Advertisement
Guest User

Untitled

a guest
Mar 29th, 2009
278
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.90 KB | None | 0 0
  1. 3-29: 23:12:56:306:ee8
  2. 3-29: 23:12:56:306:ee8 Receive: (get) SA = 0x00000000 from 85.227.242.238.500
  3. 3-29: 23:12:56:306:ee8 ISAKMP Header: (V1.0), len = 200
  4. 3-29: 23:12:56:306:ee8 I-COOKIE a6256b4534195894
  5. 3-29: 23:12:56:306:ee8 R-COOKIE 0000000000000000
  6. 3-29: 23:12:56:306:ee8 exchange: Oakley Main Mode
  7. 3-29: 23:12:56:306:ee8 flags: 0
  8. 3-29: 23:12:56:306:ee8 next payload: SA
  9. 3-29: 23:12:56:306:ee8 message ID: 00000000
  10. 3-29: 23:12:56:306:ee8 Filter to match: Src 85.227.242.238 Dst 213.100.24.75
  11. 3-29: 23:12:56:306:ee8 MM PolicyName: 4
  12. 3-29: 23:12:56:306:ee8 MMPolicy dwFlags 2 SoftSAExpireTime 28800
  13. 3-29: 23:12:56:306:ee8 MMOffer[0] LifetimeSec 28800 QMLimit 0 DHGroup 2
  14. 3-29: 23:12:56:306:ee8 MMOffer[0] Encrypt: Triple DES CBC Hash: SHA
  15. 3-29: 23:12:56:306:ee8 MMOffer[1] LifetimeSec 28800 QMLimit 0 DHGroup 1
  16. 3-29: 23:12:56:306:ee8 MMOffer[1] Encrypt: DES CBC Hash: MD5
  17. 3-29: 23:12:56:306:ee8 MMOffer[2] LifetimeSec 28800 QMLimit 0 DHGroup 2
  18. 3-29: 23:12:56:306:ee8 MMOffer[2] Encrypt: Triple DES CBC Hash: MD5
  19. 3-29: 23:12:56:306:ee8 MMOffer[3] LifetimeSec 28800 QMLimit 0 DHGroup 1
  20. 3-29: 23:12:56:306:ee8 MMOffer[3] Encrypt: DES CBC Hash: SHA
  21. 3-29: 23:12:56:306:ee8 Auth[0]:PresharedKey KeyLen 16
  22. 3-29: 23:12:56:306:ee8 Responding with new SA 12fd20
  23. 3-29: 23:12:56:306:ee8 processing payload SA
  24. 3-29: 23:12:56:306:ee8 Received Phase 1 Transform 1
  25. 3-29: 23:12:56:306:ee8 Encryption Alg Triple DES CBC(5)
  26. 3-29: 23:12:56:306:ee8 Hash Alg SHA(2)
  27. 3-29: 23:12:56:306:ee8 Oakley Group 2
  28. 3-29: 23:12:56:306:ee8 Auth Method Preshared Key(1)
  29. 3-29: 23:12:56:306:ee8 Life type in Seconds
  30. 3-29: 23:12:56:306:ee8 Life duration of 86400
  31. 3-29: 23:12:56:306:ee8 Received Phase 1 Transform 2
  32. 3-29: 23:12:56:306:ee8 Encryption Alg DES CBC(1)
  33. 3-29: 23:12:56:306:ee8 Hash Alg SHA(2)
  34. 3-29: 23:12:56:306:ee8 Oakley Group 1
  35. 3-29: 23:12:56:306:ee8 Auth Method RSA Signature with Certificates(3)
  36. 3-29: 23:12:56:306:ee8 Life type in Seconds
  37. 3-29: 23:12:56:306:ee8 Life duration of 86400
  38. 3-29: 23:12:56:306:ee8 Phase 1 SA accepted: transform=1
  39. 3-29: 23:12:56:306:ee8 SA - Oakley proposal accepted
  40. 3-29: 23:12:56:306:ee8 processing payload VENDOR ID
  41. 3-29: 23:12:56:306:ee8 processing payload VENDOR ID
  42. 3-29: 23:12:56:306:ee8 processing payload VENDOR ID
  43. 3-29: 23:12:56:306:ee8 processing payload VENDOR ID
  44. 3-29: 23:12:56:306:ee8 Received VendorId draft-ietf-ipsec-nat-t-ike-02
  45. 3-29: 23:12:56:306:ee8 ClearFragList
  46. 3-29: 23:12:56:306:ee8 constructing ISAKMP Header
  47. 3-29: 23:12:56:306:ee8 constructing SA (ISAKMP)
  48. 3-29: 23:12:56:306:ee8 Constructing Vendor MS NT5 ISAKMPOAKLEY
  49. 3-29: 23:12:56:306:ee8 Constructing Vendor FRAGMENTATION
  50. 3-29: 23:12:56:306:ee8 Constructing Vendor draft-ietf-ipsec-nat-t-ike-02
  51. 3-29: 23:12:56:306:ee8
  52. 3-29: 23:12:56:306:ee8 Sending: SA = 0x0012FD20 to 85.227.242.238:Type 2.500
  53. 3-29: 23:12:56:306:ee8 ISAKMP Header: (V1.0), len = 148
  54. 3-29: 23:12:56:306:ee8 I-COOKIE a6256b4534195894
  55. 3-29: 23:12:56:306:ee8 R-COOKIE 25567abfcf311c67
  56. 3-29: 23:12:56:306:ee8 exchange: Oakley Main Mode
  57. 3-29: 23:12:56:306:ee8 flags: 0
  58. 3-29: 23:12:56:306:ee8 next payload: SA
  59. 3-29: 23:12:56:306:ee8 message ID: 00000000
  60. 3-29: 23:12:56:306:ee8 Ports S:f401 D:f401
  61. 3-29: 23:12:56:336:ee8
  62. 3-29: 23:12:56:336:ee8 Receive: (get) SA = 0x0012fd20 from 85.227.242.238.500
  63. 3-29: 23:12:56:336:ee8 ISAKMP Header: (V1.0), len = 304
  64. 3-29: 23:12:56:336:ee8 I-COOKIE a6256b4534195894
  65. 3-29: 23:12:56:336:ee8 R-COOKIE 25567abfcf311c67
  66. 3-29: 23:12:56:336:ee8 exchange: Oakley Main Mode
  67. 3-29: 23:12:56:336:ee8 flags: 0
  68. 3-29: 23:12:56:336:ee8 next payload: KE
  69. 3-29: 23:12:56:336:ee8 message ID: 00000000
  70. 3-29: 23:12:56:336:ee8 processing payload KE
  71. 3-29: 23:12:56:486:ee8 processing payload NONCE
  72. 3-29: 23:12:56:486:ee8 processing payload VENDOR ID
  73. 3-29: 23:12:56:486:ee8 processing payload VENDOR ID
  74. 3-29: 23:12:56:486:ee8 processing payload VENDOR ID
  75. 3-29: 23:12:56:486:ee8 processing payload VENDOR ID
  76. 3-29: 23:12:56:496:ee8 processing payload NATDISC
  77. 3-29: 23:12:56:496:ee8 Processing NatHash
  78. 3-29: 23:12:56:496:ee8 Nat hash 5dda1863067e7f313af6aaed27c4fca4
  79. 3-29: 23:12:56:496:ee8 b31218b6
  80. 3-29: 23:12:56:496:ee8 SA StateMask2 e
  81. 3-29: 23:12:56:496:ee8 processing payload NATDISC
  82. 3-29: 23:12:56:496:ee8 Processing NatHash
  83. 3-29: 23:12:56:496:ee8 Nat hash c81d68d93737e5f21d4b25dd07fa4284
  84. 3-29: 23:12:56:496:ee8 83a0cd75
  85. 3-29: 23:12:56:496:ee8 SA StateMask2 8e
  86. 3-29: 23:12:56:496:ee8 ClearFragList
  87. 3-29: 23:12:56:496:ee8 constructing ISAKMP Header
  88. 3-29: 23:12:56:496:ee8 constructing KE
  89. 3-29: 23:12:56:496:ee8 constructing NONCE (ISAKMP)
  90. 3-29: 23:12:56:496:ee8 Constructing NatDisc
  91. 3-29: 23:12:56:496:ee8
  92. 3-29: 23:12:56:496:ee8 Sending: SA = 0x0012FD20 to 85.227.242.238:Type 2.500
  93. 3-29: 23:12:56:496:ee8 ISAKMP Header: (V1.0), len = 232
  94. 3-29: 23:12:56:496:ee8 I-COOKIE a6256b4534195894
  95. 3-29: 23:12:56:496:ee8 R-COOKIE 25567abfcf311c67
  96. 3-29: 23:12:56:496:ee8 exchange: Oakley Main Mode
  97. 3-29: 23:12:56:496:ee8 flags: 0
  98. 3-29: 23:12:56:496:ee8 next payload: KE
  99. 3-29: 23:12:56:496:ee8 message ID: 00000000
  100. 3-29: 23:12:56:496:ee8 Ports S:f401 D:f401
  101. 3-29: 23:12:56:546:ee8
  102. 3-29: 23:12:56:546:ee8 Receive: (get) SA = 0x0012fd20 from 85.227.242.238.500
  103. 3-29: 23:12:56:546:ee8 ISAKMP Header: (V1.0), len = 100
  104. 3-29: 23:12:56:546:ee8 I-COOKIE a6256b4534195894
  105. 3-29: 23:12:56:546:ee8 R-COOKIE 25567abfcf311c67
  106. 3-29: 23:12:56:546:ee8 exchange: Oakley Main Mode
  107. 3-29: 23:12:56:546:ee8 flags: 1 ( encrypted )
  108. 3-29: 23:12:56:546:ee8 next payload: ID
  109. 3-29: 23:12:56:546:ee8 message ID: 00000000
  110. 3-29: 23:12:56:546:ee8 processing payload ID
  111. 3-29: 23:12:56:546:ee8 processing payload HASH
  112. 3-29: 23:12:56:546:ee8 AUTH: Phase I authentication accepted
  113. 3-29: 23:12:56:546:ee8 processing payload NOTIFY
  114. 3-29: 23:12:56:546:ee8 Unknown Notify Message 24578
  115. 3-29: 23:12:56:546:ee8 ClearFragList
  116. 3-29: 23:12:56:546:ee8 constructing ISAKMP Header
  117. 3-29: 23:12:56:546:ee8 constructing ID
  118. 3-29: 23:12:56:546:ee8 MM ID Type 1
  119. 3-29: 23:12:56:546:ee8 MM ID d564184b
  120. 3-29: 23:12:56:546:ee8 constructing HASH
  121. 3-29: 23:12:56:546:ee8 MM established. SA: 0012FD20
  122. 3-29: 23:12:56:546:ee8
  123. 3-29: 23:12:56:546:ee8 Sending: SA = 0x0012FD20 to 85.227.242.238:Type 2.500
  124. 3-29: 23:12:56:546:ee8 ISAKMP Header: (V1.0), len = 68
  125. 3-29: 23:12:56:546:ee8 I-COOKIE a6256b4534195894
  126. 3-29: 23:12:56:546:ee8 R-COOKIE 25567abfcf311c67
  127. 3-29: 23:12:56:546:ee8 exchange: Oakley Main Mode
  128. 3-29: 23:12:56:546:ee8 flags: 1 ( encrypted )
  129. 3-29: 23:12:56:546:ee8 next payload: ID
  130. 3-29: 23:12:56:546:ee8 message ID: 00000000
  131. 3-29: 23:12:56:546:ee8 Ports S:f401 D:f401
  132. 3-29: 23:12:56:566:ee8
  133. 3-29: 23:12:56:566:ee8 Receive: (get) SA = 0x0012fd20 from 85.227.242.238.500
  134. 3-29: 23:12:56:566:ee8 ISAKMP Header: (V1.0), len = 172
  135. 3-29: 23:12:56:566:ee8 I-COOKIE a6256b4534195894
  136. 3-29: 23:12:56:566:ee8 R-COOKIE 25567abfcf311c67
  137. 3-29: 23:12:56:566:ee8 exchange: Oakley Quick Mode
  138. 3-29: 23:12:56:566:ee8 flags: 1 ( encrypted )
  139. 3-29: 23:12:56:566:ee8 next payload: HASH
  140. 3-29: 23:12:56:566:ee8 message ID: f3c64200
  141. 3-29: 23:12:56:566:ee8 processing HASH (QM)
  142. 3-29: 23:12:56:566:ee8 ClearFragList
  143. 3-29: 23:12:56:566:ee8 processing payload NONCE
  144. 3-29: 23:12:56:566:ee8 processing payload ID
  145. 3-29: 23:12:56:566:ee8 processing payload ID
  146. 3-29: 23:12:56:566:ee8 processing payload SA
  147. 3-29: 23:12:56:566:ee8 Negotiated Proxy ID: Src 192.168.0.0.0 Dst 10.0.0.0.0
  148. 3-29: 23:12:56:566:ee8 Src id for subnet. Mask 255.255.255.0
  149. 3-29: 23:12:56:566:ee8 Dst id for subnet. Mask 255.255.255.0
  150. 3-29: 23:12:56:566:ee8 Checking Proposal 1: Proto= ESP(3), num trans=1 Next=0
  151. 3-29: 23:12:56:566:ee8 Checking Transform # 1: ID=Triple DES CBC(3)
  152. 3-29: 23:12:56:566:ee8 tunnel mode is Tunnel Mode(1)
  153. 3-29: 23:12:56:566:ee8 SA life type in seconds
  154. 3-29: 23:12:56:566:ee8 SA life duration 3600
  155. 3-29: 23:12:56:566:ee8 SA life type in kilobytes
  156. 3-29: 23:12:56:566:ee8 SA life duration 00465000
  157. 3-29: 23:12:56:566:ee8 HMAC algorithm is SHA(2)
  158. 3-29: 23:12:56:566:ee8 Finding Responder Policy for SRC=192.168.0.0.0000 DST=10.0.0.0.0000, SRCMask=255.255.255.0, DSTMask=255.255.255.0, Prot=0 InTunnelEndpt 4b1864d5 OutTunnelEndpt eef2e355
  159. 3-29: 23:12:56:566:ee8 Found permit/block filter 1
  160. 3-29: 23:12:56:566:ee8 Responder failed to match filter(Phase II) 87
  161. 3-29: 23:12:56:566:ee8 Data Protection Mode (Quick Mode)
  162. 3-29: 23:12:56:566:ee8 Source IP Address 10.0.0.0 Source IP Address Mask 255.255.255.0 Destination IP Address 192.168.0.0 Destination IP Address Mask 255.255.255.0 Protocol 0 Source Port 0 Destination Port 0 IKE Local Addr 213.100.24.75 IKE Peer Addr 85.227.242.238 IKE Source Port 500 IKE Destination Port 500 Peer Private Addr
  163. 3-29: 23:12:56:566:ee8 Preshared key ID. Peer IP Address: 85.227.242.238
  164. 3-29: 23:12:56:566:ee8 Me
  165. 3-29: 23:12:56:566:ee8 No policy configured
  166. 3-29: 23:12:56:566:ee8 Processed third (ID) payload Responder. Delta Time 0 0x0 0x0
  167. 3-29: 23:12:56:566:ee8 isadb_set_status sa:0012FD20 centry:000E2E90 status 3601
  168. 3-29: 23:12:56:566:ee8 ProcessFailure: sa:0012FD20 centry:000E2E90 status:3601
  169. 3-29: 23:12:56:566:ee8 constructing ISAKMP Header
  170. 3-29: 23:12:56:566:ee8 constructing HASH (null)
  171. 3-29: 23:12:56:566:ee8 constructing NOTIFY 18
  172. 3-29: 23:12:56:566:ee8 constructing HASH (Notify/Delete)
  173. 3-29: 23:12:56:566:ee8
  174. 3-29: 23:12:56:566:ee8 Sending: SA = 0x0012FD20 to 85.227.242.238:Type 1.500
  175. 3-29: 23:12:56:566:ee8 ISAKMP Header: (V1.0), len = 68
  176. 3-29: 23:12:56:566:ee8 I-COOKIE a6256b4534195894
  177. 3-29: 23:12:56:566:ee8 R-COOKIE 25567abfcf311c67
  178. 3-29: 23:12:56:566:ee8 exchange: ISAKMP Informational Exchange
  179. 3-29: 23:12:56:566:ee8 flags: 1 ( encrypted )
  180. 3-29: 23:12:56:566:ee8 next payload: HASH
  181. 3-29: 23:12:56:566:ee8 message ID: 615b062a
  182. 3-29: 23:12:56:566:ee8 Ports S:f401 D:f401
  183.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement