Oct 6 22:16:42 bigboy pluto[14312]: "dlink" #2: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+UP {using isakmp#1}
Oct 6 22:16:42 bigboy pluto[14312]: | **emit ISAKMP Message:
Oct 6 22:16:42 bigboy pluto[14312]: | initiator cookie:
Oct 6 22:16:42 bigboy pluto[14312]: | c9 05 3e b0 2b 2a 07 ba
Oct 6 22:16:42 bigboy pluto[14312]: | responder cookie:
Oct 6 22:16:42 bigboy pluto[14312]: | 2c 4d ce 40 58 2d 24 4f
Oct 6 22:16:42 bigboy pluto[14312]: | next payload type: ISAKMP_NEXT_HASH
Oct 6 22:16:42 bigboy pluto[14312]: | ISAKMP version: ISAKMP Version 1.0
Oct 6 22:16:42 bigboy pluto[14312]: | exchange type: ISAKMP_XCHG_QUICK
Oct 6 22:16:42 bigboy pluto[14312]: | flags: ISAKMP_FLAG_ENCRYPTION
Oct 6 22:16:42 bigboy pluto[14312]: | message ID: ca d8 63 d8
Oct 6 22:16:42 bigboy pluto[14312]: | ***emit ISAKMP Hash Payload:
Oct 6 22:16:42 bigboy pluto[14312]: | next payload type: ISAKMP_NEXT_SA
Oct 6 22:16:42 bigboy pluto[14312]: | emitting 16 zero bytes of HASH into ISAKMP Hash Payload
Oct 6 22:16:42 bigboy pluto[14312]: | emitting length of ISAKMP Hash Payload: 20
Oct 6 22:16:42 bigboy pluto[14312]: | ***emit ISAKMP Security Association Payload:
Oct 6 22:16:42 bigboy pluto[14312]: | next payload type: ISAKMP_NEXT_NONCE
Oct 6 22:16:42 bigboy pluto[14312]: | DOI: ISAKMP_DOI_IPSEC
Oct 6 22:16:42 bigboy pluto[14312]: | ****emit IPsec DOI SIT:
Oct 6 22:16:42 bigboy pluto[14312]: | IPsec DOI SIT: SIT_IDENTITY_ONLY
Oct 6 22:16:42 bigboy pluto[14312]: | esp proposal: 3DES_CBC/HMAC_MD5, ; pfsgroup=MODP_1024;
Oct 6 22:16:42 bigboy pluto[14312]: | ****emit ISAKMP Proposal Payload:
Oct 6 22:16:42 bigboy pluto[14312]: | next payload type: ISAKMP_NEXT_NONE
Oct 6 22:16:42 bigboy pluto[14312]: | proposal number: 0
Oct 6 22:16:42 bigboy pluto[14312]: | protocol ID: PROTO_IPSEC_ESP
Oct 6 22:16:42 bigboy pluto[14312]: | SPI size: 4
Oct 6 22:16:42 bigboy pluto[14312]: | number of transforms: 1
Oct 6 22:16:42 bigboy pluto[14312]: | netlink_get_spi: allocated 0x4463e5f6 for
esp.0@XX.XX.XX.XXOct 6 22:16:42 bigboy pluto[14312]: | emitting 4 raw bytes of SPI into ISAKMP Proposal Payload
Oct 6 22:16:42 bigboy pluto[14312]: | SPI 44 63 e5 f6
Oct 6 22:16:42 bigboy pluto[14312]: | *****emit ISAKMP Transform Payload (ESP):
Oct 6 22:16:42 bigboy pluto[14312]: | next payload type: ISAKMP_NEXT_NONE
Oct 6 22:16:42 bigboy pluto[14312]: | transform number: 0
Oct 6 22:16:42 bigboy pluto[14312]: | transform ID: 3DES_CBC
Oct 6 22:16:42 bigboy pluto[14312]: | ******emit ISAKMP IPsec DOI attribute:
Oct 6 22:16:42 bigboy pluto[14312]: | af+type: GROUP_DESCRIPTION
Oct 6 22:16:42 bigboy pluto[14312]: | length/value: 2
Oct 6 22:16:42 bigboy pluto[14312]: | [2 is MODP_1024]
Oct 6 22:16:42 bigboy pluto[14312]: | ******emit ISAKMP IPsec DOI attribute:
Oct 6 22:16:42 bigboy pluto[14312]: | af+type: ENCAPSULATION_MODE
Oct 6 22:16:42 bigboy pluto[14312]: | length/value: 1
Oct 6 22:16:42 bigboy pluto[14312]: | [1 is ENCAPSULATION_MODE_TUNNEL]
Oct 6 22:16:42 bigboy pluto[14312]: | ******emit ISAKMP IPsec DOI attribute:
Oct 6 22:16:42 bigboy pluto[14312]: | af+type: SA_LIFE_TYPE
Oct 6 22:16:42 bigboy pluto[14312]: | length/value: 1
Oct 6 22:16:42 bigboy pluto[14312]: | [1 is SA_LIFE_TYPE_SECONDS]
Oct 6 22:16:42 bigboy pluto[14312]: | ******emit ISAKMP IPsec DOI attribute:
Oct 6 22:16:42 bigboy pluto[14312]: | af+type: SA_LIFE_DURATION
Oct 6 22:16:42 bigboy pluto[14312]: | length/value: 3600
Oct 6 22:16:42 bigboy pluto[14312]: | ******emit ISAKMP IPsec DOI attribute:
Oct 6 22:16:42 bigboy pluto[14312]: | af+type: AUTH_ALGORITHM
Oct 6 22:16:42 bigboy pluto[14312]: | length/value: 1
Oct 6 22:16:42 bigboy pluto[14312]: | [1 is HMAC_MD5]
Oct 6 22:16:42 bigboy pluto[14312]: | emitting length of ISAKMP Transform Payload (ESP): 28
Oct 6 22:16:42 bigboy pluto[14312]: | emitting length of ISAKMP Proposal Payload: 40
Oct 6 22:16:42 bigboy pluto[14312]: | emitting length of ISAKMP Security Association Payload: 52
Далее идет обмен ключами и т.д. и в конце:
Oct 6 22:17:13 bigboy pluto[14312]: | last Phase 1 IV: 4a 5c ad e6 52 59 bc ad
Oct 6 22:17:13 bigboy pluto[14312]: | computed Phase 2 IV:
Oct 6 22:17:13 bigboy pluto[14312]: | 2e 9f bd 3b e6 40 3c 8e 25 c9 50 1f fd 40 c1 58
Oct 6 22:17:13 bigboy pluto[14312]: "dlink" #1: received ModeCfg message when in state STATE_MAIN_I4, and we aren't mode config client
Oct 6 22:17:13 bigboy pluto[14312]: | next event EVENT_RETRANSMIT in 39 seconds for #2
Oct 6 22:17:33 bigboy vsftpd: Wed Oct 6 22:17:33 2010 [pid 14791] CONNECT: Client "127.0.0.1"
Oct 6 22:17:52 bigboy pluto[14312]: |
Oct 6 22:17:52 bigboy pluto[14312]: | *time to handle event
Oct 6 22:17:52 bigboy pluto[14312]: | event after this is EVENT_REINIT_SECRET in 3462 seconds
Oct 6 22:17:52 bigboy pluto[14312]: | handling event EVENT_RETRANSMIT for XX.XX.XX.YY "dlink" #2
Oct 6 22:17:52 bigboy pluto[14312]: "dlink" #2: max number of retransmissions (2) reached STATE_QUICK_I1. No acceptable response to our first Quick Mode message: perhaps peer likes no proposal
Oct 6 22:17:52 bigboy pluto[14312]: | ICOOKIE: c9 05 3e b0 2b 2a 07 ba
Oct 6 22:17:52 bigboy pluto[14312]: | RCOOKIE: 2c 4d ce 40 58 2d 24 4f
Oct 6 22:17:52 bigboy pluto[14312]: | peer: 5d bc 2c 05
Oct 6 22:17:52 bigboy pluto[14312]: | state hash entry 1
Oct 6 22:17:52 bigboy pluto[14312]: | next event EVENT_REINIT_SECRET in 3462 seconds
bigboy:~ # less /home/gzhukov/ipsec.log
Oct 6 22:17:12 bigboy pluto[14312]: | ed 58 ff aa f3 83 2c 66 d9 8d aa 26 52 7e 22 35
Oct 6 22:17:12 bigboy pluto[14312]: | 7c 27 6e c1 a7 8d 65 cf 49 f9 c2 eb 6e 9c fb bd
Oct 6 22:17:12 bigboy pluto[14312]: | 02 32 cb 7a 0a 98 83 75 d6 75 57 43 88 76 ba 7f
Oct 6 22:17:12 bigboy pluto[14312]: | 95 ee 00 a7 e4 61 83 86 62 f4 ac 4b 4f 6c cb 34
Oct 6 22:17:12 bigboy pluto[14312]: | cc 1e 6e 15 35 ef c9 f2 0c d2 ef 0e 0e 91 d6 ff
Oct 6 22:17:12 bigboy pluto[14312]: | 72 d8 45 90 43 5f cb a1 cd fa 48 75 86 ca 53 83
Oct 6 22:17:12 bigboy pluto[14312]: | 74 b1 4d e5 67 6f 0b 63 82 57 4c e0 96 22 dd 7e
Oct 6 22:17:12 bigboy pluto[14312]: | ad 9b 4f 4f c1 8e 41 94 0e 79 9d 29 a4 a3 ee 82
Oct 6 22:17:12 bigboy pluto[14312]: | 66 2c b5 38 a1 47 d5 ad 41 a1 38 b4 da 11 c3 fa
Oct 6 22:17:12 bigboy pluto[14312]: | 76 27 32 9c 7d a2 63 8e af fd 68 fc e3 b0 c8 92
Oct 6 22:17:12 bigboy pluto[14312]: | e3 b8 15 6b 1a 48 2f 0e 7f 2e 79 4d e4 13 f7 31
Oct 6 22:17:12 bigboy pluto[14312]: | 3e 09 86 2d 80 0f e6 34 57 6e 69 3d f1 fb df 49
Oct 6 22:17:12 bigboy pluto[14312]: | ad 17 72 c3 f2 a1 4c 6a ce aa ed 6e d9 f2 51 a4
Oct 6 22:17:12 bigboy pluto[14312]: | ef 84 67 f6 45 54 a9 5f 6d 79 02 f6
Oct 6 22:17:12 bigboy pluto[14312]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #2
Oct 6 22:17:12 bigboy pluto[14312]: | next event EVENT_RETRANSMIT in 40 seconds for #2
Oct 6 22:17:13 bigboy pluto[14312]: |
Oct 6 22:17:13 bigboy pluto[14312]: | *received 68 bytes from XX.XX.XX.YY:500 on eth0
Oct 6 22:17:13 bigboy pluto[14312]: | c9 05 3e b0 2b 2a 07 ba 2c 4d ce 40 58 2d 24 4f
Oct 6 22:17:13 bigboy pluto[14312]: | 08 10 06 01 c0 4e da a5 00 00 00 44 78 f5 c3 d5
Oct 6 22:17:13 bigboy pluto[14312]: | 1e 4e a6 5f e1 95 e4 14 ed 83 e3 8b 7b ae 5b c1
Oct 6 22:17:13 bigboy pluto[14312]: | 6a e8 8a 10 51 fc bc 36 a8 04 a8 39 2b f2 9c 85
Oct 6 22:17:13 bigboy pluto[14312]: | bb 2d 8c eb
Oct 6 22:17:13 bigboy pluto[14312]: | **parse ISAKMP Message:
Oct 6 22:17:13 bigboy pluto[14312]: | initiator cookie:
Oct 6 22:17:13 bigboy pluto[14312]: | c9 05 3e b0 2b 2a 07 ba
Oct 6 22:17:13 bigboy pluto[14312]: | responder cookie:
Oct 6 22:17:13 bigboy pluto[14312]: | 2c 4d ce 40 58 2d 24 4f
Oct 6 22:17:13 bigboy pluto[14312]: | next payload type: ISAKMP_NEXT_HASH
Oct 6 22:17:13 bigboy pluto[14312]: | ISAKMP version: ISAKMP Version 1.0
Oct 6 22:17:13 bigboy pluto[14312]: | exchange type: ISAKMP_XCHG_MODE_CFG
Oct 6 22:17:13 bigboy pluto[14312]: | flags: ISAKMP_FLAG_ENCRYPTION
Oct 6 22:17:13 bigboy pluto[14312]: | message ID: c0 4e da a5
Oct 6 22:17:13 bigboy pluto[14312]: | length: 68
Oct 6 22:17:13 bigboy pluto[14312]: | ICOOKIE: c9 05 3e b0 2b 2a 07 ba
Oct 6 22:17:13 bigboy pluto[14312]: | RCOOKIE: 2c 4d ce 40 58 2d 24 4f
Oct 6 22:17:13 bigboy pluto[14312]: | peer: 5d bc 2c 05
Oct 6 22:17:13 bigboy pluto[14312]: | state hash entry 1
Oct 6 22:17:13 bigboy pluto[14312]: | state object not found
Oct 6 22:17:13 bigboy pluto[14312]: | ICOOKIE: c9 05 3e b0 2b 2a 07 ba
Oct 6 22:17:13 bigboy pluto[14312]: | RCOOKIE: 2c 4d ce 40 58 2d 24 4f
Oct 6 22:17:13 bigboy pluto[14312]: | peer: 5d bc 2c 05
Oct 6 22:17:13 bigboy pluto[14312]: | state hash entry 1
Oct 6 22:17:13 bigboy pluto[14312]: | state object #1 found, in STATE_MAIN_I4
Oct 6 22:17:13 bigboy pluto[14312]: | last Phase 1 IV: 4a 5c ad e6 52 59 bc ad
Oct 6 22:17:13 bigboy pluto[14312]: | computed Phase 2 IV:
Oct 6 22:17:13 bigboy pluto[14312]: | 2e 9f bd 3b e6 40 3c 8e 25 c9 50 1f fd 40 c1 58
Oct 6 22:17:13 bigboy pluto[14312]: "dlink" #1: received ModeCfg message when in state STATE_MAIN_I4, and we aren't
mode config client
Oct 6 22:17:13 bigboy pluto[14312]: | next event EVENT_RETRANSMIT in 39 seconds for #2
Oct 6 22:17:33 bigboy vsftpd: Wed Oct 6 22:17:33 2010 [pid 14791] CONNECT: Client "127.0.0.1"
Oct 6 22:17:52 bigboy pluto[14312]: |
Oct 6 22:17:52 bigboy pluto[14312]: | *time to handle event
Oct 6 22:17:52 bigboy pluto[14312]: | event after this is EVENT_REINIT_SECRET in 3462 seconds
Oct 6 22:17:52 bigboy pluto[14312]: | handling event EVENT_RETRANSMIT for XX.XX.XX.YY "dlink" #2
Oct 6 22:17:52 bigboy pluto[14312]: "dlink" #2: max number of retransmissions (2) reached STATE_QUICK_I1. No accep
table response to our first Quick Mode message: perhaps peer likes no proposal
Oct 6 22:17:52 bigboy pluto[14312]: | ICOOKIE: c9 05 3e b0 2b 2a 07 ba
Oct 6 22:17:52 bigboy pluto[14312]: | RCOOKIE: 2c 4d ce 40 58 2d 24 4f
Oct 6 22:17:52 bigboy pluto[14312]: | peer: 5d bc 2c 05
Oct 6 22:17:52 bigboy pluto[14312]: | state hash entry 1
Oct 6 22:17:52 bigboy pluto[14312]: | next event EVENT_REINIT_SECRET in 3462 seconds