FB_security 板


I have no idea whatsoever as to why racoon/IKE does not work here. I've tried various how-to documents but found nothing that works for me. Gateway (10.0.0.1) running 4.9-stable. Laptop (10.0.0.10) running 5.2.1-release. Both running racoon-20040408a On the gateway 10.0.0.1 # cat /etc/ipsec.conf add 10.0.0.1 10.0.0.10 esp 691 -E rijndael-cbc "1234567890123456" -A hmac-sha1 "12345678901234567890"; add 10.0.0.10 10.0.0.1 esp 693 -E rijndael-cbc "1234567890123456" -A hmac-sha1 "12345678901234567890"; spdadd 10.0.0.0/24 0.0.0.0/0 any -P in ipsec esp/tunnel/10.0.0.10- 10.0.0.1/require; spdadd 0.0.0.0/0 10.0.0.0/24 any -P out ipsec esp/tunnel/10.0.0.1- 10.0.0.10/require; On the laptop (10.0.0.10): add 10.0.0.1 10.0.0.10 esp 691 -E rijndael-cbc "1234567890123456" -A hmac-sha1 "12345678901234567890"; add 10.0.0.10 10.0.0.1 esp 693 -E rijndael-cbc "1234567890123456" -A hmac-sha1 "12345678901234567890"; spdadd 10.0.0.0/24 0.0.0.0/0 any -P out ipsec esp/tunnel/10.0.0.10- 10.0.0.1/require; spdadd 0.0.0.0/0 10.0.0.0/24 any -P in ipsec esp/tunnel/10.0.0.1- 10.0.0.10/require; With this setup, IPsec works just fine between the two boxes. If comment out the two "add" lines in each /etc/ipsec.conf, and keep the "spdadd" lines, and do this on both machines: setkey -F setkey -FP setkey -f /etc/ipsec.conf /usr/local/sbin/racoon -F -v I see this on the gateway. Does this mean anything to anyone? Thanks. Foreground mode. 2004-04-27 20:52:14: INFO: main.c:172:main(): @(#)package version freebsd-20040408a 2004-04-27 20:52:14: INFO: main.c:174:main(): @(#)internal version 20001216 [email protected] 2004-04-27 20:52:14: INFO: main.c:175:main(): @(#)This product linked OpenSSL 0.9.7c-p1 30 Sep 2003 (http://www.openssl.org/) 2004-04-27 20:52:14: DEBUG: algorithm.c:614:alg_oakley_dhdef(): hmac(modp1024) 2004-04-27 20:52:14: DEBUG: pfkey.c:2379:pk_checkalg(): compression algorithm can not be checked because sadb message doesn't suppo rt it. 2004-04-27 20:52:14: INFO: isakmp.c:1368:isakmp_open(): 10.0.0.1[500] used as isakmp port (fd=5) 2004-04-27 20:52:14: DEBUG: pfkey.c:197:pfkey_handler(): get pfkey X_SPDDUMP message 2004-04-27 20:52:14: DEBUG: pfkey.c:197:pfkey_handler(): get pfkey X_SPDDUMP message 2004-04-27 20:52:14: DEBUG: policy.c:184:cmpspidxstrict(): sub:0xbfbff958: 0.0.0.0/0[0] 10.0.0.0/24[0] proto=any dir=out 2004-04-27 20:52:14: DEBUG: policy.c:185:cmpspidxstrict(): db :0x80a1c08: 10.0.0.0/24[0] 0.0.0.0/0[0] proto=any dir=in 2004-04-27 20:52:18: DEBUG: pfkey.c:197:pfkey_handler(): get pfkey ACQUIRE message 2004-04-27 20:52:18: DEBUG: pfkey.c:1620:pk_recvacquire(): suitable outbound SP found: 0.0.0.0/0[0] 10.0.0.0/24[0] proto=any dir=ou t. 2004-04-27 20:52:18: DEBUG: policy.c:184:cmpspidxstrict(): sub:0xbfbff944: 10.0.0.0/24[0] 0.0.0.0/0[0] proto=any dir=in 2004-04-27 20:52:18: DEBUG: policy.c:185:cmpspidxstrict(): db :0x80a1c08: 10.0.0.0/24[0] 0.0.0.0/0[0] proto=any dir=in 2004-04-27 20:52:18: DEBUG: pfkey.c:1636:pk_recvacquire(): suitable inbound SP found: 10.0.0.0/24[0] 0.0.0.0/0[0] proto=any dir=in. 2004-04-27 20:52:18: DEBUG: pfkey.c:1675:pk_recvacquire(): new acquire 0.0.0.0/0[0] 10.0.0.0/24[0] proto=any dir=out 2004-04-27 20:52:18: DEBUG: sainfo.c:112:getsainfo(): anonymous sainfo selected. 2004-04-27 20:52:18: DEBUG: proposal.c:828:printsaproto(): (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqi d=0:0) 2004-04-27 20:52:18: DEBUG: proposal.c:862:printsatrns(): (trns_id=3DES encklen=0 authtype=hmac-sha) 2004-04-27 20:52:18: DEBUG: proposal.c:862:printsatrns(): (trns_id=3DES encklen=0 authtype=hmac-md5) 2004-04-27 20:52:18: DEBUG: proposal.c:862:printsatrns(): (trns_id=BLOWFISH encklen=448 authtype=hmac-sha) 2004-04-27 20:52:18: DEBUG: proposal.c:862:printsatrns(): (trns_id=BLOWFISH encklen=448 authtype=hmac-md5) 2004-04-27 20:52:18: DEBUG: proposal.c:862:printsatrns(): (trns_id=RIJNDAEL encklen=128 authtype=hmac-sha) 2004-04-27 20:52:18: DEBUG: proposal.c:862:printsatrns(): (trns_id=RIJNDAEL encklen=128 authtype=hmac-md5) 2004-04-27 20:52:18: DEBUG: remoteconf.c:129:getrmconf(): anonymous configuration selected for 10.0.0.10. 2004-04-27 20:52:18: INFO: isakmp.c:1694:isakmp_post_acquire(): IPsec- SA request for 10.0.0.10 queued due to no phase1 found. 2004-04-27 20:52:18: DEBUG: isakmp.c:803:isakmp_ph1begin_i(): === 2004-04-27 20:52:18: INFO: isakmp.c:808:isakmp_ph1begin_i(): initiate new phase 1 negotiation: 10.0.0.1[500]<=>10.0.0.10[500] 2004-04-27 20:52:18: INFO: isakmp.c:813:isakmp_ph1begin_i(): begin Aggressive mode. 2004-04-27 20:52:18: DEBUG: isakmp.c:2006:isakmp_newcookie(): new cookie: 055c6e2d1a6f5cf0 2004-04-27 20:52:18: DEBUG: ipsec_doi.c:3238:ipsecdoi_setid1(): use ID type of IPv4_address 2004-04-27 20:52:19: DEBUG: oakley.c:300:oakley_dh_generate(): compute DH's private. 2004-04-27 20:52:19: DEBUG: plog.c:193:plogdump(): 6e308efc dd12bb8c 43b3870d 470f6826 b75dcfed 51e9a827 7bfc9fb6 104e5038 ad255135 511f1047 029ebff4 059f5a66 3950f8df 1cf256d9 cae1b8a3 b72834de 8e0e440e aa85a078 70a283ba ea50c4c4 91004723 05892a7a 39694b9f 289e24e9 8931c02e 42830d85 91393b1d e67c6654 6a07a1ea 14929170 5c670bdd 3314cfea 2004-04-27 20:52:19: DEBUG: oakley.c:302:oakley_dh_generate(): compute DH's public. 2004-04-27 20:52:19: DEBUG: plog.c:193:plogdump(): 740d9432 471292e7 904d632f 29a2f3a5 aebdac90 1890488c ed630ccc a630afea 2c12c7c7 5f33aee7 8cab687d e03c0f84 28267175 3674acaf 3105339b 0796e4df 737fcac3 1e3cbdf7 34d1fe6d 0d65c16c 7f0125e6 7a71e10d 55473f4f 6ec53f95 b4d786bd a6656857 a377e251 bedcea49 05cd8477 ff460c16 fbfcd342 aea5ac79 2004-04-27 20:52:19: DEBUG: isakmp_agg.c:161:agg_i1send(): authmethod is pre-shared key 2004-04-27 20:52:19: DEBUG: isakmp.c:2130:set_isakmp_payload_c(): add payload of len 52, next type 1 2004-04-27 20:52:19: DEBUG: isakmp.c:2130:set_isakmp_payload_c(): add payload of len 128, next type 4 2004-04-27 20:52:19: DEBUG: isakmp.c:2130:set_isakmp_payload_c(): add payload of len 16, next type 10 2004-04-27 20:52:19: DEBUG: isakmp.c:2130:set_isakmp_payload_c(): add payload of len 8, next type 5 2004-04-27 20:52:19: DEBUG: isakmp.c:2295:isakmp_printpacket(): begin. 52:19.544602 10.0.0.1:500 -> 10.0.0.10:500: isakmp 1.0 msgid 00000000 cookie 055c6e2d1a6f5cf0->0000000000000000: phase 1 I agg: (sa: doi=ipsec situation=identity (p: #1 protoid=isakmp transform=1 (t: #1 id=ike (type=lifetype value=sec)(type=lifeduration len=4 value=00015180)(type=enc value=3des)(type=auth value=pr eshared)(type=hash value=sha1)(type=group desc value=modp1024)))) (ke: key len=128) (nonce: n len=16) (id: idtype=IPv4 protoid=udp port=500 len=4 10.0.0.1) 2004-04-27 20:52:19: DEBUG: sockmisc.c:421:sendfromto(): sockname 10.0.0.1[500] 2004-04-27 20:52:19: DEBUG: sockmisc.c:423:sendfromto(): send packet from 10.0.0.1[500] 2004-04-27 20:52:19: DEBUG: sockmisc.c:425:sendfromto(): send packet to 10.0.0.10[500] 2004-04-27 20:52:19: DEBUG: sockmisc.c:570:sendfromto(): 1 times of 248 bytes message will be sent to 10.0.0.10[500] 2004-04-27 20:52:19: DEBUG: plog.c:193:plogdump(): 055c6e2d 1a6f5cf0 00000000 00000000 01100400 00000000 000000f8 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 000c0004 00015180 80010005 80030001 80020002 80040002 0a000084 740d9432 471292e7 904d632f 29a2f3a5 aebdac90 1890488c ed630ccc a630afea 2c12c7c7 5f33aee7 8cab687d e03c0f84 28267175 3674acaf 3105339b 0796e4df 737fcac3 1e3cbdf7 34d1fe6d 0d65c16c 7f0125e6 7a71e10d 55473f4f 6ec53f95 b4d786bd a6656857 a377e251 bedcea49 05cd8477 ff460c16 fbfcd342 aea5ac79 05000014 bf9a051a 8cbfbef6 30991dd7 190ff373 0000000c 011101f4 0a000001 2004-04-27 20:52:19: DEBUG: isakmp.c:1459:isakmp_ph1resend(): resend phase1 packet 055c6e2d1a6f5cf0:0000000000000000 2004-04-27 20:52:29: DEBUG: pfkey.c:197:pfkey_handler(): get pfkey ACQUIRE message 2004-04-27 20:52:29: DEBUG: pfkey.c:1604:pk_recvacquire(): ignore the acquire because ph2 found 2004-04-27 20:52:37: DEBUG: pfkey.c:197:pfkey_handler(): get pfkey ACQUIRE message 2004-04-27 20:52:37: DEBUG: pfkey.c:1604:pk_recvacquire(): ignore the acquire because ph2 found 2004-04-27 20:52:40: DEBUG: pfkey.c:197:pfkey_handler(): get pfkey ACQUIRE message 2004-04-27 20:52:40: DEBUG: pfkey.c:1604:pk_recvacquire(): ignore the acquire because ph2 found 2004-04-27 20:52:40: DEBUG: sockmisc.c:421:sendfromto(): sockname 10.0.0.1[500] 2004-04-27 20:52:40: DEBUG: sockmisc.c:423:sendfromto(): send packet from 10.0.0.1[500] 2004-04-27 20:52:40: DEBUG: sockmisc.c:425:sendfromto(): send packet to 10.0.0.10[500] 2004-04-27 20:52:40: DEBUG: sockmisc.c:570:sendfromto(): 1 times of 248 bytes message will be sent to 10.0.0.10[500] 2004-04-27 20:52:40: DEBUG: plog.c:193:plogdump(): 055c6e2d 1a6f5cf0 00000000 00000000 01100400 00000000 000000f8 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 000c0004 00015180 80010005 80030001 80020002 80040002 0a000084 740d9432 471292e7 904d632f 29a2f3a5 aebdac90 1890488c ed630ccc a630afea 2c12c7c7 5f33aee7 8cab687d e03c0f84 28267175 3674acaf 3105339b 0796e4df 737fcac3 1e3cbdf7 34d1fe6d 0d65c16c 7f0125e6 7a71e10d 55473f4f 6ec53f95 b4d786bd a6656857 a377e251 bedcea49 05cd8477 ff460c16 fbfcd342 aea5ac79 05000014 bf9a051a 8cbfbef6 30991dd7 190ff373 0000000c 011101f4 0a000001 2004-04-27 20:52:43: DEBUG: isakmp.c:1459:isakmp_ph1resend(): resend phase1 packet 055c6e2d1a6f5cf0:0000000000000000 2004-04-27 20:52:50: DEBUG: pfkey.c:197:pfkey_handler(): get pfkey ACQUIRE message 2004-04-27 20:52:50: DEBUG: pfkey.c:1604:pk_recvacquire(): ignore the acquire because ph2 found 2004-04-27 20:52:53: ERROR: isakmp.c:1786:isakmp_chkph1there(): phase2 negotiation failed due to time up waiting for phase1. ESP 10 ..0.0.10->10.0.0.1 2004-04-27 20:52:53: INFO: isakmp.c:1791:isakmp_chkph1there(): delete phase 2 handler. 2004-04-27 20:53:00: DEBUG: pfkey.c:197:pfkey_handler(): get pfkey ACQUIRE message 2004-04-27 20:53:00: DEBUG: pfkey.c:1620:pk_recvacquire(): suitable outbound SP found: 0.0.0.0/0[0] 10.0.0.0/24[0] proto=any dir=ou t. 2004-04-27 20:53:00: DEBUG: policy.c:184:cmpspidxstrict(): sub:0xbfbff944: 10.0.0.0/24[0] 0.0.0.0/0[0] proto=any dir=in 2004-04-27 20:53:00: DEBUG: policy.c:185:cmpspidxstrict(): db :0x80a1c08: 10.0.0.0/24[0] 0.0.0.0/0[0] proto=any dir=in 2004-04-27 20:53:00: DEBUG: pfkey.c:1636:pk_recvacquire(): suitable inbound SP found: 10.0.0.0/24[0] 0.0.0.0/0[0] proto=any dir=in. 2004-04-27 20:53:00: DEBUG: pfkey.c:1675:pk_recvacquire(): new acquire 0.0.0.0/0[0] 10.0.0.0/24[0] proto=any dir=out 2004-04-27 20:53:00: DEBUG: sainfo.c:112:getsainfo(): anonymous sainfo selected. 2004-04-27 20:53:00: DEBUG: proposal.c:828:printsaproto(): (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqi d=0:0) 2004-04-27 20:53:00: DEBUG: proposal.c:862:printsatrns(): (trns_id=3DES encklen=0 authtype=hmac-sha) 2004-04-27 20:53:00: DEBUG: proposal.c:862:printsatrns(): (trns_id=3DES encklen=0 authtype=hmac-md5) 2004-04-27 20:53:00: DEBUG: proposal.c:862:printsatrns(): (trns_id=BLOWFISH encklen=448 authtype=hmac-sha) 2004-04-27 20:53:00: DEBUG: proposal.c:862:printsatrns(): (trns_id=BLOWFISH encklen=448 authtype=hmac-md5) 2004-04-27 20:53:06: DEBUG: proposal.c:862:printsatrns(): (trns_id=RIJNDAEL encklen=128 authtype=hmac-sha) 2004-04-27 20:53:06: DEBUG: proposal.c:862:printsatrns(): (trns_id=RIJNDAEL encklen=128 authtype=hmac-md5) 2004-04-27 20:53:06: DEBUG: remoteconf.c:129:getrmconf(): anonymous configuration selected for 10.0.0.10. 2004-04-27 20:53:06: INFO: isakmp.c:1713:isakmp_post_acquire(): request for establishing IPsec-SA was queued due to no phase1 found .. 2004-04-27 20:53:06: DEBUG: sockmisc.c:421:sendfromto(): sockname 10.0.0.1[500] 2004-04-27 20:53:06: DEBUG: sockmisc.c:423:sendfromto(): send packet from 10.0.0.1[500] 2004-04-27 20:53:06: DEBUG: sockmisc.c:425:sendfromto(): send packet to 10.0.0.10[500] 2004-04-27 20:53:06: DEBUG: sockmisc.c:570:sendfromto(): 1 times of 248 bytes message will be sent to 10.0.0.10[500] 2004-04-27 20:53:06: DEBUG: plog.c:193:plogdump(): 055c6e2d 1a6f5cf0 00000000 00000000 01100400 00000000 000000f8 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 000c0004 00015180 80010005 80030001 80020002 80040002 0a000084 740d9432 471292e7 904d632f 29a2f3a5 aebdac90 1890488c ed630ccc a630afea 2c12c7c7 5f33aee7 8cab687d e03c0f84 28267175 3674acaf 3105339b 0796e4df 737fcac3 1e3cbdf7 34d1fe6d 0d65c16c 7f0125e6 7a71e10d 55473f4f 6ec53f95 b4d786bd a6656857 a377e251 bedcea49 05cd8477 ff460c16 fbfcd342 aea5ac79 05000014 bf9a051a 8cbfbef6 30991dd7 190ff373 0000000c 011101f4 0a000001 2004-04-27 20:53:06: DEBUG: isakmp.c:1459:isakmp_ph1resend(): resend phase1 packet 055c6e2d1a6f5cf0:0000000000000000 2004-04-27 20:53:06: DEBUG: pfkey.c:197:pfkey_handler(): get pfkey ACQUIRE message 2004-04-27 20:53:06: DEBUG: pfkey.c:1604:pk_recvacquire(): ignore the acquire because ph2 found 2004-04-27 20:53:13: DEBUG: pfkey.c:197:pfkey_handler(): get pfkey ACQUIRE message 2004-04-27 20:53:13: DEBUG: pfkey.c:1604:pk_recvacquire(): ignore the acquire because ph2 found 2004-04-27 20:53:24: DEBUG: pfkey.c:197:pfkey_handler(): get pfkey ACQUIRE message 2004-04-27 20:53:24: DEBUG: pfkey.c:1604:pk_recvacquire(): ignore the acquire because ph2 found 2004-04-27 20:53:26: DEBUG: sockmisc.c:421:sendfromto(): sockname 10.0.0.1[500] 2004-04-27 20:53:26: DEBUG: sockmisc.c:423:sendfromto(): send packet from 10.0.0.1[500] 2004-04-27 20:53:26: DEBUG: sockmisc.c:425:sendfromto(): send packet to 10.0.0.10[500] 2004-04-27 20:53:26: DEBUG: sockmisc.c:570:sendfromto(): 1 times of 248 bytes message will be sent to 10.0.0.10[500] 2004-04-27 20:53:26: DEBUG: plog.c:193:plogdump(): 055c6e2d 1a6f5cf0 00000000 00000000 01100400 00000000 000000f8 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 000c0004 00015180 80010005 80030001 80020002 80040002 0a000084 740d9432 471292e7 904d632f 29a2f3a5 aebdac90 1890488c ed630ccc a630afea 2c12c7c7 5f33aee7 8cab687d e03c0f84 28267175 3674acaf 3105339b 0796e4df 737fcac3 1e3cbdf7 34d1fe6d 0d65c16c 7f0125e6 7a71e10d 55473f4f 6ec53f95 b4d786bd a6656857 a377e251 bedcea49 05cd8477 ff460c16 fbfcd342 aea5ac79 05000014 bf9a051a 8cbfbef6 30991dd7 190ff373 0000000c 011101f4 0a000001 2004-04-27 20:53:26: DEBUG: isakmp.c:1459:isakmp_ph1resend(): resend phase1 packet 055c6e2d1a6f5cf0:0000000000000000 2004-04-27 20:53:34: DEBUG: pfkey.c:197:pfkey_handler(): get pfkey ACQUIRE message 2004-04-27 20:53:34: DEBUG: pfkey.c:1604:pk_recvacquire(): ignore the acquire because ph2 found 2004-04-27 20:53:37: ERROR: isakmp.c:1786:isakmp_chkph1there(): phase2 negotiation failed due to time up waiting for phase1. ESP 10 ..0.0.10->10.0.0.1 2004-04-27 20:53:37: INFO: isakmp.c:1791:isakmp_chkph1there(): delete phase 2 handler. 2004-04-27 20:53:45: DEBUG: pfkey.c:197:pfkey_handler(): get pfkey ACQUIRE message 2004-04-27 20:53:45: DEBUG: pfkey.c:1620:pk_recvacquire(): suitable outbound SP found: 0.0.0.0/0[0] 10.0.0.0/24[0] proto=any dir=ou t. 2004-04-27 20:53:45: DEBUG: policy.c:184:cmpspidxstrict(): sub:0xbfbff944: 10.0.0.0/24[0] 0.0.0.0/0[0] proto=any dir=in 2004-04-27 20:53:45: DEBUG: policy.c:185:cmpspidxstrict(): db :0x80a1c08: 10.0.0.0/24[0] 0.0.0.0/0[0] proto=any dir=in 2004-04-27 20:53:45: DEBUG: pfkey.c:1636:pk_recvacquire(): suitable inbound SP found: 10.0.0.0/24[0] 0.0.0.0/0[0] proto=any dir=in. 2004-04-27 20:53:45: DEBUG: pfkey.c:1675:pk_recvacquire(): new acquire 0.0.0.0/0[0] 10.0.0.0/24[0] proto=any dir=out 2004-04-27 20:53:45: DEBUG: sainfo.c:112:getsainfo(): anonymous sainfo selected. 2004-04-27 20:53:45: DEBUG: proposal.c:828:printsaproto(): (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqi d=0:0) 2004-04-27 20:53:45: DEBUG: proposal.c:862:printsatrns(): (trns_id=3DES encklen=0 authtype=hmac-sha) 2004-04-27 20:53:45: DEBUG: proposal.c:862:printsatrns(): (trns_id=3DES encklen=0 authtype=hmac-md5) 2004-04-27 20:53:45: DEBUG: proposal.c:862:printsatrns(): (trns_id=BLOWFISH encklen=448 authtype=hmac-sha) 2004-04-27 20:53:45: DEBUG: proposal.c:862:printsatrns(): (trns_id=BLOWFISH encklen=448 authtype=hmac-md5) 2004-04-27 20:53:45: DEBUG: proposal.c:862:printsatrns(): (trns_id=RIJNDAEL encklen=128 authtype=hmac-sha) 2004-04-27 20:53:45: DEBUG: proposal.c:862:printsatrns(): (trns_id=RIJNDAEL encklen=128 authtype=hmac-md5) 2004-04-27 20:53:45: DEBUG: remoteconf.c:129:getrmconf(): anonymous configuration selected for 10.0.0.10. 2004-04-27 20:53:45: INFO: isakmp.c:1713:isakmp_post_acquire(): request for establishing IPsec-SA was queued due to no phase1 found .. 2004-04-27 20:53:46: DEBUG: pfkey.c:197:pfkey_handler(): get pfkey ACQUIRE message 2004-04-27 20:53:46: DEBUG: pfkey.c:1604:pk_recvacquire(): ignore the acquire because ph2 found 2004-04-27 20:53:46: DEBUG: sockmisc.c:421:sendfromto(): sockname 10.0.0.1[500] 2004-04-27 20:53:46: DEBUG: sockmisc.c:423:sendfromto(): send packet from 10.0.0.1[500] 2004-04-27 20:53:46: DEBUG: sockmisc.c:425:sendfromto(): send packet to 10.0.0.10[500] 2004-04-27 20:53:46: DEBUG: sockmisc.c:570:sendfromto(): 1 times of 248 bytes message will be sent to 10.0.0.10[500] 2004-04-27 20:53:46: DEBUG: plog.c:193:plogdump(): 055c6e2d 1a6f5cf0 00000000 00000000 01100400 00000000 000000f8 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 000c0004 00015180 80010005 80030001 80020002 80040002 0a000084 740d9432 471292e7 904d632f 29a2f3a5 aebdac90 1890488c ed630ccc a630afea 2c12c7c7 5f33aee7 8cab687d e03c0f84 28267175 3674acaf 3105339b 0796e4df 737fcac3 1e3cbdf7 34d1fe6d 0d65c16c 7f0125e6 7a71e10d 55473f4f 6ec53f95 b4d786bd a6656857 a377e251 bedcea49 05cd8477 ff460c16 fbfcd342 aea5ac79 05000014 bf9a051a 8cbfbef6 30991dd7 190ff373 0000000c 011101f4 0a000001 2004-04-27 20:53:46: DEBUG: isakmp.c:1459:isakmp_ph1resend(): resend phase1 packet 055c6e2d1a6f5cf0:0000000000000000 2004-04-27 20:53:57: DEBUG: pfkey.c:197:pfkey_handler(): get pfkey ACQUIRE message 2004-04-27 20:53:57: DEBUG: pfkey.c:1604:pk_recvacquire(): ignore the acquire because ph2 found 2004-04-27 20:54:06: DEBUG: sockmisc.c:421:sendfromto(): sockname 10.0.0.1[500] 2004-04-27 20:54:06: DEBUG: sockmisc.c:423:sendfromto(): send packet from 10.0.0.1[500] 2004-04-27 20:54:06: DEBUG: sockmisc.c:425:sendfromto(): send packet to 10.0.0.10[500] 2004-04-27 20:54:06: DEBUG: sockmisc.c:570:sendfromto(): 1 times of 248 bytes message will be sent to 10.0.0.10[500] 2004-04-27 20:54:06: DEBUG: plog.c:193:plogdump(): 055c6e2d 1a6f5cf0 00000000 00000000 01100400 00000000 000000f8 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 000c0004 00015180 80010005 80030001 80020002 80040002 0a000084 740d9432 471292e7 904d632f 29a2f3a5 aebdac90 1890488c ed630ccc a630afea 2c12c7c7 5f33aee7 8cab687d e03c0f84 28267175 3674acaf 3105339b 0796e4df 737fcac3 1e3cbdf7 34d1fe6d 0d65c16c 7f0125e6 7a71e10d 55473f4f 6ec53f95 b4d786bd a6656857 a377e251 bedcea49 05cd8477 ff460c16 fbfcd342 aea5ac79 05000014 bf9a051a 8cbfbef6 30991dd7 190ff373 0000000c 011101f4 0a000001 2004-04-27 20:54:06: DEBUG: isakmp.c:1459:isakmp_ph1resend(): resend phase1 packet 055c6e2d1a6f5cf0:0000000000000000 2004-04-27 20:54:07: DEBUG: pfkey.c:197:pfkey_handler(): get pfkey ACQUIRE message 2004-04-27 20:54:07: DEBUG: pfkey.c:1604:pk_recvacquire(): ignore the acquire because ph2 found ^C2004-04-27 20:54:10: INFO: session.c:299:check_sigreq(): caught signal 2 2004-04-27 20:54:10: DEBUG: pfkey.c:197:pfkey_handler(): get pfkey FLUSH message 2004-04-27 20:54:10: DEBUG: schedule.c:210:sched_scrub_param(): an undead schedule has been deleted. 2004-04-27 20:54:11: DEBUG: pfkey.c:333:pfkey_dump_sadb(): call pfkey_send_dump 2004-04-27 20:54:11: DEBUG: schedule.c:210:sched_scrub_param(): an undead schedule has been deleted. 2004-04-27 20:54:11: INFO: session.c:180:close_session(): racoon shutdown -- Dan Langille : http://www.langille.org/ BSDCan - http://www.bsdcan.org/ _______________________________________________ [email protected] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "[email protected]"







like.gif 您可能會有興趣的文章
icon.png[問題/行為] 貓晚上進房間會不會有憋尿問題
icon.pngRe: [閒聊] 選了錯誤的女孩成為魔法少女 XDDDDDDDDDD
icon.png[正妹] 瑞典 一張
icon.png[心得] EMS高領長版毛衣.墨小樓MC1002
icon.png[分享] 丹龍隔熱紙GE55+33+22
icon.png[問題] 清洗洗衣機
icon.png[尋物] 窗台下的空間
icon.png[閒聊] 双極の女神1 木魔爵
icon.png[售車] 新竹 1997 march 1297cc 白色 四門
icon.png[討論] 能從照片感受到攝影者心情嗎
icon.png[狂賀] 賀賀賀賀 賀!島村卯月!總選舉NO.1
icon.png[難過] 羨慕白皮膚的女生
icon.png閱讀文章
icon.png[黑特]
icon.png[問題] SBK S1安裝於安全帽位置
icon.png[分享] 舊woo100絕版開箱!!
icon.pngRe: [無言] 關於小包衛生紙
icon.png[開箱] E5-2683V3 RX480Strix 快睿C1 簡單測試
icon.png[心得] 蒼の海賊龍 地獄 執行者16PT
icon.png[售車] 1999年Virage iO 1.8EXi
icon.png[心得] 挑戰33 LV10 獅子座pt solo
icon.png[閒聊] 手把手教你不被桶之新手主購教學
icon.png[分享] Civic Type R 量產版官方照無預警流出
icon.png[售車] Golf 4 2.0 銀色 自排
icon.png[出售] Graco提籃汽座(有底座)2000元誠可議
icon.png[問題] 請問補牙材質掉了還能再補嗎?(台中半年內
icon.png[問題] 44th 單曲 生寫竟然都給重複的啊啊!
icon.png[心得] 華南紅卡/icash 核卡
icon.png[問題] 拔牙矯正這樣正常嗎
icon.png[贈送] 老莫高業 初業 102年版
icon.png[情報] 三大行動支付 本季掀戰火
icon.png[寶寶] 博客來Amos水蠟筆5/1特價五折
icon.pngRe: [心得] 新鮮人一些面試分享
icon.png[心得] 蒼の海賊龍 地獄 麒麟25PT
icon.pngRe: [閒聊] (君の名は。雷慎入) 君名二創漫畫翻譯
icon.pngRe: [閒聊] OGN中場影片:失蹤人口局 (英文字幕)
icon.png[問題] 台灣大哥大4G訊號差
icon.png[出售] [全國]全新千尋侘草LED燈, 水草
伺服器連線錯誤,造成您的不便還請多多包涵!
「贊助商連結」






like.gif 您可能會有興趣的文章
icon.png[問題/行為] 貓晚上進房間會不會有憋尿問題
icon.pngRe: [閒聊] 選了錯誤的女孩成為魔法少女 XDDDDDDDDDD
icon.png[正妹] 瑞典 一張
icon.png[心得] EMS高領長版毛衣.墨小樓MC1002
icon.png[分享] 丹龍隔熱紙GE55+33+22
icon.png[問題] 清洗洗衣機
icon.png[尋物] 窗台下的空間
icon.png[閒聊] 双極の女神1 木魔爵
icon.png[售車] 新竹 1997 march 1297cc 白色 四門
icon.png[討論] 能從照片感受到攝影者心情嗎
icon.png[狂賀] 賀賀賀賀 賀!島村卯月!總選舉NO.1
icon.png[難過] 羨慕白皮膚的女生
icon.png閱讀文章
icon.png[黑特]
icon.png[問題] SBK S1安裝於安全帽位置
icon.png[分享] 舊woo100絕版開箱!!
icon.pngRe: [無言] 關於小包衛生紙
icon.png[開箱] E5-2683V3 RX480Strix 快睿C1 簡單測試
icon.png[心得] 蒼の海賊龍 地獄 執行者16PT
icon.png[售車] 1999年Virage iO 1.8EXi
icon.png[心得] 挑戰33 LV10 獅子座pt solo
icon.png[閒聊] 手把手教你不被桶之新手主購教學
icon.png[分享] Civic Type R 量產版官方照無預警流出
icon.png[售車] Golf 4 2.0 銀色 自排
icon.png[出售] Graco提籃汽座(有底座)2000元誠可議
icon.png[問題] 請問補牙材質掉了還能再補嗎?(台中半年內
icon.png[問題] 44th 單曲 生寫竟然都給重複的啊啊!
icon.png[心得] 華南紅卡/icash 核卡
icon.png[問題] 拔牙矯正這樣正常嗎
icon.png[贈送] 老莫高業 初業 102年版
icon.png[情報] 三大行動支付 本季掀戰火
icon.png[寶寶] 博客來Amos水蠟筆5/1特價五折
icon.pngRe: [心得] 新鮮人一些面試分享
icon.png[心得] 蒼の海賊龍 地獄 麒麟25PT
icon.pngRe: [閒聊] (君の名は。雷慎入) 君名二創漫畫翻譯
icon.pngRe: [閒聊] OGN中場影片:失蹤人口局 (英文字幕)
icon.png[問題] 台灣大哥大4G訊號差
icon.png[出售] [全國]全新千尋侘草LED燈, 水草

請輸入看板名稱,例如:Tech_Job站內搜尋

TOP