1
German - Deutsch / Re: IPsec/Mehrere Phase2
« on: September 19, 2019, 11:26:22 am »
Das Problem besteht immer noch, und ich komme da leider nicht weiter
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Sep 5 13:01:11 OPNsense charon: 00[DMN] Starting IKE charon daemon (strongSwan 5.8.0, FreeBSD 11.2-RELEASE-p14-HBSD, amd64)
Sep 5 13:01:11 OPNsense charon: 00[KNL] unable to set UDP_ENCAP: Invalid argument
Sep 5 13:01:11 OPNsense charon: 00[NET] enabling UDP decapsulation for IPv6 on port 4500 failed
Sep 5 13:01:11 OPNsense charon: 00[CFG] loading ca certificates from '/usr/local/etc/ipsec.d/cacerts'
Sep 5 13:01:11 OPNsense charon: 00[CFG] loaded ca certificate "C=DE, xxxxxx, CN=internal-sslvpn-ca" from '/usr/local/etc/ipsec.d/cacerts/41101fc5.0.crt'
Sep 5 13:01:11 OPNsense charon: 00[CFG] loading aa certificates from '/usr/local/etc/ipsec.d/aacerts'
Sep 5 13:01:11 OPNsense charon: 00[CFG] loading ocsp signer certificates from '/usr/local/etc/ipsec.d/ocspcerts'
Sep 5 13:01:11 OPNsense charon: 00[CFG] loading attribute certificates from '/usr/local/etc/ipsec.d/acerts'
Sep 5 13:01:11 OPNsense charon: 00[CFG] loading crls from '/usr/local/etc/ipsec.d/crls'
Sep 5 13:01:11 OPNsense charon: 00[CFG] loading secrets from '/usr/local/etc/ipsec.secrets'
Sep 5 13:01:11 OPNsense charon: 00[CFG] loaded IKE secret for xxx.xxx.xxx.xxx
Sep 5 13:01:11 OPNsense charon: 00[CFG] expanding file expression '/usr/local/etc/ipsec.secrets.opnsense.d/*.secrets' failed
Sep 5 13:01:11 OPNsense charon: 00[CFG] loaded 0 RADIUS server configurations
Sep 5 13:01:11 OPNsense charon: 00[LIB] loaded plugins: charon aes des blowfish rc2 sha2 sha1 md4 md5 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl fips-prf curve25519 xcbc cmac hmac gcm attr kernel-pfkey kernel-pfroute resolve socket-default stroke vici updown eap-identity eap-md5 eap-mschapv2 eap-radius eap-tls eap-ttls eap-peap xauth-generic xauth-eap xauth-pam whitelist addrblock counters
Sep 5 13:01:11 OPNsense charon: 00[JOB] spawning 16 worker threads
Sep 5 13:01:11 OPNsense charon: 16[CFG] received stroke: add connection 'con1-000'
Sep 5 13:01:11 OPNsense charon: 16[CFG] added configuration 'con1-000'
Sep 5 13:01:11 OPNsense charon: 05[CFG] received stroke: route 'con1-000'
Sep 5 13:01:11 OPNsense charon: 15[CFG] received stroke: add connection 'con1-001'
Sep 5 13:01:11 OPNsense charon: 15[CFG] added child to existing configuration 'con1-000'
Sep 5 13:01:11 OPNsense charon: 05[CFG] received stroke: route 'con1-001'
Sep 5 13:01:16 OPNsense charon: 05[NET] <1> received packet: from xxx.xxx.xxx.xxx[500] to yyy.yyy.yyy.yyy[500] (288 bytes)
Sep 5 13:01:16 OPNsense charon: 05[ENC] <1> parsed ID_PROT request 0 [ SA V V V V V V V V V ]
Sep 5 13:01:16 OPNsense charon: 05[IKE] <1> received DPD vendor ID
Sep 5 13:01:16 OPNsense charon: 05[IKE] <1> received draft-stenberg-ipsec-nat-traversal-01 vendor ID
Sep 5 13:01:16 OPNsense charon: 05[IKE] <1> received draft-stenberg-ipsec-nat-traversal-02 vendor ID
Sep 5 13:01:16 OPNsense charon: 05[IKE] <1> received draft-ietf-ipsec-nat-t-ike-00 vendor ID
Sep 5 13:01:16 OPNsense charon: 05[IKE] <1> received draft-ietf-ipsec-nat-t-ike-02 vendor ID
Sep 5 13:01:16 OPNsense charon: 05[IKE] <1> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
Sep 5 13:01:16 OPNsense charon: 05[IKE] <1> received draft-ietf-ipsec-nat-t-ike-03 vendor ID
Sep 5 13:01:16 OPNsense charon: 05[IKE] <1> received NAT-T (RFC 3947) vendor ID
Sep 5 13:01:16 OPNsense charon: 05[ENC] <1> received unknown vendor ID: 69:93:69:22:87:41:c6:d4:ca:09:4c:93:e2:42:c9:de:19:e7:b7:c6:00:00:00:05:00:00:05:00
Sep 5 13:01:16 OPNsense charon: 05[IKE] <1> xxx.xxx.xxx.xxx is initiating a Main Mode IKE_SA
Sep 5 13:01:16 OPNsense charon: 05[CFG] <1> selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
Sep 5 13:01:16 OPNsense charon: 05[ENC] <1> generating ID_PROT response 0 [ SA V V V ]
Sep 5 13:01:16 OPNsense charon: 05[NET] <1> sending packet: from yyy.yyy.yyy.yyy[500] to xxx.xxx.xxx.xxx[500] (144 bytes)
Sep 5 13:01:16 OPNsense charon: 05[NET] <1> received packet: from xxx.xxx.xxx.xxx[500] to yyy.yyy.yyy.yyy[500] (252 bytes)
Sep 5 13:01:16 OPNsense charon: 05[ENC] <1> parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
Sep 5 13:01:16 OPNsense charon: 05[ENC] <1> generating ID_PROT response 0 [ KE No NAT-D NAT-D ]
Sep 5 13:01:16 OPNsense charon: 05[NET] <1> sending packet: from yyy.yyy.yyy.yyy[500] to xxx.xxx.xxx.xxx[500] (268 bytes)
Sep 5 13:01:16 OPNsense charon: 05[NET] <1> received packet: from xxx.xxx.xxx.xxx[500] to yyy.yyy.yyy.yyy[500] (108 bytes)
Sep 5 13:01:16 OPNsense charon: 05[ENC] <1> parsed ID_PROT request 0 [ ID HASH N(INITIAL_CONTACT) ]
Sep 5 13:01:16 OPNsense charon: 05[CFG] <1> looking for pre-shared key peer configs matching yyy.yyy.yyy.yyy...xxx.xxx.xxx.xxx[xxx.xxx.xxx.xxx]
Sep 5 13:01:16 OPNsense charon: 05[CFG] <1> selected peer config "con1-000"
Sep 5 13:01:16 OPNsense charon: 05[IKE] <con1-000|1> IKE_SA con1-000[1] established between yyy.yyy.yyy.yyy[yyy.yyy.yyy.yyy]...xxx.xxx.xxx.xxx[xxx.xxx.xxx.xxx]
Sep 5 13:01:16 OPNsense charon: 05[IKE] <con1-000|1> scheduling reauthentication in 13763s
Sep 5 13:01:16 OPNsense charon: 05[IKE] <con1-000|1> maximum IKE_SA lifetime 14303s
Sep 5 13:01:16 OPNsense charon: 05[ENC] <con1-000|1> generating ID_PROT response 0 [ ID HASH ]
Sep 5 13:01:16 OPNsense charon: 05[NET] <con1-000|1> sending packet: from yyy.yyy.yyy.yyy[500] to xxx.xxx.xxx.xxx[500] (92 bytes)
Sep 5 13:01:16 OPNsense charon: 05[NET] <con1-000|1> received packet: from xxx.xxx.xxx.xxx[500] to yyy.yyy.yyy.yyy[500] (332 bytes)
Sep 5 13:01:16 OPNsense charon: 05[ENC] <con1-000|1> parsed QUICK_MODE request 3621287927 [ HASH SA No KE ID ID ]
Sep 5 13:01:16 OPNsense charon: 05[CFG] <con1-000|1> selected proposal: ESP:AES_CBC_256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
Sep 5 13:01:16 OPNsense charon: 05[IKE] <con1-000|1> received 10000000000 lifebytes, configured 0
Sep 5 13:01:16 OPNsense charon: 05[ENC] <con1-000|1> generating QUICK_MODE response 3621287927 [ HASH SA No KE ID ID ]
Sep 5 13:01:16 OPNsense charon: 05[NET] <con1-000|1> sending packet: from yyy.yyy.yyy.yyy[500] to xxx.xxx.xxx.xxx[500] (348 bytes)
Sep 5 13:01:16 OPNsense charon: 05[NET] <con1-000|1> received packet: from xxx.xxx.xxx.xxx[500] to yyy.yyy.yyy.yyy[500] (76 bytes)
Sep 5 13:01:16 OPNsense charon: 05[ENC] <con1-000|1> parsed QUICK_MODE request 3621287927 [ HASH ]
Sep 5 13:01:16 OPNsense charon: 05[IKE] <con1-000|1> CHILD_SA con1-001{3} established with SPIs c1b5f409_i bc74ae50_o and TS 192.168.250.0/24 === 192.168.0.0/17
Sep 5 13:01:26 OPNsense charon: 13[IKE] <con1-000|1> sending DPD request
Sep 5 13:01:26 OPNsense charon: 13[ENC] <con1-000|1> generating INFORMATIONAL_V1 request 3406066776 [ HASH N(DPD) ]
Sep 5 13:01:26 OPNsense charon: 13[NET] <con1-000|1> sending packet: from yyy.yyy.yyy.yyy[500] to xxx.xxx.xxx.xxx[500] (108 bytes)
Sep 5 13:01:26 OPNsense charon: 13[NET] <con1-000|1> received packet: from xxx.xxx.xxx.xxx[500] to yyy.yyy.yyy.yyy[500] (108 bytes)
Sep 5 13:01:26 OPNsense charon: 13[ENC] <con1-000|1> parsed INFORMATIONAL_V1 request 214071174 [ HASH N(DPD_ACK) ]
Sep 5 13:01:36 OPNsense charon: 13[IKE] <con1-000|1> sending DPD request
Sep 5 13:01:36 OPNsense charon: 13[ENC] <con1-000|1> generating INFORMATIONAL_V1 request 43016422 [ HASH N(DPD) ]
Sep 5 13:01:36 OPNsense charon: 13[NET] <con1-000|1> sending packet: from yyy.yyy.yyy.yyy[500] to xxx.xxx.xxx.xxx[500] (108 bytes)
Sep 5 13:01:36 OPNsense charon: 13[NET] <con1-000|1> received packet: from xxx.xxx.xxx.xxx[500] to yyy.yyy.yyy.yyy[500] (108 bytes)
Sep 5 13:01:36 OPNsense charon: 13[ENC] <con1-000|1> parsed INFORMATIONAL_V1 request 540057284 [ HASH N(DPD_ACK) ]
Sep 5 13:01:46 OPNsense charon: 13[IKE] <con1-000|1> sending DPD request
Sep 5 13:01:46 OPNsense charon: 13[ENC] <con1-000|1> generating INFORMATIONAL_V1 request 1223108931 [ HASH N(DPD) ]
Sep 5 13:01:46 OPNsense charon: 13[NET] <con1-000|1> sending packet: from yyy.yyy.yyy.yyy[500] to xxx.xxx.xxx.xxx[500] (108 bytes)
Sep 5 13:01:46 OPNsense charon: 13[NET] <con1-000|1> received packet: from xxx.xxx.xxx.xxx[500] to yyy.yyy.yyy.yyy[500] (108 bytes)
Sep 5 13:01:46 OPNsense charon: 13[ENC] <con1-000|1> parsed INFORMATIONAL_V1 request 1176428986 [ HASH N(DPD_ACK) ]
Sep 5 13:01:56 OPNsense charon: 05[NET] <con1-000|1> received packet: from xxx.xxx.xxx.xxx[500] to yyy.yyy.yyy.yyy[500] (332 bytes)
Sep 5 13:01:56 OPNsense charon: 05[ENC] <con1-000|1> parsed QUICK_MODE request 342500649 [ HASH SA No KE ID ID ]
Sep 5 13:01:56 OPNsense charon: 05[CFG] <con1-000|1> selected proposal: ESP:AES_CBC_256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
Sep 5 13:01:56 OPNsense charon: 05[IKE] <con1-000|1> received 10000000000 lifebytes, configured 0
Sep 5 13:01:56 OPNsense charon: 05[ENC] <con1-000|1> generating QUICK_MODE response 342500649 [ HASH SA No KE ID ID ]
Sep 5 13:01:56 OPNsense charon: 05[NET] <con1-000|1> sending packet: from yyy.yyy.yyy.yyy[500] to xxx.xxx.xxx.xxx[500] (348 bytes)
Sep 5 13:01:56 OPNsense charon: 05[NET] <con1-000|1> received packet: from xxx.xxx.xxx.xxx[500] to yyy.yyy.yyy.yyy[500] (76 bytes)
Sep 5 13:01:56 OPNsense charon: 05[ENC] <con1-000|1> parsed QUICK_MODE request 342500649 [ HASH ]
Sep 5 13:01:56 OPNsense charon: 05[IKE] <con1-000|1> CHILD_SA con1-000{4} established with SPIs c34361c1_i f540373f_o and TS 192.168.250.0/24 === 194.0.149.0/25
Sep 5 13:02:33 OPNsense charon: 05[IKE] <con1-000|1> sending DPD request
Sep 5 13:02:33 OPNsense charon: 05[ENC] <con1-000|1> generating INFORMATIONAL_V1 request 3696687235 [ HASH N(DPD) ]
Sep 5 13:02:33 OPNsense charon: 05[NET] <con1-000|1> sending packet: from yyy.yyy.yyy.yyy[500] to xxx.xxx.xxx.xxx[500] (108 bytes)
Sep 5 13:02:33 OPNsense charon: 12[NET] <con1-000|1> received packet: from xxx.xxx.xxx.xxx[500] to yyy.yyy.yyy.yyy[500] (108 bytes)
Sep 5 13:02:33 OPNsense charon: 12[ENC] <con1-000|1> parsed INFORMATIONAL_V1 request 62191751 [ HASH N(DPD_ACK) ]
Sep 5 13:02:43 OPNsense charon: 12[IKE] <con1-000|1> sending DPD request
Sep 5 13:02:43 OPNsense charon: 12[ENC] <con1-000|1> generating INFORMATIONAL_V1 request 2944087970 [ HASH N(DPD) ]
Sep 5 13:02:43 OPNsense charon: 12[NET] <con1-000|1> sending packet: from yyy.yyy.yyy.yyy[500] to xxx.xxx.xxx.xxx[500] (108 bytes)
Sep 5 13:02:43 OPNsense charon: 12[NET] <con1-000|1> received packet: from xxx.xxx.xxx.xxx[500] to yyy.yyy.yyy.yyy[500] (108 bytes)
Sep 5 13:02:43 OPNsense charon: 12[ENC] <con1-000|1> parsed INFORMATIONAL_V1 request 1670222920 [ HASH N(DPD_ACK) ]