[Openswan Users] netlink XFRM_MSG_NEWPOLICY response for flow

Marco Berizzi pupilla at hotmail.com
Tue Nov 7 10:46:40 EST 2006


Opps, I was forgotting. This is /var/log/secure taken
on the rebooted system:

Nov  7 03:42:52 Halley pluto[693]: shutting down
Nov  7 03:42:52 Halley pluto[693]: forgetting secrets
Nov  7 03:42:52 Halley pluto[693]: "milano": deleting connection
Nov  7 03:42:52 Halley pluto[693]: "milano" #569: deleting state 
(STATE_QUICK_I2)
Nov  7 03:42:53 Halley pluto[693]: "milano" #616: deleting state 
(STATE_MAIN_I4)
Nov  7 03:42:54 Halley pluto[693]: shutting down interface eth0/eth0 
ip_halley:500
Nov  7 03:42:54 Halley pluto[693]: shutting down interface eth2/eth2 
172.23.1.8:500
Nov  7 03:43:45 Halley ipsec__plutorun: Starting Pluto subsystem...
Nov  7 03:43:45 Halley pluto[689]: Starting Pluto (Openswan Version 2.4.6 
X.509-1.5.4 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR; Vendor ID OEN|EMqk_Mlg)
Nov  7 03:43:45 Halley pluto[689]: Setting NAT-Traversal port-4500 floating 
to off
Nov  7 03:43:45 Halley pluto[689]:    port floating activation criteria 
nat_t=0/port_fload=1
Nov  7 03:43:45 Halley pluto[689]:   including NAT-Traversal patch (Version 
0.6c) [disabled]
Nov  7 03:43:45 Halley pluto[689]: WARNING: Open of /dev/hw_random failed in 
init_rnd_pool(), trying alternate sources of random
Nov  7 03:43:45 Halley pluto[689]: WARNING: Using /dev/urandom as the source 
of random
Nov  7 03:43:45 Halley pluto[689]: ike_alg_register_enc(): Activating 
OAKLEY_TWOFISH_CBC_SSH: Ok (ret=0)
Nov  7 03:43:45 Halley pluto[689]: ike_alg_register_enc(): Activating 
OAKLEY_TWOFISH_CBC: Ok (ret=0)
Nov  7 03:43:45 Halley pluto[689]: ike_alg_register_enc(): Activating 
OAKLEY_SERPENT_CBC: Ok (ret=0)
Nov  7 03:43:45 Halley pluto[689]: ike_alg_register_enc(): Activating 
OAKLEY_AES_CBC: Ok (ret=0)
Nov  7 03:43:45 Halley pluto[689]: ike_alg_register_enc(): Activating 
OAKLEY_BLOWFISH_CBC: Ok (ret=0)
Nov  7 03:43:45 Halley pluto[689]: ike_alg_register_hash(): Activating 
OAKLEY_SHA2_512: Ok (ret=0)
Nov  7 03:43:45 Halley pluto[689]: ike_alg_register_hash(): Activating 
OAKLEY_SHA2_256: Ok (ret=0)
Nov  7 03:43:45 Halley pluto[689]: no helpers will be started, all 
cryptographic operations will be done inline
Nov  7 03:43:45 Halley pluto[689]: Using Linux 2.6 IPsec interface code on 
2.6.18.2
Nov  7 03:43:45 Halley pluto[689]: Changing to directory 
'/etc/ipsec.d/cacerts'
Nov  7 03:43:45 Halley pluto[689]:   loaded CA cert file 'cacert.pem' (1700 
bytes)
Nov  7 03:43:45 Halley pluto[689]: Changing to directory 
'/etc/ipsec.d/aacerts'
Nov  7 03:43:45 Halley pluto[689]: Changing to directory 
'/etc/ipsec.d/ocspcerts'
Nov  7 03:43:45 Halley pluto[689]: Changing to directory '/etc/ipsec.d/crls'
Nov  7 03:43:45 Halley pluto[689]:   loaded crl file 'crl.pem' (743 bytes)
Nov  7 03:43:47 Halley pluto[689]:   loaded host cert file 
'/etc/ipsec.d/certs/fswcert-genova.pem' (5318 bytes)
Nov  7 03:43:47 Halley pluto[689]: added connection description "milano"
Nov  7 03:43:48 Halley pluto[689]: listening for IKE messages
Nov  7 03:43:48 Halley pluto[689]: adding interface eth2/eth2 172.23.1.8:500
Nov  7 03:43:48 Halley pluto[689]: adding interface eth0/eth0 ip_halley:500
Nov  7 03:43:48 Halley pluto[689]: adding interface lo/lo 127.0.0.1:500
Nov  7 03:43:48 Halley pluto[689]: loading secrets from "/etc/ipsec.secrets"
Nov  7 03:43:48 Halley pluto[689]:   loaded private key file 
'/etc/ipsec.d/private/fswreq.pem' (2861 bytes)
Nov  7 03:43:51 Halley pluto[689]: "milano" #7: initiating Main Mode
Nov  7 03:43:51 Halley pluto[689]: "milano" #7: received Vendor ID payload 
[Openswan (this version) 2.4.6  X.509-1.5.4 PLUTO_SENDS_VENDORID 
PLUTO_USES_KEYRR]
Nov  7 03:43:51 Halley pluto[689]: "milano" #7: received Vendor ID payload 
[Dead Peer Detection]
Nov  7 03:43:51 Halley pluto[689]: "milano" #7: transition from state 
STATE_MAIN_I1 to state STATE_MAIN_I2
Nov  7 03:43:51 Halley pluto[689]: "milano" #7: STATE_MAIN_I2: sent MI2, 
expecting MR2
Nov  7 03:43:51 Halley pluto[689]: "milano" #7: I am sending my cert
Nov  7 03:43:51 Halley pluto[689]: "milano" #7: I am sending a certificate 
request
Nov  7 03:43:51 Halley pluto[689]: "milano" #7: transition from state 
STATE_MAIN_I2 to state STATE_MAIN_I3
Nov  7 03:43:51 Halley pluto[689]: "milano" #7: STATE_MAIN_I3: sent MI3, 
expecting MR3
Nov  7 03:43:51 Halley pluto[689]: initiate on demand from 172.23.1.3:0 to 
172.18.1.208:0 proto=0 state: fos_start because: acquire
Nov  7 03:43:51 Halley pluto[689]: "milano" #7: Main mode peer ID is 
ID_USER_FQDN: 'fsw-mi at mycompany.yourdomain'
Nov  7 03:43:51 Halley pluto[689]: "milano" #7: crl update for "C=IT, 
ST=Venezia, L=ma, O=mycompany S.p.A., OU=Informatica e Organizzazione, 
CN=mycompany, E=postmaster at mycompany.yourdomain" is overdue since Mar 10 
14:17:05 UTC 2005
Nov  7 03:43:51 Halley pluto[689]: "milano" #7: transition from state 
STATE_MAIN_I3 to state STATE_MAIN_I4
Nov  7 03:43:51 Halley pluto[689]: "milano" #7: STATE_MAIN_I4: ISAKMP SA 
established {auth=OAKLEY_RSA_SIG cipher=oakley_3des_cbc_192 prf=oakley_md5 
group=modp1536}
Nov  7 03:43:51 Halley pluto[689]: "milano" #12: initiating Quick Mode 
RSASIG+ENCRYPT+COMPRESS+TUNNEL+PFS+UP {using isakmp#7}
Nov  7 03:43:51 Halley pluto[689]: "milano" #13: initiating Quick Mode 
RSASIG+ENCRYPT+COMPRESS+TUNNEL+PFS+UP {using isakmp#7}
Nov  7 03:43:52 Halley pluto[689]: "milano" #12: transition from state 
STATE_QUICK_I1 to state STATE_QUICK_I2
Nov  7 03:43:52 Halley pluto[689]: "milano" #12: STATE_QUICK_I2: sent QI2, 
IPsec SA established {ESP=>0x7e7b82ee <0x631e80db xfrm=AES_0-HMAC_SHA1 
IPCOMP=>0x0000e2b8 <0x000051f3 NATD=none DPD=none}
Nov  7 03:43:52 Halley pluto[689]: "milano" #13: transition from state 
STATE_QUICK_I1 to state STATE_QUICK_I2
Nov  7 03:43:52 Halley pluto[689]: "milano" #13: STATE_QUICK_I2: sent QI2, 
IPsec SA established {ESP=>0xa6458b3a <0x8db8893b xfrm=AES_0-HMAC_SHA1 
IPCOMP=>0x00001b1d <0x000022d9 NATD=none DPD=none}
Nov  7 03:44:13 Halley pluto[689]: packet from mimosa:500: received Vendor 
ID payload [Openswan (this version) 2.4.6  X.509-1.5.4 PLUTO_SENDS_VENDORID 
PLUTO_USES_KEYRR]
Nov  7 03:44:13 Halley pluto[689]: packet from mimosa:500: received Vendor 
ID payload [Dead Peer Detection]
Nov  7 03:44:13 Halley pluto[689]: packet from mimosa:500: received Vendor 
ID payload [RFC 3947] meth=110, but port floating is off
Nov  7 03:44:13 Halley pluto[689]: packet from mimosa:500: received Vendor 
ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but port floating is 
off
Nov  7 03:44:13 Halley pluto[689]: packet from mimosa:500: received Vendor 
ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but port floating is 
off
Nov  7 03:44:13 Halley pluto[689]: packet from mimosa:500: received Vendor 
ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but port floating is 
off
Nov  7 03:44:13 Halley pluto[689]: packet from mimosa:500: ignoring Vendor 
ID payload [draft-ietf-ipsec-nat-t-ike-00]
Nov  7 03:44:13 Halley pluto[689]: "milano" #21: responding to Main Mode
Nov  7 03:44:13 Halley pluto[689]: "milano" #21: transition from state 
STATE_MAIN_R0 to state STATE_MAIN_R1
Nov  7 03:44:13 Halley pluto[689]: "milano" #21: STATE_MAIN_R1: sent MR1, 
expecting MI2
Nov  7 03:44:13 Halley pluto[689]: "milano" #21: transition from state 
STATE_MAIN_R1 to state STATE_MAIN_R2
Nov  7 03:44:13 Halley pluto[689]: "milano" #21: STATE_MAIN_R2: sent MR2, 
expecting MI3
Nov  7 03:44:13 Halley pluto[689]: "milano" #21: Main mode peer ID is 
ID_USER_FQDN: 'fsw-mi at mycompany.yourdomain'
Nov  7 03:44:13 Halley pluto[689]: "milano" #21: crl update for "C=IT, 
ST=Venezia, L=ma, O=mycompany S.p.A., OU=Informatica e Organizzazione, 
CN=mycompany, E=postmaster at mycompany.yourdomain" is overdue since Mar 10 
14:17:05 UTC 2005
Nov  7 03:44:13 Halley pluto[689]: "milano" #21: I am sending my cert
Nov  7 03:44:13 Halley pluto[689]: "milano" #21: transition from state 
STATE_MAIN_R2 to state STATE_MAIN_R3
Nov  7 03:44:13 Halley pluto[689]: "milano" #21: STATE_MAIN_R3: sent MR3, 
ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=oakley_3des_cbc_192 
prf=oakley_md5 group=modp1536}
Nov  7 03:44:14 Halley pluto[689]: "milano" #28: responding to Quick Mode 
{msgid:15c3cd35}
Nov  7 03:44:14 Halley pluto[689]: "milano" #28: transition from state 
STATE_QUICK_R0 to state STATE_QUICK_R1
Nov  7 03:44:14 Halley pluto[689]: "milano" #28: STATE_QUICK_R1: sent QR1, 
inbound IPsec SA installed, expecting QI2
Nov  7 03:44:14 Halley pluto[689]: "milano" #29: responding to Quick Mode 
{msgid:54ac6aa1}
Nov  7 03:44:14 Halley pluto[689]: "milano" #29: transition from state 
STATE_QUICK_R0 to state STATE_QUICK_R1
Nov  7 03:44:14 Halley pluto[689]: "milano" #29: STATE_QUICK_R1: sent QR1, 
inbound IPsec SA installed, expecting QI2
Nov  7 03:44:14 Halley pluto[689]: "milano" #30: responding to Quick Mode 
{msgid:42f8c282}
Nov  7 03:44:14 Halley pluto[689]: "milano" #30: transition from state 
STATE_QUICK_R0 to state STATE_QUICK_R1
Nov  7 03:44:14 Halley pluto[689]: "milano" #30: STATE_QUICK_R1: sent QR1, 
inbound IPsec SA installed, expecting QI2
Nov  7 03:44:14 Halley pluto[689]: "milano" #28: transition from state 
STATE_QUICK_R1 to state STATE_QUICK_R2
Nov  7 03:44:14 Halley pluto[689]: "milano" #28: STATE_QUICK_R2: IPsec SA 
established {ESP=>0xead18f78 <0xcf01419a xfrm=AES_0-HMAC_SHA1 
IPCOMP=>0x00000ba7 <0x000005ae NATD=none DPD=none}
Nov  7 03:44:14 Halley pluto[689]: "milano" #29: transition from state 
STATE_QUICK_R1 to state STATE_QUICK_R2
Nov  7 03:44:14 Halley pluto[689]: "milano" #29: STATE_QUICK_R2: IPsec SA 
established {ESP=>0xe719c7fa <0x169f13ac xfrm=AES_0-HMAC_SHA1 
IPCOMP=>0x0000d0c8 <0x00003d97 NATD=none DPD=none}
Nov  7 03:44:14 Halley pluto[689]: "milano" #30: transition from state 
STATE_QUICK_R1 to state STATE_QUICK_R2
Nov  7 03:44:14 Halley pluto[689]: "milano" #30: STATE_QUICK_R2: IPsec SA 
established {ESP=>0x63b189f1 <0x7095856b xfrm=AES_0-HMAC_SHA1 
IPCOMP=>0x00005bc7 <0x0000c76a NATD=none DPD=none}

_________________________________________________________________
FREE pop-up blocking with the new MSN Toolbar - get it now! 
http://toolbar.msn.click-url.com/go/onm00200415ave/direct/01/



More information about the Users mailing list