Академический Документы
Профессиональный Документы
Культура Документы
te STATE_MAIN_I2
Apr 18 09:48:49 pluto[31891]: "1" #2: STATE_MAIN_I2: sent MI2, expecting MR2
Apr 18 09:48:49 pluto[31891]: "1": terminating SAs using this connection
Apr 18 09:48:49 pluto[31891]: "1" #2: deleting state (STATE_MAIN_I2)
Apr 18 09:48:49 pluto[31891]: packet from 115.118.161.182:500: phase 1 message i
s part of an unknown exchange
Apr 18 09:48:53 root: Auto-Reconnect for IPSec tunnel 1 ...
Apr 18 09:48:53 pluto[31891]: "1": deleting connection
Apr 18 09:48:53 pluto[31891]: added connection description "1"
Apr 18 09:48:53 pluto[31891]: forgetting secrets
Apr 18 09:48:53 pluto[31891]: loading secrets from "/etc/ipsec.secrets"
Apr 18 09:48:53 pluto[31891]: "1" #3: initiating Main Mode
Apr 18 09:48:53 pluto[31891]: "1" #3: received Vendor ID payload [Dead Peer Dete
ction]
Apr 18 09:48:53 pluto[31891]: "1" #3: transition from state STATE_MAIN_I1 to sta
te STATE_MAIN_I2
Apr 18 09:48:53 pluto[31891]: "1" #3: STATE_MAIN_I2: sent MI2, expecting MR2
Apr 18 09:48:53 pluto[31891]: "1" #3: transition from state STATE_MAIN_I2 to sta
te STATE_MAIN_I3
Apr 18 09:48:53 pluto[31891]: "1" #3: STATE_MAIN_I3: sent MI3, expecting MR3
Apr 18 09:48:53 pluto[31891]: "1" #3: Main mode peer ID is ID_IPV4_ADDR: '115.11
8.161.182'
Apr 18 09:48:53 pluto[31891]: "1" #3: transition from state STATE_MAIN_I3 to sta
te STATE_MAIN_I4
Apr 18 09:48:53 pluto[31891]: "1" #3: STATE_MAIN_I4: ISAKMP SA established {auth
=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1024}
Apr 18 09:48:53 pluto[31891]: "1" #4: initiating Quick Mode PSK+ENCRYPT+TUNNEL+P
FS+UP {using isakmp#3 msgid:1e7ed90e proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OA
KLEY_GROUP_MODP1024}
Apr 18 09:48:54 pluto[31891]: "1" #4: up-client output: /lib/ipsec/_updown.klips
: changesource `ip route change 172.18.79.0/24 dev ipsec0 src 172.18.91.6' faile
d (RTNETLINK answers: No such file or directory)
Apr 18 09:48:54 pluto[31891]: "1" #4: up-client output: iptables: No chain/targe
t/match by that name
Apr 18 09:48:54 pluto[31891]: "1" #4: up-client output: iptables: No chain/targe
t/match by that name
Apr 18 09:48:55 pluto[31891]: "1" #4: transition from state STATE_QUICK_I1 to st
ate STATE_QUICK_I2
Apr 18 09:48:55 pluto[31891]: "1" #4: STATE_QUICK_I2: sent QI2, IPsec SA establi
shed tunnel mode {ESP=>0x1466775a <0x06841260 xfrm=3DES_0-HMAC_MD5 NATOA=none NA
TD=none DPD=none}
Apr 18 09:48:59 pluto[31891]: packet from 115.118.161.182:500: phase 1 message i
s part of an unknown exchange
Apr 18 09:49:19 pluto[31891]: packet from 115.118.161.182:500: phase 1 message i
s part of an unknown exchange
Apr 18 09:52:31 login[2508]: root login on 'pts/0'
Apr 18 09:53:39 csman: img_len 422, sector_addr ,7f0000 ,sector_size 1000
Apr 18 09:55:20 login[4577]: root login on 'pts/1'
#
#
#
#
# route
Kernel IP routing table
Destination
Gateway
Genmask
Flags Metric Ref
Use Iface
172.29.145.65 *
255.255.255.255 UH
0
0
0 ppp0
172.29.145.65 *
255.255.255.255 UH
0
0
0 ipsec0
224.0.1.178
*
255.255.255.255 UH
0
0
0 br0
172.18.79.0
*
255.255.255.0 U
0
0
0 ipsec0
172.18.91.0
*
255.255.255.0 U
0
0
0 br0
172.18.91.0
*
255.255.255.0 U
0
224.0.0.0
*
240.0.0.0
U
0
default
172.29.145.65 0.0.0.0
UG
0
#
#
# # route
# Kernel IP routing table
-ash: Kernel: not found
# Destination
Gateway
Genmask
Flags
-ash: Destination: not found
# 172.29.145.65 *
255.255.255.255 UH
-ash: 172.29.145.65: not found
# 172.29.145.65 *
255.255.255.255 UH
-ash: 172.29.145.65: not found
# 224.0.1.178
*
255.255.255.255 UH
-ash: 224.0.1.178: not found
# 172.18.79.0
*
255.255.255.0 U
-ash: 172.18.79.0: not found
# 172.18.91.0
*
255.255.255.0 U
-ash: 172.18.91.0: not found
# 172.18.91.0
*
255.255.255.0 U
-ash: 172.18.91.0: not found
# 224.0.0.0
*
240.0.0.0
U
-ash: 224.0.0.0: not found
# default
172.29.145.65 0.0.0.0
UG
0
0
0
0 ipsec0
0 br0
0 ppp0
Metric Ref
Use Iface
0 ppp0
0 ipsec0
0 br0
0 ipsec0
0 br0
0 ipsec0
0 br0
0 ppp0
no acc
no acc
no acc
no acc
te STATE_MAIN_I2
Apr 18 09:48:53 pluto[31891]: "1" #3: STATE_MAIN_I2: sent MI2, expecting MR2
Apr 18 09:48:53 pluto[31891]: "1" #3: transition from state STATE_MAIN_I2 to sta
te STATE_MAIN_I3
Apr 18 09:48:53 pluto[31891]: "1" #3: STATE_MAIN_I3: sent MI3, expecting MR3
Apr 18 09:48:53 pluto[31891]: "1" #3: Main mode peer ID is ID_IPV4_ADDR: '115.11
8.161.182'
Apr 18 09:48:53 pluto[31891]: "1" #3: transition from state STATE_MAIN_I3 to sta
te STATE_MAIN_I4
Apr 18 09:48:53 pluto[31891]: "1" #3: STATE_MAIN_I4: ISAKMP SA established {auth
=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1024}
Apr 18 09:48:53 pluto[31891]: "1" #4: initiating Quick Mode PSK+ENCRYPT+TUNNEL+P
FS+UP {using isakmp#3 msgid:1e7ed90e proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OA
KLEY_GROUP_MODP1024}
Apr 18 09:48:54 pluto[31891]: "1" #4: up-client output: /lib/ipsec/_updown.klips
: changesource `ip route change 172.18.79.0/24 dev ipsec0 src 172.18.91.6' faile
d (RTNETLINK answers: No such file or directory)
Apr 18 09:48:54 pluto[31891]: "1" #4: up-client output: iptables: No chain/targe
t/match by that name
Apr 18 09:48:54 pluto[31891]: "1" #4: up-client output: iptables: No chain/targe
t/match by that name
Apr 18 09:48:55 pluto[31891]: "1" #4: transition from state STATE_QUICK_I1 to st
ate STATE_QUICK_I2
Apr 18 09:48:55 pluto[31891]: "1" #4: STATE_QUICK_I2: sent QI2, IPsec SA establi
shed tunnel mode {ESP=>0x1466775a <0x06841260 xfrm=3DES_0-HMAC_MD5 NATOA=none NA
TD=none DPD=none}
Apr 18 09:48:59 pluto[31891]: packet from 115.118.161.182:500: phase 1 message i
s part of an unknown exchange
Apr 18 09:49:19 pluto[31891]: packet from 115.118.161.182:500: phase 1 message i
s part of an unknown exchange
Apr 18 09:52:31 login[2508]: root login on 'pts/0'
Apr 18 09:53:39 csman: img_len 422, sector_addr ,7f0000 ,sector_size 1000
Apr 18 09:55:20 login[4577]: root login on 'pts/1'
#
#
#
#
# route
Kernel IP routing table
Destination
Gateway
Genmask
Flags Metric Ref
Use Iface
172.29.145.65 *
255.255.255.255 UH
0
0
0 ppp0
172.29.145.65 *
255.255.255.255 UH
0
0
0 ipsec0
224.0.1.178
*
255.255.255.255 UH
0
0
0 br0
172.18.79.0
*
255.255.255.0 U
0
0
0 ipsec0
172.18.91.0
*
255.255.255.0 U
0
0
0 br0
172.18.91.0
*
255.255.255.0 U
0
0
0 ipsec0
224.0.0.0
*
240.0.0.0
U
0
0
0 br0
default
172.29.145.65 0.0.0.0
UG
0
0
0 ppp0
#
#
#