Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Nov 4 21:10:16 router02 pluto[17713]: "peer-<r1>-tunnel-1" #10: sent QI2, IPsec SA established {ESP=>0x49e77f26 <0x25dc0aa9 IPCOMP=>0x0000e86b <0x0000e277}
- Nov 4 21:10:26 router02 pluto[17713]: "peer-<r1>-tunnel-1" #10: retransmitting in response to duplicate packet; already STATE_QUICK_I2
- Nov 4 21:10:46 router02 pluto[17713]: "peer-<r1>-tunnel-1" #10: retransmitting in response to duplicate packet; already STATE_QUICK_I2
- Nov 4 21:11:05 router02 ospfd[1864]: nsm_change_state(172.16.60.1, Full -> Init): scheduling new router-LSA origination
- Nov 4 21:12:02 router02 pluto[17713]: shutting down
- Nov 4 21:12:02 router02 pluto[17713]: forgetting secrets
- Nov 4 21:12:02 router02 pluto[17713]: "peer-<r1>-tunnel-1": deleting connection
- Nov 4 21:12:02 router02 pluto[17713]: "peer-<r1>-tunnel-1" #10: deleting state (STATE_QUICK_I2)
- Nov 4 21:12:02 router02 pluto[17713]: "peer-<r1>-tunnel-1" #9: deleting state (STATE_QUICK_I2)
- Nov 4 21:12:02 router02 pluto[17713]: "peer-<r1>-tunnel-1" #9: netlink recvfrom() of response to our XFRM_MSG_DELPOLICY message for policy unk255.10000@<r2> was too long: 100 > 36
- Nov 4 21:12:02 router02 pluto[17713]: "peer-<r1>-tunnel-1" #9: netlink recvfrom() of response to our XFRM_MSG_DELPOLICY message for policy unk255.10000@<r2> was too long: 100 > 36
- Nov 4 21:12:02 router02 pluto[17713]: "peer-<r1>-tunnel-1" #8: deleting state (STATE_QUICK_I2)
- Nov 4 21:12:02 router02 pluto[17713]: "peer-<r1>-tunnel-1" #8: netlink recvfrom() of response to our XFRM_MSG_DELPOLICY message for policy unk255.10000@<r2> was too long: 100 > 36
- Nov 4 21:12:02 router02 pluto[17713]: "peer-<r1>-tunnel-1" #8: netlink recvfrom() of response to our XFRM_MSG_DELPOLICY message for policy unk255.10000@<r2> was too long: 100 > 36
- Nov 4 21:12:02 router02 pluto[17713]: "peer-<r1>-tunnel-1" #7: deleting state (STATE_QUICK_R2)
- Nov 4 21:12:02 router02 pluto[17713]: "peer-<r1>-tunnel-1" #7: netlink recvfrom() of response to our XFRM_MSG_DELPOLICY message for policy unk255.10000@<r2> was too long: 100 > 36
- Nov 4 21:12:02 router02 pluto[17713]: "peer-<r1>-tunnel-1" #7: netlink recvfrom() of response to our XFRM_MSG_DELPOLICY message for policy unk255.10000@<r2> was too long: 100 > 36
- Nov 4 21:12:02 router02 pluto[17713]: "peer-<r1>-tunnel-1" #6: deleting state (STATE_MAIN_R3)
- Nov 4 21:12:02 router02 pluto[17713]: "peer-<r1>-tunnel-1" #1: deleting state (STATE_MAIN_I4)
- Nov 4 21:12:02 router02 pluto[17713]: "peer-<r1>-tunnel-1": netlink recvfrom() of response to our XFRM_MSG_DELPOLICY message for policy int.0@<r2> was too long: 100 > 36
- Nov 4 21:12:02 router02 pluto[17713]: "peer-<r1>-tunnel-1": netlink recvfrom() of response to our XFRM_MSG_DELPOLICY message for policy int.0@<r2> was too long: 100 > 36
- Nov 4 21:12:03 router02 pluto[17713]: shutting down interface lo/lo ::1
- Nov 4 21:12:03 router02 pluto[17713]: shutting down interface lo/lo 127.0.0.1
- Nov 4 21:12:03 router02 pluto[17713]: shutting down interface lo/lo 172.16.60.2
- Nov 4 21:12:03 router02 pluto[17713]: shutting down interface eth1/eth1 10.0.2.1
- Nov 4 21:12:03 router02 pluto[17713]: shutting down interface eth0/eth0 <r2>
- Nov 4 21:12:03 router02 pluto[17713]: shutting down interface tun01/tun01 172.16.50.2
- Nov 4 21:12:03 router02 ipsec_starter[17712]: pluto stopped after 60 ms
- Nov 4 21:12:03 router02 starter[17712]: ipsec starter stopped
- Nov 4 21:12:05 router02 ipsec_starter[17941]: Starting strongSwan 4.3.2 IPsec [starter]...
- Nov 4 21:12:06 router02 pluto[17980]: Starting IKEv1 pluto daemon (strongSwan 4.3.2) THREADS SMARTCARD VENDORID CISCO_QUIRKS
- Nov 4 21:12:06 router02 pluto[17980]: including NAT-Traversal patch (Version 0.6c) [disabled]
- Nov 4 21:12:06 router02 pluto[17980]: failed to load pkcs11 module '/usr/lib/opensc-pkcs11.so'
- Nov 4 21:12:06 router02 pluto[17980]: Using Linux 2.6 IPsec interface code
- Nov 4 21:12:06 router02 ipsec_starter[17979]: pluto (17980) started after 20 ms
- Nov 4 21:12:06 router02 pluto[17980]: Changing to directory '/etc/ipsec.d/cacerts'
- Nov 4 21:12:06 router02 pluto[17980]: Changing to directory '/etc/ipsec.d/aacerts'
- Nov 4 21:12:06 router02 pluto[17980]: Changing to directory '/etc/ipsec.d/ocspcerts'
- Nov 4 21:12:06 router02 pluto[17980]: Changing to directory '/etc/ipsec.d/crls'
- Nov 4 21:12:06 router02 pluto[17980]: Changing to directory '/etc/ipsec.d/acerts'
- Nov 4 21:12:06 router02 pluto[17980]: listening for IKE messages
- Nov 4 21:12:06 router02 pluto[17980]: adding interface tun01/tun01 172.16.50.2:500
- Nov 4 21:12:06 router02 pluto[17980]: adding interface eth0/eth0 <r2>:500
- Nov 4 21:12:06 router02 pluto[17980]: adding interface eth1/eth1 10.0.2.1:500
- Nov 4 21:12:06 router02 pluto[17980]: adding interface lo/lo 172.16.60.2:500
- Nov 4 21:12:06 router02 pluto[17980]: adding interface lo/lo 127.0.0.1:500
- Nov 4 21:12:06 router02 pluto[17980]: adding interface lo/lo ::1:500
- Nov 4 21:12:06 router02 pluto[17980]: loading secrets from "/etc/ipsec.secrets"
- Nov 4 21:12:06 router02 pluto[17980]: loaded shared key for <r1> <r2>
- Nov 4 21:12:06 router02 pluto[17980]: added connection description "peer-<r1>-tunnel-1"
- Nov 4 21:12:06 router02 pluto[17980]: "peer-<r1>-tunnel-1" #1: initiating Main Mode
- Nov 4 21:12:06 router02 pluto[17980]: "peer-<r1>-tunnel-1" #1: ignoring Vendor ID payload [strongSwan 4.3.2]
- Nov 4 21:12:06 router02 pluto[17980]: "peer-<r1>-tunnel-1" #1: ignoring Vendor ID payload [Cisco-Unity]
- Nov 4 21:12:06 router02 pluto[17980]: "peer-<r1>-tunnel-1" #1: received Vendor ID payload [XAUTH]
- Nov 4 21:12:06 router02 pluto[17980]: "peer-<r1>-tunnel-1" #1: received Vendor ID payload [Dead Peer Detection]
- Nov 4 21:12:06 router02 pluto[17980]: "peer-<r1>-tunnel-1" #1: Peer ID is ID_IPV4_ADDR: '<r1>'
- Nov 4 21:12:06 router02 pluto[17980]: "peer-<r1>-tunnel-1" #1: ISAKMP SA established
- Nov 4 21:12:06 router02 pluto[17980]: "peer-<r1>-tunnel-1" #2: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP {using isakmp#1}
- Nov 4 21:12:06 router02 pluto[17980]: "peer-<r1>-tunnel-1" #2: Dead Peer Detection (RFC 3706) enabled
- Nov 4 21:12:06 router02 pluto[17980]: "peer-<r1>-tunnel-1" #2: sent QI2, IPsec SA established {ESP=>0xe0f479e3 <0xabe92697 IPCOMP=>0x0000e124 <0x0000b279}
- Nov 4 21:12:16 router02 ospfd[1864]: Packet[DD]: Neighbor 172.16.60.1: Initial DBD from Slave, ignoring.
- Nov 4 21:12:16 router02 ospfd[1864]: Packet[DD]: Neighbor 172.16.60.1 Negotiation done (Master).
- Nov 4 21:12:16 router02 ospfd[1864]: nsm_change_state(172.16.60.1, Loading -> Full): scheduling new router-LSA origination
- Nov 4 21:12:22 router02 pluto[17980]: "peer-<r1>-tunnel-1" #1: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x89aff971) not found (maybe expired)
- Nov 4 21:13:16 router02 kernel: [24088.158035] [wan-lcl-default-D]IN=eth0 OUT= MAC=00:25:86:cb:35:ac:00:30:88:10:f8:c6:08:00 SRC=208.85.150.85 DST=<r2> LEN=40 TOS=0x00 PREC=0x00 TTL=46 ID=0 DF PROTO=TCP SPT=8080 DPT=55856 WINDOW=0 RES=0x00 RST URGP=0
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement