1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53
| juin 25 09:17:44.532 ipsec_setup: Stopping Openswan IPsec...
juin 25 09:17:46.304 Stopping xl2tpd: xl2tpd.
juin 25 09:17:46.304 xl2tpd[1533]: death_handler: Fatal signal 15 received
juin 25 09:17:46.323 ipsec_setup: Starting Openswan IPsec U2.6.38/K3.16.0-41-generic...
juin 25 09:17:46.769 ipsec__plutorun: Starting Pluto subsystem...
juin 25 09:17:46.775 ipsec__plutorun: adjusting ipsec.d to /etc/ipsec.d
juin 25 09:17:46.780 recvref[30]: Protocol not available
juin 25 09:17:46.780 xl2tpd[3299]: This binary does not support kernel L2TP.
juin 25 09:17:46.781 xl2tpd[3302]: xl2tpd version xl2tpd-1.3.6 started on teddy-System PID:3302
juin 25 09:17:46.781 xl2tpd[3302]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc.
juin 25 09:17:46.781 xl2tpd[3302]: Forked by Scott Balmos and David Stipp, (C) 2001
juin 25 09:17:46.781 xl2tpd[3302]: Inherited by Jeff McAdams, (C) 2002
juin 25 09:17:46.781 xl2tpd[3302]: Forked again by Xelerance (www.xelerance.com) (C) 2006
juin 25 09:17:46.781 xl2tpd[3302]: Listening on IP address 0.0.0.0, port 1701
juin 25 09:17:46.781 Starting xl2tpd: xl2tpd.
juin 25 09:17:46.814 ipsec__plutorun: 002 added connection description "VPNelis"
juin 25 09:17:57.074 104 "VPNelis" #1: STATE_MAIN_I1: initiate
juin 25 09:17:57.074 003 "VPNelis" #1: ignoring unknown Vendor ID payload [882fe56d6fd20dbc2251613b2ebe5beb]
juin 25 09:17:57.074 003 "VPNelis" #1: received Vendor ID payload [Cisco-Unity]
juin 25 09:17:57.074 003 "VPNelis" #1: received Vendor ID payload [XAUTH]
juin 25 09:17:57.074 003 "VPNelis" #1: received Vendor ID payload [Dead Peer Detection]
juin 25 09:17:57.074 003 "VPNelis" #1: received Vendor ID payload [RFC 3947] method set to=115
juin 25 09:17:57.074 106 "VPNelis" #1: STATE_MAIN_I2: sent MI2, expecting MR2
juin 25 09:17:57.074 003 "VPNelis" #1: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): i am NATed
juin 25 09:17:57.074 108 "VPNelis" #1: STATE_MAIN_I3: sent MI3, expecting MR3
juin 25 09:17:57.074 004 "VPNelis" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
juin 25 09:17:57.074 117 "VPNelis" #2: STATE_QUICK_I1: initiate
juin 25 09:17:57.074 010 "VPNelis" #2: STATE_QUICK_I1: retransmission; will wait 20s for response
juin 25 09:17:57.074 004 "VPNelis" #2: STATE_QUICK_I2: sent QI2, IPsec SA established transport mode {ESP=>0xc82602ea <0xfe73dda7 xfrm=3DES_0-HMAC_SHA1 NATOA=none NATD=none DPD=none}
juin 25 09:17:58.075 xl2tpd[3302]: Connecting to host 217.16.5.145, port 1701
juin 25 09:18:00.113 xl2tpd[3302]: Connection established to 217.16.5.145, 1701. Local: 25054, Remote: 15864 (ref=0/0).
juin 25 09:18:00.113 xl2tpd[3302]: Calling on tunnel 25054
juin 25 09:18:00.113 xl2tpd[3302]: check_control: Received out of order control packet on tunnel 15864 (got 0, expected 1)
juin 25 09:18:00.113 xl2tpd[3302]: handle_packet: bad control packet!
juin 25 09:18:00.114 xl2tpd[3302]: check_control: Received out of order control packet on tunnel 15864 (got 0, expected 1)
juin 25 09:18:00.114 xl2tpd[3302]: handle_packet: bad control packet!
juin 25 09:18:00.151 xl2tpd[3302]: Call established with 217.16.5.145, Local: 38786, Remote: 17681, Serial: 1 (ref=0/0)
juin 25 09:18:00.151 xl2tpd[3302]: start_pppd: I'm running:
juin 25 09:18:00.151 xl2tpd[3302]: "/usr/sbin/pppd"
juin 25 09:18:00.151 xl2tpd[3302]: "passive"
juin 25 09:18:00.151 xl2tpd[3302]: "nodetach"
juin 25 09:18:00.151 xl2tpd[3302]: ":"
juin 25 09:18:00.151 xl2tpd[3302]: "file"
juin 25 09:18:00.151 xl2tpd[3302]: "/etc/ppp/VPNelis.options.xl2tpd"
juin 25 09:18:00.151 xl2tpd[3302]: "/dev/pts/12"
juin 25 09:18:00.257 pppd[3390]: Plugin passprompt.so loaded.
juin 25 09:18:00.257 pppd[3390]: pppd 2.4.5 started by root, uid 0
juin 25 09:18:00.271 pppd[3390]: Using interface ppp0
juin 25 09:18:00.271 pppd[3390]: Connect: ppp0 <--> /dev/pts/12
juin 25 09:18:03.311 pppd[3390]: CHAP authentication succeeded: Access granted
juin 25 09:18:03.311 pppd[3390]: CHAP authentication succeeded
juin 25 09:18:03.390 pppd[3390]: local IP address 10.10.3.200
juin 25 09:18:03.390 pppd[3390]: remote IP address 10.255.255.0 |
Partager