-
-
Save williamsjj/0b1b58fe8bb216ccf275 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
"OPSGENESIS" #1: initiating Main Mode | |
"OPSGENESIS" #1: received Vendor ID payload [RFC 3947] method set to=115 | |
"OPSGENESIS" #1: received Vendor ID payload [Dead Peer Detection] | |
"OPSGENESIS" #1: enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal) | |
"OPSGENESIS" #1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2 | |
"OPSGENESIS" #1: STATE_MAIN_I2: sent MI2, expecting MR2 | |
"OPSGENESIS" #1: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed | |
"OPSGENESIS" #1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3 | |
"OPSGENESIS" #1: STATE_MAIN_I3: sent MI3, expecting MR3 | |
"OPSGENESIS" #1: Main mode peer ID is ID_IPV4_ADDR: '1.2.3.4' | |
"OPSGENESIS" #1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4 | |
"OPSGENESIS" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536} | |
"OPSGENESIS" #2: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK {using isakmp#1 msgid:d41116d7 proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1536} | |
"OPSGENESIS" #2: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=d41116d7 | |
"OPSGENESIS" #2: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | |
"OPSGENESIS" #2: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0xe3a02350 <0x2f28d881 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #1: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #1: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #1: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #1: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #1: received Delete SA payload: replace IPSEC State #2 in 10 seconds | |
"OPSGENESIS" #1: received and ignored informational message | |
"OPSGENESIS" #1: received Delete SA payload: deleting ISAKMP State #1 | |
packet from 1.2.3.4:4500: received and ignored informational message | |
packet from 1.2.3.4:500: received Vendor ID payload [RFC 3947] method set to=115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115 | |
packet from 1.2.3.4:500: ignoring unknown Vendor ID payload [16f6ca16e4a4066d83821a0f0aeaa862] | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00] | |
packet from 1.2.3.4:500: received Vendor ID payload [Dead Peer Detection] | |
"OPSGENESIS" #3: responding to Main Mode | |
"OPSGENESIS" #3: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1 | |
"OPSGENESIS" #3: STATE_MAIN_R1: sent MR1, expecting MI2 | |
"OPSGENESIS" #3: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed | |
"OPSGENESIS" #3: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2 | |
"OPSGENESIS" #3: STATE_MAIN_R2: sent MR2, expecting MI3 | |
"OPSGENESIS" #3: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000 | |
"OPSGENESIS" #3: Main mode peer ID is ID_IPV4_ADDR: '1.2.3.4' | |
"OPSGENESIS" #3: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3 | |
"OPSGENESIS" #3: new NAT mapping for #3, was 1.2.3.4:500, now 1.2.3.4:4500 | |
"OPSGENESIS" #3: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536} | |
"OPSGENESIS" #3: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0 | |
"OPSGENESIS" #4: responding to Quick Mode proposal {msgid:43ccc015} | |
"OPSGENESIS" #4: us: 10.1.0.1/32===2.2.3.5<2.2.3.5>---2.2.3.4 | |
"OPSGENESIS" #4: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27 | |
"OPSGENESIS" #4: keeping refhim=4294901761 during rekey | |
"OPSGENESIS" #4: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 | |
"OPSGENESIS" #4: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 | |
"OPSGENESIS" #4: next payload type of ISAKMP Hash Payload has an unknown value: 190 | |
"OPSGENESIS" #4: malformed payload in packet | |
| payload malformed after IV | |
| e5 e8 5b 71 19 c4 c3 d3 | |
"OPSGENESIS" #4: sending notification PAYLOAD_MALFORMED to 1.2.3.4:4500 | |
"OPSGENESIS" #3: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #5: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK to replace #2 {using isakmp#3 msgid:0bb6a0dd proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1536} | |
"OPSGENESIS" #4: next payload type of ISAKMP Hash Payload has an unknown value: 190 | |
"OPSGENESIS" #4: malformed payload in packet | |
| payload malformed after IV | |
| e5 e8 5b 71 19 c4 c3 d3 | |
"OPSGENESIS" #4: sending notification PAYLOAD_MALFORMED to 1.2.3.4:4500 | |
"OPSGENESIS" #3: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #3: received Delete SA payload: deleting ISAKMP State #3 | |
packet from 1.2.3.4:4500: received and ignored informational message | |
"OPSGENESIS" #2: IPsec SA expired (LATEST!) | |
packet from 1.2.3.4:500: received Vendor ID payload [RFC 3947] method set to=115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115 | |
packet from 1.2.3.4:500: ignoring unknown Vendor ID payload [16f6ca16e4a4066d83821a0f0aeaa862] | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00] | |
packet from 1.2.3.4:500: received Vendor ID payload [Dead Peer Detection] | |
"OPSGENESIS" #6: responding to Main Mode | |
"OPSGENESIS" #6: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1 | |
"OPSGENESIS" #6: STATE_MAIN_R1: sent MR1, expecting MI2 | |
"OPSGENESIS" #6: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed | |
"OPSGENESIS" #6: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2 | |
"OPSGENESIS" #6: STATE_MAIN_R2: sent MR2, expecting MI3 | |
"OPSGENESIS" #6: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000 | |
"OPSGENESIS" #6: Main mode peer ID is ID_IPV4_ADDR: '1.2.3.4' | |
"OPSGENESIS" #6: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3 | |
"OPSGENESIS" #6: new NAT mapping for #6, was 1.2.3.4:500, now 1.2.3.4:4500 | |
"OPSGENESIS" #6: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536} | |
"OPSGENESIS" #6: retransmitting in response to duplicate packet; already STATE_MAIN_R3 | |
packet from 1.2.3.4:500: received Vendor ID payload [RFC 3947] method set to=115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115 | |
packet from 1.2.3.4:500: ignoring unknown Vendor ID payload [16f6ca16e4a4066d83821a0f0aeaa862] | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00] | |
packet from 1.2.3.4:500: received Vendor ID payload [Dead Peer Detection] | |
"OPSGENESIS" #7: responding to Main Mode | |
"OPSGENESIS" #7: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1 | |
"OPSGENESIS" #7: STATE_MAIN_R1: sent MR1, expecting MI2 | |
"OPSGENESIS" #7: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed | |
"OPSGENESIS" #7: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2 | |
"OPSGENESIS" #7: STATE_MAIN_R2: sent MR2, expecting MI3 | |
"OPSGENESIS" #7: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000 | |
"OPSGENESIS" #7: Main mode peer ID is ID_IPV4_ADDR: '1.2.3.4' | |
"OPSGENESIS" #7: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3 | |
"OPSGENESIS" #7: new NAT mapping for #7, was 1.2.3.4:500, now 1.2.3.4:4500 | |
"OPSGENESIS" #7: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536} | |
"OPSGENESIS" #7: retransmitting in response to duplicate packet; already STATE_MAIN_R3 | |
"OPSGENESIS" #7: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0 | |
"OPSGENESIS" #8: responding to Quick Mode proposal {msgid:81b11bc1} | |
"OPSGENESIS" #8: us: 10.1.0.1/32===2.2.3.5<2.2.3.5>---2.2.3.4 | |
"OPSGENESIS" #8: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27 | |
"OPSGENESIS" #8: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 | |
"OPSGENESIS" #8: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 | |
"OPSGENESIS" #8: next payload type of ISAKMP Hash Payload has an unknown value: 113 | |
"OPSGENESIS" #8: malformed payload in packet | |
| payload malformed after IV | |
| cf 08 92 3a 93 4c b0 a9 | |
"OPSGENESIS" #8: sending notification PAYLOAD_MALFORMED to 1.2.3.4:4500 | |
"OPSGENESIS" #8: next payload type of ISAKMP Hash Payload has an unknown value: 113 | |
"OPSGENESIS" #8: malformed payload in packet | |
| payload malformed after IV | |
| cf 08 92 3a 93 4c b0 a9 | |
"OPSGENESIS" #8: sending notification PAYLOAD_MALFORMED to 1.2.3.4:4500 | |
"OPSGENESIS" #7: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #7: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #8: next payload type of ISAKMP Hash Payload has an unknown value: 113 | |
"OPSGENESIS" #8: malformed payload in packet | |
| payload malformed after IV | |
| cf 08 92 3a 93 4c b0 a9 | |
"OPSGENESIS" #8: sending notification PAYLOAD_MALFORMED to 1.2.3.4:4500 | |
"OPSGENESIS" #7: received Delete SA payload: deleting ISAKMP State #7 | |
packet from 1.2.3.4:4500: received and ignored informational message | |
packet from 1.2.3.4:500: received Vendor ID payload [RFC 3947] method set to=115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115 | |
packet from 1.2.3.4:500: ignoring unknown Vendor ID payload [16f6ca16e4a4066d83821a0f0aeaa862] | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00] | |
packet from 1.2.3.4:500: received Vendor ID payload [Dead Peer Detection] | |
"OPSGENESIS" #9: responding to Main Mode | |
"OPSGENESIS" #9: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1 | |
"OPSGENESIS" #9: STATE_MAIN_R1: sent MR1, expecting MI2 | |
"OPSGENESIS" #9: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed | |
"OPSGENESIS" #9: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2 | |
"OPSGENESIS" #9: STATE_MAIN_R2: sent MR2, expecting MI3 | |
"OPSGENESIS" #9: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000 | |
"OPSGENESIS" #9: Main mode peer ID is ID_IPV4_ADDR: '1.2.3.4' | |
"OPSGENESIS" #9: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3 | |
"OPSGENESIS" #9: new NAT mapping for #9, was 1.2.3.4:500, now 1.2.3.4:4500 | |
"OPSGENESIS" #9: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536} | |
"OPSGENESIS" #9: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0 | |
"OPSGENESIS" #10: responding to Quick Mode proposal {msgid:772c49d7} | |
"OPSGENESIS" #10: us: 10.1.0.1/32===2.2.3.5<2.2.3.5>---2.2.3.4 | |
"OPSGENESIS" #10: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27 | |
"OPSGENESIS" #10: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 | |
"OPSGENESIS" #10: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 | |
"OPSGENESIS" #10: next payload type of ISAKMP Hash Payload has an unknown value: 132 | |
"OPSGENESIS" #10: malformed payload in packet | |
| payload malformed after IV | |
| 6a e0 d2 40 9c 71 28 37 | |
"OPSGENESIS" #10: sending notification PAYLOAD_MALFORMED to 1.2.3.4:4500 | |
"OPSGENESIS" #10: next payload type of ISAKMP Hash Payload has an unknown value: 132 | |
"OPSGENESIS" #10: malformed payload in packet | |
| payload malformed after IV | |
| 6a e0 d2 40 9c 71 28 37 | |
"OPSGENESIS" #10: sending notification PAYLOAD_MALFORMED to 1.2.3.4:4500 | |
"OPSGENESIS" #9: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #10: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 | |
"OPSGENESIS" #10: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP/NAT=>0xe3a02354 <0x92c21ac4 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #5: max number of retransmissions (2) reached STATE_QUICK_I1 | |
"OPSGENESIS" #5: starting keying attempt 2 of an unlimited number | |
"OPSGENESIS" #11: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK to replace #5 {using isakmp#9 msgid:ca6aaed4 proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1536} | |
"OPSGENESIS" #11: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=ca6aaed4 | |
"OPSGENESIS" #11: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | |
"OPSGENESIS" #11: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0xe3a02355 <0x7f676315 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #11: message ignored because it contains an unexpected payload type (ISAKMP_NEXT_HASH) | |
"OPSGENESIS" #11: sending encrypted notification INVALID_PAYLOAD_TYPE to 1.2.3.4:4500 | |
"OPSGENESIS" #11: message ignored because it contains an unexpected payload type (ISAKMP_NEXT_HASH) | |
"OPSGENESIS" #11: sending encrypted notification INVALID_PAYLOAD_TYPE to 1.2.3.4:4500 | |
"OPSGENESIS" #9: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #11: message ignored because it contains an unexpected payload type (ISAKMP_NEXT_HASH) | |
"OPSGENESIS" #11: sending encrypted notification INVALID_PAYLOAD_TYPE to 1.2.3.4:4500 | |
"OPSGENESIS" #9: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #9: received Delete SA(0xe3a02354) payload: deleting IPSEC State #10 | |
"OPSGENESIS" #9: received and ignored informational message | |
"OPSGENESIS" #9: received Delete SA payload: deleting ISAKMP State #9 | |
packet from 1.2.3.4:4500: received and ignored informational message | |
packet from 1.2.3.4:500: received Vendor ID payload [RFC 3947] method set to=115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115 | |
packet from 1.2.3.4:500: ignoring unknown Vendor ID payload [16f6ca16e4a4066d83821a0f0aeaa862] | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00] | |
packet from 1.2.3.4:500: received Vendor ID payload [Dead Peer Detection] | |
"OPSGENESIS" #12: responding to Main Mode | |
"OPSGENESIS" #12: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1 | |
"OPSGENESIS" #12: STATE_MAIN_R1: sent MR1, expecting MI2 | |
"OPSGENESIS" #12: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed | |
"OPSGENESIS" #12: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2 | |
"OPSGENESIS" #12: STATE_MAIN_R2: sent MR2, expecting MI3 | |
"OPSGENESIS" #12: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000 | |
"OPSGENESIS" #12: Main mode peer ID is ID_IPV4_ADDR: '1.2.3.4' | |
"OPSGENESIS" #12: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3 | |
"OPSGENESIS" #12: new NAT mapping for #12, was 1.2.3.4:500, now 1.2.3.4:4500 | |
"OPSGENESIS" #12: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536} | |
"OPSGENESIS" #12: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0 | |
"OPSGENESIS" #13: responding to Quick Mode proposal {msgid:79274296} | |
"OPSGENESIS" #13: us: 10.1.0.1/32===2.2.3.5<2.2.3.5>---2.2.3.4 | |
"OPSGENESIS" #13: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27 | |
"OPSGENESIS" #13: keeping refhim=4294901761 during rekey | |
"OPSGENESIS" #13: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 | |
"OPSGENESIS" #13: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 | |
"OPSGENESIS" #13: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 | |
"OPSGENESIS" #13: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP/NAT=>0xe3a02356 <0x393ee03c xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #12: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #12: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #12: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #12: received Delete SA payload: replace IPSEC State #13 in 10 seconds | |
"OPSGENESIS" #12: received and ignored informational message | |
"OPSGENESIS" #12: received Delete SA payload: deleting ISAKMP State #12 | |
packet from 1.2.3.4:4500: received and ignored informational message | |
packet from 1.2.3.4:500: received Vendor ID payload [RFC 3947] method set to=115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115 | |
packet from 1.2.3.4:500: ignoring unknown Vendor ID payload [16f6ca16e4a4066d83821a0f0aeaa862] | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00] | |
packet from 1.2.3.4:500: received Vendor ID payload [Dead Peer Detection] | |
"OPSGENESIS" #14: responding to Main Mode | |
"OPSGENESIS" #14: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1 | |
"OPSGENESIS" #14: STATE_MAIN_R1: sent MR1, expecting MI2 | |
"OPSGENESIS" #14: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed | |
"OPSGENESIS" #14: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2 | |
"OPSGENESIS" #14: STATE_MAIN_R2: sent MR2, expecting MI3 | |
"OPSGENESIS" #14: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000 | |
"OPSGENESIS" #14: Main mode peer ID is ID_IPV4_ADDR: '1.2.3.4' | |
"OPSGENESIS" #14: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3 | |
"OPSGENESIS" #14: new NAT mapping for #14, was 1.2.3.4:500, now 1.2.3.4:4500 | |
"OPSGENESIS" #14: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536} | |
"OPSGENESIS" #14: retransmitting in response to duplicate packet; already STATE_MAIN_R3 | |
"OPSGENESIS" #14: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0 | |
"OPSGENESIS" #15: responding to Quick Mode proposal {msgid:4263fec4} | |
"OPSGENESIS" #15: us: 10.1.0.1/32===2.2.3.5<2.2.3.5>---2.2.3.4 | |
"OPSGENESIS" #15: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27 | |
"OPSGENESIS" #15: keeping refhim=4294901761 during rekey | |
"OPSGENESIS" #15: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 | |
"OPSGENESIS" #15: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 | |
"OPSGENESIS" #15: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 | |
"OPSGENESIS" #15: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP/NAT=>0xe3a02357 <0xaf192574 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment