[Openswan Users] pluto restarting
Michael Tinsay
tinsami1 at yahoo.com
Mon Dec 5 08:59:38 CET 2005
Skipped content of type multipart/alternative-------------- next part --------------
Dec 5 11:57:28 SiteA_VPN pluto[8537]: packet from siteB.x.y.z:500: ignoring Vendor ID payload [4f457a7d4646466667725f65]
Dec 5 11:57:28 SiteA_VPN pluto[8537]: packet from siteB.x.y.z:500: received Vendor ID payload [Dead Peer Detection]
Dec 5 11:57:28 SiteA_VPN pluto[8537]: packet from siteB.x.y.z:500: ignoring Vendor ID payload [4a131c81070358455c5728f20e95452f]
Dec 5 11:57:28 SiteA_VPN pluto[8537]: packet from siteB.x.y.z:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
Dec 5 11:57:28 SiteA_VPN pluto[8537]: packet from siteB.x.y.z:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 108
Dec 5 11:57:28 SiteA_VPN pluto[8537]: packet from siteB.x.y.z:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Dec 5 11:57:28 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #9: responding to Main Mode from unknown peer siteB.x.y.z
Dec 5 11:57:28 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #9: transition from state (null) to state STATE_MAIN_R1
Dec 5 11:57:30 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #9: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-02/03: no NAT detected
Dec 5 11:57:30 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #9: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Dec 5 11:57:31 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #9: Peer ID is ID_FQDN: '@SiteD'
Dec 5 11:57:31 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #9: I did not send a certificate because I do not have one.
Dec 5 11:57:31 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #9: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Dec 5 11:57:31 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #9: sent MR3, ISAKMP SA established
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: responding to Quick Mode
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: ASSERTION FAILED at kernel.c:2037: st->st_esp.keymat_len == (key_len + ei->authkeylen)
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: interface ipsec0/eth0 siteA.x.y.z
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: interface ipsec0/eth0 siteA.x.y.z
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: %myid = (none)
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: debug none
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10:
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: algorithm ESP encrypt: id=3, name=ESP_3DES, ivlen=64, keysizemin=168, keysizemax=168
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: algorithm ESP encrypt: id=12, name=ESP_AES, ivlen=128, keysizemin=128, keysizemax=256
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: algorithm ESP auth attr: id=1, name=AUTH_ALGORITHM_HMAC_MD5, keysizemin=128, keysizemax=128
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: algorithm ESP auth attr: id=2, name=AUTH_ALGORITHM_HMAC_SHA1, keysizemin=160, keysizemax=160
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: algorithm ESP auth attr: id=9, name=AUTH_ALGORITHM_ID9, keysizemin=128, keysizemax=128
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10:
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: algorithm IKE encrypt: id=7, name=OAKLEY_AES_CBC, blocksize=16, keydeflen=128
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: algorithm IKE encrypt: id=5, name=OAKLEY_3DES_CBC, blocksize=8, keydeflen=192
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: algorithm IKE hash: id=2, name=OAKLEY_SHA, hashsize=20
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: algorithm IKE hash: id=1, name=OAKLEY_MD5, hashsize=16
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: algorithm IKE dh group: id=2, name=OAKLEY_GROUP_MODP1024, bits=1024
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: algorithm IKE dh group: id=5, name=OAKLEY_GROUP_MODP1536, bits=1536
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: algorithm IKE dh group: id=14, name=OAKLEY_GROUP_MODP2048, bits=2048
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: algorithm IKE dh group: id=15, name=OAKLEY_GROUP_MODP3072, bits=3072
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: algorithm IKE dh group: id=16, name=OAKLEY_GROUP_MODP4096, bits=4096
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: algorithm IKE dh group: id=17, name=OAKLEY_GROUP_MODP6144, bits=6144
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: algorithm IKE dh group: id=18, name=OAKLEY_GROUP_MODP8192, bits=8192
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10:
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: stats db_ops.c: {curr_cnt, total_cnt, maxsz} :context={0,16,36} trans={0,16,96} attrs={0,16,160}
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10:
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteC": 192.200.2.0/24===siteA.x.y.z[@SiteA]---siteA.a.b.c...siteA.a.b.c---siteC.x.y.z[@SiteC]===192.168.3.0/24; erouted; eroute owner: #8
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteC": ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteC": policy: RSASIG+ENCRYPT+TUNNEL+PFS+UP; prio: 24,24; interface: eth0;
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteC": newest ISAKMP SA: #2; newest IPsec SA: #8;
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteC": IKE algorithms wanted: 5_000-1-5, 5_000-1-2, 5_000-2-5, 5_000-2-2, flags=-strict
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteC": IKE algorithms found: 5_192-1_128-5, 5_192-1_128-2, 5_192-2_160-5, 5_192-2_160-2,
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteC": IKE algorithm newest: 3DES_CBC_192-MD5-MODP1536
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteC": ESP algorithms wanted: 3_000-1, 3_000-2, flags=-strict
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteC": ESP algorithms loaded: 3_000-1, 3_000-2, flags=-strict
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteC": ESP algorithm newest: 3DES_0-HMAC_MD5; pfsgroup=<Phase1>
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteB": 192.200.2.0/24===siteA.x.y.z[@SiteA]---siteA.a.b.c...siteA.a.b.c---siteB.x.y.z[@SiteB]===192.200.8.0/24; erouted; eroute owner: #7
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteB": ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteB": policy: RSASIG+ENCRYPT+TUNNEL+PFS+UP; prio: 24,24; interface: eth0;
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteB": newest ISAKMP SA: #1; newest IPsec SA: #7;
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteB": IKE algorithms wanted: 5_000-1-5, 5_000-1-2, 5_000-2-5, 5_000-2-2, flags=-strict
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteB": IKE algorithms found: 5_192-1_128-5, 5_192-1_128-2, 5_192-2_160-5, 5_192-2_160-2,
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteB": IKE algorithm newest: 3DES_CBC_192-MD5-MODP1536
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteB": ESP algorithms wanted: 3_000-1, 3_000-2, flags=-strict
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteB": ESP algorithms loaded: 3_000-1, 3_000-2, flags=-strict
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteB": ESP algorithm newest: 3DES_0-HMAC_MD5; pfsgroup=<Phase1>
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteD": 192.200.2.0/24===siteA.x.y.z[@SiteA]...%any[@SiteD]===192.168.2.0/24; unrouted; eroute owner: #0
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteD": ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 3
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteD": policy: PSK+ENCRYPT+TUNNEL; prio: 24,24; interface: eth0;
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteD": newest ISAKMP SA: #0; newest IPsec SA: #0;
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteD": IKE algorithms wanted: 5_000-1-5, 5_000-1-2, 5_000-2-5, 5_000-2-2, flags=-strict
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteD": IKE algorithms found: 5_192-1_128-5, 5_192-1_128-2, 5_192-2_160-5, 5_192-2_160-2,
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteD": ESP algorithms wanted: 3_000-1, 3_000-2, flags=-strict
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteD": ESP algorithms loaded: 3_000-1, 3_000-2, flags=-strict
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteD"[1]: 192.200.2.0/24===siteA.x.y.z[@SiteA]...siteB.x.y.z[@SiteD]===192.168.2.0/24; unrouted; eroute owner: #0
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteD"[1]: ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 3
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteD"[1]: policy: PSK+ENCRYPT+TUNNEL; prio: 24,24; interface: eth0;
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteD"[1]: newest ISAKMP SA: #9; newest IPsec SA: #0;
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteD"[1]: IKE algorithms wanted: 5_000-1-5, 5_000-1-2, 5_000-2-5, 5_000-2-2, flags=-strict
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteD"[1]: IKE algorithms found: 5_192-1_128-5, 5_192-1_128-2, 5_192-2_160-5, 5_192-2_160-2,
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteD"[1]: IKE algorithm newest: 3DES_CBC_192-MD5-MODP1536
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteD"[1]: ESP algorithms wanted: 3_000-1, 3_000-2, flags=-strict
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: "SiteD"[1]: ESP algorithms loaded: 3_000-1, 3_000-2, flags=-strict
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10:
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: #8: "SiteC" STATE_QUICK_I2 (sent QI2, IPsec SA established); EVENT_SA_REPLACE in28174s; newest IPSEC; eroute owner
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: #8: "SiteC" esp.eb0a651f at siteC.x.y.z esp.4d67ed0f at siteA.x.y.z tun.100c at siteC.x.y.z tun.100b at siteA.x.y.z
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: #2: "SiteC" STATE_MAIN_I4 (ISAKMP SA established); EVENT_SA_REPLACE in 2915s; newest ISAKMP
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: #7: "SiteB" STATE_QUICK_I2 (sent QI2, IPsec SA established); EVENT_SA_REPLACE in 27901s; newest IPSEC; eroute owner
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: #7: "SiteB" esp.beffef5c at siteB.x.y.z esp.4d67ed0e at siteA.x.y.z tun.100a at siteB.x.y.z tun.1009 at siteA.x.y.z
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: #6: "SiteB" STATE_QUICK_I2 (sent QI2, IPsec SA established); EVENT_SA_REPLACE in 28111s
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: #6: "SiteB" esp.beffef5b at siteB.x.y.z esp.4d67ed0d at siteA.x.y.z tun.1008 at siteB.x.y.z tun.1007 at siteA.x.y.z
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: #5: "SiteB" STATE_QUICK_I2 (sent QI2, IPsec SA established); EVENT_SA_REPLACE in 27927s
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: #5: "SiteB" esp.beffef5a at siteB.x.y.z esp.4d67ed0c at siteA.x.y.z tun.1006 at siteB.x.y.z tun.1005 at siteA.x.y.z
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: #4: "SiteB" STATE_QUICK_I2 (sent QI2, IPsec SA established); EVENT_SA_REPLACE in 27989s
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: #4: "SiteB" esp.beffef59 at siteB.x.y.z esp.4d67ed0b at siteA.x.y.z tun.1004 at siteB.x.y.z tun.1003 at siteA.x.y.z
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: #3: "SiteB" STATE_QUICK_I2 (sent QI2, IPsec SA established); EVENT_SA_REPLACE in 28138s
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: #3: "SiteB" esp.beffef58 at siteB.x.y.z esp.4d67ed0a at siteA.x.y.z tun.1002 at siteB.x.y.z tun.1001 at siteA.x.y.z
Dec 5 11:57:33 SiteA_VPN pluto[8537]: "SiteD"[1] siteB.x.y.z #10: #1: "SiteB" STATE_MAIN_I4 (ISAKMP SA established); EVENT_SA_REPLACE in 2828s; newest ISAKMP
Dec 5 11:57:43 SiteA_VPN ipsec__plutorun: Restarting Pluto subsystem...
Dec 5 11:57:43 SiteA_VPN pluto[8789]: Starting Pluto (Openswan Version 2.2.1 X.509-1.5.4 PLUTO_USES_KEYRR)
Dec 5 11:57:43 SiteA_VPN pluto[8789]: including NAT-Traversal patch (Version 0.6c)
Dec 5 11:57:43 SiteA_VPN pluto[8789]: ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
Dec 5 11:57:43 SiteA_VPN pluto[8789]: Using KLIPS IPsec interface code
Dec 5 11:57:43 SiteA_VPN pluto[8789]: Changing to directory '/etc/ipsec.d/cacerts'
Dec 5 11:57:43 SiteA_VPN pluto[8789]: loaded CA cert file 'cacert.pem' (1119 bytes)
Dec 5 11:57:43 SiteA_VPN pluto[8789]: Could not change to directory '/etc/ipsec.d/aacerts'
Dec 5 11:57:43 SiteA_VPN pluto[8789]: Changing to directory '/etc/ipsec.d/ocspcerts'
Dec 5 11:57:43 SiteA_VPN pluto[8789]: Changing to directory '/etc/ipsec.d/crls'
Dec 5 11:57:43 SiteA_VPN pluto[8789]: loaded crl file 'crl.pem' (455 bytes)
Dec 5 11:57:44 SiteA_VPN pluto[8789]: added connection description "SiteC"
Dec 5 11:57:44 SiteA_VPN pluto[8789]: added connection description "SiteD"
Dec 5 11:57:44 SiteA_VPN pluto[8789]: added connection description "SiteB"
Dec 5 11:57:44 SiteA_VPN pluto[8789]: listening for IKE messages
Dec 5 11:57:44 SiteA_VPN pluto[8789]: adding interface ipsec0/eth0 siteA.x.y.z
Dec 5 11:57:44 SiteA_VPN pluto[8789]: adding interface ipsec0/eth0 siteA.x.y.z:4500
Dec 5 11:57:44 SiteA_VPN pluto[8789]: loading secrets from "/etc/ipsec.secrets"
Dec 5 11:57:44 SiteA_VPN pluto[8789]: packet from siteB.x.y.z:500: Informational Exchange is for an unknown (expired?) SA
Dec 5 11:57:44 SiteA_VPN pluto[8789]: "SiteC" #1: initiating Main Mode
Dec 5 11:57:44 SiteA_VPN pluto[8789]: "SiteB" #2: initiating Main Mode
Dec 5 11:57:44 SiteA_VPN pluto[8789]: "SiteC" #1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
Dec 5 11:57:44 SiteA_VPN pluto[8789]: "SiteB" #2: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
Dec 5 11:57:44 SiteA_VPN pluto[8789]: "SiteC" #1: I did not send a certificate because I do not have one.
Dec 5 11:57:44 SiteA_VPN pluto[8789]: "SiteC" #1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
Dec 5 11:57:44 SiteA_VPN pluto[8789]: "SiteB" #2: I did not send a certificate because I do not have one.
Dec 5 11:57:44 SiteA_VPN pluto[8789]: "SiteB" #2: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
Dec 5 11:57:44 SiteA_VPN pluto[8789]: "SiteC" #1: Peer ID is ID_FQDN: '@SiteC'
Dec 5 11:57:44 SiteA_VPN pluto[8789]: "SiteC" #1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
Dec 5 11:57:44 SiteA_VPN pluto[8789]: "SiteC" #1: ISAKMP SA established
Dec 5 11:57:44 SiteA_VPN pluto[8789]: "SiteC" #3: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP {using isakmp#1}
Dec 5 11:57:44 SiteA_VPN pluto[8789]: packet from siteC.x.y.z:500: Main Mode message is part of an unknown exchange
Dec 5 11:57:45 SiteA_VPN pluto[8789]: "SiteB" #2: Peer ID is ID_FQDN: '@SiteB'
Dec 5 11:57:45 SiteA_VPN pluto[8789]: "SiteB" #2: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
Dec 5 11:57:45 SiteA_VPN pluto[8789]: "SiteB" #2: ISAKMP SA established
Dec 5 11:57:45 SiteA_VPN pluto[8789]: "SiteB" #4: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP {using isakmp#2}
Dec 5 11:57:45 SiteA_VPN pluto[8789]: "SiteB" #5: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP {using isakmp#2}
Dec 5 11:57:45 SiteA_VPN pluto[8789]: "SiteC" #3: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
Dec 5 11:57:45 SiteA_VPN pluto[8789]: "SiteC" #3: sent QI2, IPsec SA established {ESP=>0xeb0a6520 <0xe791e34d}
Dec 5 11:57:45 SiteA_VPN pluto[8789]: "SiteB" #4: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
Dec 5 11:57:45 SiteA_VPN pluto[8789]: "SiteB" #4: sent QI2, IPsec SA established {ESP=>0xbeffef5d <0xe791e34e}
Dec 5 11:57:45 SiteA_VPN pluto[8789]: "SiteB" #5: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
Dec 5 11:57:45 SiteA_VPN pluto[8789]: "SiteB" #5: sent QI2, IPsec SA established {ESP=>0xbeffef5e <0xe791e34f}
Dec 5 11:58:02 SiteA_VPN pluto[8789]: packet from siteB.x.y.z:500: Informational Exchange is for an unknown (expired?) SA
Dec 5 11:58:56 SiteA_VPN pluto[8789]: packet from siteB.x.y.z:500: ignoring Vendor ID payload [4f457a7d4646466667725f65]
Dec 5 11:58:56 SiteA_VPN pluto[8789]: packet from siteB.x.y.z:500: received Vendor ID payload [Dead Peer Detection]
De
More information about the Users
mailing list