Header Shadow Image


OpenWRT: Microsoft Azure to Cloudera CDH via VPN Gateway

Pages: 1 2 3 4 5 6 7

Logs

root@OWRT01:~# logread -f


Sat Oct 24 20:20:53 2020 authpriv.info : 00[DMN] signal of type SIGINT received. Shutting down
Sat Oct 24 20:20:53 2020 daemon.info : 00[DMN] signal of type SIGINT received. Shutting down
Sat Oct 24 20:20:53 2020 authpriv.info : 00[IKE] deleting IKE_SA remote-to-asus[10] between 192.168.0.12[123.123.123.123]…192.168.0.6[100.100.100.100]
Sat Oct 24 20:20:53 2020 daemon.info : 00[IKE] deleting IKE_SA remote-to-asus[10] between 192.168.0.12[123.123.123.123]…192.168.0.6[100.100.100.100]
Sat Oct 24 20:20:53 2020 authpriv.info : 00[IKE] sending DELETE for IKE_SA remote-to-asus[10]
Sat Oct 24 20:20:53 2020 daemon.info : 00[IKE] sending DELETE for IKE_SA remote-to-asus[10]
Sat Oct 24 20:20:53 2020 authpriv.info : 00[ENC] generating INFORMATIONAL request 0 [ D ]
Sat Oct 24 20:20:53 2020 daemon.info : 00[ENC] generating INFORMATIONAL request 0 [ D ]
Sat Oct 24 20:20:53 2020 authpriv.info : 00[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[1291] (80 bytes)
Sat Oct 24 20:20:53 2020 daemon.info : 00[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[1291] (80 bytes)
Sat Oct 24 20:20:53 2020 authpriv.info ipsec_starter[7645]: charon stopped after 200 ms
Sat Oct 24 20:20:53 2020 authpriv.info ipsec_starter[7645]: ipsec starter stopped
Sat Oct 24 20:20:59 2020 authpriv.info ipsec_starter[8273]: Starting strongSwan 5.8.2 IPsec [starter]…
Sat Oct 24 20:20:59 2020 authpriv.info : 00[DMN] Starting IKE charon daemon (strongSwan 5.8.2, Linux 4.14.180, armv7l)
Sat Oct 24 20:20:59 2020 daemon.info : 00[DMN] Starting IKE charon daemon (strongSwan 5.8.2, Linux 4.14.180, armv7l)
Sat Oct 24 20:20:59 2020 authpriv.info : 00[CFG] PKCS11 module '<name>' lacks library path
Sat Oct 24 20:20:59 2020 daemon.info : 00[CFG] PKCS11 module '<name>' lacks library path
Sat Oct 24 20:21:00 2020 authpriv.info : 00[LIB] curl SSL backend 'mbedTLS/2.16.6' not supported, https:// disabled
Sat Oct 24 20:21:00 2020 daemon.info : 00[LIB] curl SSL backend 'mbedTLS/2.16.6' not supported, https:// disabled
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG] disabling load-tester plugin, not configured
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG] disabling load-tester plugin, not configured
Sat Oct 24 20:21:00 2020 authpriv.info : 00[LIB] plugin 'load-tester': failed to load – load_tester_plugin_create returned NULL
Sat Oct 24 20:21:00 2020 daemon.info : 00[LIB] plugin 'load-tester': failed to load – load_tester_plugin_create returned NULL
Sat Oct 24 20:21:00 2020 authpriv.info : 00[LIB] plugin 'uci' failed to load: Error relocating /usr/lib/ipsec/plugins/libstrongswan-uci.so: uci_lookup: symbol not found
Sat Oct 24 20:21:00 2020 daemon.info : 00[LIB] plugin 'uci' failed to load: Error relocating /usr/lib/ipsec/plugins/libstrongswan-uci.so: uci_lookup: symbol not found
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG] attr-sql plugin: database URI not set
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG] attr-sql plugin: database URI not set
Sat Oct 24 20:21:00 2020 authpriv.info : 00[NET] using forecast interface br-lan
Sat Oct 24 20:21:00 2020 daemon.info : 00[NET] using forecast interface br-lan
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG] joining forecast multicast groups: 224.0.0.1,224.0.0.22,224.0.0.251,224.0.0.252,239.255.255.250
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG] joining forecast multicast groups: 224.0.0.1,224.0.0.22,224.0.0.251,224.0.0.252,239.255.255.250
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts'
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts'
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts'
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts'
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts'
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts'
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts'
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts'
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG] loading crls from '/etc/ipsec.d/crls'
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG] loading crls from '/etc/ipsec.d/crls'
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG] loading secrets from '/etc/ipsec.secrets'
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG] loading secrets from '/etc/ipsec.secrets'
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG]   loaded IKE secret for 123.123.123.123 100.100.100.100
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG]   loaded IKE secret for 123.123.123.123 100.100.100.100
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG]   loaded IKE secret for 192.168.0.6 192.168.0.16
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG]   loaded IKE secret for 192.168.0.6 192.168.0.16
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG]   loaded IKE secret for 192.168.0.16 192.168.0.6
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG]   loaded IKE secret for 192.168.0.16 192.168.0.6
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG] sql plugin: database URI not set
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG] sql plugin: database URI not set
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG] loaded 0 RADIUS server configurations
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG] loaded 0 RADIUS server configurations
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG] HA config misses local/remote address
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG] HA config misses local/remote address
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG] coupling file path unspecified
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG] coupling file path unspecified
Sat Oct 24 20:21:00 2020 authpriv.info : 00[LIB] loaded plugins: charon test-vectors ldap pkcs11 aes des blowfish rc2 sha2 sha1 md4 md5 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl gcrypt af-alg fips-prf gmp gmpdh curve25519 agent xcbc cmac hmac ctr ccm gcm curl mysql sqlite attr kernel-netlink resolve socket-default socket-dynamic connmark forecast farp stroke vici smp updown eap-identity eap-md5 eap-mschapv2 eap-radius eap-tls xauth-generic xauth-eap dhcp whitelist led duplicheck addrblock unity
Sat Oct 24 20:21:00 2020 daemon.info : 00[LIB] loaded plugins: charon test-vectors ldap pkcs11 aes des blowfish rc2 sha2 sha1 md4 md5 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl gcrypt af-alg fips-prf gmp gmpdh curve25519 agent xcbc cmac hmac ctr ccm gcm curl mysql sqlite attr kernel-netlink resolve socket-default socket-dynamic connmark forecast farp stroke vici smp updown eap-identity eap-md5 eap-mschapv2 eap-radius eap-tls xauth-generic xauth-eap dhcp whitelist led duplicheck addrblock unity
Sat Oct 24 20:21:00 2020 authpriv.info : 00[JOB] spawning 16 worker threads
Sat Oct 24 20:21:00 2020 daemon.info : 00[JOB] spawning 16 worker threads
Sat Oct 24 20:21:00 2020 authpriv.info ipsec_starter[8276]: charon (8277) started after 1740 ms
Sat Oct 24 20:21:00 2020 authpriv.info : 07[CFG] received stroke: add connection 'remote-to-asus'
Sat Oct 24 20:21:00 2020 daemon.info : 07[CFG] received stroke: add connection 'remote-to-asus'
Sat Oct 24 20:21:00 2020 authpriv.info : 07[CFG] added configuration 'remote-to-asus'
Sat Oct 24 20:21:00 2020 daemon.info : 07[CFG] added configuration 'remote-to-asus'
Sat Oct 24 20:21:00 2020 authpriv.info : 09[CFG] received stroke: initiate 'remote-to-asus'
Sat Oct 24 20:21:00 2020 daemon.info : 09[CFG] received stroke: initiate 'remote-to-asus'
Sat Oct 24 20:21:00 2020 authpriv.info : 09[IKE] initiating IKE_SA remote-to-asus[1] to 192.168.0.6
Sat Oct 24 20:21:00 2020 daemon.info : 09[IKE] initiating IKE_SA remote-to-asus[1] to 192.168.0.6
Sat Oct 24 20:21:01 2020 authpriv.info : 09[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 09[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 09[NET] sending packet: from 192.168.0.12[500] to 192.168.0.6[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 09[NET] sending packet: from 192.168.0.12[500] to 192.168.0.6[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 10[CFG] received stroke: add connection 'asus-to-remote'
Sat Oct 24 20:21:01 2020 daemon.info : 10[CFG] received stroke: add connection 'asus-to-remote'
Sat Oct 24 20:21:01 2020 authpriv.info : 13[NET] received packet: from 192.168.0.6[500] to 192.168.0.12[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 13[NET] received packet: from 192.168.0.6[500] to 192.168.0.12[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 10[CFG] added configuration 'asus-to-remote'
Sat Oct 24 20:21:01 2020 daemon.info : 10[CFG] added configuration 'asus-to-remote'
Sat Oct 24 20:21:01 2020 authpriv.info : 11[CFG] received stroke: initiate 'asus-to-remote'
Sat Oct 24 20:21:01 2020 daemon.info : 11[CFG] received stroke: initiate 'asus-to-remote'
Sat Oct 24 20:21:01 2020 authpriv.info : 13[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 13[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 13[IKE] 192.168.0.6 is initiating an IKE_SA
Sat Oct 24 20:21:01 2020 daemon.info : 13[IKE] 192.168.0.6 is initiating an IKE_SA
Sat Oct 24 20:21:01 2020 authpriv.info : 13[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 daemon.info : 13[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 authpriv.info : 13[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 daemon.info : 13[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 authpriv.info : 13[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 daemon.info : 13[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 authpriv.info : 13[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 daemon.info : 13[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 13[NET] sending packet: from 192.168.0.12[500] to 192.168.0.6[500] (344 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 13[NET] sending packet: from 192.168.0.12[500] to 192.168.0.6[500] (344 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 11[IKE] initiating IKE_SA asus-to-remote[3] to 192.168.0.6
Sat Oct 24 20:21:01 2020 daemon.info : 11[IKE] initiating IKE_SA asus-to-remote[3] to 192.168.0.6
Sat Oct 24 20:21:01 2020 authpriv.info : 15[NET] received packet: from 192.168.0.6[500] to 192.168.0.12[500] (344 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 15[NET] received packet: from 192.168.0.6[500] to 192.168.0.12[500] (344 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 15[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 daemon.info : 15[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 15[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 daemon.info : 15[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 authpriv.info : 11[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 11[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] authentication of '123.123.123.123' (myself) with pre-shared key
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] authentication of '123.123.123.123' (myself) with pre-shared key
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] establishing CHILD_SA remote-to-asus{1}
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] establishing CHILD_SA remote-to-asus{1}
Sat Oct 24 20:21:01 2020 authpriv.info : 11[NET] sending packet: from 192.168.0.12[500] to 192.168.0.6[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 11[NET] sending packet: from 192.168.0.12[500] to 192.168.0.6[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 15[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 15[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 16[CFG] received stroke: add connection 'asus-any-to-remote'
Sat Oct 24 20:21:01 2020 daemon.info : 16[CFG] received stroke: add connection 'asus-any-to-remote'
Sat Oct 24 20:21:01 2020 authpriv.info : 16[CFG] added configuration 'asus-any-to-remote'
Sat Oct 24 20:21:01 2020 daemon.info : 16[CFG] added configuration 'asus-any-to-remote'
Sat Oct 24 20:21:01 2020 authpriv.info : 05[CFG] received stroke: initiate 'asus-any-to-remote'
Sat Oct 24 20:21:01 2020 daemon.info : 05[CFG] received stroke: initiate 'asus-any-to-remote'
Sat Oct 24 20:21:01 2020 authpriv.info : 07[NET] received packet: from 192.168.0.6[500] to 192.168.0.12[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 07[NET] received packet: from 192.168.0.6[500] to 192.168.0.12[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 15[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 15[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 07[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 07[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 07[IKE] 192.168.0.6 is initiating an IKE_SA
Sat Oct 24 20:21:01 2020 daemon.info : 07[IKE] 192.168.0.6 is initiating an IKE_SA
Sat Oct 24 20:21:01 2020 authpriv.info : 05[IKE] initiating IKE_SA asus-any-to-remote[5] to 192.168.0.6
Sat Oct 24 20:21:01 2020 daemon.info : 05[IKE] initiating IKE_SA asus-any-to-remote[5] to 192.168.0.6
Sat Oct 24 20:21:01 2020 authpriv.info : 07[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 daemon.info : 07[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 authpriv.info : 06[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 06[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 06[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 06[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 06[CFG] looking for peer configs matching 192.168.0.12[100.100.100.100]…192.168.0.6[123.123.123.123]
Sat Oct 24 20:21:01 2020 daemon.info : 06[CFG] looking for peer configs matching 192.168.0.12[100.100.100.100]…192.168.0.6[123.123.123.123]
Sat Oct 24 20:21:01 2020 authpriv.info : 06[CFG] no matching peer config found
Sat Oct 24 20:21:01 2020 daemon.info : 06[CFG] no matching peer config found
Sat Oct 24 20:21:01 2020 authpriv.info : 06[ENC] generating IKE_AUTH response 1 [ N(AUTH_FAILED) ]
Sat Oct 24 20:21:01 2020 daemon.info : 06[ENC] generating IKE_AUTH response 1 [ N(AUTH_FAILED) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 06[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 06[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 10[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 10[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 10[ENC] parsed IKE_AUTH response 1 [ N(AUTH_FAILED) ]
Sat Oct 24 20:21:01 2020 daemon.info : 10[ENC] parsed IKE_AUTH response 1 [ N(AUTH_FAILED) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 10[IKE] received AUTHENTICATION_FAILED notify error
Sat Oct 24 20:21:01 2020 daemon.info : 10[IKE] received AUTHENTICATION_FAILED notify error
Sat Oct 24 20:21:01 2020 authpriv.info : 05[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 05[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 05[NET] sending packet: from 192.168.0.12[500] to 192.168.0.6[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 05[NET] sending packet: from 192.168.0.12[500] to 192.168.0.6[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 12[CFG] received stroke: add connection 'azure-s2s'
Sat Oct 24 20:21:01 2020 daemon.info : 12[CFG] received stroke: add connection 'azure-s2s'
Sat Oct 24 20:21:01 2020 authpriv.info : 11[NET] received packet: from 192.168.0.6[500] to 192.168.0.12[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 11[NET] received packet: from 192.168.0.6[500] to 192.168.0.12[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 12[CFG] added configuration 'azure-s2s'
Sat Oct 24 20:21:01 2020 daemon.info : 12[CFG] added configuration 'azure-s2s'
Sat Oct 24 20:21:01 2020 authpriv.info : 16[CFG] received stroke: initiate 'azure-s2s'
Sat Oct 24 20:21:01 2020 daemon.info : 16[CFG] received stroke: initiate 'azure-s2s'
Sat Oct 24 20:21:01 2020 authpriv.info : 11[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 11[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 11[IKE] 192.168.0.6 is initiating an IKE_SA
Sat Oct 24 20:21:01 2020 daemon.info : 11[IKE] 192.168.0.6 is initiating an IKE_SA
Sat Oct 24 20:21:01 2020 authpriv.info : 11[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 daemon.info : 11[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 authpriv.info : 07[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 daemon.info : 07[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 authpriv.info : 07[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 daemon.info : 07[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 authpriv.info : 07[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 daemon.info : 07[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 07[NET] sending packet: from 192.168.0.12[500] to 192.168.0.6[500] (344 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 07[NET] sending packet: from 192.168.0.12[500] to 192.168.0.6[500] (344 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 15[NET] received packet: from 192.168.0.6[500] to 192.168.0.12[500] (344 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 15[NET] received packet: from 192.168.0.6[500] to 192.168.0.12[500] (344 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 15[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 daemon.info : 15[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 15[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 daemon.info : 15[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] authentication of '100.100.100.100' (myself) with pre-shared key
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] authentication of '100.100.100.100' (myself) with pre-shared key
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] establishing CHILD_SA asus-to-remote{2}
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] establishing CHILD_SA asus-to-remote{2}
Sat Oct 24 20:21:01 2020 authpriv.info : 15[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 15[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 15[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 15[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 11[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 daemon.info : 11[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 authpriv.info : 11[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 daemon.info : 11[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 authpriv.info : 09[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 09[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 11[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 daemon.info : 11[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 09[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 09[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 11[NET] sending packet: from 192.168.0.12[500] to 192.168.0.6[500] (344 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 11[NET] sending packet: from 192.168.0.12[500] to 192.168.0.6[500] (344 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 09[CFG] looking for peer configs matching 192.168.0.12[192.168.0.12]…192.168.0.6[100.100.100.100]
Sat Oct 24 20:21:01 2020 daemon.info : 09[CFG] looking for peer configs matching 192.168.0.12[192.168.0.12]…192.168.0.6[100.100.100.100]
Sat Oct 24 20:21:01 2020 authpriv.info : 09[CFG] selected peer config 'asus-any-to-remote'
Sat Oct 24 20:21:01 2020 daemon.info : 09[CFG] selected peer config 'asus-any-to-remote'
Sat Oct 24 20:21:01 2020 authpriv.info : 06[NET] received packet: from 192.168.0.6[500] to 192.168.0.12[500] (344 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 06[NET] received packet: from 192.168.0.6[500] to 192.168.0.12[500] (344 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 09[IKE] authentication of '100.100.100.100' with pre-shared key successful
Sat Oct 24 20:21:01 2020 daemon.info : 09[IKE] authentication of '100.100.100.100' with pre-shared key successful
Sat Oct 24 20:21:01 2020 authpriv.info : 06[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 daemon.info : 06[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 09[IKE] authentication of '192.168.0.12' (myself) with pre-shared key
Sat Oct 24 20:21:01 2020 daemon.info : 09[IKE] authentication of '192.168.0.12' (myself) with pre-shared key
Sat Oct 24 20:21:01 2020 authpriv.info : 06[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 daemon.info : 06[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 authpriv.info : 09[IKE] IKE_SA asus-any-to-remote[4] established between 192.168.0.12[192.168.0.12]…192.168.0.6[100.100.100.100]
Sat Oct 24 20:21:01 2020 daemon.info : 09[IKE] IKE_SA asus-any-to-remote[4] established between 192.168.0.12[192.168.0.12]…192.168.0.6[100.100.100.100]
Sat Oct 24 20:21:01 2020 authpriv.info : 09[IKE] scheduling reauthentication in 28457s
Sat Oct 24 20:21:01 2020 daemon.info : 09[IKE] scheduling reauthentication in 28457s
Sat Oct 24 20:21:01 2020 authpriv.info : 09[IKE] maximum IKE_SA lifetime 28637s
Sat Oct 24 20:21:01 2020 daemon.info : 09[IKE] maximum IKE_SA lifetime 28637s
Sat Oct 24 20:21:01 2020 authpriv.info : 09[IKE] traffic selectors 192.168.0.6/32 === 192.168.0.12/32 unacceptable
Sat Oct 24 20:21:01 2020 daemon.info : 09[IKE] traffic selectors 192.168.0.6/32 === 192.168.0.12/32 unacceptable
Sat Oct 24 20:21:01 2020 authpriv.info : 09[IKE] failed to establish CHILD_SA, keeping IKE_SA
Sat Oct 24 20:21:01 2020 daemon.info : 09[IKE] failed to establish CHILD_SA, keeping IKE_SA
Sat Oct 24 20:21:01 2020 authpriv.info : 09[ENC] generating IKE_AUTH response 1 [ IDr AUTH N(AUTH_LFT) N(TS_UNACCEPT) ]
Sat Oct 24 20:21:01 2020 daemon.info : 09[ENC] generating IKE_AUTH response 1 [ IDr AUTH N(AUTH_LFT) N(TS_UNACCEPT) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 09[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (144 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 09[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (144 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 16[IKE] initiating IKE_SA azure-s2s[7] to 100.100.100.100
Sat Oct 24 20:21:01 2020 daemon.info : 16[IKE] initiating IKE_SA azure-s2s[7] to 100.100.100.100
Sat Oct 24 20:21:01 2020 authpriv.info : 05[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (144 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 05[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (144 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 05[ENC] parsed IKE_AUTH response 1 [ IDr AUTH N(AUTH_LFT) N(TS_UNACCEPT) ]
Sat Oct 24 20:21:01 2020 daemon.info : 05[ENC] parsed IKE_AUTH response 1 [ IDr AUTH N(AUTH_LFT) N(TS_UNACCEPT) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 05[IKE] authentication of '192.168.0.12' with pre-shared key successful
Sat Oct 24 20:21:01 2020 daemon.info : 05[IKE] authentication of '192.168.0.12' with pre-shared key successful
Sat Oct 24 20:21:01 2020 authpriv.info : 05[IKE] IKE_SA asus-to-remote[3] established between 192.168.0.12[100.100.100.100]…192.168.0.6[192.168.0.12]
Sat Oct 24 20:21:01 2020 daemon.info : 05[IKE] IKE_SA asus-to-remote[3] established between 192.168.0.12[100.100.100.100]…192.168.0.6[192.168.0.12]
Sat Oct 24 20:21:01 2020 authpriv.info : 05[IKE] scheduling reauthentication in 28614s
Sat Oct 24 20:21:01 2020 daemon.info : 05[IKE] scheduling reauthentication in 28614s
Sat Oct 24 20:21:01 2020 authpriv.info : 05[IKE] maximum IKE_SA lifetime 28794s
Sat Oct 24 20:21:01 2020 daemon.info : 05[IKE] maximum IKE_SA lifetime 28794s
Sat Oct 24 20:21:01 2020 authpriv.info : 05[IKE] received TS_UNACCEPTABLE notify, no CHILD_SA built
Sat Oct 24 20:21:01 2020 daemon.info : 05[IKE] received TS_UNACCEPTABLE notify, no CHILD_SA built
Sat Oct 24 20:21:01 2020 authpriv.info : 05[IKE] failed to establish CHILD_SA, keeping IKE_SA
Sat Oct 24 20:21:01 2020 daemon.info : 05[IKE] failed to establish CHILD_SA, keeping IKE_SA
Sat Oct 24 20:21:01 2020 authpriv.info : 05[IKE] received AUTH_LIFETIME of 28457s, scheduling reauthentication in 28277s
Sat Oct 24 20:21:01 2020 daemon.info : 05[IKE] received AUTH_LIFETIME of 28457s, scheduling reauthentication in 28277s
Sat Oct 24 20:21:01 2020 authpriv.info : 06[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 daemon.info : 06[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 authpriv.info : 06[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 daemon.info : 06[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 authpriv.info : 06[CFG] no IDi configured, fall back on IP address
Sat Oct 24 20:21:01 2020 daemon.info : 06[CFG] no IDi configured, fall back on IP address
Sat Oct 24 20:21:01 2020 authpriv.info : 06[IKE] authentication of '192.168.0.12' (myself) with pre-shared key
Sat Oct 24 20:21:01 2020 daemon.info : 06[IKE] authentication of '192.168.0.12' (myself) with pre-shared key
Sat Oct 24 20:21:01 2020 authpriv.info : 16[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 16[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 06[IKE] establishing CHILD_SA asus-any-to-remote{3}
Sat Oct 24 20:21:01 2020 daemon.info : 06[IKE] establishing CHILD_SA asus-any-to-remote{3}
Sat Oct 24 20:21:01 2020 authpriv.info : 16[NET] sending packet: from 192.168.0.12[500] to 100.100.100.100[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 16[NET] sending packet: from 192.168.0.12[500] to 100.100.100.100[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 06[ENC] generating IKE_AUTH request 1 [ IDi IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 06[ENC] generating IKE_AUTH request 1 [ IDi IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 13[NET] received packet: from 192.168.0.6[344] to 192.168.0.12[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 13[NET] received packet: from 192.168.0.6[344] to 192.168.0.12[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 06[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 13[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 06[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 13[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 13[IKE] 192.168.0.6 is initiating an IKE_SA
Sat Oct 24 20:21:01 2020 daemon.info : 13[IKE] 192.168.0.6 is initiating an IKE_SA
Sat Oct 24 20:21:01 2020 authpriv.info : 12[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 12[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 12[ENC] parsed IKE_AUTH request 1 [ IDi IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 12[ENC] parsed IKE_AUTH request 1 [ IDi IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 12[CFG] looking for peer configs matching 192.168.0.12[100.100.100.100]…192.168.0.6[192.168.0.12]
Sat Oct 24 20:21:01 2020 daemon.info : 12[CFG] looking for peer configs matching 192.168.0.12[100.100.100.100]…192.168.0.6[192.168.0.12]
Sat Oct 24 20:21:01 2020 authpriv.info : 12[CFG] selected peer config 'asus-to-remote'
Sat Oct 24 20:21:01 2020 daemon.info : 12[CFG] selected peer config 'asus-to-remote'
Sat Oct 24 20:21:01 2020 authpriv.info : 12[IKE] authentication of '192.168.0.12' with pre-shared key successful
Sat Oct 24 20:21:01 2020 daemon.info : 12[IKE] authentication of '192.168.0.12' with pre-shared key successful
Sat Oct 24 20:21:01 2020 authpriv.info : 12[IKE] authentication of '100.100.100.100' (myself) with pre-shared key
Sat Oct 24 20:21:01 2020 daemon.info : 12[IKE] authentication of '100.100.100.100' (myself) with pre-shared key
Sat Oct 24 20:21:01 2020 authpriv.info : 12[IKE] schedule delete of duplicate IKE_SA for peer '192.168.0.12' due to uniqueness policy and suspected reauthentication
Sat Oct 24 20:21:01 2020 daemon.info : 12[IKE] schedule delete of duplicate IKE_SA for peer '192.168.0.12' due to uniqueness policy and suspected reauthentication
Sat Oct 24 20:21:01 2020 authpriv.info : 12[IKE] IKE_SA asus-to-remote[6] established between 192.168.0.12[100.100.100.100]…192.168.0.6[192.168.0.12]
Sat Oct 24 20:21:01 2020 daemon.info : 12[IKE] IKE_SA asus-to-remote[6] established between 192.168.0.12[100.100.100.100]…192.168.0.6[192.168.0.12]
Sat Oct 24 20:21:01 2020 authpriv.info : 12[IKE] scheduling reauthentication in 28514s
Sat Oct 24 20:21:01 2020 daemon.info : 12[IKE] scheduling reauthentication in 28514s
Sat Oct 24 20:21:01 2020 authpriv.info : 12[IKE] maximum IKE_SA lifetime 28694s
Sat Oct 24 20:21:01 2020 daemon.info : 12[IKE] maximum IKE_SA lifetime 28694s
Sat Oct 24 20:21:01 2020 authpriv.info : 12[CFG] detected duplicate IKE_SA for '192.168.0.12', triggering delete for old IKE_SA
Sat Oct 24 20:21:01 2020 daemon.info : 12[CFG] detected duplicate IKE_SA for '192.168.0.12', triggering delete for old IKE_SA
Sat Oct 24 20:21:01 2020 authpriv.info : 08[IKE] deleting IKE_SA asus-to-remote[3] between 192.168.0.12[100.100.100.100]…192.168.0.6[192.168.0.12]
Sat Oct 24 20:21:01 2020 authpriv.info : 12[IKE] traffic selectors 192.168.0.6/32 === 192.168.0.12/32 unacceptable
Sat Oct 24 20:21:01 2020 daemon.info : 08[IKE] deleting IKE_SA asus-to-remote[3] between 192.168.0.12[100.100.100.100]…192.168.0.6[192.168.0.12]
Sat Oct 24 20:21:01 2020 authpriv.info : 08[IKE] sending DELETE for IKE_SA asus-to-remote[3]
Sat Oct 24 20:21:01 2020 daemon.info : 08[IKE] sending DELETE for IKE_SA asus-to-remote[3]
Sat Oct 24 20:21:01 2020 authpriv.info : 08[ENC] generating INFORMATIONAL request 2 [ D ]
Sat Oct 24 20:21:01 2020 daemon.info : 12[IKE] traffic selectors 192.168.0.6/32 === 192.168.0.12/32 unacceptable
Sat Oct 24 20:21:01 2020 daemon.info : 08[ENC] generating INFORMATIONAL request 2 [ D ]
Sat Oct 24 20:21:01 2020 authpriv.info : 12[IKE] failed to establish CHILD_SA, keeping IKE_SA
Sat Oct 24 20:21:01 2020 daemon.info : 12[IKE] failed to establish CHILD_SA, keeping IKE_SA
Sat Oct 24 20:21:01 2020 authpriv.info : 12[ENC] generating IKE_AUTH response 1 [ IDr AUTH N(AUTH_LFT) N(TS_UNACCEPT) ]
Sat Oct 24 20:21:01 2020 daemon.info : 12[ENC] generating IKE_AUTH response 1 [ IDr AUTH N(AUTH_LFT) N(TS_UNACCEPT) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 08[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 08[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 12[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (144 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 12[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (144 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 13[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 daemon.info : 13[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 authpriv.info : 11[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 11[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 15[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (144 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 15[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (144 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 11[ENC] parsed INFORMATIONAL request 2 [ D ]
Sat Oct 24 20:21:01 2020 daemon.info : 11[ENC] parsed INFORMATIONAL request 2 [ D ]
Sat Oct 24 20:21:01 2020 authpriv.info : 11[IKE] received DELETE for IKE_SA asus-any-to-remote[4]
Sat Oct 24 20:21:01 2020 daemon.info : 11[IKE] received DELETE for IKE_SA asus-any-to-remote[4]
Sat Oct 24 20:21:01 2020 authpriv.info : 15[ENC] parsed IKE_AUTH response 1 [ IDr AUTH N(AUTH_LFT) N(TS_UNACCEPT) ]
Sat Oct 24 20:21:01 2020 daemon.info : 15[ENC] parsed IKE_AUTH response 1 [ IDr AUTH N(AUTH_LFT) N(TS_UNACCEPT) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 11[IKE] deleting IKE_SA asus-any-to-remote[4] between 192.168.0.12[192.168.0.12]…192.168.0.6[100.100.100.100]
Sat Oct 24 20:21:01 2020 daemon.info : 11[IKE] deleting IKE_SA asus-any-to-remote[4] between 192.168.0.12[192.168.0.12]…192.168.0.6[100.100.100.100]
Sat Oct 24 20:21:01 2020 authpriv.info : 11[IKE] IKE_SA deleted
Sat Oct 24 20:21:01 2020 daemon.info : 11[IKE] IKE_SA deleted
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] authentication of '100.100.100.100' with pre-shared key successful
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] authentication of '100.100.100.100' with pre-shared key successful
Sat Oct 24 20:21:01 2020 authpriv.info : 11[ENC] generating INFORMATIONAL response 2 [ ]
Sat Oct 24 20:21:01 2020 daemon.info : 11[ENC] generating INFORMATIONAL response 2 [ ]
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] IKE_SA asus-any-to-remote[5] established between 192.168.0.12[192.168.0.12]…192.168.0.6[100.100.100.100]
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] IKE_SA asus-any-to-remote[5] established between 192.168.0.12[192.168.0.12]…192.168.0.6[100.100.100.100]
Sat Oct 24 20:21:01 2020 authpriv.info : 11[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 11[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] scheduling reauthentication in 28441s
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] scheduling reauthentication in 28441s
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] maximum IKE_SA lifetime 28621s
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] maximum IKE_SA lifetime 28621s
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] received TS_UNACCEPTABLE notify, no CHILD_SA built
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] received TS_UNACCEPTABLE notify, no CHILD_SA built
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] failed to establish CHILD_SA, keeping IKE_SA
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] failed to establish CHILD_SA, keeping IKE_SA
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] received AUTH_LIFETIME of 28514s, scheduling reauthentication in 28334s
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] received AUTH_LIFETIME of 28514s, scheduling reauthentication in 28334s
Sat Oct 24 20:21:01 2020 authpriv.info : 10[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 10[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 10[ENC] parsed INFORMATIONAL response 2 [ ]
Sat Oct 24 20:21:01 2020 daemon.info : 10[ENC] parsed INFORMATIONAL response 2 [ ]
Sat Oct 24 20:21:01 2020 authpriv.info : 10[CFG] got a response on a duplicate IKE_SA for '192.168.0.12', deleting new IKE_SA
Sat Oct 24 20:21:01 2020 daemon.info : 10[CFG] got a response on a duplicate IKE_SA for '192.168.0.12', deleting new IKE_SA
Sat Oct 24 20:21:01 2020 authpriv.info : 10[IKE] IKE_SA deleted
Sat Oct 24 20:21:01 2020 daemon.info : 10[IKE] IKE_SA deleted
Sat Oct 24 20:21:01 2020 authpriv.info : 10[IKE] deleting IKE_SA asus-to-remote[6] between 192.168.0.12[100.100.100.100]…192.168.0.6[192.168.0.12]
Sat Oct 24 20:21:01 2020 daemon.info : 10[IKE] deleting IKE_SA asus-to-remote[6] between 192.168.0.12[100.100.100.100]…192.168.0.6[192.168.0.12]
Sat Oct 24 20:21:01 2020 authpriv.info : 10[IKE] sending DELETE for IKE_SA asus-to-remote[6]
Sat Oct 24 20:21:01 2020 daemon.info : 10[IKE] sending DELETE for IKE_SA asus-to-remote[6]
Sat Oct 24 20:21:01 2020 authpriv.info : 10[ENC] generating INFORMATIONAL request 0 [ D ]
Sat Oct 24 20:21:01 2020 daemon.info : 10[ENC] generating INFORMATIONAL request 0 [ D ]
Sat Oct 24 20:21:01 2020 authpriv.info : 10[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 10[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 05[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 05[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 05[ENC] parsed INFORMATIONAL request 0 [ D ]
Sat Oct 24 20:21:01 2020 daemon.info : 05[ENC] parsed INFORMATIONAL request 0 [ D ]
Sat Oct 24 20:21:01 2020 authpriv.info : 05[IKE] received DELETE for IKE_SA asus-any-to-remote[5]
Sat Oct 24 20:21:01 2020 daemon.info : 05[IKE] received DELETE for IKE_SA asus-any-to-remote[5]
Sat Oct 24 20:21:01 2020 authpriv.info : 05[IKE] deleting IKE_SA asus-any-to-remote[5] between 192.168.0.12[192.168.0.12]…192.168.0.6[100.100.100.100]
Sat Oct 24 20:21:01 2020 daemon.info : 05[IKE] deleting IKE_SA asus-any-to-remote[5] between 192.168.0.12[192.168.0.12]…192.168.0.6[100.100.100.100]
Sat Oct 24 20:21:01 2020 authpriv.info : 05[IKE] IKE_SA deleted
Sat Oct 24 20:21:01 2020 daemon.info : 05[IKE] IKE_SA deleted
Sat Oct 24 20:21:01 2020 authpriv.info : 05[ENC] generating INFORMATIONAL response 0 [ ]
Sat Oct 24 20:21:01 2020 daemon.info : 05[ENC] generating INFORMATIONAL response 0 [ ]
Sat Oct 24 20:21:01 2020 authpriv.info : 05[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 05[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 16[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 16[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 16[ENC] parsed INFORMATIONAL response 0 [ ]
Sat Oct 24 20:21:01 2020 daemon.info : 16[ENC] parsed INFORMATIONAL response 0 [ ]
Sat Oct 24 20:21:01 2020 authpriv.info : 16[IKE] IKE_SA deleted
Sat Oct 24 20:21:01 2020 daemon.info : 16[IKE] IKE_SA deleted
Sat Oct 24 20:21:01 2020 authpriv.info : 13[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 daemon.info : 13[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 authpriv.info : 13[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 daemon.info : 13[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 authpriv.info : 13[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 daemon.info : 13[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 13[NET] sending packet: from 192.168.0.12[500] to 192.168.0.6[344] (344 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 13[NET] sending packet: from 192.168.0.12[500] to 192.168.0.6[344] (344 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 06[NET] received packet: from 100.100.100.100[500] to 192.168.0.12[500] (344 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 06[NET] received packet: from 100.100.100.100[500] to 192.168.0.12[500] (344 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 06[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 daemon.info : 06[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 06[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 daemon.info : 06[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 authpriv.info : 06[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 daemon.info : 06[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 authpriv.info : 06[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 daemon.info : 06[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 authpriv.info : 06[IKE] authentication of '192.168.0.12' (myself) with pre-shared key
Sat Oct 24 20:21:01 2020 daemon.info : 06[IKE] authentication of '192.168.0.12' (myself) with pre-shared key
Sat Oct 24 20:21:01 2020 authpriv.info : 06[IKE] establishing CHILD_SA azure-s2s{4}
Sat Oct 24 20:21:01 2020 daemon.info : 06[IKE] establishing CHILD_SA azure-s2s{4}
Sat Oct 24 20:21:01 2020 authpriv.info : 06[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 06[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 06[NET] sending packet: from 192.168.0.12[4500] to 100.100.100.100[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 06[NET] sending packet: from 192.168.0.12[4500] to 100.100.100.100[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 15[NET] received packet: from 192.168.0.6[1367] to 192.168.0.12[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 15[NET] received packet: from 192.168.0.6[1367] to 192.168.0.12[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 15[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 15[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 15[CFG] looking for peer configs matching 192.168.0.12[100.100.100.100]…192.168.0.6[192.168.0.12]
Sat Oct 24 20:21:01 2020 daemon.info : 15[CFG] looking for peer configs matching 192.168.0.12[100.100.100.100]…192.168.0.6[192.168.0.12]
Sat Oct 24 20:21:01 2020 authpriv.info : 15[CFG] selected peer config 'asus-to-remote'
Sat Oct 24 20:21:01 2020 daemon.info : 15[CFG] selected peer config 'asus-to-remote'
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] authentication of '192.168.0.12' with pre-shared key successful
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] authentication of '192.168.0.12' with pre-shared key successful
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] authentication of '100.100.100.100' (myself) with pre-shared key
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] authentication of '100.100.100.100' (myself) with pre-shared key
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] IKE_SA asus-to-remote[8] established between 192.168.0.12[100.100.100.100]…192.168.0.6[192.168.0.12]
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] IKE_SA asus-to-remote[8] established between 192.168.0.12[100.100.100.100]…192.168.0.6[192.168.0.12]
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] scheduling reauthentication in 28503s
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] scheduling reauthentication in 28503s
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] maximum IKE_SA lifetime 28683s
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] maximum IKE_SA lifetime 28683s
Sat Oct 24 20:21:01 2020 authpriv.info : 15[CFG] selected proposal: ESP:AES_GCM_16_256/NO_EXT_SEQ
Sat Oct 24 20:21:01 2020 daemon.info : 15[CFG] selected proposal: ESP:AES_GCM_16_256/NO_EXT_SEQ
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] CHILD_SA asus-to-remote{5} established with SPIs c3942311_i c12111c2_o and TS 192.168.0.12/32 === 192.168.0.6/32
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] CHILD_SA asus-to-remote{5} established with SPIs c3942311_i c12111c2_o and TS 192.168.0.12/32 === 192.168.0.6/32
Sat Oct 24 20:21:01 2020 authpriv.info : 15[ENC] generating IKE_AUTH response 1 [ IDr AUTH SA TSi TSr N(AUTH_LFT) ]
Sat Oct 24 20:21:01 2020 daemon.info : 15[ENC] generating IKE_AUTH response 1 [ IDr AUTH SA TSi TSr N(AUTH_LFT) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 15[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[1367] (224 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 15[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[1367] (224 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 09[NET] received packet: from 100.100.100.100[4500] to 192.168.0.12[4500] (224 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 09[NET] received packet: from 100.100.100.100[4500] to 192.168.0.12[4500] (224 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 09[ENC] parsed IKE_AUTH response 1 [ IDr AUTH SA TSi TSr N(AUTH_LFT) ]
Sat Oct 24 20:21:01 2020 daemon.info : 09[ENC] parsed IKE_AUTH response 1 [ IDr AUTH SA TSi TSr N(AUTH_LFT) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 09[IKE] authentication of '100.100.100.100' with pre-shared key successful
Sat Oct 24 20:21:01 2020 daemon.info : 09[IKE] authentication of '100.100.100.100' with pre-shared key successful
Sat Oct 24 20:21:01 2020 authpriv.info : 09[IKE] IKE_SA azure-s2s[7] established between 192.168.0.12[192.168.0.12]…100.100.100.100[100.100.100.100]
Sat Oct 24 20:21:01 2020 daemon.info : 09[IKE] IKE_SA azure-s2s[7] established between 192.168.0.12[192.168.0.12]…100.100.100.100[100.100.100.100]
Sat Oct 24 20:21:01 2020 authpriv.info : 09[IKE] scheduling reauthentication in 28506s
Sat Oct 24 20:21:01 2020 daemon.info : 09[IKE] scheduling reauthentication in 28506s
Sat Oct 24 20:21:01 2020 authpriv.info : 09[IKE] maximum IKE_SA lifetime 28686s
Sat Oct 24 20:21:01 2020 daemon.info : 09[IKE] maximum IKE_SA lifetime 28686s
Sat Oct 24 20:21:01 2020 authpriv.info : 09[CFG] selected proposal: ESP:AES_GCM_16_256/NO_EXT_SEQ
Sat Oct 24 20:21:01 2020 daemon.info : 09[CFG] selected proposal: ESP:AES_GCM_16_256/NO_EXT_SEQ
Sat Oct 24 20:21:01 2020 authpriv.info : 09[IKE] CHILD_SA azure-s2s{4} established with SPIs c12111c2_i c3942311_o and TS 192.168.0.6/32 === 192.168.0.12/32
Sat Oct 24 20:21:01 2020 daemon.info : 09[IKE] CHILD_SA azure-s2s{4} established with SPIs c12111c2_i c3942311_o and TS 192.168.0.6/32 === 192.168.0.12/32
Sat Oct 24 20:21:01 2020 local0.notice vpn: + 100.100.100.100 192.168.0.12/32 == 100.100.100.100 — 192.168.0.12 == 192.168.0.6/32
Sat Oct 24 20:21:01 2020 authpriv.info : 09[IKE] received AUTH_LIFETIME of 28503s, scheduling reauthentication in 28323s
Sat Oct 24 20:21:01 2020 daemon.info : 09[IKE] received AUTH_LIFETIME of 28503s, scheduling reauthentication in 28323s

root@OWRT01:~#
 

 

Pages: 1 2 3 4 5 6 7

Leave a Reply

You must be logged in to post a comment.


     
  Copyright © 2003 - 2013 Tom Kacperski (microdevsys.com). All rights reserved.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 Unported License