Created
October 13, 2014 16:41
-
-
Save zacharyblank/e1959174fedfd4f49fd5 to your computer and use it in GitHub Desktop.
syslog
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oct 13 16:39:53 ipsec-vpn charon: 09[NET] received packet: from 184.152.76.63[500] to 162.242.170.217[500] | |
Oct 13 16:39:53 ipsec-vpn charon: 09[NET] waiting for data on sockets | |
Oct 13 16:39:53 ipsec-vpn charon: 16[NET] received packet: from 184.152.76.63[500] to 162.242.170.217[500] (668 bytes) | |
Oct 13 16:39:53 ipsec-vpn charon: 16[ENC] parsed ID_PROT request 0 [ SA V V V V V V V V V V V V V V ] | |
Oct 13 16:39:53 ipsec-vpn charon: 16[CFG] looking for an ike config for 162.242.170.217...184.152.76.63 | |
Oct 13 16:39:53 ipsec-vpn charon: 16[CFG] candidate: %any...%any, prio 28 | |
Oct 13 16:39:53 ipsec-vpn charon: 16[CFG] found matching ike config: %any...%any with prio 28 | |
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] received NAT-T (RFC 3947) vendor ID | |
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] received draft-ietf-ipsec-nat-t-ike vendor ID | |
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] received draft-ietf-ipsec-nat-t-ike-08 vendor ID | |
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] received draft-ietf-ipsec-nat-t-ike-07 vendor ID | |
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] received draft-ietf-ipsec-nat-t-ike-06 vendor ID | |
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] received draft-ietf-ipsec-nat-t-ike-05 vendor ID | |
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] received draft-ietf-ipsec-nat-t-ike-04 vendor ID | |
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] received draft-ietf-ipsec-nat-t-ike-03 vendor ID | |
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor ID | |
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID | |
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] received XAuth vendor ID | |
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] received Cisco Unity vendor ID | |
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] received FRAGMENTATION vendor ID | |
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] received DPD vendor ID | |
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] 184.152.76.63 is initiating a Main Mode IKE_SA | |
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] IKE_SA (unnamed)[1] state change: CREATED => CONNECTING | |
Oct 13 16:39:53 ipsec-vpn charon: 16[CFG] selecting proposal: | |
Oct 13 16:39:53 ipsec-vpn charon: 16[CFG] proposal matches | |
Oct 13 16:39:53 ipsec-vpn charon: 16[CFG] received proposals: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536, IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1536, IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024, IKE:AES_CBC_128/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024, IKE:DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024 | |
Oct 13 16:39:53 ipsec-vpn charon: 16[CFG] configured proposals: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536, IKE:AES_CBC_256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_1024, IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024 | |
Oct 13 16:39:53 ipsec-vpn charon: 16[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536 | |
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] sending XAuth vendor ID | |
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] sending DPD vendor ID | |
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] sending NAT-T (RFC 3947) vendor ID | |
Oct 13 16:39:53 ipsec-vpn charon: 16[ENC] generating ID_PROT response 0 [ SA V V V ] | |
Oct 13 16:39:53 ipsec-vpn charon: 16[NET] sending packet: from 162.242.170.217[500] to 184.152.76.63[500] (136 bytes) | |
Oct 13 16:39:53 ipsec-vpn charon: 10[NET] sending packet: from 162.242.170.217[500] to 184.152.76.63[500] | |
Oct 13 16:39:53 ipsec-vpn charon: 09[NET] received packet: from 184.152.76.63[500] to 162.242.170.217[500] | |
Oct 13 16:39:53 ipsec-vpn charon: 09[NET] waiting for data on sockets | |
Oct 13 16:39:53 ipsec-vpn charon: 05[NET] received packet: from 184.152.76.63[500] to 162.242.170.217[500] (292 bytes) | |
Oct 13 16:39:53 ipsec-vpn charon: 05[ENC] parsed ID_PROT request 0 [ KE No NAT-D NAT-D ] | |
Oct 13 16:39:53 ipsec-vpn charon: 05[IKE] remote host is behind NAT | |
Oct 13 16:39:53 ipsec-vpn charon: 05[IKE] sending cert request for "C=CH, O=strongSwan, CN=strongSwan Root CA" | |
Oct 13 16:39:53 ipsec-vpn charon: 05[ENC] generating ID_PROT response 0 [ KE No CERTREQ NAT-D NAT-D ] | |
Oct 13 16:39:53 ipsec-vpn charon: 05[NET] sending packet: from 162.242.170.217[500] to 184.152.76.63[500] (378 bytes) | |
Oct 13 16:39:53 ipsec-vpn charon: 10[NET] sending packet: from 162.242.170.217[500] to 184.152.76.63[500] | |
Oct 13 16:40:23 ipsec-vpn charon: 04[JOB] deleting half open IKE_SA after timeout | |
Oct 13 16:40:23 ipsec-vpn charon: 04[IKE] IKE_SA (unnamed)[1] state change: CONNECTING => DESTROYING |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment