faq обучение настройка
Текущее время: Ср июл 16, 2025 15:22

Часовой пояс: UTC + 3 часа




Начать новую тему Ответить на тему  [ Сообщений: 22 ]  На страницу Пред.  1, 2
Автор Сообщение
 Заголовок сообщения: Re: MS TMG 2010 (IPSec Srv) <-- ipsec tunnel--> DLink DSL-26
СообщениеДобавлено: Пн июн 20, 2011 12:21 
Не в сети

Зарегистрирован: Пт май 20, 2011 18:21
Сообщений: 13
На каких моделях Annex А я могу проверить ?


Вернуться наверх
 Профиль  
 
 Заголовок сообщения: Re: MS TMG 2010 (IPSec Srv) <-- ipsec tunnel--> DLink DSL-26
СообщениеДобавлено: Пн июн 20, 2011 12:50 
Не в сети
Сотрудник D-LINK
Сотрудник D-LINK

Зарегистрирован: Вт мар 01, 2011 22:06
Сообщений: 2025
netspysv писал(а):
На каких моделях Annex А я могу проверить ?


Dsl-2640/C1 или С2, dsl-G804V


Вернуться наверх
 Профиль  
 
 Заголовок сообщения: Re: MS TMG 2010 (IPSec Srv) <-- ipsec tunnel--> DLink DSL-26
СообщениеДобавлено: Ср июн 29, 2011 13:00 
Не в сети

Зарегистрирован: Пт май 20, 2011 18:21
Сообщений: 13
С моделью DLink DSL-2640U BRU\CS(C2) FW 2.05 абсолютно аналогичные проблемы (


Вернуться наверх
 Профиль  
 
 Заголовок сообщения: Re: MS TMG 2010 (IPSec Srv) <-- ipsec tunnel--> DLink DSL-26
СообщениеДобавлено: Ср июн 29, 2011 15:50 
Не в сети

Зарегистрирован: Пт май 20, 2011 18:21
Сообщений: 13
Вот еще доп. информация со стороны TMG в логах

Код:
Имя журнала:   Security
Источник:      Microsoft-Windows-Security-Auditing
Дата:          29.06.2011 15:35:24
Код события:   4650
Категория задачи:Основной режим IPsec
Уровень:       Сведения
Ключевые слова:Аудит успеха
Пользователь:  Н/Д
Компьютер:     GW01.domain.local
Описание:
Установлено сопоставление безопасности основного режима IPsec. Расширенный режим не был включен.  Проверка подлинности с помощью сертификата не применялась.
Локальная конечная точка:
 Имя участника: -
 Сетевой адрес: 212.98.165.#
 Порт модуля ключей: 500
Удаленная конечная точка:
 Имя участника: -
 Сетевой адрес: 80.249.83.#
 Порт модуля ключей: 500
Сведения о сопоставлении безопасности:
 Время жизни (в минутах): 120
 Предел быстрого режима: 0
 Код SA основного режима: 22
Криптографические сведения:
 Алгоритм шифрования: 3DES
 Алгоритм целостности: SHA1
 Группа Диффи-Хелмана: DH-группа 2
Дополнительные сведения:
 Имя модуля ключей: IKEv1
 Метод проверки подлинности: Предварительный ключ
 Роль: Инициатор
 Состояние олицетворения: Не включено
 Код фильтра основного режима: 92332


Код:
Имя журнала:   Security
Источник:      Microsoft-Windows-Security-Auditing
Дата:          29.06.2011 15:36:27
Код события:   4655
Категория задачи:Основной режим IPsec
Уровень:       Сведения
Ключевые слова:Аудит успеха
Пользователь:  Н/Д
Компьютер:     GW03.domain.local
Описание:
Сопоставление безопасности основного режима IPsec завершено.
Локальный сетевой адрес:  212.98.165.#
Удаленный сетевой адрес: 80.249.83.#
Имя модуля ключей:  IKEv1
Код SA основного режима:  22


Код:
Имя журнала:   Security
Источник:      Microsoft-Windows-Security-Auditing
Дата:          29.06.2011 15:36:27
Код события:   4654
Категория задачи:Быстрый режим IPsec
Уровень:       Сведения
Ключевые слова:Аудит отказа
Пользователь:  Н/Д
Компьютер:     GW03.domain.local
Описание:
Сбой согласования быстрого режима IPsec.
Локальная конечная точка:
 Сетевой адрес: 212.98.165.#
 Маска сетевого адреса: 0.0.0.0
 Порт:   0
 Конечная точка туннеля:  212.98.165.#
Удаленная конечная точка:
 Сетевой адрес: 192.168.1.2
 Маска адреса:  255.255.255.254
 Порт:   0
 Конечная точка туннеля:  80.249.83.#
 Частный адрес:  0.0.0.0
Дополнительные сведения:
 Протокол:  0
 Имя модуля ключей: IKEv1
 Код туннеля виртуального интерфейса: 0
 Код селектора трафика: 0
 Режим:   Туннель
 Роль:   Инициатор
 Код фильтра быстрого режима: 92201
 Код SA основного режима: 22
Сведения об ошибке:
 Состояние:   Отправленные первые полезные данные (SA)
 Код сообщения:  1
 Точка ошибки:  локальный компьютер
 Причина ошибки:  Вероятно, SA основного режима недопустимо, поскольку другой участник соединения не отвечает.


Вернуться наверх
 Профиль  
 
 Заголовок сообщения: Re: MS TMG 2010 (IPSec Srv) <-- ipsec tunnel--> DLink DSL-26
СообщениеДобавлено: Ср июн 29, 2011 16:27 
Не в сети

Зарегистрирован: Пт май 20, 2011 18:21
Сообщений: 13
И еще более детальный лог со стороны 2640U

Код:
# setkey -f /var/setkey.conf
# racoon -F -v -d -f /var/racoon.conf
Foreground mode.
2011-06-29 16:01:39: INFO: @(#)ipsec-tools 0.5.1 (http://ipsec-tools.sourceforge.net)
2011-06-29 16:01:39: INFO: @(#)This product linked OpenSSL 0.9.7f 22 Mar 2005 (http://www.openssl.org/)
2011-06-29 16:01:39: DEBUG: call pfkey_send_register for AH
2011-06-29 16:01:39: DEBUG: call pfkey_send_register for ESP
2011-06-29 16:01:39: DEBUG: call pfkey_send_register for IPCOMP
2011-06-29 16:01:39: DEBUG: reading config file /var/racoon.conf
2011-06-29 16:01:39: DEBUG: compression algorithm can not be checked because sadb message doesn't support it.
2011-06-29 16:01:39: DEBUG: my interface: 80.249.83.# (ppp_0_0_35_1)
2011-06-29 16:01:39: DEBUG: my interface: 192.168.1.1 (br0)
2011-06-29 16:01:39: DEBUG: my interface: 127.0.0.1 (lo)
2011-06-29 16:01:39: DEBUG: configuring default isakmp port.
2011-06-29 16:01:39: DEBUG: 3 addrs are configured successfully
2011-06-29 16:01:39: INFO: 127.0.0.1[500] used as isakmp port (fd=5)
2011-06-29 16:01:39: INFO: 127.0.0.1[500] used for NAT-T
2011-06-29 16:01:39: INFO: 192.168.1.1[500] used as isakmp port (fd=6)
2011-06-29 16:01:39: INFO: 192.168.1.1[500] used for NAT-T
2011-06-29 16:01:39: INFO: 80.249.83.#[500] used as isakmp port (fd=7)
2011-06-29 16:01:39: INFO: 80.249.83.#[500] used for NAT-T
2011-06-29 16:01:39: DEBUG: get pfkey X_SPDDUMP message
2011-06-29 16:01:39: DEBUG: get pfkey X_SPDDUMP message
2011-06-29 16:01:39: DEBUG: sub:0x7fff6ab0: 192.168.1.0/24[0] 10.10.10.0/24[0] proto=any dir=out
2011-06-29 16:01:39: DEBUG: db :0x10009630: 10.10.10.0/24[0] 192.168.1.0/24[0] proto=any dir=in
2011-06-29 16:01:39: DEBUG: get pfkey X_SPDDUMP message
2011-06-29 16:01:40: DEBUG: sub:0x7fff6ab0: 10.10.10.0/24[0] 192.168.1.0/24[0] proto=any dir=fwd
2011-06-29 16:01:40: DEBUG: db :0x10009630: 10.10.10.0/24[0] 192.168.1.0/24[0] proto=any dir=in
2011-06-29 16:01:40: DEBUG: sub:0x7fff6ab0: 10.10.10.0/24[0] 192.168.1.0/24[0] proto=any dir=fwd
2011-06-29 16:01:40: DEBUG: db :0x10009d58: 192.168.1.0/24[0] 10.10.10.0/24[0] proto=any dir=out
2011-06-29 16:03:04: DEBUG: ===
2011-06-29 16:03:04: DEBUG: 228 bytes message received from 212.98.165.#[500] to 80.249.83.#[500]
2011-06-29 16:03:04: DEBUG:
c3386e16 dc3a9448 00000000 00000000 01100200 00000000 000000e4 0d000038
00000001 00000001 0000002c 01010001 00000024 01010000 80010005 80020002
80040002 80030001 800b0001 000c0004 00001c20 0d000018 1e2b5169 05991c7d
7c96fcbf b587e461 00000008 0d000014 4a131c81 07035845 5c5728f2 0e95452f
0d000014 90cb8091 3ebb696e 086381b5 ec427b1f 0d000014 4048b7d5 6ebce885
25e7de7f 00d6c2d3 0d000014 fb1de3cd f341b7ea 16b7e5be 0855f120 0d000014
26244d38 eddb61b3 172a36e3 d0cfb819 00000014 e3a5966a 76379fe7 07228231
e5ce8652
2011-06-29 16:03:04: DEBUG: configuration found for 212.98.165.#.
2011-06-29 16:03:04: DEBUG: ===
2011-06-29 16:03:04: INFO: respond new phase 1 negotiation: 80.249.83.#[500]<=>212.98.165.#[500]
2011-06-29 16:03:04: INFO: begin Identity Protection mode.
2011-06-29 16:03:04: DEBUG: begin.
2011-06-29 16:03:04: DEBUG: seen nptype=1(sa)
2011-06-29 16:03:04: DEBUG: seen nptype=13(vid)
2011-06-29 16:03:04: DEBUG: seen nptype=13(vid)
2011-06-29 16:03:04: DEBUG: seen nptype=13(vid)
2011-06-29 16:03:04: DEBUG: seen nptype=13(vid)
2011-06-29 16:03:04: DEBUG: seen nptype=13(vid)
2011-06-29 16:03:04: DEBUG: seen nptype=13(vid)
2011-06-29 16:03:04: DEBUG: seen nptype=13(vid)
2011-06-29 16:03:04: DEBUG: succeed.
2011-06-29 16:03:04: INFO: received broken Microsoft ID: MS NT5 ISAKMPOAKLEY
2011-06-29 16:03:04: INFO: received Vendor ID: RFC 3947
2011-06-29 16:03:04: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02

2011-06-29 16:03:04: INFO: received Vendor ID: FRAGMENTATION
2011-06-29 16:03:04: DEBUG: received unknown Vendor ID
2011-06-29 16:03:04: DEBUG: received unknown Vendor ID
2011-06-29 16:03:04: DEBUG: received unknown Vendor ID
2011-06-29 16:03:04: DEBUG: total SA len=52
2011-06-29 16:03:04: DEBUG:
00000001 00000001 0000002c 01010001 00000024 01010000 80010005 80020002
80040002 80030001 800b0001 000c0004 00001c20
2011-06-29 16:03:04: DEBUG: begin.
2011-06-29 16:03:04: DEBUG: seen nptype=2(prop)
2011-06-29 16:03:04: DEBUG: succeed.
2011-06-29 16:03:04: DEBUG: proposal #1 len=44
2011-06-29 16:03:04: DEBUG: begin.
2011-06-29 16:03:04: DEBUG: seen nptype=3(trns)
2011-06-29 16:03:04: DEBUG: succeed.
2011-06-29 16:03:04: DEBUG: transform #1 len=36
2011-06-29 16:03:04: DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
2011-06-29 16:03:04: DEBUG: encryption(3des)
2011-06-29 16:03:04: DEBUG: type=Hash Algorithm, flag=0x8000, lorv=SHA
2011-06-29 16:03:04: DEBUG: hash(sha1)
2011-06-29 16:03:04: DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group
2011-06-29 16:03:04: DEBUG: hmac(modp1024)
2011-06-29 16:03:04: DEBUG: type=Authentication Method, flag=0x8000, lorv=pre-shared key
2011-06-29 16:03:04: DEBUG: type=Life Type, flag=0x8000, lorv=seconds
2011-06-29 16:03:04: DEBUG: type=Life Duration, flag=0x0000, lorv=4
2011-06-29 16:03:04: DEBUG: pair 1:
2011-06-29 16:03:04: DEBUG:  0x100098e8: next=(nil) tnext=(nil)
2011-06-29 16:03:04: DEBUG: proposal #1: 1 transform
2011-06-29 16:03:04: DEBUG: prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1
2011-06-29 16:03:04: DEBUG: trns#=1, trns-id=IKE
2011-06-29 16:03:04: DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
2011-06-29 16:03:04: DEBUG: type=Hash Algorithm, flag=0x8000, lorv=SHA
2011-06-29 16:03:04: DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group
2011-06-29 16:03:04: DEBUG: type=Authentication Method, flag=0x8000, lorv=pre-shared key
2011-06-29 16:03:04: DEBUG: type=Life Type, flag=0x8000, lorv=seconds
2011-06-29 16:03:04: DEBUG: type=Life Duration, flag=0x0000, lorv=4
2011-06-29 16:03:04: DEBUG: Compared: DB:Peer
2011-06-29 16:03:04: DEBUG: (lifetime = 28800:7200)
2011-06-29 16:03:04: DEBUG: (lifebyte = 0:0)
2011-06-29 16:03:04: DEBUG: enctype = 3DES-CBC:3DES-CBC
2011-06-29 16:03:04: DEBUG: (encklen = 0:0)
2011-06-29 16:03:04: DEBUG: hashtype = SHA:SHA
2011-06-29 16:03:04: DEBUG: authmethod = pre-shared key:pre-shared key
2011-06-29 16:03:04: DEBUG: dh_group = 1024-bit MODP group:1024-bit MODP group
2011-06-29 16:03:04: DEBUG: an acceptable proposal found.
2011-06-29 16:03:04: DEBUG: hmac(modp1024)
2011-06-29 16:03:04: DEBUG: new cookie:
373b0b5f08532969
2011-06-29 16:03:04: DEBUG: add payload of len 52, next type 0
2011-06-29 16:03:04: DEBUG: 84 bytes from 80.249.83.#[500] to 212.98.165.#[500]
2011-06-29 16:03:04: DEBUG: sockname 80.249.83.#[500]
2011-06-29 16:03:04: DEBUG: send packet from 80.249.83.#[500]
2011-06-29 16:03:04: DEBUG: send packet to 212.98.165.#[500]
2011-06-29 16:03:04: DEBUG: src4 80.249.83.#[500]
2011-06-29 16:03:04: DEBUG: dst4 212.98.165.#[500]
2011-06-29 16:03:04: DEBUG: 1 times of 84 bytes message will be sent to 212.98.165.#[500]
2011-06-29 16:03:04: DEBUG:
c3386e16 dc3a9448 373b0b5f 08532969 01100200 00000000 00000054 00000038
00000001 00000001 0000002c 01010001 00000024 01010000 80010005 80020002
80040002 80030001 800b0001 000c0004 00001c20
2011-06-29 16:03:04: DEBUG: resend phase1 packet c3386e16dc3a9448:373b0b5f08532969
2011-06-29 16:03:04: DEBUG: ===
2011-06-29 16:03:04: DEBUG: 212 bytes message received from 212.98.165.#[500] to 80.249.83.#[500]
2011-06-29 16:03:04: DEBUG:
c3386e16 dc3a9448 373b0b5f 08532969 04100200 00000000 000000d4 0a000084
112cd259 52a58e53 cec7187f 17e0376c 419f9387 a4eb6007 26105145 8f1a5a14
ff658f02 94810d42 bd8dd4ef a3aafccf c1695372 3efa9c84 1191a22d ce898bc2
b288f2c2 4ff1f2db 60ed8dfe 0f919f8e f8ecb144 cc460828 d2d482fd e7f99e85
ef57647b def88de2 fd53869b 87b752d9 7740a05b 8a533c65 c934c90a 9d9766fe
00000034 7d78e38a b2120894 c260d63d 6c780d36 ec176149 5eda4791 f5bcd085
52ee366c c46476f6 cc7363e9 473e9cad 790c61fe
2011-06-29 16:03:04: DEBUG: begin.
2011-06-29 16:03:04: DEBUG: seen nptype=4(ke)
2011-06-29 16:03:04: DEBUG: seen nptype=10(nonce)
2011-06-29 16:03:04: DEBUG: succeed.
2011-06-29 16:03:04: DEBUG: ===
2011-06-29 16:03:04: DEBUG: compute DH's private.
2011-06-29 16:03:04: DEBUG:
4fe3b0cc a8239ce1 9e134dd5 898e337d 324f2423 f5892311 55c350ea c95cd952
9a1fb78b 0211aa80 f763723c 89385f2a 550fecf4 303fd18e 2eb4453c bf56bdb0
44b5a476 35ded16a 515ee789 cedb9cb3 20c27464 72b1c19c 42a4c302 775e1cbd
0d36b643 20d036f7 47f7ddff 63be1892 e17e28a2 bddd7871 cec01038 f4063b95
2011-06-29 16:03:04: DEBUG: compute DH's public.
2011-06-29 16:03:04: DEBUG:
765af1c2 bc47cf5d 343c388b a26a0ae2 3b405d3a 060bd941 843f0425 2853b587
0b56d91d 9c18b056 1a8f3129 e2ac9673 c8f0bef3 71da8eee 2e76076a 187eac50
99f6b4c6 a4cb946c f2aba77f daaba8b3 aea89ca2 6c78e0cf 2cb0e98e 51800aba
fc062b87 d4427a7e 536d26a7 65575cf7 85f4e0b7 c62c73aa c65d7053 7169ea20
2011-06-29 16:03:05: DEBUG: add payload of len 128, next type 10
2011-06-29 16:03:05: DEBUG: add payload of len 16, next type 0
2011-06-29 16:03:05: DEBUG: 180 bytes from 80.249.83.#[500] to 212.98.165.#[500]
2011-06-29 16:03:05: DEBUG: sockname 80.249.83.#[500]
2011-06-29 16:03:05: DEBUG: send packet from 80.249.83.#[500]
2011-06-29 16:03:05: DEBUG: send packet to 212.98.165.#[500]
2011-06-29 16:03:05: DEBUG: src4 80.249.83.#[500]
2011-06-29 16:03:05: DEBUG: dst4 212.98.165.#[500]
2011-06-29 16:03:05: DEBUG: 1 times of 180 bytes message will be sent to 212.98.165.#[500]
2011-06-29 16:03:05: DEBUG:
c3386e16 dc3a9448 373b0b5f 08532969 04100200 00000000 000000b4 0a000084
765af1c2 bc47cf5d 343c388b a26a0ae2 3b405d3a 060bd941 843f0425 2853b587
0b56d91d 9c18b056 1a8f3129 e2ac9673 c8f0bef3 71da8eee 2e76076a 187eac50
99f6b4c6 a4cb946c f2aba77f daaba8b3 aea89ca2 6c78e0cf 2cb0e98e 51800aba
fc062b87 d4427a7e 536d26a7 65575cf7 85f4e0b7 c62c73aa c65d7053 7169ea20
00000014 8f276706 5287e686 93496513 a76bd0ff
2011-06-29 16:03:05: DEBUG: resend phase1 packet c3386e16dc3a9448:373b0b5f08532969
2011-06-29 16:03:05: DEBUG: compute DH's shared.
2011-06-29 16:03:05: DEBUG:
71fbdffe b9e90e05 3fff9d99 3eb65ec1 d5341541 4c2825f3 c003b4cd 29a61b86
c5afd2fd da0d81da 2463af8d 3cac2de0 48b43ba1 9c48793f b2e24458 20a4448d
2189c072 b2589429 28ae6931 ab79ddcb 66234299 afe32ddc 66dc2925 fb55b7d5
3759fb11 ca08dc10 d4505df2 9e414733 f2aea25c 5389f7b3 035f713b 85359885
2011-06-29 16:03:05: DEBUG: the psk found.
2011-06-29 16:03:05: DEBUG: nonce 1: 2011-06-29 16:03:05: DEBUG:
7d78e38a b2120894 c260d63d 6c780d36 ec176149 5eda4791 f5bcd085 52ee366c
c46476f6 cc7363e9 473e9cad 790c61fe
2011-06-29 16:03:05: DEBUG: nonce 2: 2011-06-29 16:03:05: DEBUG:
8f276706 5287e686 93496513 a76bd0ff
2011-06-29 16:03:05: DEBUG: hmac(hmac_sha1)
2011-06-29 16:03:05: DEBUG: SKEYID computed:
2011-06-29 16:03:05: DEBUG:
e47bdcaf bd7f69ac 3d6d0f0a 0e50bf12 2b4b9cd8
2011-06-29 16:03:05: DEBUG: hmac(hmac_sha1)
2011-06-29 16:03:05: DEBUG: SKEYID_d computed:
2011-06-29 16:03:05: DEBUG:
caaa8b35 f43fccf7 2b4e43b1 36378d10 2330eb0e
2011-06-29 16:03:05: DEBUG: hmac(hmac_sha1)
2011-06-29 16:03:05: DEBUG: SKEYID_a computed:
2011-06-29 16:03:05: DEBUG:
5dd2dd4a ddcb31c0 45f42fd0 1129464e d89a6d04
2011-06-29 16:03:05: DEBUG: hmac(hmac_sha1)
2011-06-29 16:03:05: DEBUG: SKEYID_e computed:
2011-06-29 16:03:05: DEBUG:
07576d94 220d2c8b 3adf51a6 137eb03e 365b8d32
2011-06-29 16:03:05: DEBUG: encryption(3des)
2011-06-29 16:03:05: DEBUG: hash(sha1)
2011-06-29 16:03:05: DEBUG: len(SKEYID_e) < len(Ka) (20 < 24), generating long key (Ka = K1 | K2 | ...)
2011-06-29 16:03:05: DEBUG: hmac(hmac_sha1)
2011-06-29 16:03:05: DEBUG: compute intermediate encryption key K1
2011-06-29 16:03:05: DEBUG:
00
2011-06-29 16:03:05: DEBUG:
f3c282fa 10cc184e 035649fa 6511d212 19df7711
2011-06-29 16:03:05: DEBUG: hmac(hmac_sha1)
2011-06-29 16:03:05: DEBUG: compute intermediate encryption key K2
2011-06-29 16:03:05: DEBUG:
f3c282fa 10cc184e 035649fa 6511d212 19df7711
2011-06-29 16:03:05: DEBUG:
53b73513 1f101ba1 f003e8a1 8b327184 82fcf411
2011-06-29 16:03:05: DEBUG: final encryption key computed:
2011-06-29 16:03:05: DEBUG:
f3c282fa 10cc184e 035649fa 6511d212 19df7711 53b73513
2011-06-29 16:03:05: DEBUG: hash(sha1)
2011-06-29 16:03:05: DEBUG: encryption(3des)
2011-06-29 16:03:05: DEBUG: IV computed:
2011-06-29 16:03:05: DEBUG:
2bd285d5 fa6acec1
2011-06-29 16:03:05: DEBUG: ===
2011-06-29 16:03:05: DEBUG: 68 bytes message received from 212.98.165.#[500] to 80.249.83.#[500]
2011-06-29 16:03:05: DEBUG:
c3386e16 dc3a9448 373b0b5f 08532969 05100201 00000000 00000044 a2c365b1
566f1c39 009b9f65 46eca9f4 13831a32 f429116b 40c8f892 3bb80904 cf5779f0
80001049
2011-06-29 16:03:05: DEBUG: begin decryption.
2011-06-29 16:03:05: DEBUG: encryption(3des)
2011-06-29 16:03:05: DEBUG: IV was saved for next processing:
2011-06-29 16:03:05: DEBUG:
cf5779f0 80001049
2011-06-29 16:03:05: DEBUG: encryption(3des)
2011-06-29 16:03:05: DEBUG: with key:
2011-06-29 16:03:05: DEBUG:
f3c282fa 10cc184e 035649fa 6511d212 19df7711 53b73513
2011-06-29 16:03:05: DEBUG: decrypted payload by IV:
2011-06-29 16:03:05: DEBUG:
2bd285d5 fa6acec1
2011-06-29 16:03:05: DEBUG: decrypted payload, but not trimed.
2011-06-29 16:03:05: DEBUG:
0800000c 01000000 d462a56c 00000018 a6fd4380 0d8ffdce 849911ed f647a77b
1bc7e844 00000000
2011-06-29 16:03:05: DEBUG: padding len=1
2011-06-29 16:03:05: DEBUG: skip to trim padding.
2011-06-29 16:03:05: DEBUG: decrypted.
2011-06-29 16:03:05: DEBUG:
c3386e16 dc3a9448 373b0b5f 08532969 05100201 00000000 00000044 0800000c
01000000 d462a56c 00000018 a6fd4380 0d8ffdce 849911ed f647a77b 1bc7e844
00000000
2011-06-29 16:03:05: DEBUG: begin.
2011-06-29 16:03:05: DEBUG: seen nptype=5(id)
2011-06-29 16:03:05: DEBUG: seen nptype=8(hash)
2011-06-29 16:03:05: DEBUG: succeed.
2011-06-29 16:03:05: DEBUG: HASH received:2011-06-29 16:03:05: DEBUG:
a6fd4380 0d8ffdce 849911ed f647a77b 1bc7e844
2011-06-29 16:03:05: DEBUG: HASH with:
2011-06-29 16:03:05: DEBUG:
112cd259 52a58e53 cec7187f 17e0376c 419f9387 a4eb6007 26105145 8f1a5a14
ff658f02 94810d42 bd8dd4ef a3aafccf c1695372 3efa9c84 1191a22d ce898bc2
b288f2c2 4ff1f2db 60ed8dfe 0f919f8e f8ecb144 cc460828 d2d482fd e7f99e85
ef57647b def88de2 fd53869b 87b752d9 7740a05b 8a533c65 c934c90a 9d9766fe
765af1c2 bc47cf5d 343c388b a26a0ae2 3b405d3a 060bd941 843f0425 2853b587
0b56d91d 9c18b056 1a8f3129 e2ac9673 c8f0bef3 71da8eee 2e76076a 187eac50
99f6b4c6 a4cb946c f2aba77f daaba8b3 aea89ca2 6c78e0cf 2cb0e98e 51800aba
fc062b87 d4427a7e 536d26a7 65575cf7 85f4e0b7 c62c73aa c65d7053 7169ea20
c3386e16 dc3a9448 373b0b5f 08532969 00000001 00000001 0000002c 01010001
00000024 01010000 80010005 80020002 80040002 80030001 800b0001 000c0004
00001c20 01000000 d462a56c
2011-06-29 16:03:05: DEBUG: hmac(hmac_sha1)
2011-06-29 16:03:05: DEBUG: HASH computed:
2011-06-29 16:03:05: DEBUG:
a6fd4380 0d8ffdce 849911ed f647a77b 1bc7e844
2011-06-29 16:03:05: DEBUG: HASH for PSK validated.
2011-06-29 16:03:05: DEBUG: peer's ID
2011-06-29 16:03:05: DEBUG:
01000000 d462a56c
2011-06-29 16:03:05: DEBUG: ===
2011-06-29 16:03:05: DEBUG: use ID type of IPv4_address
2011-06-29 16:03:05: DEBUG: generate HASH_R
2011-06-29 16:03:05: DEBUG: HASH with:
2011-06-29 16:03:05: DEBUG:
765af1c2 bc47cf5d 343c388b a26a0ae2 3b405d3a 060bd941 843f0425 2853b587
0b56d91d 9c18b056 1a8f3129 e2ac9673 c8f0bef3 71da8eee 2e76076a 187eac50
99f6b4c6 a4cb946c f2aba77f daaba8b3 aea89ca2 6c78e0cf 2cb0e98e 51800aba
fc062b87 d4427a7e 536d26a7 65575cf7 85f4e0b7 c62c73aa c65d7053 7169ea20
112cd259 52a58e53 cec7187f 17e0376c 419f9387 a4eb6007 26105145 8f1a5a14
ff658f02 94810d42 bd8dd4ef a3aafccf c1695372 3efa9c84 1191a22d ce898bc2
b288f2c2 4ff1f2db 60ed8dfe 0f919f8e f8ecb144 cc460828 d2d482fd e7f99e85
ef57647b def88de2 fd53869b 87b752d9 7740a05b 8a533c65 c934c90a 9d9766fe
373b0b5f 08532969 c3386e16 dc3a9448 00000001 00000001 0000002c 01010001
00000024 01010000 80010005 80020002 80040002 80030001 800b0001 000c0004
00001c20 011101f4 50f953db
2011-06-29 16:03:05: DEBUG: hmac(hmac_sha1)
2011-06-29 16:03:05: DEBUG: HASH computed:
2011-06-29 16:03:05: DEBUG:
26947229 6aac3d08 2be5b84f 90da5972 1587f8a2
2011-06-29 16:03:05: DEBUG: add payload of len 8, next type 8
2011-06-29 16:03:05: DEBUG: add payload of len 20, next type 0
2011-06-29 16:03:05: DEBUG: begin encryption.
2011-06-29 16:03:05: DEBUG: encryption(3des)
2011-06-29 16:03:05: DEBUG: pad length = 4
2011-06-29 16:03:05: DEBUG:
0800000c 011101f4 50f953db 00000018 26947229 6aac3d08 2be5b84f 90da5972
1587f8a2 1ae0e503
2011-06-29 16:03:05: DEBUG: encryption(3des)
2011-06-29 16:03:05: DEBUG: with key:
2011-06-29 16:03:05: DEBUG:
f3c282fa 10cc184e 035649fa 6511d212 19df7711 53b73513
2011-06-29 16:03:05: DEBUG: encrypted payload by IV:
2011-06-29 16:03:05: DEBUG:
cf5779f0 80001049
2011-06-29 16:03:05: DEBUG: save IV for next:
2011-06-29 16:03:05: DEBUG:
738fc345 1ba75469
2011-06-29 16:03:05: DEBUG: encrypted.
2011-06-29 16:03:05: DEBUG: 68 bytes from 80.249.83.#[500] to 212.98.165.#[500]
2011-06-29 16:03:05: DEBUG: sockname 80.249.83.#[500]
2011-06-29 16:03:05: DEBUG: send packet from 80.249.83.#[500]
2011-06-29 16:03:05: DEBUG: send packet to 212.98.165.#[500]
2011-06-29 16:03:05: DEBUG: src4 80.249.83.#[500]
2011-06-29 16:03:05: DEBUG: dst4 212.98.165.#[500]
2011-06-29 16:03:05: DEBUG: 1 times of 68 bytes message will be sent to 212.98.165.#[500]
2011-06-29 16:03:05: DEBUG:
c3386e16 dc3a9448 373b0b5f 08532969 05100201 00000000 00000044 dcda6183
78f74004 f846a6da 942d5b4e 838579b7 f1354b9e 98537d55 291f775f 738fc345
1ba75469
2011-06-29 16:03:05: DEBUG: compute IV for phase2
2011-06-29 16:03:05: DEBUG: phase1 last IV:
2011-06-29 16:03:05: DEBUG:
738fc345 1ba75469 dae03e44
2011-06-29 16:03:05: DEBUG: hash(sha1)
2011-06-29 16:03:05: DEBUG: encryption(3des)
2011-06-29 16:03:05: DEBUG: phase2 IV computed:
2011-06-29 16:03:05: DEBUG:
c9b7771b 5cc07a45
2011-06-29 16:03:05: DEBUG: HASH with:
2011-06-29 16:03:05: DEBUG:
dae03e44 0000001c 00000001 01106002 c3386e16 dc3a9448 373b0b5f 08532969
2011-06-29 16:03:05: DEBUG: hmac(hmac_sha1)
2011-06-29 16:03:05: DEBUG: HASH computed:
2011-06-29 16:03:05: DEBUG:
ef02e6d7 91ba2302 be18e11a e4a258dd 4b30b45c
2011-06-29 16:03:05: DEBUG: begin encryption.
2011-06-29 16:03:05: DEBUG: encryption(3des)
2011-06-29 16:03:05: DEBUG: pad length = 4
2011-06-29 16:03:05: DEBUG:
0b000018 ef02e6d7 91ba2302 be18e11a e4a258dd 4b30b45c 0000001c 00000001
01106002 c3386e16 dc3a9448 373b0b5f 08532969 366d4003
2011-06-29 16:03:05: DEBUG: encryption(3des)
2011-06-29 16:03:05: DEBUG: with key:
2011-06-29 16:03:05: DEBUG:
f3c282fa 10cc184e 035649fa 6511d212 19df7711 53b73513
2011-06-29 16:03:05: DEBUG: encrypted payload by IV:
2011-06-29 16:03:05: DEBUG:
c9b7771b 5cc07a45
2011-06-29 16:03:05: DEBUG: save IV for next:
2011-06-29 16:03:05: DEBUG:
c4f0510c ec523799
2011-06-29 16:03:05: DEBUG: encrypted.
2011-06-29 16:03:05: DEBUG: 84 bytes from 80.249.83.#[500] to 212.98.165.#[500]
2011-06-29 16:03:05: DEBUG: sockname 80.249.83.#[500]
2011-06-29 16:03:05: DEBUG: send packet from 80.249.83.#[500]
2011-06-29 16:03:05: DEBUG: send packet to 212.98.165.#[500]
2011-06-29 16:03:05: DEBUG: src4 80.249.83.#[500]
2011-06-29 16:03:05: DEBUG: dst4 212.98.165.#[500]
2011-06-29 16:03:05: DEBUG: 1 times of 84 bytes message will be sent to 212.98.165.#[500]
2011-06-29 16:03:05: DEBUG:
c3386e16 dc3a9448 373b0b5f 08532969 08100501 dae03e44 00000054 d711eba6
7f9f8cdd a3f5ee0f fd323b8b 87cf07a4 f5e68412 29370163 3bd77b8a 362d611f
2a285be7 061ce803 b6088859 c4f0510c ec523799
2011-06-29 16:03:05: DEBUG: sendto Information notify.
2011-06-29 16:03:05: INFO: ISAKMP-SA established 80.249.83.#[500]-212.98.165.#[500] spi:c3386e16dc3a9448:373b0b5f08532969
2011-06-29 16:03:05: DEBUG: ===
2011-06-29 16:03:05: DEBUG: ===
2011-06-29 16:03:05: DEBUG: 188 bytes message received from 212.98.165.#[500] to 80.249.83.#[500]
2011-06-29 16:03:05: DEBUG:
c3386e16 dc3a9448 373b0b5f 08532969 08102001 00000001 000000bc 53fd7cad
d6616974 bf6ab267 f152f85f 7f249127 16d4bc95 1348d648 0ce476f5 82a6eaf7
a8c0c9e6 b00f954e 35ea6ba0 ffcde035 50ce2f30 36530e51 d11ccd32 883c55fc
2d6132cc 70c4e512 5da08bac 317cdee9 eb8e5705 1b4b91f5 3ef3123e 6ab321fe
92f79b40 1339df05 fd5e1e6e 11480eb8 35f9e857 7b1bf9a2 759b8b1a 2424d7ef
e11aaf49 4d394467 dccf85c2 df21a925 0fdf09ba d894ccd8 0f96d27b
2011-06-29 16:03:05: DEBUG: compute IV for phase2
2011-06-29 16:03:05: DEBUG: phase1 last IV:
2011-06-29 16:03:05: DEBUG:
738fc345 1ba75469 00000001
2011-06-29 16:03:05: DEBUG: hash(sha1)
2011-06-29 16:03:05: DEBUG: encryption(3des)
2011-06-29 16:03:05: DEBUG: phase2 IV computed:
2011-06-29 16:03:05: DEBUG:
a670432e 73e54148
2011-06-29 16:03:05: DEBUG: ===
2011-06-29 16:03:05: INFO: respond new phase 2 negotiation: 80.249.83.#[500]<=>212.98.165.#[500]
2011-06-29 16:03:05: DEBUG: begin decryption.
2011-06-29 16:03:05: DEBUG: encryption(3des)
2011-06-29 16:03:05: DEBUG: IV was saved for next processing:
2011-06-29 16:03:05: DEBUG:
d894ccd8 0f96d27b
2011-06-29 16:03:05: DEBUG: encryption(3des)
2011-06-29 16:03:05: DEBUG: with key:
2011-06-29 16:03:05: DEBUG:
f3c282fa 10cc184e 035649fa 6511d212 19df7711 53b73513
2011-06-29 16:03:05: DEBUG: decrypted payload by IV:
2011-06-29 16:03:05: DEBUG:
a670432e 73e54148
2011-06-29 16:03:05: DEBUG: decrypted payload, but not trimed.
2011-06-29 16:03:05: DEBUG:
01000018 1ba2eb36 4fe490b3 6dcc6977 04e638be bf27f81d 0a000034 00000001
00000001 00000028 01030401 7570c05e 0000001c 01030000 80040001 80050002
80010001 00020004 00000e10 05000034 d315cb7e 89354bb7 cecb2132 fd04f8c7
627c2c5e e8b6f84b 898e3bb4 b20a405e 934a5fd8 77a7f47d 74e8928c 0e12ebac
0500000c 01000000 d462a56c 00000010 04000000 c0a80102 fffffffe 00000000
2011-06-29 16:03:05: DEBUG: padding len=1
2011-06-29 16:03:05: DEBUG: skip to trim padding.
2011-06-29 16:03:05: DEBUG: decrypted.
2011-06-29 16:03:05: DEBUG:
c3386e16 dc3a9448 373b0b5f 08532969 08102001 00000001 000000bc 01000018
1ba2eb36 4fe490b3 6dcc6977 04e638be bf27f81d 0a000034 00000001 00000001
00000028 01030401 7570c05e 0000001c 01030000 80040001 80050002 80010001
00020004 00000e10 05000034 d315cb7e 89354bb7 cecb2132 fd04f8c7 627c2c5e
e8b6f84b 898e3bb4 b20a405e 934a5fd8 77a7f47d 74e8928c 0e12ebac 0500000c
01000000 d462a56c 00000010 04000000 c0a80102 fffffffe 00000000
2011-06-29 16:03:05: DEBUG: begin.
2011-06-29 16:03:05: DEBUG: seen nptype=8(hash)
2011-06-29 16:03:05: DEBUG: seen nptype=1(sa)
2011-06-29 16:03:05: DEBUG: seen nptype=10(nonce)
2011-06-29 16:03:05: DEBUG: seen nptype=5(id)
2011-06-29 16:03:05: DEBUG: seen nptype=5(id)
2011-06-29 16:03:05: DEBUG: succeed.
2011-06-29 16:03:05: DEBUG: received IDci2:2011-06-29 16:03:05: DEBUG:
01000000 d462a56c
2011-06-29 16:03:05: DEBUG: received IDcr2:2011-06-29 16:03:05: DEBUG:
04000000 c0a80102 fffffffe
2011-06-29 16:03:05: DEBUG: HASH(1) validate:2011-06-29 16:03:05: DEBUG:
1ba2eb36 4fe490b3 6dcc6977 04e638be bf27f81d
2011-06-29 16:03:05: DEBUG: HASH with:
2011-06-29 16:03:05: DEBUG:
00000001 0a000034 00000001 00000001 00000028 01030401 7570c05e 0000001c
01030000 80040001 80050002 80010001 00020004 00000e10 05000034 d315cb7e
89354bb7 cecb2132 fd04f8c7 627c2c5e e8b6f84b 898e3bb4 b20a405e 934a5fd8
77a7f47d 74e8928c 0e12ebac 0500000c 01000000 d462a56c 00000010 04000000
c0a80102 fffffffe
2011-06-29 16:03:05: DEBUG: hmac(hmac_sha1)
2011-06-29 16:03:05: DEBUG: HASH computed:
2011-06-29 16:03:05: DEBUG:
1ba2eb36 4fe490b3 6dcc6977 04e638be bf27f81d
2011-06-29 16:03:05: ERROR: failed to get sainfo.
2011-06-29 16:03:05: ERROR: failed to get sainfo.
2011-06-29 16:03:05: ERROR: failed to pre-process packet.
2011-06-29 16:03:06: DEBUG: ===
2011-06-29 16:03:06: DEBUG: 188 bytes message received from 212.98.165.#[500] to 80.249.83.#[500]
2011-06-29 16:03:06: DEBUG:
c3386e16 dc3a9448 373b0b5f 08532969 08102001 00000001 000000bc 53fd7cad
d6616974 bf6ab267 f152f85f 7f249127 16d4bc95 1348d648 0ce476f5 82a6eaf7
a8c0c9e6 b00f954e 35ea6ba0 ffcde035 50ce2f30 36530e51 d11ccd32 883c55fc
2d6132cc 70c4e512 5da08bac 317cdee9 eb8e5705 1b4b91f5 3ef3123e 6ab321fe
92f79b40 1339df05 fd5e1e6e 11480eb8 35f9e857 7b1bf9a2 759b8b1a 2424d7ef
e11aaf49 4d394467 dccf85c2 df21a925 0fdf09ba d894ccd8 0f96d27b
2011-06-29 16:03:06: DEBUG: compute IV for phase2
2011-06-29 16:03:06: DEBUG: phase1 last IV:
2011-06-29 16:03:06: DEBUG:
738fc345 1ba75469 00000001
2011-06-29 16:03:06: DEBUG: hash(sha1)
2011-06-29 16:03:06: DEBUG: encryption(3des)
2011-06-29 16:03:06: DEBUG: phase2 IV computed:
2011-06-29 16:03:06: DEBUG:
a670432e 73e54148
2011-06-29 16:03:06: DEBUG: ===
2011-06-29 16:03:06: INFO: respond new phase 2 negotiation: 80.249.83.#[500]<=>212.98.165.#[500]
2011-06-29 16:03:06: DEBUG: begin decryption.
2011-06-29 16:03:06: DEBUG: encryption(3des)
2011-06-29 16:03:06: DEBUG: IV was saved for next processing:
2011-06-29 16:03:06: DEBUG:
d894ccd8 0f96d27b
2011-06-29 16:03:06: DEBUG: encryption(3des)
2011-06-29 16:03:06: DEBUG: with key:
2011-06-29 16:03:06: DEBUG:
f3c282fa 10cc184e 035649fa 6511d212 19df7711 53b73513
2011-06-29 16:03:06: DEBUG: decrypted payload by IV:
2011-06-29 16:03:06: DEBUG:
a670432e 73e54148
2011-06-29 16:03:06: DEBUG: decrypted payload, but not trimed.
2011-06-29 16:03:06: DEBUG:
01000018 1ba2eb36 4fe490b3 6dcc6977 04e638be bf27f81d 0a000034 00000001
00000001 00000028 01030401 7570c05e 0000001c 01030000 80040001 80050002
80010001 00020004 00000e10 05000034 d315cb7e 89354bb7 cecb2132 fd04f8c7
627c2c5e e8b6f84b 898e3bb4 b20a405e 934a5fd8 77a7f47d 74e8928c 0e12ebac
0500000c 01000000 d462a56c 00000010 04000000 c0a80102 fffffffe 00000000
2011-06-29 16:03:06: DEBUG: padding len=1
2011-06-29 16:03:06: DEBUG: skip to trim padding.
2011-06-29 16:03:06: DEBUG: decrypted.
2011-06-29 16:03:06: DEBUG:
c3386e16 dc3a9448 373b0b5f 08532969 08102001 00000001 000000bc 01000018
1ba2eb36 4fe490b3 6dcc6977 04e638be bf27f81d 0a000034 00000001 00000001
00000028 01030401 7570c05e 0000001c 01030000 80040001 80050002 80010001
00020004 00000e10 05000034 d315cb7e 89354bb7 cecb2132 fd04f8c7 627c2c5e
e8b6f84b 898e3bb4 b20a405e 934a5fd8 77a7f47d 74e8928c 0e12ebac 0500000c
01000000 d462a56c 00000010 04000000 c0a80102 fffffffe 00000000
2011-06-29 16:03:06: DEBUG: begin.
2011-06-29 16:03:06: DEBUG: seen nptype=8(hash)
2011-06-29 16:03:06: DEBUG: seen nptype=1(sa)
2011-06-29 16:03:06: DEBUG: seen nptype=10(nonce)
2011-06-29 16:03:06: DEBUG: seen nptype=5(id)
2011-06-29 16:03:06: DEBUG: seen nptype=5(id)
2011-06-29 16:03:06: DEBUG: succeed.
2011-06-29 16:03:06: DEBUG: received IDci2:2011-06-29 16:03:06: DEBUG:
01000000 d462a56c
2011-06-29 16:03:06: DEBUG: received IDcr2:2011-06-29 16:03:06: DEBUG:
04000000 c0a80102 fffffffe
2011-06-29 16:03:06: DEBUG: HASH(1) validate:2011-06-29 16:03:06: DEBUG:
1ba2eb36 4fe490b3 6dcc6977 04e638be bf27f81d
2011-06-29 16:03:06: DEBUG: HASH with:
2011-06-29 16:03:06: DEBUG:
00000001 0a000034 00000001 00000001 00000028 01030401 7570c05e 0000001c
01030000 80040001 80050002 80010001 00020004 00000e10 05000034 d315cb7e
89354bb7 cecb2132 fd04f8c7 627c2c5e e8b6f84b 898e3bb4 b20a405e 934a5fd8
77a7f47d 74e8928c 0e12ebac 0500000c 01000000 d462a56c 00000010 04000000
c0a80102 fffffffe
2011-06-29 16:03:06: DEBUG: hmac(hmac_sha1)
2011-06-29 16:03:06: DEBUG: HASH computed:
2011-06-29 16:03:06: DEBUG:
1ba2eb36 4fe490b3 6dcc6977 04e638be bf27f81d
2011-06-29 16:03:06: ERROR: failed to get sainfo.
2011-06-29 16:03:06: ERROR: failed to get sainfo.
2011-06-29 16:03:06: ERROR: failed to pre-process packet.
2011-06-29 16:03:08: DEBUG: ===
2011-06-29 16:03:08: DEBUG: 188 bytes message received from 212.98.165.#[500] to 80.249.83.#[500]
2011-06-29 16:03:08: DEBUG:
c3386e16 dc3a9448 373b0b5f 08532969 08102001 00000001 000000bc 53fd7cad
d6616974 bf6ab267 f152f85f 7f249127 16d4bc95 1348d648 0ce476f5 82a6eaf7
a8c0c9e6 b00f954e 35ea6ba0 ffcde035 50ce2f30 36530e51 d11ccd32 883c55fc
2d6132cc 70c4e512 5da08bac 317cdee9 eb8e5705 1b4b91f5 3ef3123e 6ab321fe
92f79b40 1339df05 fd5e1e6e 11480eb8 35f9e857 7b1bf9a2 759b8b1a 2424d7ef
e11aaf49 4d394467 dccf85c2 df21a925 0fdf09ba d894ccd8 0f96d27b
2011-06-29 16:03:08: DEBUG: compute IV for phase2
2011-06-29 16:03:08: DEBUG: phase1 last IV:
2011-06-29 16:03:08: DEBUG:
738fc345 1ba75469 00000001
2011-06-29 16:03:08: DEBUG: hash(sha1)
2011-06-29 16:03:08: DEBUG: encryption(3des)
2011-06-29 16:03:08: DEBUG: phase2 IV computed:
2011-06-29 16:03:08: DEBUG:
a670432e 73e54148
2011-06-29 16:03:08: DEBUG: ===
2011-06-29 16:03:08: INFO: respond new phase 2 negotiation: 80.249.83.#[500]<=>212.98.165.#[500]
2011-06-29 16:03:08: DEBUG: begin decryption.
2011-06-29 16:03:08: DEBUG: encryption(3des)
2011-06-29 16:03:08: DEBUG: IV was saved for next processing:
2011-06-29 16:03:08: DEBUG:
d894ccd8 0f96d27b
2011-06-29 16:03:08: DEBUG: encryption(3des)
2011-06-29 16:03:08: DEBUG: with key:
2011-06-29 16:03:08: DEBUG:
f3c282fa 10cc184e 035649fa 6511d212 19df7711 53b73513
2011-06-29 16:03:08: DEBUG: decrypted payload by IV:
2011-06-29 16:03:08: DEBUG:
a670432e 73e54148
2011-06-29 16:03:08: DEBUG: decrypted payload, but not trimed.
2011-06-29 16:03:08: DEBUG:
01000018 1ba2eb36 4fe490b3 6dcc6977 04e638be bf27f81d 0a000034 00000001
00000001 00000028 01030401 7570c05e 0000001c 01030000 80040001 80050002
80010001 00020004 00000e10 05000034 d315cb7e 89354bb7 cecb2132 fd04f8c7
627c2c5e e8b6f84b 898e3bb4 b20a405e 934a5fd8 77a7f47d 74e8928c 0e12ebac
0500000c 01000000 d462a56c 00000010 04000000 c0a80102 fffffffe 00000000
2011-06-29 16:03:08: DEBUG: padding len=1
2011-06-29 16:03:08: DEBUG: skip to trim padding.
2011-06-29 16:03:08: DEBUG: decrypted.
2011-06-29 16:03:08: DEBUG:
c3386e16 dc3a9448 373b0b5f 08532969 08102001 00000001 000000bc 01000018
1ba2eb36 4fe490b3 6dcc6977 04e638be bf27f81d 0a000034 00000001 00000001
00000028 01030401 7570c05e 0000001c 01030000 80040001 80050002 80010001
00020004 00000e10 05000034 d315cb7e 89354bb7 cecb2132 fd04f8c7 627c2c5e
e8b6f84b 898e3bb4 b20a405e 934a5fd8 77a7f47d 74e8928c 0e12ebac 0500000c
01000000 d462a56c 00000010 04000000 c0a80102 fffffffe 00000000
2011-06-29 16:03:08: DEBUG: begin.
2011-06-29 16:03:08: DEBUG: seen nptype=8(hash)
2011-06-29 16:03:08: DEBUG: seen nptype=1(sa)
2011-06-29 16:03:08: DEBUG: seen nptype=10(nonce)
2011-06-29 16:03:08: DEBUG: seen nptype=5(id)
2011-06-29 16:03:08: DEBUG: seen nptype=5(id)
2011-06-29 16:03:08: DEBUG: succeed.
2011-06-29 16:03:08: DEBUG: received IDci2:2011-06-29 16:03:08: DEBUG:
01000000 d462a56c
2011-06-29 16:03:08: DEBUG: received IDcr2:2011-06-29 16:03:08: DEBUG:
04000000 c0a80102 fffffffe
2011-06-29 16:03:08: DEBUG: HASH(1) validate:2011-06-29 16:03:08: DEBUG:
1ba2eb36 4fe490b3 6dcc6977 04e638be bf27f81d
2011-06-29 16:03:08: DEBUG: HASH with:
2011-06-29 16:03:08: DEBUG:
00000001 0a000034 00000001 00000001 00000028 01030401 7570c05e 0000001c
01030000 80040001 80050002 80010001 00020004 00000e10 05000034 d315cb7e
89354bb7 cecb2132 fd04f8c7 627c2c5e e8b6f84b 898e3bb4 b20a405e 934a5fd8
77a7f47d 74e8928c 0e12ebac 0500000c 01000000 d462a56c 00000010 04000000
c0a80102 fffffffe
2011-06-29 16:03:08: DEBUG: hmac(hmac_sha1)
2011-06-29 16:03:08: DEBUG: HASH computed:
2011-06-29 16:03:08: DEBUG:
1ba2eb36 4fe490b3 6dcc6977 04e638be bf27f81d
2011-06-29 16:03:08: ERROR: failed to get sainfo.
2011-06-29 16:03:08: ERROR: failed to get sainfo.
2011-06-29 16:03:08: ERROR: failed to pre-process packet.
2011-06-29 16:03:12: DEBUG: ===
2011-06-29 16:03:12: DEBUG: 188 bytes message received from 212.98.165.#[500] to 80.249.83.#[500]
2011-06-29 16:03:12: DEBUG:
c3386e16 dc3a9448 373b0b5f 08532969 08102001 00000001 000000bc 53fd7cad
d6616974 bf6ab267 f152f85f 7f249127 16d4bc95 1348d648 0ce476f5 82a6eaf7
a8c0c9e6 b00f954e 35ea6ba0 ffcde035 50ce2f30 36530e51 d11ccd32 883c55fc
2d6132cc 70c4e512 5da08bac 317cdee9 eb8e5705 1b4b91f5 3ef3123e 6ab321fe
92f79b40 1339df05 fd5e1e6e 11480eb8 35f9e857 7b1bf9a2 759b8b1a 2424d7ef
e11aaf49 4d394467 dccf85c2 df21a925 0fdf09ba d894ccd8 0f96d27b
2011-06-29 16:03:12: DEBUG: compute IV for phase2
2011-06-29 16:03:12: DEBUG: phase1 last IV:
2011-06-29 16:03:12: DEBUG:
738fc345 1ba75469 00000001
2011-06-29 16:03:12: DEBUG: hash(sha1)
2011-06-29 16:03:12: DEBUG: encryption(3des)
2011-06-29 16:03:12: DEBUG: phase2 IV computed:
2011-06-29 16:03:12: DEBUG:
a670432e 73e54148
2011-06-29 16:03:12: DEBUG: ===
2011-06-29 16:03:12: INFO: respond new phase 2 negotiation: 80.249.83.#[500]<=>212.98.165.#[500]
2011-06-29 16:03:12: DEBUG: begin decryption.
2011-06-29 16:03:12: DEBUG: encryption(3des)
2011-06-29 16:03:12: DEBUG: IV was saved for next processing:
2011-06-29 16:03:12: DEBUG:
d894ccd8 0f96d27b
2011-06-29 16:03:12: DEBUG: encryption(3des)
2011-06-29 16:03:12: DEBUG: with key:
2011-06-29 16:03:12: DEBUG:
f3c282fa 10cc184e 035649fa 6511d212 19df7711 53b73513
2011-06-29 16:03:12: DEBUG: decrypted payload by IV:
2011-06-29 16:03:12: DEBUG:
a670432e 73e54148
2011-06-29 16:03:12: DEBUG: decrypted payload, but not trimed.
2011-06-29 16:03:12: DEBUG:
01000018 1ba2eb36 4fe490b3 6dcc6977 04e638be bf27f81d 0a000034 00000001
00000001 00000028 01030401 7570c05e 0000001c 01030000 80040001 80050002
80010001 00020004 00000e10 05000034 d315cb7e 89354bb7 cecb2132 fd04f8c7
627c2c5e e8b6f84b 898e3bb4 b20a405e 934a5fd8 77a7f47d 74e8928c 0e12ebac
0500000c 01000000 d462a56c 00000010 04000000 c0a80102 fffffffe 00000000
2011-06-29 16:03:12: DEBUG: padding len=1
2011-06-29 16:03:12: DEBUG: skip to trim padding.
2011-06-29 16:03:12: DEBUG: decrypted.
2011-06-29 16:03:12: DEBUG:
c3386e16 dc3a9448 373b0b5f 08532969 08102001 00000001 000000bc 01000018
1ba2eb36 4fe490b3 6dcc6977 04e638be bf27f81d 0a000034 00000001 00000001
00000028 01030401 7570c05e 0000001c 01030000 80040001 80050002 80010001
00020004 00000e10 05000034 d315cb7e 89354bb7 cecb2132 fd04f8c7 627c2c5e
e8b6f84b 898e3bb4 b20a405e 934a5fd8 77a7f47d 74e8928c 0e12ebac 0500000c
01000000 d462a56c 00000010 04000000 c0a80102 fffffffe 00000000
2011-06-29 16:03:12: DEBUG: begin.
2011-06-29 16:03:12: DEBUG: seen nptype=8(hash)
2011-06-29 16:03:12: DEBUG: seen nptype=1(sa)
2011-06-29 16:03:12: DEBUG: seen nptype=10(nonce)
2011-06-29 16:03:12: DEBUG: seen nptype=5(id)
2011-06-29 16:03:12: DEBUG: seen nptype=5(id)
2011-06-29 16:03:12: DEBUG: succeed.
2011-06-29 16:03:12: DEBUG: received IDci2:2011-06-29 16:03:12: DEBUG:
01000000 d462a56c
2011-06-29 16:03:12: DEBUG: received IDcr2:2011-06-29 16:03:12: DEBUG:
04000000 c0a80102 fffffffe
2011-06-29 16:03:12: DEBUG: HASH(1) validate:2011-06-29 16:03:12: DEBUG:
1ba2eb36 4fe490b3 6dcc6977 04e638be bf27f81d
2011-06-29 16:03:12: DEBUG: HASH with:
2011-06-29 16:03:12: DEBUG:
00000001 0a000034 00000001 00000001 00000028 01030401 7570c05e 0000001c
01030000 80040001 80050002 80010001 00020004 00000e10 05000034 d315cb7e
89354bb7 cecb2132 fd04f8c7 627c2c5e e8b6f84b 898e3bb4 b20a405e 934a5fd8
77a7f47d 74e8928c 0e12ebac 0500000c 01000000 d462a56c 00000010 04000000
c0a80102 fffffffe
2011-06-29 16:03:12: DEBUG: hmac(hmac_sha1)
2011-06-29 16:03:12: DEBUG: HASH computed:
2011-06-29 16:03:12: DEBUG:
1ba2eb36 4fe490b3 6dcc6977 04e638be bf27f81d
2011-06-29 16:03:12: ERROR: failed to get sainfo.
2011-06-29 16:03:12: ERROR: failed to get sainfo.
2011-06-29 16:03:12: ERROR: failed to pre-process packet.
2011-06-29 16:03:20: DEBUG: ===
2011-06-29 16:03:20: DEBUG: 188 bytes message received from 212.98.165.#[500] to 80.249.83.#[500]
2011-06-29 16:03:20: DEBUG:
c3386e16 dc3a9448 373b0b5f 08532969 08102001 00000001 000000bc 53fd7cad
d6616974 bf6ab267 f152f85f 7f249127 16d4bc95 1348d648 0ce476f5 82a6eaf7
a8c0c9e6 b00f954e 35ea6ba0 ffcde035 50ce2f30 36530e51 d11ccd32 883c55fc
2d6132cc 70c4e512 5da08bac 317cdee9 eb8e5705 1b4b91f5 3ef3123e 6ab321fe
92f79b40 1339df05 fd5e1e6e 11480eb8 35f9e857 7b1bf9a2 759b8b1a 2424d7ef
e11aaf49 4d394467 dccf85c2 df21a925 0fdf09ba d894ccd8 0f96d27b
2011-06-29 16:03:20: DEBUG: compute IV for phase2
2011-06-29 16:03:20: DEBUG: phase1 last IV:
2011-06-29 16:03:20: DEBUG:
738fc345 1ba75469 00000001
2011-06-29 16:03:20: DEBUG: hash(sha1)
2011-06-29 16:03:20: DEBUG: encryption(3des)
2011-06-29 16:03:20: DEBUG: phase2 IV computed:
2011-06-29 16:03:20: DEBUG:
a670432e 73e54148
2011-06-29 16:03:20: DEBUG: ===
2011-06-29 16:03:20: INFO: respond new phase 2 negotiation: 80.249.83.#[500]<=>212.98.165.#[500]
2011-06-29 16:03:20: DEBUG: begin decryption.
2011-06-29 16:03:20: DEBUG: encryption(3des)
2011-06-29 16:03:20: DEBUG: IV was saved for next processing:
2011-06-29 16:03:20: DEBUG:
d894ccd8 0f96d27b
2011-06-29 16:03:20: DEBUG: encryption(3des)
2011-06-29 16:03:20: DEBUG: with key:
2011-06-29 16:03:20: DEBUG:
f3c282fa 10cc184e 035649fa 6511d212 19df7711 53b73513
2011-06-29 16:03:20: DEBUG: decrypted payload by IV:
2011-06-29 16:03:20: DEBUG:
a670432e 73e54148
2011-06-29 16:03:20: DEBUG: decrypted payload, but not trimed.
2011-06-29 16:03:20: DEBUG:
01000018 1ba2eb36 4fe490b3 6dcc6977 04e638be bf27f81d 0a000034 00000001
00000001 00000028 01030401 7570c05e 0000001c 01030000 80040001 80050002
80010001 00020004 00000e10 05000034 d315cb7e 89354bb7 cecb2132 fd04f8c7
627c2c5e e8b6f84b 898e3bb4 b20a405e 934a5fd8 77a7f47d 74e8928c 0e12ebac
0500000c 01000000 d462a56c 00000010 04000000 c0a80102 fffffffe 00000000
2011-06-29 16:03:20: DEBUG: padding len=1
2011-06-29 16:03:20: DEBUG: skip to trim padding.
2011-06-29 16:03:20: DEBUG: decrypted.
2011-06-29 16:03:20: DEBUG:
c3386e16 dc3a9448 373b0b5f 08532969 08102001 00000001 000000bc 01000018
1ba2eb36 4fe490b3 6dcc6977 04e638be bf27f81d 0a000034 00000001 00000001
00000028 01030401 7570c05e 0000001c 01030000 80040001 80050002 80010001
00020004 00000e10 05000034 d315cb7e 89354bb7 cecb2132 fd04f8c7 627c2c5e
e8b6f84b 898e3bb4 b20a405e 934a5fd8 77a7f47d 74e8928c 0e12ebac 0500000c
01000000 d462a56c 00000010 04000000 c0a80102 fffffffe 00000000
2011-06-29 16:03:20: DEBUG: begin.
2011-06-29 16:03:20: DEBUG: seen nptype=8(hash)
2011-06-29 16:03:20: DEBUG: seen nptype=1(sa)
2011-06-29 16:03:20: DEBUG: seen nptype=10(nonce)
2011-06-29 16:03:20: DEBUG: seen nptype=5(id)
2011-06-29 16:03:20: DEBUG: seen nptype=5(id)
2011-06-29 16:03:20: DEBUG: succeed.
2011-06-29 16:03:20: DEBUG: received IDci2:2011-06-29 16:03:20: DEBUG:
01000000 d462a56c
2011-06-29 16:03:20: DEBUG: received IDcr2:2011-06-29 16:03:20: DEBUG:
04000000 c0a80102 fffffffe
2011-06-29 16:03:20: DEBUG: HASH(1) validate:2011-06-29 16:03:20: DEBUG:
1ba2eb36 4fe490b3 6dcc6977 04e638be bf27f81d
2011-06-29 16:03:20: DEBUG: HASH with:
2011-06-29 16:03:20: DEBUG:
00000001 0a000034 00000001 00000001 00000028 01030401 7570c05e 0000001c
01030000 80040001 80050002 80010001 00020004 00000e10 05000034 d315cb7e
89354bb7 cecb2132 fd04f8c7 627c2c5e e8b6f84b 898e3bb4 b20a405e 934a5fd8
77a7f47d 74e8928c 0e12ebac 0500000c 01000000 d462a56c 00000010 04000000
c0a80102 fffffffe
2011-06-29 16:03:20: DEBUG: hmac(hmac_sha1)
2011-06-29 16:03:20: DEBUG: HASH computed:
2011-06-29 16:03:20: DEBUG:
1ba2eb36 4fe490b3 6dcc6977 04e638be bf27f81d
2011-06-29 16:03:20: ERROR: failed to get sainfo.
2011-06-29 16:03:20: ERROR: failed to get sainfo.
2011-06-29 16:03:20: ERROR: failed to pre-process packet.


Вернуться наверх
 Профиль  
 
 Заголовок сообщения: Re: MS TMG 2010 (IPSec Srv) <-- ipsec tunnel--> DLink DSL-26
СообщениеДобавлено: Ср июн 29, 2011 16:36 
Не в сети
Сотрудник D-LINK
Сотрудник D-LINK

Зарегистрирован: Вт мар 01, 2011 22:06
Сообщений: 2025
Возможен ли пеевод на англоязычный интерфейс ms tmg? (для удалённого теста со стороны разработчика)


Вернуться наверх
 Профиль  
 
 Заголовок сообщения: Re: MS TMG 2010 (IPSec Srv) <-- ipsec tunnel--> DLink DSL-26
СообщениеДобавлено: Ср июн 29, 2011 16:39 
Не в сети

Зарегистрирован: Пт май 20, 2011 18:21
Сообщений: 13
Да, не проблема. Сообщу когда сделаю


Вернуться наверх
 Профиль  
 
Показать сообщения за:  Сортировать по:  
Начать новую тему Ответить на тему  [ Сообщений: 22 ]  На страницу Пред.  1, 2

Часовой пояс: UTC + 3 часа


Кто сейчас на форуме

Сейчас этот форум просматривают: нет зарегистрированных пользователей и гости: 189


Вы не можете начинать темы
Вы не можете отвечать на сообщения
Вы не можете редактировать свои сообщения
Вы не можете удалять свои сообщения
Вы не можете добавлять вложения

Найти:
Перейти:  
Создано на основе phpBB® Forum Software © phpBB Group
Русская поддержка phpBB