Skip to content

Instantly share code, notes, and snippets.

@zacharyblank
Created October 13, 2014 16:41
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save zacharyblank/e1959174fedfd4f49fd5 to your computer and use it in GitHub Desktop.
Save zacharyblank/e1959174fedfd4f49fd5 to your computer and use it in GitHub Desktop.
syslog
Oct 13 16:39:53 ipsec-vpn charon: 09[NET] received packet: from 184.152.76.63[500] to 162.242.170.217[500]
Oct 13 16:39:53 ipsec-vpn charon: 09[NET] waiting for data on sockets
Oct 13 16:39:53 ipsec-vpn charon: 16[NET] received packet: from 184.152.76.63[500] to 162.242.170.217[500] (668 bytes)
Oct 13 16:39:53 ipsec-vpn charon: 16[ENC] parsed ID_PROT request 0 [ SA V V V V V V V V V V V V V V ]
Oct 13 16:39:53 ipsec-vpn charon: 16[CFG] looking for an ike config for 162.242.170.217...184.152.76.63
Oct 13 16:39:53 ipsec-vpn charon: 16[CFG] candidate: %any...%any, prio 28
Oct 13 16:39:53 ipsec-vpn charon: 16[CFG] found matching ike config: %any...%any with prio 28
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] received NAT-T (RFC 3947) vendor ID
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] received draft-ietf-ipsec-nat-t-ike vendor ID
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] received draft-ietf-ipsec-nat-t-ike-08 vendor ID
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] received draft-ietf-ipsec-nat-t-ike-07 vendor ID
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] received draft-ietf-ipsec-nat-t-ike-06 vendor ID
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] received draft-ietf-ipsec-nat-t-ike-05 vendor ID
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] received draft-ietf-ipsec-nat-t-ike-04 vendor ID
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] received draft-ietf-ipsec-nat-t-ike-03 vendor ID
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor ID
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] received XAuth vendor ID
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] received Cisco Unity vendor ID
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] received FRAGMENTATION vendor ID
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] received DPD vendor ID
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] 184.152.76.63 is initiating a Main Mode IKE_SA
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] IKE_SA (unnamed)[1] state change: CREATED => CONNECTING
Oct 13 16:39:53 ipsec-vpn charon: 16[CFG] selecting proposal:
Oct 13 16:39:53 ipsec-vpn charon: 16[CFG] proposal matches
Oct 13 16:39:53 ipsec-vpn charon: 16[CFG] received proposals: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536, IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1536, IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024, IKE:AES_CBC_128/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024, IKE:DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024
Oct 13 16:39:53 ipsec-vpn charon: 16[CFG] configured proposals: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536, IKE:AES_CBC_256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_1024, IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Oct 13 16:39:53 ipsec-vpn charon: 16[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] sending XAuth vendor ID
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] sending DPD vendor ID
Oct 13 16:39:53 ipsec-vpn charon: 16[IKE] sending NAT-T (RFC 3947) vendor ID
Oct 13 16:39:53 ipsec-vpn charon: 16[ENC] generating ID_PROT response 0 [ SA V V V ]
Oct 13 16:39:53 ipsec-vpn charon: 16[NET] sending packet: from 162.242.170.217[500] to 184.152.76.63[500] (136 bytes)
Oct 13 16:39:53 ipsec-vpn charon: 10[NET] sending packet: from 162.242.170.217[500] to 184.152.76.63[500]
Oct 13 16:39:53 ipsec-vpn charon: 09[NET] received packet: from 184.152.76.63[500] to 162.242.170.217[500]
Oct 13 16:39:53 ipsec-vpn charon: 09[NET] waiting for data on sockets
Oct 13 16:39:53 ipsec-vpn charon: 05[NET] received packet: from 184.152.76.63[500] to 162.242.170.217[500] (292 bytes)
Oct 13 16:39:53 ipsec-vpn charon: 05[ENC] parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
Oct 13 16:39:53 ipsec-vpn charon: 05[IKE] remote host is behind NAT
Oct 13 16:39:53 ipsec-vpn charon: 05[IKE] sending cert request for "C=CH, O=strongSwan, CN=strongSwan Root CA"
Oct 13 16:39:53 ipsec-vpn charon: 05[ENC] generating ID_PROT response 0 [ KE No CERTREQ NAT-D NAT-D ]
Oct 13 16:39:53 ipsec-vpn charon: 05[NET] sending packet: from 162.242.170.217[500] to 184.152.76.63[500] (378 bytes)
Oct 13 16:39:53 ipsec-vpn charon: 10[NET] sending packet: from 162.242.170.217[500] to 184.152.76.63[500]
Oct 13 16:40:23 ipsec-vpn charon: 04[JOB] deleting half open IKE_SA after timeout
Oct 13 16:40:23 ipsec-vpn charon: 04[IKE] IKE_SA (unnamed)[1] state change: CONNECTING => DESTROYING
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment