Advertisement
Guest User

Untitled

a guest
Jan 5th, 2018
88
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. dogma@dogma:~$ sudo tail -f -n 0 /var/log/syslog
  2. [sudo] password for dogma:
  3. Jan  5 17:15:25 dogma NetworkManager[924]: <info>  [1515161725.7640] audit: op="connection-activate" uuid="4588bec4-238f-479e-8ffc-3c111073e101" name="UMBRELLA-WEB" pid=19222 uid=1000 result="success"
  4. Jan  5 17:15:25 dogma NetworkManager[924]: <info>  [1515161725.7717] vpn-connection[0x1a6d3e0,4588bec4-238f-479e-8ffc-3c111073e101,"UMBRELLA-WEB",0]: Started the VPN service, PID 4715
  5. Jan  5 17:15:25 dogma gnome-session[1918]: (gnome-shell:2336): Gjs-WARNING **: JS ERROR: TypeError: a._connection is null
  6. Jan  5 17:15:25 dogma gnome-session[1918]: NMVPNSection<.setActiveConnections/<@resource:///org/gnome/shell/ui/status/network.js:1534
  7. Jan  5 17:15:25 dogma gnome-session[1918]: NMVPNSection<.setActiveConnections@resource:///org/gnome/shell/ui/status/network.js:1533
  8. Jan  5 17:15:25 dogma gnome-session[1918]: wrapper@resource:///org/gnome/gjs/modules/lang.js:178
  9. Jan  5 17:15:25 dogma gnome-session[1918]: NMApplet<._syncVPNConnections@resource:///org/gnome/shell/ui/status/network.js:1822
  10. Jan  5 17:15:25 dogma gnome-session[1918]: wrapper@resource:///org/gnome/gjs/modules/lang.js:178
  11. Jan  5 17:15:25 dogma gnome-session[31180]: (gnome-shell:31362): Gjs-WARNING **: JS ERROR: TypeError: a._connection is null
  12. Jan  5 17:15:25 dogma gnome-session[31180]: NMVPNSection<.setActiveConnections/<@resource:///org/gnome/shell/ui/status/network.js:1534
  13. Jan  5 17:15:25 dogma gnome-session[31180]: NMVPNSection<.setActiveConnections@resource:///org/gnome/shell/ui/status/network.js:1533
  14. Jan  5 17:15:25 dogma gnome-session[31180]: wrapper@resource:///org/gnome/gjs/modules/lang.js:178
  15. Jan  5 17:15:25 dogma gnome-session[31180]: NMApplet<._syncVPNConnections@resource:///org/gnome/shell/ui/status/network.js:1822
  16. Jan  5 17:15:25 dogma gnome-session[31180]: wrapper@resource:///org/gnome/gjs/modules/lang.js:178
  17. Jan  5 17:15:25 dogma NetworkManager[924]: <info>  [1515161725.7757] vpn-connection[0x1a6d3e0,4588bec4-238f-479e-8ffc-3c111073e101,"UMBRELLA-WEB",0]: Saw the service appear; activating connection
  18. Jan  5 17:15:25 dogma NetworkManager[924]: <info>  [1515161725.9089] vpn-connection[0x1a6d3e0,4588bec4-238f-479e-8ffc-3c111073e101,"UMBRELLA-WEB",0]: VPN connection: (ConnectInteractive) reply received
  19. Jan  5 17:15:25 dogma NetworkManager[924]: nm-l2tp[4715] <info>  ipsec enable flag: yes
  20. Jan  5 17:15:25 dogma NetworkManager[924]: ** Message: Check port 1701
  21. Jan  5 17:15:25 dogma NetworkManager[924]: nm-l2tp[4715] <info>  starting ipsec
  22. Jan  5 17:15:25 dogma NetworkManager[924]: Stopping strongSwan IPsec failed: starter is not running
  23. Jan  5 17:15:27 dogma NetworkManager[924]: Starting strongSwan 5.3.5 IPsec [starter]...
  24. Jan  5 17:15:27 dogma NetworkManager[924]: Loading config setup
  25. Jan  5 17:15:27 dogma NetworkManager[924]: Loading conn '4588bec4-238f-479e-8ffc-3c111073e101'
  26. Jan  5 17:15:27 dogma NetworkManager[924]: found netkey IPsec stack
  27. Jan  5 17:15:27 dogma charon: 00[DMN] Starting IKE charon daemon (strongSwan 5.3.5, Linux 4.10.0-42-generic, x86_64)
  28. Jan  5 17:15:27 dogma charon: 00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts'
  29. Jan  5 17:15:27 dogma charon: 00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts'
  30. Jan  5 17:15:27 dogma charon: 00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts'
  31. Jan  5 17:15:27 dogma charon: 00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts'
  32. Jan  5 17:15:27 dogma charon: 00[CFG] loading crls from '/etc/ipsec.d/crls'
  33. Jan  5 17:15:27 dogma charon: 00[CFG] loading secrets from '/etc/ipsec.secrets'
  34. Jan  5 17:15:27 dogma charon: 00[CFG] loading secrets from '/etc/ipsec.d/nm-l2tp-ipsec-4588bec4-238f-479e-8ffc-3c111073e101.secrets'
  35. Jan  5 17:15:27 dogma charon: 00[CFG]   loaded IKE secret for %any
  36. Jan  5 17:15:27 dogma charon: 00[LIB] loaded plugins: charon test-vectors aes rc2 sha1 sha2 md4 md5 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl fips-prf gmp agent xcbc hmac gcm attr kernel-netlink resolve socket-default connmark stroke updown
  37. Jan  5 17:15:27 dogma charon: 00[LIB] dropped capabilities, running as uid 0, gid 0
  38. Jan  5 17:15:27 dogma charon: 00[JOB] spawning 16 worker threads
  39. Jan  5 17:15:27 dogma charon: 05[CFG] received stroke: add connection '4588bec4-238f-479e-8ffc-3c111073e101'
  40. Jan  5 17:15:27 dogma charon: 05[CFG] added configuration '4588bec4-238f-479e-8ffc-3c111073e101'
  41. Jan  5 17:15:28 dogma charon: 08[CFG] rereading secrets
  42. Jan  5 17:15:28 dogma charon: 08[CFG] loading secrets from '/etc/ipsec.secrets'
  43. Jan  5 17:15:28 dogma charon: 08[CFG] loading secrets from '/etc/ipsec.d/nm-l2tp-ipsec-4588bec4-238f-479e-8ffc-3c111073e101.secrets'
  44. Jan  5 17:15:28 dogma charon: 08[CFG]   loaded IKE secret for %any
  45. Jan  5 17:15:28 dogma NetworkManager[924]: nm-l2tp[4715] <info>  Spawned ipsec up script with PID 4780.
  46. Jan  5 17:15:28 dogma charon: 09[CFG] received stroke: initiate '4588bec4-238f-479e-8ffc-3c111073e101'
  47. Jan  5 17:15:28 dogma charon: 10[IKE] initiating Main Mode IKE_SA 4588bec4-238f-479e-8ffc-3c111073e101[1] to 95.174.110.160
  48. Jan  5 17:15:28 dogma charon: 10[ENC] generating ID_PROT request 0 [ SA V V V V ]
  49. Jan  5 17:15:28 dogma charon: 10[NET] sending packet: from 192.168.1.5[500] to 95.174.110.160[500] (212 bytes)
  50. Jan  5 17:15:28 dogma charon: 12[NET] received packet: from 95.174.110.160[500] to 192.168.1.5[500] (132 bytes)
  51. Jan  5 17:15:28 dogma charon: 12[ENC] parsed ID_PROT response 0 [ SA V V V ]
  52. Jan  5 17:15:28 dogma charon: 12[IKE] received XAuth vendor ID
  53. Jan  5 17:15:28 dogma charon: 12[IKE] received DPD vendor ID
  54. Jan  5 17:15:28 dogma charon: 12[IKE] received NAT-T (RFC 3947) vendor ID
  55. Jan  5 17:15:28 dogma charon: 12[ENC] generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
  56. Jan  5 17:15:28 dogma charon: 12[NET] sending packet: from 192.168.1.5[500] to 95.174.110.160[500] (244 bytes)
  57. Jan  5 17:15:29 dogma charon: 13[NET] received packet: from 95.174.110.160[500] to 192.168.1.5[500] (244 bytes)
  58. Jan  5 17:15:29 dogma charon: 13[ENC] parsed ID_PROT response 0 [ KE No NAT-D NAT-D ]
  59. Jan  5 17:15:29 dogma charon: 13[IKE] local host is behind NAT, sending keep alives
  60. Jan  5 17:15:29 dogma charon: 13[ENC] generating ID_PROT request 0 [ ID HASH ]
  61. Jan  5 17:15:29 dogma charon: 13[NET] sending packet: from 192.168.1.5[4500] to 95.174.110.160[4500] (68 bytes)
  62. Jan  5 17:15:29 dogma charon: 14[NET] received packet: from 95.174.110.160[4500] to 192.168.1.5[4500] (68 bytes)
  63. Jan  5 17:15:29 dogma charon: 14[ENC] parsed ID_PROT response 0 [ ID HASH ]
  64. Jan  5 17:15:29 dogma charon: 14[IKE] IKE_SA 4588bec4-238f-479e-8ffc-3c111073e101[1] established between 192.168.1.5[192.168.1.5]...95.174.110.160[95.174.110.160]
  65. Jan  5 17:15:29 dogma charon: 14[IKE] scheduling reauthentication in 10233s
  66. Jan  5 17:15:29 dogma charon: 14[IKE] maximum IKE_SA lifetime 10773s
  67. Jan  5 17:15:29 dogma charon: 14[ENC] generating QUICK_MODE request 908248156 [ HASH SA No ID ID NAT-OA NAT-OA ]
  68. Jan  5 17:15:29 dogma charon: 14[NET] sending packet: from 192.168.1.5[4500] to 95.174.110.160[4500] (220 bytes)
  69. Jan  5 17:15:29 dogma charon: 15[NET] received packet: from 95.174.110.160[4500] to 192.168.1.5[4500] (196 bytes)
  70. Jan  5 17:15:29 dogma charon: 15[ENC] parsed QUICK_MODE response 908248156 [ HASH SA No ID ID NAT-OA NAT-OA ]
  71. Jan  5 17:15:29 dogma charon: 15[IKE] CHILD_SA 4588bec4-238f-479e-8ffc-3c111073e101{1} established with SPIs c76aadc7_i caca235d_o and TS 192.168.1.5/32[udp/l2f] === 95.174.110.160/32[udp/l2f]
  72. Jan  5 17:15:29 dogma NetworkManager[924]: initiating Main Mode IKE_SA 4588bec4-238f-479e-8ffc-3c111073e101[1] to 95.174.110.160
  73. Jan  5 17:15:29 dogma NetworkManager[924]: generating ID_PROT request 0 [ SA V V V V ]
  74. Jan  5 17:15:29 dogma NetworkManager[924]: sending packet: from 192.168.1.5[500] to 95.174.110.160[500] (212 bytes)
  75. Jan  5 17:15:29 dogma NetworkManager[924]: received packet: from 95.174.110.160[500] to 192.168.1.5[500] (132 bytes)
  76. Jan  5 17:15:29 dogma NetworkManager[924]: parsed ID_PROT response 0 [ SA V V V ]
  77. Jan  5 17:15:29 dogma NetworkManager[924]: received XAuth vendor ID
  78. Jan  5 17:15:29 dogma NetworkManager[924]: received DPD vendor ID
  79. Jan  5 17:15:29 dogma NetworkManager[924]: received NAT-T (RFC 3947) vendor ID
  80. Jan  5 17:15:29 dogma NetworkManager[924]: generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
  81. Jan  5 17:15:29 dogma NetworkManager[924]: sending packet: from 192.168.1.5[500] to 95.174.110.160[500] (244 bytes)
  82. Jan  5 17:15:29 dogma NetworkManager[924]: received packet: from 95.174.110.160[500] to 192.168.1.5[500] (244 bytes)
  83. Jan  5 17:15:29 dogma NetworkManager[924]: parsed ID_PROT response 0 [ KE No NAT-D NAT-D ]
  84. Jan  5 17:15:29 dogma NetworkManager[924]: local host is behind NAT, sending keep alives
  85. Jan  5 17:15:29 dogma NetworkManager[924]: generating ID_PROT request 0 [ ID HASH ]
  86. Jan  5 17:15:29 dogma NetworkManager[924]: sending packet: from 192.168.1.5[4500] to 95.174.110.160[4500] (68 bytes)
  87. Jan  5 17:15:29 dogma NetworkManager[924]: received packet: from 95.174.110.160[4500] to 192.168.1.5[4500] (68 bytes)
  88. Jan  5 17:15:29 dogma NetworkManager[924]: parsed ID_PROT response 0 [ ID HASH ]
  89. Jan  5 17:15:29 dogma NetworkManager[924]: IKE_SA 4588bec4-238f-479e-8ffc-3c111073e101[1] established between 192.168.1.5[192.168.1.5]...95.174.110.160[95.174.110.160]
  90. Jan  5 17:15:29 dogma NetworkManager[924]: scheduling reauthentication in 10233s
  91. Jan  5 17:15:29 dogma NetworkManager[924]: maximum IKE_SA lifetime 10773s
  92. Jan  5 17:15:29 dogma NetworkManager[924]: generating QUICK_MODE request 908248156 [ HASH SA No ID ID NAT-OA NAT-OA ]
  93. Jan  5 17:15:29 dogma NetworkManager[924]: sending packet: from 192.168.1.5[4500] to 95.174.110.160[4500] (220 bytes)
  94. Jan  5 17:15:29 dogma NetworkManager[924]: received packet: from 95.174.110.160[4500] to 192.168.1.5[4500] (196 bytes)
  95. Jan  5 17:15:29 dogma NetworkManager[924]: parsed QUICK_MODE response 908248156 [ HASH SA No ID ID NAT-OA NAT-OA ]
  96. Jan  5 17:15:29 dogma NetworkManager[924]: CHILD_SA 4588bec4-238f-479e-8ffc-3c111073e101{1} established with SPIs c76aadc7_i caca235d_o and TS 192.168.1.5/32[udp/l2f] === 95.174.110.160/32[udp/l2f]
  97. Jan  5 17:15:29 dogma NetworkManager[924]: connection '4588bec4-238f-479e-8ffc-3c111073e101' established successfully
  98. Jan  5 17:15:29 dogma charon: 15[ENC] generating QUICK_MODE request 908248156 [ HASH ]
  99. Jan  5 17:15:29 dogma charon: 15[NET] sending packet: from 192.168.1.5[4500] to 95.174.110.160[4500] (60 bytes)
  100. Jan  5 17:15:29 dogma NetworkManager[924]: nm-l2tp[4715] <info>  strongSwan IPsec tunnel is up.
  101. Jan  5 17:15:29 dogma NetworkManager[924]: ** Message: xl2tpd started with pid 4789
  102. Jan  5 17:15:29 dogma NetworkManager[924]: xl2tpd[4789]: setsockopt recvref[30]: Protocol not available
  103. Jan  5 17:15:29 dogma NetworkManager[924]: xl2tpd[4789]: Using l2tp kernel support.
  104. Jan  5 17:15:29 dogma NetworkManager[924]: xl2tpd[4789]: xl2tpd version xl2tpd-1.3.6 started on dogma PID:4789
  105. Jan  5 17:15:29 dogma NetworkManager[924]: xl2tpd[4789]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc.
  106. Jan  5 17:15:29 dogma NetworkManager[924]: xl2tpd[4789]: Forked by Scott Balmos and David Stipp, (C) 2001
  107. Jan  5 17:15:29 dogma NetworkManager[924]: xl2tpd[4789]: Inherited by Jeff McAdams, (C) 2002
  108. Jan  5 17:15:29 dogma NetworkManager[924]: xl2tpd[4789]: Forked again by Xelerance (www.xelerance.com) (C) 2006
  109. Jan  5 17:15:29 dogma NetworkManager[924]: xl2tpd[4789]: Listening on IP address 0.0.0.0, port 1701
  110. Jan  5 17:15:29 dogma NetworkManager[924]: xl2tpd[4789]: Connecting to host 95.174.110.160, port 1701
  111. Jan  5 17:15:29 dogma NetworkManager[924]: <info>  [1515161729.4479] vpn-connection[0x1a6d3e0,4588bec4-238f-479e-8ffc-3c111073e101,"UMBRELLA-WEB",0]: VPN plugin: state changed: starting (3)
  112. Jan  5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: Connection established to 95.174.110.160, 1701.  Local: 6058, Remote: 12494 (ref=0/0).
  113. Jan  5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: Calling on tunnel 6058
  114. Jan  5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: check_control: Received out of order control packet on tunnel 12494 (got 0, expected 1)
  115. Jan  5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: handle_packet: bad control packet!
  116. Jan  5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: check_control: Received out of order control packet on tunnel 12494 (got 0, expected 1)
  117. Jan  5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: handle_packet: bad control packet!
  118. Jan  5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: Call established with 95.174.110.160, Local: 20338, Remote: 18020, Serial: 1 (ref=0/0)
  119. Jan  5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: start_pppd: I'm running:
  120. Jan  5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: "/usr/sbin/pppd"
  121. Jan  5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: "passive"
  122. Jan  5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: "nodetach"
  123. Jan  5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: ":"
  124. Jan  5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: "file"
  125. Jan  5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: "/var/run/nm-l2tp-ppp-options-4588bec4-238f-479e-8ffc-3c111073e101"
  126. Jan  5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: "plugin"
  127. Jan  5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: "pppol2tp.so"
  128. Jan  5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: "pppol2tp"
  129. Jan  5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: "7"
  130. Jan  5 17:15:31 dogma pppd[4790]: Plugin /usr/lib/pppd/2.4.7/nm-l2tp-pppd-plugin.so loaded.
  131. Jan  5 17:15:31 dogma pppd[4790]: nm-l2tp[4715] <info>  [helper-4790] initializing
  132. Jan  5 17:15:31 dogma pppd[4790]: Plugin pppol2tp.so loaded.
  133. Jan  5 17:15:31 dogma pppd[4790]: pppd 2.4.7 started by root, uid 0
  134. Jan  5 17:15:31 dogma pppd[4790]: nm-l2tp[4715] <info>  [helper-4790] phasechange: status 3 / phase 'serial connection'
  135. Jan  5 17:15:31 dogma pppd[4790]: Using interface ppp0
  136. Jan  5 17:15:31 dogma pppd[4790]: Connect: ppp0 <-->
  137. Jan  5 17:15:31 dogma pppd[4790]: nm-l2tp[4715] <info>  [helper-4790] phasechange: status 5 / phase 'establish'
  138. Jan  5 17:15:31 dogma pppd[4790]: Overriding mtu 1500 to 1400
  139. Jan  5 17:15:31 dogma NetworkManager[924]: nm_device_get_device_type: assertion 'NM_IS_DEVICE (self)' failed
  140. Jan  5 17:15:31 dogma pppd[4790]: Overriding mru 1500 to mtu value 1400
  141. Jan  5 17:15:31 dogma NetworkManager[924]: <info>  [1515161731.5613] manager: (ppp0): new Generic device (/org/freedesktop/NetworkManager/Devices/41)
  142. Jan  5 17:15:31 dogma NetworkManager[924]: <info>  [1515161731.5674] devices added (path: /sys/devices/virtual/net/ppp0, iface: ppp0)
  143. Jan  5 17:15:31 dogma NetworkManager[924]: <info>  [1515161731.5674] device added (path: /sys/devices/virtual/net/ppp0, iface: ppp0): no ifupdown configuration found.
  144. Jan  5 17:15:31 dogma pppd[4790]: Overriding mtu 1492 to 1400
  145. Jan  5 17:15:31 dogma pppd[4790]: nm-l2tp[4715] <info>  [helper-4790] phasechange: status 6 / phase 'authenticate'
  146. Jan  5 17:15:31 dogma pppd[4790]: EAP: Identity prompt "Name"
  147. Jan  5 17:15:31 dogma pppd[4790]: nm-l2tp[4715] <info>  [helper-4790] passwd-hook: requesting credentials...
  148. Jan  5 17:15:31 dogma pppd[4790]: nm-l2tp[4715] <info>  [helper-4790] passwd-hook: got credentials from NetworkManager-l2tp
  149. Jan  5 17:15:31 dogma pppd[4790]: EAP: peer reports authentication failure
  150. Jan  5 17:15:31 dogma pppd[4790]: nm-l2tp[4715] <info>  [helper-4790] phasechange: status 10 / phase 'terminate'
  151. Jan  5 17:15:31 dogma pppd[4790]: nm-l2tp[4715] <info>  [helper-4790] phasechange: status 5 / phase 'establish'
  152. Jan  5 17:15:31 dogma pppd[4790]: Overriding mtu 1500 to 1400
  153. Jan  5 17:15:31 dogma pppd[4790]: Overriding mru 1500 to mtu value 1400
  154. Jan  5 17:15:31 dogma pppd[4790]: nm-l2tp[4715] <info>  [helper-4790] phasechange: status 11 / phase 'disconnect'
  155. Jan  5 17:15:31 dogma pppd[4790]: Connection terminated.
  156. Jan  5 17:15:31 dogma charon: 11[KNL] interface ppp0 deleted
  157. Jan  5 17:15:31 dogma NetworkManager[924]: nm-l2tp[4715] <info>  Terminated xl2tpd daemon with PID 4789.
  158. Jan  5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: death_handler: Fatal signal 15 received
  159. Jan  5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: Terminating pppd: sending TERM signal to pid 4790
  160. Jan  5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: Connection 12494 closed to 95.174.110.160, port 1701 (Server closing)
  161. Jan  5 17:15:31 dogma NetworkManager[924]: <warn>  [1515161731.7833] vpn-connection[0x1a6d3e0,4588bec4-238f-479e-8ffc-3c111073e101,"UMBRELLA-WEB",0]: VPN plugin: failed: connect-failed (1)
  162. Jan  5 17:15:31 dogma NetworkManager[924]: <error> [1515161731.7853] platform-linux: do-change-link[42]: failure changing link: failure 19 (No such device)
  163. Jan  5 17:15:31 dogma NetworkManager[924]: <warn>  [1515161731.7854] device (ppp0): failed to disable userspace IPv6LL address handling
  164. Jan  5 17:15:31 dogma NetworkManager[924]: <info>  [1515161731.7862] vpn-connection[0x1a6d3e0,4588bec4-238f-479e-8ffc-3c111073e101,"UMBRELLA-WEB",0]: VPN plugin: state changed: stopping (5)
  165. Jan  5 17:15:31 dogma NetworkManager[924]: Stopping strongSwan IPsec...
  166. Jan  5 17:15:31 dogma charon: 00[DMN] signal of type SIGINT received. Shutting down
  167. Jan  5 17:15:31 dogma charon: 00[IKE] closing CHILD_SA 4588bec4-238f-479e-8ffc-3c111073e101{1} with SPIs c76aadc7_i (523 bytes) caca235d_o (853 bytes) and TS 192.168.1.5/32[udp/l2f] === 95.174.110.160/32[udp/l2f]
  168. Jan  5 17:15:31 dogma NetworkManager[924]: <info>  [1515161731.7945] devices removed (path: /sys/devices/virtual/net/ppp0, iface: ppp0)
  169. Jan  5 17:15:31 dogma charon: 00[IKE] sending DELETE for ESP CHILD_SA with SPI c76aadc7
  170. Jan  5 17:15:31 dogma charon: 00[ENC] generating INFORMATIONAL_V1 request 4208910326 [ HASH D ]
  171. Jan  5 17:15:31 dogma charon: 00[NET] sending packet: from 192.168.1.5[4500] to 95.174.110.160[4500] (76 bytes)
  172. Jan  5 17:15:31 dogma charon: 00[IKE] deleting IKE_SA 4588bec4-238f-479e-8ffc-3c111073e101[1] between 192.168.1.5[192.168.1.5]...95.174.110.160[95.174.110.160]
  173. Jan  5 17:15:31 dogma charon: 00[IKE] sending DELETE for IKE_SA 4588bec4-238f-479e-8ffc-3c111073e101[1]
  174. Jan  5 17:15:31 dogma charon: 00[ENC] generating INFORMATIONAL_V1 request 1127108003 [ HASH D ]
  175. Jan  5 17:15:31 dogma charon: 00[NET] sending packet: from 192.168.1.5[4500] to 95.174.110.160[4500] (84 bytes)
  176. Jan  5 17:15:31 dogma gnome-session[31180]: Gjs-Message: JS LOG: Removing a network device that was not added
  177. Jan  5 17:15:31 dogma gnome-session[5509]: Gjs-Message: JS LOG: Removing a network device that was not added
  178. Jan  5 17:15:31 dogma gnome-session[1918]: Gjs-Message: JS LOG: Removing a network device that was not added
  179. Jan  5 17:15:31 dogma pppd[4790]: nm-l2tp[4715] <info>  [helper-4790] phasechange: status 1 / phase 'dead'
  180. Jan  5 17:15:31 dogma pppd[4790]: nm-l2tp[4715] <info>  [helper-4790] exit: cleaning up
  181. Jan  5 17:15:31 dogma pppd[4790]: Exit.
  182. Jan  5 17:15:31 dogma NetworkManager[924]: ** Message: ipsec shut down
  183. Jan  5 17:15:31 dogma NetworkManager[924]: <info>  [1515161731.9010] vpn-connection[0x1a6d3e0,4588bec4-238f-479e-8ffc-3c111073e101,"UMBRELLA-WEB",0]: VPN plugin: state changed: stopped (6)
  184. Jan  5 17:15:31 dogma NetworkManager[924]: <info>  [1515161731.9039] vpn-connection[0x1a6d3e0,4588bec4-238f-479e-8ffc-3c111073e101,"UMBRELLA-WEB",0]: VPN plugin: state change reason: unknown (0)
  185. Jan  5 17:15:31 dogma NetworkManager[924]: <info>  [1515161731.9067] vpn-connection[0x1a6d3e0,4588bec4-238f-479e-8ffc-3c111073e101,"UMBRELLA-WEB",0]: VPN service disappeared
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement