[Openswan Users] Connection only in one direction
Martin Gerstendorf
martin.gerstendorf at oint.net
Tue Aug 5 02:04:13 EDT 2008
Hi!
I have an ipsec connection running between Linksys wrv200 and an Openswan
Gateway. The tunnel is up and i can connect everything behind the openswan
gatewy but there is no connection from the openswn gateway to the net
behind my wrv200?
Tue Aug 5 07:59:06 CEST 2008
+ _________________________ version
+ ipsec --version
Linux Openswan U2.4.13/K2.6.18-53.1.13.2.ccPAE (netkey)
See `ipsec --copyright' for copyright information.
+ _________________________ /proc/version
+ cat /proc/version
Linux version 2.6.18-53.1.13.2.ccPAE (darryl at cc4devel.lan) (gcc version
3.4.6 20060404 (Red Hat 3.4.6-8)) #1 SMP Wed Feb 27 18:52:16 EST 2008
+ _________________________ /proc/net/ipsec_eroute
+ test -r /proc/net/ipsec_eroute
+ _________________________ netstat-rn
+ netstat -nr
+ head -n 100
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt
Iface
192.168.2.2 0.0.0.0 255.255.255.255 UH 0 0 0
tun0
83.218.162.0 0.0.0.0 255.255.255.192 U 0 0 0
eth0
192.168.6.0 0.0.0.0 255.255.255.0 U 0 0 0
eth1
192.168.5.0 83.218.162.62 255.255.255.0 UG 0 0 0
eth0
192.168.2.0 192.168.2.2 255.255.255.0 UG 0 0 0
tun0
192.168.10.0 0.0.0.0 255.255.255.0 U 0 0 0
eth2
0.0.0.0 83.218.162.62 0.0.0.0 UG 0 0 0
eth0
+ _________________________ /proc/net/ipsec_spi
+ test -r /proc/net/ipsec_spi
+ _________________________ /proc/net/ipsec_spigrp
+ test -r /proc/net/ipsec_spigrp
+ _________________________ /proc/net/ipsec_tncfg
+ test -r /proc/net/ipsec_tncfg
+ _________________________ /proc/net/pfkey
+ test -r /proc/net/pfkey
+ cat /proc/net/pfkey
sk RefCnt Rmem Wmem User Inode
+ _________________________ ip-xfrm-state
+ ip xfrm state
src 83.218.162.44 dst 91.112.190.238
proto ipv6-crypt spi 0x084aef4b reqid 16385 mode tunnel
replay-window 32
auth md5 0xb1079966f11ac08a97b3acec4c49860b
enc des3_ede 0x6e681737e3b810de4009051f439c30229369e514c1768ccc
src 91.112.190.238 dst 83.218.162.44
proto ipv6-crypt spi 0x6778d334 reqid 16385 mode tunnel
replay-window 32
auth md5 0x021e739c8ba84a352160d6b0c26d3313
enc des3_ede 0x24617071281ba26744987a52d6a0d6c4060321dc32625887
+ _________________________ ip-xfrm-policy
+ ip xfrm policy
src 192.168.5.0/24 dst 192.168.6.0/24
dir in priority 2344
tmpl src 91.112.190.238 dst 83.218.162.44
proto ipv6-crypt spi 0x00000000 reqid 16385 mode tunnel
src 192.168.6.0/24 dst 192.168.5.0/24
dir out priority 2344
tmpl src 83.218.162.44 dst 91.112.190.238
proto ipv6-crypt spi 0x00000000 reqid 16385 mode tunnel
src 192.168.5.0/24 dst 192.168.6.0/24
dir fwd priority 2344
tmpl src 91.112.190.238 dst 83.218.162.44
proto ipv6-crypt spi 0x00000000 reqid 16385 mode tunnel
src ::/0 dst ::/0
dir in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir in priority 0
src ::/0 dst ::/0
dir out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir out priority 0
+ _________________________ /proc/sys/net/ipsec-star
+ test -d /proc/sys/net/ipsec
+ _________________________ ipsec/status
+ ipsec auto --status
000 interface lo/lo ::1
000 interface lo/lo 127.0.0.1
000 interface eth0/eth0 83.218.162.44
000 interface eth1/eth1 192.168.6.1
000 interface eth2/eth2 192.168.10.1
000 interface tun0/tun0 192.168.2.1
000 %myid = (none)
000 debug
raw+crypt+parsing+emitting+control+lifecycle+klips+dns+oppo+controlmore+pfkey+nattraversal+x509
000
000 algorithm ESP encrypt: id=2, name=ESP_DES, ivlen=8, keysizemin=64,
keysizemax=64
000 algorithm ESP encrypt: id=3, name=ESP_3DES, ivlen=8, keysizemin=192,
keysizemax=192
000 algorithm ESP encrypt: id=7, name=ESP_BLOWFISH, ivlen=8, keysizemin=40,
keysizemax=448
000 algorithm ESP encrypt: id=11, name=ESP_NULL, ivlen=0, keysizemin=0,
keysizemax=0
000 algorithm ESP encrypt: id=12, name=ESP_AES, ivlen=8, keysizemin=128,
keysizemax=256
000 algorithm ESP encrypt: id=252, name=ESP_SERPENT, ivlen=8,
keysizemin=128, keysizemax=256
000 algorithm ESP encrypt: id=253, name=ESP_TWOFISH, ivlen=8,
keysizemin=128, keysizemax=256
000 algorithm ESP auth attr: id=1, name=AUTH_ALGORITHM_HMAC_MD5,
keysizemin=128, keysizemax=128
000 algorithm ESP auth attr: id=2, name=AUTH_ALGORITHM_HMAC_SHA1,
keysizemin=160, keysizemax=160
000 algorithm ESP auth attr: id=5, name=AUTH_ALGORITHM_HMAC_SHA2_256,
keysizemin=256, keysizemax=256
000 algorithm ESP auth attr: id=251, name=(null), keysizemin=0,
keysizemax=0
000
000 algorithm IKE encrypt: id=5, name=OAKLEY_3DES_CBC, blocksize=8,
keydeflen=192
000 algorithm IKE encrypt: id=7, name=OAKLEY_AES_CBC, blocksize=16,
keydeflen=128
000 algorithm IKE hash: id=1, name=OAKLEY_MD5, hashsize=16
000 algorithm IKE hash: id=2, name=OAKLEY_SHA1, hashsize=20
000 algorithm IKE dh group: id=2, name=OAKLEY_GROUP_MODP1024, bits=1024
000 algorithm IKE dh group: id=5, name=OAKLEY_GROUP_MODP1536, bits=1536
000 algorithm IKE dh group: id=14, name=OAKLEY_GROUP_MODP2048, bits=2048
000 algorithm IKE dh group: id=15, name=OAKLEY_GROUP_MODP3072, bits=3072
000 algorithm IKE dh group: id=16, name=OAKLEY_GROUP_MODP4096, bits=4096
000 algorithm IKE dh group: id=17, name=OAKLEY_GROUP_MODP6144, bits=6144
000 algorithm IKE dh group: id=18, name=OAKLEY_GROUP_MODP8192, bits=8192
000
000 stats db_ops.c: {curr_cnt, total_cnt, maxsz} :context={0,2,36}
trans={0,2,336} attrs={0,2,224}
000
000 "edelweiss":
192.168.6.0/24===83.218.162.44---83.218.162.62...91.112.190.237---91.112.190.238===192.168.5.0/24;
erouted; eroute owner: #2
000 "edelweiss": srcip=unset; dstip=unset; srcup=ipsec _updown;
dstup=ipsec _updown;
000 "edelweiss": ike_life: 28800s; ipsec_life: 3600s; rekey_margin: 540s;
rekey_fuzz: 100%; keyingtries: 0
000 "edelweiss": policy: PSK+ENCRYPT+TUNNEL+UP; prio: 24,24; interface:
eth0; encap: esp;
000 "edelweiss": newest ISAKMP SA: #1; newest IPsec SA: #2;
000 "edelweiss": IKE algorithms wanted:
3DES_CBC(5)_000-MD5(1)-MODP1024(2); flags=strict
000 "edelweiss": IKE algorithms found:
3DES_CBC(5)_192-MD5(1)_128-MODP1024(2)
000 "edelweiss": IKE algorithm newest: 3DES_CBC_192-MD5-MODP1024
000 "edelweiss": ESP algorithms wanted: 3DES(3)_000-MD5(1); flags=strict
000 "edelweiss": ESP algorithms loaded: 3DES(3)_000-MD5(1); flags=strict
000 "edelweiss": ESP algorithm newest: 3DES_0-HMAC_MD5; pfsgroup=<N/A>
000
000 #2: "edelweiss":500 STATE_QUICK_I2 (sent QI2, IPsec SA established);
EVENT_SA_REPLACE in 1325s; newest IPSEC; eroute owner
000 #2: "edelweiss" esp.84aef4b at 91.112.190.238 esp.6778d334 at 83.218.162.44
tun.0 at 91.112.190.238 tun.0 at 83.218.162.44
000 #1: "edelweiss":500 STATE_MAIN_I4 (ISAKMP SA established);
EVENT_SA_REPLACE in 26792s; newest ISAKMP; lastdpd=-1s(seq in:0 out:0)
000
+ _________________________ ifconfig-a
+ ifconfig -a
eth0 Link encap:Ethernet HWaddr 00:14:5E:21:17:C8
inet addr:83.218.162.44 Bcast:83.218.162.63
Mask:255.255.255.192
inet6 addr: fe80::214:5eff:fe21:17c8/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:199541 errors:0 dropped:0 overruns:0 frame:0
TX packets:65133 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:83141142 (79.2 MiB) TX bytes:9551814 (9.1 MiB)
Interrupt:177
eth1 Link encap:Ethernet HWaddr 00:1A:70:13:CD:6F
inet addr:192.168.6.1 Bcast:192.168.6.255 Mask:255.255.255.0
inet6 addr: fe80::21a:70ff:fe13:cd6f/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:2817074 errors:0 dropped:0 overruns:0 frame:0
TX packets:2624599 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:2307220105 (2.1 GiB) TX bytes:2753072503 (2.5 GiB)
Interrupt:90 Base address:0x4000
eth2 Link encap:Ethernet HWaddr 00:1A:70:13:CD:4D
inet addr:192.168.10.1 Bcast:192.168.10.255 Mask:255.255.255.0
inet6 addr: fe80::21a:70ff:fe13:cd4d/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:2891014 errors:0 dropped:0 overruns:0 frame:0
TX packets:3040355 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:2958963027 (2.7 GiB) TX bytes:2798735730 (2.6 GiB)
Interrupt:98 Base address:0x6400
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:64878 errors:0 dropped:0 overruns:0 frame:0
TX packets:64878 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:171686070 (163.7 MiB) TX bytes:171686070 (163.7 MiB)
sit0 Link encap:IPv6-in-IPv4
NOARP MTU:1480 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:0 (0.0 b) TX bytes:0 (0.0 b)
tun0 Link encap:UNSPEC HWaddr
00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
inet addr:192.168.2.1 P-t-P:192.168.2.2 Mask:255.255.255.255
UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1500 Metric:1
RX packets:68900 errors:0 dropped:0 overruns:0 frame:0
TX packets:81768 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:100
RX bytes:4816703 (4.5 MiB) TX bytes:10134022 (9.6 MiB)
+ _________________________ ip-addr-list
+ ip addr list
1: lo: <LOOPBACK,UP,10000> mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,10000> mtu 1500 qdisc htb qlen 1000
link/ether 00:14:5e:21:17:c8 brd ff:ff:ff:ff:ff:ff
inet 83.218.162.44/26 brd 83.218.162.63 scope global eth0
inet6 fe80::214:5eff:fe21:17c8/64 scope link
valid_lft forever preferred_lft forever
3: eth1: <BROADCAST,MULTICAST,UP,10000> mtu 1500 qdisc htb qlen 1000
link/ether 00:1a:70:13:cd:6f brd ff:ff:ff:ff:ff:ff
inet 192.168.6.1/24 brd 192.168.6.255 scope global eth1
inet6 fe80::21a:70ff:fe13:cd6f/64 scope link
valid_lft forever preferred_lft forever
4: eth2: <BROADCAST,MULTICAST,UP,10000> mtu 1500 qdisc htb qlen 1000
link/ether 00:1a:70:13:cd:4d brd ff:ff:ff:ff:ff:ff
inet 192.168.10.1/24 brd 192.168.10.255 scope global eth2
inet6 fe80::21a:70ff:fe13:cd4d/64 scope link
valid_lft forever preferred_lft forever
5: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,10000> mtu 1500 qdisc pfifo_fast
qlen 100
link/[65534]
inet 192.168.2.1 peer 192.168.2.2/32 scope global tun0
6: sit0: <NOARP> mtu 1480 qdisc noop
link/sit 0.0.0.0 brd 0.0.0.0
+ _________________________ ip-route-list
+ ip route list
192.168.2.2 dev tun0 proto kernel scope link src 192.168.2.1
83.218.162.0/26 dev eth0 proto kernel scope link src 83.218.162.44
192.168.6.0/24 dev eth1 proto kernel scope link src 192.168.6.1
192.168.5.0/24 via 83.218.162.62 dev eth0
192.168.2.0/24 via 192.168.2.2 dev tun0
192.168.10.0/24 dev eth2 proto kernel scope link src 192.168.10.1
default via 83.218.162.62 dev eth0
+ _________________________ ip-rule-list
+ ip rule list
0: from all lookup local
32766: from all lookup main
32767: from all lookup default
+ _________________________ ipsec_verify
+ ipsec verify --nocolour
Checking your system to see if IPsec got installed and started correctly:
Version check and ipsec on-path [OK]
Linux Openswan U2.4.13/K2.6.18-53.1.13.2.ccPAE (netkey)
Checking for IPsec support in kernel [OK]
NETKEY detected, testing for disabled ICMP send_redirects [FAILED]
Please disable /proc/sys/net/ipv4/conf/*/send_redirects
or NETKEY will cause the sending of bogus ICMP redirects!
NETKEY detected, testing for disabled ICMP accept_redirects [FAILED]
Please disable /proc/sys/net/ipv4/conf/*/accept_redirects
or NETKEY will accept bogus ICMP redirects!
Checking for RSA private key (/etc/ipsec.secrets) [DISABLED]
ipsec showhostkey: no default key in "/etc/ipsec.secrets"
Checking that pluto is running [OK]
Two or more interfaces found, checking IP forwarding [OK]
Checking NAT and MASQUERADEing
Checking for 'ip' command [OK]
Checking for 'iptables' command [OK]
Opportunistic Encryption Support [DISABLED]
Cannot execute command "which iptables": No such file or directory
+ _________________________ mii-tool
+ '[' -x /sbin/mii-tool ']'
+ /sbin/mii-tool -v
SIOCGMIIPHY on 'eth1' failed: Operation not supported
SIOCGMIIPHY on 'eth2' failed: Operation not supported
eth0: negotiated 100baseTx-FD flow-control, link ok
product info: vendor 00:08:18, model 24 rev 0
basic mode: autonegotiation enabled
basic status: autonegotiation complete, link ok
capabilities: 100baseTx-FD 100baseTx-HD 10baseT-FD 10baseT-HD
advertising: 100baseTx-FD 100baseTx-HD 10baseT-FD 10baseT-HD
flow-control
link partner: 100baseTx-FD 100baseTx-HD 10baseT-FD 10baseT-HD
flow-control
+ _________________________ ipsec/directory
+ ipsec --directory
/usr/lib/ipsec
+ _________________________ hostname/fqdn
+ hostname --fqdn
mail.edelweiss-gurgl.com
+ _________________________ hostname/ipaddress
+ hostname --ip-address
83.218.162.44
+ _________________________ uptime
+ uptime
07:59:06 up 16:51, 1 user, load average: 0.00, 0.00, 0.00
+ _________________________ ps
+ ps alxwf
+ egrep -i 'ppid|pluto|ipsec|klips'
F UID PID PPID PRI NI VSZ RSS WCHAN STAT TTY TIME
COMMAND
0 0 29582 24571 25 0 4256 1144 wait S+ pts/0 0:00
\_ /bin/sh /usr/libexec/ipsec/barf
0 0 29676 29582 25 0 1780 504 pipe_w S+ pts/0 0:00
\_ egrep -i ppid|pluto|ipsec|klips
1 0 27357 1 25 0 2180 388 wait S pts/0 0:00
/bin/sh /usr/lib/ipsec/_plutorun --debug all --uniqueids yes --nocrsend
--strictcrlpolicy --nat_traversal --keep_alive --protostack auto
--force_keepalive --disable_port_floating --virtual_private
--crlcheckinterval 0 --ocspuri --nhelpers --dump --opts --stderrlog
--wait no --pre --post --log daemon.error --pid /var/run/pluto/pluto.pid
1 0 27358 27357 25 0 2180 660 wait S pts/0 0:00 \_
/bin/sh /usr/lib/ipsec/_plutorun --debug all --uniqueids yes --nocrsend
--strictcrlpolicy --nat_traversal --keep_alive --protostack auto
--force_keepalive --disable_port_floating --virtual_private
--crlcheckinterval 0 --ocspuri --nhelpers --dump --opts --stderrlog
--wait no --pre --post --log daemon.error --pid /var/run/pluto/pluto.pid
4 0 27360 27358 17 0 2508 1264 - S pts/0 0:00 |
\_ /usr/libexec/ipsec/pluto --nofork --secretsfile /etc/ipsec.secrets
--ipsecdir /etc/ipsec.d --debug-all --use-auto --uniqueids
1 0 27376 27360 26 10 2452 620 - SN pts/0 0:00 |
\_ pluto helper # 0
0 0 27434 27360 24 0 1480 276 - S pts/0 0:00 |
\_ _pluto_adns -d
0 0 27361 27357 25 0 2180 1024 pipe_w S pts/0 0:00 \_
/bin/sh /usr/lib/ipsec/_plutoload --wait no --post
0 0 27365 1 22 0 1540 488 pipe_w S pts/0 0:00 logger
-s -p daemon.error -t ipsec__plutorun
+ _________________________ ipsec/showdefaults
+ ipsec showdefaults
routephys=eth0
routevirt=ipsec0
routeaddr=83.218.162.44
routenexthop=83.218.162.62
+ _________________________ ipsec/conf
+ ipsec _include /etc/ipsec.conf
+ ipsec _keycensor
#< /etc/ipsec.conf 1
# The config file changed quite a bit from 1.x.
# See
http://www.freeswan.org/freeswan_trees/freeswan-2.00/doc/upgrading.html
version 2.0
# Default policy
#---------------
config setup
interfaces=%defaultroute
klipsdebug=none
plutodebug=all
uniqueids=yes
#nat_traversal=1
conn %default
authby=secret
auto=start
# Disable OE
#-----------
conn block
auto=ignore
conn private
auto=ignore
conn private-or-clear
auto=ignore
conn clear-or-private
auto=ignore
conn clear
auto=ignore
conn packetdefault
auto=ignore
conn edelweiss
auto=start
type=tunnel
authby=secret
pfs=no
ike=3des-md5-modp1024
esp=3des-md5
#aggrmode=no
compress=no
ikelifetime=480m
keylife=60m
keyexchange=ike
# dpddelay=30
## dpdtimeout=120
## dpdaction=hold
left=91.112.190.238
leftid=91.112.190.238
leftnexthop=91.112.190.237
leftsubnet=192.168.5.0/24
right=83.218.162.44
rightnexthop=83.218.162.62
rightsubnet=192.168.6.0/24
+ _________________________ ipsec/secrets
+ ipsec _include /etc/ipsec.secrets
+ ipsec _secretcensor
#< /etc/ipsec.secrets 1
83.218.162.44 91.112.190.238 : PSK "[sums to b2cf...]"
+ _________________________ ipsec/listall
+ ipsec auto --listall
000
000 List of Public Keys:
000
+ '[' /etc/ipsec.d/policies ']'
+ for policy in '$POLICIES/*'
++ basename /etc/ipsec.d/policies/block
+ base=block
+ _________________________ ipsec/policies/block
+ cat /etc/ipsec.d/policies/block
# This file defines the set of CIDRs (network/mask-length) to which
# communication should never be allowed.
#
# See /usr/share/doc/openswan/policygroups.html for details.
#
# $Id: block.in,v 1.4 2003/02/17 02:22:15 mcr Exp $
#
+ for policy in '$POLICIES/*'
++ basename /etc/ipsec.d/policies/clear
+ base=clear
+ _________________________ ipsec/policies/clear
+ cat /etc/ipsec.d/policies/clear
# This file defines the set of CIDRs (network/mask-length) to which
# communication should always be in the clear.
#
# See /usr/share/doc/openswan/policygroups.html for details.
#
# $Id: clear.in,v 1.4 2003/02/17 02:22:15 mcr Exp $
#
+ for policy in '$POLICIES/*'
++ basename /etc/ipsec.d/policies/clear-or-private
+ base=clear-or-private
+ _________________________ ipsec/policies/clear-or-private
+ cat /etc/ipsec.d/policies/clear-or-private
# This file defines the set of CIDRs (network/mask-length) to which
# we will communicate in the clear, or, if the other side initiates IPSEC,
# using encryption. This behaviour is also called "Opportunistic
Responder".
#
# See /usr/share/doc/openswan/policygroups.html for details.
#
# $Id: clear-or-private.in,v 1.4 2003/02/17 02:22:15 mcr Exp $
#
+ for policy in '$POLICIES/*'
++ basename /etc/ipsec.d/policies/private
+ base=private
+ _________________________ ipsec/policies/private
+ cat /etc/ipsec.d/policies/private
# This file defines the set of CIDRs (network/mask-length) to which
# communication should always be private (i.e. encrypted).
# See /usr/share/doc/openswan/policygroups.html for details.
#
# $Id: private.in,v 1.4 2003/02/17 02:22:15 mcr Exp $
#
+ for policy in '$POLICIES/*'
++ basename /etc/ipsec.d/policies/private-or-clear
+ base=private-or-clear
+ _________________________ ipsec/policies/private-or-clear
+ cat /etc/ipsec.d/policies/private-or-clear
# This file defines the set of CIDRs (network/mask-length) to which
# communication should be private, if possible, but in the clear otherwise.
#
# If the target has a TXT (later IPSECKEY) record that specifies
# authentication material, we will require private (i.e. encrypted)
# communications. If no such record is found, communications will be
# in the clear.
#
# See /usr/share/doc/openswan/policygroups.html for details.
#
# $Id: private-or-clear.in,v 1.5 2003/02/17 02:22:15 mcr Exp $
#
0.0.0.0/0
+ _________________________ ipsec/ls-libdir
+ ls -l /usr/lib/ipsec
total 232
-rwxr-xr-x 1 root root 15848 Aug 4 22:46 _confread
-rwxr-xr-x 1 root root 15403 Dec 10 2004 _confread.old
-rwxr-xr-x 1 root root 13300 Aug 4 22:46 _copyright
-rwxr-xr-x 1 root root 45260 Dec 10 2004 _copyright.old
-rwxr-xr-x 1 root root 2379 Aug 4 22:46 _include
-rwxr-xr-x 1 root root 2379 Dec 10 2004 _include.old
-rwxr-xr-x 1 root root 1475 Aug 4 22:46 _keycensor
-rwxr-xr-x 1 root root 1475 Dec 10 2004 _keycensor.old
-rwxr-xr-x 1 root root 3648 Aug 4 22:46 _plutoload
-rwxr-xr-x 1 root root 3586 Dec 10 2004 _plutoload.old
-rwxr-xr-x 1 root root 8057 Aug 4 22:46 _plutorun
-rwxr-xr-x 1 root root 7167 Dec 10 2004 _plutorun.old
-rwxr-xr-x 1 root root 12324 Aug 4 22:46 _realsetup
-rwxr-xr-x 1 root root 10493 Dec 10 2004 _realsetup.old
-rwxr-xr-x 1 root root 1975 Aug 4 22:46 _secretcensor
-rwxr-xr-x 1 root root 1975 Dec 10 2004 _secretcensor.old
-rwxr-xr-x 1 root root 11102 Aug 4 22:46 _startklips
-rwxr-xr-x 1 root root 9016 Dec 10 2004 _startklips.old
-rwxr-xr-x 1 root root 13918 Aug 4 22:46 _updown
-rwxr-xr-x 1 root root 12313 Dec 10 2004 _updown.old
-rwxr-xr-x 1 root root 15746 Aug 4 22:46 _updown_x509
-rwxr-xr-x 1 root root 7572 Dec 10 2004 _updown_x509.old
-rwxr-xr-x 1 root root 1942 Dec 10 2004 ipsec_pr.template
+ _________________________ ipsec/ls-execdir
+ ls -l /usr/libexec/ipsec
total 8236
-rwxr-xr-x 1 root root 29259 Aug 4 22:46 _pluto_adns
-rwxr-xr-x 1 root root 67890 Dec 10 2004 _pluto_adns.old
-rwxr-xr-x 1 root root 18891 Aug 4 22:46 auto
-rwxr-xr-x 1 root root 19220 Dec 10 2004 auto.old
-rwxr-xr-x 1 root root 11367 Aug 4 22:46 barf
-rwxr-xr-x 1 root root 10248 Dec 10 2004 barf.old
-rwxr-xr-x 1 root root 816 Aug 4 22:46 calcgoo
-rwxr-xr-x 1 root root 816 Dec 10 2004 calcgoo.old
-rwxr-xr-x 1 root root 188210 Aug 4 22:46 eroute
-rwxr-xr-x 1 root root 308475 Dec 10 2004 eroute.old
-rwxr-xr-x 1 root root 62279 Aug 4 22:46 ikeping
-rwxr-xr-x 1 root root 62279 Aug 4 14:13 ikeping.old
-rwxr-xr-x 1 root root 117295 Aug 4 22:46 klipsdebug
-rwxr-xr-x 1 root root 180615 Dec 10 2004 klipsdebug.old
-rwxr-xr-x 1 root root 1836 Aug 4 22:46 livetest
-rwxr-xr-x 1 root root 1836 Aug 4 14:13 livetest.old
-rwxr-xr-x 1 root root 2604 Aug 4 22:46 look
-rwxr-xr-x 1 root root 2461 Dec 10 2004 look.old
-rwxr-xr-x 1 root root 7088 Aug 4 22:46 mailkey
-rwxr-xr-x 1 root root 7124 Dec 10 2004 mailkey.old
-rwxr-xr-x 1 root root 16015 Aug 4 22:46 manual
-rwxr-xr-x 1 root root 16188 Dec 10 2004 manual.old
-rwxr-xr-x 1 root root 1951 Aug 4 22:46 newhostkey
-rwxr-xr-x 1 root root 1874 Dec 10 2004 newhostkey.old
-rwxr-xr-x 1 root root 107052 Aug 4 22:46 pf_key
-rwxr-xr-x 1 root root 162490 Dec 10 2004 pf_key.old
-rwxr-xr-x 1 root root 1923964 Aug 4 22:46 pluto
-rwxr-xr-x 1 root root 2650315 Dec 10 2004 pluto.old
-rwxr-xr-x 1 root root 19878 Aug 4 22:46 ranbits
-rwxr-xr-x 1 root root 49208 Dec 10 2004 ranbits.old
-rwxr-xr-x 1 root root 47312 Aug 4 22:46 rsasigkey
-rwxr-xr-x 1 root root 79770 Dec 10 2004 rsasigkey.old
-rwxr-xr-x 1 root root 766 Aug 4 22:46 secrets
-rwxr-xr-x 1 root root 766 Dec 10 2004 secrets.old
-rwxr-xr-x 1 root root 17578 Dec 10 2004 send-pr
lrwxrwxrwx 1 root root 22 Aug 4 22:46 setup ->
/etc/rc.d/init.d/ipsec
-rwxr-xr-x 1 root root 1054 Aug 4 22:46 showdefaults
-rwxr-xr-x 1 root root 1048 Dec 10 2004 showdefaults.old
-rwxr-xr-x 1 root root 4845 Aug 4 22:46 showhostkey
-rwxr-xr-x 1 root root 4364 Dec 10 2004 showhostkey.old
-rwxr-xr-x 1 root root 307361 Aug 4 22:46 spi
-rwxr-xr-x 1 root root 492713 Dec 10 2004 spi.old
-rwxr-xr-x 1 root root 156751 Aug 4 22:46 spigrp
-rwxr-xr-x 1 root root 248367 Dec 10 2004 spigrp.old
-rwxr-xr-x 1 root root 469546 Dec 10 2004 starter
-rwxr-xr-x 1 root root 21928 Aug 4 22:46 tncfg
-rwxr-xr-x 1 root root 47750 Dec 10 2004 tncfg.old
-rwxr-xr-x 1 root root 13524 Aug 4 22:46 verify
-rwxr-xr-x 1 root root 10195 Dec 10 2004 verify.old
-rwxr-xr-x 1 root root 150398 Aug 4 22:46 whack
-rwxr-xr-x 1 root root 224507 Dec 10 2004 whack.old
+ _________________________ ipsec/updowns
++ ls /usr/libexec/ipsec
++ egrep updown
+ _________________________ /proc/net/dev
+ cat /proc/net/dev
Inter-| Receive |
Transmit
face |bytes packets errs drop fifo frame compressed multicast|bytes
packets errs drop fifo colls carrier compressed
lo:171686070 64878 0 0 0 0 0 0
171686070 64878 0 0 0 0 0 0
eth0:83143222 199557 0 0 0 0 0 0 9559644
65153 0 0 0 0 0 0
eth1:2307220105 2817074 0 0 0 0 0 0
2753072503 2624599 0 0 0 0 0 0
eth2:2958963027 2891014 0 0 0 0 0 0
2798735730 3040355 0 0 0 0 0 0
tun0: 4816703 68900 0 0 0 0 0 0 10134022
81768 0 0 0 0 0 0
sit0: 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0
+ _________________________ /proc/net/route
+ cat /proc/net/route
Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT
tun0 0202A8C0 00000000 0005 0 0 0 FFFFFFFF 0 0 0
eth0 00A2DA53 00000000 0001 0 0 0 C0FFFFFF 0 0 0
eth1 0006A8C0 00000000 0001 0 0 0 00FFFFFF 0 0 0
eth0 0005A8C0 3EA2DA53 0003 0 0 0 00FFFFFF 0 0 0
tun0 0002A8C0 0202A8C0 0003 0 0 0 00FFFFFF 0 0 0
eth2 000AA8C0 00000000 0001 0 0 0 00FFFFFF 0 0 0
eth0 00000000 3EA2DA53 0003 0 0 0 00000000 0 0 0
+ _________________________ /proc/sys/net/ipv4/ip_forward
+ cat /proc/sys/net/ipv4/ip_forward
1
+ _________________________ /proc/sys/net/ipv4/tcp_ecn
+ cat /proc/sys/net/ipv4/tcp_ecn
0
+ _________________________ /proc/sys/net/ipv4/conf/star-rp_filter
+ cd /proc/sys/net/ipv4/conf
+ egrep '^' all/rp_filter default/rp_filter eth0/rp_filter eth1/rp_filter
eth2/rp_filter lo/rp_filter tun0/rp_filter
all/rp_filter:0
default/rp_filter:1
eth0/rp_filter:1
eth1/rp_filter:1
eth2/rp_filter:1
lo/rp_filter:0
tun0/rp_filter:1
+ _________________________ /proc/sys/net/ipv4/conf/star-rp_filter
+ cd /proc/sys/net/ipv4/conf
+ egrep '^' all/rp_filter default/rp_filter eth0/rp_filter eth1/rp_filter
eth2/rp_filter lo/rp_filter tun0/rp_filter
all/rp_filter:0
default/rp_filter:1
eth0/rp_filter:1
eth1/rp_filter:1
eth2/rp_filter:1
lo/rp_filter:0
tun0/rp_filter:1
+ _________________________ /proc/sys/net/ipv4/conf/star-star-redirects
+ cd /proc/sys/net/ipv4/conf
+ egrep '^' all/accept_redirects all/secure_redirects all/send_redirects
default/accept_redirects default/secure_redirects default/send_redirects
eth0/accept_redirects eth0/secure_redirects eth0/send_redirects
eth1/accept_redirects eth1/secure_redirects eth1/send_redirects
eth2/accept_redirects eth2/secure_redirects eth2/send_redirects
lo/accept_redirects lo/secure_redirects lo/send_redirects
tun0/accept_redirects tun0/secure_redirects tun0/send_redirects
all/accept_redirects:0
all/secure_redirects:1
all/send_redirects:0
default/accept_redirects:1
default/secure_redirects:1
default/send_redirects:1
eth0/accept_redirects:1
eth0/secure_redirects:1
eth0/send_redirects:1
eth1/accept_redirects:1
eth1/secure_redirects:1
eth1/send_redirects:1
eth2/accept_redirects:1
eth2/secure_redirects:1
eth2/send_redirects:1
lo/accept_redirects:1
lo/secure_redirects:1
lo/send_redirects:1
tun0/accept_redirects:1
tun0/secure_redirects:1
tun0/send_redirects:1
+ _________________________ /proc/sys/net/ipv4/tcp_window_scaling
+ cat /proc/sys/net/ipv4/tcp_window_scaling
1
+ _________________________ /proc/sys/net/ipv4/tcp_adv_win_scale
+ cat /proc/sys/net/ipv4/tcp_adv_win_scale
2
+ _________________________ uname-a
+ uname -a
Linux mail.edelweiss-gurgl.com 2.6.18-53.1.13.2.ccPAE #1 SMP Wed Feb 27
18:52:16 EST 2008 i686 i686 i386 GNU/Linux
+ _________________________ config-built-with
+ test -r /proc/config_built_with
+ _________________________ distro-release
+ for distro in /etc/redhat-release /etc/debian-release /etc/SuSE-release
/etc/mandrake-release /etc/mandriva-release /etc/gentoo-release
+ test -f /etc/redhat-release
+ cat /etc/redhat-release
CentOS release 4.4 (Final)
+ for distro in /etc/redhat-release /etc/debian-release /etc/SuSE-release
/etc/mandrake-release /etc/mandriva-release /etc/gentoo-release
+ test -f /etc/debian-release
+ for distro in /etc/redhat-release /etc/debian-release /etc/SuSE-release
/etc/mandrake-release /etc/mandriva-release /etc/gentoo-release
+ test -f /etc/SuSE-release
+ for distro in /etc/redhat-release /etc/debian-release /etc/SuSE-release
/etc/mandrake-release /etc/mandriva-release /etc/gentoo-release
+ test -f /etc/mandrake-release
+ for distro in /etc/redhat-release /etc/debian-release /etc/SuSE-release
/etc/mandrake-release /etc/mandriva-release /etc/gentoo-release
+ test -f /etc/mandriva-release
+ for distro in /etc/redhat-release /etc/debian-release /etc/SuSE-release
/etc/mandrake-release /etc/mandriva-release /etc/gentoo-release
+ test -f /etc/gentoo-release
+ _________________________ /proc/net/ipsec_version
+ test -r /proc/net/ipsec_version
+ test -r /proc/net/pfkey
++ uname -r
+ echo 'NETKEY (2.6.18-53.1.13.2.ccPAE) support detected '
NETKEY (2.6.18-53.1.13.2.ccPAE) support detected
+ _________________________ ipfwadm
+ test -r /sbin/ipfwadm
+ 'no old-style linux 1.x/2.0 ipfwadm firewall support'
/usr/libexec/ipsec/barf: line 305: no old-style linux 1.x/2.0 ipfwadm
firewall support: Datei oder Verzeichnis nicht gefunden
+ _________________________ ipchains
+ test -r /sbin/ipchains
+ echo 'no old-style linux 2.0 ipchains firewall support'
no old-style linux 2.0 ipchains firewall support
+ _________________________ iptables
+ test -r /sbin/iptables
+ iptables -L -v -n
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0 state INVALID
0 0 REJECT tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp flags:0x12/0x12 state NEW reject-with tcp-reset
1408 171K DROP tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp flags:!0x17/0x02 state NEW
0 0 DROP all -- eth0 * 127.0.0.0/8
0.0.0.0/0
0 0 DROP all -- eth0 * 169.254.0.0/16
0.0.0.0/0
11821 3033K ACCEPT all -- lo * 0.0.0.0/0
0.0.0.0/0
0 0 ACCEPT all -- pptp+ * 0.0.0.0/0
0.0.0.0/0
1957 187K ACCEPT all -- tun+ * 0.0.0.0/0
0.0.0.0/0
17350 4040K ACCEPT all -- eth1 * 0.0.0.0/0
0.0.0.0/0
12412 3784K ACCEPT all -- eth2 * 0.0.0.0/0
0.0.0.0/0
559 16211 ACCEPT icmp -- eth0 * 0.0.0.0/0
0.0.0.0/0 icmp type 0
51 4446 ACCEPT icmp -- eth0 * 0.0.0.0/0
0.0.0.0/0 icmp type 3
16 976 ACCEPT icmp -- eth0 * 0.0.0.0/0
0.0.0.0/0 icmp type 8
69 4320 ACCEPT icmp -- eth0 * 0.0.0.0/0
0.0.0.0/0 icmp type 11
1149 377K ACCEPT udp -- eth0 * 0.0.0.0/0
0.0.0.0/0 udp spt:67 dpt:68
0 0 ACCEPT tcp -- eth0 * 0.0.0.0/0
0.0.0.0/0 tcp spt:67 dpt:68
0 0 ACCEPT tcp -- * * 0.0.0.0/0
83.218.162.44 tcp dpt:20
0 0 ACCEPT tcp -- * * 0.0.0.0/0
83.218.162.44 tcp dpt:21
0 0 ACCEPT tcp -- * * 0.0.0.0/0
83.218.162.44 tcp dpt:443
0 0 ACCEPT tcp -- * * 0.0.0.0/0
83.218.162.44 tcp dpt:444
0 0 ACCEPT udp -- * * 0.0.0.0/0
83.218.162.44 udp dpt:4500
255 19380 ACCEPT udp -- * * 0.0.0.0/0
83.218.162.44 udp dpt:123
11958 1612K ACCEPT udp -- * * 0.0.0.0/0
83.218.162.44 udp dpt:1194
1014 286K ACCEPT tcp -- * * 0.0.0.0/0
83.218.162.44 tcp dpt:25
1872 170K ACCEPT tcp -- * * 0.0.0.0/0
83.218.162.44 tcp dpt:22
3 144 ACCEPT tcp -- * * 0.0.0.0/0
83.218.162.44 tcp dpt:5900
0 0 ACCEPT tcp -- * * 0.0.0.0/0
83.218.162.44 tcp dpt:5800
21 2434 ACCEPT tcp -- * * 0.0.0.0/0
83.218.162.44 tcp dpt:81
0 0 ACCEPT tcp -- * * 0.0.0.0/0
83.218.162.44 tcp dpt:1875
256 39992 ACCEPT udp -- * * 0.0.0.0/0
83.218.162.44 udp spt:500 dpt:500
4058 1177K ACCEPT esp -- * * 0.0.0.0/0
83.218.162.44
0 0 ACCEPT ah -- * * 0.0.0.0/0
83.218.162.44
0 0 ACCEPT all -- * * 0.0.0.0/0
83.218.162.44 MARK match 0x64
0 0 ACCEPT all -- * * 0.0.0.0/0
192.168.6.1 MARK match 0x64
0 0 ACCEPT all -- * * 0.0.0.0/0
192.168.10.1 MARK match 0x64
1188 189K ACCEPT udp -- eth0 * 0.0.0.0/0
83.218.162.44 udp dpts:1024:65535 state RELATED,ESTABLISHED
285 122K ACCEPT tcp -- eth0 * 0.0.0.0/0
83.218.162.44 tcp dpts:1024:65535 state RELATED,ESTABLISHED
113 19489 DROP all -- eth0 * 0.0.0.0/0
0.0.0.0/0
0 0 ACCEPT esp -- eth0 * 0.0.0.0/0
0.0.0.0/0
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
3806 951K ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 MARK match 0x64
0 0 ACCEPT tcp -- * eth1 0.0.0.0/0
192.168.10.10 tcp dpt:17344
0 0 ACCEPT tcp -- * eth2 0.0.0.0/0
192.168.10.10 tcp dpt:17344
0 0 ACCEPT tcp -- * eth1 0.0.0.0/0
192.168.10.62 tcp dpt:80
20 2303 ACCEPT tcp -- * eth2 0.0.0.0/0
192.168.10.62 tcp dpt:80
3987K 4021M ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
3977 475K ACCEPT all -- eth1 * 0.0.0.0/0
0.0.0.0/0
2096 262K ACCEPT all -- eth2 * 0.0.0.0/0
0.0.0.0/0
0 0 ACCEPT all -- pptp+ * 0.0.0.0/0
0.0.0.0/0
26 1878 ACCEPT all -- tun+ * 0.0.0.0/0
0.0.0.0/0
0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0
Chain OUTPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
13229 3204K ACCEPT all -- * lo 0.0.0.0/0
0.0.0.0/0
0 0 ACCEPT all -- * pptp+ 0.0.0.0/0
0.0.0.0/0
2280 227K ACCEPT all -- * tun+ 0.0.0.0/0
0.0.0.0/0
207 39741 ACCEPT all -- * eth1 0.0.0.0/0
0.0.0.0/0
11949 16M ACCEPT all -- * eth2 0.0.0.0/0
0.0.0.0/0
636 24007 ACCEPT icmp -- * eth0 0.0.0.0/0
0.0.0.0/0
0 0 ACCEPT udp -- * eth0 0.0.0.0/0
0.0.0.0/0 udp spt:68 dpt:67
0 0 ACCEPT tcp -- * eth0 0.0.0.0/0
0.0.0.0/0 tcp spt:68 dpt:67
0 0 ACCEPT tcp -- * eth0 83.218.162.44
0.0.0.0/0 tcp spt:20
0 0 ACCEPT tcp -- * eth0 83.218.162.44
0.0.0.0/0 tcp spt:21
0 0 ACCEPT tcp -- * eth0 83.218.162.44
0.0.0.0/0 tcp spt:443
0 0 ACCEPT tcp -- * eth0 83.218.162.44
0.0.0.0/0 tcp spt:444
0 0 ACCEPT udp -- * eth0 83.218.162.44
0.0.0.0/0 udp spt:4500
255 19380 ACCEPT udp -- * eth0 83.218.162.44
0.0.0.0/0 udp spt:123
14863 3335K ACCEPT udp -- * eth0 83.218.162.44
0.0.0.0/0 udp spt:1194
892 70964 ACCEPT tcp -- * eth0 83.218.162.44
0.0.0.0/0 tcp spt:25
2155 205K ACCEPT tcp -- * eth0 83.218.162.44
0.0.0.0/0 tcp spt:22
3 120 ACCEPT tcp -- * eth0 83.218.162.44
0.0.0.0/0 tcp spt:5900
0 0 ACCEPT tcp -- * eth0 83.218.162.44
0.0.0.0/0 tcp spt:5800
23 29297 ACCEPT tcp -- * eth0 83.218.162.44
0.0.0.0/0 tcp spt:81
0 0 ACCEPT tcp -- * eth0 83.218.162.44
0.0.0.0/0 tcp spt:1875
153 22812 ACCEPT udp -- * eth0 83.218.162.44
0.0.0.0/0 udp spt:500 dpt:500
3221 894K ACCEPT esp -- * eth0 83.218.162.44
0.0.0.0/0
0 0 ACCEPT ah -- * eth0 83.218.162.44
0.0.0.0/0
1557 119K ACCEPT all -- * eth0 0.0.0.0/0
0.0.0.0/0
0 0 DROP all -- * eth0 0.0.0.0/0
0.0.0.0/0
0 0 ACCEPT esp -- * eth0 0.0.0.0/0
0.0.0.0/0
Chain drop-lan (0 references)
pkts bytes target prot opt in out source
destination
0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0
+ _________________________ iptables-nat
+ iptables -t nat -L -v -n
Chain PREROUTING (policy ACCEPT 34324 packets, 5493K bytes)
pkts bytes target prot opt in out source
destination
0 0 DNAT tcp -- * * 0.0.0.0/0
83.218.162.44 tcp dpt:17344 to:192.168.10.10:17344
3 180 DNAT tcp -- * * 0.0.0.0/0
83.218.162.44 tcp dpt:45850 to:192.168.10.62:80
Chain POSTROUTING (policy ACCEPT 8449 packets, 1046K bytes)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT esp -- * eth0 0.0.0.0/0
0.0.0.0/0
0 0 ACCEPT ah -- * eth0 0.0.0.0/0
0.0.0.0/0
0 0 ACCEPT all -- * tun+ 0.0.0.0/0
0.0.0.0/0
0 0 SNAT tcp -- * * 192.168.6.0/24
192.168.10.10 tcp dpt:17344 to:192.168.6.1
0 0 SNAT tcp -- * * 192.168.10.0/24
192.168.10.10 tcp dpt:17344 to:192.168.10.1
0 0 SNAT tcp -- * * 192.168.6.0/24
192.168.10.62 tcp dpt:45850 to:192.168.6.1
0 0 SNAT tcp -- * * 192.168.10.0/24
192.168.10.62 tcp dpt:45850 to:192.168.10.1
3555 257K MASQUERADE all -- * eth0 0.0.0.0/0
0.0.0.0/0
0 0 MASQUERADE all -- * eth0 0.0.0.0/0
0.0.0.0/0
Chain OUTPUT (policy ACCEPT 3976 packets, 239K bytes)
pkts bytes target prot opt in out source
destination
+ _________________________ iptables-mangle
+ iptables -t mangle -L -v -n
Chain PREROUTING (policy ACCEPT 6355K packets, 5751M bytes)
pkts bytes target prot opt in out source
destination
4058 1177K MARK esp -- * * 0.0.0.0/0
0.0.0.0/0 MARK set 0x64
3066 614K ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 MARK match !0x0
4005K 4024M CONNMARK tcp -- * * 0.0.0.0/0
0.0.0.0/0 CONNMARK restore
Chain INPUT (policy ACCEPT 339K packets, 250M bytes)
pkts bytes target prot opt in out source
destination
Chain FORWARD (policy ACCEPT 6035K packets, 5503M bytes)
pkts bytes target prot opt in out source
destination
Chain OUTPUT (policy ACCEPT 340K packets, 346M bytes)
pkts bytes target prot opt in out source
destination
Chain POSTROUTING (policy ACCEPT 6375K packets, 5850M bytes)
pkts bytes target prot opt in out source
destination
+ _________________________ /proc/modules
+ test -f /proc/modules
+ cat /proc/modules
xfrm4_tunnel 6656 0 - Live 0xf8e27000
af_key 41488 0 - Live 0xf8ec3000
iptable_raw 6144 0 - Live 0xf8e2a000
xfrm4_mode_tunnel 6912 2 - Live 0xf8e8d000
ipv6 256448 34 - Live 0xf8f02000
deflate 8064 0 - Live 0xf8e83000
zlib_deflate 22808 1 deflate, Live 0xf8e9b000
twofish 41472 0 - Live 0xf8eaa000
serpent 22272 0 - Live 0xf8e94000
blowfish 12800 0 - Live 0xf8e88000
crypto_null 6656 0 - Live 0xf8e80000
tunnel4 7428 1 xfrm4_tunnel, Live 0xf8e57000
ipcomp 11912 0 - Live 0xf8e79000
esp4 11776 2 - Live 0xf8e75000
ah4 10496 0 - Live 0xf8e71000
aes 32832 0 - Live 0xf8e67000
des 19712 2 - Live 0xf8e43000
md5 8192 2 - Live 0xf8e3a000
sha256 13440 0 - Live 0xf8e4e000
tun 14976 1 - Live 0xf8e49000
xt_CONNMARK 6528 1 - Live 0xf8e40000
xt_mark 6016 5 - Live 0xf8e3d000
xt_tcpudp 7424 46 - Live 0xf8e34000
xt_state 6272 6 - Live 0xf8e37000
sch_htb 20480 3 - Live 0xf8e2e000
xt_MARK 6528 1 - Live 0xf8e24000
ip_nat_pptp 10116 0 - Live 0xf8e20000
ipt_ipp2p 11008 0 - Live 0xf8df9000
ip_nat_mms 6784 0 - Live 0xf8e18000
ip_conntrack_mms 75440 1 ip_nat_mms, Live 0xf8e04000
ip_nat_irc 6784 0 - Live 0xf8e01000
ip_nat_ftp 7424 0 - Live 0xf8ded000
ipt_MASQUERADE 8448 2 - Live 0xf8dfd000
ip_conntrack_pptp 15760 1 ip_nat_pptp, Live 0xf8dd9000
arc4 6144 0 - Live 0xf8dea000
ppp_mppe 10500 0 - Live 0xf8de6000
ppp_generic 30740 1 ppp_mppe, Live 0xf8df0000
slhc 10624 1 ppp_generic, Live 0xf8de2000
ip_conntrack_irc 10864 1 ip_nat_irc, Live 0xf8dde000
ip_conntrack_ftp 12016 1 ip_nat_ftp, Live 0xf8db1000
ipt_REJECT 9600 1 - Live 0xf8db5000
ipt_LOG 10112 0 - Live 0xf8dd5000
iptable_nat 11652 1 - Live 0xf8dd1000
ip_nat 21932 6
ip_nat_pptp,ip_nat_mms,ip_nat_irc,ip_nat_ftp,ipt_MASQUERADE,iptable_nat,
Live 0xf8db9000
ip_conntrack 53984 13
xt_CONNMARK,xt_state,ip_nat_pptp,ip_nat_mms,ip_conntrack_mms,ip_nat_irc,ip_nat_ftp,ipt_MASQUERADE,ip_conntrack_pptp,ip_conntrack_irc,ip_conntrack_ftp,iptable_nat,ip_nat,
Live 0xf8b8f000
nfnetlink 10904 2 ip_nat,ip_conntrack, Live 0xf8b5c000
iptable_mangle 6912 1 - Live 0xf8b8c000
iptable_filter 7040 1 - Live 0xf8b60000
ip_tables 17492 4 iptable_raw,iptable_nat,iptable_mangle,iptable_filter,
Live 0xf8b71000
x_tables 17668 11
xt_CONNMARK,xt_mark,xt_tcpudp,xt_state,xt_MARK,ipt_ipp2p,ipt_MASQUERADE,ipt_REJECT,ipt_LOG,iptable_nat,ip_tables,
Live 0xf8b6b000
dm_mod 61976 0 - Live 0xf8b9f000
video 20484 0 - Live 0xf8b64000
sbs 18980 0 - Live 0xf8af0000
i2c_ec 9216 1 sbs, Live 0xf8b11000
button 10896 0 - Live 0xf8afb000
battery 13828 0 - Live 0xf8af6000
asus_acpi 19480 0 - Live 0xf8841000
ac 9348 0 - Live 0xf887b000
usb_storage 80480 1 - Live 0xf8b77000
uhci_hcd 26380 0 - Live 0xf8a78000
ehci_hcd 34444 0 - Live 0xf8b52000
i2c_i801 11532 0 - Live 0xf883d000
i2c_core 24064 2 i2c_ec,i2c_i801, Live 0xf8a71000
skge 39952 0 - Live 0xf8a66000
r8169 32520 0 - Live 0xf881c000
tg3 107012 0 - Live 0xf8b36000
ext3 126216 2 - Live 0xf8b16000
jbd 58152 1 ext3, Live 0xf8a56000
ata_piix 18820 0 - Live 0xf882d000
libata 119352 1 ata_piix, Live 0xf8ad1000
aacraid 62212 3 - Live 0xf886a000
sd_mod 25600 6 - Live 0xf8825000
scsi_mod 136460 4 usb_storage,libata,aacraid,sd_mod, Live 0xf8847000
+ _________________________ /proc/meminfo
+ cat /proc/meminfo
MemTotal: 4147604 kB
MemFree: 185024 kB
Buffers: 173368 kB
Cached: 2861608 kB
SwapCached: 0 kB
Active: 661504 kB
Inactive: 2728228 kB
HighTotal: 3276160 kB
HighFree: 51640 kB
LowTotal: 871444 kB
LowFree: 133384 kB
SwapTotal: 4192956 kB
SwapFree: 4192956 kB
Dirty: 268 kB
Writeback: 0 kB
AnonPages: 348208 kB
Mapped: 21572 kB
Slab: 560404 kB
PageTables: 2812 kB
NFS_Unstable: 0 kB
Bounce: 0 kB
CommitLimit: 6266756 kB
Committed_AS: 680584 kB
VmallocTotal: 116728 kB
VmallocUsed: 7020 kB
VmallocChunk: 109296 kB
HugePages_Total: 0
HugePages_Free: 0
HugePages_Rsvd: 0
Hugepagesize: 2048 kB
+ _________________________ /proc/net/ipsec-ls
+ test -f /proc/net/ipsec_version
+ _________________________ usr/src/linux/.config
+ test -f /proc/config.gz
++ uname -r
+ test -f /lib/modules/2.6.18-53.1.13.2.ccPAE/build/.config
++ uname -r
+ egrep
'CONFIG_IPSEC|CONFIG_KLIPS|CONFIG_NET_KEY|CONFIG_INET|CONFIG_IP|CONFIG_HW_RANDOM|CONFIG_CRYPTO_DEV|_XFRM'
+ cat /lib/modules/2.6.18-53.1.13.2.ccPAE/build/.config
CONFIG_XFRM=y
CONFIG_XFRM_USER=y
CONFIG_NET_KEY=m
CONFIG_INET=y
CONFIG_IP_MULTICAST=y
CONFIG_IP_ADVANCED_ROUTER=y
# CONFIG_IP_FIB_TRIE is not set
CONFIG_IP_FIB_HASH=y
CONFIG_IP_MULTIPLE_TABLES=y
CONFIG_IP_ROUTE_FWMARK=y
CONFIG_IP_ROUTE_MULTIPATH=y
# CONFIG_IP_ROUTE_MULTIPATH_CACHED is not set
CONFIG_IP_ROUTE_VERBOSE=y
# CONFIG_IP_PNP is not set
CONFIG_IP_MROUTE=y
CONFIG_IP_PIMSM_V1=y
CONFIG_IP_PIMSM_V2=y
CONFIG_INET_AH=m
CONFIG_INET_ESP=m
CONFIG_INET_IPCOMP=m
CONFIG_INET_XFRM_TUNNEL=m
CONFIG_INET_TUNNEL=m
CONFIG_INET_XFRM_MODE_TRANSPORT=m
CONFIG_INET_XFRM_MODE_TUNNEL=m
CONFIG_INET_DIAG=m
CONFIG_INET_TCP_DIAG=m
CONFIG_IP_VS=m
# CONFIG_IP_VS_DEBUG is not set
CONFIG_IP_VS_TAB_BITS=12
CONFIG_IP_VS_PROTO_TCP=y
CONFIG_IP_VS_PROTO_UDP=y
CONFIG_IP_VS_PROTO_ESP=y
CONFIG_IP_VS_PROTO_AH=y
CONFIG_IP_VS_RR=m
CONFIG_IP_VS_WRR=m
CONFIG_IP_VS_LC=m
CONFIG_IP_VS_WLC=m
CONFIG_IP_VS_LBLC=m
CONFIG_IP_VS_LBLCR=m
CONFIG_IP_VS_DH=m
CONFIG_IP_VS_SH=m
CONFIG_IP_VS_SED=m
CONFIG_IP_VS_NQ=m
CONFIG_IP_VS_FTP=m
CONFIG_IPV6=m
CONFIG_IPV6_PRIVACY=y
CONFIG_IPV6_ROUTER_PREF=y
CONFIG_IPV6_ROUTE_INFO=y
CONFIG_INET6_AH=m
CONFIG_INET6_ESP=m
CONFIG_INET6_IPCOMP=m
CONFIG_INET6_XFRM_TUNNEL=m
CONFIG_INET6_TUNNEL=m
CONFIG_INET6_XFRM_MODE_TRANSPORT=m
CONFIG_INET6_XFRM_MODE_TUNNEL=m
CONFIG_IPV6_TUNNEL=m
# CONFIG_IPV6_SUBTREES is not set
CONFIG_IPV6_MULTIPLE_TABLES=y
CONFIG_IPV6_ROUTE_FWMARK=y
CONFIG_IP_NF_CONNTRACK=m
CONFIG_IP_NF_CT_ACCT=y
CONFIG_IP_NF_CONNTRACK_MARK=y
CONFIG_IP_NF_CONNTRACK_SECMARK=y
CONFIG_IP_NF_CONNTRACK_EVENTS=y
CONFIG_IP_NF_CONNTRACK_NETLINK=m
CONFIG_IP_NF_CT_PROTO_SCTP=m
CONFIG_IP_NF_FTP=m
CONFIG_IP_NF_IRC=m
CONFIG_IP_NF_NETBIOS_NS=m
CONFIG_IP_NF_TFTP=m
CONFIG_IP_NF_AMANDA=m
CONFIG_IP_NF_PPTP=m
CONFIG_IP_NF_H323=m
CONFIG_IP_NF_SIP=m
CONFIG_IP_NF_QUEUE=m
CONFIG_IP_NF_IPTABLES=m
CONFIG_IP_NF_MATCH_IPRANGE=m
CONFIG_IP_NF_MATCH_TOS=m
CONFIG_IP_NF_MATCH_RECENT=m
CONFIG_IP_NF_MATCH_ECN=m
CONFIG_IP_NF_MATCH_DSCP=m
CONFIG_IP_NF_MATCH_AH=m
CONFIG_IP_NF_MATCH_TTL=m
CONFIG_IP_NF_MATCH_OWNER=m
CONFIG_IP_NF_MATCH_ADDRTYPE=m
CONFIG_IP_NF_MATCH_HASHLIMIT=m
CONFIG_IP_NF_FILTER=m
CONFIG_IP_NF_TARGET_REJECT=m
CONFIG_IP_NF_TARGET_LOG=m
CONFIG_IP_NF_TARGET_ULOG=m
CONFIG_IP_NF_TARGET_TCPMSS=m
CONFIG_IP_NF_NAT=m
CONFIG_IP_NF_NAT_NEEDED=y
CONFIG_IP_NF_TARGET_MASQUERADE=m
CONFIG_IP_NF_TARGET_REDIRECT=m
CONFIG_IP_NF_TARGET_NETMAP=m
CONFIG_IP_NF_TARGET_SAME=m
CONFIG_IP_NF_NAT_SNMP_BASIC=m
CONFIG_IP_NF_NAT_IRC=m
CONFIG_IP_NF_NAT_FTP=m
CONFIG_IP_NF_NAT_TFTP=m
CONFIG_IP_NF_NAT_AMANDA=m
CONFIG_IP_NF_NAT_PPTP=m
CONFIG_IP_NF_NAT_H323=m
CONFIG_IP_NF_NAT_SIP=m
CONFIG_IP_NF_MANGLE=m
CONFIG_IP_NF_TARGET_TOS=m
CONFIG_IP_NF_TARGET_ECN=m
CONFIG_IP_NF_TARGET_DSCP=m
CONFIG_IP_NF_TARGET_TTL=m
CONFIG_IP_NF_TARGET_CLUSTERIP=m
CONFIG_IP_NF_RAW=m
CONFIG_IP_NF_ARPTABLES=m
CONFIG_IP_NF_ARPFILTER=m
CONFIG_IP_NF_ARP_MANGLE=m
CONFIG_IP_NF_MATCH_IPP2P=m
CONFIG_IP_NF_NAT_MMS=m
CONFIG_IP_NF_MMS=m
CONFIG_IP6_NF_QUEUE=m
CONFIG_IP6_NF_IPTABLES=m
CONFIG_IP6_NF_MATCH_RT=m
CONFIG_IP6_NF_MATCH_OPTS=m
CONFIG_IP6_NF_MATCH_FRAG=m
CONFIG_IP6_NF_MATCH_HL=m
CONFIG_IP6_NF_MATCH_OWNER=m
CONFIG_IP6_NF_MATCH_IPV6HEADER=m
CONFIG_IP6_NF_MATCH_AH=m
CONFIG_IP6_NF_MATCH_EUI64=m
CONFIG_IP6_NF_FILTER=m
CONFIG_IP6_NF_TARGET_LOG=m
CONFIG_IP6_NF_TARGET_REJECT=m
CONFIG_IP6_NF_MANGLE=m
CONFIG_IP6_NF_TARGET_HL=m
CONFIG_IP6_NF_RAW=m
CONFIG_IP_DCCP=m
CONFIG_INET_DCCP_DIAG=m
CONFIG_IP_DCCP_ACKVEC=y
CONFIG_IP_DCCP_CCID2=m
CONFIG_IP_DCCP_CCID3=m
CONFIG_IP_DCCP_TFRC_LIB=m
# CONFIG_IP_DCCP_DEBUG is not set
CONFIG_IP_SCTP=m
CONFIG_IPX=m
# CONFIG_IPX_INTERN is not set
CONFIG_IPW2100=m
CONFIG_IPW2100_MONITOR=y
# CONFIG_IPW2100_DEBUG is not set
CONFIG_IPW2200=m
CONFIG_IPW2200_MONITOR=y
CONFIG_IPW2200_RADIOTAP=y
CONFIG_IPW2200_PROMISCUOUS=y
CONFIG_IPW2200_QOS=y
# CONFIG_IPW2200_DEBUG is not set
CONFIG_IPPP_FILTER=y
CONFIG_IPMI_HANDLER=m
# CONFIG_IPMI_PANIC_EVENT is not set
CONFIG_IPMI_DEVICE_INTERFACE=m
CONFIG_IPMI_SI=m
CONFIG_IPMI_WATCHDOG=m
CONFIG_IPMI_POWEROFF=m
CONFIG_HW_RANDOM=y
CONFIG_HW_RANDOM_INTEL=m
CONFIG_HW_RANDOM_AMD=m
CONFIG_HW_RANDOM_GEODE=m
CONFIG_HW_RANDOM_VIA=m
CONFIG_SECURITY_NETWORK_XFRM=y
CONFIG_CRYPTO_DEV_PADLOCK=m
CONFIG_CRYPTO_DEV_PADLOCK_AES=y
+ _________________________ etc/syslog.conf
+ cat /etc/syslog.conf
# Log all kernel messages to the console.
# Logging much else clutters up the screen.
#kern.* /dev/console
# Suva logging:
local0.* /var/log/suva
# Log anything (except mail) of level info or higher.
# Don't log private authentication messages!
*.info;mail.none;authpriv.none;local0.none;cron.none;local6.none
/var/log/messages
# The authpriv file has restricted access.
authpriv.* /var/log/secure
# Log all the mail messages in one place.
mail.* -/var/log/maillog
# Log cron stuff
cron.* /var/log/cron
# Everybody gets emergency messages
*.emerg *
# Save news errors of level crit and higher in a special file.
uucp,news.crit /var/log/spooler
# Save boot messages also to boot.log
local7.* /var/log/boot.log
local6.* /var/log/system
+ _________________________ etc/syslog-ng/syslog-ng.conf
+ cat /etc/syslog-ng/syslog-ng.conf
cat: /etc/syslog-ng/syslog-ng.conf: No such file or directory
+ _________________________ etc/resolv.conf
+ cat /etc/resolv.conf
nameserver 127.0.0.1
nameserver 83.218.160.1
nameserver 83.218.160.2
+ _________________________ lib/modules-ls
+ ls -ltr /lib/modules
total 2
drwxr-xr-x 6 root root 1024 Aug 4 09:41 2.6.18-53.1.13.2.cc
drwxr-xr-x 6 root root 1024 Aug 4 13:48 2.6.18-53.1.13.2.ccPAE
+ _________________________ /proc/ksyms-netif_rx
+ test -r /proc/ksyms
+ test -r /proc/kallsyms
+ egrep netif_rx /proc/kallsyms
c05bd6fc T __netif_rx_schedule
c05bdde7 T netif_rx
c05bdf1a T netif_rx_ni
c05bdde7 U netif_rx [ipv6]
c05bdf1a U netif_rx_ni [tun]
c05bdde7 U netif_rx [ppp_generic]
c05bd6fc U __netif_rx_schedule [skge]
c05bd6fc U __netif_rx_schedule [r8169]
c05bd6fc U __netif_rx_schedule [tg3]
+ _________________________ lib/modules-netif_rx
+ modulegoo kernel/net/ipv4/ipip.o netif_rx
+ set +x
2.6.18-53.1.13.2.cc:
2.6.18-53.1.13.2.ccPAE:
+ _________________________ kern.debug
+ test -f /var/log/kern.debug
+ _________________________ klog
+ sed -n '6832,$p' /var/log/messages
+ egrep -i 'ipsec|klips|pluto'
+ case "$1" in
+ cat
Aug 5 07:35:49 mail ipsec_setup: Starting Openswan IPsec 2.4.13...
Aug 5 07:35:49 mail ipsec__plutorun: 104 "edelweiss" #1: STATE_MAIN_I1:
initiate
+ _________________________ plog
+ sed -n '8278,$p' /var/log/secure
+ egrep -i pluto
+ case "$1" in
+ cat
Aug 5 07:35:49 mail ipsec__plutorun: Starting Pluto subsystem...
Aug 5 07:35:49 mail ipsec__plutorun: Unknown default RSA hostkey scheme,
not generating a default hostkey
Aug 5 07:35:49 mail pluto[27360]: Starting Pluto (Openswan Version 2.4.13
PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR; Vendor ID OE`fijAufQMD)
Aug 5 07:35:49 mail pluto[27360]: Setting NAT-Traversal port-4500 floating
to off
Aug 5 07:35:49 mail pluto[27360]: port floating activation criteria
nat_t=0/port_fload=1
Aug 5 07:35:49 mail pluto[27360]: including NAT-Traversal patch (Version
0.6c) [disabled]
Aug 5 07:35:49 mail pluto[27360]: | opening /dev/urandom
Aug 5 07:35:49 mail pluto[27360]: | inserting event EVENT_REINIT_SECRET,
timeout in 3600 seconds
Aug 5 07:35:49 mail pluto[27360]: | inserting event EVENT_PENDING_PHASE2,
timeout in 120 seconds
Aug 5 07:35:49 mail pluto[27360]: ike_alg_register_enc(): Activating
OAKLEY_AES_CBC: Ok (ret=0)
Aug 5 07:35:49 mail pluto[27360]: starting up 1 cryptographic helpers
Aug 5 07:35:49 mail pluto[27376]: | opening /dev/urandom
Aug 5 07:35:49 mail pluto[27360]: started helper pid=27376 (fd:6)
Aug 5 07:35:49 mail pluto[27360]: | process 27360 listening for PF_KEY_V2
on file descriptor 7
Aug 5 07:35:49 mail pluto[27360]: Using NETKEY IPsec interface code on
2.6.18-53.1.13.2.ccPAE
Aug 5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_hdr_build:
Aug 5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_hdr_build:
on_entry &pfkey_ext=0p0xbfb86030 pfkey_ext=0p0xbfb87050 *pfkey_ext=0p(nil).
Aug 5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_hdr_build:
on_exit &pfkey_ext=0p0xbfb86030 pfkey_ext=0p0xbfb87050
*pfkey_ext=0p0x95663e8.
Aug 5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_build:
pfkey_msg=0p0x9566400 allocated 16 bytes, &(extensions[0])=0p0xbfb87050
Aug 5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_build:
extensions permitted=00000001, seen=00000001, required=00000001.
Aug 5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_parse:
parsing message ver=2, type=7(register), errno=0, satype=2(AH), len=2,
res=0, seq=1, pid=27360.
Aug 5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_parse:
remain=0
Aug 5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_parse:
extensions permitted=00000001, required=00000001.
Aug 5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_parse:
extensions permitted=00000001, seen=00000001, required=00000001.
Aug 5 07:35:49 mail pluto[27360]: | finish_pfkey_msg: SADB_REGISTER
message 1 for AH
Aug 5 07:35:49 mail pluto[27360]: | 02 07 00 02 02 00 00 00 01 00 00
00 e0 6a 00 00
Aug 5 07:35:49 mail pluto[27376]: ! helper 0 waiting on fd: 7
Aug 5 07:35:49 mail pluto[27360]: | pfkey_get: SADB_REGISTER message 1
Aug 5 07:35:49 mail pluto[27360]: | AH registered with kernel.
Aug 5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_hdr_build:
Aug 5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_hdr_build:
on_entry &pfkey_ext=0p0xbfb86030 pfkey_ext=0p0xbfb87050 *pfkey_ext=0p(nil).
Aug 5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_hdr_build:
on_exit &pfkey_ext=0p0xbfb86030 pfkey_ext=0p0xbfb87050
*pfkey_ext=0p0x95663e8.
Aug 5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_build:
pfkey_msg=0p0x9566400 allocated 16 bytes, &(extensions[0])=0p0xbfb87050
Aug 5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_build:
extensions permitted=00000001, seen=00000001, required=00000001.
Aug 5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_parse:
parsing message ver=2, type=7(register), errno=0, satype=3(ESP), len=2,
res=0, seq=2, pid=27360.
Aug 5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_parse:
remain=0
Aug 5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_parse:
extensions permitted=00000001, required=00000001.
Aug 5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_parse:
extensions permitted=00000001, seen=00000001, required=00000001.
Aug 5 07:35:49 mail pluto[27360]: | finish_pfkey_msg: SADB_REGISTER
message 2 for ESP
Aug 5 07:35:49 mail pluto[27360]: | 02 07 00 03 02 00 00 00 02 00 00
00 e0 6a 00 00
Aug 5 07:35:49 mail pluto[27360]: | pfkey_get: SADB_REGISTER message 2
Aug 5 07:35:49 mail pluto[27360]: | alg_init():memset(0x80eff00, 0, 2016)
memset(0x80f06e0, 0, 2048)
Aug 5 07:35:49 mail pluto[27360]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: sadb_msg_len=15 sadb_supported_len=40
Aug 5 07:35:49 mail pluto[27360]: | kernel_alg_add():satype=3, exttype=14,
alg_id=251
Aug 5 07:35:49 mail pluto[27360]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: alg[0], exttype=14, satype=3, alg_id=251, alg_ivlen=0,
alg_minbits=0, alg_maxbits=0, res=0, ret=1
Aug 5 07:35:49 mail pluto[27360]: | kernel_alg_add():satype=3, exttype=14,
alg_id=2
Aug 5 07:35:49 mail pluto[27360]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: alg[1], exttype=14, satype=3, alg_id=2, alg_ivlen=0,
alg_minbits=128, alg_maxbits=128, res=0, ret=1
Aug 5 07:35:49 mail pluto[27360]: | kernel_alg_add():satype=3, exttype=14,
alg_id=3
Aug 5 07:35:49 mail pluto[27360]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: alg[2], exttype=14, satype=3, alg_id=3, alg_ivlen=0,
alg_minbits=160, alg_maxbits=160, res=0, ret=1
Aug 5 07:35:49 mail pluto[27360]: | kernel_alg_add():satype=3, exttype=14,
alg_id=5
Aug 5 07:35:49 mail pluto[27360]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: alg[3], exttype=14, satype=3, alg_id=5, alg_ivlen=0,
alg_minbits=256, alg_maxbits=256, res=0, ret=1
Aug 5 07:35:49 mail pluto[27360]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: sadb_msg_len=15 sadb_supported_len=64
Aug 5 07:35:49 mail pluto[27360]: | kernel_alg_add():satype=3, exttype=15,
alg_id=11
Aug 5 07:35:49 mail pluto[27360]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: alg[4], exttype=15, satype=3, alg_id=11, alg_ivlen=0,
alg_minbits=0, alg_maxbits=0, res=0, ret=1
Aug 5 07:35:49 mail pluto[27360]: | kernel_alg_add():satype=3, exttype=15,
alg_id=2
Aug 5 07:35:49 mail pluto[27360]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: alg[5], exttype=15, satype=3, alg_id=2, alg_ivlen=8,
alg_minbits=64, alg_maxbits=64, res=0, ret=1
Aug 5 07:35:49 mail pluto[27360]: | kernel_alg_add():satype=3, exttype=15,
alg_id=3
Aug 5 07:35:49 mail pluto[27360]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: alg[6], exttype=15, satype=3, alg_id=3, alg_ivlen=8,
alg_minbits=192, alg_maxbits=192, res=0, ret=1
Aug 5 07:35:49 mail pluto[27360]: | kernel_alg_add():satype=3, exttype=15,
alg_id=7
Aug 5 07:35:49 mail pluto[27360]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: alg[7], exttype=15, satype=3, alg_id=7, alg_ivlen=8,
alg_minbits=40, alg_maxbits=448, res=0, ret=1
Aug 5 07:35:49 mail pluto[27360]: | kernel_alg_add():satype=3, exttype=15,
alg_id=12
Aug 5 07:35:49 mail pluto[27360]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: alg[8], exttype=15, satype=3, alg_id=12, alg_ivlen=8,
alg_minbits=128, alg_maxbits=256, res=0, ret=1
Aug 5 07:35:49 mail pluto[27360]: | kernel_alg_add():satype=3, exttype=15,
alg_id=252
Aug 5 07:35:49 mail pluto[27360]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: alg[9], exttype=15, satype=3, alg_id=252, alg_ivlen=8,
alg_minbits=128, alg_maxbits=256, res=0, ret=1
Aug 5 07:35:49 mail pluto[27360]: | kernel_alg_add():satype=3, exttype=15,
alg_id=253
Aug 5 07:35:49 mail pluto[27360]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: alg[10], exttype=15, satype=3, alg_id=253, alg_ivlen=8,
alg_minbits=128, alg_maxbits=256, res=0, ret=1
Aug 5 07:35:49 mail pluto[27360]: | ESP registered with kernel.
Aug 5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_hdr_build:
Aug 5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_hdr_build:
on_entry &pfkey_ext=0p0xbfb86030 pfkey_ext=0p0xbfb87050 *pfkey_ext=0p(nil).
Aug 5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_hdr_build:
on_exit &pfkey_ext=0p0xbfb86030 pfkey_ext=0p0xbfb87050
*pfkey_ext=0p0x95663e8.
Aug 5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_build:
pfkey_msg=0p0x9566400 allocated 16 bytes, &(extensions[0])=0p0xbfb87050
Aug 5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_build:
extensions permitted=00000001, seen=00000001, required=00000001.
Aug 5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_parse:
parsing message ver=2, type=7(register), errno=0, satype=9(IPIP), len=2,
res=0, seq=3, pid=27360.
Aug 5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_parse:
remain=0
Aug 5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_parse:
extensions permitted=00000001, required=00000001.
Aug 5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_parse:
extensions permitted=00000001, seen=00000001, required=00000001.
Aug 5 07:35:49 mail pluto[27360]: | finish_pfkey_msg: SADB_REGISTER
message 3 for IPCOMP
Aug 5 07:35:49 mail pluto[27360]: | 02 07 00 09 02 00 00 00 03 00 00
00 e0 6a 00 00
Aug 5 07:35:49 mail pluto[27360]: | pfkey_get: SADB_REGISTER message 3
Aug 5 07:35:49 mail pluto[27360]: | IPCOMP registered with kernel.
Aug 5 07:35:49 mail pluto[27360]: Changing to directory
'/etc/ipsec.d/cacerts'
Aug 5 07:35:49 mail pluto[27360]: Changing to directory
'/etc/ipsec.d/aacerts'
Aug 5 07:35:49 mail pluto[27360]: Changing to directory
'/etc/ipsec.d/ocspcerts'
Aug 5 07:35:49 mail pluto[27360]: Changing to directory
'/etc/ipsec.d/crls'
Aug 5 07:35:49 mail pluto[27360]: Warning: empty directory
Aug 5 07:35:49 mail pluto[27360]: | inserting event EVENT_LOG_DAILY,
timeout in 59051 seconds
Aug 5 07:35:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug 5 07:35:49 mail pluto[27360]: |
Aug 5 07:35:49 mail pluto[27360]: | *received whack message
Aug 5 07:35:49 mail pluto[27360]: loading secrets from
"/etc/ipsec.secrets"
Aug 5 07:35:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug 5 07:35:49 mail pluto[27360]: |
Aug 5 07:35:49 mail pluto[27360]: | *received whack message
Aug 5 07:35:49 mail pluto[27360]: | alg_info_parse_str() ealg_buf=3des
aalg_buf=md5eklen=0 aklen=0
Aug 5 07:35:49 mail pluto[27360]: | enum_search_prefix () calling
enum_search(0x80d0be4, "OAKLEY_3DES")
Aug 5 07:35:49 mail pluto[27360]: | enum_search_ppfixi () calling
enum_search(0x80d0be4, "OAKLEY_3DES_CBC")
Aug 5 07:35:49 mail pluto[27360]: | parser_alg_info_add()
ealg_getbyname("3des")=5
Aug 5 07:35:49 mail pluto[27360]: | enum_search_prefix () calling
enum_search(0x80d0ba8, "OAKLEY_MD5")
Aug 5 07:35:49 mail pluto[27360]: | parser_alg_info_add()
aalg_getbyname("md5")=1
Aug 5 07:35:49 mail pluto[27360]: | enum_search_prefix () calling
enum_search(0x80d0acc, "OAKLEY_GROUP_MODP1024")
Aug 5 07:35:49 mail pluto[27360]: | parser_alg_info_add()
modp_getbyname("modp1024")=2
Aug 5 07:35:49 mail pluto[27360]: | __alg_info_ike_add() ealg=5 aalg=1
modp_id=2, cnt=1
Aug 5 07:35:49 mail pluto[27360]: | Added new connection edelweiss with
policy PSK+ENCRYPT+TUNNEL
Aug 5 07:35:49 mail pluto[27360]: | from whack: got --esp=3des-md5
Aug 5 07:35:49 mail pluto[27360]: | alg_info_parse_str() ealg_buf=3des
aalg_buf=md5eklen=0 aklen=0
Aug 5 07:35:49 mail pluto[27360]: | enum_search_prefix () calling
enum_search(0x80d100c, "ESP_3DES")
Aug 5 07:35:49 mail pluto[27360]: | parser_alg_info_add()
ealg_getbyname("3des")=3
Aug 5 07:35:49 mail pluto[27360]: | enum_search_prefix () calling
enum_search(0x80d0dc0, "AUTH_ALGORITHM_HMAC_MD5")
Aug 5 07:35:49 mail pluto[27360]: | parser_alg_info_add()
aalg_getbyname("md5")=1
Aug 5 07:35:49 mail pluto[27360]: | __alg_info_esp_add() ealg=3 aalg=1
cnt=1
Aug 5 07:35:49 mail pluto[27360]: | esp string values: 3DES(3)_000-MD5(1);
flags=strict
Aug 5 07:35:49 mail pluto[27360]: | from whack: got
--ike=3des-md5-modp1024
Aug 5 07:35:49 mail pluto[27360]: | ike string values:
3DES_CBC(5)_000-MD5(1)-MODP1024(2); flags=strict
Aug 5 07:35:49 mail pluto[27360]: | counting wild cards for 91.112.190.238
is 0
Aug 5 07:35:49 mail pluto[27360]: | counting wild cards for (none) is 15
Aug 5 07:35:49 mail pluto[27360]: | alg_info_addref() alg_info->ref_cnt=1
Aug 5 07:35:49 mail pluto[27360]: | alg_info_addref() alg_info->ref_cnt=1
Aug 5 07:35:49 mail pluto[27360]: | alg_info_addref() alg_info->ref_cnt=2
Aug 5 07:35:49 mail pluto[27360]: | alg_info_addref() alg_info->ref_cnt=2
Aug 5 07:35:49 mail pluto[27360]: added connection description "edelweiss"
Aug 5 07:35:49 mail pluto[27360]: |
192.168.5.0/24===91.112.190.238---91.112.190.237...83.218.162.62---83.218.162.44===192.168.6.0/24
Aug 5 07:35:49 mail pluto[27360]: | ike_life: 28800s; ipsec_life: 3600s;
rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; policy:
PSK+ENCRYPT+TUNNEL
Aug 5 07:35:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug 5 07:35:49 mail pluto[27360]: |
Aug 5 07:35:49 mail pluto[27360]: | *received whack message
Aug 5 07:35:49 mail pluto[27360]: listening for IKE messages
Aug 5 07:35:49 mail pluto[27360]: | found lo with address 127.0.0.1
Aug 5 07:35:49 mail pluto[27360]: | found eth0 with address 83.218.162.44
Aug 5 07:35:49 mail pluto[27360]: | found eth1 with address 192.168.6.1
Aug 5 07:35:49 mail pluto[27360]: | found eth2 with address 192.168.10.1
Aug 5 07:35:49 mail pluto[27360]: | found tun0 with address 192.168.2.1
Aug 5 07:35:49 mail pluto[27360]: adding interface tun0/tun0
192.168.2.1:500
Aug 5 07:35:49 mail pluto[27360]: adding interface eth2/eth2
192.168.10.1:500
Aug 5 07:35:49 mail pluto[27360]: adding interface eth1/eth1
192.168.6.1:500
Aug 5 07:35:49 mail pluto[27360]: adding interface eth0/eth0
83.218.162.44:500
Aug 5 07:35:49 mail pluto[27360]: adding interface lo/lo 127.0.0.1:500
Aug 5 07:35:49 mail pluto[27360]: | found lo with address
0000:0000:0000:0000:0000:0000:0000:0001
Aug 5 07:35:49 mail pluto[27360]: adding interface lo/lo ::1:500
Aug 5 07:35:49 mail pluto[27360]: | connect_to_host_pair:
83.218.162.44:500 91.112.190.238:500 -> hp:none
Aug 5 07:35:49 mail pluto[27360]: forgetting secrets
Aug 5 07:35:49 mail pluto[27360]: loading secrets from
"/etc/ipsec.secrets"
Aug 5 07:35:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug 5 07:35:49 mail pluto[27360]: |
Aug 5 07:35:49 mail pluto[27360]: | *received whack message
Aug 5 07:35:49 mail pluto[27360]: | processing connection edelweiss
Aug 5 07:35:49 mail pluto[27360]: | route owner of "edelweiss" unrouted:
NULL; eroute owner: NULL
Aug 5 07:35:49 mail pluto[27360]: | could_route called for edelweiss
(kind=CK_PERMANENT)
Aug 5 07:35:49 mail pluto[27360]: | route owner of "edelweiss" unrouted:
NULL; eroute owner: NULL
Aug 5 07:35:49 mail pluto[27360]: | route_and_eroute with c: edelweiss
(next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: 0
Aug 5 07:35:49 mail pluto[27360]: | add eroute 192.168.5.0/24:0 --0->
192.168.6.0/24:0 => %trap (raw_eroute)
Aug 5 07:35:49 mail pluto[27360]: | eroute_connection add eroute
192.168.6.0/24:0 --0-> 192.168.5.0/24:0 => %trap (raw_eroute)
Aug 5 07:35:49 mail pluto[27360]: | route_and_eroute: firewall_notified:
true
Aug 5 07:35:49 mail pluto[27360]: | command executing prepare-client
Aug 5 07:35:49 mail pluto[27360]: | executing prepare-client: 2>&1
PLUTO_VERSION='1.1' PLUTO_VERB='prepare-client'
PLUTO_CONNECTION='edelweiss' PLUTO_NEXT_HOP='83.218.162.62'
PLUTO_INTERFACE='eth0' PLUTO_ME='83.218.162.44' PLUTO_MY_ID='83.218.162.44'
PLUTO_MY_CLIENT='192.168.6.0/24' PLUTO_MY_CLIENT_NET='192.168.6.0'
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0'
PLUTO_MY_PROTOCOL='0' PLUTO_PEER='91.112.190.238'
PLUTO_PEER_ID='91.112.190.238' PLUTO_PEER_CLIENT='192.168.5.0/24'
PLUTO_PEER_CLIENT_NET='192.168.5.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0'
PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA=''
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL' ipsec _updown
Aug 5 07:35:49 mail pluto[27360]: | command executing route-client
Aug 5 07:35:49 mail pluto[27360]: | executing route-client: 2>&1
PLUTO_VERSION='1.1' PLUTO_VERB='route-client' PLUTO_CONNECTION='edelweiss'
PLUTO_NEXT_HOP='83.218.162.62' PLUTO_INTERFACE='eth0'
PLUTO_ME='83.218.162.44' PLUTO_MY_ID='83.218.162.44'
PLUTO_MY_CLIENT='192.168.6.0/24' PLUTO_MY_CLIENT_NET='192.168.6.0'
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0'
PLUTO_MY_PROTOCOL='0' PLUTO_PEER='91.112.190.238'
PLUTO_PEER_ID='91.112.190.238' PLUTO_PEER_CLIENT='192.168.5.0/24'
PLUTO_PEER_CLIENT_NET='192.168.5.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0'
PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA=''
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL' ipsec _updown
Aug 5 07:35:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug 5 07:35:49 mail pluto[27360]: |
Aug 5 07:35:49 mail pluto[27360]: | *received whack message
Aug 5 07:35:49 mail pluto[27360]: | processing connection edelweiss
Aug 5 07:35:49 mail pluto[27360]: | kernel_alg_db_new() initial
trans_cnt=28
Aug 5 07:35:49 mail pluto[27360]: | kernel_alg_db_new() will return
p_new->protoid=3, p_new->trans_cnt=1
Aug 5 07:35:49 mail pluto[27360]: | kernel_alg_db_new() trans[0]:
transid=3, attr_cnt=1, attrs[0].type=5, attrs[0].val=1
Aug 5 07:35:49 mail pluto[27360]: | returning new proposal from esp_info
Aug 5 07:35:49 mail pluto[27360]: | creating state object #1 at 0x9566720
Aug 5 07:35:49 mail pluto[27360]: | processing connection edelweiss
Aug 5 07:35:49 mail pluto[27360]: | ICOOKIE: bc 84 5c f3 50 d2 4c 20
Aug 5 07:35:49 mail pluto[27360]: | RCOOKIE: 00 00 00 00 00 00 00 00
Aug 5 07:35:49 mail pluto[27360]: | peer: 5b 70 be ee
Aug 5 07:35:49 mail pluto[27360]: | state hash entry 8
Aug 5 07:35:49 mail pluto[27360]: | inserting event EVENT_SO_DISCARD,
timeout in 0 seconds for #1
Aug 5 07:35:49 mail pluto[27360]: | Queuing pending Quick Mode with
91.112.190.238 "edelweiss"
Aug 5 07:35:49 mail pluto[27360]: "edelweiss" #1: initiating Main Mode
Aug 5 07:35:49 mail pluto[27360]: | **emit ISAKMP Message:
Aug 5 07:35:49 mail pluto[27360]: | initiator cookie:
Aug 5 07:35:49 mail pluto[27360]: | bc 84 5c f3 50 d2 4c 20
Aug 5 07:35:49 mail pluto[27360]: | responder cookie:
Aug 5 07:35:49 mail pluto[27360]: | 00 00 00 00 00 00 00 00
Aug 5 07:35:49 mail pluto[27360]: | next payload type: ISAKMP_NEXT_SA
Aug 5 07:35:49 mail pluto[27360]: | ISAKMP version: ISAKMP Version 1.0
Aug 5 07:35:49 mail pluto[27360]: | exchange type: ISAKMP_XCHG_IDPROT
Aug 5 07:35:49 mail pluto[27360]: | flags: none
Aug 5 07:35:49 mail pluto[27360]: | message ID: 00 00 00 00
Aug 5 07:35:49 mail pluto[27360]: | ***emit ISAKMP Security Association
Payload:
Aug 5 07:35:49 mail pluto[27360]: | next payload type: ISAKMP_NEXT_VID
Aug 5 07:35:49 mail pluto[27360]: | DOI: ISAKMP_DOI_IPSEC
Aug 5 07:35:49 mail pluto[27360]: | ****emit IPsec DOI SIT:
Aug 5 07:35:49 mail pluto[27360]: | IPsec DOI SIT: SIT_IDENTITY_ONLY
Aug 5 07:35:49 mail pluto[27360]: | out_sa pcn: 0 has 1 valid proposals
Aug 5 07:35:49 mail pluto[27360]: | out_sa pcn: 0 pn: 0<1 valid_count: 1
Aug 5 07:35:49 mail pluto[27360]: | ****emit ISAKMP Proposal Payload:
Aug 5 07:35:49 mail pluto[27360]: | next payload type: ISAKMP_NEXT_NONE
Aug 5 07:35:49 mail pluto[27360]: | proposal number: 0
Aug 5 07:35:49 mail pluto[27360]: | protocol ID: PROTO_ISAKMP
Aug 5 07:35:49 mail pluto[27360]: | SPI size: 0
Aug 5 07:35:49 mail pluto[27360]: | number of transforms: 1
Aug 5 07:35:49 mail pluto[27360]: | *****emit ISAKMP Transform Payload
(ISAKMP):
Aug 5 07:35:49 mail pluto[27360]: | next payload type: ISAKMP_NEXT_NONE
Aug 5 07:35:49 mail pluto[27360]: | transform number: 0
Aug 5 07:35:49 mail pluto[27360]: | transform ID: KEY_IKE
Aug 5 07:35:49 mail pluto[27360]: | ******emit ISAKMP Oakley attribute:
Aug 5 07:35:49 mail pluto[27360]: | af+type: OAKLEY_LIFE_TYPE
Aug 5 07:35:49 mail pluto[27360]: | length/value: 1
Aug 5 07:35:49 mail pluto[27360]: | [1 is OAKLEY_LIFE_SECONDS]
Aug 5 07:35:49 mail pluto[27360]: | ******emit ISAKMP Oakley attribute:
Aug 5 07:35:49 mail pluto[27360]: | af+type: OAKLEY_LIFE_DURATION
Aug 5 07:35:49 mail pluto[27360]: | length/value: 28800
Aug 5 07:35:49 mail pluto[27360]: | ******emit ISAKMP Oakley attribute:
Aug 5 07:35:49 mail pluto[27360]: | af+type:
OAKLEY_ENCRYPTION_ALGORITHM
Aug 5 07:35:49 mail pluto[27360]: | length/value: 5
Aug 5 07:35:49 mail pluto[27360]: | [5 is OAKLEY_3DES_CBC]
Aug 5 07:35:49 mail pluto[27360]: | ******emit ISAKMP Oakley attribute:
Aug 5 07:35:49 mail pluto[27360]: | af+type: OAKLEY_HASH_ALGORITHM
Aug 5 07:35:49 mail pluto[27360]: | length/value: 1
Aug 5 07:35:49 mail pluto[27360]: | [1 is OAKLEY_MD5]
Aug 5 07:35:49 mail pluto[27360]: | ******emit ISAKMP Oakley attribute:
Aug 5 07:35:49 mail pluto[27360]: | af+type:
OAKLEY_AUTHENTICATION_METHOD
Aug 5 07:35:49 mail pluto[27360]: | length/value: 1
Aug 5 07:35:49 mail pluto[27360]: | [1 is OAKLEY_PRESHARED_KEY]
Aug 5 07:35:49 mail pluto[27360]: | ******emit ISAKMP Oakley attribute:
Aug 5 07:35:49 mail pluto[27360]: | af+type: OAKLEY_GROUP_DESCRIPTION
Aug 5 07:35:49 mail pluto[27360]: | length/value: 2
Aug 5 07:35:49 mail pluto[27360]: | [2 is OAKLEY_GROUP_MODP1024]
Aug 5 07:35:49 mail pluto[27360]: | emitting length of ISAKMP Transform
Payload (ISAKMP): 32
Aug 5 07:35:49 mail pluto[27360]: | emitting length of ISAKMP Proposal
Payload: 40
Aug 5 07:35:49 mail pluto[27360]: | emitting length of ISAKMP Security
Association Payload: 52
Aug 5 07:35:49 mail pluto[27360]: | ***emit ISAKMP Vendor ID Payload:
Aug 5 07:35:49 mail pluto[27360]: | next payload type: ISAKMP_NEXT_NONE
Aug 5 07:35:49 mail pluto[27360]: | emitting 12 raw bytes of Vendor ID
into ISAKMP Vendor ID Payload
Aug 5 07:35:49 mail pluto[27360]: | Vendor ID 4f 45 60 66 69 6a 41 75
66 51 4d 44
Aug 5 07:35:49 mail pluto[27360]: | emitting length of ISAKMP Vendor ID
Payload: 16
Aug 5 07:35:49 mail pluto[27360]: | ***emit ISAKMP Vendor ID Payload:
Aug 5 07:35:49 mail pluto[27360]: | next payload type: ISAKMP_NEXT_NONE
Aug 5 07:35:49 mail pluto[27360]: | emitting 16 raw bytes of V_ID into
ISAKMP Vendor ID Payload
Aug 5 07:35:49 mail pluto[27360]: | V_ID af ca d7 13 68 a1 f1 c9 6b 86
96 fc 77 57 01 00
Aug 5 07:35:49 mail pluto[27360]: | emitting length of ISAKMP Vendor ID
Payload: 20
Aug 5 07:35:49 mail pluto[27360]: | nat traversal enabled: 0
Aug 5 07:35:49 mail pluto[27360]: | emitting length of ISAKMP Message: 116
Aug 5 07:35:49 mail pluto[27360]: | sending 116 bytes for main_outI1
through eth0:500 to 91.112.190.238:500:
Aug 5 07:35:49 mail pluto[27360]: | bc 84 5c f3 50 d2 4c 20 00 00 00
00 00 00 00 00
Aug 5 07:35:49 mail pluto[27360]: | 01 10 02 00 00 00 00 00 00 00 00
74 0d 00 00 34
Aug 5 07:35:49 mail pluto[27360]: | 00 00 00 01 00 00 00 01 00 00 00
28 00 01 00 01
Aug 5 07:35:49 mail pluto[27360]: | 00 00 00 20 00 01 00 00 80 0b 00
01 80 0c 70 80
Aug 5 07:35:49 mail pluto[27360]: | 80 01 00 05 80 02 00 01 80 03 00
01 80 04 00 02
Aug 5 07:35:49 mail pluto[27360]: | 0d 00 00 10 4f 45 60 66 69 6a 41
75 66 51 4d 44
Aug 5 07:35:49 mail pluto[27360]: | 00 00 00 14 af ca d7 13 68 a1 f1
c9 6b 86 96 fc
Aug 5 07:35:49 mail pluto[27360]: | 77 57 01 00
Aug 5 07:35:49 mail pluto[27360]: | inserting event EVENT_RETRANSMIT,
timeout in 10 seconds for #1
Aug 5 07:35:49 mail pluto[27360]: | next event EVENT_RETRANSMIT in 10
seconds for #1
Aug 5 07:35:49 mail pluto[27360]: |
Aug 5 07:35:49 mail pluto[27360]: | *received 116 bytes from
91.112.190.238:500 on eth0 (port=500)
Aug 5 07:35:49 mail pluto[27360]: | bc 84 5c f3 50 d2 4c 20 23 de a8
6f dc 64 e4 7a
Aug 5 07:35:49 mail pluto[27360]: | 01 10 02 00 00 00 00 00 00 00 00
74 0d 00 00 34
Aug 5 07:35:49 mail pluto[27360]: | 00 00 00 01 00 00 00 01 00 00 00
28 00 01 00 01
Aug 5 07:35:49 mail pluto[27360]: | 00 00 00 20 00 01 00 00 80 0b 00
01 80 0c 70 80
Aug 5 07:35:49 mail pluto[27360]: | 80 01 00 05 80 02 00 01 80 03 00
01 80 04 00 02
Aug 5 07:35:49 mail pluto[27360]: | 0d 00 00 10 4f 45 72 5c 5b 75 40
61 66 6c 42 5f
Aug 5 07:35:49 mail pluto[27360]: | 00 00 00 14 af ca d7 13 68 a1 f1
c9 6b 86 96 fc
Aug 5 07:35:49 mail pluto[27360]: | 77 57 01 00
Aug 5 07:35:49 mail pluto[27360]: | **parse ISAKMP Message:
Aug 5 07:35:49 mail pluto[27360]: | initiator cookie:
Aug 5 07:35:49 mail pluto[27360]: | bc 84 5c f3 50 d2 4c 20
Aug 5 07:35:49 mail pluto[27360]: | responder cookie:
Aug 5 07:35:49 mail pluto[27360]: | 23 de a8 6f dc 64 e4 7a
Aug 5 07:35:49 mail pluto[27360]: | next payload type: ISAKMP_NEXT_SA
Aug 5 07:35:49 mail pluto[27360]: | ISAKMP version: ISAKMP Version 1.0
Aug 5 07:35:49 mail pluto[27360]: | exchange type: ISAKMP_XCHG_IDPROT
Aug 5 07:35:49 mail pluto[27360]: | flags: none
Aug 5 07:35:49 mail pluto[27360]: | message ID: 00 00 00 00
Aug 5 07:35:49 mail pluto[27360]: | length: 116
Aug 5 07:35:49 mail pluto[27360]: | processing packet with exchange
type=ISAKMP_XCHG_IDPROT (2)
Aug 5 07:35:49 mail pluto[27360]: | ICOOKIE: bc 84 5c f3 50 d2 4c 20
Aug 5 07:35:49 mail pluto[27360]: | RCOOKIE: 23 de a8 6f dc 64 e4 7a
Aug 5 07:35:49 mail pluto[27360]: | peer: 5b 70 be ee
Aug 5 07:35:49 mail pluto[27360]: | state hash entry 0
Aug 5 07:35:49 mail pluto[27360]: | state object not found
Aug 5 07:35:49 mail pluto[27360]: | ICOOKIE: bc 84 5c f3 50 d2 4c 20
Aug 5 07:35:49 mail pluto[27360]: | RCOOKIE: 00 00 00 00 00 00 00 00
Aug 5 07:35:49 mail pluto[27360]: | peer: 5b 70 be ee
Aug 5 07:35:49 mail pluto[27360]: | state hash entry 8
Aug 5 07:35:49 mail pluto[27360]: | peer and cookies match on #1, provided
msgid 00000000 vs 00000000
Aug 5 07:35:49 mail pluto[27360]: | state object #1 found, in
STATE_MAIN_I1
Aug 5 07:35:49 mail pluto[27360]: | processing connection edelweiss
Aug 5 07:35:49 mail pluto[27360]: | np=1 and sd=0x80d8800
Aug 5 07:35:49 mail pluto[27360]: | ***parse ISAKMP Security Association
Payload:
Aug 5 07:35:49 mail pluto[27360]: | next payload type: ISAKMP_NEXT_VID
Aug 5 07:35:49 mail pluto[27360]: | length: 52
Aug 5 07:35:49 mail pluto[27360]: | DOI: ISAKMP_DOI_IPSEC
Aug 5 07:35:49 mail pluto[27360]: | np=13 and sd=0x80d81d0
Aug 5 07:35:49 mail pluto[27360]: | ***parse ISAKMP Vendor ID Payload:
Aug 5 07:35:49 mail pluto[27360]: | next payload type: ISAKMP_NEXT_VID
Aug 5 07:35:49 mail pluto[27360]: | length: 16
Aug 5 07:35:49 mail pluto[27360]: | np=13 and sd=0x80d81d0
Aug 5 07:35:49 mail pluto[27360]: | ***parse ISAKMP Vendor ID Payload:
Aug 5 07:35:49 mail pluto[27360]: | next payload type: ISAKMP_NEXT_NONE
Aug 5 07:35:49 mail pluto[27360]: | length: 20
Aug 5 07:35:49 mail pluto[27360]: "edelweiss" #1: ignoring unknown Vendor
ID payload [4f45725c5b754061666c425f]
Aug 5 07:35:49 mail pluto[27360]: "edelweiss" #1: received Vendor ID
payload [Dead Peer Detection]
Aug 5 07:35:49 mail pluto[27360]: | ****parse IPsec DOI SIT:
Aug 5 07:35:49 mail pluto[27360]: | IPsec DOI SIT: SIT_IDENTITY_ONLY
Aug 5 07:35:49 mail pluto[27360]: | ****parse ISAKMP Proposal Payload:
Aug 5 07:35:49 mail pluto[27360]: | next payload type: ISAKMP_NEXT_NONE
Aug 5 07:35:49 mail pluto[27360]: | length: 40
Aug 5 07:35:49 mail pluto[27360]: | proposal number: 0
Aug 5 07:35:49 mail pluto[27360]: | protocol ID: PROTO_ISAKMP
Aug 5 07:35:49 mail pluto[27360]: | SPI size: 0
Aug 5 07:35:49 mail pluto[27360]: | number of transforms: 1
Aug 5 07:35:49 mail pluto[27360]: | *****parse ISAKMP Transform Payload
(ISAKMP):
Aug 5 07:35:49 mail pluto[27360]: | next payload type: ISAKMP_NEXT_NONE
Aug 5 07:35:49 mail pluto[27360]: | length: 32
Aug 5 07:35:49 mail pluto[27360]: | transform number: 0
Aug 5 07:35:49 mail pluto[27360]: | transform ID: KEY_IKE
Aug 5 07:35:49 mail pluto[27360]: | ******parse ISAKMP Oakley attribute:
Aug 5 07:35:49 mail pluto[27360]: | af+type: OAKLEY_LIFE_TYPE
Aug 5 07:35:49 mail pluto[27360]: | length/value: 1
Aug 5 07:35:49 mail pluto[27360]: | [1 is OAKLEY_LIFE_SECONDS]
Aug 5 07:35:49 mail pluto[27360]: | ******parse ISAKMP Oakley attribute:
Aug 5 07:35:49 mail pluto[27360]: | af+type: OAKLEY_LIFE_DURATION
Aug 5 07:35:49 mail pluto[27360]: | length/value: 28800
Aug 5 07:35:49 mail pluto[27360]: | ******parse ISAKMP Oakley attribute:
Aug 5 07:35:49 mail pluto[27360]: | af+type:
OAKLEY_ENCRYPTION_ALGORITHM
Aug 5 07:35:49 mail pluto[27360]: | length/value: 5
Aug 5 07:35:49 mail pluto[27360]: | [5 is OAKLEY_3DES_CBC]
Aug 5 07:35:49 mail pluto[27360]: | ike_alg_enc_ok(ealg=5,key_len=0):
blocksize=8, keyminlen=192, keydeflen=192, keymaxlen=192, ret=1
Aug 5 07:35:49 mail pluto[27360]: | ******parse ISAKMP Oakley attribute:
Aug 5 07:35:49 mail pluto[27360]: | af+type: OAKLEY_HASH_ALGORITHM
Aug 5 07:35:49 mail pluto[27360]: | length/value: 1
Aug 5 07:35:49 mail pluto[27360]: | [1 is OAKLEY_MD5]
Aug 5 07:35:49 mail pluto[27360]: | ******parse ISAKMP Oakley attribute:
Aug 5 07:35:49 mail pluto[27360]: | af+type:
OAKLEY_AUTHENTICATION_METHOD
Aug 5 07:35:49 mail pluto[27360]: | length/value: 1
Aug 5 07:35:49 mail pluto[27360]: | [1 is OAKLEY_PRESHARED_KEY]
Aug 5 07:35:49 mail pluto[27360]: | started looking for secret for
83.218.162.44->91.112.190.238 of kind PPK_PSK
Aug 5 07:35:49 mail pluto[27360]: | actually looking for secret for
83.218.162.44->91.112.190.238 of kind PPK_PSK
Aug 5 07:35:49 mail pluto[27360]: | 1: compared PSK 83.218.181.63 to
83.218.162.44 / 91.112.190.238 -> 0
Aug 5 07:35:49 mail pluto[27360]: | 2: compared PSK 83.218.162.44 to
83.218.162.44 / 91.112.190.238 -> 4
Aug 5 07:35:49 mail pluto[27360]: | 1: compared PSK 91.112.190.238 to
83.218.162.44 / 91.112.190.238 -> 2
Aug 5 07:35:49 mail pluto[27360]: | 2: compared PSK 83.218.162.44 to
83.218.162.44 / 91.112.190.238 -> 6
Aug 5 07:35:49 mail pluto[27360]: | best_match 0>6 best=0x9564e98 (line=1)
Aug 5 07:35:49 mail pluto[27360]: | concluding with best_match=6
best=0x9564e98 (lineno=1)
Aug 5 07:35:49 mail pluto[27360]: | ******parse ISAKMP Oakley attribute:
Aug 5 07:35:49 mail pluto[27360]: | af+type: OAKLEY_GROUP_DESCRIPTION
Aug 5 07:35:49 mail pluto[27360]: | length/value: 2
Aug 5 07:35:49 mail pluto[27360]: | [2 is OAKLEY_GROUP_MODP1024]
Aug 5 07:35:49 mail pluto[27360]: | Oakley Transform 0 accepted
Aug 5 07:35:49 mail pluto[27360]: | sender checking NAT-t: 0 and 0
Aug 5 07:35:49 mail pluto[27360]: | 0: w->pcw_dead: 0 w->pcw_work: 0 cnt:
1
Aug 5 07:35:49 mail pluto[27360]: | asking helper 0 to do build_kenonce op
on seq: 1
Aug 5 07:35:49 mail pluto[27360]: | inserting event EVENT_CRYPTO_FAILED,
timeout in 300 seconds for #1
Aug 5 07:35:49 mail pluto[27376]: ! helper 0 doing build_kenonce op id: 1
Aug 5 07:35:49 mail pluto[27360]: | complete state transition with
STF_SUSPEND
Aug 5 07:35:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug 5 07:35:49 mail pluto[27376]: ! Local DH secret:
Aug 5 07:35:49 mail pluto[27376]: ! 52 45 96 51 40 93 51 a3 4d ce 5d
6e 2e 36 16 31
Aug 5 07:35:49 mail pluto[27376]: ! a4 bc 01 6a 07 63 8a 24 1a 84 b0
d6 07 9f 9c c9
Aug 5 07:35:49 mail pluto[27376]: ! Public DH value sent:
Aug 5 07:35:49 mail pluto[27376]: ! 68 2a 24 91 3e 02 f0 32 fa 14 a5
26 1e ac a3 99
Aug 5 07:35:49 mail pluto[27376]: ! 50 77 71 b6 28 3c f1 3d 04 25 d9
8c 0d 6d 4b 7a
Aug 5 07:35:49 mail pluto[27376]: ! 06 da fa 1b fe f3 bc e0 6f 47 2d
f2 6d ba 9d bb
Aug 5 07:35:49 mail pluto[27376]: ! 63 76 b1 33 00 83 4b 2d 90 1d d4
29 b6 d3 ad 5c
Aug 5 07:35:49 mail pluto[27376]: ! 52 ba 56 83 5d 36 70 1d db c1 54
b4 ca 4f 50 1a
Aug 5 07:35:49 mail pluto[27376]: ! f2 03 8f e6 93 75 80 ff a5 c0 17
e9 38 e8 eb 93
Aug 5 07:35:49 mail pluto[27376]: ! bf 16 15 b1 6f fe 15 69 df 7e 7d
2f 69 c9 5e 4c
Aug 5 07:35:49 mail pluto[27376]: ! 81 fe 9a c2 70 d5 3d a9 cc 7c 10
38 94 a4 88 6b
Aug 5 07:35:49 mail pluto[27376]: ! Generated nonce:
Aug 5 07:35:49 mail pluto[27376]: ! d2 a8 78 c1 34 6f 5b ed 61 0f 1c
10 d3 64 4a 0c
Aug 5 07:35:49 mail pluto[27360]: | helper 0 has work (cnt now 0)
Aug 5 07:35:49 mail pluto[27360]: | helper 0 replies to sequence 1
Aug 5 07:35:49 mail pluto[27360]: | calling callback function 0x8061e74
Aug 5 07:35:49 mail pluto[27360]: | main inR1_outI2: calculated ke+nonce,
sending I2
Aug 5 07:35:49 mail pluto[27360]: | processing connection edelweiss
Aug 5 07:35:49 mail pluto[27360]: | **emit ISAKMP Message:
Aug 5 07:35:49 mail pluto[27360]: | initiator cookie:
Aug 5 07:35:49 mail pluto[27360]: | bc 84 5c f3 50 d2 4c 20
Aug 5 07:35:49 mail pluto[27360]: | responder cookie:
Aug 5 07:35:49 mail pluto[27360]: | 23 de a8 6f dc 64 e4 7a
Aug 5 07:35:49 mail pluto[27360]: | next payload type: ISAKMP_NEXT_KE
Aug 5 07:35:49 mail pluto[27360]: | ISAKMP version: ISAKMP Version 1.0
Aug 5 07:35:49 mail pluto[27360]: | exchange type: ISAKMP_XCHG_IDPROT
Aug 5 07:35:49 mail pluto[27360]: | flags: none
Aug 5 07:35:49 mail pluto[27360]: | message ID: 00 00 00 00
Aug 5 07:35:49 mail pluto[27360]: | ***emit ISAKMP Key Exchange Payload:
Aug 5 07:35:49 mail pluto[27360]: | next payload type:
ISAKMP_NEXT_NONCE
Aug 5 07:35:49 mail pluto[27360]: | emitting 128 raw bytes of keyex value
into ISAKMP Key Exchange Payload
Aug 5 07:35:49 mail pluto[27360]: | keyex value 68 2a 24 91 3e 02 f0 32
fa 14 a5 26 1e ac a3 99
Aug 5 07:35:49 mail pluto[27360]: | 50 77 71 b6 28 3c f1 3d 04 25 d9
8c 0d 6d 4b 7a
Aug 5 07:35:49 mail pluto[27360]: | 06 da fa 1b fe f3 bc e0 6f 47 2d
f2 6d ba 9d bb
Aug 5 07:35:49 mail pluto[27360]: | 63 76 b1 33 00 83 4b 2d 90 1d d4
29 b6 d3 ad 5c
Aug 5 07:35:49 mail pluto[27360]: | 52 ba 56 83 5d 36 70 1d db c1 54
b4 ca 4f 50 1a
Aug 5 07:35:49 mail pluto[27360]: | f2 03 8f e6 93 75 80 ff a5 c0 17
e9 38 e8 eb 93
Aug 5 07:35:49 mail pluto[27360]: | bf 16 15 b1 6f fe 15 69 df 7e 7d
2f 69 c9 5e 4c
Aug 5 07:35:49 mail pluto[27360]: | 81 fe 9a c2 70 d5 3d a9 cc 7c 10
38 94 a4 88 6b
Aug 5 07:35:49 mail pluto[27360]: | emitting length of ISAKMP Key Exchange
Payload: 132
Aug 5 07:35:49 mail pluto[27360]: | ***emit ISAKMP Nonce Payload:
Aug 5 07:35:49 mail pluto[27360]: | next payload type: ISAKMP_NEXT_NONE
Aug 5 07:35:49 mail pluto[27360]: | emitting 16 raw bytes of Ni into
ISAKMP Nonce Payload
Aug 5 07:35:49 mail pluto[27360]: | Ni d2 a8 78 c1 34 6f 5b ed 61 0f 1c
10 d3 64 4a 0c
Aug 5 07:35:49 mail pluto[27360]: | emitting length of ISAKMP Nonce
Payload: 20
Aug 5 07:35:49 mail pluto[27360]: | emitting length of ISAKMP Message: 180
Aug 5 07:35:49 mail pluto[27360]: | ICOOKIE: bc 84 5c f3 50 d2 4c 20
Aug 5 07:35:49 mail pluto[27360]: | RCOOKIE: 00 00 00 00 00 00 00 00
Aug 5 07:35:49 mail pluto[27360]: | peer: 5b 70 be ee
Aug 5 07:35:49 mail pluto[27360]: | state hash entry 8
Aug 5 07:35:49 mail pluto[27360]: | ICOOKIE: bc 84 5c f3 50 d2 4c 20
Aug 5 07:35:49 mail pluto[27360]: | RCOOKIE: 23 de a8 6f dc 64 e4 7a
Aug 5 07:35:49 mail pluto[27360]: | peer: 5b 70 be ee
Aug 5 07:35:49 mail pluto[27360]: | state hash entry 0
Aug 5 07:35:49 mail pluto[27360]: | complete state transition with STF_OK
Aug 5 07:35:49 mail pluto[27360]: "edelweiss" #1: transition from state
STATE_MAIN_I1 to state STATE_MAIN_I2
Aug 5 07:35:49 mail pluto[27360]: | sending reply packet to
91.112.190.238:500 (from port=500)
Aug 5 07:35:49 mail pluto[27360]: | sending 180 bytes for STATE_MAIN_I1
through eth0:500 to 91.112.190.238:500:
Aug 5 07:35:49 mail pluto[27360]: | bc 84 5c f3 50 d2 4c 20 23 de a8
6f dc 64 e4 7a
Aug 5 07:35:49 mail pluto[27360]: | 04 10 02 00 00 00 00 00 00 00 00
b4 0a 00 00 84
Aug 5 07:35:49 mail pluto[27360]: | 68 2a 24 91 3e 02 f0 32 fa 14 a5
26 1e ac a3 99
Aug 5 07:35:49 mail pluto[27360]: | 50 77 71 b6 28 3c f1 3d 04 25 d9
8c 0d 6d 4b 7a
Aug 5 07:35:49 mail pluto[27360]: | 06 da fa 1b fe f3 bc e0 6f 47 2d
f2 6d ba 9d bb
Aug 5 07:35:49 mail pluto[27360]: | 63 76 b1 33 00 83 4b 2d 90 1d d4
29 b6 d3 ad 5c
Aug 5 07:35:49 mail pluto[27360]: | 52 ba 56 83 5d 36 70 1d db c1 54
b4 ca 4f 50 1a
Aug 5 07:35:49 mail pluto[27360]: | f2 03 8f e6 93 75 80 ff a5 c0 17
e9 38 e8 eb 93
Aug 5 07:35:49 mail pluto[27360]: | bf 16 15 b1 6f fe 15 69 df 7e 7d
2f 69 c9 5e 4c
Aug 5 07:35:49 mail pluto[27360]: | 81 fe 9a c2 70 d5 3d a9 cc 7c 10
38 94 a4 88 6b
Aug 5 07:35:49 mail pluto[27360]: | 00 00 00 14 d2 a8 78 c1 34 6f 5b
ed 61 0f 1c 10
Aug 5 07:35:49 mail pluto[27360]: | d3 64 4a 0c
Aug 5 07:35:49 mail pluto[27360]: | inserting event EVENT_RETRANSMIT,
timeout in 10 seconds for #1
Aug 5 07:35:49 mail pluto[27360]: "edelweiss" #1: STATE_MAIN_I2: sent MI2,
expecting MR2
Aug 5 07:35:49 mail pluto[27360]: | modecfg pull: noquirk policy:push
not-client
Aug 5 07:35:49 mail pluto[27360]: | phase 1 is done, looking for phase 1
to unpend
Aug 5 07:35:49 mail pluto[27360]: | next event EVENT_RETRANSMIT in 10
seconds for #1
Aug 5 07:35:50 mail pluto[27360]: |
Aug 5 07:35:50 mail pluto[27360]: | *received 180 bytes from
91.112.190.238:500 on eth0 (port=500)
Aug 5 07:35:50 mail pluto[27360]: | bc 84 5c f3 50 d2 4c 20 23 de a8
6f dc 64 e4 7a
Aug 5 07:35:50 mail pluto[27360]: | 04 10 02 00 00 00 00 00 00 00 00
b4 0a 00 00 84
Aug 5 07:35:50 mail pluto[27360]: | ad 15 4b 79 d9 ee 90 db 0d 8a ac
1a ff 48 63 d7
Aug 5 07:35:50 mail pluto[27360]: | 42 30 58 ac bf 35 e6 e7 ec 2f 8c
f8 24 80 8a ec
Aug 5 07:35:50 mail pluto[27360]: | 23 9a 05 b3 76 3e 3a 99 a8 5d a8
af b4 9b 57 2c
Aug 5 07:35:50 mail pluto[27360]: | 14 43 6c d9 71 2b fa 5c bc b4 9b
a0 0f 5e 03 db
Aug 5 07:35:50 mail pluto[27360]: | 67 94 c5 54 b8 54 fe ca 4f 9b 55
f5 e2 5d 2a 09
Aug 5 07:35:50 mail pluto[27360]: | 20 ed f0 ac 9b 41 47 05 30 5e ae
bd d6 4e c1 37
Aug 5 07:35:50 mail pluto[27360]: | 6d 9d 83 cb a8 01 67 d7 60 40 a5
60 be 75 61 a5
Aug 5 07:35:50 mail pluto[27360]: | 0f d3 57 0b f6 20 fd 25 b5 00 7c
76 49 7d 3f 11
Aug 5 07:35:50 mail pluto[27360]: | 00 00 00 14 97 5f 98 4a 8c 20 54
ec 80 d2 b2 34
Aug 5 07:35:50 mail pluto[27360]: | ec 1e 72 44
Aug 5 07:35:50 mail pluto[27360]: | **parse ISAKMP Message:
Aug 5 07:35:50 mail pluto[27360]: | initiator cookie:
Aug 5 07:35:50 mail pluto[27360]: | bc 84 5c f3 50 d2 4c 20
Aug 5 07:35:50 mail pluto[27360]: | responder cookie:
Aug 5 07:35:50 mail pluto[27360]: | 23 de a8 6f dc 64 e4 7a
Aug 5 07:35:50 mail pluto[27360]: | next payload type: ISAKMP_NEXT_KE
Aug 5 07:35:50 mail pluto[27360]: | ISAKMP version: ISAKMP Version 1.0
Aug 5 07:35:50 mail pluto[27360]: | exchange type: ISAKMP_XCHG_IDPROT
Aug 5 07:35:50 mail pluto[27360]: | flags: none
Aug 5 07:35:50 mail pluto[27360]: | message ID: 00 00 00 00
Aug 5 07:35:50 mail pluto[27360]: | length: 180
Aug 5 07:35:50 mail pluto[27360]: | processing packet with exchange
type=ISAKMP_XCHG_IDPROT (2)
Aug 5 07:35:50 mail pluto[27360]: | ICOOKIE: bc 84 5c f3 50 d2 4c 20
Aug 5 07:35:50 mail pluto[27360]: | RCOOKIE: 23 de a8 6f dc 64 e4 7a
Aug 5 07:35:50 mail pluto[27360]: | peer: 5b 70 be ee
Aug 5 07:35:50 mail pluto[27360]: | state hash entry 0
Aug 5 07:35:50 mail pluto[27360]: | peer and cookies match on #1, provided
msgid 00000000 vs 00000000
Aug 5 07:35:50 mail pluto[27360]: | state object #1 found, in
STATE_MAIN_I2
Aug 5 07:35:50 mail pluto[27360]: | processing connection edelweiss
Aug 5 07:35:50 mail pluto[27360]: | np=4 and sd=0x80d8510
Aug 5 07:35:50 mail pluto[27360]: | ***parse ISAKMP Key Exchange Payload:
Aug 5 07:35:50 mail pluto[27360]: | next payload type:
ISAKMP_NEXT_NONCE
Aug 5 07:35:50 mail pluto[27360]: | length: 132
Aug 5 07:35:50 mail pluto[27360]: | np=10 and sd=0x80d8320
Aug 5 07:35:50 mail pluto[27360]: | ***parse ISAKMP Nonce Payload:
Aug 5 07:35:50 mail pluto[27360]: | next payload type: ISAKMP_NEXT_NONE
Aug 5 07:35:50 mail pluto[27360]: | length: 20
Aug 5 07:35:50 mail pluto[27360]: | **emit ISAKMP Message:
Aug 5 07:35:50 mail pluto[27360]: | initiator cookie:
Aug 5 07:35:50 mail pluto[27360]: | bc 84 5c f3 50 d2 4c 20
Aug 5 07:35:50 mail pluto[27360]: | responder cookie:
Aug 5 07:35:50 mail pluto[27360]: | 23 de a8 6f dc 64 e4 7a
Aug 5 07:35:50 mail pluto[27360]: | next payload type: ISAKMP_NEXT_ID
Aug 5 07:35:50 mail pluto[27360]: | ISAKMP version: ISAKMP Version 1.0
Aug 5 07:35:50 mail pluto[27360]: | exchange type: ISAKMP_XCHG_IDPROT
Aug 5 07:35:50 mail pluto[27360]: | flags: ISAKMP_FLAG_ENCRYPTION
Aug 5 07:35:50 mail pluto[27360]: | message ID: 00 00 00 00
Aug 5 07:35:50 mail pluto[27360]: | DH public value received:
Aug 5 07:35:50 mail pluto[27360]: | ad 15 4b 79 d9 ee 90 db 0d 8a ac
1a ff 48 63 d7
Aug 5 07:35:50 mail pluto[27360]: | 42 30 58 ac bf 35 e6 e7 ec 2f 8c
f8 24 80 8a ec
Aug 5 07:35:50 mail pluto[27360]: | 23 9a 05 b3 76 3e 3a 99 a8 5d a8
af b4 9b 57 2c
Aug 5 07:35:50 mail pluto[27360]: | 14 43 6c d9 71 2b fa 5c bc b4 9b
a0 0f 5e 03 db
Aug 5 07:35:50 mail pluto[27360]: | 67 94 c5 54 b8 54 fe ca 4f 9b 55
f5 e2 5d 2a 09
Aug 5 07:35:50 mail pluto[27360]: | 20 ed f0 ac 9b 41 47 05 30 5e ae
bd d6 4e c1 37
Aug 5 07:35:50 mail pluto[27360]: | 6d 9d 83 cb a8 01 67 d7 60 40 a5
60 be 75 61 a5
Aug 5 07:35:50 mail pluto[27360]: | 0f d3 57 0b f6 20 fd 25 b5 00 7c
76 49 7d 3f 11
Aug 5 07:35:50 mail pluto[27360]: | thinking about whether to send my
certificate:
Aug 5 07:35:50 mail pluto[27360]: | I have RSA key: OAKLEY_PRESHARED_KEY
cert.type: CERT_NONE
Aug 5 07:35:50 mail pluto[27360]: | sendcert: CERT_ALWAYSSEND and I did
not get a certificate request
Aug 5 07:35:50 mail pluto[27360]: | so do not send cert.
Aug 5 07:35:50 mail pluto[27360]: "edelweiss" #1: I did not send a
certificate because I do not have one.
Aug 5 07:35:50 mail pluto[27360]: | I am not sending a certificate
request
Aug 5 07:35:50 mail pluto[27360]: | started looking for secret for
83.218.162.44->91.112.190.238 of kind PPK_PSK
Aug 5 07:35:50 mail pluto[27360]: | actually looking for secret for
83.218.162.44->91.112.190.238 of kind PPK_PSK
Aug 5 07:35:50 mail pluto[27360]: | 1: compared PSK 83.218.181.63 to
83.218.162.44 / 91.112.190.238 -> 0
Aug 5 07:35:50 mail pluto[27360]: | 2: compared PSK 83.218.162.44 to
83.218.162.44 / 91.112.190.238 -> 4
Aug 5 07:35:50 mail pluto[27360]: | 1: compared PSK 91.112.190.238 to
83.218.162.44 / 91.112.190.238 -> 2
Aug 5 07:35:50 mail pluto[27360]: | 2: compared PSK 83.218.162.44 to
83.218.162.44 / 91.112.190.238 -> 6
Aug 5 07:35:50 mail pluto[27360]: | best_match 0>6 best=0x9564e98 (line=1)
Aug 5 07:35:50 mail pluto[27360]: | concluding with best_match=6
best=0x9564e98 (lineno=1)
Aug 5 07:35:50 mail pluto[27360]: | calc_dh_shared(): time elapsed
(OAKLEY_GROUP_MODP1024): 2147 usec
Aug 5 07:35:50 mail pluto[27360]: | DH shared secret:
Aug 5 07:35:50 mail pluto[27360]: | da a4 02 0c 8e fc 36 b1 fc cc 88
0c e7 1f 72 94
Aug 5 07:35:50 mail pluto[27360]: | 6f 13 b0 cb 0b 72 12 19 08 11 e2
43 c0 1a e7 fe
Aug 5 07:35:50 mail pluto[27360]: | 37 30 92 3a a8 e2 93 5f 01 d8 b0
21 f3 cd 84 81
Aug 5 07:35:50 mail pluto[27360]: | cf 69 9d 4a 67 55 bf 5d 59 ae 73
28 24 17 2a 22
Aug 5 07:35:50 mail pluto[27360]: | 50 73 4f da d3 ec 42 01 50 07 0b
c2 97 18 c8 16
Aug 5 07:35:50 mail pluto[27360]: | 1c 09 e9 5a d7 37 41 de 83 06 5e
da 55 0c c5 06
Aug 5 07:35:50 mail pluto[27360]: | 08 36 4e 0a a5 b9 8a 20 c3 b4 4b
4c c3 03 e2 50
Aug 5 07:35:50 mail pluto[27360]: | 2a 52 a0 48 aa 7a a2 91 95 d5 07
6f b4 fe 38 5f
Aug 5 07:35:50 mail pluto[27360]: | Skey inputs (PSK+NI+NR)
Aug 5 07:35:50 mail pluto[27360]: | ni: d2 a8 78 c1 34 6f 5b ed 61 0f
1c 10 d3 64 4a 0c
Aug 5 07:35:50 mail pluto[27360]: | nr: 97 5f 98 4a 8c 20 54 ec 80 d2
b2 34 ec 1e 72 44
Aug 5 07:35:50 mail pluto[27360]: | keyid: 94 fb 0e 16 d6 9b ca 19 1c
0c 21 d7 57 73 b7 8f
Aug 5 07:35:50 mail pluto[27360]: | DH_i: 68 2a 24 91 3e 02 f0 32 fa 14
a5 26 1e ac a3 99
Aug 5 07:35:50 mail pluto[27360]: | 50 77 71 b6 28 3c f1 3d 04 25 d9
8c 0d 6d 4b 7a
Aug 5 07:35:50 mail pluto[27360]: | 06 da fa 1b fe f3 bc e0 6f 47 2d
f2 6d ba 9d bb
Aug 5 07:35:50 mail pluto[27360]: | 63 76 b1 33 00 83 4b 2d 90 1d d4
29 b6 d3 ad 5c
Aug 5 07:35:50 mail pluto[27360]: | 52 ba 56 83 5d 36 70 1d db c1 54
b4 ca 4f 50 1a
Aug 5 07:35:50 mail pluto[27360]: | f2 03 8f e6 93 75 80 ff a5 c0 17
e9 38 e8 eb 93
Aug 5 07:35:50 mail pluto[27360]: | bf 16 15 b1 6f fe 15 69 df 7e 7d
2f 69 c9 5e 4c
Aug 5 07:35:50 mail pluto[27360]: | 81 fe 9a c2 70 d5 3d a9 cc 7c 10
38 94 a4 88 6b
Aug 5 07:35:50 mail pluto[27360]: | DH_r: ad 15 4b 79 d9 ee 90 db 0d 8a
ac 1a ff 48 63 d7
Aug 5 07:35:50 mail pluto[27360]: | 42 30 58 ac bf 35 e6 e7 ec 2f 8c
f8 24 80 8a ec
Aug 5 07:35:50 mail pluto[27360]: | 23 9a 05 b3 76 3e 3a 99 a8 5d a8
af b4 9b 57 2c
Aug 5 07:35:50 mail pluto[27360]: | 14 43 6c d9 71 2b fa 5c bc b4 9b
a0 0f 5e 03 db
Aug 5 07:35:50 mail pluto[27360]: | 67 94 c5 54 b8 54 fe ca 4f 9b 55
f5 e2 5d 2a 09
Aug 5 07:35:50 mail pluto[27360]: | 20 ed f0 ac 9b 41 47 05 30 5e ae
bd d6 4e c1 37
Aug 5 07:35:50 mail pluto[27360]: | 6d 9d 83 cb a8 01 67 d7 60 40 a5
60 be 75 61 a5
Aug 5 07:35:50 mail pluto[27360]: | 0f d3 57 0b f6 20 fd 25 b5 00 7c
76 49 7d 3f 11
Aug 5 07:35:50 mail pluto[27360]: | Skeyid: 94 fb 0e 16 d6 9b ca 19
1c 0c 21 d7 57 73 b7 8f
Aug 5 07:35:50 mail pluto[27360]: | Skeyid_d: 71 c8 80 18 78 c0 2c 2f
64 3d ed 81 e1 d4 e5 f7
Aug 5 07:35:50 mail pluto[27360]: | Skeyid_a: ba 3b 9a 67 43 72 2c 94
90 61 e1 ca 44 28 25 05
Aug 5 07:35:50 mail pluto[27360]: | Skeyid_e: 6b 96 01 a3 68 92 d5 24
1e ef 4e 4e a3 20 0e e3
Aug 5 07:35:50 mail pluto[27360]: | enc key: 19 25 3e 41 25 80 2c 09 06
46 bd c2 03 96 ce c9
Aug 5 07:35:50 mail pluto[27360]: | d8 a6 9d 98 ed 2e ec f6
Aug 5 07:35:50 mail pluto[27360]: | IV: 8d 41 f5 8c b4 92 0f cd 7e a9
2c 1a 61 d0 bd 1e
Aug 5 07:35:50 mail pluto[27360]: | ***emit ISAKMP Identification Payload
(IPsec DOI):
Aug 5 07:35:50 mail pluto[27360]: | next payload type: ISAKMP_NEXT_HASH
Aug 5 07:35:50 mail pluto[27360]: | ID type: ID_IPV4_ADDR
Aug 5 07:35:50 mail pluto[27360]: | Protocol ID: 0
Aug 5 07:35:50 mail pluto[27360]: | port: 0
Aug 5 07:35:50 mail pluto[27360]: | emitting 4 raw bytes of my identity
into ISAKMP Identification Payload (IPsec DOI)
Aug 5 07:35:50 mail pluto[27360]: | my identity 53 da a2 2c
Aug 5 07:35:50 mail pluto[27360]: | emitting length of ISAKMP
Identification Payload (IPsec DOI): 12
Aug 5 07:35:50 mail pluto[27360]: | hashing 48 bytes of SA
Aug 5 07:35:50 mail pluto[27360]: | ***emit ISAKMP Hash Payload:
Aug 5 07:35:50 mail pluto[27360]: | next payload type: ISAKMP_NEXT_NONE
Aug 5 07:35:50 mail pluto[27360]: | emitting 16 raw bytes of HASH_I into
ISAKMP Hash Payload
Aug 5 07:35:50 mail pluto[27360]: | HASH_I c0 5f 88 07 71 f2 a0 94 d2
73 cb 14 3f b4 ff c7
Aug 5 07:35:50 mail pluto[27360]: | emitting length of ISAKMP Hash
Payload: 20
Aug 5 07:35:50 mail pluto[27360]: | encrypting:
Aug 5 07:35:50 mail pluto[27360]: | 08 00 00 0c 01 00 00 00 53 da a2
2c 00 00 00 14
Aug 5 07:35:50 mail pluto[27360]: | c0 5f 88 07 71 f2 a0 94 d2 73 cb
14 3f b4 ff c7
Aug 5 07:35:50 mail pluto[27360]: | IV:
Aug 5 07:35:50 mail pluto[27360]: | 8d 41 f5 8c b4 92 0f cd 7e a9 2c
1a 61 d0 bd 1e
Aug 5 07:35:50 mail pluto[27360]: | encrypting using OAKLEY_3DES_CBC
Aug 5 07:35:50 mail pluto[27360]: | next IV: c5 22 7f ce b8 15 9a 3e
Aug 5 07:35:50 mail pluto[27360]: | emitting length of ISAKMP Message: 60
Aug 5 07:35:50 mail pluto[27360]: | complete state transition with STF_OK
Aug 5 07:35:50 mail pluto[27360]: "edelweiss" #1: transition from state
STATE_MAIN_I2 to state STATE_MAIN_I3
Aug 5 07:35:50 mail pluto[27360]: | sending reply packet to
91.112.190.238:500 (from port=500)
Aug 5 07:35:50 mail pluto[27360]: | sending 60 bytes for STATE_MAIN_I2
through eth0:500 to 91.112.190.238:500:
Aug 5 07:35:50 mail pluto[27360]: | bc 84 5c f3 50 d2 4c 20 23 de a8
6f dc 64 e4 7a
Aug 5 07:35:50 mail pluto[27360]: | 05 10 02 01 00 00 00 00 00 00 00
3c 43 81 dc 25
Aug 5 07:35:50 mail pluto[27360]: | 11 b9 99 f2 dc 75 5b 41 b4 ef ef
aa 2a 0d 17 92
Aug 5 07:35:50 mail pluto[27360]: | 24 5f ca a7 c5 22 7f ce b8 15 9a
3e
Aug 5 07:35:50 mail pluto[27360]: | inserting event EVENT_RETRANSMIT,
timeout in 10 seconds for #1
Aug 5 07:35:50 mail pluto[27360]: "edelweiss" #1: STATE_MAIN_I3: sent MI3,
expecting MR3
Aug 5 07:35:50 mail pluto[27360]: | modecfg pull: noquirk policy:push
not-client
Aug 5 07:35:50 mail pluto[27360]: | phase 1 is done, looking for phase 1
to unpend
Aug 5 07:35:50 mail pluto[27360]: | next event EVENT_RETRANSMIT in 10
seconds for #1
Aug 5 07:35:50 mail pluto[27360]: |
Aug 5 07:35:50 mail pluto[27360]: | *received 60 bytes from
91.112.190.238:500 on eth0 (port=500)
Aug 5 07:35:50 mail pluto[27360]: | bc 84 5c f3 50 d2 4c 20 23 de a8
6f dc 64 e4 7a
Aug 5 07:35:50 mail pluto[27360]: | 05 10 02 01 00 00 00 00 00 00 00
3c 6d cc c9 dd
Aug 5 07:35:50 mail pluto[27360]: | a5 39 b6 a3 49 0c 2a 07 83 8e 04
2e 61 84 93 8c
Aug 5 07:35:50 mail pluto[27360]: | 20 1a 0d 82 d1 ac f5 8d 34 46 ed
4a
Aug 5 07:35:50 mail pluto[27360]: | **parse ISAKMP Message:
Aug 5 07:35:50 mail pluto[27360]: | initiator cookie:
Aug 5 07:35:50 mail pluto[27360]: | bc 84 5c f3 50 d2 4c 20
Aug 5 07:35:50 mail pluto[27360]: | responder cookie:
Aug 5 07:35:50 mail pluto[27360]: | 23 de a8 6f dc 64 e4 7a
Aug 5 07:35:50 mail pluto[27360]: | next payload type: ISAKMP_NEXT_ID
Aug 5 07:35:50 mail pluto[27360]: | ISAKMP version: ISAKMP Version 1.0
Aug 5 07:35:50 mail pluto[27360]: | exchange type: ISAKMP_XCHG_IDPROT
Aug 5 07:35:50 mail pluto[27360]: | flags: ISAKMP_FLAG_ENCRYPTION
Aug 5 07:35:50 mail pluto[27360]: | message ID: 00 00 00 00
Aug 5 07:35:50 mail pluto[27360]: | length: 60
Aug 5 07:35:50 mail pluto[27360]: | processing packet with exchange
type=ISAKMP_XCHG_IDPROT (2)
Aug 5 07:35:50 mail pluto[27360]: | ICOOKIE: bc 84 5c f3 50 d2 4c 20
Aug 5 07:35:50 mail pluto[27360]: | RCOOKIE: 23 de a8 6f dc 64 e4 7a
Aug 5 07:35:50 mail pluto[27360]: | peer: 5b 70 be ee
Aug 5 07:35:50 mail pluto[27360]: | state hash entry 0
Aug 5 07:35:50 mail pluto[27360]: | peer and cookies match on #1, provided
msgid 00000000 vs 00000000
Aug 5 07:35:50 mail pluto[27360]: | state object #1 found, in
STATE_MAIN_I3
Aug 5 07:35:50 mail pluto[27360]: | processing connection edelweiss
Aug 5 07:35:50 mail pluto[27360]: | received encrypted packet from
91.112.190.238:500
Aug 5 07:35:50 mail pluto[27360]: | decrypting 32 bytes using algorithm
OAKLEY_3DES_CBC
Aug 5 07:35:50 mail pluto[27360]: | decrypted:
Aug 5 07:35:50 mail pluto[27360]: | 08 00 00 0c 01 00 00 00 5b 70 be
ee 00 00 00 14
Aug 5 07:35:50 mail pluto[27360]: | 4b 69 e0 a6 fa d6 ed f8 c8 3f 00
f6 0f 36 61 a0
Aug 5 07:35:50 mail pluto[27360]: | next IV: d1 ac f5 8d 34 46 ed 4a
Aug 5 07:35:50 mail pluto[27360]: | np=5 and sd=(nil)
Aug 5 07:35:50 mail pluto[27360]: | ***parse ISAKMP Identification
Payload:
Aug 5 07:35:50 mail pluto[27360]: | next payload type: ISAKMP_NEXT_HASH
Aug 5 07:35:50 mail pluto[27360]: | length: 12
Aug 5 07:35:50 mail pluto[27360]: | ID type: ID_IPV4_ADDR
Aug 5 07:35:50 mail pluto[27360]: | DOI specific A: 0
Aug 5 07:35:50 mail pluto[27360]: | DOI specific B: 0
Aug 5 07:35:50 mail pluto[27360]: | np=8 and sd=0x80d8338
Aug 5 07:35:50 mail pluto[27360]: | ***parse ISAKMP Hash Payload:
Aug 5 07:35:50 mail pluto[27360]: | next payload type: ISAKMP_NEXT_NONE
Aug 5 07:35:50 mail pluto[27360]: | length: 20
Aug 5 07:35:50 mail pluto[27360]: "edelweiss" #1: Main mode peer ID is
ID_IPV4_ADDR: '91.112.190.238'
Aug 5 07:35:50 mail pluto[27360]: | hashing 48 bytes of SA
Aug 5 07:35:50 mail pluto[27360]: | authentication succeeded
Aug 5 07:35:50 mail pluto[27360]: | complete state transition with STF_OK
Aug 5 07:35:50 mail pluto[27360]: "edelweiss" #1: transition from state
STATE_MAIN_I3 to state STATE_MAIN_I4
Aug 5 07:35:50 mail pluto[27360]: | inserting event EVENT_SA_REPLACE,
timeout in 28188 seconds for #1
Aug 5 07:35:50 mail pluto[27360]: "edelweiss" #1: STATE_MAIN_I4: ISAKMP SA
established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192
prf=oakley_md5 group=modp1024}
Aug 5 07:35:50 mail pluto[27360]: | modecfg pull: noquirk policy:push
not-client
Aug 5 07:35:50 mail pluto[27360]: | phase 1 is done, looking for phase 1
to unpend
Aug 5 07:35:50 mail pluto[27360]: | unqueuing pending Quick Mode with
91.112.190.238 "edelweiss"
Aug 5 07:35:50 mail pluto[27360]: | duplicating state object #1
Aug 5 07:35:50 mail pluto[27360]: | creating state object #2 at 0x9567518
Aug 5 07:35:50 mail pluto[27360]: | processing connection edelweiss
Aug 5 07:35:50 mail pluto[27360]: | ICOOKIE: bc 84 5c f3 50 d2 4c 20
Aug 5 07:35:50 mail pluto[27360]: | RCOOKIE: 23 de a8 6f dc 64 e4 7a
Aug 5 07:35:50 mail pluto[27360]: | peer: 5b 70 be ee
Aug 5 07:35:50 mail pluto[27360]: | state hash entry 0
Aug 5 07:35:50 mail pluto[27360]: | inserting event EVENT_SO_DISCARD,
timeout in 0 seconds for #2
Aug 5 07:35:50 mail pluto[27360]: "edelweiss" #2: initiating Quick Mode
PSK+ENCRYPT+TUNNEL+UP {using isakmp#1}
Aug 5 07:35:50 mail pluto[27360]: | 0: w->pcw_dead: 0 w->pcw_work: 0 cnt:
1
Aug 5 07:35:50 mail pluto[27360]: | asking helper 0 to do build_nonce op
on seq: 2
Aug 5 07:35:50 mail pluto[27360]: | inserting event EVENT_CRYPTO_FAILED,
timeout in 300 seconds for #2
Aug 5 07:35:50 mail pluto[27376]: ! helper 0 doing build_nonce op id: 2
Aug 5 07:35:50 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 119
seconds
Aug 5 07:35:50 mail pluto[27376]: ! Generated nonce:
Aug 5 07:35:50 mail pluto[27376]: ! b4 72 ff 55 76 c8 b3 2c 40 2e bd
59 f2 6f f9 53
Aug 5 07:35:50 mail pluto[27360]: | helper 0 has work (cnt now 0)
Aug 5 07:35:50 mail pluto[27360]: | helper 0 replies to sequence 2
Aug 5 07:35:50 mail pluto[27360]: | calling callback function 0x8066e98
Aug 5 07:35:50 mail pluto[27360]: | quick outI1: calculated ke+nonce,
sending I1
Aug 5 07:35:50 mail pluto[27360]: | processing connection edelweiss
Aug 5 07:35:50 mail pluto[27360]: | **emit ISAKMP Message:
Aug 5 07:35:50 mail pluto[27360]: | initiator cookie:
Aug 5 07:35:50 mail pluto[27360]: | bc 84 5c f3 50 d2 4c 20
Aug 5 07:35:50 mail pluto[27360]: | responder cookie:
Aug 5 07:35:50 mail pluto[27360]: | 23 de a8 6f dc 64 e4 7a
Aug 5 07:35:50 mail pluto[27360]: | next payload type: ISAKMP_NEXT_HASH
Aug 5 07:35:50 mail pluto[27360]: | ISAKMP version: ISAKMP Version 1.0
Aug 5 07:35:50 mail pluto[27360]: | exchange type: ISAKMP_XCHG_QUICK
Aug 5 07:35:50 mail pluto[27360]: | flags: ISAKMP_FLAG_ENCRYPTION
Aug 5 07:35:50 mail pluto[27360]: | message ID: 9a d5 7b 33
Aug 5 07:35:50 mail pluto[27360]: | ***emit ISAKMP Hash Payload:
Aug 5 07:35:50 mail pluto[27360]: | next payload type: ISAKMP_NEXT_SA
Aug 5 07:35:50 mail pluto[27360]: | emitting 16 zero bytes of HASH into
ISAKMP Hash Payload
Aug 5 07:35:50 mail pluto[27360]: | emitting length of ISAKMP Hash
Payload: 20
Aug 5 07:35:50 mail pluto[27360]: | kernel_alg_db_new() initial
trans_cnt=28
Aug 5 07:35:50 mail pluto[27360]: | kernel_alg_db_new() will return
p_new->protoid=3, p_new->trans_cnt=1
Aug 5 07:35:50 mail pluto[27360]: | kernel_alg_db_new() trans[0]:
transid=3, attr_cnt=1, attrs[0].type=5, attrs[0].val=1
Aug 5 07:35:50 mail pluto[27360]: | returning new proposal from esp_info
Aug 5 07:35:50 mail pluto[27360]: | ***emit ISAKMP Security Association
Payload:
Aug 5 07:35:50 mail pluto[27360]: | next payload type:
ISAKMP_NEXT_NONCE
Aug 5 07:35:50 mail pluto[27360]: | DOI: ISAKMP_DOI_IPSEC
Aug 5 07:35:50 mail pluto[27360]: | ****emit IPsec DOI SIT:
Aug 5 07:35:50 mail pluto[27360]: | IPsec DOI SIT: SIT_IDENTITY_ONLY
Aug 5 07:35:50 mail pluto[27360]: | out_sa pcn: 0 has 1 valid proposals
Aug 5 07:35:50 mail pluto[27360]: | out_sa pcn: 0 pn: 0<1 valid_count: 1
Aug 5 07:35:50 mail pluto[27360]: | ****emit ISAKMP Proposal Payload:
Aug 5 07:35:50 mail pluto[27360]: | next payload type: ISAKMP_NEXT_NONE
Aug 5 07:35:50 mail pluto[27360]: | proposal number: 0
Aug 5 07:35:50 mail pluto[27360]: | protocol ID: PROTO_IPSEC_ESP
Aug 5 07:35:50 mail pluto[27360]: | SPI size: 4
Aug 5 07:35:50 mail pluto[27360]: | number of transforms: 1
Aug 5 07:35:50 mail pluto[27360]: | netlink_get_spi: allocated 0x6778d334
for esp.0 at 83.218.162.44
Aug 5 07:35:50 mail pluto[27360]: | emitting 4 raw bytes of SPI into
ISAKMP Proposal Payload
Aug 5 07:35:50 mail pluto[27360]: | SPI 67 78 d3 34
Aug 5 07:35:50 mail pluto[27360]: | *****emit ISAKMP Transform Payload
(ESP):
Aug 5 07:35:50 mail pluto[27360]: | next payload type: ISAKMP_NEXT_NONE
Aug 5 07:35:50 mail pluto[27360]: | transform number: 0
Aug 5 07:35:50 mail pluto[27360]: | transform ID: ESP_3DES
Aug 5 07:35:50 mail pluto[27360]: | ******emit ISAKMP IPsec DOI attribute:
Aug 5 07:35:50 mail pluto[27360]: | af+type: ENCAPSULATION_MODE
Aug 5 07:35:50 mail pluto[27360]: | length/value: 1
Aug 5 07:35:50 mail pluto[27360]: | [1 is ENCAPSULATION_MODE_TUNNEL]
Aug 5 07:35:50 mail pluto[27360]: | ******emit ISAKMP IPsec DOI attribute:
Aug 5 07:35:50 mail pluto[27360]: | af+type: SA_LIFE_TYPE
Aug 5 07:35:50 mail pluto[27360]: | length/value: 1
Aug 5 07:35:50 mail pluto[27360]: | [1 is SA_LIFE_TYPE_SECONDS]
Aug 5 07:35:50 mail pluto[27360]: | ******emit ISAKMP IPsec DOI attribute:
Aug 5 07:35:50 mail pluto[27360]: | af+type: SA_LIFE_DURATION
Aug 5 07:35:50 mail pluto[27360]: | length/value: 3600
Aug 5 07:35:50 mail pluto[27360]: | ******emit ISAKMP IPsec DOI attribute:
Aug 5 07:35:50 mail pluto[27360]: | af+type: AUTH_ALGORITHM
Aug 5 07:35:50 mail pluto[27360]: | length/value: 1
Aug 5 07:35:50 mail pluto[27360]: | [1 is AUTH_ALGORITHM_HMAC_MD5]
Aug 5 07:35:50 mail pluto[27360]: | emitting length of ISAKMP Transform
Payload (ESP): 24
Aug 5 07:35:50 mail pluto[27360]: | emitting length of ISAKMP Proposal
Payload: 36
Aug 5 07:35:50 mail pluto[27360]: | emitting length of ISAKMP Security
Association Payload: 48
Aug 5 07:35:50 mail pluto[27360]: | ***emit ISAKMP Nonce Payload:
Aug 5 07:35:50 mail pluto[27360]: | next payload type: ISAKMP_NEXT_ID
Aug 5 07:35:50 mail pluto[27360]: | emitting 16 raw bytes of Ni into
ISAKMP Nonce Payload
Aug 5 07:35:50 mail pluto[27360]: | Ni b4 72 ff 55 76 c8 b3 2c 40 2e bd
59 f2 6f f9 53
Aug 5 07:35:50 mail pluto[27360]: | emitting length of ISAKMP Nonce
Payload: 20
Aug 5 07:35:50 mail pluto[27360]: | ***emit ISAKMP Identification Payload
(IPsec DOI):
Aug 5 07:35:50 mail pluto[27360]: | next payload type: ISAKMP_NEXT_ID
Aug 5 07:35:50 mail pluto[27360]: | ID type: ID_IPV4_ADDR_SUBNET
Aug 5 07:35:50 mail pluto[27360]: | Protocol ID: 0
Aug 5 07:35:50 mail pluto[27360]: | port: 0
Aug 5 07:35:50 mail pluto[27360]: | emitting 4 raw bytes of client network
into ISAKMP Identification Payload (IPsec DOI)
Aug 5 07:35:50 mail pluto[27360]: | client network c0 a8 06 00
Aug 5 07:35:50 mail pluto[27360]: | emitting 4 raw bytes of client mask
into ISAKMP Identification Payload (IPsec DOI)
Aug 5 07:35:50 mail pluto[27360]: | client mask ff ff ff 00
Aug 5 07:35:50 mail pluto[27360]: | emitting length of ISAKMP
Identification Payload (IPsec DOI): 16
Aug 5 07:35:50 mail pluto[27360]: | ***emit ISAKMP Identification Payload
(IPsec DOI):
Aug 5 07:35:50 mail pluto[27360]: | next payload type: ISAKMP_NEXT_NONE
Aug 5 07:35:50 mail pluto[27360]: | ID type: ID_IPV4_ADDR_SUBNET
Aug 5 07:35:50 mail pluto[27360]: | Protocol ID: 0
Aug 5 07:35:50 mail pluto[27360]: | port: 0
Aug 5 07:35:50 mail pluto[27360]: | emitting 4 raw bytes of client network
into ISAKMP Identification Payload (IPsec DOI)
Aug 5 07:35:50 mail pluto[27360]: | client network c0 a8 05 00
Aug 5 07:35:50 mail pluto[27360]: | emitting 4 raw bytes of client mask
into ISAKMP Identification Payload (IPsec DOI)
Aug 5 07:35:50 mail pluto[27360]: | client mask ff ff ff 00
Aug 5 07:35:50 mail pluto[27360]: | emitting length of ISAKMP
Identification Payload (IPsec DOI): 16
Aug 5 07:35:50 mail pluto[27360]: | HASH(1) computed:
Aug 5 07:35:50 mail pluto[27360]: | b8 8c b0 cc 27 5a 79 de 36 59 2c
86 65 0a 88 e2
Aug 5 07:35:50 mail pluto[27360]: | last Phase 1 IV: d1 ac f5 8d 34 46
ed 4a
Aug 5 07:35:50 mail pluto[27360]: | current Phase 1 IV: d1 ac f5 8d 34
46 ed 4a
Aug 5 07:35:50 mail pluto[27360]: | computed Phase 2 IV:
Aug 5 07:35:50 mail pluto[27360]: | fd ba ab 0d 26 92 4d 2a 9b c2 63
1d 44 49 bd c1
Aug 5 07:35:50 mail pluto[27360]: | encrypting:
Aug 5 07:35:50 mail pluto[27360]: | 01 00 00 14 b8 8c b0 cc 27 5a 79
de 36 59 2c 86
Aug 5 07:35:50 mail pluto[27360]: | 65 0a 88 e2 0a 00 00 30 00 00 00
01 00 00 00 01
Aug 5 07:35:50 mail pluto[27360]: | 00 00 00 24 00 03 04 01 67 78 d3
34 00 00 00 18
Aug 5 07:35:50 mail pluto[27360]: | 00 03 00 00 80 04 00 01 80 01 00
01 80 02 0e 10
Aug 5 07:35:50 mail pluto[27360]: | 80 05 00 01 05 00 00 14 b4 72 ff
55 76 c8 b3 2c
Aug 5 07:35:50 mail pluto[27360]: | 40 2e bd 59 f2 6f f9 53 05 00 00
10 04 00 00 00
Aug 5 07:35:50 mail pluto[27360]: | c0 a8 06 00 ff ff ff 00 00 00 00
10 04 00 00 00
Aug 5 07:35:50 mail pluto[27360]: | c0 a8 05 00 ff ff ff 00
Aug 5 07:35:50 mail pluto[27360]: | IV:
Aug 5 07:35:50 mail pluto[27360]: | fd ba ab 0d 26 92 4d 2a 9b c2 63
1d 44 49 bd c1
Aug 5 07:35:50 mail pluto[27360]: | encrypting using OAKLEY_3DES_CBC
Aug 5 07:35:50 mail pluto[27360]: | next IV: c4 8f 57 b7 d2 2c d5 1e
Aug 5 07:35:50 mail pluto[27360]: | emitting length of ISAKMP Message: 148
Aug 5 07:35:50 mail pluto[27360]: | sending 148 bytes for quick_outI1
through eth0:500 to 91.112.190.238:500:
Aug 5 07:35:50 mail pluto[27360]: | bc 84 5c f3 50 d2 4c 20 23 de a8
6f dc 64 e4 7a
Aug 5 07:35:50 mail pluto[27360]: | 08 10 20 01 9a d5 7b 33 00 00 00
94 bf fe d8 35
Aug 5 07:35:50 mail pluto[27360]: | 3a 69 72 47 75 86 12 95 56 b1 99
aa 80 83 0e 56
Aug 5 07:35:50 mail pluto[27360]: | f9 4f a2 ff aa c7 cd 4e 73 2d 5b
69 bd 1b 35 bd
Aug 5 07:35:50 mail pluto[27360]: | b7 42 21 c4 bf ca 71 e2 40 9f c6
bf 0e 3d 98 26
Aug 5 07:35:50 mail pluto[27360]: | fc e2 09 1d 18 ff 33 20 73 4c 3d
2c bf 4b 17 d5
Aug 5 07:35:50 mail pluto[27360]: | 07 d4 36 42 a4 13 4f 39 ba 25 40
b4 37 ee 20 84
Aug 5 07:35:50 mail pluto[27360]: | 9d 3c e8 3b e0 96 81 94 27 14 e4
31 39 59 10 36
Aug 5 07:35:50 mail pluto[27360]: | 8f 43 64 7d 89 4e 8f bd 28 5b 4d
09 c4 8f 57 b7
Aug 5 07:35:50 mail pluto[27360]: | d2 2c d5 1e
Aug 5 07:35:50 mail pluto[27360]: | inserting event EVENT_RETRANSMIT,
timeout in 10 seconds for #2
Aug 5 07:35:50 mail pluto[27360]: | next event EVENT_RETRANSMIT in 10
seconds for #2
Aug 5 07:35:50 mail pluto[27360]: |
Aug 5 07:35:50 mail pluto[27360]: | *received 148 bytes from
91.112.190.238:500 on eth0 (port=500)
Aug 5 07:35:50 mail pluto[27360]: | bc 84 5c f3 50 d2 4c 20 23 de a8
6f dc 64 e4 7a
Aug 5 07:35:50 mail pluto[27360]: | 08 10 20 01 9a d5 7b 33 00 00 00
94 98 39 ee 62
Aug 5 07:35:50 mail pluto[27360]: | 78 78 00 4f 12 3d 07 43 8c 50 57
d1 80 93 1d 5d
Aug 5 07:35:50 mail pluto[27360]: | e9 23 14 ae 8f e2 08 2d 2d 86 b5
f8 c2 d5 53 c0
Aug 5 07:35:50 mail pluto[27360]: | bd c0 4a a0 ad 47 36 3c 7e ce 5e
ff d2 a2 f6 97
Aug 5 07:35:50 mail pluto[27360]: | 50 20 45 41 b0 1f 14 62 93 cf 39
d8 b6 a1 92 45
Aug 5 07:35:50 mail pluto[27360]: | 76 f0 03 37 0d 58 98 3c 6c 51 6a
3d b2 dc 19 de
Aug 5 07:35:50 mail pluto[27360]: | 74 29 e1 89 fc 62 f6 a5 45 6b 95
ee 77 05 db c8
Aug 5 07:35:50 mail pluto[27360]: | a0 a3 83 85 12 8e 88 a2 c0 3b 4e
60 9d be 39 6a
Aug 5 07:35:50 mail pluto[27360]: | ac fc 2c 7a
Aug 5 07:35:50 mail pluto[27360]: | **parse ISAKMP Message:
Aug 5 07:35:50 mail pluto[27360]: | initiator cookie:
Aug 5 07:35:50 mail pluto[27360]: | bc 84 5c f3 50 d2 4c 20
Aug 5 07:35:50 mail pluto[27360]: | responder cookie:
Aug 5 07:35:50 mail pluto[27360]: | 23 de a8 6f dc 64 e4 7a
Aug 5 07:35:50 mail pluto[27360]: | next payload type: ISAKMP_NEXT_HASH
Aug 5 07:35:50 mail pluto[27360]: | ISAKMP version: ISAKMP Version 1.0
Aug 5 07:35:50 mail pluto[27360]: | exchange type: ISAKMP_XCHG_QUICK
Aug 5 07:35:50 mail pluto[27360]: | flags: ISAKMP_FLAG_ENCRYPTION
Aug 5 07:35:50 mail pluto[27360]: | message ID: 9a d5 7b 33
Aug 5 07:35:50 mail pluto[27360]: | length: 148
Aug 5 07:35:50 mail pluto[27360]: | processing packet with exchange
type=ISAKMP_XCHG_QUICK (32)
Aug 5 07:35:50 mail pluto[27360]: | ICOOKIE: bc 84 5c f3 50 d2 4c 20
Aug 5 07:35:50 mail pluto[27360]: | RCOOKIE: 23 de a8 6f dc 64 e4 7a
Aug 5 07:35:50 mail pluto[27360]: | peer: 5b 70 be ee
Aug 5 07:35:50 mail pluto[27360]: | state hash entry 0
Aug 5 07:35:50 mail pluto[27360]: | peer and cookies match on #2, provided
msgid 9ad57b33 vs 9ad57b33
Aug 5 07:35:50 mail pluto[27360]: | state object #2 found, in
STATE_QUICK_I1
Aug 5 07:35:50 mail pluto[27360]: | processing connection edelweiss
Aug 5 07:35:50 mail pluto[27360]: | received encrypted packet from
91.112.190.238:500
Aug 5 07:35:50 mail pluto[27360]: | decrypting 120 bytes using algorithm
OAKLEY_3DES_CBC
Aug 5 07:35:50 mail pluto[27360]: | decrypted:
Aug 5 07:35:50 mail pluto[27360]: | 01 00 00 14 35 ff 37 bf da 31 3a
97 e8 f6 d1 0d
Aug 5 07:35:50 mail pluto[27360]: | 0d 1a fc 9b 0a 00 00 30 00 00 00
01 00 00 00 01
Aug 5 07:35:50 mail pluto[27360]: | 00 00 00 24 00 03 04 01 08 4a ef
4b 00 00 00 18
Aug 5 07:35:50 mail pluto[27360]: | 00 03 00 00 80 04 00 01 80 01 00
01 80 02 0e 10
Aug 5 07:35:50 mail pluto[27360]: | 80 05 00 01 05 00 00 14 fa b1 9a
63 76 00 79 0e
Aug 5 07:35:50 mail pluto[27360]: | 3e 41 d1 35 27 02 17 20 05 00 00
10 04 00 00 00
Aug 5 07:35:50 mail pluto[27360]: | c0 a8 06 00 ff ff ff 00 00 00 00
10 04 00 00 00
Aug 5 07:35:50 mail pluto[27360]: | c0 a8 05 00 ff ff ff 00
Aug 5 07:35:50 mail pluto[27360]: | next IV: 9d be 39 6a ac fc 2c 7a
Aug 5 07:35:50 mail pluto[27360]: | np=8 and sd=0x80d8338
Aug 5 07:35:50 mail pluto[27360]: | ***parse ISAKMP Hash Payload:
Aug 5 07:35:50 mail pluto[27360]: | next payload type: ISAKMP_NEXT_SA
Aug 5 07:35:50 mail pluto[27360]: | length: 20
Aug 5 07:35:50 mail pluto[27360]: | np=1 and sd=0x80d8800
Aug 5 07:35:50 mail pluto[27360]: | ***parse ISAKMP Security Association
Payload:
Aug 5 07:35:50 mail pluto[27360]: | next payload type:
ISAKMP_NEXT_NONCE
Aug 5 07:35:50 mail pluto[27360]: | length: 48
Aug 5 07:35:50 mail pluto[27360]: | DOI: ISAKMP_DOI_IPSEC
Aug 5 07:35:50 mail pluto[27360]: | np=10 and sd=0x80d8320
Aug 5 07:35:50 mail pluto[27360]: | ***parse ISAKMP Nonce Payload:
Aug 5 07:35:50 mail pluto[27360]: | next payload type: ISAKMP_NEXT_ID
Aug 5 07:35:50 mail pluto[27360]: | length: 20
Aug 5 07:35:50 mail pluto[27360]: | np=5 and sd=(nil)
Aug 5 07:35:50 mail pluto[27360]: | ***parse ISAKMP Identification Payload
(IPsec DOI):
Aug 5 07:35:50 mail pluto[27360]: | next payload type: ISAKMP_NEXT_ID
Aug 5 07:35:50 mail pluto[27360]: | length: 16
Aug 5 07:35:50 mail pluto[27360]: | ID type: ID_IPV4_ADDR_SUBNET
Aug 5 07:35:50 mail pluto[27360]: | Protocol ID: 0
Aug 5 07:35:50 mail pluto[27360]: | port: 0
Aug 5 07:35:50 mail pluto[27360]: | np=5 and sd=(nil)
Aug 5 07:35:50 mail pluto[27360]: | ***parse ISAKMP Identification Payload
(IPsec DOI):
Aug 5 07:35:50 mail pluto[27360]: | next payload type: ISAKMP_NEXT_NONE
Aug 5 07:35:50 mail pluto[27360]: | length: 16
Aug 5 07:35:50 mail pluto[27360]: | ID type: ID_IPV4_ADDR_SUBNET
Aug 5 07:35:50 mail pluto[27360]: | Protocol ID: 0
Aug 5 07:35:50 mail pluto[27360]: | port: 0
Aug 5 07:35:50 mail pluto[27360]: | **emit ISAKMP Message:
Aug 5 07:35:50 mail pluto[27360]: | initiator cookie:
Aug 5 07:35:50 mail pluto[27360]: | bc 84 5c f3 50 d2 4c 20
Aug 5 07:35:50 mail pluto[27360]: | responder cookie:
Aug 5 07:35:50 mail pluto[27360]: | 23 de a8 6f dc 64 e4 7a
Aug 5 07:35:50 mail pluto[27360]: | next payload type: ISAKMP_NEXT_HASH
Aug 5 07:35:50 mail pluto[27360]: | ISAKMP version: ISAKMP Version 1.0
Aug 5 07:35:50 mail pluto[27360]: | exchange type: ISAKMP_XCHG_QUICK
Aug 5 07:35:50 mail pluto[27360]: | flags: ISAKMP_FLAG_ENCRYPTION
Aug 5 07:35:50 mail pluto[27360]: | message ID: 9a d5 7b 33
Aug 5 07:35:50 mail pluto[27360]: | HASH(2) computed:
Aug 5 07:35:50 mail pluto[27360]: | 35 ff 37 bf da 31 3a 97 e8 f6 d1
0d 0d 1a fc 9b
Aug 5 07:35:50 mail pluto[27360]: | ****parse IPsec DOI SIT:
Aug 5 07:35:50 mail pluto[27360]: | IPsec DOI SIT: SIT_IDENTITY_ONLY
Aug 5 07:35:50 mail pluto[27360]: | ****parse ISAKMP Proposal Payload:
Aug 5 07:35:50 mail pluto[27360]: | next payload type: ISAKMP_NEXT_NONE
Aug 5 07:35:50 mail pluto[27360]: | length: 36
Aug 5 07:35:50 mail pluto[27360]: | proposal number: 0
Aug 5 07:35:50 mail pluto[27360]: | protocol ID: PROTO_IPSEC_ESP
Aug 5 07:35:50 mail pluto[27360]: | SPI size: 4
Aug 5 07:35:50 mail pluto[27360]: | number of transforms: 1
Aug 5 07:35:50 mail pluto[27360]: | parsing 4 raw bytes of ISAKMP Proposal
Payload into SPI
Aug 5 07:35:50 mail pluto[27360]: | SPI 08 4a ef 4b
Aug 5 07:35:50 mail pluto[27360]: | *****parse ISAKMP Transform Payload
(ESP):
Aug 5 07:35:50 mail pluto[27360]: | next payload type: ISAKMP_NEXT_NONE
Aug 5 07:35:50 mail pluto[27360]: | length: 24
Aug 5 07:35:50 mail pluto[27360]: | transform number: 0
Aug 5 07:35:50 mail pluto[27360]: | transform ID: ESP_3DES
Aug 5 07:35:50 mail pluto[27360]: | ******parse ISAKMP IPsec DOI
attribute:
Aug 5 07:35:50 mail pluto[27360]: | af+type: ENCAPSULATION_MODE
Aug 5 07:35:50 mail pluto[27360]: | length/value: 1
Aug 5 07:35:50 mail pluto[27360]: | [1 is ENCAPSULATION_MODE_TUNNEL]
Aug 5 07:35:50 mail pluto[27360]: | ******parse ISAKMP IPsec DOI
attribute:
Aug 5 07:35:50 mail pluto[27360]: | af+type: SA_LIFE_TYPE
Aug 5 07:35:50 mail pluto[27360]: | length/value: 1
Aug 5 07:35:50 mail pluto[27360]: | [1 is SA_LIFE_TYPE_SECONDS]
Aug 5 07:35:50 mail pluto[27360]: | ******parse ISAKMP IPsec DOI
attribute:
Aug 5 07:35:50 mail pluto[27360]: | af+type: SA_LIFE_DURATION
Aug 5 07:35:50 mail pluto[27360]: | length/value: 3600
Aug 5 07:35:50 mail pluto[27360]: | ******parse ISAKMP IPsec DOI
attribute:
Aug 5 07:35:50 mail pluto[27360]: | af+type: AUTH_ALGORITHM
Aug 5 07:35:50 mail pluto[27360]: | length/value: 1
Aug 5 07:35:50 mail pluto[27360]: | [1 is AUTH_ALGORITHM_HMAC_MD5]
Aug 5 07:35:50 mail pluto[27360]: | kernel_alg_esp_enc_ok(3,0): alg_id=3,
alg_ivlen=8, alg_minbits=192, alg_maxbits=192, res=0, ret=1
Aug 5 07:35:50 mail pluto[27360]: | kernel_alg_esp_enc_keylen():alg_id=3,
keylen=24
Aug 5 07:35:50 mail pluto[27360]: | our client is subnet 192.168.6.0/24
Aug 5 07:35:50 mail pluto[27360]: | our client protocol/port is 0/0
Aug 5 07:35:50 mail pluto[27360]: | peer client is subnet 192.168.5.0/24
Aug 5 07:35:50 mail pluto[27360]: | peer client protocol/port is 0/0
Aug 5 07:35:50 mail pluto[27360]: | ***emit ISAKMP Hash Payload:
Aug 5 07:35:50 mail pluto[27360]: | next payload type: ISAKMP_NEXT_NONE
Aug 5 07:35:50 mail pluto[27360]: | emitting 16 zero bytes of HASH into
ISAKMP Hash Payload
Aug 5 07:35:50 mail pluto[27360]: | emitting length of ISAKMP Hash
Payload: 20
Aug 5 07:35:50 mail pluto[27360]: | HASH(3) computed: 48 f3 e3 d3 55 bd
39 4e 36 a6 13 65 aa ac 92 c2
Aug 5 07:35:50 mail pluto[27360]: | compute_proto_keymat:needed_len (after
ESP enc)=24
Aug 5 07:35:50 mail pluto[27360]: | compute_proto_keymat:needed_len (after
ESP auth)=40
Aug 5 07:35:50 mail pluto[27360]: | KEYMAT computed:
Aug 5 07:35:50 mail pluto[27360]: | 24 61 70 71 28 1b a2 67 44 98 7a
52 d6 a0 d6 c4
Aug 5 07:35:50 mail pluto[27360]: | 06 03 21 dc 32 62 58 87 02 1e 73
9c 8b a8 4a 35
Aug 5 07:35:50 mail pluto[27360]: | 21 60 d6 b0 c2 6d 33 13
Aug 5 07:35:50 mail pluto[27360]: | Peer KEYMAT computed:
Aug 5 07:35:50 mail pluto[27360]: | 6e 68 17 37 e3 b8 10 de 40 09 05
1f 43 9c 30 22
Aug 5 07:35:50 mail pluto[27360]: | 93 69 e5 14 c1 76 8c cc b1 07 99
66 f1 1a c0 8a
Aug 5 07:35:50 mail pluto[27360]: | 97 b3 ac ec 4c 49 86 0b
Aug 5 07:35:50 mail pluto[27360]: | install_ipsec_sa() for #2: inbound and
outbound
Aug 5 07:35:50 mail pluto[27360]: | route owner of "edelweiss" prospective
erouted: self; eroute owner: self
Aug 5 07:35:50 mail pluto[27360]: | could_route called for edelweiss
(kind=CK_PERMANENT)
Aug 5 07:35:50 mail pluto[27360]: | looking for alg with transid: 3
keylen: 0 auth: 1
Aug 5 07:35:50 mail pluto[27360]: | checking transid: 11 keylen: 0 auth: 1
Aug 5 07:35:50 mail pluto[27360]: | checking transid: 11 keylen: 0 auth: 2
Aug 5 07:35:50 mail pluto[27360]: | checking transid: 2 keylen: 8 auth: 0
Aug 5 07:35:50 mail pluto[27360]: | checking transid: 2 keylen: 8 auth: 1
Aug 5 07:35:50 mail pluto[27360]: | checking transid: 2 keylen: 8 auth: 2
Aug 5 07:35:50 mail pluto[27360]: | checking transid: 3 keylen: 24 auth: 0
Aug 5 07:35:50 mail pluto[27360]: | checking transid: 3 keylen: 24 auth: 1
Aug 5 07:35:50 mail pluto[27360]: | add inbound eroute 192.168.5.0/24:0
--0-> 192.168.6.0/24:0 => tun.10000 at 83.218.162.44 (raw_eroute)
Aug 5 07:35:50 mail pluto[27360]: | looking for alg with transid: 3
keylen: 0 auth: 1
Aug 5 07:35:50 mail pluto[27360]: | checking transid: 11 keylen: 0 auth: 1
Aug 5 07:35:50 mail pluto[27360]: | checking transid: 11 keylen: 0 auth: 2
Aug 5 07:35:50 mail pluto[27360]: | checking transid: 2 keylen: 8 auth: 0
Aug 5 07:35:50 mail pluto[27360]: | checking transid: 2 keylen: 8 auth: 1
Aug 5 07:35:50 mail pluto[27360]: | checking transid: 2 keylen: 8 auth: 2
Aug 5 07:35:50 mail pluto[27360]: | checking transid: 3 keylen: 24 auth: 0
Aug 5 07:35:50 mail pluto[27360]: | checking transid: 3 keylen: 24 auth: 1
Aug 5 07:35:50 mail pluto[27360]: | sr for #2: prospective erouted
Aug 5 07:35:50 mail pluto[27360]: | route owner of "edelweiss" prospective
erouted: self; eroute owner: self
Aug 5 07:35:50 mail pluto[27360]: | route_and_eroute with c: edelweiss
(next: none) ero:edelweiss esr:{(nil)} ro:edelweiss rosr:{(nil)} and state:
2
Aug 5 07:35:50 mail pluto[27360]: | eroute_connection replace eroute
192.168.6.0/24:0 --0-> 192.168.5.0/24:0 => tun.0 at 91.112.190.238
(raw_eroute)
Aug 5 07:35:50 mail pluto[27360]: | command executing up-client
Aug 5 07:35:50 mail pluto[27360]: | executing up-client: 2>&1
PLUTO_VERSION='1.1' PLUTO_VERB='up-client' PLUTO_CONNECTION='edelweiss'
PLUTO_NEXT_HOP='83.218.162.62' PLUTO_INTERFACE='eth0'
PLUTO_ME='83.218.162.44' PLUTO_MY_ID='83.218.162.44'
PLUTO_MY_CLIENT='192.168.6.0/24' PLUTO_MY_CLIENT_NET='192.168.6.0'
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0'
PLUTO_MY_PROTOCOL='0' PLUTO_PEER='91.112.190.238'
PLUTO_PEER_ID='91.112.190.238' PLUTO_PEER_CLIENT='192.168.5.0/24'
PLUTO_PEER_CLIENT_NET='192.168.5.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0'
PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA=''
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+UP' ipsec _updown
Aug 5 07:35:50 mail pluto[27360]: | route_and_eroute: firewall_notified:
true
Aug 5 07:35:50 mail pluto[27360]: | route_and_eroute: instance
"edelweiss", setting eroute_owner {spd=0x95656ec,sr=0x95656ec} to #2 (was
#0) (newest_ipsec_sa=#0)
Aug 5 07:35:50 mail pluto[27360]: | encrypting:
Aug 5 07:35:50 mail pluto[27360]: | 00 00 00 14 48 f3 e3 d3 55 bd 39
4e 36 a6 13 65
Aug 5 07:35:50 mail pluto[27360]: | aa ac 92 c2
Aug 5 07:35:50 mail pluto[27360]: | IV:
Aug 5 07:35:50 mail pluto[27360]: | 9d be 39 6a ac fc 2c 7a
Aug 5 07:35:50 mail pluto[27360]: | emitting 4 zero bytes of encryption
padding into ISAKMP Message
Aug 5 07:35:50 mail pluto[27360]: | encrypting using OAKLEY_3DES_CBC
Aug 5 07:35:50 mail pluto[27360]: | next IV: b3 71 1e 69 15 73 d7 3e
Aug 5 07:35:50 mail pluto[27360]: | emitting length of ISAKMP Message: 52
Aug 5 07:35:50 mail pluto[27360]: | inR1_outI2: instance edelweiss[0],
setting newest_ipsec_sa to #2 (was #0) (spd.eroute=#2)
Aug 5 07:35:50 mail pluto[27360]: | complete state transition with STF_OK
Aug 5 07:35:50 mail pluto[27360]: "edelweiss" #2: transition from state
STATE_QUICK_I1 to state STATE_QUICK_I2
Aug 5 07:35:50 mail pluto[27360]: | sending reply packet to
91.112.190.238:500 (from port=500)
Aug 5 07:35:50 mail pluto[27360]: | sending 52 bytes for STATE_QUICK_I1
through eth0:500 to 91.112.190.238:500:
Aug 5 07:35:50 mail pluto[27360]: | bc 84 5c f3 50 d2 4c 20 23 de a8
6f dc 64 e4 7a
Aug 5 07:35:50 mail pluto[27360]: | 08 10 20 01 9a d5 7b 33 00 00 00
34 30 55 08 05
Aug 5 07:35:50 mail pluto[27360]: | 6d 09 7b 39 4d 31 41 27 95 1c 08
c0 b3 71 1e 69
Aug 5 07:35:50 mail pluto[27360]: | 15 73 d7 3e
Aug 5 07:35:50 mail pluto[27360]: | inserting event EVENT_SA_REPLACE,
timeout in 2721 seconds for #2
Aug 5 07:35:50 mail pluto[27360]: "edelweiss" #2: STATE_QUICK_I2: sent
QI2, IPsec SA established {ESP=>0x084aef4b <0x6778d334 xfrm=3DES_0-HMAC_MD5
NATD=none DPD=none}
Aug 5 07:35:50 mail pluto[27360]: | modecfg pull: noquirk policy:push
not-client
Aug 5 07:35:50 mail pluto[27360]: | phase 1 is done, looking for phase 1
to unpend
Aug 5 07:35:50 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 119
seconds
Aug 5 07:37:49 mail pluto[27360]: |
Aug 5 07:37:49 mail pluto[27360]: | *time to handle event
Aug 5 07:37:49 mail pluto[27360]: | handling event EVENT_PENDING_PHASE2
Aug 5 07:37:49 mail pluto[27360]: | event after this is EVENT_SA_REPLACE
in 2602 seconds
Aug 5 07:37:49 mail pluto[27360]: | inserting event EVENT_PENDING_PHASE2,
timeout in 120 seconds
Aug 5 07:37:49 mail pluto[27360]: | pending review: connection "edelweiss"
checked
Aug 5 07:37:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug 5 07:39:49 mail pluto[27360]: |
Aug 5 07:39:49 mail pluto[27360]: | *time to handle event
Aug 5 07:39:49 mail pluto[27360]: | handling event EVENT_PENDING_PHASE2
Aug 5 07:39:49 mail pluto[27360]: | event after this is EVENT_SA_REPLACE
in 2482 seconds
Aug 5 07:39:49 mail pluto[27360]: | inserting event EVENT_PENDING_PHASE2,
timeout in 120 seconds
Aug 5 07:39:49 mail pluto[27360]: | pending review: connection "edelweiss"
checked
Aug 5 07:39:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug 5 07:41:49 mail pluto[27360]: |
Aug 5 07:41:49 mail pluto[27360]: | *time to handle event
Aug 5 07:41:49 mail pluto[27360]: | handling event EVENT_PENDING_PHASE2
Aug 5 07:41:49 mail pluto[27360]: | event after this is EVENT_SA_REPLACE
in 2362 seconds
Aug 5 07:41:49 mail pluto[27360]: | inserting event EVENT_PENDING_PHASE2,
timeout in 120 seconds
Aug 5 07:41:49 mail pluto[27360]: | pending review: connection "edelweiss"
checked
Aug 5 07:41:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug 5 07:43:49 mail pluto[27360]: |
Aug 5 07:43:49 mail pluto[27360]: | *time to handle event
Aug 5 07:43:49 mail pluto[27360]: | handling event EVENT_PENDING_PHASE2
Aug 5 07:43:49 mail pluto[27360]: | event after this is EVENT_SA_REPLACE
in 2242 seconds
Aug 5 07:43:49 mail pluto[27360]: | inserting event EVENT_PENDING_PHASE2,
timeout in 120 seconds
Aug 5 07:43:49 mail pluto[27360]: | pending review: connection "edelweiss"
checked
Aug 5 07:43:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug 5 07:45:49 mail pluto[27360]: |
Aug 5 07:45:49 mail pluto[27360]: | *time to handle event
Aug 5 07:45:49 mail pluto[27360]: | handling event EVENT_PENDING_PHASE2
Aug 5 07:45:49 mail pluto[27360]: | event after this is EVENT_SA_REPLACE
in 2122 seconds
Aug 5 07:45:49 mail pluto[27360]: | inserting event EVENT_PENDING_PHASE2,
timeout in 120 seconds
Aug 5 07:45:49 mail pluto[27360]: | pending review: connection "edelweiss"
checked
Aug 5 07:45:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug 5 07:47:49 mail pluto[27360]: |
Aug 5 07:47:49 mail pluto[27360]: | *time to handle event
Aug 5 07:47:49 mail pluto[27360]: | handling event EVENT_PENDING_PHASE2
Aug 5 07:47:49 mail pluto[27360]: | event after this is EVENT_SA_REPLACE
in 2002 seconds
Aug 5 07:47:49 mail pluto[27360]: | inserting event EVENT_PENDING_PHASE2,
timeout in 120 seconds
Aug 5 07:47:49 mail pluto[27360]: | pending review: connection "edelweiss"
checked
Aug 5 07:47:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug 5 07:48:19 mail pluto[27360]: |
Aug 5 07:48:19 mail pluto[27360]: | *received whack message
Aug 5 07:48:19 mail pluto[27360]: | kernel_alg_esp_enc_ok(3,0): alg_id=3,
alg_ivlen=8, alg_minbits=192, alg_maxbits=192, res=0, ret=1
Aug 5 07:48:19 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 90
seconds
Aug 5 07:49:49 mail pluto[27360]: |
Aug 5 07:49:49 mail pluto[27360]: | *time to handle event
Aug 5 07:49:49 mail pluto[27360]: | handling event EVENT_PENDING_PHASE2
Aug 5 07:49:49 mail pluto[27360]: | event after this is EVENT_SA_REPLACE
in 1882 seconds
Aug 5 07:49:49 mail pluto[27360]: | inserting event EVENT_PENDING_PHASE2,
timeout in 120 seconds
Aug 5 07:49:49 mail pluto[27360]: | pending review: connection "edelweiss"
checked
Aug 5 07:49:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug 5 07:51:49 mail pluto[27360]: |
Aug 5 07:51:49 mail pluto[27360]: | *time to handle event
Aug 5 07:51:49 mail pluto[27360]: | handling event EVENT_PENDING_PHASE2
Aug 5 07:51:49 mail pluto[27360]: | event after this is EVENT_SA_REPLACE
in 1762 seconds
Aug 5 07:51:49 mail pluto[27360]: | inserting event EVENT_PENDING_PHASE2,
timeout in 120 seconds
Aug 5 07:51:49 mail pluto[27360]: | pending review: connection "edelweiss"
checked
Aug 5 07:51:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug 5 07:53:49 mail pluto[27360]: |
Aug 5 07:53:49 mail pluto[27360]: | *time to handle event
Aug 5 07:53:49 mail pluto[27360]: | handling event EVENT_PENDING_PHASE2
Aug 5 07:53:49 mail pluto[27360]: | event after this is EVENT_SA_REPLACE
in 1642 seconds
Aug 5 07:53:49 mail pluto[27360]: | inserting event EVENT_PENDING_PHASE2,
timeout in 120 seconds
Aug 5 07:53:49 mail pluto[27360]: | pending review: connection "edelweiss"
checked
Aug 5 07:53:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug 5 07:55:49 mail pluto[27360]: |
Aug 5 07:55:49 mail pluto[27360]: | *time to handle event
Aug 5 07:55:49 mail pluto[27360]: | handling event EVENT_PENDING_PHASE2
Aug 5 07:55:49 mail pluto[27360]: | event after this is EVENT_SA_REPLACE
in 1522 seconds
Aug 5 07:55:49 mail pluto[27360]: | inserting event EVENT_PENDING_PHASE2,
timeout in 120 seconds
Aug 5 07:55:49 mail pluto[27360]: | pending review: connection "edelweiss"
checked
Aug 5 07:55:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug 5 07:57:49 mail pluto[27360]: |
Aug 5 07:57:49 mail pluto[27360]: | *time to handle event
Aug 5 07:57:49 mail pluto[27360]: | handling event EVENT_PENDING_PHASE2
Aug 5 07:57:49 mail pluto[27360]: | event after this is EVENT_SA_REPLACE
in 1402 seconds
Aug 5 07:57:49 mail pluto[27360]: | inserting event EVENT_PENDING_PHASE2,
timeout in 120 seconds
Aug 5 07:57:49 mail pluto[27360]: | pending review: connection "edelweiss"
checked
Aug 5 07:57:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug 5 07:59:06 mail pluto[27360]: |
Aug 5 07:59:06 mail pluto[27360]: | *received whack message
Aug 5 07:59:06 mail pluto[27360]: | kernel_alg_esp_enc_ok(3,0): alg_id=3,
alg_ivlen=8, alg_minbits=192, alg_maxbits=192, res=0, ret=1
Aug 5 07:59:06 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 43
seconds
Aug 5 07:59:06 mail pluto[27360]: |
Aug 5 07:59:06 mail pluto[27360]: | *received whack message
Aug 5 07:59:06 mail pluto[27360]: | kernel_alg_esp_enc_ok(3,0): alg_id=3,
alg_ivlen=8, alg_minbits=192, alg_maxbits=192, res=0, ret=1
Aug 5 07:59:06 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 43
seconds
Aug 5 07:59:06 mail pluto[27360]: |
Aug 5 07:59:06 mail pluto[27360]: | *received whack message
Aug 5 07:59:06 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 43
seconds
+ _________________________ date
+ date
Tue Aug 5 07:59:06 CEST 2008
More information about the Users
mailing list