Created
February 26, 2018 14:11
-
-
Save martimarkov/1b3c0b96faf106812a8adaddef3ac3b1 to your computer and use it in GitHub Desktop.
VPN config
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
FILE:/var/log/charon_debug.log | |
Mon, 2018-02-26 16:02 00[DMN] Starting IKE charon daemon (strongSwan 5.2.1, Linux 3.16.0-4-amd64, x86_64) | |
Mon, 2018-02-26 16:02 00[LIB] plugin 'aes': loaded successfully | |
Mon, 2018-02-26 16:02 00[LIB] plugin 'sha2': loaded successfully | |
Mon, 2018-02-26 16:02 00[LIB] plugin 'random': loaded successfully | |
Mon, 2018-02-26 16:02 00[LIB] plugin 'nonce': loaded successfully | |
Mon, 2018-02-26 16:02 00[LIB] plugin 'x509': loaded successfully | |
Mon, 2018-02-26 16:02 00[LIB] plugin 'revocation': loaded successfully | |
Mon, 2018-02-26 16:02 00[LIB] plugin 'pubkey': loaded successfully | |
Mon, 2018-02-26 16:02 00[LIB] plugin 'pkcs7': loaded successfully | |
Mon, 2018-02-26 16:02 00[LIB] plugin 'pkcs8': loaded successfully | |
Mon, 2018-02-26 16:02 00[LIB] plugin 'pkcs12': loaded successfully | |
Mon, 2018-02-26 16:02 00[LIB] plugin 'pgp': loaded successfully | |
Mon, 2018-02-26 16:02 00[LIB] plugin 'pem': loaded successfully | |
Mon, 2018-02-26 16:02 00[LIB] plugin 'openssl': loaded successfully | |
Mon, 2018-02-26 16:02 00[LIB] plugin 'hmac': loaded successfully | |
Mon, 2018-02-26 16:02 00[LIB] plugin 'gcm': loaded successfully | |
Mon, 2018-02-26 16:02 00[LIB] plugin 'kernel-netlink': loaded successfully | |
Mon, 2018-02-26 16:02 00[LIB] plugin 'socket-default': loaded successfully | |
Mon, 2018-02-26 16:02 00[LIB] plugin 'farp': loaded successfully | |
Mon, 2018-02-26 16:02 00[LIB] plugin 'stroke': loaded successfully | |
Mon, 2018-02-26 16:02 00[LIB] plugin 'dhcp': loaded successfully | |
Mon, 2018-02-26 16:02 00[LIB] feature PUBKEY:DSA in plugin 'pem' has unmet dependency: PUBKEY:DSA | |
Mon, 2018-02-26 16:02 00[LIB] feature PRIVKEY:DSA in plugin 'pem' has unmet dependency: PRIVKEY:DSA | |
Mon, 2018-02-26 16:02 00[LIB] feature CERT_DECODE:X509_OCSP_REQUEST in plugin 'pem' has unmet dependency: CERT_DECODE:X509_OCSP_REQUEST | |
Mon, 2018-02-26 16:02 00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts' | |
Mon, 2018-02-26 16:02 00[CFG] loaded ca certificate "CN=vpn.scaladi.com" from '/etc/ipsec.d/cacerts/ca.pem' | |
Mon, 2018-02-26 16:02 00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts' | |
Mon, 2018-02-26 16:02 00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts' | |
Mon, 2018-02-26 16:02 00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts' | |
Mon, 2018-02-26 16:02 00[CFG] loading crls from '/etc/ipsec.d/crls' | |
Mon, 2018-02-26 16:02 00[CFG] loading secrets from '/etc/ipsec.secrets' | |
Mon, 2018-02-26 16:02 00[CFG] loading secrets from '/var/lib/strongswan/ipsec.secrets.inc' | |
Mon, 2018-02-26 16:02 00[CFG] loaded RSA private key from '/etc/ipsec.d/private/debian.pem' | |
Mon, 2018-02-26 16:02 00[LIB] loaded plugins: charon aes sha2 random nonce x509 revocation pubkey pkcs7 pkcs8 pkcs12 pgp pem openssl hmac gcm kernel-netlink socket-default farp stroke dhcp | |
Mon, 2018-02-26 16:02 00[LIB] unable to load 3 plugin features (3 due to unmet dependencies) | |
Mon, 2018-02-26 16:02 00[LIB] dropped capabilities, running as uid 0, gid 0 | |
Mon, 2018-02-26 16:02 00[JOB] spawning 16 worker threads | |
Mon, 2018-02-26 16:02 07[LIB] created thread 07 [1488] | |
Mon, 2018-02-26 16:02 08[LIB] created thread 08 [1489] | |
Mon, 2018-02-26 16:02 09[LIB] created thread 09 [1490] | |
Mon, 2018-02-26 16:02 10[LIB] created thread 10 [1491] | |
Mon, 2018-02-26 16:02 11[LIB] created thread 11 [1492] | |
Mon, 2018-02-26 16:02 12[LIB] created thread 12 [1493] | |
Mon, 2018-02-26 16:02 13[LIB] created thread 13 [1494] | |
Mon, 2018-02-26 16:02 06[LIB] created thread 06 [1487] | |
Mon, 2018-02-26 16:02 14[LIB] created thread 14 [1495] | |
Mon, 2018-02-26 16:02 15[LIB] created thread 15 [1496] | |
Mon, 2018-02-26 16:02 16[LIB] created thread 16 [1497] | |
Mon, 2018-02-26 16:02 05[LIB] created thread 05 [1486] | |
Mon, 2018-02-26 16:02 04[LIB] created thread 04 [1485] | |
Mon, 2018-02-26 16:02 03[LIB] created thread 03 [1484] | |
Mon, 2018-02-26 16:02 02[LIB] created thread 02 [1483] | |
Mon, 2018-02-26 16:02 01[LIB] created thread 01 [1482] | |
Mon, 2018-02-26 16:02 11[CFG] received stroke: add connection 'ikev2-pubkey' | |
Mon, 2018-02-26 16:02 11[CFG] conn ikev2-pubkey | |
Mon, 2018-02-26 16:02 11[CFG] left=%any | |
Mon, 2018-02-26 16:02 11[CFG] leftsubnet=0.0.0.0/0 | |
Mon, 2018-02-26 16:02 11[CFG] leftauth=pubkey | |
Mon, 2018-02-26 16:02 11[CFG] [email protected] | |
Mon, 2018-02-26 16:02 11[CFG] leftcert=/etc/ipsec.d/certs/debian.pem | |
Mon, 2018-02-26 16:02 11[CFG] right=%any | |
Mon, 2018-02-26 16:02 11[CFG] rightsourceip=10.0.3.0/24 | |
Mon, 2018-02-26 16:02 11[CFG] rightdns=8.8.8.8 | |
Mon, 2018-02-26 16:02 11[CFG] rightauth=pubkey | |
Mon, 2018-02-26 16:02 11[CFG] ike=aes128gcm16-sha2_256-prfsha256-ecp256! | |
Mon, 2018-02-26 16:02 11[CFG] esp=aes128gcm16-sha2_256-ecp256! | |
Mon, 2018-02-26 16:02 11[CFG] dpddelay=35 | |
Mon, 2018-02-26 16:02 11[CFG] dpdtimeout=150 | |
Mon, 2018-02-26 16:02 11[CFG] dpdaction=1 | |
Mon, 2018-02-26 16:02 11[CFG] mediation=no | |
Mon, 2018-02-26 16:02 11[CFG] keyexchange=ikev2 | |
Mon, 2018-02-26 16:02 11[CFG] left nor right host is our side, assuming left=local | |
Mon, 2018-02-26 16:02 11[CFG] adding virtual IP address pool 10.0.3.0/24 | |
Mon, 2018-02-26 16:02 11[CFG] loaded certificate "CN=vpn.scaladi.com" from '/etc/ipsec.d/certs/debian.pem' | |
Mon, 2018-02-26 16:02 11[CFG] added configuration 'ikev2-pubkey' | |
Mon, 2018-02-26 16:02 15[NET] <1> received packet: from 84.43.92.130[1011] to 93.152.158.13[500] (232 bytes) | |
Mon, 2018-02-26 16:02 15[ENC] <1> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ] | |
Mon, 2018-02-26 16:02 15[CFG] <1> looking for an ike config for 93.152.158.13...84.43.92.130 | |
Mon, 2018-02-26 16:02 15[CFG] <1> candidate: %any...%any, prio 28 | |
Mon, 2018-02-26 16:02 15[CFG] <1> found matching ike config: %any...%any with prio 28 | |
Mon, 2018-02-26 16:02 15[IKE] <1> 84.43.92.130 is initiating an IKE_SA | |
Mon, 2018-02-26 16:02 15[IKE] <1> IKE_SA (unnamed)[1] state change: CREATED => CONNECTING | |
Mon, 2018-02-26 16:02 15[CFG] <1> selecting proposal: | |
Mon, 2018-02-26 16:02 15[CFG] <1> proposal matches | |
Mon, 2018-02-26 16:02 15[CFG] <1> received proposals: IKE:AES_GCM_16_128/PRF_HMAC_SHA2_256/ECP_256 | |
Mon, 2018-02-26 16:02 15[CFG] <1> configured proposals: IKE:AES_GCM_16_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256 | |
Mon, 2018-02-26 16:02 15[CFG] <1> selected proposal: IKE:AES_GCM_16_128/PRF_HMAC_SHA2_256/ECP_256 | |
Mon, 2018-02-26 16:02 15[IKE] <1> remote host is behind NAT | |
Mon, 2018-02-26 16:02 15[IKE] <1> sending cert request for "CN=vpn.scaladi.com" | |
Mon, 2018-02-26 16:02 15[ENC] <1> generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(MULT_AUTH) ] | |
Mon, 2018-02-26 16:02 15[NET] <1> sending packet: from 93.152.158.13[500] to 84.43.92.130[1011] (273 bytes) | |
Mon, 2018-02-26 16:02 04[NET] <1> received packet: from 93.152.159.55[62056] to 93.152.158.13[500] (232 bytes) | |
Mon, 2018-02-26 16:02 04[ENC] <1> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ] | |
Mon, 2018-02-26 16:02 04[IKE] <1> received retransmit of request with ID 0, retransmitting response | |
Mon, 2018-02-26 16:02 04[NET] <1> sending packet: from 93.152.158.13[500] to 93.152.159.55[62056] (273 bytes) | |
Mon, 2018-02-26 16:02 02[NET] <1> received packet: from 93.152.159.55[62058] to 93.152.158.13[500] (232 bytes) | |
Mon, 2018-02-26 16:02 02[ENC] <1> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ] | |
Mon, 2018-02-26 16:02 02[IKE] <1> received retransmit of request with ID 0, retransmitting response | |
Mon, 2018-02-26 16:02 02[NET] <1> sending packet: from 93.152.158.13[500] to 93.152.159.55[62058] (273 bytes) | |
Mon, 2018-02-26 16:02 01[NET] <1> received packet: from 93.152.159.55[62060] to 93.152.158.13[500] (232 bytes) | |
Mon, 2018-02-26 16:02 01[ENC] <1> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ] | |
Mon, 2018-02-26 16:02 01[IKE] <1> received retransmit of request with ID 0, retransmitting response | |
Mon, 2018-02-26 16:02 01[NET] <1> sending packet: from 93.152.158.13[500] to 93.152.159.55[62060] (273 bytes) | |
Mon, 2018-02-26 16:02 11[NET] <1> received packet: from 93.152.159.55[62062] to 93.152.158.13[500] (232 bytes) | |
Mon, 2018-02-26 16:02 11[ENC] <1> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ] | |
Mon, 2018-02-26 16:02 11[IKE] <1> received retransmit of request with ID 0, retransmitting response | |
Mon, 2018-02-26 16:02 11[NET] <1> sending packet: from 93.152.158.13[500] to 93.152.159.55[62062] (273 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <1> received packet: from 93.152.159.55[62065] to 93.152.158.13[500] (232 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <1> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ] | |
Mon, 2018-02-26 16:02 12[IKE] <1> received retransmit of request with ID 0, retransmitting response | |
Mon, 2018-02-26 16:02 12[NET] <1> sending packet: from 93.152.158.13[500] to 93.152.159.55[62065] (273 bytes) | |
Mon, 2018-02-26 16:02 13[NET] <1> received packet: from 93.152.159.55[62066] to 93.152.158.13[500] (232 bytes) | |
Mon, 2018-02-26 16:02 13[ENC] <1> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ] | |
Mon, 2018-02-26 16:02 13[IKE] <1> received retransmit of request with ID 0, retransmitting response | |
Mon, 2018-02-26 16:02 13[NET] <1> sending packet: from 93.152.158.13[500] to 93.152.159.55[62066] (273 bytes) | |
Mon, 2018-02-26 16:02 06[NET] <1> received packet: from 93.152.159.55[62068] to 93.152.158.13[500] (232 bytes) | |
Mon, 2018-02-26 16:02 06[ENC] <1> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ] | |
Mon, 2018-02-26 16:02 06[IKE] <1> received retransmit of request with ID 0, retransmitting response | |
Mon, 2018-02-26 16:02 06[NET] <1> sending packet: from 93.152.158.13[500] to 93.152.159.55[62068] (273 bytes) | |
Mon, 2018-02-26 16:02 14[NET] <1> received packet: from 93.152.159.55[62070] to 93.152.158.13[500] (232 bytes) | |
Mon, 2018-02-26 16:02 14[ENC] <1> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ] | |
Mon, 2018-02-26 16:02 14[IKE] <1> received retransmit of request with ID 0, retransmitting response | |
Mon, 2018-02-26 16:02 14[NET] <1> sending packet: from 93.152.158.13[500] to 93.152.159.55[62070] (273 bytes) | |
Mon, 2018-02-26 16:02 16[NET] <1> received packet: from 93.152.159.55[62072] to 93.152.158.13[500] (232 bytes) | |
Mon, 2018-02-26 16:02 16[ENC] <1> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ] | |
Mon, 2018-02-26 16:02 16[IKE] <1> received retransmit of request with ID 0, retransmitting response | |
Mon, 2018-02-26 16:02 16[NET] <1> sending packet: from 93.152.158.13[500] to 93.152.159.55[62072] (273 bytes) | |
Mon, 2018-02-26 16:02 05[NET] <1> received packet: from 93.152.159.55[62074] to 93.152.158.13[500] (232 bytes) | |
Mon, 2018-02-26 16:02 05[ENC] <1> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ] | |
Mon, 2018-02-26 16:02 05[IKE] <1> received retransmit of request with ID 0, retransmitting response | |
Mon, 2018-02-26 16:02 05[NET] <1> sending packet: from 93.152.158.13[500] to 93.152.159.55[62074] (273 bytes) | |
Mon, 2018-02-26 16:02 15[NET] <1> received packet: from 93.152.159.55[62076] to 93.152.158.13[500] (232 bytes) | |
Mon, 2018-02-26 16:02 15[ENC] <1> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ] | |
Mon, 2018-02-26 16:02 15[IKE] <1> received retransmit of request with ID 0, retransmitting response | |
Mon, 2018-02-26 16:02 15[NET] <1> sending packet: from 93.152.158.13[500] to 93.152.159.55[62076] (273 bytes) | |
Mon, 2018-02-26 16:02 02[NET] <1> received packet: from 84.43.92.130[64916] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 02[ENC] <1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 02[ENC] <1> received fragment #1 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 02[NET] <1> received packet: from 84.43.92.130[64916] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 02[ENC] <1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 02[ENC] <1> received fragment #2 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 02[NET] <1> received packet: from 84.43.92.130[64916] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 02[ENC] <1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 02[ENC] <1> received fragment #3 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 02[NET] <1> received packet: from 84.43.92.130[64916] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 02[ENC] <1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 02[ENC] <1> received fragment #4 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 02[NET] <1> received packet: from 84.43.92.130[64916] to 93.152.158.13[4500] (284 bytes) | |
Mon, 2018-02-26 16:02 02[ENC] <1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 02[ENC] <1> received fragment #5 of 5, reassembling fragmented IKE message | |
Mon, 2018-02-26 16:02 02[ENC] <1> unknown attribute type (25) | |
Mon, 2018-02-26 16:02 02[ENC] <1> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr CERTREQ AUTH CERT CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6 (25)) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ] | |
Mon, 2018-02-26 16:02 02[IKE] <1> received cert request for "CN=vpn.scaladi.com" | |
Mon, 2018-02-26 16:02 02[IKE] <1> received end entity cert "CN=marti-macbook-15" | |
Mon, 2018-02-26 16:02 02[CFG] <1> looking for peer configs matching 93.152.158.13[vpn.scaladi.com]...84.43.92.130[marti-macbook-15] | |
Mon, 2018-02-26 16:02 02[CFG] <1> candidate "ikev2-pubkey", match: 20/1/28 (me/other/ike) | |
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> selected peer config 'ikev2-pubkey' | |
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> using certificate "CN=marti-macbook-15" | |
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> certificate "CN=marti-macbook-15" key: 4096 bit RSA | |
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> using trusted ca certificate "CN=vpn.scaladi.com" | |
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> checking certificate status of "CN=marti-macbook-15" | |
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> ocsp check skipped, no ocsp found | |
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> certificate status is not available | |
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> certificate "CN=vpn.scaladi.com" key: 4096 bit RSA | |
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> reached self-signed root ca with a path length of 0 | |
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> authentication of 'marti-macbook-15' with RSA signature successful | |
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> processing INTERNAL_IP4_ADDRESS attribute | |
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> processing INTERNAL_IP4_DHCP attribute | |
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> processing INTERNAL_IP4_DNS attribute | |
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> processing INTERNAL_IP4_NETMASK attribute | |
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> processing INTERNAL_IP6_ADDRESS attribute | |
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> processing INTERNAL_IP6_DHCP attribute | |
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> processing INTERNAL_IP6_DNS attribute | |
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> processing (25) attribute | |
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding | |
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> peer supports MOBIKE | |
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> authentication of 'vpn.scaladi.com' (myself) with RSA signature successful | |
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> IKE_SA ikev2-pubkey[1] established between 93.152.158.13[vpn.scaladi.com]...84.43.92.130[marti-macbook-15] | |
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> IKE_SA ikev2-pubkey[1] state change: CONNECTING => ESTABLISHED | |
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> sending end entity cert "CN=vpn.scaladi.com" | |
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> peer requested virtual IP %any | |
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> assigning new lease to 'marti-macbook-15' | |
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> assigning virtual IP 10.0.3.1 to peer 'marti-macbook-15' | |
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> peer requested virtual IP %any6 | |
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> no virtual IP found for %any6 requested by 'marti-macbook-15' | |
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> building INTERNAL_IP4_DNS attribute | |
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> looking for a child config for 0.0.0.0/0 ::/0 === 0.0.0.0/0 ::/0 | |
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> proposing traffic selectors for us: | |
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> 0.0.0.0/0 | |
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> proposing traffic selectors for other: | |
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> 10.0.3.1/32 | |
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> candidate "ikev2-pubkey" with prio 10+2 | |
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> found matching child config "ikev2-pubkey" with prio 12 | |
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> selecting proposal: | |
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> proposal matches | |
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> received proposals: ESP:AES_GCM_16_128/NO_EXT_SEQ | |
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> configured proposals: ESP:AES_GCM_16_128/ECP_256/NO_EXT_SEQ | |
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> selected proposal: ESP:AES_GCM_16_128/NO_EXT_SEQ | |
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> selecting traffic selectors for us: | |
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> config: 0.0.0.0/0, received: 0.0.0.0/0 => match: 0.0.0.0/0 | |
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> config: 0.0.0.0/0, received: ::/0 => no match | |
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> selecting traffic selectors for other: | |
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> config: 10.0.3.1/32, received: 0.0.0.0/0 => match: 10.0.3.1/32 | |
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> config: 10.0.3.1/32, received: ::/0 => no match | |
Mon, 2018-02-26 16:02 02[CHD] <ikev2-pubkey|1> using AES_GCM_16 for encryption | |
Mon, 2018-02-26 16:02 02[CHD] <ikev2-pubkey|1> adding inbound ESP SA | |
Mon, 2018-02-26 16:02 02[CHD] <ikev2-pubkey|1> SPI 0xc94fcf9a, src 84.43.92.130 dst 93.152.158.13 | |
Mon, 2018-02-26 16:02 02[CHD] <ikev2-pubkey|1> adding outbound ESP SA | |
Mon, 2018-02-26 16:02 02[CHD] <ikev2-pubkey|1> SPI 0x07d1c1a1, src 93.152.158.13 dst 84.43.92.130 | |
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> CHILD_SA ikev2-pubkey{1} established with SPIs c94fcf9a_i 07d1c1a1_o and TS 0.0.0.0/0 === 10.0.3.1/32 | |
Mon, 2018-02-26 16:02 02[ENC] <ikev2-pubkey|1> generating IKE_AUTH response 1 [ IDr CERT AUTH CPRP(ADDR DNS) SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) ] | |
Mon, 2018-02-26 16:02 02[ENC] <ikev2-pubkey|1> splitting IKE message with length of 2033 bytes into 5 fragments | |
Mon, 2018-02-26 16:02 02[ENC] <ikev2-pubkey|1> payload ENCRYPTED_FRAGMENT has no ordering rule in IKE_AUTH response | |
Mon, 2018-02-26 16:02 02[ENC] <ikev2-pubkey|1> generating IKE_AUTH response 1 [ EF ] | |
Mon, 2018-02-26 16:02 02[ENC] <ikev2-pubkey|1> payload ENCRYPTED_FRAGMENT has no ordering rule in IKE_AUTH response | |
Mon, 2018-02-26 16:02 02[ENC] <ikev2-pubkey|1> generating IKE_AUTH response 1 [ EF ] | |
Mon, 2018-02-26 16:02 02[ENC] <ikev2-pubkey|1> payload ENCRYPTED_FRAGMENT has no ordering rule in IKE_AUTH response | |
Mon, 2018-02-26 16:02 02[ENC] <ikev2-pubkey|1> generating IKE_AUTH response 1 [ EF ] | |
Mon, 2018-02-26 16:02 02[ENC] <ikev2-pubkey|1> payload ENCRYPTED_FRAGMENT has no ordering rule in IKE_AUTH response | |
Mon, 2018-02-26 16:02 02[ENC] <ikev2-pubkey|1> generating IKE_AUTH response 1 [ EF ] | |
Mon, 2018-02-26 16:02 02[ENC] <ikev2-pubkey|1> payload ENCRYPTED_FRAGMENT has no ordering rule in IKE_AUTH response | |
Mon, 2018-02-26 16:02 02[ENC] <ikev2-pubkey|1> generating IKE_AUTH response 1 [ EF ] | |
Mon, 2018-02-26 16:02 02[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 84.43.92.130[64916] (544 bytes) | |
Mon, 2018-02-26 16:02 02[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 84.43.92.130[64916] (544 bytes) | |
Mon, 2018-02-26 16:02 02[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 84.43.92.130[64916] (544 bytes) | |
Mon, 2018-02-26 16:02 02[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 84.43.92.130[64916] (544 bytes) | |
Mon, 2018-02-26 16:02 02[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 84.43.92.130[64916] (105 bytes) | |
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62495] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> received fragment #1 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62500] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> received fragment #2 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62500] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> received fragment #3 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62500] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> received fragment #4 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62500] to 93.152.158.13[4500] (284 bytes) | |
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> received fragment #5 of 5, reassembling fragmented IKE message | |
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> unknown attribute type (25) | |
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr CERTREQ AUTH CERT CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6 (25)) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ] | |
Mon, 2018-02-26 16:02 06[IKE] <ikev2-pubkey|1> received retransmit of request with ID 1, retransmitting response | |
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62500] (544 bytes) | |
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62500] (544 bytes) | |
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62500] (544 bytes) | |
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62500] (544 bytes) | |
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62500] (105 bytes) | |
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62502] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> received fragment #1 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62502] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> received fragment #2 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62502] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> received fragment #3 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62502] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> received fragment #4 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62497] to 93.152.158.13[4500] (284 bytes) | |
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> received fragment #5 of 5, reassembling fragmented IKE message | |
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> unknown attribute type (25) | |
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr CERTREQ AUTH CERT CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6 (25)) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ] | |
Mon, 2018-02-26 16:02 01[IKE] <ikev2-pubkey|1> received retransmit of request with ID 1, retransmitting response | |
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62497] (544 bytes) | |
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62497] (544 bytes) | |
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62497] (544 bytes) | |
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62497] (544 bytes) | |
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62497] (105 bytes) | |
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62502] to 93.152.158.13[4500] (284 bytes) | |
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> received fragment #5 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62504] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> received fragment #1 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62504] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> received fragment #2 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62504] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> received fragment #3 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62504] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> received fragment #4 of 5, reassembling fragmented IKE message | |
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> unknown attribute type (25) | |
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr CERTREQ AUTH CERT CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6 (25)) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ] | |
Mon, 2018-02-26 16:02 01[IKE] <ikev2-pubkey|1> received retransmit of request with ID 1, retransmitting response | |
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62504] (544 bytes) | |
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62504] (544 bytes) | |
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62504] (544 bytes) | |
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62504] (544 bytes) | |
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62504] (105 bytes) | |
Mon, 2018-02-26 16:02 13[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62500] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> received fragment #1 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 13[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62505] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> received duplicate fragment #1 | |
Mon, 2018-02-26 16:02 13[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62505] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> received fragment #2 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 13[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62505] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> received fragment #3 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 13[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62505] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> received fragment #4 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 13[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62505] to 93.152.158.13[4500] (284 bytes) | |
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> received fragment #5 of 5, reassembling fragmented IKE message | |
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> unknown attribute type (25) | |
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr CERTREQ AUTH CERT CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6 (25)) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ] | |
Mon, 2018-02-26 16:02 13[IKE] <ikev2-pubkey|1> received retransmit of request with ID 1, retransmitting response | |
Mon, 2018-02-26 16:02 13[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62505] (544 bytes) | |
Mon, 2018-02-26 16:02 13[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62505] (544 bytes) | |
Mon, 2018-02-26 16:02 13[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62505] (544 bytes) | |
Mon, 2018-02-26 16:02 13[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62505] (544 bytes) | |
Mon, 2018-02-26 16:02 13[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62505] (105 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62497] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #3 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62507] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #1 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62507] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #2 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62507] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received duplicate fragment #3 | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62507] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #4 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62507] to 93.152.158.13[4500] (284 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #5 of 5, reassembling fragmented IKE message | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> unknown attribute type (25) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr CERTREQ AUTH CERT CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6 (25)) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ] | |
Mon, 2018-02-26 16:02 12[IKE] <ikev2-pubkey|1> received retransmit of request with ID 1, retransmitting response | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62507] (544 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62507] (544 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62507] (544 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62507] (544 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62507] (105 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62509] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #1 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62509] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #2 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62509] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #3 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62509] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #4 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62509] to 93.152.158.13[4500] (284 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #5 of 5, reassembling fragmented IKE message | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> unknown attribute type (25) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr CERTREQ AUTH CERT CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6 (25)) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ] | |
Mon, 2018-02-26 16:02 12[IKE] <ikev2-pubkey|1> received retransmit of request with ID 1, retransmitting response | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62509] (544 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62509] (544 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62509] (544 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62509] (544 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62509] (105 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62511] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #1 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62511] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #2 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62511] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #3 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62511] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #4 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62511] to 93.152.158.13[4500] (284 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #5 of 5, reassembling fragmented IKE message | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> unknown attribute type (25) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr CERTREQ AUTH CERT CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6 (25)) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ] | |
Mon, 2018-02-26 16:02 12[IKE] <ikev2-pubkey|1> received retransmit of request with ID 1, retransmitting response | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62511] (544 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62511] (544 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62511] (544 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62511] (544 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62511] (105 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62514] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #1 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62514] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #2 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62514] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #3 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62514] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #4 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62514] to 93.152.158.13[4500] (284 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #5 of 5, reassembling fragmented IKE message | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> unknown attribute type (25) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr CERTREQ AUTH CERT CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6 (25)) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ] | |
Mon, 2018-02-26 16:02 12[IKE] <ikev2-pubkey|1> received retransmit of request with ID 1, retransmitting response | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62514] (544 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62514] (544 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62514] (544 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62514] (544 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62514] (105 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62516] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #1 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62516] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #2 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62516] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #3 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62516] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #4 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62516] to 93.152.158.13[4500] (284 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #5 of 5, reassembling fragmented IKE message | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> unknown attribute type (25) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr CERTREQ AUTH CERT CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6 (25)) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ] | |
Mon, 2018-02-26 16:02 12[IKE] <ikev2-pubkey|1> received retransmit of request with ID 1, retransmitting response | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62516] (544 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62516] (544 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62516] (544 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62516] (544 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62516] (105 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62517] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #1 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62517] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #2 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62517] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #3 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62517] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #4 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62517] to 93.152.158.13[4500] (284 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #5 of 5, reassembling fragmented IKE message | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> unknown attribute type (25) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr CERTREQ AUTH CERT CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6 (25)) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ] | |
Mon, 2018-02-26 16:02 12[IKE] <ikev2-pubkey|1> received retransmit of request with ID 1, retransmitting response | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62517] (544 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62517] (544 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62517] (544 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62517] (544 bytes) | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62517] (105 bytes) | |
Mon, 2018-02-26 16:02 11[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62497] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 11[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 11[ENC] <ikev2-pubkey|1> received fragment #4 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 11[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62519] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 11[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 11[ENC] <ikev2-pubkey|1> received duplicate fragment #4 | |
Mon, 2018-02-26 16:02 11[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62519] to 93.152.158.13[4500] (284 bytes) | |
Mon, 2018-02-26 16:02 11[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 11[ENC] <ikev2-pubkey|1> received fragment #5 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 14[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62495] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 14[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 14[ENC] <ikev2-pubkey|1> received fragment #2 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 15[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62495] to 93.152.158.13[4500] (284 bytes) | |
Mon, 2018-02-26 16:02 15[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 15[ENC] <ikev2-pubkey|1> received duplicate fragment #5 | |
Mon, 2018-02-26 16:02 05[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62495] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 05[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 05[ENC] <ikev2-pubkey|1> received duplicate fragment #4 | |
Mon, 2018-02-26 16:02 03[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62497] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 03[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 03[ENC] <ikev2-pubkey|1> received duplicate fragment #2 | |
Mon, 2018-02-26 16:02 04[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62497] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 04[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 04[ENC] <ikev2-pubkey|1> received fragment #1 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 16[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62495] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 16[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 16[ENC] <ikev2-pubkey|1> received fragment #3 of 5, reassembling fragmented IKE message | |
Mon, 2018-02-26 16:02 16[ENC] <ikev2-pubkey|1> unknown attribute type (25) | |
Mon, 2018-02-26 16:02 16[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr CERTREQ AUTH CERT CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6 (25)) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ] | |
Mon, 2018-02-26 16:02 16[IKE] <ikev2-pubkey|1> received retransmit of request with ID 1, retransmitting response | |
Mon, 2018-02-26 16:02 16[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62495] (544 bytes) | |
Mon, 2018-02-26 16:02 16[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62495] (544 bytes) | |
Mon, 2018-02-26 16:02 16[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62495] (544 bytes) | |
Mon, 2018-02-26 16:02 16[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62495] (544 bytes) | |
Mon, 2018-02-26 16:02 16[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62495] (105 bytes) | |
Mon, 2018-02-26 16:02 13[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62519] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> received fragment #1 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62504] to 93.152.158.13[4500] (284 bytes) | |
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> received fragment #5 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62519] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> received fragment #2 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 02[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62519] to 93.152.158.13[4500] (540 bytes) | |
Mon, 2018-02-26 16:02 02[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ] | |
Mon, 2018-02-26 16:02 02[ENC] <ikev2-pubkey|1> received fragment #3 of 5, waiting for complete IKE message | |
Mon, 2018-02-26 16:02 04[IKE] <ikev2-pubkey|1> sending DPD request | |
Mon, 2018-02-26 16:02 04[IKE] <ikev2-pubkey|1> queueing IKE_DPD task | |
Mon, 2018-02-26 16:02 04[IKE] <ikev2-pubkey|1> activating new tasks | |
Mon, 2018-02-26 16:02 04[IKE] <ikev2-pubkey|1> activating IKE_DPD task | |
Mon, 2018-02-26 16:02 04[ENC] <ikev2-pubkey|1> generating INFORMATIONAL request 0 [ ] | |
Mon, 2018-02-26 16:02 04[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 84.43.92.130[64916] (57 bytes) | |
Mon, 2018-02-26 16:02 16[NET] <ikev2-pubkey|1> received packet: from 84.43.92.130[64916] to 93.152.158.13[4500] (64 bytes) | |
Mon, 2018-02-26 16:02 16[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL response 0 [ ] | |
Mon, 2018-02-26 16:02 16[IKE] <ikev2-pubkey|1> activating new tasks | |
Mon, 2018-02-26 16:02 16[IKE] <ikev2-pubkey|1> nothing to initiate | |
Mon, 2018-02-26 16:02 13[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62495] to 93.152.158.13[4500] (64 bytes) | |
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL response 0 [ ] | |
Mon, 2018-02-26 16:02 13[IKE] <ikev2-pubkey|1> received message ID 0, expected 1. Ignored | |
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62497] to 93.152.158.13[4500] (64 bytes) | |
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL response 0 [ ] | |
Mon, 2018-02-26 16:02 06[IKE] <ikev2-pubkey|1> received message ID 0, expected 1. Ignored | |
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62500] to 93.152.158.13[4500] (64 bytes) | |
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL response 0 [ ] | |
Mon, 2018-02-26 16:02 01[IKE] <ikev2-pubkey|1> received message ID 0, expected 1. Ignored | |
Mon, 2018-02-26 16:02 02[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62502] to 93.152.158.13[4500] (64 bytes) | |
Mon, 2018-02-26 16:02 02[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL response 0 [ ] | |
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> received message ID 0, expected 1. Ignored | |
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62504] to 93.152.158.13[4500] (64 bytes) | |
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL response 0 [ ] | |
Mon, 2018-02-26 16:02 12[IKE] <ikev2-pubkey|1> received message ID 0, expected 1. Ignored | |
Mon, 2018-02-26 16:02 11[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62505] to 93.152.158.13[4500] (64 bytes) | |
Mon, 2018-02-26 16:02 11[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL response 0 [ ] | |
Mon, 2018-02-26 16:02 11[IKE] <ikev2-pubkey|1> received message ID 0, expected 1. Ignored | |
Mon, 2018-02-26 16:02 14[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62507] to 93.152.158.13[4500] (64 bytes) | |
Mon, 2018-02-26 16:02 14[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL response 0 [ ] | |
Mon, 2018-02-26 16:02 14[IKE] <ikev2-pubkey|1> received message ID 0, expected 1. Ignored | |
Mon, 2018-02-26 16:02 15[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62509] to 93.152.158.13[4500] (64 bytes) | |
Mon, 2018-02-26 16:02 15[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL response 0 [ ] | |
Mon, 2018-02-26 16:02 15[IKE] <ikev2-pubkey|1> received message ID 0, expected 1. Ignored | |
Mon, 2018-02-26 16:02 05[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62511] to 93.152.158.13[4500] (64 bytes) | |
Mon, 2018-02-26 16:02 05[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL response 0 [ ] | |
Mon, 2018-02-26 16:02 05[IKE] <ikev2-pubkey|1> received message ID 0, expected 1. Ignored | |
Mon, 2018-02-26 16:02 03[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62514] to 93.152.158.13[4500] (64 bytes) | |
Mon, 2018-02-26 16:02 03[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL response 0 [ ] | |
Mon, 2018-02-26 16:02 03[IKE] <ikev2-pubkey|1> received message ID 0, expected 1. Ignored | |
Mon, 2018-02-26 16:02 04[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62516] to 93.152.158.13[4500] (64 bytes) | |
Mon, 2018-02-26 16:02 04[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL response 0 [ ] | |
Mon, 2018-02-26 16:02 04[IKE] <ikev2-pubkey|1> received message ID 0, expected 1. Ignored | |
Mon, 2018-02-26 16:02 16[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62517] to 93.152.158.13[4500] (64 bytes) | |
Mon, 2018-02-26 16:02 16[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL response 0 [ ] | |
Mon, 2018-02-26 16:02 16[IKE] <ikev2-pubkey|1> received message ID 0, expected 1. Ignored | |
Mon, 2018-02-26 16:02 13[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62519] to 93.152.158.13[4500] (64 bytes) | |
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL response 0 [ ] | |
Mon, 2018-02-26 16:02 13[IKE] <ikev2-pubkey|1> received message ID 0, expected 1. Ignored | |
Mon, 2018-02-26 16:03 04[NET] <ikev2-pubkey|1> received packet: from 84.43.92.130[64916] to 93.152.158.13[4500] (72 bytes) | |
Mon, 2018-02-26 16:03 04[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL request 2 [ D ] | |
Mon, 2018-02-26 16:03 04[IKE] <ikev2-pubkey|1> received DELETE for IKE_SA ikev2-pubkey[1] | |
Mon, 2018-02-26 16:03 04[IKE] <ikev2-pubkey|1> deleting IKE_SA ikev2-pubkey[1] between 93.152.158.13[vpn.scaladi.com]...84.43.92.130[marti-macbook-15] | |
Mon, 2018-02-26 16:03 04[IKE] <ikev2-pubkey|1> IKE_SA ikev2-pubkey[1] state change: ESTABLISHED => DELETING | |
Mon, 2018-02-26 16:03 04[IKE] <ikev2-pubkey|1> IKE_SA deleted | |
Mon, 2018-02-26 16:03 04[ENC] <ikev2-pubkey|1> generating INFORMATIONAL response 2 [ ] | |
Mon, 2018-02-26 16:03 04[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 84.43.92.130[64916] (57 bytes) | |
Mon, 2018-02-26 16:03 04[IKE] <ikev2-pubkey|1> IKE_SA ikev2-pubkey[1] state change: DELETING => DESTROYING | |
Mon, 2018-02-26 16:03 04[CFG] <ikev2-pubkey|1> lease 10.0.3.1 by 'marti-macbook-15' went offline |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Martis-FF-MacBook-Pro:~ marti$ ifconfig | |
lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384 | |
options=1203<RXCSUM,TXCSUM,TXSTATUS,SW_TIMESTAMP> | |
inet 127.0.0.1 netmask 0xff000000 | |
inet6 ::1 prefixlen 128 | |
inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1 | |
nd6 options=201<PERFORMNUD,DAD> | |
gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280 | |
stf0: flags=0<> mtu 1280 | |
XHC0: flags=0<> mtu 0 | |
XHC20: flags=0<> mtu 0 | |
en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 | |
ether 8c:85:90:06:b9:f4 | |
inet6 fe80::404:73b1:b87e:160a%en0 prefixlen 64 secured scopeid 0x6 | |
inet 192.168.11.83 netmask 0xfffffe00 broadcast 192.168.11.255 | |
nd6 options=201<PERFORMNUD,DAD> | |
media: autoselect | |
status: active | |
p2p0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 2304 | |
ether 0e:85:90:06:b9:f4 | |
media: autoselect | |
status: inactive | |
awdl0: flags=8943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1484 | |
ether 9a:fe:2a:c6:27:be | |
inet6 fe80::98fe:2aff:fec6:27be%awdl0 prefixlen 64 scopeid 0x8 | |
nd6 options=201<PERFORMNUD,DAD> | |
media: autoselect | |
status: active | |
en2: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500 | |
options=60<TSO4,TSO6> | |
ether 56:00:08:d0:03:01 | |
media: autoselect <full-duplex> | |
status: inactive | |
en1: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500 | |
options=60<TSO4,TSO6> | |
ether 56:00:08:d0:03:00 | |
media: autoselect <full-duplex> | |
status: inactive | |
bridge0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 | |
options=63<RXCSUM,TXCSUM,TSO4,TSO6> | |
ether 56:00:08:d0:03:00 | |
Configuration: | |
id 0:0:0:0:0:0 priority 0 hellotime 0 fwddelay 0 | |
maxage 0 holdcnt 0 proto stp maxaddr 100 timeout 1200 | |
root id 0:0:0:0:0:0 priority 0 ifcost 0 port 0 | |
ipfilter disabled flags 0x2 | |
member: en1 flags=3<LEARNING,DISCOVER> | |
ifmaxaddr 0 port 10 priority 0 path cost 0 | |
member: en2 flags=3<LEARNING,DISCOVER> | |
ifmaxaddr 0 port 9 priority 0 path cost 0 | |
nd6 options=201<PERFORMNUD,DAD> | |
media: <unknown type> | |
status: inactive | |
utun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 2000 | |
inet6 fe80::bbda:1a30:9c37:c3fe%utun0 prefixlen 64 scopeid 0xc | |
nd6 options=201<PERFORMNUD,DAD> | |
utun1: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380 | |
inet6 fe80::6157:a184:b5be:bf0b%utun1 prefixlen 64 scopeid 0xd | |
inet6 fd60:51cd:af20:f438:6157:a184:b5be:bf0b prefixlen 64 | |
nd6 options=201<PERFORMNUD,DAD> | |
utun2: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380 | |
inet6 fe80::8f5d:42c6:eb75:5197%utun2 prefixlen 64 scopeid 0x10 | |
nd6 options=201<PERFORMNUD,DAD> | |
ipsec0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1400 | |
inet 10.0.3.1 --> 10.0.3.1 netmask 0xff000000 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default | |
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 | |
inet 127.0.0.1/8 scope host lo | |
valid_lft forever preferred_lft forever | |
inet6 ::1/128 scope host | |
valid_lft forever preferred_lft forever | |
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP group default qlen 1000 | |
link/ether 08:00:27:3a:9d:24 brd ff:ff:ff:ff:ff:ff | |
inet 93.152.158.13/24 brd 93.152.158.255 scope global eth0 | |
valid_lft forever preferred_lft forever | |
inet6 fe80::a00:27ff:fe3a:9d24/64 scope link tentative dadfailed | |
valid_lft forever preferred_lft forever | |
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP group default qlen 1000 | |
link/ether 08:00:27:38:fc:19 brd ff:ff:ff:ff:ff:ff | |
inet 192.168.1.171/24 brd 192.168.1.255 scope global eth1 | |
valid_lft forever preferred_lft forever | |
inet6 fe80::a00:27ff:fe38:fc19/64 scope link | |
valid_lft forever preferred_lft forever |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
default via 93.152.158.1 dev eth0 | |
93.152.158.0/24 dev eth0 proto kernel scope link src 93.152.158.13 | |
192.168.1.0/24 dev eth1 proto kernel scope link src 192.168.1.171 | |
broadcast 93.152.158.0 dev eth0 table local proto kernel scope link src 93.152.158.13 | |
local 93.152.158.13 dev eth0 table local proto kernel scope host src 93.152.158.13 | |
broadcast 93.152.158.255 dev eth0 table local proto kernel scope link src 93.152.158.13 | |
broadcast 127.0.0.0 dev lo table local proto kernel scope link src 127.0.0.1 | |
local 127.0.0.0/8 dev lo table local proto kernel scope host src 127.0.0.1 | |
local 127.0.0.1 dev lo table local proto kernel scope host src 127.0.0.1 | |
broadcast 127.255.255.255 dev lo table local proto kernel scope link src 127.0.0.1 | |
broadcast 192.168.1.0 dev eth1 table local proto kernel scope link src 192.168.1.171 | |
local 192.168.1.171 dev eth1 table local proto kernel scope host src 192.168.1.171 | |
broadcast 192.168.1.255 dev eth1 table local proto kernel scope link src 192.168.1.171 | |
unreachable default dev lo table unspec proto kernel metric 4294967295 error -101 | |
local ::1 dev lo proto kernel metric 256 | |
fe80::/64 dev eth0 proto kernel metric 256 | |
fe80::/64 dev eth1 proto kernel metric 256 | |
default via fe80::ea37:7aff:fef2:1327 dev eth1 proto ra metric 1024 expires 1419sec hoplimit 64 | |
unreachable default dev lo table unspec proto kernel metric 4294967295 error -101 | |
local ::1 dev lo table local proto none metric 0 | |
local fe80::a00:27ff:fe38:fc19 dev lo table local proto none metric 0 | |
ff00::/8 dev eth0 table local metric 256 | |
ff00::/8 dev eth1 table local metric 256 | |
unreachable default dev lo table unspec proto kernel metric 4294967295 error -101 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
src 10.0.3.1/32 dst 93.152.158.13/32 | |
dir fwd priority 2819 ptype main | |
tmpl src 84.43.92.130 dst 93.152.158.13 | |
proto esp reqid 1 mode tunnel | |
src 10.0.3.1/32 dst 93.152.158.13/32 | |
dir in priority 2819 ptype main | |
tmpl src 84.43.92.130 dst 93.152.158.13 | |
proto esp reqid 1 mode tunnel | |
src 93.152.158.13/32 dst 10.0.3.1/32 | |
dir out priority 2819 ptype main | |
tmpl src 93.152.158.13 dst 84.43.92.130 | |
proto esp reqid 1 mode tunnel | |
src 0.0.0.0/0 dst 0.0.0.0/0 | |
socket in priority 0 ptype main | |
src 0.0.0.0/0 dst 0.0.0.0/0 | |
socket out priority 0 ptype main | |
src 0.0.0.0/0 dst 0.0.0.0/0 | |
socket in priority 0 ptype main | |
src 0.0.0.0/0 dst 0.0.0.0/0 | |
socket out priority 0 ptype main | |
src ::/0 dst ::/0 | |
socket in priority 0 ptype main | |
src ::/0 dst ::/0 | |
socket out priority 0 ptype main | |
src ::/0 dst ::/0 | |
socket in priority 0 ptype main | |
src ::/0 dst ::/0 | |
socket out priority 0 ptype main |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Status of IKE charon daemon (strongSwan 5.2.1, Linux 3.16.0-4-amd64, x86_64): | |
uptime: 32 minutes, since Feb 26 15:16:37 2018 | |
malloc: sbrk 1490944, mmap 0, used 307104, free 1183840 | |
worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0, scheduled: 0 | |
loaded plugins: charon aes sha2 random nonce x509 revocation pubkey pkcs7 pkcs8 pkcs12 pgp pem openssl hmac gcm kernel-netlink socket-default farp stroke dhcp | |
Virtual IP pools (size/online/offline): | |
10.0.3.0/24: 254/0/1 | |
Listening IP addresses: | |
93.152.158.13 | |
192.168.1.171 | |
Connections: | |
ikev2-pubkey: %any...%any IKEv2, dpddelay=35s | |
ikev2-pubkey: local: [vpn.scaladi.com] uses public key authentication | |
ikev2-pubkey: cert: "CN=vpn.scaladi.com" | |
ikev2-pubkey: remote: uses public key authentication | |
ikev2-pubkey: child: dynamic === 0.0.0.0/0 TUNNEL, dpdaction=clear | |
Security Associations (0 up, 0 connecting): | |
none |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
FILE:/etc/ipsec.conf | |
# ipsec.conf - strongSwan IPsec configuration file | |
# basic configuration | |
config setup | |
# strictcrlpolicy=yes | |
# uniqueids = no | |
charondebug="ike 4, knl 4, cfg 4, dmn 4" | |
uniqueids=no | |
# Add connections here. | |
# Sample VPN connections | |
#conn sample-self-signed | |
# leftsubnet=10.1.0.0/16 | |
# leftcert=selfCert.der | |
# leftsendcert=never | |
# right=192.168.0.2 | |
# rightsubnet=10.2.0.0/16 | |
# rightcert=peerCert.der | |
# auto=start | |
#conn sample-with-ca-cert | |
# leftsubnet=10.1.0.0/16 | |
# leftcert=myCert.pem | |
# right=192.168.0.2 | |
# rightsubnet=10.2.0.0/16 | |
# rightid="C=CH, O=Linux strongSwan CN=peer name" | |
# auto=start | |
include /var/lib/strongswan/ipsec.conf.inc | |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
FILE:/var/lib/strongswan/ipsec.conf.inc | |
#include /etc/ipsec.d/examples/oe.conf | |
conn %default | |
keyexchange=ikev2 | |
ike=aes128gcm16-sha2_256-prfsha256-ecp256! | |
esp=aes128gcm16-sha2_256-ecp256! | |
# ike=aes256gcm16-sha256-ecp521,aes256-sha256-ecp384,aes256gcm16-sha256-ecp256! | |
# esp=aes256gcm16-sha256,aes256-sha256! | |
fragmentation=yes | |
rekey=no | |
compress=yes | |
dpdaction=clear | |
dpddelay=35s | |
left=%any | |
leftauth=pubkey | |
[email protected] | |
leftcert=/etc/ipsec.d/certs/debian.pem | |
leftsendcert=always | |
leftsubnet=0.0.0.0/0, | |
# leftsubnet=192.168.1.0/24 | |
# leftfirewall=yes | |
right=%any | |
rightauth=pubkey | |
# rightsourceip=192.168.1.0/24, | |
# rightsubnet=192.168.1.0/24 | |
# rightsourceip=%dhcp | |
# rightsubnet=0.0.0.0/0 | |
rightsourceip=10.0.3.0/24 | |
rightdns=8.8.8.8 | |
conn ikev2-pubkey | |
auto=add |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
FILE:/etc/ipsec.secrets | |
# This file holds shared secrets or RSA private keys for authentication. | |
# RSA private key for this host, authenticating it to any other host | |
# which knows the public part. | |
# this file is managed with debconf and will contain the automatically created private key | |
include /var/lib/strongswan/ipsec.secrets.inc |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
FILE:/var/lib/strongswan/ipsec.secrets.inc | |
: RSA "/etc/ipsec.d/private/debian.pem" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Generated by iptables-save v1.4.21 on Mon Feb 26 15:51:46 2018 | |
*filter | |
:INPUT ACCEPT [16169997:2085910279] | |
:FORWARD ACCEPT [0:0] | |
:OUTPUT ACCEPT [7369413:358398884] | |
COMMIT | |
# Completed on Mon Feb 26 15:51:46 2018 |
Author
martimarkov
commented
Feb 26, 2018
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment