pastebls

theserver-vpnlog

Sep 7th, 2019
199
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: received packet: from 166.176.187.162[25278] to 192.168.92.3[500] (792 bytes)
  2. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
  3. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: 166.176.187.162 is initiating an IKE_SA
  4. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: selected proposal: IKE:AES_GCM_16_192/PRF_HMAC_SHA2_256/ECP_256
  5. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: local host is behind NAT, sending keep alives
  6. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: remote host is behind NAT
  7. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: sending cert request for "C=US, O=pisrv1-strongSwan, CN=strongSwan pisrv1 Root CA"
  8. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
  9. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: sending packet: from 192.168.92.3[500] to 166.176.187.162[25278] (297 bytes)
  10. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: received packet: from 166.176.187.162[22446] to 192.168.92.3[4500] (1248 bytes)
  11. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: parsed IKE_AUTH request 1 [ EF(1/2) ]
  12. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: received fragment #1 of 2, waiting for complete IKE message
  13. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: received packet: from 166.176.187.162[22446] to 192.168.92.3[4500] (589 bytes)
  14. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: parsed IKE_AUTH request 1 [ EF(2/2) ]
  15. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: received fragment #2 of 2, reassembled fragmented IKE message (1772 bytes)
  16. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: parsed IKE_AUTH request 1 [ IDi CERT N(INIT_CONTACT) CERTREQ IDr AUTH CPRQ(ADDR DNS) SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
  17. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: received cert request for "C=US, O=pisrv1-strongSwan, CN=strongSwan pisrv1 Root CA"
  18. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: received 1 cert requests for an unknown ca
  19. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: received end entity cert "C=US, O=pisrv1-strongSwan, CN=theclient-pi-pisrv1@myvpn.net"
  20. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: looking for peer configs matching 192.168.92.3[linux.domain.com]...166.176.187.162[theclient-pi-pisrv1@myvpn.net]
  21. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: selected peer config 'ikev2-pubkey-linux'
  22. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: using trusted ca certificate "C=US, O=pisrv1-strongSwan, CN=strongSwan pisrv1 Root CA"
  23. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: checking certificate status of "C=US, O=pisrv1-strongSwan, CN=theclient-pi-pisrv1@myvpn.net"
  24. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: certificate status is not available
  25. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: reached self-signed root ca with a path length of 0
  26. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: using trusted certificate "C=US, O=pisrv1-strongSwan, CN=theclient-pi-pisrv1@myvpn.net"
  27. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: authentication of 'theclient-pi-pisrv1@myvpn.net' with RSA_EMSA_PKCS1_SHA2_256 successful
  28. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: authentication of 'linux.domain.com' (myself) with RSA_EMSA_PKCS1_SHA2_384 successful
  29. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: IKE_SA ikev2-pubkey-linux[3] established between 192.168.92.3[linux.domain.com]...166.176.187.162[theclient-pi-pisrv1@myvpn.net]
  30. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: sending end entity cert "C=US, O=pisrv1-strongSwan, CN=pisrv1.domain.com"
  31. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: peer requested virtual IP %any
  32. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: reassigning offline lease to 'theclient-pi-pisrv1@myvpn.net'
  33. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: assigning virtual IP 10.92.10.1 to peer 'theclient-pi-pisrv1@myvpn.net'
  34. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: selected proposal: ESP:AES_CBC_128/HMAC_SHA2_256_128/NO_EXT_SEQ
  35. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: CHILD_SA ikev2-pubkey{3} established with SPIs c11f1f32_i cbaad7d2_o and TS 50.47.109.48/32 === 10.92.10.1/32
  36. Sep 07 19:28:34 pisrv1 vpn[15680]: + theclient-pi-pisrv1@myvpn.net 10.92.10.1/32 == 166.176.187.162 -- 192.168.92.3 == 50.47.109.48/32
  37. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: generating IKE_AUTH response 1 [ IDr CERT AUTH CPRP(ADDR DNS DNS) SA TSi TSr ]
  38. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: splitting IKE message (2176 bytes) into 2 fragments
  39. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: generating IKE_AUTH response 1 [ EF(1/2) ]
  40. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: generating IKE_AUTH response 1 [ EF(2/2) ]
  41. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: sending packet: from 192.168.92.3[4500] to 166.176.187.162[22446] (1248 bytes)
  42. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: sending packet: from 192.168.92.3[4500] to 166.176.187.162[22446] (993 bytes)
  43. Sep 07 19:28:54 pisrv1 charon-systemd[15426]: sending keep alive to 166.176.187.162[22446]
  44. Sep 07 19:29:04 pisrv1 charon-systemd[15426]: sending DPD request
  45. Sep 07 19:29:04 pisrv1 charon-systemd[15426]: generating INFORMATIONAL request 0 [ ]
  46. Sep 07 19:29:04 pisrv1 charon-systemd[15426]: sending packet: from 192.168.92.3[4500] to 166.176.187.162[22446] (57 bytes)
  47. Sep 07 19:29:05 pisrv1 charon-systemd[15426]: received packet: from 166.176.187.162[22446] to 192.168.92.3[4500] (57 bytes)
  48. Sep 07 19:29:05 pisrv1 charon-systemd[15426]: parsed INFORMATIONAL response 0 [ ]
  49. Sep 07 19:29:12 pisrv1 dhcpd[4078]: DHCPREQUEST for 192.168.92.58 from 6c:72:e7:bb:71:1a via eth0
  50. Sep 07 19:29:12 pisrv1 dhcpd[4078]: DHCPACK on 192.168.92.58 to 6c:72:e7:bb:71:1a via eth0
  51. Sep 07 19:29:13 pisrv1 charon-systemd[15426]: received packet: from 166.176.187.162[22446] to 192.168.92.3[4500] (69 bytes)
  52. Sep 07 19:29:13 pisrv1 charon-systemd[15426]: parsed INFORMATIONAL request 2 [ D ]
  53. Sep 07 19:29:13 pisrv1 charon-systemd[15426]: received DELETE for ESP CHILD_SA with SPI cbaad7d2
  54. Sep 07 19:29:13 pisrv1 charon-systemd[15426]: closing CHILD_SA ikev2-pubkey{3} with SPIs c11f1f32_i (0 bytes) cbaad7d2_o (0 bytes) and TS 50.47.109.48/32 === 10.92.10.1/32
  55. Sep 07 19:29:13 pisrv1 charon-systemd[15426]: sending DELETE for ESP CHILD_SA with SPI c11f1f32
  56. Sep 07 19:29:13 pisrv1 charon-systemd[15426]: CHILD_SA closed
  57. Sep 07 19:29:13 pisrv1 vpn[15698]: - theclient-pi-pisrv1@myvpn.net 10.92.10.1/32 == 166.176.187.162 -- 192.168.92.3 == 50.47.109.48/32
  58. Sep 07 19:29:13 theserver charon-systemd[15426]: generating INFORMATIONAL response 2 [ D ]
  59. Sep 07 19:29:13 theserver charon-systemd[15426]: sending packet: from 192.168.92.3[4500] to 166.176.187.162[22446] (69 bytes)
  60. Sep 07 19:29:13 theserver charon-systemd[15426]: received packet: from 166.176.187.162[22446] to 192.168.92.3[4500] (65 bytes)
  61. Sep 07 19:29:13 theserver charon-systemd[15426]: parsed INFORMATIONAL request 3 [ D ]
  62. Sep 07 19:29:13 theserver charon-systemd[15426]: received DELETE for IKE_SA ikev2-pubkey-linux[3]
  63. Sep 07 19:29:13 theserver charon-systemd[15426]: deleting IKE_SA ikev2-pubkey-linux[3] between 192.168.92.3[linux.domain.com]...166.176.187.162[theclient-pi-theserver@myvpn.net]
  64. Sep 07 19:29:13 theserver charon-systemd[15426]: IKE_SA deleted
  65. Sep 07 19:29:13 theserver charon-systemd[15426]: generating INFORMATIONAL response 3 [ ]
  66. Sep 07 19:29:13 theserver charon-systemd[15426]: sending packet: from 192.168.92.3[4500] to 166.176.187.162[22446] (57 bytes)
  67. Sep 07 19:29:13 theserver charon-systemd[15426]: lease 10.92.10.1 by 'theclient-pi-theserver@myvpn.net' went offline
RAW Paste Data