Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Save msmollin/89d6ef94c7e91999e8022f5bd44fdfe2 to your computer and use it in GitHub Desktop.
Save msmollin/89d6ef94c7e91999e8022f5bd44fdfe2 to your computer and use it in GitHub Desktop.
Time Process PID Message
May 8 00:18:40 algo charon: 03[NET] received packet: from <pfsense ip>[500] to <algo ip>[500]
May 8 00:18:40 algo charon: 03[NET] waiting for data on sockets
May 8 00:18:40 algo charon: 07[MGR] checkout IKEv2 SA by message with SPIs 1d69795f46bd4ebe_i 0000000000000000_r
May 8 00:18:40 algo charon: 07[MGR] created IKE_SA (unnamed)[1]
May 8 00:18:40 algo charon: 07[NET] received packet: from <pfsense ip>[500] to <algo ip>[500] (266 bytes)
May 8 00:18:40 algo charon: 07[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
May 8 00:18:40 algo charon: 07[CFG] looking for an ike config for <algo ip>...<pfsense ip>
May 8 00:18:40 algo charon: 07[CFG] candidate: %any...%any, prio 28
May 8 00:18:40 algo charon: 07[CFG] found matching ike config: %any...%any with prio 28
May 8 00:18:40 algo charon: 07[IKE] <pfsense ip> is initiating an IKE_SA
May 8 00:18:40 algo charon: 07[IKE] IKE_SA (unnamed)[1] state change: CREATED => CONNECTING
May 8 00:18:40 algo charon: 07[CFG] selecting proposal:
May 8 00:18:40 algo charon: 07[CFG] proposal matches
May 8 00:18:40 algo charon: 07[CFG] received proposals: IKE:AES_GCM_16_128/PRF_HMAC_SHA2_512/ECP_256
May 8 00:18:40 algo charon: 07[CFG] configured proposals: IKE:AES_GCM_16_128/PRF_HMAC_SHA2_512/ECP_256, IKE:AES_CBC_128/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/ECP_256, IKE:AES_CBC_128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/ECP_256
May 8 00:18:40 algo charon: 07[CFG] selected proposal: IKE:AES_GCM_16_128/PRF_HMAC_SHA2_512/ECP_256
May 8 00:18:40 algo charon: 07[IKE] sending cert request for "CN=<algo ip>"
May 8 00:18:40 algo charon: 07[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
May 8 00:18:40 algo charon: 07[NET] sending packet: from <algo ip>[500] to <pfsense ip>[500] (289 bytes)
May 8 00:18:40 algo charon: 04[NET] sending packet: from <algo ip>[500] to <pfsense ip>[500]
May 8 00:18:40 algo charon: 07[MGR] checkin IKE_SA (unnamed)[1]
May 8 00:18:40 algo charon: 07[MGR] checkin of IKE_SA successful
May 8 00:18:42 algo charon: 03[NET] received packet: from <pfsense ip>[500] to <algo ip>[500]
May 8 00:18:42 algo charon: 08[MGR] checkout IKEv2 SA by message with SPIs 25435d3ddc4c0fd6_i 0000000000000000_r
May 8 00:18:42 algo charon: 08[MGR] created IKE_SA (unnamed)[2]
May 8 00:18:42 algo charon: 08[NET] received packet: from <pfsense ip>[500] to <algo ip>[500] (266 bytes)
May 8 00:18:42 algo charon: 08[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
May 8 00:18:42 algo charon: 08[CFG] looking for an ike config for <algo ip>...<pfsense ip>
May 8 00:18:42 algo charon: 08[CFG] candidate: %any...%any, prio 28
May 8 00:18:42 algo charon: 08[CFG] found matching ike config: %any...%any with prio 28
May 8 00:18:42 algo charon: 08[IKE] <pfsense ip> is initiating an IKE_SA
May 8 00:18:42 algo charon: 08[IKE] IKE_SA (unnamed)[2] state change: CREATED => CONNECTING
May 8 00:18:42 algo charon: 08[CFG] selecting proposal:
May 8 00:18:42 algo charon: 08[CFG] proposal matches
May 8 00:18:42 algo charon: 08[CFG] received proposals: IKE:AES_GCM_16_128/PRF_HMAC_SHA2_512/ECP_256
May 8 00:18:42 algo charon: 08[CFG] configured proposals: IKE:AES_GCM_16_128/PRF_HMAC_SHA2_512/ECP_256, IKE:AES_CBC_128/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/ECP_256, IKE:AES_CBC_128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/ECP_256
May 8 00:18:42 algo charon: 08[CFG] selected proposal: IKE:AES_GCM_16_128/PRF_HMAC_SHA2_512/ECP_256
May 8 00:18:42 algo charon: 08[IKE] sending cert request for "CN=<algo ip>"
May 8 00:18:42 algo charon: 08[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
May 8 00:18:42 algo charon: 08[NET] sending packet: from <algo ip>[500] to <pfsense ip>[500] (289 bytes)
May 8 00:18:42 algo charon: 08[MGR] checkin IKE_SA (unnamed)[2]
May 8 00:18:42 algo charon: 08[MGR] checkin of IKE_SA successful
May 8 00:18:42 algo charon: 04[NET] sending packet: from <algo ip>[500] to <pfsense ip>[500]
May 8 00:18:42 algo charon: 03[NET] waiting for data on sockets
May 8 00:18:42 algo charon: 03[NET] received packet: from <pfsense ip>[500] to <algo ip>[500]
May 8 00:18:42 algo charon: 09[MGR] checkout IKEv2 SA by message with SPIs 7a99450f4a6eb357_i 0000000000000000_r
May 8 00:18:42 algo charon: 09[MGR] created IKE_SA (unnamed)[3]
May 8 00:18:42 algo charon: 09[NET] received packet: from <pfsense ip>[500] to <algo ip>[500] (266 bytes)
May 8 00:18:42 algo charon: 09[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
May 8 00:18:42 algo charon: 09[CFG] looking for an ike config for <algo ip>...<pfsense ip>
May 8 00:18:42 algo charon: 09[CFG] candidate: %any...%any, prio 28
May 8 00:18:42 algo charon: 09[CFG] found matching ike config: %any...%any with prio 28
May 8 00:18:42 algo charon: 09[IKE] <pfsense ip> is initiating an IKE_SA
May 8 00:18:42 algo charon: 09[IKE] IKE_SA (unnamed)[3] state change: CREATED => CONNECTING
May 8 00:18:42 algo charon: 09[CFG] selecting proposal:
May 8 00:18:42 algo charon: 09[CFG] proposal matches
May 8 00:18:42 algo charon: 09[CFG] received proposals: IKE:AES_GCM_16_128/PRF_HMAC_SHA2_512/ECP_256
May 8 00:18:42 algo charon: 09[CFG] configured proposals: IKE:AES_GCM_16_128/PRF_HMAC_SHA2_512/ECP_256, IKE:AES_CBC_128/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/ECP_256, IKE:AES_CBC_128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/ECP_256
May 8 00:18:42 algo charon: 09[CFG] selected proposal: IKE:AES_GCM_16_128/PRF_HMAC_SHA2_512/ECP_256
May 8 00:18:42 algo charon: 09[IKE] sending cert request for "CN=<algo ip>"
May 8 00:18:42 algo charon: 09[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
May 8 00:18:42 algo charon: 03[NET] waiting for data on sockets
May 8 00:18:42 algo charon: 09[NET] sending packet: from <algo ip>[500] to <pfsense ip>[500] (289 bytes)
May 8 00:18:42 algo charon: 04[NET] sending packet: from <algo ip>[500] to <pfsense ip>[500]
May 8 00:18:42 algo charon: 09[MGR] checkin IKE_SA (unnamed)[3]
May 8 00:18:42 algo charon: 09[MGR] checkin of IKE_SA successful
May 8 00:18:43 algo charon: 03[NET] received packet: from <pfsense ip>[500] to <algo ip>[500]
May 8 00:18:43 algo charon: 10[MGR] checkout IKEv2 SA by message with SPIs 612bc9fe172d74a5_i 0000000000000000_r
May 8 00:18:43 algo charon: 10[MGR] created IKE_SA (unnamed)[4]
May 8 00:18:43 algo charon: 10[NET] received packet: from <pfsense ip>[500] to <algo ip>[500] (266 bytes)
May 8 00:18:43 algo charon: 10[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
May 8 00:18:43 algo charon: 10[CFG] looking for an ike config for <algo ip>...<pfsense ip>
May 8 00:18:43 algo charon: 10[CFG] candidate: %any...%any, prio 28
May 8 00:18:43 algo charon: 10[CFG] found matching ike config: %any...%any with prio 28
May 8 00:18:43 algo charon: 10[IKE] <pfsense ip> is initiating an IKE_SA
May 8 00:18:43 algo charon: 10[IKE] IKE_SA (unnamed)[4] state change: CREATED => CONNECTING
May 8 00:18:43 algo charon: 10[CFG] selecting proposal:
May 8 00:18:43 algo charon: 10[CFG] proposal matches
May 8 00:18:43 algo charon: 10[CFG] received proposals: IKE:AES_GCM_16_128/PRF_HMAC_SHA2_512/ECP_256
May 8 00:18:43 algo charon: 10[CFG] configured proposals: IKE:AES_GCM_16_128/PRF_HMAC_SHA2_512/ECP_256, IKE:AES_CBC_128/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/ECP_256, IKE:AES_CBC_128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/ECP_256
May 8 00:18:43 algo charon: 10[CFG] selected proposal: IKE:AES_GCM_16_128/PRF_HMAC_SHA2_512/ECP_256
May 8 00:18:43 algo charon: 10[IKE] sending cert request for "CN=<algo ip>"
May 8 00:18:43 algo charon: 10[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
May 8 00:18:43 algo charon: 10[NET] sending packet: from <algo ip>[500] to <pfsense ip>[500] (289 bytes)
May 8 00:18:43 algo charon: 04[NET] sending packet: from <algo ip>[500] to <pfsense ip>[500]
May 8 00:18:43 algo charon: 10[MGR] checkin IKE_SA (unnamed)[4]
May 8 00:18:43 algo charon: 10[MGR] checkin of IKE_SA successful
May 8 00:18:43 algo charon: 03[NET] waiting for data on sockets
May 8 00:18:44 algo charon: 03[NET] received packet: from <pfsense ip>[500] to <algo ip>[500]
May 8 00:18:44 algo charon: 11[MGR] checkout IKEv2 SA by message with SPIs 1e7580eda8b61054_i 0000000000000000_r
May 8 00:18:44 algo charon: 11[MGR] created IKE_SA (unnamed)[5]
May 8 00:18:44 algo charon: 11[NET] received packet: from <pfsense ip>[500] to <algo ip>[500] (266 bytes)
May 8 00:18:44 algo charon: 11[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
May 8 00:18:44 algo charon: 11[CFG] looking for an ike config for <algo ip>...<pfsense ip>
May 8 00:18:44 algo charon: 11[CFG] candidate: %any...%any, prio 28
May 8 00:18:44 algo charon: 11[CFG] found matching ike config: %any...%any with prio 28
May 8 00:18:44 algo charon: 11[IKE] <pfsense ip> is initiating an IKE_SA
May 8 00:18:44 algo charon: 11[IKE] IKE_SA (unnamed)[5] state change: CREATED => CONNECTING
May 8 00:18:44 algo charon: 11[CFG] selecting proposal:
May 8 00:18:44 algo charon: 11[CFG] proposal matches
May 8 00:18:44 algo charon: 11[CFG] received proposals: IKE:AES_GCM_16_128/PRF_HMAC_SHA2_512/ECP_256
May 8 00:18:44 algo charon: 11[CFG] configured proposals: IKE:AES_GCM_16_128/PRF_HMAC_SHA2_512/ECP_256, IKE:AES_CBC_128/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/ECP_256, IKE:AES_CBC_128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/ECP_256
May 8 00:18:44 algo charon: 11[CFG] selected proposal: IKE:AES_GCM_16_128/PRF_HMAC_SHA2_512/ECP_256
May 8 00:18:44 algo charon: 11[IKE] sending cert request for "CN=<algo ip>"
May 8 00:18:44 algo charon: 11[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
May 8 00:18:44 algo charon: 11[NET] sending packet: from <algo ip>[500] to <pfsense ip>[500] (289 bytes)
May 8 00:18:44 algo charon: 11[MGR] checkin IKE_SA (unnamed)[5]
May 8 00:18:44 algo charon: 11[MGR] checkin of IKE_SA successful
May 8 00:18:44 algo charon: 04[NET] sending packet: from <algo ip>[500] to <pfsense ip>[500]
May 8 00:18:44 algo charon: 03[NET] waiting for data on sockets
May 8 00:18:45 algo charon: 03[NET] received packet: from <pfsense ip>[500] to <algo ip>[500]
May 8 00:18:45 algo charon: 03[NET] ignoring IKE_SA setup from <pfsense ip>, peer too aggressive
May 8 00:18:45 algo charon: 03[NET] waiting for data on sockets
May 8 00:18:49 algo charon: 03[NET] received packet: from <pfsense ip>[500] to <algo ip>[500]
May 8 00:18:49 algo charon: 03[NET] ignoring IKE_SA setup from <pfsense ip>, peer too aggressive
May 8 00:18:49 algo charon: 03[NET] waiting for data on sockets
May 8 00:18:56 algo charon: 03[NET] received packet: from <pfsense ip>[500] to <algo ip>[500]
May 8 00:18:56 algo charon: 03[NET] ignoring IKE_SA setup from <pfsense ip>, peer too aggressive
May 8 00:18:56 algo charon: 03[NET] waiting for data on sockets
May 8 00:19:09 algo charon: 03[NET] received packet: from <pfsense ip>[500] to <algo ip>[500]
May 8 00:19:09 algo charon: 03[NET] ignoring IKE_SA setup from <pfsense ip>, peer too aggressive
May 8 00:19:09 algo charon: 03[NET] waiting for data on sockets
May 8 00:19:10 algo charon: 12[MGR] checkout IKEv2 SA with SPIs 1d69795f46bd4ebe_i a0b786b4e55e3d80_r
May 8 00:19:10 algo charon: 12[MGR] IKE_SA (unnamed)[1] successfully checked out
May 8 00:19:10 algo charon: 12[JOB] deleting half open IKE_SA after timeout
May 8 00:19:10 algo charon: 12[MGR] checkin and destroy IKE_SA (unnamed)[1]
May 8 00:19:10 algo charon: 12[IKE] IKE_SA (unnamed)[1] state change: CONNECTING => DESTROYING
May 8 00:19:10 algo charon: 12[MGR] checkin and destroy of IKE_SA successful
May 8 00:19:12 algo charon: 13[MGR] checkout IKEv2 SA with SPIs 25435d3ddc4c0fd6_i 00dedf681bf97c41_r
May 8 00:19:12 algo charon: 13[MGR] IKE_SA (unnamed)[2] successfully checked out
May 8 00:19:12 algo charon: 13[JOB] deleting half open IKE_SA after timeout
May 8 00:19:12 algo charon: 13[MGR] checkin and destroy IKE_SA (unnamed)[2]
May 8 00:19:12 algo charon: 13[IKE] IKE_SA (unnamed)[2] state change: CONNECTING => DESTROYING
May 8 00:19:12 algo charon: 13[MGR] checkin and destroy of IKE_SA successful
May 8 00:19:12 algo charon: 14[MGR] checkout IKEv2 SA with SPIs 7a99450f4a6eb357_i 9afdc2a38bd462a5_r
May 8 00:19:12 algo charon: 14[MGR] IKE_SA (unnamed)[3] successfully checked out
May 8 00:19:12 algo charon: 14[JOB] deleting half open IKE_SA after timeout
May 8 00:19:12 algo charon: 14[MGR] checkin and destroy IKE_SA (unnamed)[3]
May 8 00:19:12 algo charon: 14[IKE] IKE_SA (unnamed)[3] state change: CONNECTING => DESTROYING
May 8 00:19:12 algo charon: 14[MGR] checkin and destroy of IKE_SA successful
May 8 00:19:13 algo charon: 15[MGR] checkout IKEv2 SA with SPIs 612bc9fe172d74a5_i 303b2cef8a001d28_r
May 8 00:19:13 algo charon: 15[MGR] IKE_SA (unnamed)[4] successfully checked out
May 8 00:19:13 algo charon: 15[JOB] deleting half open IKE_SA after timeout
May 8 00:19:13 algo charon: 15[MGR] checkin and destroy IKE_SA (unnamed)[4]
May 8 00:19:13 algo charon: 15[IKE] IKE_SA (unnamed)[4] state change: CONNECTING => DESTROYING
May 8 00:19:13 algo charon: 15[MGR] checkin and destroy of IKE_SA successful
May 8 00:19:14 algo charon: 16[MGR] checkout IKEv2 SA with SPIs 1e7580eda8b61054_i 6a8e26f058180e6c_r
May 8 00:19:14 algo charon: 16[MGR] IKE_SA (unnamed)[5] successfully checked out
May 8 00:19:14 algo charon: 16[JOB] deleting half open IKE_SA after timeout
May 8 00:19:14 algo charon: 16[MGR] checkin and destroy IKE_SA (unnamed)[5]
May 8 00:19:14 algo charon: 16[IKE] IKE_SA (unnamed)[5] state change: CONNECTING => DESTROYING
May 8 00:19:14 algo charon: 16[MGR] checkin and destroy of IKE_SA successful
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment