Ledger Nano X - The secure hardware wallet
SHARE
TWEET

Untitled

a guest May 7th, 2019 203 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. mag 07 12:33:14 localhost.localdomain NetworkManager[1103]: <info>  [1557225194.1017] audit: op="connection-activate" uuid="c0ef92f1-a9ea-4fc7-836d-d39dd8d89395" name="Eco-Mind" pid=5428 uid=1000 result="success"
  2. mag 07 12:33:14 localhost.localdomain NetworkManager[1103]: <info>  [1557225194.1054] vpn-connection[0x5557439c8350,c0ef92f1-a9ea-4fc7-836d-d39dd8d89395,"Eco-Mind",0]: Started the VPN service, PID 9912
  3. mag 07 12:33:14 localhost.localdomain NetworkManager[1103]: <info>  [1557225194.1131] vpn-connection[0x5557439c8350,c0ef92f1-a9ea-4fc7-836d-d39dd8d89395,"Eco-Mind",0]: Saw the service appear; activating connection
  4. mag 07 12:33:14 localhost.localdomain NetworkManager[1103]: <info>  [1557225194.1173] vpn-connection[0x5557439c8350,c0ef92f1-a9ea-4fc7-836d-d39dd8d89395,"Eco-Mind",0]: VPN connection: (ConnectInteractive) reply received
  5. mag 07 12:33:14 localhost.localdomain nm-l2tp-service[9912]: Check port 1701
  6. mag 07 12:33:14 localhost.localdomain NetworkManager[1103]: Stopping strongSwan IPsec failed: starter is not running
  7. mag 07 12:33:16 localhost.localdomain NetworkManager[1103]: Starting strongSwan 5.7.2 IPsec [starter]...
  8. mag 07 12:33:16 localhost.localdomain NetworkManager[1103]: Loading config setup
  9. mag 07 12:33:16 localhost.localdomain NetworkManager[1103]: Loading conn 'c0ef92f1-a9ea-4fc7-836d-d39dd8d89395'
  10. mag 07 12:33:16 localhost.localdomain ipsec_starter[9922]: Starting strongSwan 5.7.2 IPsec [starter]...
  11. mag 07 12:33:16 localhost.localdomain ipsec_starter[9922]: Loading config setup
  12. mag 07 12:33:16 localhost.localdomain ipsec_starter[9922]: Loading conn 'c0ef92f1-a9ea-4fc7-836d-d39dd8d89395'
  13. mag 07 12:33:16 localhost.localdomain NetworkManager[1103]: found netkey IPsec stack
  14. mag 07 12:33:16 localhost.localdomain ipsec_starter[9922]: found netkey IPsec stack
  15. mag 07 12:33:16 localhost.localdomain ipsec_starter[9938]: Attempting to start charon...
  16. mag 07 12:33:16 localhost.localdomain charon[9939]: 00[DMN] Starting IKE charon daemon (strongSwan 5.7.2, Linux 5.0.11-300.fc30.x86_64, x86_64)
  17. mag 07 12:33:16 localhost.localdomain charon[9939]: 00[CFG] PKCS11 module '<name>' lacks library path
  18. mag 07 12:33:16 localhost.localdomain charon[9939]: 00[LIB] openssl FIPS mode(2) - enabled
  19. mag 07 12:33:16 localhost.localdomain charon[9939]: 00[CFG] loading ca certificates from '/etc/strongswan/ipsec.d/cacerts'
  20. mag 07 12:33:16 localhost.localdomain charon[9939]: 00[CFG] loading aa certificates from '/etc/strongswan/ipsec.d/aacerts'
  21. mag 07 12:33:16 localhost.localdomain charon[9939]: 00[CFG] loading ocsp signer certificates from '/etc/strongswan/ipsec.d/ocspcerts'
  22. mag 07 12:33:16 localhost.localdomain charon[9939]: 00[CFG] loading attribute certificates from '/etc/strongswan/ipsec.d/acerts'
  23. mag 07 12:33:16 localhost.localdomain charon[9939]: 00[CFG] loading crls from '/etc/strongswan/ipsec.d/crls'
  24. mag 07 12:33:16 localhost.localdomain charon[9939]: 00[CFG] loading secrets from '/etc/strongswan/ipsec.secrets'
  25. mag 07 12:33:16 localhost.localdomain charon[9939]: 00[CFG] loading secrets from '/etc/strongswan/ipsec.d/ipsec.nm-l2tp.secrets'
  26. mag 07 12:33:16 localhost.localdomain charon[9939]: 00[CFG]   loaded IKE secret for %any
  27. mag 07 12:33:16 localhost.localdomain charon[9939]: 00[CFG] opening triplet file /etc/strongswan/ipsec.d/triplets.dat failed: No such file or directory
  28. mag 07 12:33:16 localhost.localdomain charon[9939]: 00[CFG] loaded 0 RADIUS server configurations
  29. mag 07 12:33:16 localhost.localdomain charon[9939]: 00[CFG] HA config misses local/remote address
  30. mag 07 12:33:16 localhost.localdomain charon[9939]: 00[CFG] no script for ext-auth script defined, disabled
  31. mag 07 12:33:16 localhost.localdomain charon[9939]: 00[LIB] loaded plugins: charon pkcs11 tpm aesni aes des rc2 sha2 sha1 md4 md5 mgf1 random nonce x509 revocation constraints acert pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl gcrypt fips-prf gmp curve25519 chapoly xcbc cmac hmac ctr ccm gcm curl attr kernel-netlink resolve socket-default farp stroke vici updown eap-identity eap-sim eap-aka eap-aka-3gpp eap-aka-3gpp2 eap-md5 eap-gtc eap-mschapv2 eap-dynamic eap-radius eap-tls eap-ttls eap-peap xauth-generic xauth-eap xauth-pam xauth-noauth dhcp led duplicheck unity counters
  32. mag 07 12:33:16 localhost.localdomain charon[9939]: 00[JOB] spawning 16 worker threads
  33. mag 07 12:33:16 localhost.localdomain ipsec_starter[9938]: charon (9939) started after 40 ms
  34. mag 07 12:33:16 localhost.localdomain charon[9939]: 06[CFG] received stroke: add connection 'c0ef92f1-a9ea-4fc7-836d-d39dd8d89395'
  35. mag 07 12:33:16 localhost.localdomain charon[9939]: 06[CFG] added configuration 'c0ef92f1-a9ea-4fc7-836d-d39dd8d89395'
  36. mag 07 12:33:17 localhost.localdomain charon[9939]: 07[CFG] rereading secrets
  37. mag 07 12:33:17 localhost.localdomain charon[9939]: 07[CFG] loading secrets from '/etc/strongswan/ipsec.secrets'
  38. mag 07 12:33:17 localhost.localdomain charon[9939]: 07[CFG] loading secrets from '/etc/strongswan/ipsec.d/ipsec.nm-l2tp.secrets'
  39. mag 07 12:33:17 localhost.localdomain charon[9939]: 07[CFG]   loaded IKE secret for %any
  40. mag 07 12:33:17 localhost.localdomain charon[9939]: 09[CFG] received stroke: initiate 'c0ef92f1-a9ea-4fc7-836d-d39dd8d89395'
  41. mag 07 12:33:17 localhost.localdomain charon[9939]: 11[IKE] initiating Main Mode IKE_SA c0ef92f1-a9ea-4fc7-836d-d39dd8d89395[1] to 82.48.127.225
  42. mag 07 12:33:17 localhost.localdomain charon[9939]: 11[IKE] initiating Main Mode IKE_SA c0ef92f1-a9ea-4fc7-836d-d39dd8d89395[1] to 82.48.127.225
  43. mag 07 12:33:17 localhost.localdomain charon[9939]: 11[ENC] generating ID_PROT request 0 [ SA V V V V V ]
  44. mag 07 12:33:17 localhost.localdomain charon[9939]: 11[NET] sending packet: from 192.168.1.228[500] to 82.48.127.225[500] (176 bytes)
  45. mag 07 12:33:17 localhost.localdomain charon[9939]: 12[NET] received packet: from 82.48.127.225[500] to 192.168.1.228[500] (248 bytes)
  46. mag 07 12:33:17 localhost.localdomain charon[9939]: 12[ENC] parsed ID_PROT response 0 [ SA V V V V V V V V V ]
  47. mag 07 12:33:17 localhost.localdomain charon[9939]: 12[ENC] received unknown vendor ID: f7:58:f2:26:68:75:0f:03:b0:8d:f6:eb:e1:d0:04:03
  48. mag 07 12:33:17 localhost.localdomain charon[9939]: 12[ENC] received unknown vendor ID: af:ca:d7:13:68:a1:f1:c9:6b:86:96:fc:77:57
  49. mag 07 12:33:17 localhost.localdomain charon[9939]: 12[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor ID
  50. mag 07 12:33:17 localhost.localdomain charon[9939]: 12[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
  51. mag 07 12:33:17 localhost.localdomain charon[9939]: 12[IKE] received draft-ietf-ipsec-nat-t-ike-03 vendor ID
  52. mag 07 12:33:17 localhost.localdomain charon[9939]: 12[IKE] received NAT-T (RFC 3947) vendor ID
  53. mag 07 12:33:17 localhost.localdomain charon[9939]: 12[IKE] received XAuth vendor ID
  54. mag 07 12:33:17 localhost.localdomain charon[9939]: 12[IKE] received DPD vendor ID
  55. mag 07 12:33:17 localhost.localdomain charon[9939]: 12[ENC] received unknown vendor ID: af:ca:d7:13:68:a1:f1:c9:6b:86:96:fc:77:57
  56. mag 07 12:33:17 localhost.localdomain charon[9939]: 12[CFG] selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
  57. mag 07 12:33:17 localhost.localdomain charon[9939]: 12[ENC] generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
  58. mag 07 12:33:17 localhost.localdomain charon[9939]: 12[NET] sending packet: from 192.168.1.228[500] to 82.48.127.225[500] (244 bytes)
  59. mag 07 12:33:17 localhost.localdomain charon[9939]: 13[NET] received packet: from 82.48.127.225[500] to 192.168.1.228[500] (228 bytes)
  60. mag 07 12:33:17 localhost.localdomain charon[9939]: 13[ENC] parsed ID_PROT response 0 [ KE No NAT-D NAT-D ]
  61. mag 07 12:33:17 localhost.localdomain charon[9939]: 13[IKE] local host is behind NAT, sending keep alives
  62. mag 07 12:33:17 localhost.localdomain charon[9939]: 13[ENC] generating ID_PROT request 0 [ ID HASH ]
  63. mag 07 12:33:17 localhost.localdomain charon[9939]: 13[NET] sending packet: from 192.168.1.228[4500] to 82.48.127.225[4500] (68 bytes)
  64. mag 07 12:33:17 localhost.localdomain charon[9939]: 14[NET] received packet: from 82.48.127.225[4500] to 192.168.1.228[4500] (68 bytes)
  65. mag 07 12:33:17 localhost.localdomain charon[9939]: 14[ENC] parsed ID_PROT response 0 [ ID HASH ]
  66. mag 07 12:33:17 localhost.localdomain charon[9939]: 14[IKE] IKE_SA c0ef92f1-a9ea-4fc7-836d-d39dd8d89395[1] established between 192.168.1.228[192.168.1.228]...82.48.127.225[82.48.127.225]
  67. mag 07 12:33:17 localhost.localdomain charon[9939]: 14[IKE] IKE_SA c0ef92f1-a9ea-4fc7-836d-d39dd8d89395[1] established between 192.168.1.228[192.168.1.228]...82.48.127.225[82.48.127.225]
  68. mag 07 12:33:17 localhost.localdomain charon[9939]: 14[IKE] scheduling reauthentication in 10215s
  69. mag 07 12:33:17 localhost.localdomain charon[9939]: 14[IKE] maximum IKE_SA lifetime 10755s
  70. mag 07 12:33:17 localhost.localdomain charon[9939]: 14[ENC] generating QUICK_MODE request 3726736930 [ HASH SA No ID ID NAT-OA NAT-OA ]
  71. mag 07 12:33:17 localhost.localdomain charon[9939]: 14[NET] sending packet: from 192.168.1.228[4500] to 82.48.127.225[4500] (252 bytes)
  72. mag 07 12:33:17 localhost.localdomain charon[9939]: 15[NET] received packet: from 82.48.127.225[4500] to 192.168.1.228[4500] (172 bytes)
  73. mag 07 12:33:17 localhost.localdomain charon[9939]: 15[ENC] parsed QUICK_MODE response 3726736930 [ HASH SA No ID ID NAT-OA NAT-OA ]
  74. mag 07 12:33:17 localhost.localdomain charon[9939]: 15[IKE] peer did not accept our IPComp proposal, IPComp disabled
  75. mag 07 12:33:17 localhost.localdomain charon[9939]: 15[CFG] selected proposal: ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ
  76. mag 07 12:33:17 localhost.localdomain charon[9939]: 15[IKE] CHILD_SA c0ef92f1-a9ea-4fc7-836d-d39dd8d89395{1} established with SPIs c84f04f6_i 68c438a8_o and TS 192.168.1.228/32[udp/l2tp] === 82.48.127.225/32[udp/l2tp]
  77. mag 07 12:33:17 localhost.localdomain charon[9939]: 15[IKE] CHILD_SA c0ef92f1-a9ea-4fc7-836d-d39dd8d89395{1} established with SPIs c84f04f6_i 68c438a8_o and TS 192.168.1.228/32[udp/l2tp] === 82.48.127.225/32[udp/l2tp]
  78. mag 07 12:33:17 localhost.localdomain charon[9939]: 15[ENC] generating QUICK_MODE request 3726736930 [ HASH ]
  79. mag 07 12:33:17 localhost.localdomain charon[9939]: 15[NET] sending packet: from 192.168.1.228[4500] to 82.48.127.225[4500] (60 bytes)
  80. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: initiating Main Mode IKE_SA c0ef92f1-a9ea-4fc7-836d-d39dd8d89395[1] to 82.48.127.225
  81. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: generating ID_PROT request 0 [ SA V V V V V ]
  82. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: sending packet: from 192.168.1.228[500] to 82.48.127.225[500] (176 bytes)
  83. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: received packet: from 82.48.127.225[500] to 192.168.1.228[500] (248 bytes)
  84. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: parsed ID_PROT response 0 [ SA V V V V V V V V V ]
  85. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: received unknown vendor ID: f7:58:f2:26:68:75:0f:03:b0:8d:f6:eb:e1:d0:04:03
  86. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: received unknown vendor ID: af:ca:d7:13:68:a1:f1:c9:6b:86:96:fc:77:57
  87. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: received draft-ietf-ipsec-nat-t-ike-02 vendor ID
  88. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
  89. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: received draft-ietf-ipsec-nat-t-ike-03 vendor ID
  90. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: received NAT-T (RFC 3947) vendor ID
  91. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: received XAuth vendor ID
  92. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: received DPD vendor ID
  93. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: received unknown vendor ID: af:ca:d7:13:68:a1:f1:c9:6b:86:96:fc:77:57
  94. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
  95. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
  96. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: sending packet: from 192.168.1.228[500] to 82.48.127.225[500] (244 bytes)
  97. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: received packet: from 82.48.127.225[500] to 192.168.1.228[500] (228 bytes)
  98. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: parsed ID_PROT response 0 [ KE No NAT-D NAT-D ]
  99. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: local host is behind NAT, sending keep alives
  100. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: generating ID_PROT request 0 [ ID HASH ]
  101. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: sending packet: from 192.168.1.228[4500] to 82.48.127.225[4500] (68 bytes)
  102. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: received packet: from 82.48.127.225[4500] to 192.168.1.228[4500] (68 bytes)
  103. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: parsed ID_PROT response 0 [ ID HASH ]
  104. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: IKE_SA c0ef92f1-a9ea-4fc7-836d-d39dd8d89395[1] established between 192.168.1.228[192.168.1.228]...82.48.127.225[82.48.127.225]
  105. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: scheduling reauthentication in 10215s
  106. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: maximum IKE_SA lifetime 10755s
  107. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: generating QUICK_MODE request 3726736930 [ HASH SA No ID ID NAT-OA NAT-OA ]
  108. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: sending packet: from 192.168.1.228[4500] to 82.48.127.225[4500] (252 bytes)
  109. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: received packet: from 82.48.127.225[4500] to 192.168.1.228[4500] (172 bytes)
  110. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: parsed QUICK_MODE response 3726736930 [ HASH SA No ID ID NAT-OA NAT-OA ]
  111. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: peer did not accept our IPComp proposal, IPComp disabled
  112. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: selected proposal: ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ
  113. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: CHILD_SA c0ef92f1-a9ea-4fc7-836d-d39dd8d89395{1} established with SPIs c84f04f6_i 68c438a8_o and TS 192.168.1.228/32[udp/l2tp] === 82.48.127.225/32[udp/l2tp]
  114. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: connection 'c0ef92f1-a9ea-4fc7-836d-d39dd8d89395' established successfully
  115. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: Stopping strongSwan IPsec...
  116. mag 07 12:33:17 localhost.localdomain charon[9939]: 00[DMN] signal of type SIGINT received. Shutting down
  117. mag 07 12:33:17 localhost.localdomain charon[9939]: 00[IKE] closing CHILD_SA c0ef92f1-a9ea-4fc7-836d-d39dd8d89395{1} with SPIs c84f04f6_i (0 bytes) 68c438a8_o (0 bytes) and TS 192.168.1.228/32[udp/l2tp] === 82.48.127.225/32[udp/l2tp]
  118. mag 07 12:33:17 localhost.localdomain charon[9939]: 00[IKE] closing CHILD_SA c0ef92f1-a9ea-4fc7-836d-d39dd8d89395{1} with SPIs c84f04f6_i (0 bytes) 68c438a8_o (0 bytes) and TS 192.168.1.228/32[udp/l2tp] === 82.48.127.225/32[udp/l2tp]
  119. mag 07 12:33:17 localhost.localdomain charon[9939]: 00[IKE] sending DELETE for ESP CHILD_SA with SPI c84f04f6
  120. mag 07 12:33:17 localhost.localdomain charon[9939]: 00[ENC] generating INFORMATIONAL_V1 request 1965860904 [ HASH D ]
  121. mag 07 12:33:17 localhost.localdomain charon[9939]: 00[NET] sending packet: from 192.168.1.228[4500] to 82.48.127.225[4500] (76 bytes)
  122. mag 07 12:33:17 localhost.localdomain charon[9939]: 00[IKE] deleting IKE_SA c0ef92f1-a9ea-4fc7-836d-d39dd8d89395[1] between 192.168.1.228[192.168.1.228]...82.48.127.225[82.48.127.225]
  123. mag 07 12:33:17 localhost.localdomain charon[9939]: 00[IKE] deleting IKE_SA c0ef92f1-a9ea-4fc7-836d-d39dd8d89395[1] between 192.168.1.228[192.168.1.228]...82.48.127.225[82.48.127.225]
  124. mag 07 12:33:17 localhost.localdomain charon[9939]: 00[IKE] sending DELETE for IKE_SA c0ef92f1-a9ea-4fc7-836d-d39dd8d89395[1]
  125. mag 07 12:33:17 localhost.localdomain charon[9939]: 00[ENC] generating INFORMATIONAL_V1 request 355659688 [ HASH D ]
  126. mag 07 12:33:17 localhost.localdomain charon[9939]: 00[NET] sending packet: from 192.168.1.228[4500] to 82.48.127.225[4500] (84 bytes)
  127. mag 07 12:33:17 localhost.localdomain ipsec_starter[9938]: child 9939 (charon) has quit (exit code 0)
  128. mag 07 12:33:17 localhost.localdomain ipsec_starter[9938]:
  129. mag 07 12:33:17 localhost.localdomain ipsec_starter[9938]: charon stopped after 200 ms
  130. mag 07 12:33:17 localhost.localdomain ipsec_starter[9938]: ipsec starter stopped
  131. mag 07 12:33:17 localhost.localdomain nm-l2tp-service[9912]: g_dbus_method_invocation_take_error: assertion 'error != NULL' failed
  132. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: <info>  [1557225197.8205] vpn-connection[0x5557439c8350,c0ef92f1-a9ea-4fc7-836d-d39dd8d89395,"Eco-Mind",0]: VPN plugin: state changed: stopped (6)
  133. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: <info>  [1557225197.8240] vpn-connection[0x5557439c8350,c0ef92f1-a9ea-4fc7-836d-d39dd8d89395,"Eco-Mind",0]: VPN service disappeared
  134. mag 07 12:33:17 localhost.localdomain NetworkManager[1103]: <warn>  [1557225197.8258] vpn-connection[0x5557439c8350,c0ef92f1-a9ea-4fc7-836d-d39dd8d89395,"Eco-Mind",0]: VPN connection: failed to connect: 'Remote peer disconnected'
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
Top