e

From e, 2 Months ago, written in Plain Text, viewed 22 times. This paste will cross the great divide in 1 Second.
URL https://paste.elyograg.org/view/6b353b28 Embed
Download Paste or View Raw
  1. 23/01/19 10:26:06 ## : IKE Daemon, ver 2.2.2
  2. 23/01/19 10:26:06 ## : Copyright 2013 Shrew Soft Inc.
  3. 23/01/19 10:26:06 ## : This product linked OpenSSL 1.0.1c 10 May 2012
  4. 23/01/19 10:26:06 ii : opened 'C:\Program Files\ShrewSoft\VPN Client\debug\iked.log'
  5. 23/01/19 10:26:06 ii : rebuilding vnet device list ...
  6. 23/01/19 10:26:06 ii : device ROOT\VNET\0000 disabled
  7. 23/01/19 10:26:06 ii : network process thread begin ...
  8. 23/01/19 10:26:06 ii : pfkey process thread begin ...
  9. 23/01/19 10:26:06 ii : ipc server process thread begin ...
  10. 23/01/19 10:26:35 ii : ipc client process thread begin ...
  11. 23/01/19 10:26:35 <A : peer config add message
  12. 23/01/19 10:26:35 <A : proposal config message
  13. 23/01/19 10:26:35 <A : proposal config message
  14. 23/01/19 10:26:35 <A : client config message
  15. 23/01/19 10:26:35 <A : xauth username message
  16. 23/01/19 10:26:35 <A : xauth password message
  17. 23/01/19 10:26:35 <A : local id 'perfectsearchcolocvpn' message
  18. 23/01/19 10:26:36 <A : preshared key message
  19. 23/01/19 10:26:36 <A : remote resource message
  20. 23/01/19 10:26:36 <A : peer tunnel enable message
  21. 23/01/19 10:26:36 ii : local supports XAUTH
  22. 23/01/19 10:26:36 ii : local supports nat-t ( draft v00 )
  23. 23/01/19 10:26:36 ii : local supports nat-t ( draft v01 )
  24. 23/01/19 10:26:36 ii : local supports nat-t ( draft v02 )
  25. 23/01/19 10:26:36 ii : local supports nat-t ( draft v03 )
  26. 23/01/19 10:26:36 ii : local supports nat-t ( rfc )
  27. 23/01/19 10:26:36 ii : local supports FRAGMENTATION
  28. 23/01/19 10:26:36 ii : local supports DPDv1
  29. 23/01/19 10:26:36 ii : local is SHREW SOFT compatible
  30. 23/01/19 10:26:36 ii : local is NETSCREEN compatible
  31. 23/01/19 10:26:36 ii : local is SIDEWINDER compatible
  32. 23/01/19 10:26:36 ii : local is CISCO UNITY compatible
  33. 23/01/19 10:26:36 >= : cookies 95f033a6ea580157:0000000000000000
  34. 23/01/19 10:26:36 >= : message 00000000
  35. 23/01/19 10:26:36 ii : processing phase1 packet ( 444 bytes )
  36. 23/01/19 10:26:36 =< : cookies 95f033a6ea580157:e9933a7aa288b809
  37. 23/01/19 10:26:36 =< : message 00000000
  38. 23/01/19 10:26:36 ii : matched isakmp proposal #1 transform #2
  39. 23/01/19 10:26:36 ii : - transform    = ike
  40. 23/01/19 10:26:36 ii : - cipher type  = aes
  41. 23/01/19 10:26:36 ii : - key length   = 256 bits
  42. 23/01/19 10:26:36 ii : - hash type    = sha1
  43. 23/01/19 10:26:36 ii : - dh group     = group2 ( modp-1024 )
  44. 23/01/19 10:26:36 ii : - auth type    = xauth-initiator-psk
  45. 23/01/19 10:26:36 ii : - life seconds = 86400
  46. 23/01/19 10:26:36 ii : - life kbytes  = 0
  47. 23/01/19 10:26:36 ii : phase1 id match ( natt prevents ip match )
  48. 23/01/19 10:26:36 ii : received = ipv4-host 64.90.194.228
  49. 23/01/19 10:26:36 ii : peer is CISCO UNITY compatible
  50. 23/01/19 10:26:36 ii : peer supports XAUTH
  51. 23/01/19 10:26:36 ii : peer supports DPDv1
  52. 23/01/19 10:26:36 ii : peer supports nat-t ( rfc )
  53. 23/01/19 10:26:36 ii : nat discovery - local address is translated
  54. 23/01/19 10:26:36 ii : switching to src nat-t udp port 4500
  55. 23/01/19 10:26:36 ii : switching to dst nat-t udp port 4500
  56. 23/01/19 10:26:36 >= : cookies 95f033a6ea580157:e9933a7aa288b809
  57. 23/01/19 10:26:36 >= : message 00000000
  58. 23/01/19 10:26:36 ii : phase1 sa established
  59. 23/01/19 10:26:36 ii : 64.90.194.228:4500 <-> 10.10.8.223:4500
  60. 23/01/19 10:26:36 ii : 95f033a6ea580157:e9933a7aa288b809
  61. 23/01/19 10:26:36 ii : sending peer INITIAL-CONTACT notification
  62. 23/01/19 10:26:36 ii : - 10.10.8.223:4500 -> 64.90.194.228:4500
  63. 23/01/19 10:26:36 ii : - isakmp spi = 95f033a6ea580157:e9933a7aa288b809
  64. 23/01/19 10:26:36 ii : - data size 0
  65. 23/01/19 10:26:36 >= : cookies 95f033a6ea580157:e9933a7aa288b809
  66. 23/01/19 10:26:36 >= : message bb0e8c26
  67. 23/01/19 10:26:36 ii : processing config packet ( 76 bytes )
  68. 23/01/19 10:26:36 =< : cookies 95f033a6ea580157:e9933a7aa288b809
  69. 23/01/19 10:26:36 =< : message 19ce6de8
  70. 23/01/19 10:26:36 ii : - xauth authentication type
  71. 23/01/19 10:26:36 ii : - xauth username
  72. 23/01/19 10:26:36 ii : - xauth password
  73. 23/01/19 10:26:36 ii : received basic xauth request -
  74. 23/01/19 10:26:36 ii : - standard xauth username
  75. 23/01/19 10:26:36 ii : - standard xauth password
  76. 23/01/19 10:26:36 ii : sending xauth response for sheisey
  77. 23/01/19 10:26:36 >= : cookies 95f033a6ea580157:e9933a7aa288b809
  78. 23/01/19 10:26:36 >= : message 19ce6de8
  79. 23/01/19 10:26:36 ii : processing config packet ( 76 bytes )
  80. 23/01/19 10:26:36 =< : cookies 95f033a6ea580157:e9933a7aa288b809
  81. 23/01/19 10:26:36 =< : message 4b1d3704
  82. 23/01/19 10:26:36 ii : received xauth result -
  83. 23/01/19 10:26:36 ii : user sheisey authentication succeeded
  84. 23/01/19 10:26:36 ii : sending xauth acknowledge
  85. 23/01/19 10:26:36 >= : cookies 95f033a6ea580157:e9933a7aa288b809
  86. 23/01/19 10:26:36 >= : message 4b1d3704
  87. 23/01/19 10:26:36 ii : building config attribute list
  88. 23/01/19 10:26:36 ii : sending config pull request
  89. 23/01/19 10:26:36 >= : cookies 95f033a6ea580157:e9933a7aa288b809
  90. 23/01/19 10:26:36 >= : message 1a6792b6
  91. 23/01/19 10:26:36 ii : processing config packet ( 172 bytes )
  92. 23/01/19 10:26:36 =< : cookies 95f033a6ea580157:e9933a7aa288b809
  93. 23/01/19 10:26:36 =< : message 1a6792b6
  94. 23/01/19 10:26:36 ii : received config pull response
  95. 23/01/19 10:26:36 ii : creating NONE INBOUND policy ANY:64.90.194.228:* -> ANY:10.10.8.223:*
  96. 23/01/19 10:26:36 ii : creating NONE OUTBOUND policy ANY:10.10.8.223:* -> ANY:64.90.194.228:*
  97. 23/01/19 10:26:36 ii : created NONE policy route for 64.90.194.228/32
  98. 23/01/19 10:26:36 ii : creating NONE INBOUND policy ANY:10.10.10.1:* -> ANY:10.20.25.144:*
  99. 23/01/19 10:26:36 ii : creating NONE OUTBOUND policy ANY:10.20.25.144:* -> ANY:10.10.10.1:*
  100. 23/01/19 10:26:36 ii : creating IPSEC INBOUND policy ANY:10.20.20.0/24:* -> ANY:10.20.25.144:*
  101. 23/01/19 10:26:36 ii : creating IPSEC OUTBOUND policy ANY:10.20.25.144:* -> ANY:10.20.20.0/24:*
  102. 23/01/19 10:26:36 ii : created IPSEC policy route for 10.20.20.0/24
  103. 23/01/19 10:26:36 >= : cookies 95f033a6ea580157:e9933a7aa288b809
  104. 23/01/19 10:26:36 >= : message 3fa7f8fb
  105. 23/01/19 10:26:36 ii : split DNS is disabled
  106. 23/01/19 10:26:41 -> : resend 1 phase2 packet(s) [0/2] 10.10.8.223:4500 -> 64.90.194.228:4500
  107. 23/01/19 10:26:44 ii : processing config packet ( 172 bytes )
  108. 23/01/19 10:26:44 !! : config packet ignored ( config already mature )
  109. 23/01/19 10:26:46 -> : resend 1 phase2 packet(s) [1/2] 10.10.8.223:4500 -> 64.90.194.228:4500
  110. 23/01/19 10:26:51 ii : sending peer DPDV1-R-U-THERE notification
  111. 23/01/19 10:26:51 ii : - 10.10.8.223:4500 -> 64.90.194.228:4500
  112. 23/01/19 10:26:51 ii : - isakmp spi = 95f033a6ea580157:e9933a7aa288b809
  113. 23/01/19 10:26:51 ii : - data size 4
  114. 23/01/19 10:26:51 >= : cookies 95f033a6ea580157:e9933a7aa288b809
  115. 23/01/19 10:26:51 >= : message 2d1bb9fd
  116. 23/01/19 10:26:51 -> : resend 1 phase2 packet(s) [2/2] 10.10.8.223:4500 -> 64.90.194.228:4500
  117. 23/01/19 10:26:52 ii : processing config packet ( 172 bytes )
  118. 23/01/19 10:26:52 !! : config packet ignored ( config already mature )
  119. 23/01/19 10:26:56 ii : resend limit exceeded for phase2 exchange
  120. 23/01/19 10:26:56 ii : phase2 removal before expire time
  121. 23/01/19 10:27:00 ii : processing config packet ( 172 bytes )
  122. 23/01/19 10:27:00 !! : config packet ignored ( config already mature )
  123. 23/01/19 10:27:06 ii : sending peer DPDV1-R-U-THERE notification
  124. 23/01/19 10:27:06 ii : - 10.10.8.223:4500 -> 64.90.194.228:4500
  125. 23/01/19 10:27:06 ii : - isakmp spi = 95f033a6ea580157:e9933a7aa288b809
  126. 23/01/19 10:27:06 ii : - data size 4
  127. 23/01/19 10:27:06 >= : cookies 95f033a6ea580157:e9933a7aa288b809
  128. 23/01/19 10:27:06 >= : message 6c7d505c
  129. 23/01/19 10:27:08 ii : processing informational packet ( 92 bytes )
  130. 23/01/19 10:27:08 =< : cookies 95f033a6ea580157:e9933a7aa288b809
  131. 23/01/19 10:27:08 =< : message fcb392d9
  132. 23/01/19 10:27:08 ii : received peer DELETE message
  133. 23/01/19 10:27:08 ii : - 64.90.194.228:4500 -> 10.10.8.223:4500
  134. 23/01/19 10:27:08 ii : - isakmp spi = 95f033a6ea580157:e9933a7aa288b809
  135. 23/01/19 10:27:08 ii : cleanup, marked phase1 95f033a6ea580157:e9933a7aa288b809 for removal
  136. 23/01/19 10:27:08 ii : phase1 removal before expire time
  137. 23/01/19 10:27:08 ii : removing IPSEC INBOUND policy ANY:10.20.20.0/24:* -> ANY:10.20.25.144:*
  138. 23/01/19 10:27:08 ii : removing IPSEC OUTBOUND policy ANY:10.20.25.144:* -> ANY:10.20.20.0/24:*
  139. 23/01/19 10:27:08 ii : removed IPSEC policy route for ANY:10.20.20.0/24:*
  140. 23/01/19 10:27:08 ii : removing NONE INBOUND policy ANY:10.10.10.1:* -> ANY:10.20.25.144:*
  141. 23/01/19 10:27:08 ii : removing NONE OUTBOUND policy ANY:10.20.25.144:* -> ANY:10.10.10.1:*
  142. 23/01/19 10:27:08 ii : removing NONE INBOUND policy ANY:64.90.194.228:* -> ANY:10.10.8.223:*
  143. 23/01/19 10:27:08 ii : removing NONE OUTBOUND policy ANY:10.10.8.223:* -> ANY:64.90.194.228:*
  144. 23/01/19 10:27:08 ii : removed NONE policy route for ANY:64.90.194.228:*
  145. 23/01/19 10:27:08 DB : removing tunnel config references
  146. 23/01/19 10:27:08 DB : removing tunnel phase2 references
  147. 23/01/19 10:27:08 DB : removing tunnel phase1 references
  148. 23/01/19 10:27:08 DB : removing all peer tunnel references
  149. 23/01/19 10:27:08 ii : ipc client process thread exit ...
  150.  

Reply to "e"

Here you can reply to the paste above