Advertisement
Guest User

Untitled

a guest
Apr 27th, 2021
168
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.39 KB | None | 0 0
  1. sudo /usr/lib/NetworkManager/nm-l2tp-service --debug
  2. nm-l2tp[689590] <debug> nm-l2tp-service (version 1.8.6) starting...
  3. nm-l2tp[689590] <debug> uses default --bus-name "org.freedesktop.NetworkManager.l2tp"
  4. nm-l2tp[689590] <info> ipsec enable flag: yes
  5. ** Message: 09:22:07.607: Check port 1701
  6. vpn
  7. data : {'gateway': '*addr*', 'ipsec-enabled': 'yes', 'ipsec-esp': '3des-sha1', 'ipsec-forceencaps': 'yes', 'ipsec-ike': '3des-sha1-modp1024', 'ipsec-psk': '*pre_shared_pass*', 'mru': '1400', 'mtu': '1400', 'password-flags': '0', 'user': '*username*'}
  8. secrets : {'password': '*password*'}
  9. service-type : 'org.freedesktop.NetworkManager.l2tp'
  10.  
  11. proxy
  12.  
  13. ipv6
  14. address-data : []
  15. dns : []
  16. dns-search : []
  17. method : 'auto'
  18. route-data : []
  19.  
  20. connection
  21. id : 'spotonf'
  22. permissions : []
  23. type : 'vpn'
  24. uuid : 'ffcdc390-c875-491f-a54b-5cf66c0762ed'
  25.  
  26. ipv4
  27. address-data : []
  28. dns : []
  29. dns-search : []
  30. method : 'auto'
  31. route-data : []
  32.  
  33. nm-l2tp[689590] <info> starting ipsec
  34. Stopping strongSwan IPsec failed: starter is not running
  35. Starting strongSwan 5.9.1 IPsec [starter]...
  36. Loading config setup
  37. Loading conn 'ffcdc390-c875-491f-a54b-5cf66c0762ed'
  38. nm-l2tp[689590] <info> Spawned ipsec up script with PID 689652.
  39. initiating Main Mode IKE_SA ffcdc390-c875-491f-a54b-5cf66c0762ed[1] to *addr*
  40. generating ID_PROT request 0 [ SA V V V V V ]
  41. sending packet: from 192.168.1.137[500] to *addr*[500] (236 bytes)
  42. received packet: from *addr*[500] to 192.168.1.137[500] (156 bytes)
  43. parsed ID_PROT response 0 [ SA V V V V ]
  44. received XAuth vendor ID
  45. received NAT-T (RFC 3947) vendor ID
  46. received DPD vendor ID
  47. received FRAGMENTATION vendor ID
  48. selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
  49. generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
  50. sending packet: from 192.168.1.137[500] to *addr*[500] (244 bytes)
  51. received packet: from *addr*[500] to 192.168.1.137[500] (228 bytes)
  52. parsed ID_PROT response 0 [ KE No NAT-D NAT-D ]
  53. local host is behind NAT, sending keep alives
  54. generating ID_PROT request 0 [ ID HASH ]
  55. sending packet: from 192.168.1.137[4500] to *addr*[4500] (68 bytes)
  56. received packet: from *addr*[4500] to 192.168.1.137[4500] (92 bytes)
  57. parsed ID_PROT response 0 [ ID HASH V ]
  58. received DPD vendor ID
  59. IKE_SA ffcdc390-c875-491f-a54b-5cf66c0762ed[1] established between 192.168.1.137[192.168.1.137]...*addr*[*addr*]
  60. scheduling reauthentication in 10230s
  61. maximum IKE_SA lifetime 10770s
  62. generating QUICK_MODE request 644858499 [ HASH SA No ID ID NAT-OA NAT-OA ]
  63. sending packet: from 192.168.1.137[4500] to *addr*[4500] (244 bytes)
  64. received packet: from *addr*[4500] to 192.168.1.137[4500] (172 bytes)
  65. parsed QUICK_MODE response 644858499 [ HASH SA No ID ID NAT-OA NAT-OA ]
  66. selected proposal: ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ
  67. CHILD_SA ffcdc390-c875-491f-a54b-5cf66c0762ed{1} established with SPIs c5890210_i 0425b01c_o and TS 192.168.1.137/32[udp/l2f] === *addr*/32[udp/l2f]
  68. connection 'ffcdc390-c875-491f-a54b-5cf66c0762ed' established successfully
  69. nm-l2tp[689590] <info> strongSwan IPsec tunnel is up.
  70. ** Message: 09:22:11.434: xl2tpd started with pid 689663
  71. xl2tpd[689663]: Not looking for kernel SAref support.
  72. xl2tpd[689663]: Using l2tp kernel support.
  73. xl2tpd[689663]: xl2tpd version xl2tpd-1.3.16 started on halee PID:689663
  74. xl2tpd[689663]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc.
  75. xl2tpd[689663]: Forked by Scott Balmos and David Stipp, (C) 2001
  76. xl2tpd[689663]: Inherited by Jeff McAdams, (C) 2002
  77. xl2tpd[689663]: Forked again by Xelerance (www.xelerance.com) (C) 2006-2016
  78. xl2tpd[689663]: Listening on IP address 0.0.0.0, port 1701
  79. xl2tpd[689663]: get_call: allocating new tunnel for host *addr*, port 1701.
  80. xl2tpd[689663]: Connecting to host *addr*, port 1701
  81. xl2tpd[689663]: control_finish: message type is (null)(0). Tunnel is 0, call is 0.
  82. xl2tpd[689663]: control_finish: sending SCCRQ
  83. xl2tpd[689663]: message_type_avp: message type 2 (Start-Control-Connection-Reply)
  84. xl2tpd[689663]: protocol_version_avp: peer is using version 1, revision 0.
  85. xl2tpd[689663]: framing_caps_avp: supported peer frames: async sync
  86. xl2tpd[689663]: bearer_caps_avp: supported peer bearers: analog digital
  87. xl2tpd[689663]: firmware_rev_avp: peer reports firmware version 264 (0x0108)
  88. xl2tpd[689663]: hostname_avp: peer reports hostname 'mE0CBBC046F9D'
  89. xl2tpd[689663]: vendor_avp: peer reports vendor 'Katalix Systems Ltd. Linux-3.18.66-meraki-x86 (x86_64)'
  90. xl2tpd[689663]: assigned_tunnel_avp: using peer's tunnel 21664
  91. xl2tpd[689663]: receive_window_size_avp: peer wants RWS of 10. Will use flow control.
  92. xl2tpd[689663]: control_finish: message type is Start-Control-Connection-Reply(2). Tunnel is 21664, call is 0.
  93. xl2tpd[689663]: control_finish: sending SCCCN
  94. xl2tpd[689663]: Connection established to *addr*, 1701. Local: 37638, Remote: 21664 (ref=0/0).
  95. xl2tpd[689663]: Calling on tunnel 37638
  96. xl2tpd[689663]: control_finish: message type is (null)(0). Tunnel is 21664, call is 0.
  97. xl2tpd[689663]: control_finish: sending ICRQ
  98. xl2tpd[689663]: message_type_avp: message type 11 (Incoming-Call-Reply)
  99. xl2tpd[689663]: assigned_call_avp: using peer's call 7738
  100. xl2tpd[689663]: control_finish: message type is Incoming-Call-Reply(11). Tunnel is 21664, call is 7738.
  101. xl2tpd[689663]: control_finish: Sending ICCN
  102. xl2tpd[689663]: Call established with *addr*, Local: 23288, Remote: 7738, Serial: 1 (ref=0/0)
  103. xl2tpd[689663]: start_pppd: I'm running:
  104. xl2tpd[689663]: "/usr/sbin/pppd"
  105. xl2tpd[689663]: "plugin"
  106. xl2tpd[689663]: "pppol2tp.so"
  107. xl2tpd[689663]: "pppol2tp"
  108. xl2tpd[689663]: "7"
  109. xl2tpd[689663]: "passive"
  110. xl2tpd[689663]: "nodetach"
  111. xl2tpd[689663]: ":"
  112. xl2tpd[689663]: "debug"
  113. xl2tpd[689663]: "file"
  114. xl2tpd[689663]: "/var/run/nm-l2tp-ffcdc390-c875-491f-a54b-5cf66c0762ed/ppp-options"
  115. xl2tpd[689663]: message_type_avp: message type 16 (Set-Link-Info)
  116. xl2tpd[689663]: ignore_avp : Ignoring AVP
  117. xl2tpd[689663]: control_finish: message type is Set-Link-Info(16). Tunnel is 21664, call is 7738.
  118. nm-l2tp[689590] <info> Terminated xl2tpd daemon with PID 689663.
  119. xl2tpd[689663]: death_handler: Fatal signal 15 received
  120. xl2tpd[689663]: Terminating pppd: sending TERM signal to pid 689664
  121. xl2tpd[689663]: Connection 21664 closed to *addr*, port 1701 (Server closing)
  122. Stopping strongSwan IPsec...
  123. ** Message: 09:22:13.063: ipsec shut down
  124. nm-l2tp[689590] <warn> xl2tpd exited with error code 1
  125. Stopping strongSwan IPsec failed: starter is not running
  126. ** Message: 09:22:13.073: ipsec shut down
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement