Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 846992 Details for
Bug 1048702
[TAHI][IKEv2] libreswan doesn't retrans IKE_SA_INIT requests after timeout
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
pluto.log
pluto.log (text/plain), 18.88 KB, created by
Hangbin Liu
on 2014-01-08 07:29:22 UTC
(
hide
)
Description:
pluto.log
Filename:
MIME Type:
Creator:
Hangbin Liu
Created:
2014-01-08 07:29:22 UTC
Size:
18.88 KB
patch
obsolete
>nss directory plutomain: /etc/ipsec.d >NSS Initialized >FIPS HMAC integrity verification test passed >FIPS: pluto daemon NOT running in FIPS mode >libcap-ng support [enabled] >Linux audit support [disabled] >Starting Pluto (Libreswan Version 3.6 XFRM(netkey) KLIPS NSS DNSSEC FIPS_CHECK LABELED_IPSEC LIBCAP_NG XAUTH_PAM NETWORKMANAGER KLIPS_MAST CURL(non-NSS) LDAP(non-NSS)) pid:3013 >core dump dir: /var/run/pluto >secrets file: /etc/ipsec.secrets >LEAK_DETECTIVE support [disabled] >OCF support for IKE [disabled] >SAref support [disabled]: Protocol not available >SAbind support [disabled]: Protocol not available >NSS crypto [enabled] >XAUTH PAM support [enabled] >Setting NAT-Traversal port-4500 floating to on > port floating activation criteria nat_t=1/port_float=1 > NAT-Traversal support [enabled] >ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC_SSH: Ok (ret=0) >ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC: Ok (ret=0) >ike_alg_register_enc(): Activating OAKLEY_SERPENT_CBC: Ok (ret=0) >ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0) >ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0) >ike_alg_register_hash(): Activating OAKLEY_SHA2_384: Ok (ret=0) >ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0) >starting up 3 cryptographic helpers >started helper (thread) pid=139761589921536 (fd:7) >started helper (thread) pid=139761581528832 (fd:9) >started helper (thread) pid=139761573136128 (fd:11) >Using Linux XFRM/NETKEY IPsec interface code on 3.10.0-61.el7.x86_64 >ike_alg_register_enc(): Activating aes_ccm_8: Ok (ret=0) >ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists >ike_alg_register_enc(): Activating aes_ccm_12: FAILED (ret=-17) >ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists >ike_alg_register_enc(): Activating aes_ccm_16: FAILED (ret=-17) >ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists >ike_alg_register_enc(): Activating aes_gcm_8: FAILED (ret=-17) >ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists >ike_alg_register_enc(): Activating aes_gcm_12: FAILED (ret=-17) >ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists >ike_alg_register_enc(): Activating aes_gcm_16: FAILED (ret=-17) >| init_vendorid: 1 [OpenPGP] >| VID: 4f 70 65 6e 50 47 50 31 30 31 37 31 >| init_vendorid: 2 [KAME/racoon] >| VID: 70 03 cb c1 09 7d be 9c 26 00 ba 69 83 bc 8b 35 >| init_vendorid: 3 [MS NT5 ISAKMPOAKLEY] >| VID: 1e 2b 51 69 05 99 1c 7d 7c 96 fc bf b5 87 e4 61 >| init_vendorid: 67 [A GSS-API Authentication Method for IKE] >| VID: ad 2c 0d d0 b9 c3 20 83 cc ba 25 b8 86 1e c4 55 >| init_vendorid: 66 [GSSAPI] >| VID: 62 1b 04 bb 09 88 2a c1 e1 59 35 fe fa 24 ae ee >| init_vendorid: 4 [SSH Sentinel] >| VID: 05 41 82 a0 7c 7a e2 06 f9 d2 cf 9d 24 32 c4 82 >| init_vendorid: 5 [SSH Sentinel 1.1] >| VID: b9 16 23 e6 93 ca 18 a5 4c 6a 27 78 55 23 05 e8 >| init_vendorid: 6 [SSH Sentinel 1.2] >| VID: 54 30 88 8d e0 1a 31 a6 fa 8f 60 22 4e 44 99 58 >| init_vendorid: 7 [SSH Sentinel 1.3] >| VID: 7e e5 cb 85 f7 1c e2 59 c9 4a 5c 73 1e e4 e7 52 >| init_vendorid: 24 [SSH Sentinel 1.4] >| VID: 63 d9 a1 a7 00 94 91 b5 a0 a6 fd eb 2a 82 84 f0 >| init_vendorid: 25 [SSH Sentinel 1.4.1] >| VID: eb 4b 0d 96 27 6b 4e 22 0a d1 62 21 a7 b2 a5 e6 >| init_vendorid: 8 [Ssh Communications Security IPSEC Express version 1.1.0] >| VID: fb f4 76 14 98 40 31 fa 8e 3b b6 19 80 89 b2 23 >| init_vendorid: 9 [Ssh Communications Security IPSEC Express version 1.1.1] >| VID: 19 52 dc 91 ac 20 f6 46 fb 01 cf 42 a3 3a ee 30 >| init_vendorid: 10 [Ssh Communications Security IPSEC Express version 1.1.2] >| VID: e8 bf fa 64 3e 5c 8f 2c d1 0f da 73 70 b6 eb e5 >| init_vendorid: 11 [Ssh Communications Security IPSEC Express version 1.2.1] >| VID: c1 11 1b 2d ee 8c bc 3d 62 05 73 ec 57 aa b9 cb >| init_vendorid: 12 [Ssh Communications Security IPSEC Express version 1.2.2] >| VID: 09 ec 27 bf bc 09 c7 58 23 cf ec bf fe 56 5a 2e >| init_vendorid: 13 [SSH Communications Security IPSEC Express version 2.0.0] >| VID: 7f 21 a5 96 e4 e3 18 f0 b2 f4 94 4c 23 84 cb 84 >| init_vendorid: 14 [SSH Communications Security IPSEC Express version 2.1.0] >| VID: 28 36 d1 fd 28 07 bc 9e 5a e3 07 86 32 04 51 ec >| init_vendorid: 15 [SSH Communications Security IPSEC Express version 2.1.1] >| VID: a6 8d e7 56 a9 c5 22 9b ae 66 49 80 40 95 1a d5 >| init_vendorid: 16 [SSH Communications Security IPSEC Express version 2.1.2] >| VID: 3f 23 72 86 7e 23 7c 1c d8 25 0a 75 55 9c ae 20 >| init_vendorid: 17 [SSH Communications Security IPSEC Express version 3.0.0] >| VID: 0e 58 d5 77 4d f6 02 00 7d 0b 02 44 36 60 f7 eb >| init_vendorid: 18 [SSH Communications Security IPSEC Express version 3.0.1] >| VID: f5 ce 31 eb c2 10 f4 43 50 cf 71 26 5b 57 38 0f >| init_vendorid: 19 [SSH Communications Security IPSEC Express version 4.0.0] >| VID: f6 42 60 af 2e 27 42 da dd d5 69 87 06 8a 99 a0 >| init_vendorid: 20 [SSH Communications Security IPSEC Express version 4.0.1] >| VID: 7a 54 d3 bd b3 b1 e6 d9 23 89 20 64 be 2d 98 1c >| init_vendorid: 21 [SSH Communications Security IPSEC Express version 4.1.0] >| VID: 9a a1 f3 b4 34 72 a4 5d 5f 50 6a eb 26 0c f2 14 >| init_vendorid: 22 [SSH Communications Security IPSEC Express version 4.2.0] >| VID: 68 80 c7 d0 26 09 91 14 e4 86 c5 54 30 e7 ab ee >| init_vendorid: 35 [Cisco VPN 3000 Series] >| VID: 1f 07 f7 0e aa 65 14 d3 b0 fa 96 54 2a 50 >| init_vendorid: 38 [Cisco IOS Device] >| VID: 3e 98 40 48 >| init_vendorid: 23 [Cisco-Unity] >| VID: 12 f5 f2 8c 45 71 68 a9 70 2d 9f e2 74 cc 01 00 >| init_vendorid: 64 [Cisco-Unity FW type] >| VID: 80 01 00 01 80 02 00 01 80 03 00 02 >| init_vendorid: 26 [TIMESTEP] >| VID: 54 49 4d 45 53 54 45 50 >| init_vendorid: 27 [FreeS/WAN 2.00] >| VID: 4f 45 44 76 5b 57 6b 40 45 41 74 47 >| init_vendorid: 28 [FreeS/WAN 2.00 (X.509-1.3.1)] >| VID: 4f 45 77 4e 4a 43 52 71 6e 45 48 6f >| init_vendorid: 29 [FreeS/WAN 2.00 (X.509-1.3.1 + LDAP)] >| VID: 4f 45 57 5d 6a 53 43 42 46 74 79 6e >| init_vendorid: 33 [Libreswan 2.2.0] >| VID: 4f 45 48 62 72 56 7d 51 69 71 4a 6f >| init_vendorid: 36 [Libreswan (this version)] >| VID: 4f 45 2d 4c 69 62 72 65 73 77 61 6e 2d 33 2e 36 >| init_vendorid: 101 [draft-stenberg-ipsec-nat-traversal-01] >| VID: 27 ba b5 dc 01 ea 07 60 ea 4e 31 90 ac 27 c0 d0 >| init_vendorid: 102 [draft-stenberg-ipsec-nat-traversal-02] >| VID: 61 05 c4 22 e7 68 47 e4 3f 96 84 80 12 92 ae cd >| init_vendorid: 103 [ESPThruNAT] >| VID: 50 76 0f 62 4c 63 e5 c5 3e ea 38 6c 68 5c a0 83 >| init_vendorid: 104 [draft-huttunen-ipsec-esp-in-udp-00.txt] >| VID: 6a 74 34 c1 9d 7e 36 34 80 90 a0 23 34 c9 c8 05 >| init_vendorid: 105 [draft-ietf-ipsec-nat-t-ike-00] >| VID: 44 85 15 2d 18 b6 bb cd 0b e8 a8 46 95 79 dd cc >| init_vendorid: 106 [draft-ietf-ipsec-nat-t-ike-01] >| VID: 16 f6 ca 16 e4 a4 06 6d 83 82 1a 0f 0a ea a8 62 >| init_vendorid: 108 [draft-ietf-ipsec-nat-t-ike-02] >| VID: cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48 >| init_vendorid: 107 [draft-ietf-ipsec-nat-t-ike-02_n] >| VID: 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ec 42 7b 1f >| init_vendorid: 109 [draft-ietf-ipsec-nat-t-ike-03] >| VID: 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 >| init_vendorid: 110 [draft-ietf-ipsec-nat-t-ike-04] >| VID: 99 09 b6 4e ed 93 7c 65 73 de 52 ac e9 52 fa 6b >| init_vendorid: 111 [draft-ietf-ipsec-nat-t-ike-05] >| VID: 80 d0 bb 3d ef 54 56 5e e8 46 45 d4 c8 5c e3 ee >| init_vendorid: 112 [draft-ietf-ipsec-nat-t-ike-06] >| VID: 4d 1e 0e 13 6d ea fa 34 c4 f3 ea 9f 02 ec 72 85 >| init_vendorid: 113 [draft-ietf-ipsec-nat-t-ike-07] >| VID: 43 9b 59 f8 ba 67 6c 4c 77 37 ae 22 ea b8 f5 82 >| init_vendorid: 114 [draft-ietf-ipsec-nat-t-ike-08] >| VID: 8f 8d 83 82 6d 24 6b 6f c7 a8 a6 a4 28 c1 1d e8 >| init_vendorid: 115 [draft-ietf-ipsec-nat-t-ike] >| VID: 4d f3 79 28 e9 fc 4f d1 b3 26 21 70 d5 15 c6 62 >| init_vendorid: 116 [RFC 3947] >| VID: 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f >| init_vendorid: 39 [Sonicwall 1 (TZ 170 Standard?)] >| VID: 40 4b f4 39 52 2c a3 f6 >| init_vendorid: 40 [Sonicwall 2 (3.1.0.12-86s?)] >| VID: da 8e 93 78 80 01 00 00 >| init_vendorid: 201 [XAUTH] >| VID: 09 00 26 89 df d6 b7 12 >| init_vendorid: 202 [Dead Peer Detection] >| VID: af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 >| init_vendorid: 207 [DPDv1_NG] >| VID: 3b 90 31 dc e4 fc f8 8b 48 9a 92 39 63 dd 0c 49 >| init_vendorid: 206 [CAN-IKEv2] >| VID: 49 4b 45 76 32 >| init_vendorid: 203 [HeartBeat Notify] >| VID: 48 65 61 72 74 42 65 61 74 5f 4e 6f 74 69 66 79 >| init_vendorid: 34 [M\363y(\351\374O\321\263&!p\325\025\306b] >| VID: 4d 61 63 20 4f 53 58 20 31 30 2e 78 >| init_vendorid: 204 [FRAGMENTATION] >| VID: 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 >| init_vendorid: 205 [Vid-Initial-Contact] >| VID: 26 24 4d 38 ed db 61 b3 17 2a 36 e3 d0 cf b8 19 >| init_vendorid: 125 [MS-Negotiation Discovery Capable] >| VID: fb 1d e3 cd f3 41 b7 ea 16 b7 e5 be 08 55 f1 20 >| init_vendorid: 126 [IKE CGA version 1] >| VID: e3 a5 96 6a 76 37 9f e7 07 22 82 31 e5 ce 86 52 >| init_vendorid: 127 [MS-MamieExists] >| VID: 21 4c a4 fa ff a7 f3 2d 67 48 e5 30 33 95 ae 83 >| init_vendorid: 170 [strongSwan 4.0.0] >| VID: 2c e9 c9 46 a4 c8 79 bf 11 b5 0b 76 cc 56 92 cb >| init_vendorid: 171 [strongSwan 4.0.1] >| VID: 9d bb af cf 1d b0 dd 59 5a e0 65 29 40 03 ad 3e >| init_vendorid: 172 [strongSwan 4.0.2] >| VID: 77 e8 ee a6 f5 56 a4 99 de 3f fe 7f 7f 95 66 1c >| init_vendorid: 173 [strongSwan 4.0.3] >| VID: b1 81 b1 8e 11 4f c2 09 b3 c6 e2 6c 3a 80 71 8e >| init_vendorid: 174 [strongSwan 4.0.4] >| VID: 1e f2 83 f8 35 49 b5 ff 96 08 b6 d6 34 f8 4d 75 >| init_vendorid: 175 [strongSwan 4.0.5] >| VID: dd 18 0d 21 e5 ce 65 5a 76 8b a3 22 11 dd 8a d9 >| init_vendorid: 176 [strongSwan 4.0.6] >| VID: 4c 90 13 69 46 57 7b 51 91 9d 8d 9a 6b 8e 4a 9f >| init_vendorid: 177 [strongSwan 4.0.7] >| VID: ab 07 46 22 1c c8 fd 0d 52 38 f7 3a 9b 3d a5 57 >| init_vendorid: 178 [strongSwan 4.1.0] >| VID: 47 94 ce f6 84 34 22 98 0d 1a 3d 06 af 41 c5 cd >| init_vendorid: 179 [strongSwan 4.1.1] >| VID: d3 f1 c4 88 c3 68 17 5d 5f 40 a8 f5 ca 5f 5e 12 >| init_vendorid: 180 [strongSwan 4.1.2] >| VID: 15 a1 ac e7 ee 52 fd df ef 04 f9 28 db 2d d1 34 >| init_vendorid: 181 [strongSwan 4.1.3] >| VID: 58 49 ab 6d 8b ea bd 6e 4d 09 e5 a3 b8 8c 08 9a >| init_vendorid: 182 [strongSwan 4.1.4] >| VID: 31 2f 9c b1 a6 b9 0e 19 de 75 28 c9 04 ac 30 87 >| init_vendorid: 183 [strongSwan 4.1.5] >| VID: bf 0f bf 73 06 eb b7 82 70 42 d8 93 53 98 86 e2 >| init_vendorid: 184 [strongSwan 4.1.6] >| VID: d1 96 83 36 8a f4 b0 ed c2 1c cd e9 82 b1 d1 b0 >| init_vendorid: 185 [strongSwan 4.1.7] >| VID: ea 84 0a a4 df c9 71 2d 6c 32 b5 a1 6e b3 29 a3 >| init_vendorid: 186 [strongSwan 4.1.8] >| VID: 66 a2 04 55 07 c1 19 da 78 a4 66 62 59 cd ea 48 >| init_vendorid: 187 [strongSwan 4.1.9] >| VID: 78 fd d2 87 de f0 1a 3f 07 4b 53 69 ea b4 fd 1c >| init_vendorid: 188 [strongSwan 4.1.10] >| VID: bf 3a 89 ae 5b ef 8e 72 d4 4d ac 8b b8 8d 7d 5f >| init_vendorid: 189 [strongSwan 4.1.11] >| VID: b7 bd 9f 2f 97 8e 32 59 a7 aa 9f 7a 13 96 ad 6c >| init_vendorid: 190 [strongSwan 4.2.0] >| VID: 9f 68 90 13 25 a9 72 89 43 35 30 2a 95 31 ab 9f >| init_vendorid: 191 [strongSwan 4.2.1] >| VID: ba b2 53 f4 cb 10 a8 10 8a 7c 92 7c 56 c8 78 86 >| init_vendorid: 192 [strongSwan 4.2.2] >| VID: 2a 51 7d 0d 23 c3 7d 08 bc e7 c2 92 a0 21 7b 39 >| init_vendorid: 193 [strongSwan 4.2.3] >| VID: 2d 1f 40 61 18 fb d5 d2 84 74 79 1f fa 00 48 8a >| init_vendorid: 163 [strongSwan 2.8.8] >| VID: 8c 4a 3b cb 72 9b 11 f7 03 d2 2a 5b 39 64 0c a8 >| init_vendorid: 162 [strongSwan 2.8.7] >| VID: 3a 0d 4e 7c a4 e4 92 ed 4d fe 47 6d 1a c6 01 8b >| init_vendorid: 161 [strongSwan 2.8.6] >| VID: fe 3f 49 70 6e 26 a9 fb 36 a8 7b fc e9 ea 36 ce >| init_vendorid: 160 [strongSwan 2.8.5] >| VID: 4c 7e fa 31 b3 9e 51 04 32 a3 17 57 0d 97 bb b9 >| init_vendorid: 159 [strongSwan 2.8.4] >| VID: 76 c7 2b fd 39 84 24 dd 00 1b 86 d0 01 2f e0 61 >| init_vendorid: 158 [strongSwan 2.8.3] >| VID: fb 46 41 ad 0e eb 2a 34 49 1d 15 f4 ef f5 10 63 >| init_vendorid: 157 [strongSwan 2.8.2] >| VID: 29 99 32 27 7b 7d fe 38 2c e2 34 65 33 3a 7d 23 >| init_vendorid: 156 [strongSwan 2.8.1] >| VID: e3 7f 2d 5b a8 9a 62 cd 20 2e e2 7d ac 06 c8 a8 >| init_vendorid: 155 [strongSwan 2.8.0] >| VID: 32 f0 e9 b9 c0 6d fe 8c 9a d5 59 9a 63 69 71 a1 >| init_vendorid: 154 [strongSwan 2.7.3] >| VID: 7f 50 cc 4e bf 04 c2 d9 da 73 ab fd 69 b7 7a a2 >| init_vendorid: 153 [strongSwan 2.7.2] >| VID: a1 94 e2 aa dd d0 ba fb 95 25 3d d9 6d c7 33 eb >| init_vendorid: 152 [strongSwan 2.7.1] >| VID: 81 34 87 85 82 12 17 85 ba 65 ea 34 5d 6b a7 24 >| init_vendorid: 151 [strongSwan 2.7.0] >| VID: 07 fa 12 8e 47 54 f9 44 7b 1d d4 63 74 ee f3 60 >| init_vendorid: 150 [strongSwan 2.6.4] >| VID: b9 27 f9 52 19 a0 fe 36 00 db a3 c1 18 2a e5 5f >| init_vendorid: 149 [strongSwan 2.6.3] >| VID: b2 86 0e 78 37 f7 11 be f3 d0 ee b1 06 87 2d ed >| init_vendorid: 148 [strongSwan 2.6.2] >| VID: 5b 1c d6 fe 7d 05 0e da 6c 93 87 1c 10 7d b3 d2 >| init_vendorid: 147 [strongSwan 2.6.1] >| VID: 66 af bc 12 bb fe 6c e1 08 b1 f6 9f 4b c9 17 b7 >| init_vendorid: 146 [strongSwan 2.6.0] >| VID: 3f 32 66 49 9f fd bd 85 95 0e 70 22 98 06 28 44 >| init_vendorid: 145 [strongSwan 2.5.7] >| VID: 1f 44 42 29 6b 83 d7 e3 3a 8b 45 20 9b a0 e5 90 >| init_vendorid: 144 [strongSwan 2.5.6] >| VID: 3c 5e ba 3d 85 64 92 8e 32 ae 43 c3 d9 92 4d ee >| init_vendorid: 143 [strongSwan 2.5.5] >| VID: 3f 26 7e d6 21 ad a7 ee 6c 7d 88 93 cc b0 b1 4b >| init_vendorid: 142 [strongSwan 2.5.4] >| VID: 7a 6b f5 b7 df 89 64 2a 75 a7 8e f7 d6 57 c1 c0 >| init_vendorid: 141 [strongSwan 2.5.3] >| VID: df 5b 1f 0f 1d 56 79 d9 f8 51 2b 16 c5 5a 60 65 >| init_vendorid: 140 [strongSwan 2.5.2] >| VID: 86 1c e5 eb 72 16 4b 19 0e 9e 62 9a 31 cf 49 01 >| init_vendorid: 139 [strongSwan 2.5.1] >| VID: 9a 4a 46 48 f6 0f 8e da 7c fc bf e2 71 ee 5b 7d >| init_vendorid: 138 [strongSwan 2.5.0] >| VID: 9e b3 d9 07 ed 7a da 4e 3c bc ac b9 17 ab c8 e4 >| init_vendorid: 137 [strongSwan 2.4.4] >| VID: 48 5a 70 36 1b 44 33 b3 1d ea 1c 6b e0 df 24 3e >| init_vendorid: 136 [strongSwan 2.4.3] >| VID: 98 2b 7a 06 3a 33 c1 43 a8 ea dc 88 24 9f 6b cc >| init_vendorid: 135 [strongSwan 2.4.2] >| VID: e7 a3 fd 0c 6d 77 1a 8f 1b 8a 86 a4 16 9c 9e a4 >| init_vendorid: 134 [strongSwan 2.4.1] >| VID: 75 b0 65 3c b2 81 eb 26 d3 1e de 38 c8 e1 e2 28 >| init_vendorid: 133 [strongSwan 2.4.0] >| VID: e8 29 c8 81 49 ba b3 c0 ce e8 5d a6 0e 18 ae 9b >| init_vendorid: 132 [strongSwan 2.3.2] >| VID: 42 a4 83 4c 92 ab 9a 77 77 06 3a fa 25 4b cb 69 >| init_vendorid: 131 [strongSwan 2.3.1] >| VID: f6 97 c1 af cc 2e c8 dd cd f9 9d c7 af 03 a6 7f >| init_vendorid: 130 [strongSwan 2.3.0] >| VID: b8 f9 2b 2f a2 d3 fe 5f e1 58 34 4b da 1c c6 ae >| init_vendorid: 129 [strongSwan 2.2.2] >| VID: 99 dc 7c c8 23 37 6b 3b 33 d0 43 57 89 6a e0 7b >| init_vendorid: 128 [strongSwan 2.2.1] >| VID: d9 11 8b 1e 9d e5 ef ce d9 cc 9d 88 3f 21 68 ff >| init_vendorid: 127 [strongSwan 2.2.0] >| VID: 85 b6 cb ec 48 0d 5c 8c d9 88 2c 82 5a c2 c2 44 >| init_vendorid: 204 [FRAGMENTATION] >| VID: 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 >| init_vendorid: 37 [NCP client] >| VID: 10 1f b0 b3 5c 5a 4f 4c 08 b9 19 f1 cb 97 77 b0 >| init_vendorid: 42 [Shrew Soft client] >| VID: f1 4b 94 b7 bf f1 fe f0 27 73 b8 c4 9f ed ed 26 >| init_vendorid: 43 [Netscreen-01] >| VID: 29 9e e8 28 9f 40 a8 97 3b c7 86 87 e2 e7 22 6b >| VID: 53 2c 3b 76 >| init_vendorid: 44 [Netscreen-02] >| VID: 3a 15 e1 f3 cf 2a 63 58 2e 3a c8 2d 1c 64 cb e3 >| VID: b6 d7 79 e7 >| init_vendorid: 45 [Netscreen-03] >| VID: 47 d2 b1 26 bf cd 83 48 97 60 e2 cf 8c 5d 4d 5a >| VID: 03 49 7c 15 >| init_vendorid: 46 [Netscreen-04] >| VID: 4a 43 40 b5 43 e0 2b 84 c8 8a 8b 96 a8 af 9e be >| VID: 77 d9 ac cc >| init_vendorid: 47 [Netscreen-05] >| VID: 64 40 5f 46 f0 3b 76 60 a2 3b e1 16 a1 97 50 58 >| VID: e6 9e 83 87 >| init_vendorid: 48 [Netscreen-06] >| VID: 69 93 69 22 87 41 c6 d4 ca 09 4c 93 e2 42 c9 de >| VID: 19 e7 b7 c6 >| init_vendorid: 49 [Netscreen-07] >| VID: 8c 0d c6 cf 62 a0 ef 1b 5c 6e ab d1 b6 7b a6 98 >| VID: 66 ad f1 6a >| init_vendorid: 50 [Netscreen-08] >| VID: 92 d2 7a 9e cb 31 d9 92 46 98 6d 34 53 d0 c3 d5 >| VID: 7a 22 2a 61 >| init_vendorid: 51 [Netscreen-09] >| VID: 9b 09 6d 9a c3 27 5a 7d 6f e8 b9 1c 58 31 11 b0 >| VID: 9e fe d1 a0 >| init_vendorid: 52 [Netscreen-10] >| VID: bf 03 74 61 08 d7 46 c9 04 f1 f3 54 7d e2 4f 78 >| VID: 47 9f ed 12 >| init_vendorid: 53 [Netscreen-11] >| VID: c2 e8 05 00 f4 cc 5f bf 5d aa ee d3 bb 59 ab ae >| VID: ee 56 c6 52 >| init_vendorid: 54 [Netscreen-12] >| VID: c8 66 0a 62 b0 3b 1b 61 30 bf 78 16 08 d3 2a 6a >| VID: 8d 0f b8 9f >| init_vendorid: 55 [Netscreen-13] >| VID: f8 85 da 40 b1 e7 a9 ab d1 76 55 ec 5b be c0 f2 >| VID: 1f 0e d5 2e >| init_vendorid: 56 [Netscreen-14] >| VID: 2a 2b ca c1 9b 8e 91 b4 26 10 78 07 e0 2e 72 49 >| VID: 56 9d 6f d3 >| init_vendorid: 57 [Netscreen-15] >| VID: 16 6f 93 2d 55 eb 64 d8 e4 df 4f d3 7e 23 13 f0 >| VID: d0 fd 84 51 >| init_vendorid: 58 [Netscreen-16] >| VID: a3 5b fd 05 ca 1a c0 b3 d2 f2 4e 9e 82 bf cb ff >| VID: 9c 9e 52 b5 >| init_vendorid: 59 [Zywall] >| VID: 62 50 27 74 9d 5a b9 7f 56 16 c1 60 27 65 cf 48 >| VID: 0a 3b 7d 0b >| init_vendorid: 60 [Sidewinder] >| VID: 84 04 ad f9 cd a0 57 60 b2 ca 29 2e 4b ff 53 7b >| init_vendorid: 61 [Watchguard FireBox] >| VID: da 8e 93 78 80 01 00 00 >| init_vendorid: 62 [Lucent VPN Gateway 9 (LVG9.1.255:BRICK:9.1.255)] >| VID: 4c 56 47 39 2e 32 2e 32 34 35 3a 42 52 49 43 4b >| VID: 3a 39 2e 32 2e 32 34 35 >| init_vendorid: 63 [Lucent VPN Client 7 (LVC7.1.2:XP)] >| VID: 4c 56 43 37 2e 31 2e 32 3a 58 50 >| init_vendorid: 65 [Check Point] >| VID: f4 ed 19 e0 c1 14 eb 51 6f aa ac 0e e3 7d af 28 >| VID: 07 b4 38 1f >| selinux support is NOT enabled. >listening for IKE messages >adding interface p6p1/p6p1 192.168.0.10:500 >adding interface p6p1/p6p1 192.168.0.10:4500 >adding interface p7p1/p7p1 10.66.12.166:500 >adding interface p7p1/p7p1 10.66.12.166:4500 >adding interface lo/lo 127.0.0.1:500 >adding interface lo/lo 127.0.0.1:4500 >adding interface p6p1/p6p1 2001:db8:1:1::1234:500 >adding interface p6p1/p6p1 3ffe:501:ffff:100:215:17ff:fe3c:c668:500 >adding interface lo/lo ::1:500 >loading secrets from "/etc/ipsec.secrets" >added connection description "ikev2" >"ikev2" #1: initiating v2 parent SA >"ikev2" #1: transition from state STATE_IKEv2_START to state STATE_PARENT_I1 >"ikev2" #1: STATE_PARENT_I1: sent v2I1, expected v2R1 >shutting down >forgetting secrets >"ikev2": deleting connection >"ikev2" #1: deleting state (STATE_PARENT_I1) >shutting down interface lo/lo ::1:500 >shutting down interface p6p1/p6p1 3ffe:501:ffff:100:215:17ff:fe3c:c668:500 >shutting down interface p6p1/p6p1 2001:db8:1:1::1234:500 >shutting down interface lo/lo 127.0.0.1:4500 >shutting down interface lo/lo 127.0.0.1:500 >shutting down interface p7p1/p7p1 10.66.12.166:4500 >shutting down interface p7p1/p7p1 10.66.12.166:500 >shutting down interface p6p1/p6p1 192.168.0.10:4500 >shutting down interface p6p1/p6p1 192.168.0.10:500
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1048702
: 846992