Header Shadow Image


OpenWRT: Microsoft Azure to Cloudera CDH via VPN Gateway

Pages: 1 2 3 4 5 6 7

Logs

root@OWRT01:~# logread -f

Sat Oct 24 20:20:53 2020 authpriv.info : 00[DMN] signal of type SIGINT received. Shutting down
Sat Oct 24 20:20:53 2020 daemon.info : 00[DMN] signal of type SIGINT received. Shutting down
Sat Oct 24 20:20:53 2020 authpriv.info : 00[IKE] deleting IKE_SA remote-to-asus[10] between 192.168.0.12[123.123.123.123]…192.168.0.6[100.100.100.100]
Sat Oct 24 20:20:53 2020 daemon.info : 00[IKE] deleting IKE_SA remote-to-asus[10] between 192.168.0.12[123.123.123.123]…192.168.0.6[100.100.100.100]
Sat Oct 24 20:20:53 2020 authpriv.info : 00[IKE] sending DELETE for IKE_SA remote-to-asus[10]
Sat Oct 24 20:20:53 2020 daemon.info : 00[IKE] sending DELETE for IKE_SA remote-to-asus[10]
Sat Oct 24 20:20:53 2020 authpriv.info : 00[ENC] generating INFORMATIONAL request 0 [ D ]
Sat Oct 24 20:20:53 2020 daemon.info : 00[ENC] generating INFORMATIONAL request 0 [ D ]
Sat Oct 24 20:20:53 2020 authpriv.info : 00[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[1291] (80 bytes)
Sat Oct 24 20:20:53 2020 daemon.info : 00[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[1291] (80 bytes)
Sat Oct 24 20:20:53 2020 authpriv.info ipsec_starter[7645]: charon stopped after 200 ms
Sat Oct 24 20:20:53 2020 authpriv.info ipsec_starter[7645]: ipsec starter stopped
Sat Oct 24 20:20:59 2020 authpriv.info ipsec_starter[8273]: Starting strongSwan 5.8.2 IPsec [starter]…
Sat Oct 24 20:20:59 2020 authpriv.info : 00[DMN] Starting IKE charon daemon (strongSwan 5.8.2, Linux 4.14.180, armv7l)
Sat Oct 24 20:20:59 2020 daemon.info : 00[DMN] Starting IKE charon daemon (strongSwan 5.8.2, Linux 4.14.180, armv7l)
Sat Oct 24 20:20:59 2020 authpriv.info : 00[CFG] PKCS11 module ‘<name>’ lacks library path
Sat Oct 24 20:20:59 2020 daemon.info : 00[CFG] PKCS11 module ‘<name>’ lacks library path
Sat Oct 24 20:21:00 2020 authpriv.info : 00[LIB] curl SSL backend ‘mbedTLS/2.16.6’ not supported, https:// disabled
Sat Oct 24 20:21:00 2020 daemon.info : 00[LIB] curl SSL backend ‘mbedTLS/2.16.6’ not supported, https:// disabled
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG] disabling load-tester plugin, not configured
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG] disabling load-tester plugin, not configured
Sat Oct 24 20:21:00 2020 authpriv.info : 00[LIB] plugin ‘load-tester’: failed to load – load_tester_plugin_create returned NULL
Sat Oct 24 20:21:00 2020 daemon.info : 00[LIB] plugin ‘load-tester’: failed to load – load_tester_plugin_create returned NULL
Sat Oct 24 20:21:00 2020 authpriv.info : 00[LIB] plugin ‘uci’ failed to load: Error relocating /usr/lib/ipsec/plugins/libstrongswan-uci.so: uci_lookup: symbol not found
Sat Oct 24 20:21:00 2020 daemon.info : 00[LIB] plugin ‘uci’ failed to load: Error relocating /usr/lib/ipsec/plugins/libstrongswan-uci.so: uci_lookup: symbol not found
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG] attr-sql plugin: database URI not set
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG] attr-sql plugin: database URI not set
Sat Oct 24 20:21:00 2020 authpriv.info : 00[NET] using forecast interface br-lan
Sat Oct 24 20:21:00 2020 daemon.info : 00[NET] using forecast interface br-lan
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG] joining forecast multicast groups: 224.0.0.1,224.0.0.22,224.0.0.251,224.0.0.252,239.255.255.250
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG] joining forecast multicast groups: 224.0.0.1,224.0.0.22,224.0.0.251,224.0.0.252,239.255.255.250
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG] loading ca certificates from ‘/etc/ipsec.d/cacerts’
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG] loading ca certificates from ‘/etc/ipsec.d/cacerts’
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG] loading aa certificates from ‘/etc/ipsec.d/aacerts’
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG] loading aa certificates from ‘/etc/ipsec.d/aacerts’
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG] loading ocsp signer certificates from ‘/etc/ipsec.d/ocspcerts’
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG] loading ocsp signer certificates from ‘/etc/ipsec.d/ocspcerts’
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG] loading attribute certificates from ‘/etc/ipsec.d/acerts’
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG] loading attribute certificates from ‘/etc/ipsec.d/acerts’
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG] loading crls from ‘/etc/ipsec.d/crls’
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG] loading crls from ‘/etc/ipsec.d/crls’
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG] loading secrets from ‘/etc/ipsec.secrets’
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG] loading secrets from ‘/etc/ipsec.secrets’
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG]   loaded IKE secret for 123.123.123.123 100.100.100.100
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG]   loaded IKE secret for 123.123.123.123 100.100.100.100
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG]   loaded IKE secret for 192.168.0.6 192.168.0.16
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG]   loaded IKE secret for 192.168.0.6 192.168.0.16
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG]   loaded IKE secret for 192.168.0.16 192.168.0.6
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG]   loaded IKE secret for 192.168.0.16 192.168.0.6
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG] sql plugin: database URI not set
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG] sql plugin: database URI not set
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG] loaded 0 RADIUS server configurations
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG] loaded 0 RADIUS server configurations
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG] HA config misses local/remote address
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG] HA config misses local/remote address
Sat Oct 24 20:21:00 2020 authpriv.info : 00[CFG] coupling file path unspecified
Sat Oct 24 20:21:00 2020 daemon.info : 00[CFG] coupling file path unspecified
Sat Oct 24 20:21:00 2020 authpriv.info : 00[LIB] loaded plugins: charon test-vectors ldap pkcs11 aes des blowfish rc2 sha2 sha1 md4 md5 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl gcrypt af-alg fips-prf gmp gmpdh curve25519 agent xcbc cmac hmac ctr ccm gcm curl mysql sqlite attr kernel-netlink resolve socket-default socket-dynamic connmark forecast farp stroke vici smp updown eap-identity eap-md5 eap-mschapv2 eap-radius eap-tls xauth-generic xauth-eap dhcp whitelist led duplicheck addrblock unity
Sat Oct 24 20:21:00 2020 daemon.info : 00[LIB] loaded plugins: charon test-vectors ldap pkcs11 aes des blowfish rc2 sha2 sha1 md4 md5 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl gcrypt af-alg fips-prf gmp gmpdh curve25519 agent xcbc cmac hmac ctr ccm gcm curl mysql sqlite attr kernel-netlink resolve socket-default socket-dynamic connmark forecast farp stroke vici smp updown eap-identity eap-md5 eap-mschapv2 eap-radius eap-tls xauth-generic xauth-eap dhcp whitelist led duplicheck addrblock unity
Sat Oct 24 20:21:00 2020 authpriv.info : 00[JOB] spawning 16 worker threads
Sat Oct 24 20:21:00 2020 daemon.info : 00[JOB] spawning 16 worker threads
Sat Oct 24 20:21:00 2020 authpriv.info ipsec_starter[8276]: charon (8277) started after 1740 ms
Sat Oct 24 20:21:00 2020 authpriv.info : 07[CFG] received stroke: add connection ‘remote-to-asus’
Sat Oct 24 20:21:00 2020 daemon.info : 07[CFG] received stroke: add connection ‘remote-to-asus’
Sat Oct 24 20:21:00 2020 authpriv.info : 07[CFG] added configuration ‘remote-to-asus’
Sat Oct 24 20:21:00 2020 daemon.info : 07[CFG] added configuration ‘remote-to-asus’
Sat Oct 24 20:21:00 2020 authpriv.info : 09[CFG] received stroke: initiate ‘remote-to-asus’
Sat Oct 24 20:21:00 2020 daemon.info : 09[CFG] received stroke: initiate ‘remote-to-asus’
Sat Oct 24 20:21:00 2020 authpriv.info : 09[IKE] initiating IKE_SA remote-to-asus[1] to 192.168.0.6
Sat Oct 24 20:21:00 2020 daemon.info : 09[IKE] initiating IKE_SA remote-to-asus[1] to 192.168.0.6
Sat Oct 24 20:21:01 2020 authpriv.info : 09[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 09[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 09[NET] sending packet: from 192.168.0.12[500] to 192.168.0.6[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 09[NET] sending packet: from 192.168.0.12[500] to 192.168.0.6[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 10[CFG] received stroke: add connection ‘asus-to-remote’
Sat Oct 24 20:21:01 2020 daemon.info : 10[CFG] received stroke: add connection ‘asus-to-remote’
Sat Oct 24 20:21:01 2020 authpriv.info : 13[NET] received packet: from 192.168.0.6[500] to 192.168.0.12[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 13[NET] received packet: from 192.168.0.6[500] to 192.168.0.12[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 10[CFG] added configuration ‘asus-to-remote’
Sat Oct 24 20:21:01 2020 daemon.info : 10[CFG] added configuration ‘asus-to-remote’
Sat Oct 24 20:21:01 2020 authpriv.info : 11[CFG] received stroke: initiate ‘asus-to-remote’
Sat Oct 24 20:21:01 2020 daemon.info : 11[CFG] received stroke: initiate ‘asus-to-remote’
Sat Oct 24 20:21:01 2020 authpriv.info : 13[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 13[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 13[IKE] 192.168.0.6 is initiating an IKE_SA
Sat Oct 24 20:21:01 2020 daemon.info : 13[IKE] 192.168.0.6 is initiating an IKE_SA
Sat Oct 24 20:21:01 2020 authpriv.info : 13[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 daemon.info : 13[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 authpriv.info : 13[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 daemon.info : 13[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 authpriv.info : 13[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 daemon.info : 13[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 authpriv.info : 13[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 daemon.info : 13[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 13[NET] sending packet: from 192.168.0.12[500] to 192.168.0.6[500] (344 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 13[NET] sending packet: from 192.168.0.12[500] to 192.168.0.6[500] (344 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 11[IKE] initiating IKE_SA asus-to-remote[3] to 192.168.0.6
Sat Oct 24 20:21:01 2020 daemon.info : 11[IKE] initiating IKE_SA asus-to-remote[3] to 192.168.0.6
Sat Oct 24 20:21:01 2020 authpriv.info : 15[NET] received packet: from 192.168.0.6[500] to 192.168.0.12[500] (344 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 15[NET] received packet: from 192.168.0.6[500] to 192.168.0.12[500] (344 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 15[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 daemon.info : 15[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 15[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 daemon.info : 15[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 authpriv.info : 11[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 11[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] authentication of ‘123.123.123.123’ (myself) with pre-shared key
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] authentication of ‘123.123.123.123’ (myself) with pre-shared key
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] establishing CHILD_SA remote-to-asus{1}
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] establishing CHILD_SA remote-to-asus{1}
Sat Oct 24 20:21:01 2020 authpriv.info : 11[NET] sending packet: from 192.168.0.12[500] to 192.168.0.6[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 11[NET] sending packet: from 192.168.0.12[500] to 192.168.0.6[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 15[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 15[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 16[CFG] received stroke: add connection ‘asus-any-to-remote’
Sat Oct 24 20:21:01 2020 daemon.info : 16[CFG] received stroke: add connection ‘asus-any-to-remote’
Sat Oct 24 20:21:01 2020 authpriv.info : 16[CFG] added configuration ‘asus-any-to-remote’
Sat Oct 24 20:21:01 2020 daemon.info : 16[CFG] added configuration ‘asus-any-to-remote’
Sat Oct 24 20:21:01 2020 authpriv.info : 05[CFG] received stroke: initiate ‘asus-any-to-remote’
Sat Oct 24 20:21:01 2020 daemon.info : 05[CFG] received stroke: initiate ‘asus-any-to-remote’
Sat Oct 24 20:21:01 2020 authpriv.info : 07[NET] received packet: from 192.168.0.6[500] to 192.168.0.12[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 07[NET] received packet: from 192.168.0.6[500] to 192.168.0.12[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 15[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 15[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 07[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 07[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 07[IKE] 192.168.0.6 is initiating an IKE_SA
Sat Oct 24 20:21:01 2020 daemon.info : 07[IKE] 192.168.0.6 is initiating an IKE_SA
Sat Oct 24 20:21:01 2020 authpriv.info : 05[IKE] initiating IKE_SA asus-any-to-remote[5] to 192.168.0.6
Sat Oct 24 20:21:01 2020 daemon.info : 05[IKE] initiating IKE_SA asus-any-to-remote[5] to 192.168.0.6
Sat Oct 24 20:21:01 2020 authpriv.info : 07[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 daemon.info : 07[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 authpriv.info : 06[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 06[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 06[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 06[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 06[CFG] looking for peer configs matching 192.168.0.12[100.100.100.100]…192.168.0.6[123.123.123.123]
Sat Oct 24 20:21:01 2020 daemon.info : 06[CFG] looking for peer configs matching 192.168.0.12[100.100.100.100]…192.168.0.6[123.123.123.123]
Sat Oct 24 20:21:01 2020 authpriv.info : 06[CFG] no matching peer config found
Sat Oct 24 20:21:01 2020 daemon.info : 06[CFG] no matching peer config found
Sat Oct 24 20:21:01 2020 authpriv.info : 06[ENC] generating IKE_AUTH response 1 [ N(AUTH_FAILED) ]
Sat Oct 24 20:21:01 2020 daemon.info : 06[ENC] generating IKE_AUTH response 1 [ N(AUTH_FAILED) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 06[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 06[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 10[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 10[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 10[ENC] parsed IKE_AUTH response 1 [ N(AUTH_FAILED) ]
Sat Oct 24 20:21:01 2020 daemon.info : 10[ENC] parsed IKE_AUTH response 1 [ N(AUTH_FAILED) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 10[IKE] received AUTHENTICATION_FAILED notify error
Sat Oct 24 20:21:01 2020 daemon.info : 10[IKE] received AUTHENTICATION_FAILED notify error
Sat Oct 24 20:21:01 2020 authpriv.info : 05[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 05[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 05[NET] sending packet: from 192.168.0.12[500] to 192.168.0.6[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 05[NET] sending packet: from 192.168.0.12[500] to 192.168.0.6[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 12[CFG] received stroke: add connection ‘azure-s2s’
Sat Oct 24 20:21:01 2020 daemon.info : 12[CFG] received stroke: add connection ‘azure-s2s’
Sat Oct 24 20:21:01 2020 authpriv.info : 11[NET] received packet: from 192.168.0.6[500] to 192.168.0.12[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 11[NET] received packet: from 192.168.0.6[500] to 192.168.0.12[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 12[CFG] added configuration ‘azure-s2s’
Sat Oct 24 20:21:01 2020 daemon.info : 12[CFG] added configuration ‘azure-s2s’
Sat Oct 24 20:21:01 2020 authpriv.info : 16[CFG] received stroke: initiate ‘azure-s2s’
Sat Oct 24 20:21:01 2020 daemon.info : 16[CFG] received stroke: initiate ‘azure-s2s’
Sat Oct 24 20:21:01 2020 authpriv.info : 11[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 11[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 11[IKE] 192.168.0.6 is initiating an IKE_SA
Sat Oct 24 20:21:01 2020 daemon.info : 11[IKE] 192.168.0.6 is initiating an IKE_SA
Sat Oct 24 20:21:01 2020 authpriv.info : 11[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 daemon.info : 11[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 authpriv.info : 07[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 daemon.info : 07[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 authpriv.info : 07[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 daemon.info : 07[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 authpriv.info : 07[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 daemon.info : 07[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 07[NET] sending packet: from 192.168.0.12[500] to 192.168.0.6[500] (344 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 07[NET] sending packet: from 192.168.0.12[500] to 192.168.0.6[500] (344 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 15[NET] received packet: from 192.168.0.6[500] to 192.168.0.12[500] (344 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 15[NET] received packet: from 192.168.0.6[500] to 192.168.0.12[500] (344 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 15[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 daemon.info : 15[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 15[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 daemon.info : 15[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] authentication of ‘100.100.100.100’ (myself) with pre-shared key
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] authentication of ‘100.100.100.100’ (myself) with pre-shared key
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] establishing CHILD_SA asus-to-remote{2}
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] establishing CHILD_SA asus-to-remote{2}
Sat Oct 24 20:21:01 2020 authpriv.info : 15[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 15[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 15[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 15[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 11[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 daemon.info : 11[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 authpriv.info : 11[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 daemon.info : 11[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 authpriv.info : 09[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 09[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 11[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 daemon.info : 11[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 09[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 09[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 11[NET] sending packet: from 192.168.0.12[500] to 192.168.0.6[500] (344 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 11[NET] sending packet: from 192.168.0.12[500] to 192.168.0.6[500] (344 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 09[CFG] looking for peer configs matching 192.168.0.12[192.168.0.12]…192.168.0.6[100.100.100.100]
Sat Oct 24 20:21:01 2020 daemon.info : 09[CFG] looking for peer configs matching 192.168.0.12[192.168.0.12]…192.168.0.6[100.100.100.100]
Sat Oct 24 20:21:01 2020 authpriv.info : 09[CFG] selected peer config ‘asus-any-to-remote’
Sat Oct 24 20:21:01 2020 daemon.info : 09[CFG] selected peer config ‘asus-any-to-remote’
Sat Oct 24 20:21:01 2020 authpriv.info : 06[NET] received packet: from 192.168.0.6[500] to 192.168.0.12[500] (344 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 06[NET] received packet: from 192.168.0.6[500] to 192.168.0.12[500] (344 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 09[IKE] authentication of ‘100.100.100.100’ with pre-shared key successful
Sat Oct 24 20:21:01 2020 daemon.info : 09[IKE] authentication of ‘100.100.100.100’ with pre-shared key successful
Sat Oct 24 20:21:01 2020 authpriv.info : 06[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 daemon.info : 06[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 09[IKE] authentication of ‘192.168.0.12’ (myself) with pre-shared key
Sat Oct 24 20:21:01 2020 daemon.info : 09[IKE] authentication of ‘192.168.0.12’ (myself) with pre-shared key
Sat Oct 24 20:21:01 2020 authpriv.info : 06[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 daemon.info : 06[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 authpriv.info : 09[IKE] IKE_SA asus-any-to-remote[4] established between 192.168.0.12[192.168.0.12]…192.168.0.6[100.100.100.100]
Sat Oct 24 20:21:01 2020 daemon.info : 09[IKE] IKE_SA asus-any-to-remote[4] established between 192.168.0.12[192.168.0.12]…192.168.0.6[100.100.100.100]
Sat Oct 24 20:21:01 2020 authpriv.info : 09[IKE] scheduling reauthentication in 28457s
Sat Oct 24 20:21:01 2020 daemon.info : 09[IKE] scheduling reauthentication in 28457s
Sat Oct 24 20:21:01 2020 authpriv.info : 09[IKE] maximum IKE_SA lifetime 28637s
Sat Oct 24 20:21:01 2020 daemon.info : 09[IKE] maximum IKE_SA lifetime 28637s
Sat Oct 24 20:21:01 2020 authpriv.info : 09[IKE] traffic selectors 192.168.0.6/32 === 192.168.0.12/32 unacceptable
Sat Oct 24 20:21:01 2020 daemon.info : 09[IKE] traffic selectors 192.168.0.6/32 === 192.168.0.12/32 unacceptable
Sat Oct 24 20:21:01 2020 authpriv.info : 09[IKE] failed to establish CHILD_SA, keeping IKE_SA
Sat Oct 24 20:21:01 2020 daemon.info : 09[IKE] failed to establish CHILD_SA, keeping IKE_SA
Sat Oct 24 20:21:01 2020 authpriv.info : 09[ENC] generating IKE_AUTH response 1 [ IDr AUTH N(AUTH_LFT) N(TS_UNACCEPT) ]
Sat Oct 24 20:21:01 2020 daemon.info : 09[ENC] generating IKE_AUTH response 1 [ IDr AUTH N(AUTH_LFT) N(TS_UNACCEPT) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 09[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (144 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 09[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (144 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 16[IKE] initiating IKE_SA azure-s2s[7] to 100.100.100.100
Sat Oct 24 20:21:01 2020 daemon.info : 16[IKE] initiating IKE_SA azure-s2s[7] to 100.100.100.100
Sat Oct 24 20:21:01 2020 authpriv.info : 05[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (144 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 05[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (144 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 05[ENC] parsed IKE_AUTH response 1 [ IDr AUTH N(AUTH_LFT) N(TS_UNACCEPT) ]
Sat Oct 24 20:21:01 2020 daemon.info : 05[ENC] parsed IKE_AUTH response 1 [ IDr AUTH N(AUTH_LFT) N(TS_UNACCEPT) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 05[IKE] authentication of ‘192.168.0.12’ with pre-shared key successful
Sat Oct 24 20:21:01 2020 daemon.info : 05[IKE] authentication of ‘192.168.0.12’ with pre-shared key successful
Sat Oct 24 20:21:01 2020 authpriv.info : 05[IKE] IKE_SA asus-to-remote[3] established between 192.168.0.12[100.100.100.100]…192.168.0.6[192.168.0.12]
Sat Oct 24 20:21:01 2020 daemon.info : 05[IKE] IKE_SA asus-to-remote[3] established between 192.168.0.12[100.100.100.100]…192.168.0.6[192.168.0.12]
Sat Oct 24 20:21:01 2020 authpriv.info : 05[IKE] scheduling reauthentication in 28614s
Sat Oct 24 20:21:01 2020 daemon.info : 05[IKE] scheduling reauthentication in 28614s
Sat Oct 24 20:21:01 2020 authpriv.info : 05[IKE] maximum IKE_SA lifetime 28794s
Sat Oct 24 20:21:01 2020 daemon.info : 05[IKE] maximum IKE_SA lifetime 28794s
Sat Oct 24 20:21:01 2020 authpriv.info : 05[IKE] received TS_UNACCEPTABLE notify, no CHILD_SA built
Sat Oct 24 20:21:01 2020 daemon.info : 05[IKE] received TS_UNACCEPTABLE notify, no CHILD_SA built
Sat Oct 24 20:21:01 2020 authpriv.info : 05[IKE] failed to establish CHILD_SA, keeping IKE_SA
Sat Oct 24 20:21:01 2020 daemon.info : 05[IKE] failed to establish CHILD_SA, keeping IKE_SA
Sat Oct 24 20:21:01 2020 authpriv.info : 05[IKE] received AUTH_LIFETIME of 28457s, scheduling reauthentication in 28277s
Sat Oct 24 20:21:01 2020 daemon.info : 05[IKE] received AUTH_LIFETIME of 28457s, scheduling reauthentication in 28277s
Sat Oct 24 20:21:01 2020 authpriv.info : 06[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 daemon.info : 06[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 authpriv.info : 06[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 daemon.info : 06[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 authpriv.info : 06[CFG] no IDi configured, fall back on IP address
Sat Oct 24 20:21:01 2020 daemon.info : 06[CFG] no IDi configured, fall back on IP address
Sat Oct 24 20:21:01 2020 authpriv.info : 06[IKE] authentication of ‘192.168.0.12’ (myself) with pre-shared key
Sat Oct 24 20:21:01 2020 daemon.info : 06[IKE] authentication of ‘192.168.0.12’ (myself) with pre-shared key
Sat Oct 24 20:21:01 2020 authpriv.info : 16[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 16[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 06[IKE] establishing CHILD_SA asus-any-to-remote{3}
Sat Oct 24 20:21:01 2020 daemon.info : 06[IKE] establishing CHILD_SA asus-any-to-remote{3}
Sat Oct 24 20:21:01 2020 authpriv.info : 16[NET] sending packet: from 192.168.0.12[500] to 100.100.100.100[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 16[NET] sending packet: from 192.168.0.12[500] to 100.100.100.100[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 06[ENC] generating IKE_AUTH request 1 [ IDi IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 06[ENC] generating IKE_AUTH request 1 [ IDi IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 13[NET] received packet: from 192.168.0.6[344] to 192.168.0.12[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 13[NET] received packet: from 192.168.0.6[344] to 192.168.0.12[500] (1232 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 06[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 13[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 06[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 13[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 13[IKE] 192.168.0.6 is initiating an IKE_SA
Sat Oct 24 20:21:01 2020 daemon.info : 13[IKE] 192.168.0.6 is initiating an IKE_SA
Sat Oct 24 20:21:01 2020 authpriv.info : 12[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 12[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 12[ENC] parsed IKE_AUTH request 1 [ IDi IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 12[ENC] parsed IKE_AUTH request 1 [ IDi IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 12[CFG] looking for peer configs matching 192.168.0.12[100.100.100.100]…192.168.0.6[192.168.0.12]
Sat Oct 24 20:21:01 2020 daemon.info : 12[CFG] looking for peer configs matching 192.168.0.12[100.100.100.100]…192.168.0.6[192.168.0.12]
Sat Oct 24 20:21:01 2020 authpriv.info : 12[CFG] selected peer config ‘asus-to-remote’
Sat Oct 24 20:21:01 2020 daemon.info : 12[CFG] selected peer config ‘asus-to-remote’
Sat Oct 24 20:21:01 2020 authpriv.info : 12[IKE] authentication of ‘192.168.0.12’ with pre-shared key successful
Sat Oct 24 20:21:01 2020 daemon.info : 12[IKE] authentication of ‘192.168.0.12’ with pre-shared key successful
Sat Oct 24 20:21:01 2020 authpriv.info : 12[IKE] authentication of ‘100.100.100.100’ (myself) with pre-shared key
Sat Oct 24 20:21:01 2020 daemon.info : 12[IKE] authentication of ‘100.100.100.100’ (myself) with pre-shared key
Sat Oct 24 20:21:01 2020 authpriv.info : 12[IKE] schedule delete of duplicate IKE_SA for peer ‘192.168.0.12’ due to uniqueness policy and suspected reauthentication
Sat Oct 24 20:21:01 2020 daemon.info : 12[IKE] schedule delete of duplicate IKE_SA for peer ‘192.168.0.12’ due to uniqueness policy and suspected reauthentication
Sat Oct 24 20:21:01 2020 authpriv.info : 12[IKE] IKE_SA asus-to-remote[6] established between 192.168.0.12[100.100.100.100]…192.168.0.6[192.168.0.12]
Sat Oct 24 20:21:01 2020 daemon.info : 12[IKE] IKE_SA asus-to-remote[6] established between 192.168.0.12[100.100.100.100]…192.168.0.6[192.168.0.12]
Sat Oct 24 20:21:01 2020 authpriv.info : 12[IKE] scheduling reauthentication in 28514s
Sat Oct 24 20:21:01 2020 daemon.info : 12[IKE] scheduling reauthentication in 28514s
Sat Oct 24 20:21:01 2020 authpriv.info : 12[IKE] maximum IKE_SA lifetime 28694s
Sat Oct 24 20:21:01 2020 daemon.info : 12[IKE] maximum IKE_SA lifetime 28694s
Sat Oct 24 20:21:01 2020 authpriv.info : 12[CFG] detected duplicate IKE_SA for ‘192.168.0.12’, triggering delete for old IKE_SA
Sat Oct 24 20:21:01 2020 daemon.info : 12[CFG] detected duplicate IKE_SA for ‘192.168.0.12’, triggering delete for old IKE_SA
Sat Oct 24 20:21:01 2020 authpriv.info : 08[IKE] deleting IKE_SA asus-to-remote[3] between 192.168.0.12[100.100.100.100]…192.168.0.6[192.168.0.12]
Sat Oct 24 20:21:01 2020 authpriv.info : 12[IKE] traffic selectors 192.168.0.6/32 === 192.168.0.12/32 unacceptable
Sat Oct 24 20:21:01 2020 daemon.info : 08[IKE] deleting IKE_SA asus-to-remote[3] between 192.168.0.12[100.100.100.100]…192.168.0.6[192.168.0.12]
Sat Oct 24 20:21:01 2020 authpriv.info : 08[IKE] sending DELETE for IKE_SA asus-to-remote[3]
Sat Oct 24 20:21:01 2020 daemon.info : 08[IKE] sending DELETE for IKE_SA asus-to-remote[3]
Sat Oct 24 20:21:01 2020 authpriv.info : 08[ENC] generating INFORMATIONAL request 2 [ D ]
Sat Oct 24 20:21:01 2020 daemon.info : 12[IKE] traffic selectors 192.168.0.6/32 === 192.168.0.12/32 unacceptable
Sat Oct 24 20:21:01 2020 daemon.info : 08[ENC] generating INFORMATIONAL request 2 [ D ]
Sat Oct 24 20:21:01 2020 authpriv.info : 12[IKE] failed to establish CHILD_SA, keeping IKE_SA
Sat Oct 24 20:21:01 2020 daemon.info : 12[IKE] failed to establish CHILD_SA, keeping IKE_SA
Sat Oct 24 20:21:01 2020 authpriv.info : 12[ENC] generating IKE_AUTH response 1 [ IDr AUTH N(AUTH_LFT) N(TS_UNACCEPT) ]
Sat Oct 24 20:21:01 2020 daemon.info : 12[ENC] generating IKE_AUTH response 1 [ IDr AUTH N(AUTH_LFT) N(TS_UNACCEPT) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 08[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 08[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 12[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (144 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 12[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (144 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 13[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 daemon.info : 13[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 authpriv.info : 11[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 11[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 15[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (144 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 15[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (144 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 11[ENC] parsed INFORMATIONAL request 2 [ D ]
Sat Oct 24 20:21:01 2020 daemon.info : 11[ENC] parsed INFORMATIONAL request 2 [ D ]
Sat Oct 24 20:21:01 2020 authpriv.info : 11[IKE] received DELETE for IKE_SA asus-any-to-remote[4]
Sat Oct 24 20:21:01 2020 daemon.info : 11[IKE] received DELETE for IKE_SA asus-any-to-remote[4]
Sat Oct 24 20:21:01 2020 authpriv.info : 15[ENC] parsed IKE_AUTH response 1 [ IDr AUTH N(AUTH_LFT) N(TS_UNACCEPT) ]
Sat Oct 24 20:21:01 2020 daemon.info : 15[ENC] parsed IKE_AUTH response 1 [ IDr AUTH N(AUTH_LFT) N(TS_UNACCEPT) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 11[IKE] deleting IKE_SA asus-any-to-remote[4] between 192.168.0.12[192.168.0.12]…192.168.0.6[100.100.100.100]
Sat Oct 24 20:21:01 2020 daemon.info : 11[IKE] deleting IKE_SA asus-any-to-remote[4] between 192.168.0.12[192.168.0.12]…192.168.0.6[100.100.100.100]
Sat Oct 24 20:21:01 2020 authpriv.info : 11[IKE] IKE_SA deleted
Sat Oct 24 20:21:01 2020 daemon.info : 11[IKE] IKE_SA deleted
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] authentication of ‘100.100.100.100’ with pre-shared key successful
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] authentication of ‘100.100.100.100’ with pre-shared key successful
Sat Oct 24 20:21:01 2020 authpriv.info : 11[ENC] generating INFORMATIONAL response 2 [ ]
Sat Oct 24 20:21:01 2020 daemon.info : 11[ENC] generating INFORMATIONAL response 2 [ ]
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] IKE_SA asus-any-to-remote[5] established between 192.168.0.12[192.168.0.12]…192.168.0.6[100.100.100.100]
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] IKE_SA asus-any-to-remote[5] established between 192.168.0.12[192.168.0.12]…192.168.0.6[100.100.100.100]
Sat Oct 24 20:21:01 2020 authpriv.info : 11[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 11[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] scheduling reauthentication in 28441s
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] scheduling reauthentication in 28441s
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] maximum IKE_SA lifetime 28621s
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] maximum IKE_SA lifetime 28621s
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] received TS_UNACCEPTABLE notify, no CHILD_SA built
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] received TS_UNACCEPTABLE notify, no CHILD_SA built
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] failed to establish CHILD_SA, keeping IKE_SA
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] failed to establish CHILD_SA, keeping IKE_SA
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] received AUTH_LIFETIME of 28514s, scheduling reauthentication in 28334s
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] received AUTH_LIFETIME of 28514s, scheduling reauthentication in 28334s
Sat Oct 24 20:21:01 2020 authpriv.info : 10[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 10[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 10[ENC] parsed INFORMATIONAL response 2 [ ]
Sat Oct 24 20:21:01 2020 daemon.info : 10[ENC] parsed INFORMATIONAL response 2 [ ]
Sat Oct 24 20:21:01 2020 authpriv.info : 10[CFG] got a response on a duplicate IKE_SA for ‘192.168.0.12’, deleting new IKE_SA
Sat Oct 24 20:21:01 2020 daemon.info : 10[CFG] got a response on a duplicate IKE_SA for ‘192.168.0.12’, deleting new IKE_SA
Sat Oct 24 20:21:01 2020 authpriv.info : 10[IKE] IKE_SA deleted
Sat Oct 24 20:21:01 2020 daemon.info : 10[IKE] IKE_SA deleted
Sat Oct 24 20:21:01 2020 authpriv.info : 10[IKE] deleting IKE_SA asus-to-remote[6] between 192.168.0.12[100.100.100.100]…192.168.0.6[192.168.0.12]
Sat Oct 24 20:21:01 2020 daemon.info : 10[IKE] deleting IKE_SA asus-to-remote[6] between 192.168.0.12[100.100.100.100]…192.168.0.6[192.168.0.12]
Sat Oct 24 20:21:01 2020 authpriv.info : 10[IKE] sending DELETE for IKE_SA asus-to-remote[6]
Sat Oct 24 20:21:01 2020 daemon.info : 10[IKE] sending DELETE for IKE_SA asus-to-remote[6]
Sat Oct 24 20:21:01 2020 authpriv.info : 10[ENC] generating INFORMATIONAL request 0 [ D ]
Sat Oct 24 20:21:01 2020 daemon.info : 10[ENC] generating INFORMATIONAL request 0 [ D ]
Sat Oct 24 20:21:01 2020 authpriv.info : 10[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 10[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 05[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 05[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 05[ENC] parsed INFORMATIONAL request 0 [ D ]
Sat Oct 24 20:21:01 2020 daemon.info : 05[ENC] parsed INFORMATIONAL request 0 [ D ]
Sat Oct 24 20:21:01 2020 authpriv.info : 05[IKE] received DELETE for IKE_SA asus-any-to-remote[5]
Sat Oct 24 20:21:01 2020 daemon.info : 05[IKE] received DELETE for IKE_SA asus-any-to-remote[5]
Sat Oct 24 20:21:01 2020 authpriv.info : 05[IKE] deleting IKE_SA asus-any-to-remote[5] between 192.168.0.12[192.168.0.12]…192.168.0.6[100.100.100.100]
Sat Oct 24 20:21:01 2020 daemon.info : 05[IKE] deleting IKE_SA asus-any-to-remote[5] between 192.168.0.12[192.168.0.12]…192.168.0.6[100.100.100.100]
Sat Oct 24 20:21:01 2020 authpriv.info : 05[IKE] IKE_SA deleted
Sat Oct 24 20:21:01 2020 daemon.info : 05[IKE] IKE_SA deleted
Sat Oct 24 20:21:01 2020 authpriv.info : 05[ENC] generating INFORMATIONAL response 0 [ ]
Sat Oct 24 20:21:01 2020 daemon.info : 05[ENC] generating INFORMATIONAL response 0 [ ]
Sat Oct 24 20:21:01 2020 authpriv.info : 05[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 05[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 16[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 16[NET] received packet: from 192.168.0.6[4500] to 192.168.0.12[4500] (80 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 16[ENC] parsed INFORMATIONAL response 0 [ ]
Sat Oct 24 20:21:01 2020 daemon.info : 16[ENC] parsed INFORMATIONAL response 0 [ ]
Sat Oct 24 20:21:01 2020 authpriv.info : 16[IKE] IKE_SA deleted
Sat Oct 24 20:21:01 2020 daemon.info : 16[IKE] IKE_SA deleted
Sat Oct 24 20:21:01 2020 authpriv.info : 13[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 daemon.info : 13[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 authpriv.info : 13[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 daemon.info : 13[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 authpriv.info : 13[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 daemon.info : 13[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 13[NET] sending packet: from 192.168.0.12[500] to 192.168.0.6[344] (344 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 13[NET] sending packet: from 192.168.0.12[500] to 192.168.0.6[344] (344 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 06[NET] received packet: from 100.100.100.100[500] to 192.168.0.12[500] (344 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 06[NET] received packet: from 100.100.100.100[500] to 192.168.0.12[500] (344 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 06[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 daemon.info : 06[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 06[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 daemon.info : 06[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sat Oct 24 20:21:01 2020 authpriv.info : 06[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 daemon.info : 06[IKE] local host is behind NAT, sending keep alives
Sat Oct 24 20:21:01 2020 authpriv.info : 06[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 daemon.info : 06[IKE] remote host is behind NAT
Sat Oct 24 20:21:01 2020 authpriv.info : 06[IKE] authentication of ‘192.168.0.12’ (myself) with pre-shared key
Sat Oct 24 20:21:01 2020 daemon.info : 06[IKE] authentication of ‘192.168.0.12’ (myself) with pre-shared key
Sat Oct 24 20:21:01 2020 authpriv.info : 06[IKE] establishing CHILD_SA azure-s2s{4}
Sat Oct 24 20:21:01 2020 daemon.info : 06[IKE] establishing CHILD_SA azure-s2s{4}
Sat Oct 24 20:21:01 2020 authpriv.info : 06[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 06[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 06[NET] sending packet: from 192.168.0.12[4500] to 100.100.100.100[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 06[NET] sending packet: from 192.168.0.12[4500] to 100.100.100.100[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 15[NET] received packet: from 192.168.0.6[1367] to 192.168.0.12[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 15[NET] received packet: from 192.168.0.6[1367] to 192.168.0.12[4500] (384 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 15[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 daemon.info : 15[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 15[CFG] looking for peer configs matching 192.168.0.12[100.100.100.100]…192.168.0.6[192.168.0.12]
Sat Oct 24 20:21:01 2020 daemon.info : 15[CFG] looking for peer configs matching 192.168.0.12[100.100.100.100]…192.168.0.6[192.168.0.12]
Sat Oct 24 20:21:01 2020 authpriv.info : 15[CFG] selected peer config ‘asus-to-remote’
Sat Oct 24 20:21:01 2020 daemon.info : 15[CFG] selected peer config ‘asus-to-remote’
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] authentication of ‘192.168.0.12’ with pre-shared key successful
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] authentication of ‘192.168.0.12’ with pre-shared key successful
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] authentication of ‘100.100.100.100’ (myself) with pre-shared key
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] authentication of ‘100.100.100.100’ (myself) with pre-shared key
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] IKE_SA asus-to-remote[8] established between 192.168.0.12[100.100.100.100]…192.168.0.6[192.168.0.12]
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] IKE_SA asus-to-remote[8] established between 192.168.0.12[100.100.100.100]…192.168.0.6[192.168.0.12]
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] scheduling reauthentication in 28503s
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] scheduling reauthentication in 28503s
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] maximum IKE_SA lifetime 28683s
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] maximum IKE_SA lifetime 28683s
Sat Oct 24 20:21:01 2020 authpriv.info : 15[CFG] selected proposal: ESP:AES_GCM_16_256/NO_EXT_SEQ
Sat Oct 24 20:21:01 2020 daemon.info : 15[CFG] selected proposal: ESP:AES_GCM_16_256/NO_EXT_SEQ
Sat Oct 24 20:21:01 2020 authpriv.info : 15[IKE] CHILD_SA asus-to-remote{5} established with SPIs c3942311_i c12111c2_o and TS 192.168.0.12/32 === 192.168.0.6/32
Sat Oct 24 20:21:01 2020 daemon.info : 15[IKE] CHILD_SA asus-to-remote{5} established with SPIs c3942311_i c12111c2_o and TS 192.168.0.12/32 === 192.168.0.6/32
Sat Oct 24 20:21:01 2020 authpriv.info : 15[ENC] generating IKE_AUTH response 1 [ IDr AUTH SA TSi TSr N(AUTH_LFT) ]
Sat Oct 24 20:21:01 2020 daemon.info : 15[ENC] generating IKE_AUTH response 1 [ IDr AUTH SA TSi TSr N(AUTH_LFT) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 15[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[1367] (224 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 15[NET] sending packet: from 192.168.0.12[4500] to 192.168.0.6[1367] (224 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 09[NET] received packet: from 100.100.100.100[4500] to 192.168.0.12[4500] (224 bytes)
Sat Oct 24 20:21:01 2020 daemon.info : 09[NET] received packet: from 100.100.100.100[4500] to 192.168.0.12[4500] (224 bytes)
Sat Oct 24 20:21:01 2020 authpriv.info : 09[ENC] parsed IKE_AUTH response 1 [ IDr AUTH SA TSi TSr N(AUTH_LFT) ]
Sat Oct 24 20:21:01 2020 daemon.info : 09[ENC] parsed IKE_AUTH response 1 [ IDr AUTH SA TSi TSr N(AUTH_LFT) ]
Sat Oct 24 20:21:01 2020 authpriv.info : 09[IKE] authentication of ‘100.100.100.100’ with pre-shared key successful
Sat Oct 24 20:21:01 2020 daemon.info : 09[IKE] authentication of ‘100.100.100.100’ with pre-shared key successful
Sat Oct 24 20:21:01 2020 authpriv.info : 09[IKE] IKE_SA azure-s2s[7] established between 192.168.0.12[192.168.0.12]…100.100.100.100[100.100.100.100]
Sat Oct 24 20:21:01 2020 daemon.info : 09[IKE] IKE_SA azure-s2s[7] established between 192.168.0.12[192.168.0.12]…100.100.100.100[100.100.100.100]
Sat Oct 24 20:21:01 2020 authpriv.info : 09[IKE] scheduling reauthentication in 28506s
Sat Oct 24 20:21:01 2020 daemon.info : 09[IKE] scheduling reauthentication in 28506s
Sat Oct 24 20:21:01 2020 authpriv.info : 09[IKE] maximum IKE_SA lifetime 28686s
Sat Oct 24 20:21:01 2020 daemon.info : 09[IKE] maximum IKE_SA lifetime 28686s
Sat Oct 24 20:21:01 2020 authpriv.info : 09[CFG] selected proposal: ESP:AES_GCM_16_256/NO_EXT_SEQ
Sat Oct 24 20:21:01 2020 daemon.info : 09[CFG] selected proposal: ESP:AES_GCM_16_256/NO_EXT_SEQ
Sat Oct 24 20:21:01 2020 authpriv.info : 09[IKE] CHILD_SA azure-s2s{4} established with SPIs c12111c2_i c3942311_o and TS 192.168.0.6/32 === 192.168.0.12/32
Sat Oct 24 20:21:01 2020 daemon.info : 09[IKE] CHILD_SA azure-s2s{4} established with SPIs c12111c2_i c3942311_o and TS 192.168.0.6/32 === 192.168.0.12/32
Sat Oct 24 20:21:01 2020 local0.notice vpn: + 100.100.100.100 192.168.0.12/32 == 100.100.100.100 — 192.168.0.12 == 192.168.0.6/32
Sat Oct 24 20:21:01 2020 authpriv.info : 09[IKE] received AUTH_LIFETIME of 28503s, scheduling reauthentication in 28323s
Sat Oct 24 20:21:01 2020 daemon.info : 09[IKE] received AUTH_LIFETIME of 28503s, scheduling reauthentication in 28323s

root@OWRT01:~#

Pages: 1 2 3 4 5 6 7

Subscribe
Notify of
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

     
  Copyright © 2003 - 2025 Tom Kacperski (microdevsys.com). All rights reserved.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 Unported License

 

0
Would love your thoughts, please comment.x
()
x
The IT Development and Technology Mini Vault | MicroDevSys.com
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.