1
|
Jan 30 08:30:35 ipsec_starter[37500]: Starting strongSwan 5.6.0 IPsec [starter]...
|
2
|
Jan 30 08:30:35 ipsec_starter[37500]: no netkey IPsec stack detected
|
3
|
Jan 30 08:30:35 ipsec_starter[37500]: no KLIPS IPsec stack detected
|
4
|
Jan 30 08:30:35 ipsec_starter[37500]: no known IPsec stack detected, ignoring!
|
5
|
Jan 30 08:30:35 charon: 00[DMN] Starting IKE charon daemon (strongSwan 5.6.0, FreeBSD 11.1-RELEASE-p6, amd64)
|
6
|
Jan 30 08:30:35 charon: 00[KNL] unable to set UDP_ENCAP: Invalid argument
|
7
|
Jan 30 08:30:35 charon: 00[NET] enabling UDP decapsulation for IPv6 on port 4500 failed
|
8
|
Jan 30 08:30:36 charon: 00[CFG] loading unbound resolver config from '/etc/resolv.conf'
|
9
|
Jan 30 08:30:36 charon: 00[CFG] loading unbound trust anchors from '/usr/local/etc/ipsec.d/dnssec.keys'
|
10
|
Jan 30 08:30:36 charon: 00[CFG] ipseckey plugin is disabled
|
11
|
Jan 30 08:30:36 charon: 00[CFG] loading ca certificates from '/usr/local/etc/ipsec.d/cacerts'
|
12
|
Jan 30 08:30:36 charon: 00[CFG] loading aa certificates from '/usr/local/etc/ipsec.d/aacerts'
|
13
|
Jan 30 08:30:36 charon: 00[CFG] loading ocsp signer certificates from '/usr/local/etc/ipsec.d/ocspcerts'
|
14
|
Jan 30 08:30:36 charon: 00[CFG] loading attribute certificates from '/usr/local/etc/ipsec.d/acerts'
|
15
|
Jan 30 08:30:36 charon: 00[CFG] loading crls from '/usr/local/etc/ipsec.d/crls'
|
16
|
Jan 30 08:30:36 charon: 00[CFG] loading secrets from '/var/etc/ipsec/ipsec.secrets'
|
17
|
Jan 30 08:30:36 charon: 00[CFG] loaded IKE secret for %any
|
18
|
Jan 30 08:30:36 charon: 00[CFG] opening triplet file /usr/local/etc/ipsec.d/triplets.dat failed: No such file or directory
|
19
|
Jan 30 08:30:36 charon: 00[CFG] loaded 0 RADIUS server configurations
|
20
|
Jan 30 08:30:36 charon: 00[LIB] loaded plugins: charon unbound aes des blowfish rc2 sha2 sha1 md4 md5 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey ipseckey pem openssl fips-prf curve25519 xcbc cmac hmac curl attr kernel-pfkey kernel-pfroute resolve socket-default stroke vici updown eap-identity eap-sim eap-md5 eap-mschapv2 eap-dynamic eap-radius eap-tls eap-ttls eap-peap xauth-generic xauth-eap whitelist addrblock
|
21
|
Jan 30 08:30:36 charon: 00[JOB] spawning 16 worker threads
|
22
|
Jan 30 08:30:36 ipsec_starter[37980]: charon (38289) started after 140 ms
|
23
|
Jan 30 08:30:36 charon: 01[CFG] received stroke: add connection 'bypasslan'
|
24
|
Jan 30 08:30:36 charon: 01[CFG] conn bypasslan
|
25
|
Jan 30 08:30:36 charon: 01[CFG] left=%any
|
26
|
Jan 30 08:30:36 charon: 01[CFG] leftsubnet=10.0.0.0/16
|
27
|
Jan 30 08:30:36 charon: 01[CFG] right=%any
|
28
|
Jan 30 08:30:36 charon: 01[CFG] rightsubnet=10.0.0.0/16
|
29
|
Jan 30 08:30:36 charon: 01[CFG] ike=aes128-sha256-curve25519
|
30
|
Jan 30 08:30:36 charon: 01[CFG] esp=aes128-sha256
|
31
|
Jan 30 08:30:36 charon: 01[CFG] dpddelay=30
|
32
|
Jan 30 08:30:36 charon: 01[CFG] dpdtimeout=150
|
33
|
Jan 30 08:30:36 charon: 01[CFG] sha256_96=no
|
34
|
Jan 30 08:30:36 charon: 01[CFG] mediation=no
|
35
|
Jan 30 08:30:36 charon: 01[CFG] added configuration 'bypasslan'
|
36
|
Jan 30 08:30:36 charon: 05[CFG] received stroke: route 'bypasslan'
|
37
|
Jan 30 08:30:36 charon: 05[CFG] proposing traffic selectors for us:
|
38
|
Jan 30 08:30:36 charon: 05[CFG] 10.0.0.0/16|/0
|
39
|
Jan 30 08:30:36 charon: 05[CFG] proposing traffic selectors for other:
|
40
|
Jan 30 08:30:36 charon: 05[CFG] 10.0.0.0/16|/0
|
41
|
Jan 30 08:30:36 ipsec_starter[37980]: 'bypasslan' shunt PASS policy installed
|
42
|
Jan 30 08:30:36 ipsec_starter[37980]:
|
43
|
Jan 30 08:30:36 charon: 15[CFG] received stroke: add connection 'con1'
|
44
|
Jan 30 08:30:36 charon: 15[CFG] conn con1
|
45
|
Jan 30 08:30:36 charon: 15[CFG] left=%any
|
46
|
Jan 30 08:30:36 charon: 15[CFG] leftauth=psk
|
47
|
Jan 30 08:30:36 charon: 15[CFG] leftid=PFSENSE.WAN.IP.ADDRESS
|
48
|
Jan 30 08:30:36 charon: 15[CFG] right=%any
|
49
|
Jan 30 08:30:36 charon: 15[CFG] rightauth=psk
|
50
|
Jan 30 08:30:36 charon: 15[CFG] ike=aes256-sha256-modp2048!
|
51
|
Jan 30 08:30:36 charon: 15[CFG] esp=aes128-sha256!
|
52
|
Jan 30 08:30:36 charon: 15[CFG] dpddelay=10
|
53
|
Jan 30 08:30:36 charon: 15[CFG] dpdtimeout=60
|
54
|
Jan 30 08:30:36 charon: 15[CFG] dpdaction=1
|
55
|
Jan 30 08:30:36 charon: 15[CFG] sha256_96=no
|
56
|
Jan 30 08:30:36 charon: 15[CFG] mediation=no
|
57
|
Jan 30 08:30:36 charon: 15[CFG] added configuration 'con1'
|
58
|
Jan 30 08:39:39 charon: 13[CFG] rereading secrets
|
59
|
Jan 30 08:39:39 charon: 13[CFG] loading secrets from '/var/etc/ipsec/ipsec.secrets'
|
60
|
Jan 30 08:39:39 charon: 13[CFG] loaded IKE secret for %any
|
61
|
Jan 30 08:39:39 charon: 13[CFG] rereading ca certificates from '/usr/local/etc/ipsec.d/cacerts'
|
62
|
Jan 30 08:39:39 charon: 13[CFG] rereading aa certificates from '/usr/local/etc/ipsec.d/aacerts'
|
63
|
Jan 30 08:39:39 charon: 13[CFG] rereading ocsp signer certificates from '/usr/local/etc/ipsec.d/ocspcerts'
|
64
|
Jan 30 08:39:39 charon: 13[CFG] rereading attribute certificates from '/usr/local/etc/ipsec.d/acerts'
|
65
|
Jan 30 08:39:39 charon: 13[CFG] rereading crls from '/usr/local/etc/ipsec.d/crls'
|
66
|
Jan 30 08:39:39 charon: 13[CFG] received stroke: unroute 'bypasslan'
|
67
|
Jan 30 08:39:39 charon: 13[CFG] proposing traffic selectors for us:
|
68
|
Jan 30 08:39:39 charon: 13[CFG] 10.0.0.0/16|/0
|
69
|
Jan 30 08:39:39 charon: 13[CFG] proposing traffic selectors for other:
|
70
|
Jan 30 08:39:39 charon: 13[CFG] 10.0.0.0/16|/0
|
71
|
Jan 30 08:39:39 ipsec_starter[37980]: shunt policy 'bypasslan' uninstalled
|
72
|
Jan 30 08:39:39 ipsec_starter[37980]:
|
73
|
Jan 30 08:39:39 charon: 12[CFG] received stroke: delete connection 'bypasslan'
|
74
|
Jan 30 08:39:39 charon: 12[CFG] deleted connection 'bypasslan'
|
75
|
Jan 30 08:39:39 charon: 12[CFG] received stroke: delete connection 'con1'
|
76
|
Jan 30 08:39:39 charon: 12[CFG] deleted connection 'con1'
|
77
|
Jan 30 08:39:39 charon: 12[CFG] received stroke: add connection 'bypasslan'
|
78
|
Jan 30 08:39:39 charon: 12[CFG] conn bypasslan
|
79
|
Jan 30 08:39:39 charon: 12[CFG] left=%any
|
80
|
Jan 30 08:39:39 charon: 12[CFG] leftsubnet=10.0.0.0/16
|
81
|
Jan 30 08:39:39 charon: 12[CFG] right=%any
|
82
|
Jan 30 08:39:39 charon: 12[CFG] rightsubnet=10.0.0.0/16
|
83
|
Jan 30 08:39:39 charon: 12[CFG] ike=aes128-sha256-curve25519
|
84
|
Jan 30 08:39:39 charon: 12[CFG] esp=aes128-sha256
|
85
|
Jan 30 08:39:39 charon: 12[CFG] dpddelay=30
|
86
|
Jan 30 08:39:39 charon: 12[CFG] dpdtimeout=150
|
87
|
Jan 30 08:39:39 charon: 12[CFG] sha256_96=no
|
88
|
Jan 30 08:39:39 charon: 12[CFG] mediation=no
|
89
|
Jan 30 08:39:39 charon: 12[CFG] added configuration 'bypasslan'
|
90
|
Jan 30 08:39:39 charon: 10[CFG] received stroke: route 'bypasslan'
|
91
|
Jan 30 08:39:39 charon: 10[CFG] proposing traffic selectors for us:
|
92
|
Jan 30 08:39:39 charon: 10[CFG] 10.0.0.0/16|/0
|
93
|
Jan 30 08:39:39 charon: 10[CFG] proposing traffic selectors for other:
|
94
|
Jan 30 08:39:39 charon: 10[CFG] 10.0.0.0/16|/0
|
95
|
Jan 30 08:39:39 ipsec_starter[37980]: 'bypasslan' shunt PASS policy installed
|
96
|
Jan 30 08:39:39 ipsec_starter[37980]:
|
97
|
Jan 30 08:39:39 charon: 11[CFG] received stroke: add connection 'con1'
|
98
|
Jan 30 08:39:39 charon: 11[CFG] conn con1
|
99
|
Jan 30 08:39:39 charon: 11[CFG] left=%any
|
100
|
Jan 30 08:39:39 charon: 11[CFG] leftauth=psk
|
101
|
Jan 30 08:39:39 charon: 11[CFG] leftid=PFSENSE.WAN.IP.ADDRESS
|
102
|
Jan 30 08:39:39 charon: 11[CFG] right=%any
|
103
|
Jan 30 08:39:39 charon: 11[CFG] rightauth=psk
|
104
|
Jan 30 08:39:39 charon: 11[CFG] ike=aes256-sha256-modp2048!
|
105
|
Jan 30 08:39:39 charon: 11[CFG] esp=aes128-sha512!
|
106
|
Jan 30 08:39:39 charon: 11[CFG] dpddelay=10
|
107
|
Jan 30 08:39:39 charon: 11[CFG] dpdtimeout=60
|
108
|
Jan 30 08:39:39 charon: 11[CFG] dpdaction=1
|
109
|
Jan 30 08:39:39 charon: 11[CFG] sha256_96=no
|
110
|
Jan 30 08:39:39 charon: 11[CFG] mediation=no
|
111
|
Jan 30 08:39:39 charon: 11[CFG] added configuration 'con1'
|
112
|
Jan 30 08:40:04 charon: 11[NET] <1> received packet: from PHONE.4G.IP.ADDRESS[11688] to PFSENSE.WAN.IP.ADDRESS[500] (580 bytes)
|
113
|
Jan 30 08:40:04 charon: 11[ENC] <1> parsed ID_PROT request 0 [ SA V V V V V V ]
|
114
|
Jan 30 08:40:04 charon: 11[CFG] <1> looking for an ike config for PFSENSE.WAN.IP.ADDRESS...PHONE.4G.IP.ADDRESS
|
115
|
Jan 30 08:40:04 charon: 11[CFG] <1> candidate: %any...%any, prio 24
|
116
|
Jan 30 08:40:04 charon: 11[CFG] <1> candidate: %any...%any, prio 24
|
117
|
Jan 30 08:40:04 charon: 11[CFG] <1> found matching ike config: %any...%any with prio 24
|
118
|
Jan 30 08:40:04 charon: 11[IKE] <1> received NAT-T (RFC 3947) vendor ID
|
119
|
Jan 30 08:40:04 charon: 11[IKE] <1> received draft-ietf-ipsec-nat-t-ike-02 vendor ID
|
120
|
Jan 30 08:40:04 charon: 11[IKE] <1> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
|
121
|
Jan 30 08:40:04 charon: 11[IKE] <1> received draft-ietf-ipsec-nat-t-ike-00 vendor ID
|
122
|
Jan 30 08:40:04 charon: 11[IKE] <1> received FRAGMENTATION vendor ID
|
123
|
Jan 30 08:40:04 charon: 11[IKE] <1> received DPD vendor ID
|
124
|
Jan 30 08:40:04 charon: 11[IKE] <1> PHONE.4G.IP.ADDRESS is initiating a Main Mode IKE_SA
|
125
|
Jan 30 08:40:04 charon: 11[IKE] <1> IKE_SA (unnamed)[1] state change: CREATED => CONNECTING
|
126
|
Jan 30 08:40:04 charon: 11[CFG] <1> selecting proposal:
|
127
|
Jan 30 08:40:04 charon: 11[CFG] <1> no acceptable ENCRYPTION_ALGORITHM found
|
128
|
Jan 30 08:40:04 charon: 11[CFG] <1> selecting proposal:
|
129
|
Jan 30 08:40:04 charon: 11[CFG] <1> no acceptable ENCRYPTION_ALGORITHM found
|
130
|
Jan 30 08:40:04 charon: 11[CFG] <1> selecting proposal:
|
131
|
Jan 30 08:40:04 charon: 11[CFG] <1> no acceptable ENCRYPTION_ALGORITHM found
|
132
|
Jan 30 08:40:04 charon: 11[CFG] <1> selecting proposal:
|
133
|
Jan 30 08:40:04 charon: 11[CFG] <1> no acceptable PSEUDO_RANDOM_FUNCTION found
|
134
|
Jan 30 08:40:04 charon: 11[CFG] <1> selecting proposal:
|
135
|
Jan 30 08:40:04 charon: 11[CFG] <1> no acceptable PSEUDO_RANDOM_FUNCTION found
|
136
|
Jan 30 08:40:04 charon: 11[CFG] <1> selecting proposal:
|
137
|
Jan 30 08:40:04 charon: 11[CFG] <1> no acceptable DIFFIE_HELLMAN_GROUP found
|
138
|
Jan 30 08:40:04 charon: 11[CFG] <1> selecting proposal:
|
139
|
Jan 30 08:40:04 charon: 11[CFG] <1> no acceptable ENCRYPTION_ALGORITHM found
|
140
|
Jan 30 08:40:04 charon: 11[CFG] <1> selecting proposal:
|
141
|
Jan 30 08:40:04 charon: 11[CFG] <1> no acceptable ENCRYPTION_ALGORITHM found
|
142
|
Jan 30 08:40:04 charon: 11[CFG] <1> selecting proposal:
|
143
|
Jan 30 08:40:04 charon: 11[CFG] <1> no acceptable ENCRYPTION_ALGORITHM found
|
144
|
Jan 30 08:40:04 charon: 11[CFG] <1> selecting proposal:
|
145
|
Jan 30 08:40:04 charon: 11[CFG] <1> no acceptable ENCRYPTION_ALGORITHM found
|
146
|
Jan 30 08:40:04 charon: 11[CFG] <1> selecting proposal:
|
147
|
Jan 30 08:40:04 charon: 11[CFG] <1> no acceptable ENCRYPTION_ALGORITHM found
|
148
|
Jan 30 08:40:04 charon: 11[CFG] <1> selecting proposal:
|
149
|
Jan 30 08:40:04 charon: 11[CFG] <1> no acceptable ENCRYPTION_ALGORITHM found
|
150
|
Jan 30 08:40:04 charon: 11[CFG] <1> selecting proposal:
|
151
|
Jan 30 08:40:04 charon: 11[CFG] <1> proposal matches
|
152
|
Jan 30 08:40:04 charon: 11[CFG] <1> received proposals: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024, IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_128/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024, IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024, IKE:DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
|
153
|
Jan 30 08:40:04 charon: 11[CFG] <1> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
|
154
|
Jan 30 08:40:04 charon: 11[CFG] <1> selected proposal: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
|
155
|
Jan 30 08:40:04 charon: 11[IKE] <1> sending XAuth vendor ID
|
156
|
Jan 30 08:40:04 charon: 11[IKE] <1> sending DPD vendor ID
|
157
|
Jan 30 08:40:04 charon: 11[IKE] <1> sending FRAGMENTATION vendor ID
|
158
|
Jan 30 08:40:04 charon: 11[IKE] <1> sending NAT-T (RFC 3947) vendor ID
|
159
|
Jan 30 08:40:04 charon: 11[ENC] <1> generating ID_PROT response 0 [ SA V V V V ]
|
160
|
Jan 30 08:40:04 charon: 11[NET] <1> sending packet: from PFSENSE.WAN.IP.ADDRESS[500] to PHONE.4G.IP.ADDRESS[11688] (160 bytes)
|
161
|
Jan 30 08:40:04 charon: 10[NET] <1> received packet: from PHONE.4G.IP.ADDRESS[11688] to PFSENSE.WAN.IP.ADDRESS[500] (228 bytes)
|
162
|
Jan 30 08:40:04 charon: 10[ENC] <1> parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
|
163
|
Jan 30 08:40:04 charon: 10[IKE] <1> remote host is behind NAT
|
164
|
Jan 30 08:40:04 charon: 10[CFG] <1> candidate "bypasslan", match: 1/1/24 (me/other/ike)
|
165
|
Jan 30 08:40:04 charon: 10[CFG] <1> candidate "con1", match: 1/1/24 (me/other/ike)
|
166
|
Jan 30 08:40:04 charon: 10[ENC] <1> generating ID_PROT response 0 [ KE No NAT-D NAT-D ]
|
167
|
Jan 30 08:40:04 charon: 10[NET] <1> sending packet: from PFSENSE.WAN.IP.ADDRESS[500] to PHONE.4G.IP.ADDRESS[11688] (244 bytes)
|
168
|
Jan 30 08:40:04 charon: 10[NET] <1> received packet: from PHONE.4G.IP.ADDRESS[5004] to PFSENSE.WAN.IP.ADDRESS[4500] (92 bytes)
|
169
|
Jan 30 08:40:04 charon: 10[ENC] <1> parsed ID_PROT request 0 [ ID HASH ]
|
170
|
Jan 30 08:40:04 charon: 10[CFG] <1> looking for pre-shared key peer configs matching PFSENSE.WAN.IP.ADDRESS...PHONE.4G.IP.ADDRESS[100.100.206.219]
|
171
|
Jan 30 08:40:04 charon: 10[CFG] <1> candidate "bypasslan", match: 1/1/24 (me/other/ike)
|
172
|
Jan 30 08:40:04 charon: 10[CFG] <1> candidate "con1", match: 1/1/24 (me/other/ike)
|
173
|
Jan 30 08:40:04 charon: 10[CFG] <1> selected peer config "con1"
|
174
|
Jan 30 08:40:04 charon: 10[IKE] <con1|1> IKE_SA con1[1] established between PFSENSE.WAN.IP.ADDRESS[PFSENSE.WAN.IP.ADDRESS]...PHONE.4G.IP.ADDRESS[100.100.206.219]
|
175
|
Jan 30 08:40:04 charon: 10[IKE] <con1|1> IKE_SA con1[1] state change: CONNECTING => ESTABLISHED
|
176
|
Jan 30 08:40:04 charon: 10[IKE] <con1|1> scheduling reauthentication in 28251s
|
177
|
Jan 30 08:40:04 charon: 10[IKE] <con1|1> maximum IKE_SA lifetime 28791s
|
178
|
Jan 30 08:40:04 charon: 10[ENC] <con1|1> generating ID_PROT response 0 [ ID HASH ]
|
179
|
Jan 30 08:40:04 charon: 10[NET] <con1|1> sending packet: from PFSENSE.WAN.IP.ADDRESS[4500] to PHONE.4G.IP.ADDRESS[5004] (76 bytes)
|
180
|
Jan 30 08:40:04 charon: 12[NET] <con1|1> received packet: from PHONE.4G.IP.ADDRESS[5004] to PFSENSE.WAN.IP.ADDRESS[4500] (108 bytes)
|
181
|
Jan 30 08:40:04 charon: 12[ENC] <con1|1> parsed INFORMATIONAL_V1 request 3689217329 [ HASH N(INITIAL_CONTACT) ]
|
182
|
Jan 30 08:40:05 charon: 12[NET] <con1|1> received packet: from PHONE.4G.IP.ADDRESS[5004] to PFSENSE.WAN.IP.ADDRESS[4500] (460 bytes)
|
183
|
Jan 30 08:40:05 charon: 12[ENC] <con1|1> parsed QUICK_MODE request 4162421179 [ HASH SA No ID ID ]
|
184
|
Jan 30 08:40:05 charon: 12[IKE] <con1|1> changing received traffic selectors 100.100.206.219/32|/0[udp]=== PFSENSE.WAN.IP.ADDRESS/32|/0[udp/l2f] due to NAT
|
185
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> looking for a child config for PFSENSE.WAN.IP.ADDRESS/32|/0[udp/l2f] === PHONE.4G.IP.ADDRESS/32|/0[udp]
|
186
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> proposing traffic selectors for us:
|
187
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> PFSENSE.WAN.IP.ADDRESS/32|/0
|
188
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> proposing traffic selectors for other:
|
189
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> PHONE.4G.IP.ADDRESS/32|/0
|
190
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> candidate "con1" with prio 1+1
|
191
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> found matching child config "con1" with prio 2
|
192
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> selecting traffic selectors for other:
|
193
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> config: PHONE.4G.IP.ADDRESS/32|/0, received: PHONE.4G.IP.ADDRESS/32|/0[udp] => match: PHONE.4G.IP.ADDRESS/32|/0[udp]
|
194
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> selecting traffic selectors for us:
|
195
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> config: PFSENSE.WAN.IP.ADDRESS/32|/0, received: PFSENSE.WAN.IP.ADDRESS/32|/0[udp/l2f] => match: PFSENSE.WAN.IP.ADDRESS/32|/0[udp/l2f]
|
196
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> selecting proposal:
|
197
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
|
198
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> selecting proposal:
|
199
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
|
200
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> selecting proposal:
|
201
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
|
202
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> selecting proposal:
|
203
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> no acceptable INTEGRITY_ALGORITHM found
|
204
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> selecting proposal:
|
205
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> no acceptable INTEGRITY_ALGORITHM found
|
206
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> selecting proposal:
|
207
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> no acceptable INTEGRITY_ALGORITHM found
|
208
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> selecting proposal:
|
209
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
|
210
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> selecting proposal:
|
211
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
|
212
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> selecting proposal:
|
213
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
|
214
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> selecting proposal:
|
215
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
|
216
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> selecting proposal:
|
217
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
|
218
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> selecting proposal:
|
219
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
|
220
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> received proposals: ESP:AES_CBC_256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC_256/HMAC_MD5_96/NO_EXT_SEQ, ESP:AES_CBC_256/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_MD5_96/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_MD5_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_MD5_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA2_256_128/NO_EXT_SEQ
|
221
|
Jan 30 08:40:05 charon: 12[CFG] <con1|1> configured proposals: ESP:AES_CBC_128/HMAC_SHA2_512_256/NO_EXT_SEQ
|
222
|
Jan 30 08:40:05 charon: 12[IKE] <con1|1> received 28800s lifetime, configured 3600s
|
223
|
Jan 30 08:40:05 charon: 12[IKE] <con1|1> no matching proposal found, sending NO_PROPOSAL_CHOSEN
|
224
|
Jan 30 08:40:05 charon: 12[IKE] <con1|1> queueing INFORMATIONAL task
|
225
|
Jan 30 08:40:05 charon: 12[IKE] <con1|1> activating new tasks
|
226
|
Jan 30 08:40:05 charon: 12[IKE] <con1|1> activating INFORMATIONAL task
|
227
|
Jan 30 08:40:05 charon: 12[ENC] <con1|1> generating INFORMATIONAL_V1 request 227678193 [ HASH N(NO_PROP) ]
|
228
|
Jan 30 08:40:05 charon: 12[NET] <con1|1> sending packet: from PFSENSE.WAN.IP.ADDRESS[4500] to PHONE.4G.IP.ADDRESS[5004] (76 bytes)
|
229
|
Jan 30 08:40:05 charon: 12[IKE] <con1|1> activating new tasks
|
230
|
Jan 30 08:40:05 charon: 12[IKE] <con1|1> nothing to initiate
|
231
|
Jan 30 08:40:08 charon: 12[NET] <con1|1> received packet: from PHONE.4G.IP.ADDRESS[5004] to PFSENSE.WAN.IP.ADDRESS[4500] (460 bytes)
|
232
|
Jan 30 08:40:08 charon: 12[IKE] <con1|1> received retransmit of request with ID 4162421179, but no response to retransmit
|
233
|
Jan 30 08:40:12 charon: 12[NET] <con1|1> received packet: from PHONE.4G.IP.ADDRESS[5004] to PFSENSE.WAN.IP.ADDRESS[4500] (460 bytes)
|
234
|
Jan 30 08:40:12 charon: 12[IKE] <con1|1> received retransmit of request with ID 4162421179, but no response to retransmit
|
235
|
Jan 30 08:40:15 charon: 12[NET] <con1|1> received packet: from PHONE.4G.IP.ADDRESS[5004] to PFSENSE.WAN.IP.ADDRESS[4500] (460 bytes)
|
236
|
Jan 30 08:40:15 charon: 12[IKE] <con1|1> received retransmit of request with ID 4162421179, but no response to retransmit
|
237
|
Jan 30 08:40:15 charon: 12[IKE] <con1|1> sending DPD request
|
238
|
Jan 30 08:40:15 charon: 12[IKE] <con1|1> queueing ISAKMP_DPD task
|
239
|
Jan 30 08:40:15 charon: 12[IKE] <con1|1> activating new tasks
|
240
|
Jan 30 08:40:15 charon: 12[IKE] <con1|1> activating ISAKMP_DPD task
|
241
|
Jan 30 08:40:15 charon: 12[ENC] <con1|1> generating INFORMATIONAL_V1 request 3065278085 [ HASH N(DPD) ]
|
242
|
Jan 30 08:40:15 charon: 12[NET] <con1|1> sending packet: from PFSENSE.WAN.IP.ADDRESS[4500] to PHONE.4G.IP.ADDRESS[5004] (92 bytes)
|
243
|
Jan 30 08:40:15 charon: 12[IKE] <con1|1> activating new tasks
|
244
|
Jan 30 08:40:15 charon: 12[IKE] <con1|1> nothing to initiate
|
245
|
Jan 30 08:40:16 charon: 12[NET] <con1|1> received packet: from PHONE.4G.IP.ADDRESS[5004] to PFSENSE.WAN.IP.ADDRESS[4500] (108 bytes)
|
246
|
Jan 30 08:40:16 charon: 12[ENC] <con1|1> parsed INFORMATIONAL_V1 request 2520618926 [ HASH N(DPD_ACK) ]
|
247
|
Jan 30 08:40:16 charon: 12[IKE] <con1|1> activating new tasks
|
248
|
Jan 30 08:40:16 charon: 12[IKE] <con1|1> nothing to initiate
|
249
|
Jan 30 08:40:18 charon: 12[NET] <con1|1> received packet: from PHONE.4G.IP.ADDRESS[5004] to PFSENSE.WAN.IP.ADDRESS[4500] (460 bytes)
|
250
|
Jan 30 08:40:18 charon: 12[ENC] <con1|1> parsed QUICK_MODE request 4162421179 [ HASH SA No ID ID ]
|
251
|
Jan 30 08:40:18 charon: 12[ENC] <con1|1> received HASH payload does not match
|
252
|
Jan 30 08:40:18 charon: 12[IKE] <con1|1> integrity check failed
|
253
|
Jan 30 08:40:18 charon: 12[ENC] <con1|1> generating INFORMATIONAL_V1 request 2066252053 [ HASH N(INVAL_HASH) ]
|
254
|
Jan 30 08:40:18 charon: 12[NET] <con1|1> sending packet: from PFSENSE.WAN.IP.ADDRESS[4500] to PHONE.4G.IP.ADDRESS[5004] (76 bytes)
|
255
|
Jan 30 08:40:18 charon: 12[IKE] <con1|1> QUICK_MODE request with message ID 4162421179 processing failed
|
256
|
Jan 30 08:40:21 charon: 12[NET] <con1|1> received packet: from PHONE.4G.IP.ADDRESS[5004] to PFSENSE.WAN.IP.ADDRESS[4500] (460 bytes)
|
257
|
Jan 30 08:40:21 charon: 12[ENC] <con1|1> parsed QUICK_MODE request 4162421179 [ HASH SA No ID ID ]
|
258
|
Jan 30 08:40:21 charon: 12[ENC] <con1|1> received HASH payload does not match
|
259
|
Jan 30 08:40:21 charon: 12[IKE] <con1|1> integrity check failed
|
260
|
Jan 30 08:40:21 charon: 12[ENC] <con1|1> generating INFORMATIONAL_V1 request 2553682064 [ HASH N(INVAL_HASH) ]
|
261
|
Jan 30 08:40:21 charon: 12[NET] <con1|1> sending packet: from PFSENSE.WAN.IP.ADDRESS[4500] to PHONE.4G.IP.ADDRESS[5004] (76 bytes)
|
262
|
Jan 30 08:40:21 charon: 12[IKE] <con1|1> QUICK_MODE request with message ID 4162421179 processing failed
|
263
|
Jan 30 08:40:24 charon: 12[NET] <con1|1> received packet: from PHONE.4G.IP.ADDRESS[5004] to PFSENSE.WAN.IP.ADDRESS[4500] (460 bytes)
|
264
|
Jan 30 08:40:24 charon: 12[ENC] <con1|1> parsed QUICK_MODE request 4162421179 [ HASH SA No ID ID ]
|
265
|
Jan 30 08:40:24 charon: 12[IKE] <con1|1> changing received traffic selectors 100.100.206.219/32|/0[udp]=== PFSENSE.WAN.IP.ADDRESS/32|/0[udp/l2f] due to NAT
|
266
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> looking for a child config for PFSENSE.WAN.IP.ADDRESS/32|/0[udp/l2f] === PHONE.4G.IP.ADDRESS/32|/0[udp]
|
267
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> proposing traffic selectors for us:
|
268
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> PFSENSE.WAN.IP.ADDRESS/32|/0
|
269
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> proposing traffic selectors for other:
|
270
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> PHONE.4G.IP.ADDRESS/32|/0
|
271
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> candidate "con1" with prio 1+1
|
272
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> found matching child config "con1" with prio 2
|
273
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> selecting traffic selectors for other:
|
274
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> config: PHONE.4G.IP.ADDRESS/32|/0, received: PHONE.4G.IP.ADDRESS/32|/0[udp] => match: PHONE.4G.IP.ADDRESS/32|/0[udp]
|
275
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> selecting traffic selectors for us:
|
276
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> config: PFSENSE.WAN.IP.ADDRESS/32|/0, received: PFSENSE.WAN.IP.ADDRESS/32|/0[udp/l2f] => match: PFSENSE.WAN.IP.ADDRESS/32|/0[udp/l2f]
|
277
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> selecting proposal:
|
278
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
|
279
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> selecting proposal:
|
280
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
|
281
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> selecting proposal:
|
282
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
|
283
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> selecting proposal:
|
284
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> no acceptable INTEGRITY_ALGORITHM found
|
285
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> selecting proposal:
|
286
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> no acceptable INTEGRITY_ALGORITHM found
|
287
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> selecting proposal:
|
288
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> no acceptable INTEGRITY_ALGORITHM found
|
289
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> selecting proposal:
|
290
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
|
291
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> selecting proposal:
|
292
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
|
293
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> selecting proposal:
|
294
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
|
295
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> selecting proposal:
|
296
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
|
297
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> selecting proposal:
|
298
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
|
299
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> selecting proposal:
|
300
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
|
301
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> received proposals: ESP:AES_CBC_256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC_256/HMAC_MD5_96/NO_EXT_SEQ, ESP:AES_CBC_256/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_MD5_96/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_MD5_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_MD5_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA2_256_128/NO_EXT_SEQ
|
302
|
Jan 30 08:40:24 charon: 12[CFG] <con1|1> configured proposals: ESP:AES_CBC_128/HMAC_SHA2_512_256/NO_EXT_SEQ
|
303
|
Jan 30 08:40:24 charon: 12[IKE] <con1|1> received 28800s lifetime, configured 3600s
|
304
|
Jan 30 08:40:24 charon: 12[IKE] <con1|1> no matching proposal found, sending NO_PROPOSAL_CHOSEN
|
305
|
Jan 30 08:40:24 charon: 12[IKE] <con1|1> queueing INFORMATIONAL task
|
306
|
Jan 30 08:40:24 charon: 12[IKE] <con1|1> activating new tasks
|
307
|
Jan 30 08:40:24 charon: 12[IKE] <con1|1> activating INFORMATIONAL task
|
308
|
Jan 30 08:40:24 charon: 12[ENC] <con1|1> generating INFORMATIONAL_V1 request 2196097090 [ HASH N(NO_PROP) ]
|
309
|
Jan 30 08:40:24 charon: 12[NET] <con1|1> sending packet: from PFSENSE.WAN.IP.ADDRESS[4500] to PHONE.4G.IP.ADDRESS[5004] (76 bytes)
|
310
|
Jan 30 08:40:24 charon: 12[IKE] <con1|1> activating new tasks
|
311
|
Jan 30 08:40:24 charon: 12[IKE] <con1|1> nothing to initiate
|
312
|
Jan 30 08:40:27 charon: 10[NET] <con1|1> received packet: from PHONE.4G.IP.ADDRESS[5004] to PFSENSE.WAN.IP.ADDRESS[4500] (460 bytes)
|
313
|
Jan 30 08:40:27 charon: 10[IKE] <con1|1> received retransmit of request with ID 4162421179, but no response to retransmit
|
314
|
Jan 30 08:40:30 charon: 10[NET] <con1|1> received packet: from PHONE.4G.IP.ADDRESS[5004] to PFSENSE.WAN.IP.ADDRESS[4500] (460 bytes)
|
315
|
Jan 30 08:40:30 charon: 10[IKE] <con1|1> received retransmit of request with ID 4162421179, but no response to retransmit
|
316
|
Jan 30 08:40:33 charon: 10[NET] <con1|1> received packet: from PHONE.4G.IP.ADDRESS[5004] to PFSENSE.WAN.IP.ADDRESS[4500] (460 bytes)
|
317
|
Jan 30 08:40:33 charon: 10[IKE] <con1|1> received retransmit of request with ID 4162421179, but no response to retransmit
|
318
|
Jan 30 08:40:34 charon: 10[IKE] <con1|1> sending DPD request
|
319
|
Jan 30 08:40:34 charon: 10[IKE] <con1|1> queueing ISAKMP_DPD task
|
320
|
Jan 30 08:40:34 charon: 10[IKE] <con1|1> activating new tasks
|
321
|
Jan 30 08:40:34 charon: 10[IKE] <con1|1> activating ISAKMP_DPD task
|
322
|
Jan 30 08:40:34 charon: 10[ENC] <con1|1> generating INFORMATIONAL_V1 request 1560874215 [ HASH N(DPD) ]
|
323
|
Jan 30 08:40:34 charon: 10[NET] <con1|1> sending packet: from PFSENSE.WAN.IP.ADDRESS[4500] to PHONE.4G.IP.ADDRESS[5004] (92 bytes)
|
324
|
Jan 30 08:40:34 charon: 10[IKE] <con1|1> activating new tasks
|
325
|
Jan 30 08:40:34 charon: 10[IKE] <con1|1> nothing to initiate
|
326
|
Jan 30 08:40:34 charon: 10[NET] <con1|1> received packet: from PHONE.4G.IP.ADDRESS[5004] to PFSENSE.WAN.IP.ADDRESS[4500] (108 bytes)
|
327
|
Jan 30 08:40:34 charon: 10[ENC] <con1|1> parsed INFORMATIONAL_V1 request 3555995187 [ HASH N(DPD_ACK) ]
|
328
|
Jan 30 08:40:34 charon: 10[IKE] <con1|1> activating new tasks
|
329
|
Jan 30 08:40:34 charon: 10[IKE] <con1|1> nothing to initiate
|
330
|
Jan 30 08:40:45 charon: 10[IKE] <con1|1> sending DPD request
|
331
|
Jan 30 08:40:45 charon: 10[IKE] <con1|1> queueing ISAKMP_DPD task
|
332
|
Jan 30 08:40:45 charon: 10[IKE] <con1|1> activating new tasks
|
333
|
Jan 30 08:40:45 charon: 10[IKE] <con1|1> activating ISAKMP_DPD task
|
334
|
Jan 30 08:40:45 charon: 10[ENC] <con1|1> generating INFORMATIONAL_V1 request 1823026341 [ HASH N(DPD) ]
|
335
|
Jan 30 08:40:45 charon: 10[NET] <con1|1> sending packet: from PFSENSE.WAN.IP.ADDRESS[4500] to PHONE.4G.IP.ADDRESS[5004] (92 bytes)
|
336
|
Jan 30 08:40:45 charon: 10[IKE] <con1|1> activating new tasks
|
337
|
Jan 30 08:40:45 charon: 10[IKE] <con1|1> nothing to initiate
|
338
|
Jan 30 08:40:55 charon: 10[IKE] <con1|1> sending DPD request
|
339
|
Jan 30 08:40:55 charon: 10[IKE] <con1|1> queueing ISAKMP_DPD task
|
340
|
Jan 30 08:40:55 charon: 10[IKE] <con1|1> activating new tasks
|
341
|
Jan 30 08:40:55 charon: 10[IKE] <con1|1> activating ISAKMP_DPD task
|
342
|
Jan 30 08:40:55 charon: 10[ENC] <con1|1> generating INFORMATIONAL_V1 request 1160826629 [ HASH N(DPD) ]
|
343
|
Jan 30 08:40:55 charon: 10[NET] <con1|1> sending packet: from PFSENSE.WAN.IP.ADDRESS[4500] to PHONE.4G.IP.ADDRESS[5004] (92 bytes)
|
344
|
Jan 30 08:40:55 charon: 10[IKE] <con1|1> activating new tasks
|
345
|
Jan 30 08:40:55 charon: 10[IKE] <con1|1> nothing to initiate
|
346
|
Jan 30 08:41:05 charon: 10[IKE] <con1|1> sending DPD request
|
347
|
Jan 30 08:41:05 charon: 10[IKE] <con1|1> queueing ISAKMP_DPD task
|
348
|
Jan 30 08:41:05 charon: 10[IKE] <con1|1> activating new tasks
|
349
|
Jan 30 08:41:05 charon: 10[IKE] <con1|1> activating ISAKMP_DPD task
|
350
|
Jan 30 08:41:05 charon: 10[ENC] <con1|1> generating INFORMATIONAL_V1 request 1558937606 [ HASH N(DPD) ]
|
351
|
Jan 30 08:41:05 charon: 10[NET] <con1|1> sending packet: from PFSENSE.WAN.IP.ADDRESS[4500] to PHONE.4G.IP.ADDRESS[5004] (92 bytes)
|
352
|
Jan 30 08:41:05 charon: 10[IKE] <con1|1> activating new tasks
|
353
|
Jan 30 08:41:05 charon: 10[IKE] <con1|1> nothing to initiate
|
354
|
Jan 30 08:41:15 charon: 10[IKE] <con1|1> sending DPD request
|
355
|
Jan 30 08:41:15 charon: 10[IKE] <con1|1> queueing ISAKMP_DPD task
|
356
|
Jan 30 08:41:15 charon: 10[IKE] <con1|1> activating new tasks
|
357
|
Jan 30 08:41:15 charon: 10[IKE] <con1|1> activating ISAKMP_DPD task
|
358
|
Jan 30 08:41:15 charon: 10[ENC] <con1|1> generating INFORMATIONAL_V1 request 1035159668 [ HASH N(DPD) ]
|
359
|
Jan 30 08:41:15 charon: 10[NET] <con1|1> sending packet: from PFSENSE.WAN.IP.ADDRESS[4500] to PHONE.4G.IP.ADDRESS[5004] (92 bytes)
|
360
|
Jan 30 08:41:15 charon: 10[IKE] <con1|1> activating new tasks
|
361
|
Jan 30 08:41:15 charon: 10[IKE] <con1|1> nothing to initiate
|
362
|
Jan 30 08:41:25 charon: 13[IKE] <con1|1> sending DPD request
|
363
|
Jan 30 08:41:25 charon: 13[IKE] <con1|1> queueing ISAKMP_DPD task
|
364
|
Jan 30 08:41:25 charon: 13[IKE] <con1|1> activating new tasks
|
365
|
Jan 30 08:41:25 charon: 13[IKE] <con1|1> activating ISAKMP_DPD task
|
366
|
Jan 30 08:41:25 charon: 13[ENC] <con1|1> generating INFORMATIONAL_V1 request 1524726655 [ HASH N(DPD) ]
|
367
|
Jan 30 08:41:25 charon: 13[NET] <con1|1> sending packet: from PFSENSE.WAN.IP.ADDRESS[4500] to PHONE.4G.IP.ADDRESS[5004] (92 bytes)
|
368
|
Jan 30 08:41:25 charon: 13[IKE] <con1|1> activating new tasks
|
369
|
Jan 30 08:41:25 charon: 13[IKE] <con1|1> nothing to initiate
|
370
|
Jan 30 08:41:35 charon: 13[JOB] <con1|1> DPD check timed out, enforcing DPD action
|
371
|
Jan 30 08:41:35 charon: 13[IKE] <con1|1> IKE_SA con1[1] state change: ESTABLISHED => DESTROYING
|