Untitled

 avatar
unknown
plain_text
2 months ago
4.2 kB
4
Indexable
Dec 22 22:06:57 mx charon-nm: 00[DMN] Starting charon NetworkManager backend (strongSwan 5.9.1)
Dec 22 22:06:57 mx kernel: [11050.259320] alg: No test for xcbc(camellia) (xcbc(camellia-asm))
Dec 22 22:06:57 mx kernel: [11050.291802] alg: No test for rfc3686(ctr(camellia)) (rfc3686(ctr-camellia-aesni-avx2))
Dec 22 22:06:57 mx kernel: [11050.499149] Initializing XFRM netlink socket
Dec 22 22:06:57 mx charon-nm: 00[LIB] loaded plugins: nm-backend charon-nm ldap pkcs11 tpm aes rc2 sha2 sha1 md5 mgf1 rdrand random nonce x509 revocation constraints pkcs1 pkcs7 pkcs8 sshkey pem gcrypt af-alg fips-prf gmp curve25519 chapoly xcbc cmac hmac ctr ccm drbg curl kernel-netlink socket-default bypass-lan eap-identity eap-md5 eap-gtc eap-tls eap-ttls
Dec 22 22:06:57 mx charon-nm: 00[LIB] dropped capabilities, running as uid 0, gid 0
Dec 22 22:06:57 mx charon-nm: 00[JOB] spawning 16 worker threads
Dec 22 22:06:57 mx charon-nm: 06[IKE] installed bypass policy for 192.168.0.0/24
Dec 22 22:06:57 mx charon-nm: 06[IKE] installed bypass policy for 2a02:8109:8889:db00:1519:9591:5fd0:61e3/128
Dec 22 22:06:57 mx charon-nm: 06[IKE] installed bypass policy for 2a02:8109:8889:db00:a33d:b4e0:93c5:8ed8/128
Dec 22 22:06:57 mx charon-nm: 06[IKE] installed bypass policy for 2a02:8109:8889:db00::/64
Dec 22 22:06:57 mx charon-nm: 06[IKE] installed bypass policy for fe80::/64
Dec 22 22:06:57 mx charon-nm: 06[IKE] interface change for bypass policy for 192.168.0.0/24 (from eth0 to wlan0)
Dec 22 22:06:57 mx charon-nm: 06[IKE] interface change for bypass policy for 2a02:8109:8889:db00::/64 (from eth0 to wlan0)
Dec 22 22:06:57 mx charon-nm: 06[IKE] interface change for bypass policy for fe80::/64 (from eth0 to wlan0)
Dec 22 22:06:57 mx charon-nm: 05[CFG] received initiate for NetworkManager connection VPN_UAM_checkpoint
Dec 22 22:06:57 mx charon-nm: 05[CFG] using gateway identity 'O=oi01vpnms.amunet.mikoax, CN=oivpn VPN Certificate'
Dec 22 22:06:57 mx charon-nm: 05[IKE] initiating IKE_SA VPN_UAM_checkpoint[1] to 150.254.116.20
Dec 22 22:06:57 mx charon-nm: 05[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Dec 22 22:06:57 mx charon-nm: 05[NET] sending packet: from 192.168.0.8[56560] to 150.254.116.20[500] (336 bytes)
Dec 22 22:06:58 mx charon-nm: 16[NET] received packet: from 150.254.116.20[500] to 192.168.0.8[56560] (345 bytes)
Dec 22 22:06:58 mx charon-nm: 16[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_S_IP) N(NATD_D_IP) CERTREQ ]
Dec 22 22:06:58 mx charon-nm: 16[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 22 22:06:58 mx charon-nm: 16[IKE] local host is behind NAT, sending keep alives
Dec 22 22:06:58 mx charon-nm: 16[IKE] received 1 cert requests for an unknown ca
Dec 22 22:06:58 mx charon-nm: 16[IKE] establishing CHILD_SA VPN_UAM_checkpoint{1}
Dec 22 22:06:58 mx charon-nm: 16[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr CPRQ(ADDR ADDR6 DNS NBNS DNS6) SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_6_ADDR) N(ADD_6_ADDR) N(ADD_6_ADDR) N(ADD_6_ADDR) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Dec 22 22:06:58 mx charon-nm: 16[NET] sending packet: from 192.168.0.8[55442] to 150.254.116.20[4500] (508 bytes)
Dec 22 22:07:02 mx charon-nm: 12[IKE] retransmit 1 of request with message ID 1
Dec 22 22:07:02 mx charon-nm: 12[NET] sending packet: from 192.168.0.8[55442] to 150.254.116.20[4500] (508 bytes)
Dec 22 22:07:09 mx charon-nm: 08[IKE] retransmit 2 of request with message ID 1
Dec 22 22:07:09 mx charon-nm: 08[NET] sending packet: from 192.168.0.8[55442] to 150.254.116.20[4500] (508 bytes)
Dec 22 22:07:22 mx charon-nm: 06[IKE] retransmit 3 of request with message ID 1
Dec 22 22:07:22 mx charon-nm: 06[NET] sending packet: from 192.168.0.8[55442] to 150.254.116.20[4500] (508 bytes)
Dec 22 22:07:42 mx charon-nm: 12[IKE] sending keep alive to 150.254.116.20[4500]
Dec 22 22:07:45 mx charon-nm: 14[IKE] retransmit 4 of request with message ID 1
Dec 22 22:07:45 mx charon-nm: 14[NET] sending packet: from 192.168.0.8[55442] to 150.254.116.20[4500] (508 bytes)
Dec 22 22:07:58 mx charon-nm: 16[IKE] destroying IKE_SA in state CONNECTING without notification
Leave a Comment