Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: received packet: from 166.176.187.162[25278] to 192.168.92.3[500] (792 bytes)
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: 166.176.187.162 is initiating an IKE_SA
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: selected proposal: IKE:AES_GCM_16_192/PRF_HMAC_SHA2_256/ECP_256
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: local host is behind NAT, sending keep alives
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: remote host is behind NAT
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: sending cert request for "C=US, O=pisrv1-strongSwan, CN=strongSwan pisrv1 Root CA"
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: sending packet: from 192.168.92.3[500] to 166.176.187.162[25278] (297 bytes)
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: received packet: from 166.176.187.162[22446] to 192.168.92.3[4500] (1248 bytes)
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: parsed IKE_AUTH request 1 [ EF(1/2) ]
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: received fragment #1 of 2, waiting for complete IKE message
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: received packet: from 166.176.187.162[22446] to 192.168.92.3[4500] (589 bytes)
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: parsed IKE_AUTH request 1 [ EF(2/2) ]
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: received fragment #2 of 2, reassembled fragmented IKE message (1772 bytes)
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: parsed IKE_AUTH request 1 [ IDi CERT N(INIT_CONTACT) CERTREQ IDr AUTH CPRQ(ADDR DNS) SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: received cert request for "C=US, O=pisrv1-strongSwan, CN=strongSwan pisrv1 Root CA"
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: received 1 cert requests for an unknown ca
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: received end entity cert "C=US, O=pisrv1-strongSwan, CN=theclient-pi-pisrv1@myvpn.net"
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: looking for peer configs matching 192.168.92.3[linux.domain.com]...166.176.187.162[theclient-pi-pisrv1@myvpn.net]
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: selected peer config 'ikev2-pubkey-linux'
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: using trusted ca certificate "C=US, O=pisrv1-strongSwan, CN=strongSwan pisrv1 Root CA"
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: checking certificate status of "C=US, O=pisrv1-strongSwan, CN=theclient-pi-pisrv1@myvpn.net"
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: certificate status is not available
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: reached self-signed root ca with a path length of 0
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: using trusted certificate "C=US, O=pisrv1-strongSwan, CN=theclient-pi-pisrv1@myvpn.net"
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: authentication of 'theclient-pi-pisrv1@myvpn.net' with RSA_EMSA_PKCS1_SHA2_256 successful
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: authentication of 'linux.domain.com' (myself) with RSA_EMSA_PKCS1_SHA2_384 successful
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: IKE_SA ikev2-pubkey-linux[3] established between 192.168.92.3[linux.domain.com]...166.176.187.162[theclient-pi-pisrv1@myvpn.net]
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: sending end entity cert "C=US, O=pisrv1-strongSwan, CN=pisrv1.domain.com"
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: peer requested virtual IP %any
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: reassigning offline lease to 'theclient-pi-pisrv1@myvpn.net'
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: assigning virtual IP 10.92.10.1 to peer 'theclient-pi-pisrv1@myvpn.net'
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: selected proposal: ESP:AES_CBC_128/HMAC_SHA2_256_128/NO_EXT_SEQ
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: CHILD_SA ikev2-pubkey{3} established with SPIs c11f1f32_i cbaad7d2_o and TS 50.47.109.48/32 === 10.92.10.1/32
- Sep 07 19:28:34 pisrv1 vpn[15680]: + theclient-pi-pisrv1@myvpn.net 10.92.10.1/32 == 166.176.187.162 -- 192.168.92.3 == 50.47.109.48/32
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: generating IKE_AUTH response 1 [ IDr CERT AUTH CPRP(ADDR DNS DNS) SA TSi TSr ]
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: splitting IKE message (2176 bytes) into 2 fragments
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: generating IKE_AUTH response 1 [ EF(1/2) ]
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: generating IKE_AUTH response 1 [ EF(2/2) ]
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: sending packet: from 192.168.92.3[4500] to 166.176.187.162[22446] (1248 bytes)
- Sep 07 19:28:34 pisrv1 charon-systemd[15426]: sending packet: from 192.168.92.3[4500] to 166.176.187.162[22446] (993 bytes)
- Sep 07 19:28:54 pisrv1 charon-systemd[15426]: sending keep alive to 166.176.187.162[22446]
- Sep 07 19:29:04 pisrv1 charon-systemd[15426]: sending DPD request
- Sep 07 19:29:04 pisrv1 charon-systemd[15426]: generating INFORMATIONAL request 0 [ ]
- Sep 07 19:29:04 pisrv1 charon-systemd[15426]: sending packet: from 192.168.92.3[4500] to 166.176.187.162[22446] (57 bytes)
- Sep 07 19:29:05 pisrv1 charon-systemd[15426]: received packet: from 166.176.187.162[22446] to 192.168.92.3[4500] (57 bytes)
- Sep 07 19:29:05 pisrv1 charon-systemd[15426]: parsed INFORMATIONAL response 0 [ ]
- Sep 07 19:29:12 pisrv1 dhcpd[4078]: DHCPREQUEST for 192.168.92.58 from 6c:72:e7:bb:71:1a via eth0
- Sep 07 19:29:12 pisrv1 dhcpd[4078]: DHCPACK on 192.168.92.58 to 6c:72:e7:bb:71:1a via eth0
- Sep 07 19:29:13 pisrv1 charon-systemd[15426]: received packet: from 166.176.187.162[22446] to 192.168.92.3[4500] (69 bytes)
- Sep 07 19:29:13 pisrv1 charon-systemd[15426]: parsed INFORMATIONAL request 2 [ D ]
- Sep 07 19:29:13 pisrv1 charon-systemd[15426]: received DELETE for ESP CHILD_SA with SPI cbaad7d2
- Sep 07 19:29:13 pisrv1 charon-systemd[15426]: closing CHILD_SA ikev2-pubkey{3} with SPIs c11f1f32_i (0 bytes) cbaad7d2_o (0 bytes) and TS 50.47.109.48/32 === 10.92.10.1/32
- Sep 07 19:29:13 pisrv1 charon-systemd[15426]: sending DELETE for ESP CHILD_SA with SPI c11f1f32
- Sep 07 19:29:13 pisrv1 charon-systemd[15426]: CHILD_SA closed
- Sep 07 19:29:13 pisrv1 vpn[15698]: - theclient-pi-pisrv1@myvpn.net 10.92.10.1/32 == 166.176.187.162 -- 192.168.92.3 == 50.47.109.48/32
- Sep 07 19:29:13 theserver charon-systemd[15426]: generating INFORMATIONAL response 2 [ D ]
- Sep 07 19:29:13 theserver charon-systemd[15426]: sending packet: from 192.168.92.3[4500] to 166.176.187.162[22446] (69 bytes)
- Sep 07 19:29:13 theserver charon-systemd[15426]: received packet: from 166.176.187.162[22446] to 192.168.92.3[4500] (65 bytes)
- Sep 07 19:29:13 theserver charon-systemd[15426]: parsed INFORMATIONAL request 3 [ D ]
- Sep 07 19:29:13 theserver charon-systemd[15426]: received DELETE for IKE_SA ikev2-pubkey-linux[3]
- Sep 07 19:29:13 theserver charon-systemd[15426]: deleting IKE_SA ikev2-pubkey-linux[3] between 192.168.92.3[linux.domain.com]...166.176.187.162[theclient-pi-theserver@myvpn.net]
- Sep 07 19:29:13 theserver charon-systemd[15426]: IKE_SA deleted
- Sep 07 19:29:13 theserver charon-systemd[15426]: generating INFORMATIONAL response 3 [ ]
- Sep 07 19:29:13 theserver charon-systemd[15426]: sending packet: from 192.168.92.3[4500] to 166.176.187.162[22446] (57 bytes)
- Sep 07 19:29:13 theserver charon-systemd[15426]: lease 10.92.10.1 by 'theclient-pi-theserver@myvpn.net' went offline
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement