-
-
Save williamsjj/d84bad0d8cc6b43ecef7 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
"OPSGENESIS" #1: ERROR: asynchronous network error report on eth0 (sport=500) for message to 1.2.3.4 port 500, complainant 174.34.140.250: No route to host [errno 113, origin ICMP type 3 code 1 (not authenticated)] | |
packet from 1.2.3.4:500: received Vendor ID payload [RFC 3947] method set to=115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115 | |
packet from 1.2.3.4:500: ignoring unknown Vendor ID payload [16f6ca16e4a4066d83821a0f0aeaa862] | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00] | |
packet from 1.2.3.4:500: received Vendor ID payload [Dead Peer Detection] | |
"OPSGENESIS" #2: responding to Main Mode | |
"OPSGENESIS" #2: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1 | |
"OPSGENESIS" #2: STATE_MAIN_R1: sent MR1, expecting MI2 | |
"OPSGENESIS" #2: ERROR: asynchronous network error report on eth0 (sport=500) for message to 1.2.3.4 port 500, complainant 174.34.140.250: No route to host [errno 113, origin ICMP type 3 code 1 (not authenticated)] | |
packet from 1.2.3.4:500: received Vendor ID payload [RFC 3947] method set to=115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115 | |
packet from 1.2.3.4:500: ignoring unknown Vendor ID payload [16f6ca16e4a4066d83821a0f0aeaa862] | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00] | |
packet from 1.2.3.4:500: received Vendor ID payload [Dead Peer Detection] | |
"OPSGENESIS" #3: responding to Main Mode | |
"OPSGENESIS" #3: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1 | |
"OPSGENESIS" #3: STATE_MAIN_R1: sent MR1, expecting MI2 | |
"OPSGENESIS" #3: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed | |
"OPSGENESIS" #3: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2 | |
"OPSGENESIS" #3: STATE_MAIN_R2: sent MR2, expecting MI3 | |
"OPSGENESIS" #3: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000 | |
"OPSGENESIS" #3: Main mode peer ID is ID_IPV4_ADDR: '1.2.3.4' | |
"OPSGENESIS" #3: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3 | |
"OPSGENESIS" #3: new NAT mapping for #3, was 1.2.3.4:500, now 1.2.3.4:4500 | |
"OPSGENESIS" #3: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536} | |
initiate on demand from 10.1.0.1:0 to 172.31.33.30:6379 proto=6 state: fos_start because: acquire | |
"OPSGENESIS" #4: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK {using isakmp#3 msgid:d12f899f proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1536} | |
"OPSGENESIS" #4: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=d12f899f | |
"OPSGENESIS" #4: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | |
"OPSGENESIS" #4: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0xe3a0235a <0x0472ab66 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #1: received Vendor ID payload [RFC 3947] method set to=115 | |
"OPSGENESIS" #1: received Vendor ID payload [Dead Peer Detection] | |
"OPSGENESIS" #1: enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal) | |
"OPSGENESIS" #1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2 | |
"OPSGENESIS" #1: new NAT mapping for #1, was 1.2.3.4:500, now 1.2.3.4:4500 | |
"OPSGENESIS" #1: STATE_MAIN_I2: sent MI2, expecting MR2 | |
"OPSGENESIS" #1: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed | |
"OPSGENESIS" #1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3 | |
"OPSGENESIS" #1: STATE_MAIN_I3: sent MI3, expecting MR3 | |
"OPSGENESIS" #1: Main mode peer ID is ID_IPV4_ADDR: '1.2.3.4' | |
"OPSGENESIS" #1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4 | |
"OPSGENESIS" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536} | |
"OPSGENESIS" #5: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK {using isakmp#1 msgid:8a0aa2da proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1536} | |
"OPSGENESIS" #5: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=8a0aa2da | |
"OPSGENESIS" #5: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | |
"OPSGENESIS" #5: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0xe3a0235b <0x2f0ff6c7 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #2: max number of retransmissions (2) reached STATE_MAIN_R1 | |
"OPSGENESIS" #1: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0 | |
"OPSGENESIS" #6: responding to Quick Mode proposal {msgid:8d355d03} | |
"OPSGENESIS" #6: us: 10.1.0.1/32===174.34.140.250<174.34.140.250>---2.2.3.4 | |
"OPSGENESIS" #6: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27 | |
"OPSGENESIS" #6: keeping refhim=4294901761 during rekey | |
"OPSGENESIS" #6: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 | |
"OPSGENESIS" #6: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 | |
"OPSGENESIS" #6: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 | |
"OPSGENESIS" #6: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP/NAT=>0xe3a0235d <0x7ccf51c3 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #7: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK to replace #6 {using isakmp#3 msgid:02cf49ad proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1536} | |
"OPSGENESIS" #7: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=02cf49ad | |
"OPSGENESIS" #7: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | |
"OPSGENESIS" #7: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0xe3a0235f <0x295e8136 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #1: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0 | |
"OPSGENESIS" #8: responding to Quick Mode proposal {msgid:e63cf53b} | |
"OPSGENESIS" #8: us: 10.1.0.1/32===174.34.140.250<174.34.140.250>---2.2.3.4 | |
"OPSGENESIS" #8: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27 | |
"OPSGENESIS" #8: keeping refhim=4294901761 during rekey | |
"OPSGENESIS" #8: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 | |
"OPSGENESIS" #8: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 | |
"OPSGENESIS" #8: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 | |
"OPSGENESIS" #8: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP/NAT=>0xe3a02361 <0x40bfd052 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #9: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK to replace #8 {using isakmp#3 msgid:8427ae00 proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1536} | |
"OPSGENESIS" #9: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=8427ae00 | |
"OPSGENESIS" #9: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | |
"OPSGENESIS" #9: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0xe3a02363 <0xa19ca173 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #1: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0 | |
"OPSGENESIS" #10: responding to Quick Mode proposal {msgid:523acac4} | |
"OPSGENESIS" #10: us: 10.1.0.1/32===174.34.140.250<174.34.140.250>---2.2.3.4 | |
"OPSGENESIS" #10: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27 | |
"OPSGENESIS" #10: keeping refhim=4294901761 during rekey | |
"OPSGENESIS" #10: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 | |
"OPSGENESIS" #10: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 | |
"OPSGENESIS" #10: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 | |
"OPSGENESIS" #10: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP/NAT=>0xe3a02365 <0xb9c3f836 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #11: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK to replace #10 {using isakmp#3 msgid:77fe2517 proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1536} | |
"OPSGENESIS" #11: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=77fe2517 | |
"OPSGENESIS" #11: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | |
"OPSGENESIS" #11: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0xe3a02367 <0xb11eee7e xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #1: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0 | |
"OPSGENESIS" #12: responding to Quick Mode proposal {msgid:80d00f46} | |
"OPSGENESIS" #12: us: 10.1.0.1/32===174.34.140.250<174.34.140.250>---2.2.3.4 | |
"OPSGENESIS" #12: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27 | |
"OPSGENESIS" #12: keeping refhim=4294901761 during rekey | |
"OPSGENESIS" #12: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 | |
"OPSGENESIS" #12: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 | |
"OPSGENESIS" #12: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 | |
"OPSGENESIS" #12: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP/NAT=>0xe3a02369 <0x19081653 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #13: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK to replace #12 {using isakmp#3 msgid:1160e49c proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1536} | |
"OPSGENESIS" #13: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=1160e49c | |
"OPSGENESIS" #13: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | |
"OPSGENESIS" #13: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0xe3a0236a <0x524343cb xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #1: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0 | |
"OPSGENESIS" #14: responding to Quick Mode proposal {msgid:5fe11a58} | |
"OPSGENESIS" #14: us: 10.1.0.1/32===174.34.140.250<174.34.140.250>---2.2.3.4 | |
"OPSGENESIS" #14: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27 | |
"OPSGENESIS" #14: keeping refhim=4294901761 during rekey | |
"OPSGENESIS" #14: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 | |
"OPSGENESIS" #14: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 | |
"OPSGENESIS" #14: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 | |
"OPSGENESIS" #14: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP/NAT=>0xe3a0236c <0xc7eafc73 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #15: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK to replace #14 {using isakmp#3 msgid:6622e498 proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1536} | |
"OPSGENESIS" #15: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=6622e498 | |
"OPSGENESIS" #15: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | |
"OPSGENESIS" #15: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0xe3a0236e <0xe82a1376 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #1: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0 | |
"OPSGENESIS" #16: responding to Quick Mode proposal {msgid:b075f8e5} | |
"OPSGENESIS" #16: us: 10.1.0.1/32===174.34.140.250<174.34.140.250>---2.2.3.4 | |
"OPSGENESIS" #16: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27 | |
"OPSGENESIS" #16: keeping refhim=4294901761 during rekey | |
"OPSGENESIS" #16: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 | |
"OPSGENESIS" #16: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 | |
"OPSGENESIS" #16: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 | |
"OPSGENESIS" #16: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP/NAT=>0xe3a02370 <0x9fe72626 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #17: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK to replace #16 {using isakmp#3 msgid:e5afe012 proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1536} | |
"OPSGENESIS" #17: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=e5afe012 | |
"OPSGENESIS" #17: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | |
"OPSGENESIS" #17: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0xe3a02372 <0x6010ffd1 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #1: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0 | |
"OPSGENESIS" #18: responding to Quick Mode proposal {msgid:daf2a9a0} | |
"OPSGENESIS" #18: us: 10.1.0.1/32===174.34.140.250<174.34.140.250>---2.2.3.4 | |
"OPSGENESIS" #18: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27 | |
"OPSGENESIS" #18: keeping refhim=4294901761 during rekey | |
"OPSGENESIS" #18: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 | |
"OPSGENESIS" #18: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 | |
"OPSGENESIS" #18: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 | |
"OPSGENESIS" #18: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP/NAT=>0xe3a02374 <0xac36084d xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #19: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK to replace #18 {using isakmp#3 msgid:727f0f2c proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1536} | |
"OPSGENESIS" #19: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=727f0f2c | |
"OPSGENESIS" #19: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | |
"OPSGENESIS" #19: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0xe3a02376 <0x1d188be6 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #1: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0 | |
"OPSGENESIS" #20: responding to Quick Mode proposal {msgid:721257d4} | |
"OPSGENESIS" #20: us: 10.1.0.1/32===174.34.140.250<174.34.140.250>---2.2.3.4 | |
"OPSGENESIS" #20: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27 | |
"OPSGENESIS" #20: keeping refhim=4294901761 during rekey | |
"OPSGENESIS" #20: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 | |
"OPSGENESIS" #20: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 | |
"OPSGENESIS" #20: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 | |
"OPSGENESIS" #20: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP/NAT=>0xe3a02378 <0x4aa6e2d5 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #21: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK to replace #20 {using isakmp#3 msgid:a525eca3 proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1536} | |
"OPSGENESIS" #21: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=a525eca3 | |
"OPSGENESIS" #21: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | |
"OPSGENESIS" #21: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0xe3a0237a <0x87a035a1 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #1: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0 | |
"OPSGENESIS" #22: responding to Quick Mode proposal {msgid:b4e68617} | |
"OPSGENESIS" #22: us: 10.1.0.1/32===174.34.140.250<174.34.140.250>---2.2.3.4 | |
"OPSGENESIS" #22: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27 | |
"OPSGENESIS" #22: keeping refhim=4294901761 during rekey | |
"OPSGENESIS" #22: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 | |
"OPSGENESIS" #22: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 | |
"OPSGENESIS" #22: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 | |
"OPSGENESIS" #22: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP/NAT=>0xe3a0237c <0x45005241 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #23: initiating Main Mode to replace #1 | |
"OPSGENESIS" #23: received Vendor ID payload [RFC 3947] method set to=115 | |
"OPSGENESIS" #23: received Vendor ID payload [Dead Peer Detection] | |
"OPSGENESIS" #23: enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal) | |
"OPSGENESIS" #23: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2 | |
"OPSGENESIS" #23: new NAT mapping for #23, was 1.2.3.4:500, now 1.2.3.4:4500 | |
"OPSGENESIS" #23: STATE_MAIN_I2: sent MI2, expecting MR2 | |
"OPSGENESIS" #23: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed | |
"OPSGENESIS" #23: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3 | |
"OPSGENESIS" #23: STATE_MAIN_I3: sent MI3, expecting MR3 | |
"OPSGENESIS" #23: Main mode peer ID is ID_IPV4_ADDR: '1.2.3.4' | |
"OPSGENESIS" #23: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4 | |
"OPSGENESIS" #23: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536} | |
"OPSGENESIS" #1: received Delete SA payload: deleting ISAKMP State #1 | |
packet from 1.2.3.4:4500: received and ignored informational message | |
"OPSGENESIS" #24: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK to replace #22 {using isakmp#23 msgid:862c2117 proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1536} | |
"OPSGENESIS" #24: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=862c2117 | |
"OPSGENESIS" #24: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | |
"OPSGENESIS" #24: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0xe3a0237e <0x17bea5f5 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #23: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0 | |
"OPSGENESIS" #25: responding to Quick Mode proposal {msgid:cf3a0744} | |
"OPSGENESIS" #25: us: 10.1.0.1/32===174.34.140.250<174.34.140.250>---2.2.3.4 | |
"OPSGENESIS" #25: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27 | |
"OPSGENESIS" #25: keeping refhim=4294901761 during rekey | |
"OPSGENESIS" #25: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 | |
"OPSGENESIS" #25: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 | |
"OPSGENESIS" #25: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 | |
"OPSGENESIS" #25: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP/NAT=>0xe3a02380 <0x5fcee8bf xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #26: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK to replace #25 {using isakmp#23 msgid:d493a286 proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1536} | |
"OPSGENESIS" #26: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=d493a286 | |
"OPSGENESIS" #26: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | |
"OPSGENESIS" #26: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0xe3a02382 <0xdf8b6093 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #23: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0 | |
"OPSGENESIS" #27: responding to Quick Mode proposal {msgid:cea9ea6e} | |
"OPSGENESIS" #27: us: 10.1.0.1/32===174.34.140.250<174.34.140.250>---2.2.3.4 | |
"OPSGENESIS" #27: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27 | |
"OPSGENESIS" #27: keeping refhim=4294901761 during rekey | |
"OPSGENESIS" #27: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 | |
"OPSGENESIS" #27: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 | |
"OPSGENESIS" #27: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 | |
"OPSGENESIS" #27: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP/NAT=>0xe3a02384 <0xfa958123 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #28: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK to replace #27 {using isakmp#23 msgid:623cabf2 proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1536} | |
"OPSGENESIS" #28: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=623cabf2 | |
"OPSGENESIS" #28: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | |
"OPSGENESIS" #28: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0xe3a02386 <0xf099a362 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #23: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0 | |
"OPSGENESIS" #29: responding to Quick Mode proposal {msgid:b4ae32ea} | |
"OPSGENESIS" #29: us: 10.1.0.1/32===174.34.140.250<174.34.140.250>---2.2.3.4 | |
"OPSGENESIS" #29: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27 | |
"OPSGENESIS" #29: keeping refhim=4294901761 during rekey | |
"OPSGENESIS" #29: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 | |
"OPSGENESIS" #29: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 | |
"OPSGENESIS" #29: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 | |
"OPSGENESIS" #29: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP/NAT=>0xe3a02388 <0x0384841a xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #30: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK to replace #29 {using isakmp#23 msgid:9d34fdff proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1536} | |
"OPSGENESIS" #30: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=9d34fdff | |
"OPSGENESIS" #30: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | |
"OPSGENESIS" #30: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0xe3a02389 <0x0208c724 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #23: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0 | |
"OPSGENESIS" #31: responding to Quick Mode proposal {msgid:4832d1e4} | |
"OPSGENESIS" #31: us: 10.1.0.1/32===174.34.140.250<174.34.140.250>---2.2.3.4 | |
"OPSGENESIS" #31: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27 | |
"OPSGENESIS" #31: keeping refhim=4294901761 during rekey | |
"OPSGENESIS" #31: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 | |
"OPSGENESIS" #31: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 | |
"OPSGENESIS" #31: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 | |
"OPSGENESIS" #31: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP/NAT=>0xe3a0238b <0xa91a8e74 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #32: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK to replace #31 {using isakmp#23 msgid:8c96bef1 proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1536} | |
"OPSGENESIS" #32: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=8c96bef1 | |
"OPSGENESIS" #32: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | |
"OPSGENESIS" #32: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0xe3a0238d <0x86d1cae8 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #23: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0 | |
"OPSGENESIS" #33: responding to Quick Mode proposal {msgid:5723c630} | |
"OPSGENESIS" #33: us: 10.1.0.1/32===174.34.140.250<174.34.140.250>---2.2.3.4 | |
"OPSGENESIS" #33: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27 | |
"OPSGENESIS" #33: keeping refhim=4294901761 during rekey | |
"OPSGENESIS" #33: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 | |
"OPSGENESIS" #33: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 | |
"OPSGENESIS" #33: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 | |
"OPSGENESIS" #33: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP/NAT=>0xe3a0238f <0x151dc980 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #34: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK to replace #33 {using isakmp#23 msgid:d9135020 proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1536} | |
"OPSGENESIS" #34: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=d9135020 | |
"OPSGENESIS" #34: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | |
"OPSGENESIS" #34: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0xe3a02391 <0x5fb7f049 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #23: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0 | |
"OPSGENESIS" #35: responding to Quick Mode proposal {msgid:638e9d4a} | |
"OPSGENESIS" #35: us: 10.1.0.1/32===174.34.140.250<174.34.140.250>---2.2.3.4 | |
"OPSGENESIS" #35: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27 | |
"OPSGENESIS" #35: keeping refhim=4294901761 during rekey | |
"OPSGENESIS" #35: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 | |
"OPSGENESIS" #35: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 | |
"OPSGENESIS" #35: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 | |
"OPSGENESIS" #35: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP/NAT=>0xe3a02393 <0x64940c4d xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #36: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK to replace #35 {using isakmp#23 msgid:53ec9711 proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1536} | |
"OPSGENESIS" #36: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=53ec9711 | |
"OPSGENESIS" #36: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | |
"OPSGENESIS" #36: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0xe3a02395 <0x1ee33760 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #23: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0 | |
"OPSGENESIS" #37: responding to Quick Mode proposal {msgid:d96b7cf5} | |
"OPSGENESIS" #37: us: 10.1.0.1/32===174.34.140.250<174.34.140.250>---2.2.3.4 | |
"OPSGENESIS" #37: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27 | |
"OPSGENESIS" #37: keeping refhim=4294901761 during rekey | |
"OPSGENESIS" #37: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 | |
"OPSGENESIS" #37: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 | |
"OPSGENESIS" #37: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 | |
"OPSGENESIS" #37: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP/NAT=>0xe3a02397 <0x6800eaf6 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #38: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK to replace #37 {using isakmp#23 msgid:69f5d5cd proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1536} | |
"OPSGENESIS" #38: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=69f5d5cd | |
"OPSGENESIS" #38: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | |
"OPSGENESIS" #38: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0xe3a02399 <0x95212c03 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #23: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0 | |
"OPSGENESIS" #39: responding to Quick Mode proposal {msgid:da7a1c61} | |
"OPSGENESIS" #39: us: 10.1.0.1/32===174.34.140.250<174.34.140.250>---2.2.3.4 | |
"OPSGENESIS" #39: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27 | |
"OPSGENESIS" #39: keeping refhim=4294901761 during rekey | |
"OPSGENESIS" #39: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 | |
"OPSGENESIS" #39: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 | |
"OPSGENESIS" #39: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 | |
"OPSGENESIS" #39: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP/NAT=>0xe3a0239b <0xaaa0b153 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #40: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK to replace #39 {using isakmp#23 msgid:2d341de9 proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1536} | |
"OPSGENESIS" #40: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=2d341de9 | |
"OPSGENESIS" #40: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | |
"OPSGENESIS" #40: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0xe3a0239d <0x2ca9e8de xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #41: initiating Main Mode to replace #23 | |
"OPSGENESIS" #41: received Vendor ID payload [RFC 3947] method set to=115 | |
"OPSGENESIS" #41: received Vendor ID payload [Dead Peer Detection] | |
"OPSGENESIS" #41: enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal) | |
"OPSGENESIS" #41: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2 | |
"OPSGENESIS" #41: new NAT mapping for #41, was 1.2.3.4:500, now 1.2.3.4:4500 | |
"OPSGENESIS" #41: STATE_MAIN_I2: sent MI2, expecting MR2 | |
"OPSGENESIS" #41: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed | |
"OPSGENESIS" #41: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3 | |
"OPSGENESIS" #41: STATE_MAIN_I3: sent MI3, expecting MR3 | |
"OPSGENESIS" #41: Main mode peer ID is ID_IPV4_ADDR: '1.2.3.4' | |
"OPSGENESIS" #41: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4 | |
"OPSGENESIS" #41: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536} | |
"OPSGENESIS" #41: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0 | |
"OPSGENESIS" #42: responding to Quick Mode proposal {msgid:51283b17} | |
"OPSGENESIS" #42: us: 10.1.0.1/32===174.34.140.250<174.34.140.250>---2.2.3.4 | |
"OPSGENESIS" #42: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27 | |
"OPSGENESIS" #42: keeping refhim=4294901761 during rekey | |
"OPSGENESIS" #42: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 | |
"OPSGENESIS" #42: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 | |
"OPSGENESIS" #42: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 | |
"OPSGENESIS" #42: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP/NAT=>0xe3a0239f <0xea49f324 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #43: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK to replace #42 {using isakmp#41 msgid:441812a1 proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1536} | |
"OPSGENESIS" #43: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=441812a1 | |
"OPSGENESIS" #43: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | |
"OPSGENESIS" #43: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0xe3a023a1 <0x8e10d5c9 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #41: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0 | |
"OPSGENESIS" #44: responding to Quick Mode proposal {msgid:1bce3fdc} | |
"OPSGENESIS" #44: us: 10.1.0.1/32===174.34.140.250<174.34.140.250>---2.2.3.4 | |
"OPSGENESIS" #44: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27 | |
"OPSGENESIS" #44: keeping refhim=4294901761 during rekey | |
"OPSGENESIS" #44: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 | |
"OPSGENESIS" #44: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 | |
"OPSGENESIS" #44: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 | |
"OPSGENESIS" #44: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP/NAT=>0xe3a023a3 <0x57a8e3d4 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #45: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK to replace #44 {using isakmp#41 msgid:a9a5b37d proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1536} | |
"OPSGENESIS" #45: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=a9a5b37d | |
"OPSGENESIS" #45: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | |
"OPSGENESIS" #45: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0xe3a023a4 <0xf3cc79ee xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0 | |
"OPSGENESIS" #46: responding to Quick Mode proposal {msgid:9c63fdd0} | |
"OPSGENESIS" #46: us: 10.1.0.1/32===174.34.140.250<174.34.140.250>---2.2.3.4 | |
"OPSGENESIS" #46: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27 | |
"OPSGENESIS" #46: keeping refhim=4294901761 during rekey | |
"OPSGENESIS" #46: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 | |
"OPSGENESIS" #46: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 | |
"OPSGENESIS" #46: next payload type of ISAKMP Hash Payload has an unknown value: 79 | |
"OPSGENESIS" #46: malformed payload in packet | |
| payload malformed after IV | |
| ed 4c 11 a7 90 5c 1b 9b | |
"OPSGENESIS" #46: sending notification PAYLOAD_MALFORMED to 1.2.3.4:4500 | |
"OPSGENESIS" #46: next payload type of ISAKMP Hash Payload has an unknown value: 79 | |
"OPSGENESIS" #46: malformed payload in packet | |
| payload malformed after IV | |
| ed 4c 11 a7 90 5c 1b 9b | |
"OPSGENESIS" #46: sending notification PAYLOAD_MALFORMED to 1.2.3.4:4500 | |
"OPSGENESIS" #46: next payload type of ISAKMP Hash Payload has an unknown value: 79 | |
"OPSGENESIS" #46: malformed payload in packet | |
| payload malformed after IV | |
| ed 4c 11 a7 90 5c 1b 9b | |
"OPSGENESIS" #46: sending notification PAYLOAD_MALFORMED to 1.2.3.4:4500 | |
"OPSGENESIS" #46: next payload type of ISAKMP Hash Payload has an unknown value: 79 | |
"OPSGENESIS" #46: malformed payload in packet | |
| payload malformed after IV | |
| ed 4c 11 a7 90 5c 1b 9b | |
"OPSGENESIS" #46: sending notification PAYLOAD_MALFORMED to 1.2.3.4:4500 | |
"OPSGENESIS" #46: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 | |
"OPSGENESIS" #46: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP/NAT=>0xe3a023a6 <0x048ca07a xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #47: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK to replace #46 {using isakmp#41 msgid:19ebcf61 proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1536} | |
"OPSGENESIS" #47: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=19ebcf61 | |
"OPSGENESIS" #47: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | |
"OPSGENESIS" #47: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0xe3a023a8 <0xb29177ae xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #41: received Delete SA payload: replace IPSEC State #47 in 10 seconds | |
"OPSGENESIS" #41: received and ignored informational message | |
"OPSGENESIS" #41: received Delete SA payload: deleting ISAKMP State #41 | |
packet from 1.2.3.4:4500: received and ignored informational message | |
packet from 1.2.3.4:500: received Vendor ID payload [RFC 3947] method set to=115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115 | |
packet from 1.2.3.4:500: ignoring unknown Vendor ID payload [16f6ca16e4a4066d83821a0f0aeaa862] | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00] | |
packet from 1.2.3.4:500: received Vendor ID payload [Dead Peer Detection] | |
"OPSGENESIS" #48: responding to Main Mode | |
"OPSGENESIS" #48: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1 | |
"OPSGENESIS" #48: STATE_MAIN_R1: sent MR1, expecting MI2 | |
packet from 1.2.3.4:500: received Vendor ID payload [RFC 3947] method set to=115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115 | |
packet from 1.2.3.4:500: ignoring unknown Vendor ID payload [16f6ca16e4a4066d83821a0f0aeaa862] | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00] | |
packet from 1.2.3.4:500: received Vendor ID payload [Dead Peer Detection] | |
"OPSGENESIS" #49: responding to Main Mode | |
"OPSGENESIS" #49: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1 | |
"OPSGENESIS" #49: STATE_MAIN_R1: sent MR1, expecting MI2 | |
packet from 1.2.3.4:500: received Vendor ID payload [RFC 3947] method set to=115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115 | |
packet from 1.2.3.4:500: ignoring unknown Vendor ID payload [16f6ca16e4a4066d83821a0f0aeaa862] | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00] | |
packet from 1.2.3.4:500: received Vendor ID payload [Dead Peer Detection] | |
"OPSGENESIS" #50: responding to Main Mode | |
"OPSGENESIS" #50: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1 | |
"OPSGENESIS" #50: STATE_MAIN_R1: sent MR1, expecting MI2 | |
"OPSGENESIS" #50: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed | |
"OPSGENESIS" #50: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2 | |
"OPSGENESIS" #50: STATE_MAIN_R2: sent MR2, expecting MI3 | |
"OPSGENESIS" #50: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000 | |
"OPSGENESIS" #50: Main mode peer ID is ID_IPV4_ADDR: '1.2.3.4' | |
"OPSGENESIS" #50: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3 | |
"OPSGENESIS" #50: new NAT mapping for #50, was 1.2.3.4:500, now 1.2.3.4:4500 | |
"OPSGENESIS" #50: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536} | |
"OPSGENESIS" #50: retransmitting in response to duplicate packet; already STATE_MAIN_R3 | |
"OPSGENESIS" #51: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK to replace #47 {using isakmp#50 msgid:2e26e9d3 proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1536} | |
packet from 1.2.3.4:500: received Vendor ID payload [RFC 3947] method set to=115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115 | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115 | |
packet from 1.2.3.4:500: ignoring unknown Vendor ID payload [16f6ca16e4a4066d83821a0f0aeaa862] | |
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00] | |
packet from 1.2.3.4:500: received Vendor ID payload [Dead Peer Detection] | |
"OPSGENESIS" #52: responding to Main Mode | |
"OPSGENESIS" #52: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1 | |
"OPSGENESIS" #52: STATE_MAIN_R1: sent MR1, expecting MI2 | |
"OPSGENESIS" #52: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed | |
"OPSGENESIS" #52: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2 | |
"OPSGENESIS" #52: STATE_MAIN_R2: sent MR2, expecting MI3 | |
"OPSGENESIS" #52: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000 | |
"OPSGENESIS" #52: Main mode peer ID is ID_IPV4_ADDR: '1.2.3.4' | |
"OPSGENESIS" #52: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3 | |
"OPSGENESIS" #52: new NAT mapping for #52, was 1.2.3.4:500, now 1.2.3.4:4500 | |
"OPSGENESIS" #52: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536} | |
"OPSGENESIS" #47: IPsec SA expired (LATEST!) | |
"OPSGENESIS" #52: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0 | |
"OPSGENESIS" #53: responding to Quick Mode proposal {msgid:44373028} | |
"OPSGENESIS" #53: us: 10.1.0.1/32===174.34.140.250<174.34.140.250>---2.2.3.4 | |
"OPSGENESIS" #53: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27 | |
"OPSGENESIS" #53: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 | |
"OPSGENESIS" #53: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 | |
"OPSGENESIS" #53: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 | |
"OPSGENESIS" #53: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP/NAT=>0xe3a023aa <0xb05443da xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} | |
"OPSGENESIS" #52: DPD: received old or duplicate R_U_THERE | |
"OPSGENESIS" #48: max number of retransmissions (2) reached STATE_MAIN_R1 | |
"OPSGENESIS" #49: max number of retransmissions (2) reached STATE_MAIN_R1 | |
"OPSGENESIS" #51: max number of retransmissions (2) reached STATE_QUICK_I1 | |
"OPSGENESIS" #51: starting keying attempt 2 of an unlimited number | |
"OPSGENESIS" #54: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK to replace #51 {using isakmp#52 msgid:f65b517f proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1536} | |
"OPSGENESIS" #54: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=f65b517f | |
"OPSGENESIS" #54: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | |
"OPSGENESIS" #54: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0xe3a023ab <0x474f2bf9 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment