang["error"] + ":";tmp = document.getElementById("err_val");tmp.innerHTML = fgt_lang[tmp.getAttribute('title')];}}window.onload = load_login_strings;</script></form></td></tr></table></center></body><script>document.forms[0].username.focus();</script></html>
  56.  
  57. 04/13/2016 21:10:08 [9030] try to get cookie for the first time: 98 : SVPNNETWORKCOOKIE=; path=/remote/network; expires=Thu, 14-Apr-2016 13:35:08 GMT; secure; httponly
  58. 04/13/2016 21:10:08 [9030] post to login
  59. 04/13/2016 21:10:08 [9030] POST [306]:
  60. POST /remote/logincheck HTTP/1.1
  61. Host: 178.207.157.170:10443
  62. User-Agent: Mozilla/5.0 SV1
  63. Accept: text/plain
  64. Accept-Encoding: identify
  65. Content-Type: application/x-www-form-urlencoded
  66. Content-Length: 96
  67.  
  68. username=calluser&credential=MyPass&realm=&ajax=1&redir=%2Fremote%2Findex&just_logged_in=1
  69. 04/13/2016 21:10:08 [9030] get response
  70. 04/13/2016 21:10:08 [9030] no Content-Length
  71. 04/13/2016 21:10:08 [9030] RESPONSE[514]:
  72. HTTP/1.1 200 OK
  73. Date: Thu, 14 Apr 2016 13:35:08 GMT
  74. Set-Cookie: SVPNCOOKIE=e3mE6berXlWjpxaKYxwSPe....e+pHntb2dTCdHedzfF6yEetLDw7wkEtqUWbM/roP5LUO3uione...ajNt5f7B5Z9nCEPALE0YuiKrSfvoZiMfvK5r/k7+PqSSMQntJhpgOEuKSEdH4ujYj%0a; path=/; secure; httponly
  75. Transfer-Encoding: chunked
  76. Content-Type: text/html
  77. X-Frame-Options: SAMEORIGIN
  78.  
  79. <html><head>
  80. <script language="javascript">
  81. document.location=decodeURIComponent("/remote/index");
  82. </script>
  83. </head></html>
  84.  
  85. 04/13/2016 21:10:08 [9030] RESPONSE[514]:
  86. HTTP/1.1 200 OK
  87. Date: Thu, 14 Apr 2016 13:35:08 GMT
  88. Set-Cookie: SVPNCOOKIE=...../rk7IhJO/11IwSedIe2cDQYvlZj0T18e%0awgFJ06e+pHntb2dTCdHedzfF6yEetLDw7wkEtqUWbM/roP5LUO3uioneZRg3cXNc%0ajNt5f7B5Z9nCEPALE0YuiKrSfvoZiMfvK5r/k7+PqSSMQntJhpgOEuKSEdH4ujYj%0a; path=/; secure; httponly
  89. Transfer-Encoding: chunked
  90. Content-Type: text/html
  91. X-Frame-Options: SAMEORIGIN
  92.  
  93. <html><head>
  94. <script language="javascript">
  95. document.location=decodeURIComponent("/remote/index");
  96. </script>
  97. </head></html>
  98.  
  99. 04/13/2016 21:10:08 [9030] cookie: SVPNCOOKIE=...../rk7IhJO/11IwSedIe2cDQYvlZj0T18e%0awgFJ06e+pHntb2dTCdHedzfF6yEetLDw7wkEtqUWbM/roP5LUO3uioneZRg3cXNc%0ajNt5f7B5Z9nCEPALE0YuiKrSfvoZiMfvK5r/k7+PqSSMQntJhpgOEuKSEdH4ujYj%0a
  100. 04/13/2016 21:10:08 [9030] get /remote/index
  101. 04/13/2016 21:10:08 [9030] GET[406]:
  102. GET /remote/index HTTP/1.1
  103. Host: 178.207.157.170:10443
  104. User-Agent: Mozilla/5.0 SV1
  105. Accept: text/plain
  106. Accept-Encoding: identify
  107. Content-Type: application/x-www-form-urlencoded
  108. Cookie: SVPNCOOKIE=e3mE6berXlWjpxaKYxwSPeHOOqrq8k4x/rk7IhJO/.....%0awgFJ06e+pHntb2dTCdHedzfF6yEetLDw7wkEtqUWbM/roP5LUO3uioneZRg3cXNc%0ajNt5f7B5Z9nCEPALE0YuiKrSfvoZiMfvK5r/k7+PqSSMQntJhpgOEuKSEdH4ujYj%0a
  109.  
  110.  
  111. 04/13/2016 21:10:08 [9030] get response
  112. 04/13/2016 21:10:08 [9030] no Content-Length
  113. 04/13/2016 21:10:08 [9030] RESPONSE[1712]:
  114. HTTP/1.1 403 Forbidden
  115. Date: Thu, 14 Apr 2016 13:35:08 GMT
  116. Transfer-Encoding: chunked
  117. Content-Type: text/html
  118. X-Frame-Options: SAMEORIGIN
  119.  
  120. <HTML>
  121. <HEAD>
  122. <META http-equiv="Content-Type" content="text/html; charset=utf-8">
  123. <META HTTP-EQUIV="Pragma" CONTENT="no-cache">
  124. <link href="/style.css?q=19748" rel="stylesheet" type="text/css">
  125. <script type='text/javascript' src='/lang/en.js'></script>
  126. </head>
  127. <body class="main">
  128. <table class="container" cellpadding="0" cellspacing="0">
  129. <tr>
  130. <td><table class="dialog" width=300 align="center" cellpadding="0" cellspacing="0">
  131. <tr>
  132. <td><table class="header" cellpadding="0" cellspacing="0">
  133. <tr>
  134. <td id="err_title"></td>
  135. </tr>
  136. </table></td>
  137. </tr>
  138. <script>document.getElementById('err_title').innerHTML=fgt_lang['error'];</script>
  139. <tr>
  140. <td class="body" height=100><table class="body"><tr><td id='err_val' title='403' align="center">
  141. <script>
  142. var errval_elem=document.getElementById('err_val');
  143. var errval=errval_elem.getAttribute('title').split(',');
  144. var err_str = fgt_lang[errval[0]];
  145. if (err_str == undefined) {
  146. errval_elem.innerHTML = "some unknown error!<br>";
  147. } else { if (errval.length == 2) {
  148. err_str = err_str.replace("%d", errval[1]);
  149. }
  150. errval_elem.innerHTML = err_str;
  151. }
  152. </script></td></tr></table></td>
  153. </tr>
  154. <tr><td>
  155. <table class="footer" cellpadding="0" cellspacing="0">
  156. <tr><td>
  157. <input id="ok_button" type="button" value="" onclick="chkbrowser()" style="width:80px">
  158. </td></tr>
  159. </table>
  160. </td></tr>
  161. </table>
  162. </body>
  163. <script language = "javascript">
  164. document.getElementById('ok_button').value=fgt_lang['ok'];
  165. function chkbrowser() {
  166. if (window.location.pathname == "/remote/login")
  167. history.go(0);
  168. else
  169. history.go(-1);}
  170. </script>
  171. </html>
  172.  
  173. 04/13/2016 21:10:08 [9030] get /remote/fortisslvpn
  174. 04/13/2016 21:10:08 [9030] GET[412]:
  175. GET /remote/fortisslvpn HTTP/1.1
  176. Host: 178.207.157.170:10443
  177. User-Agent: Mozilla/5.0 SV1
  178. Accept: text/plain
  179. Accept-Encoding: identify
  180. Content-Type: application/x-www-form-urlencoded
  181. Cookie: SVPNCOOKIE=e3mE6berXlWjpxaKYxwSPeHOOqrq8k4x/rk7I....qUWbM/....%0ajNt5f7B5Z9nCEPALE0YuiKrSfvoZiMfvK5r/k7+PqSSMQntJhpgOEuKSEdH4ujYj%0a
  182.  
  183.  
  184. 04/13/2016 21:10:08 [9030] get response
  185. 04/13/2016 21:10:08 [9030] no Content-Length
  186. 04/13/2016 21:10:08 [9030] RESPONSE[4155]:
  187. HTTP/1.1 200 OK
  188. Date: Thu, 14 Apr 2016 13:35:08 GMT
  189. Set-Cookie: SVPNCOOKIE=e3mE.....bM/roP5LUO3uioneZRg3cXNc%0ajNt5f7B5Z9nCEPALE0YuiKrSfvoZiMfvK5r/k7+PqSSMQntJhpgOEuKSEdH4ujYj%0a; path=/; secure; httponly
  190. Transfer-Encoding: chunked
  191. Content-Type: text/html; charset=utf-8
  192. X-Frame-Options: SAMEORIGIN
  193.  
  194. <HTML>
  195.  
  196. <HEAD>
  197.  
  198. <META http-equiv="Content-Type" content="text/html; charset=UTF-8">
  199. <META http-equiv="Pragma" content="no-cache">
  200. <META http-equiv="cache-control" content="no-cache">
  201. <META http-equiv="cache-control" content="must-revalidate">
  202. <link href="/sslvpn/css/sslvpn.css" rel="stylesheet" type="text/css">
  203. <script type='text/javascript' src='/lang/en.js'></script>
  204. <script language="JavaScript">
  205. function load_fortisslvpn_strings() {
  206. document.getElementById('vb_connect').value = fgt_lang['sslvpn_wtunnel_connect'];
  207. document.getElementById('sslvpn_wtunnel_disconnect').value = fgt_lang['sslvpn_wtunnel_disconnect'];
  208. document.getElementById('sslvpn_wtunnel_refresh').value = fgt_lang['sslvpn_wtunnel_refresh'];
  209. document.getElementById('sslvpn_wtunnel_link_status').innerHTML = fgt_lang['sslvpn_wtunnel_link_status'] + ":";
  210. document.getElementById('sslvpn_wtunnel_bytes_tx').innerHTML = fgt_lang['sslvpn_wtunnel_bytes_tx'] + ":";
  211. document.getElementById('sslvpn_wtunnel_bytes_rx').innerHTML = fgt_lang['sslvpn_wtunnel_bytes_rx'] + ":";
  212. document.getElementById('sslvpn_wtunnel_collecting').value = fgt_lang['sslvpn_wtunnel_collecting'];
  213. }
  214. </script>
  215.  
  216. <TITLE>Fortinet SSL-VPN Client Version 1.0</TITLE>
  217.  
  218. <!-- SSL-VPN protocol version:
  219. embed.FGTversion = 1;
  220. fortisslvpn.FGTversion = 1
  221. -->
  222.  
  223. </HEAD>
  224. <BODY class=main>
  225. <form name="fortisslvpn">
  226. <input type="hidden" NAME="text6" VALUE="192.168.1.0/255.255.255.0">
  227. <input type="hidden" NAME="text3" value="178.207.157.170:10443">
  228. <input type="hidden" NAME="text7" value="0">
  229. <div class="widget_content"><br style="display: none;"><style>input.readonly { border:0px; }</style><div><input id='vb_connect' LANGUAGE="JavaScript" TYPE=button VALUE="" DISABLED=true NAME="submit3">
  230. <input id='sslvpn_wtunnel_disconnect' LANGUAGE="JavaScript" TYPE=button VALUE="" DISABLED=true NAME="submit4">
  231. <input id='sslvpn_wtunnel_refresh' LANGUAGE="JavaScript" TYPE=button VALUE="" DISABLED=true NAME="submit5"></td>
  232. </div><div><table><tbody><tr><td id='sslvpn_wtunnel_link_status'></td><td><input id="sslvpn_tunnel_status_value" type="text" size="20" name="text1" class="readonly" readonly="true"></td>
  233. </td></tr><tr><td id='sslvpn_wtunnel_bytes_tx'></td><td><input TYPE="text" size="20" name="text4" class="readonly" readonly="true"></td>
  234. </td></tr><tr><td id='sslvpn_wtunnel_bytes_rx'></td><td><input TYPE="text" size="20" name="text5" class="readonly" readonly="true"></td>
  235. </td></tr></tbody></table></div><hr style="background-color: gray;"><div><input id='sslvpn_wtunnel_collecting' type="text" name="text11" class="readonly" readonly="true" value="" style="width: 100%"></div></div></form><script language="Javascript">
  236. function js_get_cookie(c_name) {var cookie_str='......EtqUWbM/roP5LUO3uioneZRg3cXNc%0ajNt5f7B5Z9nCEPALE0YuiKrSfvoZiMfvK5r/k7+PqSSMQntJhpgOEuKSEdH4ujYj%0a';if (document.cookie.length>0) {c_start = document.cookie.indexOf(c_name + "=");if (c_start != -1) {c_start = c_start + c_name.length + 1;c_end = document.cookie.indexOf(";", c_start);if (c_end == -1) c_end = document.cookie.length;cookie_str=document.cookie.substring(c_start, c_end);}}return cookie_str;}
  237. function js_get_host_address() {var port;if (document.location.port == "") {port=443;if (document.location.protocol == "http") {port=80;}} else {port = document.location.port;}if (document.location.hostname.indexOf(':') >= 0) {return '['+document.location.hostname+']:' + port+'?'+js_get_cookie('SVPNCOOKIE');} else {return document.location.hostname + ':' + port + '?' + js_get_cookie('SVPNCOOKIE');}}
  238. </script>
  239. </body>
  240. <script language="JavaScript">
  241. location.href = "/registryml.html";
  242. </script>
  243. </HTML>
  244.  
  245. 04/13/2016 21:10:08 [9030] 0|178.207.157.170|10443|1|192.168.1.0/255.255.255.0|e3mE6be.....%0awgFJ06e+pHntb2dTCdHedzfF6yEetLDw7wkEtqUWbM/roP5LUO3uioneZRg3cXNc%0ajNt5f7B5Z9nCEPALE0YuiKrSfvoZiMfvK5r/k7+PqSSMQntJhpgOEuKSEdH4ujYj%0a|0
  246. 04/13/2016 21:10:08 [9008] rcv from grab web:0|178.207.157.170|10443|1|192.168.1.0/255.255.255.0|e3mE6berXlWjpxaKYx......awgFJ06e+pHntb2dTCdHedzfF6yEetLDw7wkEtqUWbM/roP5LUO3uioneZRg3cXNc%0ajNt5f7B5Z9nCEPALE0YuiKrSfvoZiMfvK5r/k7+PqSSMQntJhpgOEuKSEdH4ujYj%0a|0
  247.  
  248. 04/13/2016 21:10:08 [9008] ssl vpn tunnel started
  249. 04/13/2016 21:10:08 [9008] rcv cmd:0 at state[1]
  250. 04/13/2016 21:10:08 [9032] server=178.207.157.170[178.207.157.170] port=10443[10443] version=1 tunnel=192.168.1.0/255.255.255.0 cookie=e3mE6berXlWjpxaKYx.....WbM/roP5LUO3uioneZRg3cXNc%0ajNt5f7B5Z9nCEPALE0YuiKrSfvoZiMfvK5r/k7+PqSSMQntJhpgOEuKSEdH4ujYj%0a exclusive routing: 0
  251.  
  252. 04/13/2016 21:10:08 [9032] starting pppd
  253. 04/13/2016 21:10:08 [9032] use tty:/dev/pts/10
  254. 04/13/2016 21:10:08 [9032] connecting to 178.207.157.170:10443
  255. 04/13/2016 21:10:08 [9032] [xml config]: GET /remote/fortisslvpn_xml ... (received 812 bytes):
  256. HTTP/1.1 200 OK
  257. Date: Thu, 14 Apr 2016 13:35:08 GMT
  258. Set-Cookie: SVPNCOOKIE=e3mE6berXlWjpxaK.....Dw7wkEtqUWbM/roP5LUO3uioneZRg3cXNc%0ajNt5f7B5Z9nCEPALE0YuiKrSfvoZiMfvK5r/k7+PqSSMQntJhpgOEuKSEdH4ujYj%0a; path=/; secure; httponly
  259. Transfer-Encoding: chunked
  260. Content-Type: text/xml
  261. X-Frame-Options: SAMEORIGIN
  262.  
  263. <?xml version='1.0' encoding='utf-8'?><sslvpn-tunnel ver='1'><fos platform='FGT80C' major='5' minor='02' patch='4' build='0688' branch='688' /><client-config save-password='off' keep-alive='off' auto-connect='off' /><ipv4><assigned-addr ipv4='10.212.134.201' /><split-tunnel-info><addr ip='192.168.1.0' mask='255.255.255.0' /></split-tunnel-info></ipv4><idle-timeout val='300' /><auth-timeout val='28800' /></sslvpn-tunnel>
  264. ----
  265.  
  266. 04/13/2016 21:10:08 [9032] begin io loop
  267. 04/13/2016 21:10:08 [9032] launch ssl read thread
  268. 04/13/2016 21:10:08 [9032] launch tty read thread
  269. 04/13/2016 21:10:08 [9032] ssl read thread started
  270. 04/13/2016 21:10:08 [9032] tty read thread started
  271. 04/13/2016 21:10:08 [9032] ssl write thread started
  272. 04/13/2016 21:10:08 [9032] tty write thread started
  273. 04/13/2016 21:10:08 [9032] Got local address from ppp, interface will be up
  274. 04/13/2016 21:10:09 [9032] ppp interface is up
  275. 04/13/2016 21:10:09 [9032] run_scutil 178.207.157.170 192.168.1.0/255.255.255.0 0...
  276. 04/13/2016 21:10:09 [9032] main thread waiting on condition
  277. begin sysconfig linux
  278. Generating pppd.resolv.conf...Done
  279. server route
  280. interface ppp0
  281. address 10.212.134.201
  282. delete route 1.1.1.1
  283. route to 178.207.157.170 already OK
  284. route -n add -net 192.168.1.0 netmask 255.255.255.0 gw 10.212.134.201
  285. 04/13/2016 21:10:12 [9030] 1460571008->1460571012
  286. 04/13/2016 21:10:14 [9032] killing pppd ...
  287. 04/13/2016 21:10:14 [9032] kill_child:9035
  288. 04/13/2016 21:10:14 [9032] kill_child:9052
  289. 04/13/2016 21:10:14 [9030] signal rcved, logout now
  290. 04/13/2016 21:10:14 [9030] GET[407]:
  291. GET /remote/logout HTTP/1.1
  292. Host: 178.207.157.170:10443
  293. User-Agent: Mozilla/5.0 SV1
  294. Accept: text/plain
  295. Accept-Encoding: identify
  296. Content-Type: application/x-www-form-urlencoded
  297. Cookie: SVPNCOOKIE=e3mE6berXlW...../roP5LUO3uioneZRg3cXNc%0ajNt5f7B5Z9nCEPALE0YuiKrSfvoZiMfvK5r/k7+PqSSMQntJhpgOEuKSEdH4ujYj%0a
  298.  
  299.  
  300. 04/13/2016 21:10:14 [9030] get response
  301. 04/13/2016 21:10:14 [9008] kill_child:9032
  302. 04/13/2016 21:10:14 [9008] kill_child:9032
  303. 04/13/2016 21:10:14 [9008] tunnel terminated
  304. 04/13/2016 21:10:14 [9008] kill_child:9030
  305. 04/13/2016 21:10:14 [9030] 1460571012->1460571014
  306. 04/13/2016 21:10:14 [9030] RESPONSE[369]:
  307. HTTP/1.1 302 Found
  308. Date: Thu, 14 Apr 2016 13:35:14 GMT
  309. Set-Cookie: SVPNCOOKIE=; path=/; expires=Thu, 14-Apr-2016 13:35:14 GMT; secure; httponly;
  310. Set-Cookie: SVPNNETWORKCOOKIE=; path=/remote/network; expires=Thu, 14-Apr-2016 13:35:14 GMT; secure; httponly
  311. Location: /remote/login?lang=en
  312. Content-Length: 0
  313. Content-Type: text/plain
  314. X-Frame-Options: SAMEORIGIN
  315.  
  316.  
  317. begin cleanup linux...
  318. restore /etc/resolv.conf
  319. clean up route...
  320. truncate pppd.log
  321. truncate forticlientsslvpn.log
  322. 04/13/2016 21:10:14 [9008] FortiClient SSLVPN[4.0.2289] stopped
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement