daily pastebin goal
11%
SHARE
TWEET

Untitled

a guest Mar 29th, 2009 237 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1.  3-29: 23:12:56:306:ee8
  2.  3-29: 23:12:56:306:ee8 Receive: (get) SA = 0x00000000 from 85.227.242.238.500
  3.  3-29: 23:12:56:306:ee8 ISAKMP Header: (V1.0), len = 200
  4.  3-29: 23:12:56:306:ee8   I-COOKIE a6256b4534195894
  5.  3-29: 23:12:56:306:ee8   R-COOKIE 0000000000000000
  6.  3-29: 23:12:56:306:ee8   exchange: Oakley Main Mode
  7.  3-29: 23:12:56:306:ee8   flags: 0
  8.  3-29: 23:12:56:306:ee8   next payload: SA
  9.  3-29: 23:12:56:306:ee8   message ID: 00000000
  10.  3-29: 23:12:56:306:ee8 Filter to match: Src 85.227.242.238 Dst 213.100.24.75
  11.  3-29: 23:12:56:306:ee8 MM PolicyName: 4
  12.  3-29: 23:12:56:306:ee8 MMPolicy dwFlags 2 SoftSAExpireTime 28800
  13.  3-29: 23:12:56:306:ee8 MMOffer[0] LifetimeSec 28800 QMLimit 0 DHGroup 2
  14.  3-29: 23:12:56:306:ee8 MMOffer[0] Encrypt: Triple DES CBC Hash: SHA
  15.  3-29: 23:12:56:306:ee8 MMOffer[1] LifetimeSec 28800 QMLimit 0 DHGroup 1
  16.  3-29: 23:12:56:306:ee8 MMOffer[1] Encrypt: DES CBC Hash: MD5
  17.  3-29: 23:12:56:306:ee8 MMOffer[2] LifetimeSec 28800 QMLimit 0 DHGroup 2
  18.  3-29: 23:12:56:306:ee8 MMOffer[2] Encrypt: Triple DES CBC Hash: MD5
  19.  3-29: 23:12:56:306:ee8 MMOffer[3] LifetimeSec 28800 QMLimit 0 DHGroup 1
  20.  3-29: 23:12:56:306:ee8 MMOffer[3] Encrypt: DES CBC Hash: SHA
  21.  3-29: 23:12:56:306:ee8 Auth[0]:PresharedKey KeyLen 16
  22.  3-29: 23:12:56:306:ee8 Responding with new SA 12fd20
  23.  3-29: 23:12:56:306:ee8 processing payload SA
  24.  3-29: 23:12:56:306:ee8 Received Phase 1 Transform 1
  25.  3-29: 23:12:56:306:ee8      Encryption Alg Triple DES CBC(5)
  26.  3-29: 23:12:56:306:ee8      Hash Alg SHA(2)
  27.  3-29: 23:12:56:306:ee8      Oakley Group 2
  28.  3-29: 23:12:56:306:ee8      Auth Method Preshared Key(1)
  29.  3-29: 23:12:56:306:ee8      Life type in Seconds
  30.  3-29: 23:12:56:306:ee8      Life duration of 86400
  31.  3-29: 23:12:56:306:ee8 Received Phase 1 Transform 2
  32.  3-29: 23:12:56:306:ee8      Encryption Alg DES CBC(1)
  33.  3-29: 23:12:56:306:ee8      Hash Alg SHA(2)
  34.  3-29: 23:12:56:306:ee8      Oakley Group 1
  35.  3-29: 23:12:56:306:ee8      Auth Method RSA Signature with Certificates(3)
  36.  3-29: 23:12:56:306:ee8      Life type in Seconds
  37.  3-29: 23:12:56:306:ee8      Life duration of 86400
  38.  3-29: 23:12:56:306:ee8 Phase 1 SA accepted: transform=1
  39.  3-29: 23:12:56:306:ee8 SA - Oakley proposal accepted
  40.  3-29: 23:12:56:306:ee8 processing payload VENDOR ID
  41.  3-29: 23:12:56:306:ee8 processing payload VENDOR ID
  42.  3-29: 23:12:56:306:ee8 processing payload VENDOR ID
  43.  3-29: 23:12:56:306:ee8 processing payload VENDOR ID
  44.  3-29: 23:12:56:306:ee8 Received VendorId draft-ietf-ipsec-nat-t-ike-02
  45.  3-29: 23:12:56:306:ee8 ClearFragList
  46.  3-29: 23:12:56:306:ee8 constructing ISAKMP Header
  47.  3-29: 23:12:56:306:ee8 constructing SA (ISAKMP)
  48.  3-29: 23:12:56:306:ee8 Constructing Vendor MS NT5 ISAKMPOAKLEY
  49.  3-29: 23:12:56:306:ee8 Constructing Vendor FRAGMENTATION
  50.  3-29: 23:12:56:306:ee8 Constructing Vendor draft-ietf-ipsec-nat-t-ike-02
  51.  3-29: 23:12:56:306:ee8
  52.  3-29: 23:12:56:306:ee8 Sending: SA = 0x0012FD20 to 85.227.242.238:Type 2.500
  53.  3-29: 23:12:56:306:ee8 ISAKMP Header: (V1.0), len = 148
  54.  3-29: 23:12:56:306:ee8   I-COOKIE a6256b4534195894
  55.  3-29: 23:12:56:306:ee8   R-COOKIE 25567abfcf311c67
  56.  3-29: 23:12:56:306:ee8   exchange: Oakley Main Mode
  57.  3-29: 23:12:56:306:ee8   flags: 0
  58.  3-29: 23:12:56:306:ee8   next payload: SA
  59.  3-29: 23:12:56:306:ee8   message ID: 00000000
  60.  3-29: 23:12:56:306:ee8 Ports S:f401 D:f401
  61.  3-29: 23:12:56:336:ee8
  62.  3-29: 23:12:56:336:ee8 Receive: (get) SA = 0x0012fd20 from 85.227.242.238.500
  63.  3-29: 23:12:56:336:ee8 ISAKMP Header: (V1.0), len = 304
  64.  3-29: 23:12:56:336:ee8   I-COOKIE a6256b4534195894
  65.  3-29: 23:12:56:336:ee8   R-COOKIE 25567abfcf311c67
  66.  3-29: 23:12:56:336:ee8   exchange: Oakley Main Mode
  67.  3-29: 23:12:56:336:ee8   flags: 0
  68.  3-29: 23:12:56:336:ee8   next payload: KE
  69.  3-29: 23:12:56:336:ee8   message ID: 00000000
  70.  3-29: 23:12:56:336:ee8 processing payload KE
  71.  3-29: 23:12:56:486:ee8 processing payload NONCE
  72.  3-29: 23:12:56:486:ee8 processing payload VENDOR ID
  73.  3-29: 23:12:56:486:ee8 processing payload VENDOR ID
  74.  3-29: 23:12:56:486:ee8 processing payload VENDOR ID
  75.  3-29: 23:12:56:486:ee8 processing payload VENDOR ID
  76.  3-29: 23:12:56:496:ee8 processing payload NATDISC
  77.  3-29: 23:12:56:496:ee8 Processing NatHash
  78.  3-29: 23:12:56:496:ee8 Nat hash 5dda1863067e7f313af6aaed27c4fca4
  79.  3-29: 23:12:56:496:ee8 b31218b6
  80.  3-29: 23:12:56:496:ee8 SA StateMask2 e
  81.  3-29: 23:12:56:496:ee8 processing payload NATDISC
  82.  3-29: 23:12:56:496:ee8 Processing NatHash
  83.  3-29: 23:12:56:496:ee8 Nat hash c81d68d93737e5f21d4b25dd07fa4284
  84.  3-29: 23:12:56:496:ee8 83a0cd75
  85.  3-29: 23:12:56:496:ee8 SA StateMask2 8e
  86.  3-29: 23:12:56:496:ee8 ClearFragList
  87.  3-29: 23:12:56:496:ee8 constructing ISAKMP Header
  88.  3-29: 23:12:56:496:ee8 constructing KE
  89.  3-29: 23:12:56:496:ee8 constructing NONCE (ISAKMP)
  90.  3-29: 23:12:56:496:ee8 Constructing NatDisc
  91.  3-29: 23:12:56:496:ee8
  92.  3-29: 23:12:56:496:ee8 Sending: SA = 0x0012FD20 to 85.227.242.238:Type 2.500
  93.  3-29: 23:12:56:496:ee8 ISAKMP Header: (V1.0), len = 232
  94.  3-29: 23:12:56:496:ee8   I-COOKIE a6256b4534195894
  95.  3-29: 23:12:56:496:ee8   R-COOKIE 25567abfcf311c67
  96.  3-29: 23:12:56:496:ee8   exchange: Oakley Main Mode
  97.  3-29: 23:12:56:496:ee8   flags: 0
  98.  3-29: 23:12:56:496:ee8   next payload: KE
  99.  3-29: 23:12:56:496:ee8   message ID: 00000000
  100.  3-29: 23:12:56:496:ee8 Ports S:f401 D:f401
  101.  3-29: 23:12:56:546:ee8
  102.  3-29: 23:12:56:546:ee8 Receive: (get) SA = 0x0012fd20 from 85.227.242.238.500
  103.  3-29: 23:12:56:546:ee8 ISAKMP Header: (V1.0), len = 100
  104.  3-29: 23:12:56:546:ee8   I-COOKIE a6256b4534195894
  105.  3-29: 23:12:56:546:ee8   R-COOKIE 25567abfcf311c67
  106.  3-29: 23:12:56:546:ee8   exchange: Oakley Main Mode
  107.  3-29: 23:12:56:546:ee8   flags: 1 ( encrypted )
  108.  3-29: 23:12:56:546:ee8   next payload: ID
  109.  3-29: 23:12:56:546:ee8   message ID: 00000000
  110.  3-29: 23:12:56:546:ee8 processing payload ID
  111.  3-29: 23:12:56:546:ee8 processing payload HASH
  112.  3-29: 23:12:56:546:ee8 AUTH: Phase I authentication accepted
  113.  3-29: 23:12:56:546:ee8 processing payload NOTIFY
  114.  3-29: 23:12:56:546:ee8 Unknown Notify Message 24578
  115.  3-29: 23:12:56:546:ee8 ClearFragList
  116.  3-29: 23:12:56:546:ee8 constructing ISAKMP Header
  117.  3-29: 23:12:56:546:ee8 constructing ID
  118.  3-29: 23:12:56:546:ee8 MM ID Type 1
  119.  3-29: 23:12:56:546:ee8 MM ID d564184b
  120.  3-29: 23:12:56:546:ee8 constructing HASH
  121.  3-29: 23:12:56:546:ee8 MM established.  SA: 0012FD20
  122.  3-29: 23:12:56:546:ee8
  123.  3-29: 23:12:56:546:ee8 Sending: SA = 0x0012FD20 to 85.227.242.238:Type 2.500
  124.  3-29: 23:12:56:546:ee8 ISAKMP Header: (V1.0), len = 68
  125.  3-29: 23:12:56:546:ee8   I-COOKIE a6256b4534195894
  126.  3-29: 23:12:56:546:ee8   R-COOKIE 25567abfcf311c67
  127.  3-29: 23:12:56:546:ee8   exchange: Oakley Main Mode
  128.  3-29: 23:12:56:546:ee8   flags: 1 ( encrypted )
  129.  3-29: 23:12:56:546:ee8   next payload: ID
  130.  3-29: 23:12:56:546:ee8   message ID: 00000000
  131.  3-29: 23:12:56:546:ee8 Ports S:f401 D:f401
  132.  3-29: 23:12:56:566:ee8
  133.  3-29: 23:12:56:566:ee8 Receive: (get) SA = 0x0012fd20 from 85.227.242.238.500
  134.  3-29: 23:12:56:566:ee8 ISAKMP Header: (V1.0), len = 172
  135.  3-29: 23:12:56:566:ee8   I-COOKIE a6256b4534195894
  136.  3-29: 23:12:56:566:ee8   R-COOKIE 25567abfcf311c67
  137.  3-29: 23:12:56:566:ee8   exchange: Oakley Quick Mode
  138.  3-29: 23:12:56:566:ee8   flags: 1 ( encrypted )
  139.  3-29: 23:12:56:566:ee8   next payload: HASH
  140.  3-29: 23:12:56:566:ee8   message ID: f3c64200
  141.  3-29: 23:12:56:566:ee8 processing HASH (QM)
  142.  3-29: 23:12:56:566:ee8 ClearFragList
  143.  3-29: 23:12:56:566:ee8 processing payload NONCE
  144.  3-29: 23:12:56:566:ee8 processing payload ID
  145.  3-29: 23:12:56:566:ee8 processing payload ID
  146.  3-29: 23:12:56:566:ee8 processing payload SA
  147.  3-29: 23:12:56:566:ee8 Negotiated Proxy ID: Src 192.168.0.0.0 Dst 10.0.0.0.0
  148.  3-29: 23:12:56:566:ee8 Src id for subnet.  Mask 255.255.255.0
  149.  3-29: 23:12:56:566:ee8 Dst id for subnet.  Mask 255.255.255.0
  150.  3-29: 23:12:56:566:ee8 Checking Proposal 1: Proto= ESP(3), num trans=1 Next=0
  151.  3-29: 23:12:56:566:ee8 Checking Transform # 1: ID=Triple DES CBC(3)
  152.  3-29: 23:12:56:566:ee8  tunnel mode is Tunnel Mode(1)
  153.  3-29: 23:12:56:566:ee8  SA life type in seconds
  154.  3-29: 23:12:56:566:ee8  SA life duration 3600
  155.  3-29: 23:12:56:566:ee8  SA life type in kilobytes
  156.  3-29: 23:12:56:566:ee8   SA life duration 00465000
  157.  3-29: 23:12:56:566:ee8  HMAC algorithm is SHA(2)
  158.  3-29: 23:12:56:566:ee8 Finding Responder Policy for SRC=192.168.0.0.0000 DST=10.0.0.0.0000, SRCMask=255.255.255.0, DSTMask=255.255.255.0, Prot=0 InTunnelEndpt 4b1864d5 OutTunnelEndpt eef2e355
  159.  3-29: 23:12:56:566:ee8 Found permit/block filter 1
  160.  3-29: 23:12:56:566:ee8 Responder failed to match filter(Phase II) 87
  161.  3-29: 23:12:56:566:ee8 Data Protection Mode (Quick Mode)
  162.  3-29: 23:12:56:566:ee8 Source IP Address 10.0.0.0  Source IP Address Mask 255.255.255.0  Destination IP Address 192.168.0.0  Destination IP Address Mask 255.255.255.0  Protocol 0  Source Port 0  Destination Port 0  IKE Local Addr 213.100.24.75  IKE Peer Addr 85.227.242.238  IKE Source Port 500  IKE Destination Port 500  Peer Private Addr
  163.  3-29: 23:12:56:566:ee8 Preshared key ID.  Peer IP Address: 85.227.242.238
  164.  3-29: 23:12:56:566:ee8 Me
  165.  3-29: 23:12:56:566:ee8 No policy configured
  166.  3-29: 23:12:56:566:ee8 Processed third (ID) payload  Responder.  Delta Time 0   0x0 0x0
  167.  3-29: 23:12:56:566:ee8 isadb_set_status sa:0012FD20 centry:000E2E90 status 3601
  168.  3-29: 23:12:56:566:ee8 ProcessFailure: sa:0012FD20 centry:000E2E90 status:3601
  169.  3-29: 23:12:56:566:ee8 constructing ISAKMP Header
  170.  3-29: 23:12:56:566:ee8 constructing HASH (null)
  171.  3-29: 23:12:56:566:ee8 constructing NOTIFY 18
  172.  3-29: 23:12:56:566:ee8 constructing HASH (Notify/Delete)
  173.  3-29: 23:12:56:566:ee8
  174.  3-29: 23:12:56:566:ee8 Sending: SA = 0x0012FD20 to 85.227.242.238:Type 1.500
  175.  3-29: 23:12:56:566:ee8 ISAKMP Header: (V1.0), len = 68
  176.  3-29: 23:12:56:566:ee8   I-COOKIE a6256b4534195894
  177.  3-29: 23:12:56:566:ee8   R-COOKIE 25567abfcf311c67
  178.  3-29: 23:12:56:566:ee8   exchange: ISAKMP Informational Exchange
  179.  3-29: 23:12:56:566:ee8   flags: 1 ( encrypted )
  180.  3-29: 23:12:56:566:ee8   next payload: HASH
  181.  3-29: 23:12:56:566:ee8   message ID: 615b062a
  182.  3-29: 23:12:56:566:ee8 Ports S:f401 D:f401
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top