Advertisement
Guest User

Untitled

a guest
Jul 29th, 2020
110
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.28 KB | None | 0 0
  1. Jul 29 19:54:36 charon 11[MGR] checkin and destroy of IKE_SA successful
  2. Jul 29 19:54:36 charon 11[IKE] <262> IKE_SA (unnamed)[262] state change: CONNECTING => DESTROYING
  3. Jul 29 19:54:36 charon 11[MGR] <262> checkin and destroy IKE_SA (unnamed)[262]
  4. Jul 29 19:54:36 charon 11[JOB] <262> deleting half open IKE_SA with <CLIENT IP ADDRESS> after timeout
  5. Jul 29 19:54:36 charon 11[MGR] IKE_SA (unnamed)[262] successfully checked out
  6. Jul 29 19:54:36 charon 11[MGR] checkout IKEv2 SA with SPIs 942c09ac63da0942_i 033dc936e796a289_r
  7. Jul 29 19:54:06 charon 11[MGR] <262> checkin of IKE_SA successful
  8. Jul 29 19:54:06 charon 11[MGR] <262> checkin IKE_SA (unnamed)[262]
  9. Jul 29 19:54:06 charon 11[NET] <262> sending packet: from <PFSENSE IP ADDRESS>[500] to <CLIENT IP ADDRESS>[500] (481 bytes)
  10. Jul 29 19:54:06 charon 11[ENC] <262> generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(CHDLESS_SUP) N(MULT_AUTH) ]
  11. Jul 29 19:54:06 charon 11[IKE] <262> sending cert request for "CN=<PFSENSE IP ADDRESS>"
  12. Jul 29 19:54:06 charon 11[IKE] <262> remote host is behind NAT
  13. Jul 29 19:54:06 charon 11[LIB] <262> size of DH secret exponent: 2047 bits
  14. Jul 29 19:54:06 charon 11[CFG] <262> selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
  15. Jul 29 19:54:06 charon 11[CFG] <262> configured proposals: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
  16. Jul 29 19:54:06 charon 11[CFG] <262> received proposals: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC_256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_2048
  17. Jul 29 19:54:06 charon 11[CFG] <262> proposal matches
  18. Jul 29 19:54:06 charon 11[CFG] <262> selecting proposal:
  19. Jul 29 19:54:06 charon 11[CFG] <262> no acceptable INTEGRITY_ALGORITHM found
  20. Jul 29 19:54:06 charon 11[CFG] <262> selecting proposal:
  21. Jul 29 19:54:06 charon 11[IKE] <262> IKE_SA (unnamed)[262] state change: CREATED => CONNECTING
  22. Jul 29 19:54:06 charon 11[IKE] <262> <CLIENT IP ADDRESS> is initiating an IKE_SA
  23. Jul 29 19:54:06 charon 11[ENC] <262> received unknown vendor ID: 01:52:8b:bb:c0:06:96:12:18:49:ab:9a:1c:5b:2a:51:00:00:00:02
  24. Jul 29 19:54:06 charon 11[IKE] <262> received Vid-Initial-Contact vendor ID
  25. Jul 29 19:54:06 charon 11[IKE] <262> received MS-Negotiation Discovery Capable vendor ID
  26. Jul 29 19:54:06 charon 11[IKE] <262> received MS NT5 ISAKMPOAKLEY v9 vendor ID
  27. Jul 29 19:54:06 charon 11[CFG] <262> found matching ike config: <PFSENSE IP ADDRESS>...%any with prio 1052
  28. Jul 29 19:54:06 charon 11[CFG] <262> candidate: <PFSENSE IP ADDRESS>...%any, prio 1052
  29. Jul 29 19:54:06 charon 11[CFG] <262> candidate: %any...%any, prio 24
  30. Jul 29 19:54:06 charon 11[CFG] <262> looking for an IKEv2 config for <PFSENSE IP ADDRESS>...<CLIENT IP ADDRESS>
  31. Jul 29 19:54:06 charon 11[ENC] <262> parsed IKE_SA_INIT request 0 [ SA KE No N(FRAG_SUP) N(NATD_S_IP) N(NATD_D_IP) V V V V ]
  32. Jul 29 19:54:06 charon 11[NET] <262> received packet: from <CLIENT IP ADDRESS>[500] to <PFSENSE IP ADDRESS>[500] (632 bytes)
  33. Jul 29 19:54:06 charon 11[MGR] created IKE_SA (unnamed)[262]
  34. Jul 29 19:54:06 charon 11[MGR] checkout IKEv2 SA by message with SPIs 942c09ac63da0942_i 0000000000000000_r
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement