Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- dogma@dogma:~$ sudo tail -f -n 0 /var/log/syslog
- [sudo] password for dogma:
- Jan 5 17:15:25 dogma NetworkManager[924]: <info> [1515161725.7640] audit: op="connection-activate" uuid="4588bec4-238f-479e-8ffc-3c111073e101" name="UMBRELLA-WEB" pid=19222 uid=1000 result="success"
- Jan 5 17:15:25 dogma NetworkManager[924]: <info> [1515161725.7717] vpn-connection[0x1a6d3e0,4588bec4-238f-479e-8ffc-3c111073e101,"UMBRELLA-WEB",0]: Started the VPN service, PID 4715
- Jan 5 17:15:25 dogma gnome-session[1918]: (gnome-shell:2336): Gjs-WARNING **: JS ERROR: TypeError: a._connection is null
- Jan 5 17:15:25 dogma gnome-session[1918]: NMVPNSection<.setActiveConnections/<@resource:///org/gnome/shell/ui/status/network.js:1534
- Jan 5 17:15:25 dogma gnome-session[1918]: NMVPNSection<.setActiveConnections@resource:///org/gnome/shell/ui/status/network.js:1533
- Jan 5 17:15:25 dogma gnome-session[1918]: wrapper@resource:///org/gnome/gjs/modules/lang.js:178
- Jan 5 17:15:25 dogma gnome-session[1918]: NMApplet<._syncVPNConnections@resource:///org/gnome/shell/ui/status/network.js:1822
- Jan 5 17:15:25 dogma gnome-session[1918]: wrapper@resource:///org/gnome/gjs/modules/lang.js:178
- Jan 5 17:15:25 dogma gnome-session[31180]: (gnome-shell:31362): Gjs-WARNING **: JS ERROR: TypeError: a._connection is null
- Jan 5 17:15:25 dogma gnome-session[31180]: NMVPNSection<.setActiveConnections/<@resource:///org/gnome/shell/ui/status/network.js:1534
- Jan 5 17:15:25 dogma gnome-session[31180]: NMVPNSection<.setActiveConnections@resource:///org/gnome/shell/ui/status/network.js:1533
- Jan 5 17:15:25 dogma gnome-session[31180]: wrapper@resource:///org/gnome/gjs/modules/lang.js:178
- Jan 5 17:15:25 dogma gnome-session[31180]: NMApplet<._syncVPNConnections@resource:///org/gnome/shell/ui/status/network.js:1822
- Jan 5 17:15:25 dogma gnome-session[31180]: wrapper@resource:///org/gnome/gjs/modules/lang.js:178
- Jan 5 17:15:25 dogma NetworkManager[924]: <info> [1515161725.7757] vpn-connection[0x1a6d3e0,4588bec4-238f-479e-8ffc-3c111073e101,"UMBRELLA-WEB",0]: Saw the service appear; activating connection
- Jan 5 17:15:25 dogma NetworkManager[924]: <info> [1515161725.9089] vpn-connection[0x1a6d3e0,4588bec4-238f-479e-8ffc-3c111073e101,"UMBRELLA-WEB",0]: VPN connection: (ConnectInteractive) reply received
- Jan 5 17:15:25 dogma NetworkManager[924]: nm-l2tp[4715] <info> ipsec enable flag: yes
- Jan 5 17:15:25 dogma NetworkManager[924]: ** Message: Check port 1701
- Jan 5 17:15:25 dogma NetworkManager[924]: nm-l2tp[4715] <info> starting ipsec
- Jan 5 17:15:25 dogma NetworkManager[924]: Stopping strongSwan IPsec failed: starter is not running
- Jan 5 17:15:27 dogma NetworkManager[924]: Starting strongSwan 5.3.5 IPsec [starter]...
- Jan 5 17:15:27 dogma NetworkManager[924]: Loading config setup
- Jan 5 17:15:27 dogma NetworkManager[924]: Loading conn '4588bec4-238f-479e-8ffc-3c111073e101'
- Jan 5 17:15:27 dogma NetworkManager[924]: found netkey IPsec stack
- Jan 5 17:15:27 dogma charon: 00[DMN] Starting IKE charon daemon (strongSwan 5.3.5, Linux 4.10.0-42-generic, x86_64)
- Jan 5 17:15:27 dogma charon: 00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts'
- Jan 5 17:15:27 dogma charon: 00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts'
- Jan 5 17:15:27 dogma charon: 00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts'
- Jan 5 17:15:27 dogma charon: 00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts'
- Jan 5 17:15:27 dogma charon: 00[CFG] loading crls from '/etc/ipsec.d/crls'
- Jan 5 17:15:27 dogma charon: 00[CFG] loading secrets from '/etc/ipsec.secrets'
- Jan 5 17:15:27 dogma charon: 00[CFG] loading secrets from '/etc/ipsec.d/nm-l2tp-ipsec-4588bec4-238f-479e-8ffc-3c111073e101.secrets'
- Jan 5 17:15:27 dogma charon: 00[CFG] loaded IKE secret for %any
- Jan 5 17:15:27 dogma charon: 00[LIB] loaded plugins: charon test-vectors aes rc2 sha1 sha2 md4 md5 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl fips-prf gmp agent xcbc hmac gcm attr kernel-netlink resolve socket-default connmark stroke updown
- Jan 5 17:15:27 dogma charon: 00[LIB] dropped capabilities, running as uid 0, gid 0
- Jan 5 17:15:27 dogma charon: 00[JOB] spawning 16 worker threads
- Jan 5 17:15:27 dogma charon: 05[CFG] received stroke: add connection '4588bec4-238f-479e-8ffc-3c111073e101'
- Jan 5 17:15:27 dogma charon: 05[CFG] added configuration '4588bec4-238f-479e-8ffc-3c111073e101'
- Jan 5 17:15:28 dogma charon: 08[CFG] rereading secrets
- Jan 5 17:15:28 dogma charon: 08[CFG] loading secrets from '/etc/ipsec.secrets'
- Jan 5 17:15:28 dogma charon: 08[CFG] loading secrets from '/etc/ipsec.d/nm-l2tp-ipsec-4588bec4-238f-479e-8ffc-3c111073e101.secrets'
- Jan 5 17:15:28 dogma charon: 08[CFG] loaded IKE secret for %any
- Jan 5 17:15:28 dogma NetworkManager[924]: nm-l2tp[4715] <info> Spawned ipsec up script with PID 4780.
- Jan 5 17:15:28 dogma charon: 09[CFG] received stroke: initiate '4588bec4-238f-479e-8ffc-3c111073e101'
- Jan 5 17:15:28 dogma charon: 10[IKE] initiating Main Mode IKE_SA 4588bec4-238f-479e-8ffc-3c111073e101[1] to 95.174.110.160
- Jan 5 17:15:28 dogma charon: 10[ENC] generating ID_PROT request 0 [ SA V V V V ]
- Jan 5 17:15:28 dogma charon: 10[NET] sending packet: from 192.168.1.5[500] to 95.174.110.160[500] (212 bytes)
- Jan 5 17:15:28 dogma charon: 12[NET] received packet: from 95.174.110.160[500] to 192.168.1.5[500] (132 bytes)
- Jan 5 17:15:28 dogma charon: 12[ENC] parsed ID_PROT response 0 [ SA V V V ]
- Jan 5 17:15:28 dogma charon: 12[IKE] received XAuth vendor ID
- Jan 5 17:15:28 dogma charon: 12[IKE] received DPD vendor ID
- Jan 5 17:15:28 dogma charon: 12[IKE] received NAT-T (RFC 3947) vendor ID
- Jan 5 17:15:28 dogma charon: 12[ENC] generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
- Jan 5 17:15:28 dogma charon: 12[NET] sending packet: from 192.168.1.5[500] to 95.174.110.160[500] (244 bytes)
- Jan 5 17:15:29 dogma charon: 13[NET] received packet: from 95.174.110.160[500] to 192.168.1.5[500] (244 bytes)
- Jan 5 17:15:29 dogma charon: 13[ENC] parsed ID_PROT response 0 [ KE No NAT-D NAT-D ]
- Jan 5 17:15:29 dogma charon: 13[IKE] local host is behind NAT, sending keep alives
- Jan 5 17:15:29 dogma charon: 13[ENC] generating ID_PROT request 0 [ ID HASH ]
- Jan 5 17:15:29 dogma charon: 13[NET] sending packet: from 192.168.1.5[4500] to 95.174.110.160[4500] (68 bytes)
- Jan 5 17:15:29 dogma charon: 14[NET] received packet: from 95.174.110.160[4500] to 192.168.1.5[4500] (68 bytes)
- Jan 5 17:15:29 dogma charon: 14[ENC] parsed ID_PROT response 0 [ ID HASH ]
- Jan 5 17:15:29 dogma charon: 14[IKE] IKE_SA 4588bec4-238f-479e-8ffc-3c111073e101[1] established between 192.168.1.5[192.168.1.5]...95.174.110.160[95.174.110.160]
- Jan 5 17:15:29 dogma charon: 14[IKE] scheduling reauthentication in 10233s
- Jan 5 17:15:29 dogma charon: 14[IKE] maximum IKE_SA lifetime 10773s
- Jan 5 17:15:29 dogma charon: 14[ENC] generating QUICK_MODE request 908248156 [ HASH SA No ID ID NAT-OA NAT-OA ]
- Jan 5 17:15:29 dogma charon: 14[NET] sending packet: from 192.168.1.5[4500] to 95.174.110.160[4500] (220 bytes)
- Jan 5 17:15:29 dogma charon: 15[NET] received packet: from 95.174.110.160[4500] to 192.168.1.5[4500] (196 bytes)
- Jan 5 17:15:29 dogma charon: 15[ENC] parsed QUICK_MODE response 908248156 [ HASH SA No ID ID NAT-OA NAT-OA ]
- Jan 5 17:15:29 dogma charon: 15[IKE] CHILD_SA 4588bec4-238f-479e-8ffc-3c111073e101{1} established with SPIs c76aadc7_i caca235d_o and TS 192.168.1.5/32[udp/l2f] === 95.174.110.160/32[udp/l2f]
- Jan 5 17:15:29 dogma NetworkManager[924]: initiating Main Mode IKE_SA 4588bec4-238f-479e-8ffc-3c111073e101[1] to 95.174.110.160
- Jan 5 17:15:29 dogma NetworkManager[924]: generating ID_PROT request 0 [ SA V V V V ]
- Jan 5 17:15:29 dogma NetworkManager[924]: sending packet: from 192.168.1.5[500] to 95.174.110.160[500] (212 bytes)
- Jan 5 17:15:29 dogma NetworkManager[924]: received packet: from 95.174.110.160[500] to 192.168.1.5[500] (132 bytes)
- Jan 5 17:15:29 dogma NetworkManager[924]: parsed ID_PROT response 0 [ SA V V V ]
- Jan 5 17:15:29 dogma NetworkManager[924]: received XAuth vendor ID
- Jan 5 17:15:29 dogma NetworkManager[924]: received DPD vendor ID
- Jan 5 17:15:29 dogma NetworkManager[924]: received NAT-T (RFC 3947) vendor ID
- Jan 5 17:15:29 dogma NetworkManager[924]: generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
- Jan 5 17:15:29 dogma NetworkManager[924]: sending packet: from 192.168.1.5[500] to 95.174.110.160[500] (244 bytes)
- Jan 5 17:15:29 dogma NetworkManager[924]: received packet: from 95.174.110.160[500] to 192.168.1.5[500] (244 bytes)
- Jan 5 17:15:29 dogma NetworkManager[924]: parsed ID_PROT response 0 [ KE No NAT-D NAT-D ]
- Jan 5 17:15:29 dogma NetworkManager[924]: local host is behind NAT, sending keep alives
- Jan 5 17:15:29 dogma NetworkManager[924]: generating ID_PROT request 0 [ ID HASH ]
- Jan 5 17:15:29 dogma NetworkManager[924]: sending packet: from 192.168.1.5[4500] to 95.174.110.160[4500] (68 bytes)
- Jan 5 17:15:29 dogma NetworkManager[924]: received packet: from 95.174.110.160[4500] to 192.168.1.5[4500] (68 bytes)
- Jan 5 17:15:29 dogma NetworkManager[924]: parsed ID_PROT response 0 [ ID HASH ]
- Jan 5 17:15:29 dogma NetworkManager[924]: IKE_SA 4588bec4-238f-479e-8ffc-3c111073e101[1] established between 192.168.1.5[192.168.1.5]...95.174.110.160[95.174.110.160]
- Jan 5 17:15:29 dogma NetworkManager[924]: scheduling reauthentication in 10233s
- Jan 5 17:15:29 dogma NetworkManager[924]: maximum IKE_SA lifetime 10773s
- Jan 5 17:15:29 dogma NetworkManager[924]: generating QUICK_MODE request 908248156 [ HASH SA No ID ID NAT-OA NAT-OA ]
- Jan 5 17:15:29 dogma NetworkManager[924]: sending packet: from 192.168.1.5[4500] to 95.174.110.160[4500] (220 bytes)
- Jan 5 17:15:29 dogma NetworkManager[924]: received packet: from 95.174.110.160[4500] to 192.168.1.5[4500] (196 bytes)
- Jan 5 17:15:29 dogma NetworkManager[924]: parsed QUICK_MODE response 908248156 [ HASH SA No ID ID NAT-OA NAT-OA ]
- Jan 5 17:15:29 dogma NetworkManager[924]: CHILD_SA 4588bec4-238f-479e-8ffc-3c111073e101{1} established with SPIs c76aadc7_i caca235d_o and TS 192.168.1.5/32[udp/l2f] === 95.174.110.160/32[udp/l2f]
- Jan 5 17:15:29 dogma NetworkManager[924]: connection '4588bec4-238f-479e-8ffc-3c111073e101' established successfully
- Jan 5 17:15:29 dogma charon: 15[ENC] generating QUICK_MODE request 908248156 [ HASH ]
- Jan 5 17:15:29 dogma charon: 15[NET] sending packet: from 192.168.1.5[4500] to 95.174.110.160[4500] (60 bytes)
- Jan 5 17:15:29 dogma NetworkManager[924]: nm-l2tp[4715] <info> strongSwan IPsec tunnel is up.
- Jan 5 17:15:29 dogma NetworkManager[924]: ** Message: xl2tpd started with pid 4789
- Jan 5 17:15:29 dogma NetworkManager[924]: xl2tpd[4789]: setsockopt recvref[30]: Protocol not available
- Jan 5 17:15:29 dogma NetworkManager[924]: xl2tpd[4789]: Using l2tp kernel support.
- Jan 5 17:15:29 dogma NetworkManager[924]: xl2tpd[4789]: xl2tpd version xl2tpd-1.3.6 started on dogma PID:4789
- Jan 5 17:15:29 dogma NetworkManager[924]: xl2tpd[4789]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc.
- Jan 5 17:15:29 dogma NetworkManager[924]: xl2tpd[4789]: Forked by Scott Balmos and David Stipp, (C) 2001
- Jan 5 17:15:29 dogma NetworkManager[924]: xl2tpd[4789]: Inherited by Jeff McAdams, (C) 2002
- Jan 5 17:15:29 dogma NetworkManager[924]: xl2tpd[4789]: Forked again by Xelerance (www.xelerance.com) (C) 2006
- Jan 5 17:15:29 dogma NetworkManager[924]: xl2tpd[4789]: Listening on IP address 0.0.0.0, port 1701
- Jan 5 17:15:29 dogma NetworkManager[924]: xl2tpd[4789]: Connecting to host 95.174.110.160, port 1701
- Jan 5 17:15:29 dogma NetworkManager[924]: <info> [1515161729.4479] vpn-connection[0x1a6d3e0,4588bec4-238f-479e-8ffc-3c111073e101,"UMBRELLA-WEB",0]: VPN plugin: state changed: starting (3)
- Jan 5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: Connection established to 95.174.110.160, 1701. Local: 6058, Remote: 12494 (ref=0/0).
- Jan 5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: Calling on tunnel 6058
- Jan 5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: check_control: Received out of order control packet on tunnel 12494 (got 0, expected 1)
- Jan 5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: handle_packet: bad control packet!
- Jan 5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: check_control: Received out of order control packet on tunnel 12494 (got 0, expected 1)
- Jan 5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: handle_packet: bad control packet!
- Jan 5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: Call established with 95.174.110.160, Local: 20338, Remote: 18020, Serial: 1 (ref=0/0)
- Jan 5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: start_pppd: I'm running:
- Jan 5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: "/usr/sbin/pppd"
- Jan 5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: "passive"
- Jan 5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: "nodetach"
- Jan 5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: ":"
- Jan 5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: "file"
- Jan 5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: "/var/run/nm-l2tp-ppp-options-4588bec4-238f-479e-8ffc-3c111073e101"
- Jan 5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: "plugin"
- Jan 5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: "pppol2tp.so"
- Jan 5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: "pppol2tp"
- Jan 5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: "7"
- Jan 5 17:15:31 dogma pppd[4790]: Plugin /usr/lib/pppd/2.4.7/nm-l2tp-pppd-plugin.so loaded.
- Jan 5 17:15:31 dogma pppd[4790]: nm-l2tp[4715] <info> [helper-4790] initializing
- Jan 5 17:15:31 dogma pppd[4790]: Plugin pppol2tp.so loaded.
- Jan 5 17:15:31 dogma pppd[4790]: pppd 2.4.7 started by root, uid 0
- Jan 5 17:15:31 dogma pppd[4790]: nm-l2tp[4715] <info> [helper-4790] phasechange: status 3 / phase 'serial connection'
- Jan 5 17:15:31 dogma pppd[4790]: Using interface ppp0
- Jan 5 17:15:31 dogma pppd[4790]: Connect: ppp0 <-->
- Jan 5 17:15:31 dogma pppd[4790]: nm-l2tp[4715] <info> [helper-4790] phasechange: status 5 / phase 'establish'
- Jan 5 17:15:31 dogma pppd[4790]: Overriding mtu 1500 to 1400
- Jan 5 17:15:31 dogma NetworkManager[924]: nm_device_get_device_type: assertion 'NM_IS_DEVICE (self)' failed
- Jan 5 17:15:31 dogma pppd[4790]: Overriding mru 1500 to mtu value 1400
- Jan 5 17:15:31 dogma NetworkManager[924]: <info> [1515161731.5613] manager: (ppp0): new Generic device (/org/freedesktop/NetworkManager/Devices/41)
- Jan 5 17:15:31 dogma NetworkManager[924]: <info> [1515161731.5674] devices added (path: /sys/devices/virtual/net/ppp0, iface: ppp0)
- Jan 5 17:15:31 dogma NetworkManager[924]: <info> [1515161731.5674] device added (path: /sys/devices/virtual/net/ppp0, iface: ppp0): no ifupdown configuration found.
- Jan 5 17:15:31 dogma pppd[4790]: Overriding mtu 1492 to 1400
- Jan 5 17:15:31 dogma pppd[4790]: nm-l2tp[4715] <info> [helper-4790] phasechange: status 6 / phase 'authenticate'
- Jan 5 17:15:31 dogma pppd[4790]: EAP: Identity prompt "Name"
- Jan 5 17:15:31 dogma pppd[4790]: nm-l2tp[4715] <info> [helper-4790] passwd-hook: requesting credentials...
- Jan 5 17:15:31 dogma pppd[4790]: nm-l2tp[4715] <info> [helper-4790] passwd-hook: got credentials from NetworkManager-l2tp
- Jan 5 17:15:31 dogma pppd[4790]: EAP: peer reports authentication failure
- Jan 5 17:15:31 dogma pppd[4790]: nm-l2tp[4715] <info> [helper-4790] phasechange: status 10 / phase 'terminate'
- Jan 5 17:15:31 dogma pppd[4790]: nm-l2tp[4715] <info> [helper-4790] phasechange: status 5 / phase 'establish'
- Jan 5 17:15:31 dogma pppd[4790]: Overriding mtu 1500 to 1400
- Jan 5 17:15:31 dogma pppd[4790]: Overriding mru 1500 to mtu value 1400
- Jan 5 17:15:31 dogma pppd[4790]: nm-l2tp[4715] <info> [helper-4790] phasechange: status 11 / phase 'disconnect'
- Jan 5 17:15:31 dogma pppd[4790]: Connection terminated.
- Jan 5 17:15:31 dogma charon: 11[KNL] interface ppp0 deleted
- Jan 5 17:15:31 dogma NetworkManager[924]: nm-l2tp[4715] <info> Terminated xl2tpd daemon with PID 4789.
- Jan 5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: death_handler: Fatal signal 15 received
- Jan 5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: Terminating pppd: sending TERM signal to pid 4790
- Jan 5 17:15:31 dogma NetworkManager[924]: xl2tpd[4789]: Connection 12494 closed to 95.174.110.160, port 1701 (Server closing)
- Jan 5 17:15:31 dogma NetworkManager[924]: <warn> [1515161731.7833] vpn-connection[0x1a6d3e0,4588bec4-238f-479e-8ffc-3c111073e101,"UMBRELLA-WEB",0]: VPN plugin: failed: connect-failed (1)
- Jan 5 17:15:31 dogma NetworkManager[924]: <error> [1515161731.7853] platform-linux: do-change-link[42]: failure changing link: failure 19 (No such device)
- Jan 5 17:15:31 dogma NetworkManager[924]: <warn> [1515161731.7854] device (ppp0): failed to disable userspace IPv6LL address handling
- Jan 5 17:15:31 dogma NetworkManager[924]: <info> [1515161731.7862] vpn-connection[0x1a6d3e0,4588bec4-238f-479e-8ffc-3c111073e101,"UMBRELLA-WEB",0]: VPN plugin: state changed: stopping (5)
- Jan 5 17:15:31 dogma NetworkManager[924]: Stopping strongSwan IPsec...
- Jan 5 17:15:31 dogma charon: 00[DMN] signal of type SIGINT received. Shutting down
- Jan 5 17:15:31 dogma charon: 00[IKE] closing CHILD_SA 4588bec4-238f-479e-8ffc-3c111073e101{1} with SPIs c76aadc7_i (523 bytes) caca235d_o (853 bytes) and TS 192.168.1.5/32[udp/l2f] === 95.174.110.160/32[udp/l2f]
- Jan 5 17:15:31 dogma NetworkManager[924]: <info> [1515161731.7945] devices removed (path: /sys/devices/virtual/net/ppp0, iface: ppp0)
- Jan 5 17:15:31 dogma charon: 00[IKE] sending DELETE for ESP CHILD_SA with SPI c76aadc7
- Jan 5 17:15:31 dogma charon: 00[ENC] generating INFORMATIONAL_V1 request 4208910326 [ HASH D ]
- Jan 5 17:15:31 dogma charon: 00[NET] sending packet: from 192.168.1.5[4500] to 95.174.110.160[4500] (76 bytes)
- Jan 5 17:15:31 dogma charon: 00[IKE] deleting IKE_SA 4588bec4-238f-479e-8ffc-3c111073e101[1] between 192.168.1.5[192.168.1.5]...95.174.110.160[95.174.110.160]
- Jan 5 17:15:31 dogma charon: 00[IKE] sending DELETE for IKE_SA 4588bec4-238f-479e-8ffc-3c111073e101[1]
- Jan 5 17:15:31 dogma charon: 00[ENC] generating INFORMATIONAL_V1 request 1127108003 [ HASH D ]
- Jan 5 17:15:31 dogma charon: 00[NET] sending packet: from 192.168.1.5[4500] to 95.174.110.160[4500] (84 bytes)
- Jan 5 17:15:31 dogma gnome-session[31180]: Gjs-Message: JS LOG: Removing a network device that was not added
- Jan 5 17:15:31 dogma gnome-session[5509]: Gjs-Message: JS LOG: Removing a network device that was not added
- Jan 5 17:15:31 dogma gnome-session[1918]: Gjs-Message: JS LOG: Removing a network device that was not added
- Jan 5 17:15:31 dogma pppd[4790]: nm-l2tp[4715] <info> [helper-4790] phasechange: status 1 / phase 'dead'
- Jan 5 17:15:31 dogma pppd[4790]: nm-l2tp[4715] <info> [helper-4790] exit: cleaning up
- Jan 5 17:15:31 dogma pppd[4790]: Exit.
- Jan 5 17:15:31 dogma NetworkManager[924]: ** Message: ipsec shut down
- Jan 5 17:15:31 dogma NetworkManager[924]: <info> [1515161731.9010] vpn-connection[0x1a6d3e0,4588bec4-238f-479e-8ffc-3c111073e101,"UMBRELLA-WEB",0]: VPN plugin: state changed: stopped (6)
- Jan 5 17:15:31 dogma NetworkManager[924]: <info> [1515161731.9039] vpn-connection[0x1a6d3e0,4588bec4-238f-479e-8ffc-3c111073e101,"UMBRELLA-WEB",0]: VPN plugin: state change reason: unknown (0)
- Jan 5 17:15:31 dogma NetworkManager[924]: <info> [1515161731.9067] vpn-connection[0x1a6d3e0,4588bec4-238f-479e-8ffc-3c111073e101,"UMBRELLA-WEB",0]: VPN service disappeared
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement