SHARE
TWEET

theserver-vpnlog

pastebls Sep 7th, 2019 118 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: received packet: from 166.176.187.162[25278] to 192.168.92.3[500] (792 bytes)
  2. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
  3. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: 166.176.187.162 is initiating an IKE_SA
  4. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: selected proposal: IKE:AES_GCM_16_192/PRF_HMAC_SHA2_256/ECP_256
  5. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: local host is behind NAT, sending keep alives
  6. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: remote host is behind NAT
  7. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: sending cert request for "C=US, O=pisrv1-strongSwan, CN=strongSwan pisrv1 Root CA"
  8. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
  9. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: sending packet: from 192.168.92.3[500] to 166.176.187.162[25278] (297 bytes)
  10. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: received packet: from 166.176.187.162[22446] to 192.168.92.3[4500] (1248 bytes)
  11. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: parsed IKE_AUTH request 1 [ EF(1/2) ]
  12. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: received fragment #1 of 2, waiting for complete IKE message
  13. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: received packet: from 166.176.187.162[22446] to 192.168.92.3[4500] (589 bytes)
  14. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: parsed IKE_AUTH request 1 [ EF(2/2) ]
  15. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: received fragment #2 of 2, reassembled fragmented IKE message (1772 bytes)
  16. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: parsed IKE_AUTH request 1 [ IDi CERT N(INIT_CONTACT) CERTREQ IDr AUTH CPRQ(ADDR DNS) SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
  17. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: received cert request for "C=US, O=pisrv1-strongSwan, CN=strongSwan pisrv1 Root CA"
  18. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: received 1 cert requests for an unknown ca
  19. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: received end entity cert "C=US, O=pisrv1-strongSwan, CN=theclient-pi-pisrv1@myvpn.net"
  20. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: looking for peer configs matching 192.168.92.3[linux.domain.com]...166.176.187.162[theclient-pi-pisrv1@myvpn.net]
  21. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: selected peer config 'ikev2-pubkey-linux'
  22. Sep 07 19:28:34 pisrv1 charon-systemd[15426]:   using trusted ca certificate "C=US, O=pisrv1-strongSwan, CN=strongSwan pisrv1 Root CA"
  23. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: checking certificate status of "C=US, O=pisrv1-strongSwan, CN=theclient-pi-pisrv1@myvpn.net"
  24. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: certificate status is not available
  25. Sep 07 19:28:34 pisrv1 charon-systemd[15426]:   reached self-signed root ca with a path length of 0
  26. Sep 07 19:28:34 pisrv1 charon-systemd[15426]:   using trusted certificate "C=US, O=pisrv1-strongSwan, CN=theclient-pi-pisrv1@myvpn.net"
  27. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: authentication of 'theclient-pi-pisrv1@myvpn.net' with RSA_EMSA_PKCS1_SHA2_256 successful
  28. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: authentication of 'linux.domain.com' (myself) with RSA_EMSA_PKCS1_SHA2_384 successful
  29. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: IKE_SA ikev2-pubkey-linux[3] established between 192.168.92.3[linux.domain.com]...166.176.187.162[theclient-pi-pisrv1@myvpn.net]
  30. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: sending end entity cert "C=US, O=pisrv1-strongSwan, CN=pisrv1.domain.com"
  31. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: peer requested virtual IP %any
  32. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: reassigning offline lease to 'theclient-pi-pisrv1@myvpn.net'
  33. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: assigning virtual IP 10.92.10.1 to peer 'theclient-pi-pisrv1@myvpn.net'
  34. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: selected proposal: ESP:AES_CBC_128/HMAC_SHA2_256_128/NO_EXT_SEQ
  35. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: CHILD_SA ikev2-pubkey{3} established with SPIs c11f1f32_i cbaad7d2_o and TS 50.47.109.48/32 === 10.92.10.1/32
  36. Sep 07 19:28:34 pisrv1 vpn[15680]: + theclient-pi-pisrv1@myvpn.net 10.92.10.1/32 == 166.176.187.162 -- 192.168.92.3 == 50.47.109.48/32
  37. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: generating IKE_AUTH response 1 [ IDr CERT AUTH CPRP(ADDR DNS DNS) SA TSi TSr ]
  38. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: splitting IKE message (2176 bytes) into 2 fragments
  39. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: generating IKE_AUTH response 1 [ EF(1/2) ]
  40. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: generating IKE_AUTH response 1 [ EF(2/2) ]
  41. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: sending packet: from 192.168.92.3[4500] to 166.176.187.162[22446] (1248 bytes)
  42. Sep 07 19:28:34 pisrv1 charon-systemd[15426]: sending packet: from 192.168.92.3[4500] to 166.176.187.162[22446] (993 bytes)
  43. Sep 07 19:28:54 pisrv1 charon-systemd[15426]: sending keep alive to 166.176.187.162[22446]
  44. Sep 07 19:29:04 pisrv1 charon-systemd[15426]: sending DPD request
  45. Sep 07 19:29:04 pisrv1 charon-systemd[15426]: generating INFORMATIONAL request 0 [ ]
  46. Sep 07 19:29:04 pisrv1 charon-systemd[15426]: sending packet: from 192.168.92.3[4500] to 166.176.187.162[22446] (57 bytes)
  47. Sep 07 19:29:05 pisrv1 charon-systemd[15426]: received packet: from 166.176.187.162[22446] to 192.168.92.3[4500] (57 bytes)
  48. Sep 07 19:29:05 pisrv1 charon-systemd[15426]: parsed INFORMATIONAL response 0 [ ]
  49. Sep 07 19:29:12 pisrv1 dhcpd[4078]: DHCPREQUEST for 192.168.92.58 from 6c:72:e7:bb:71:1a via eth0
  50. Sep 07 19:29:12 pisrv1 dhcpd[4078]: DHCPACK on 192.168.92.58 to 6c:72:e7:bb:71:1a via eth0
  51. Sep 07 19:29:13 pisrv1 charon-systemd[15426]: received packet: from 166.176.187.162[22446] to 192.168.92.3[4500] (69 bytes)
  52. Sep 07 19:29:13 pisrv1 charon-systemd[15426]: parsed INFORMATIONAL request 2 [ D ]
  53. Sep 07 19:29:13 pisrv1 charon-systemd[15426]: received DELETE for ESP CHILD_SA with SPI cbaad7d2
  54. Sep 07 19:29:13 pisrv1 charon-systemd[15426]: closing CHILD_SA ikev2-pubkey{3} with SPIs c11f1f32_i (0 bytes) cbaad7d2_o (0 bytes) and TS 50.47.109.48/32 === 10.92.10.1/32
  55. Sep 07 19:29:13 pisrv1 charon-systemd[15426]: sending DELETE for ESP CHILD_SA with SPI c11f1f32
  56. Sep 07 19:29:13 pisrv1 charon-systemd[15426]: CHILD_SA closed
  57. Sep 07 19:29:13 pisrv1 vpn[15698]: - theclient-pi-pisrv1@myvpn.net 10.92.10.1/32 == 166.176.187.162 -- 192.168.92.3 == 50.47.109.48/32
  58. Sep 07 19:29:13 theserver charon-systemd[15426]: generating INFORMATIONAL response 2 [ D ]
  59. Sep 07 19:29:13 theserver charon-systemd[15426]: sending packet: from 192.168.92.3[4500] to 166.176.187.162[22446] (69 bytes)
  60. Sep 07 19:29:13 theserver charon-systemd[15426]: received packet: from 166.176.187.162[22446] to 192.168.92.3[4500] (65 bytes)
  61. Sep 07 19:29:13 theserver charon-systemd[15426]: parsed INFORMATIONAL request 3 [ D ]
  62. Sep 07 19:29:13 theserver charon-systemd[15426]: received DELETE for IKE_SA ikev2-pubkey-linux[3]
  63. Sep 07 19:29:13 theserver charon-systemd[15426]: deleting IKE_SA ikev2-pubkey-linux[3] between 192.168.92.3[linux.domain.com]...166.176.187.162[theclient-pi-theserver@myvpn.net]
  64. Sep 07 19:29:13 theserver charon-systemd[15426]: IKE_SA deleted
  65. Sep 07 19:29:13 theserver charon-systemd[15426]: generating INFORMATIONAL response 3 [ ]
  66. Sep 07 19:29:13 theserver charon-systemd[15426]: sending packet: from 192.168.92.3[4500] to 166.176.187.162[22446] (57 bytes)
  67. Sep 07 19:29:13 theserver charon-systemd[15426]: lease 10.92.10.1 by 'theclient-pi-theserver@myvpn.net' went offline
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
Not a member of Pastebin yet?
Sign Up, it unlocks many cool features!
 
Top