Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 357854 Details for
Bug 483576
net-misc/openswan-2.6.39: regressions
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
log file diff
diff.txt (text/plain), 8.14 KB, created by
Jeremy Olexa (darkside) (RETIRED)
on 2013-09-04 20:10:06 UTC
(
hide
)
Description:
log file diff
Filename:
MIME Type:
Creator:
Jeremy Olexa (darkside) (RETIRED)
Created:
2013-09-04 20:10:06 UTC
Size:
8.14 KB
patch
obsolete
>--- working.txt 2013-09-04 19:55:06.000000000 +0000 >+++ broken2.txt 2013-09-04 20:00:15.000000000 +0000 >@@ -1,12 +1,11 @@ >-[sudo] pam_unix(sudo:session): session closed for user root >-[ipsec_setup] Starting Openswan IPsec U2.6.38/K3.8.4-linode50... >+[ipsec_setup] Starting Openswan IPsec U2.6.39/K3.8.4-linode50... > [ipsec_setup] Using NETKEY(XFRM) stack > [ipsec_setup] multiple ip addresses, using 1.2.3.4 on eth0 > [ipsec__plutorun] Starting Pluto subsystem... >-[ipsec_setup] ...Openswan IPsec started > [pluto] adjusting ipsec.d to /etc/ipsec.d > [ipsec__plutorun] adjusting ipsec.d to /etc/ipsec.d >-[pluto] Starting Pluto (Openswan Version 2.6.38; Vendor ID OEvy\134kgzWq\134s) pid:17190 >+[ipsec_setup] ...Openswan IPsec started >+[pluto] Starting Pluto (Openswan Version 2.6.39; Vendor ID OEmdpG_lG}v}) pid:29422 > [pluto] LEAK_DETECTIVE support [disabled] > [pluto] OCF support for IKE [disabled] > [pluto] SAref support [disabled]: Protocol not available >@@ -21,14 +20,14 @@ > [pluto] ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0) > [pluto] ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0) > [pluto] starting up 7 cryptographic helpers >-[pluto] started helper pid=17193 (fd:6) >-[pluto] started helper pid=17195 (fd:7) >-[pluto] started helper pid=17196 (fd:8) >-[pluto] started helper pid=17197 (fd:9) >-[pluto] started helper pid=17198 (fd:10) >-[pluto] started helper pid=17199 (fd:11) >-[pluto] started helper pid=17200 (fd:12) >+[pluto] started helper pid=29425 (fd:6) >+[pluto] started helper pid=29426 (fd:7) >+[pluto] started helper pid=29428 (fd:8) >+[pluto] started helper pid=29429 (fd:9) >+[pluto] started helper pid=29430 (fd:10) >+[pluto] started helper pid=29431 (fd:11) > [pluto] using /dev/urandom as source of random entropy >+[pluto] started helper pid=29432 (fd:12) > [pluto] Kernel interface auto-pick > [pluto] Using Linux 2.6 IPsec interface code on 3.8.4-linode50 (experimental code) > [pluto] using /dev/urandom as source of random entropy >@@ -62,12 +61,6 @@ > [pluto] adding interface eth0/eth0 2600::500 > [pluto] adding interface lo/lo ::1:500 > [pluto] loading secrets from "/etc/ipsec.secrets" >-[xl2tpd] Can not find tunnel 59471 (refhim=0)_ >-[xl2tpd] network_thread: unable to find call or tunnel to handle packet. call = 11322, tunnel = 59471 Dumping._ >-[xl2tpd] Can not find tunnel 59471 (refhim=0)_ >-[xl2tpd] network_thread: unable to find call or tunnel to handle packet. call = 11322, tunnel = 59471 Dumping._ >-[xl2tpd] Can not find tunnel 59471 (refhim=0)_ >-[xl2tpd] network_thread: unable to find call or tunnel to handle packet. call = 11322, tunnel = 59471 Dumping._ > [pluto] packet from 202.78.155.108:500: received Vendor ID payload [RFC 3947] method set to=115 > [pluto] packet from 202.78.155.108:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike] meth=114, but already using method 115 > [pluto] packet from 202.78.155.108:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-08] meth=113, but already using method 115 >@@ -96,64 +89,17 @@ > [pluto] "L2TP-PSK-NAT"[2] 202.78.155.108 #1: Dead Peer Detection (RFC 3706): enabled > [pluto] "L2TP-PSK-NAT"[2] 202.78.155.108 #1: the peer proposed: 1.2.3.4/32:17/1701 -> 192.168.20.136/32:17/0 > [pluto] "L2TP-PSK-NAT"[2] 202.78.155.108 #1: NAT-Traversal: received 2 NAT-OA. using first, ignoring others >-[pluto] "L2TP-PSK-NAT"[2] 202.78.155.108 #2: responding to Quick Mode proposal {msgid:40bf2bfc} >+[pluto] "L2TP-PSK-NAT"[2] 202.78.155.108 #2: responding to Quick Mode proposal {msgid:c5ecbde1} > [pluto] "L2TP-PSK-NAT"[2] 202.78.155.108 #2: us: 1.2.3.4<1.2.3.4>:17/1701 >-[pluto] "L2TP-PSK-NAT"[2] 202.78.155.108 #2: them: 202.78.155.108[192.168.20.136]:17/51340===192.168.20.136/32 >+[pluto] "L2TP-PSK-NAT"[2] 202.78.155.108 #2: them: 202.78.155.108[192.168.20.136]:17/62360===192.168.20.136/32 > [pluto] "L2TP-PSK-NAT"[2] 202.78.155.108 #2: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 > [pluto] "L2TP-PSK-NAT"[2] 202.78.155.108 #2: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 > [pluto] "L2TP-PSK-NAT"[2] 202.78.155.108 #2: Dead Peer Detection (RFC 3706): enabled > [pluto] "L2TP-PSK-NAT"[2] 202.78.155.108 #2: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 >-[pluto] "L2TP-PSK-NAT"[2] 202.78.155.108 #2: STATE_QUICK_R2: IPsec SA established transport mode {ESP=>0x0ee8c6ed <0x74c5046b xfrm=AES_256-HMAC_SHA1 NATOA=192.168.20.136 NATD=202.78.155.108:4500 DPD=enabled} >-[xl2tpd] control_finish: Peer requested tunnel 43 twice, ignoring second one._ >-[xl2tpd] Connection established to 202.78.155.108, 51340. Local: 9572, Remote: 43 (ref=0/0). LNS session is 'default'_ >-[xl2tpd] start_pppd: I'm running: _ >-[xl2tpd] "/usr/sbin/pppd" _ >-[xl2tpd] "passive" _ >-[xl2tpd] "nodetach" _ >-[xl2tpd] "10.152.2.1:10.152.2.2" _ >-[xl2tpd] "refuse-pap" _ >-[xl2tpd] "auth" _ >-[xl2tpd] "require-chap" _ >-[xl2tpd] "debug" _ >-[xl2tpd] "file" _ >-[xl2tpd] "/etc/ppp/options.xl2tpd" _ >-[xl2tpd] "ipparam" _ >-[xl2tpd] "202.78.155.108" _ >-[xl2tpd] "/dev/pts/7" _ >-[xl2tpd] Call established with 202.78.155.108, Local: 41466, Remote: 8634, Serial: 1_ >-[pppd] pppd 2.4.5 started by user, uid 0 >-[pppd] using channel 17 >-[pppd] Using interface ppp0 >-[pppd] Connect: ppp0 <--> /dev/pts/7 >-[pppd] sent [LCP ConfReq id=0x1 <asyncmap 0x0> <auth chap MD5> <magic 0x3f73f04b> <pcomp> <accomp>] >-[pppd] rcvd [LCP ConfReq id=0x1 <asyncmap 0x0> <magic 0x2ef0b55b> <pcomp> <accomp>] >-[pppd] sent [LCP ConfAck id=0x1 <asyncmap 0x0> <magic 0x2ef0b55b> <pcomp> <accomp>] >-[pppd] rcvd [LCP ConfAck id=0x1 <asyncmap 0x0> <auth chap MD5> <magic 0x3f73f04b> <pcomp> <accomp>] >-[pppd] sent [LCP EchoReq id=0x0 magic=0x3f73f04b] >-[pppd] sent [CHAP Challenge id=0x6 <2681ef0a1a0c98b8aa90e14b44b106088f704a15b190>, name = "l2tpd"] >-[pppd] rcvd [LCP EchoReq id=0x0 magic=0x2ef0b55b] >-[pppd] sent [LCP EchoRep id=0x0 magic=0x3f73f04b] >-[pppd] rcvd [LCP EchoRep id=0x0 magic=0x2ef0b55b] >-[pppd] rcvd [CHAP Response id=0x6 <320590e7d815c26fbc109ac5bb36269b>, name = "acct"] >-[pppd] sent [CHAP Success id=0x6 "Access granted"] >-[pppd] sent [CCP ConfReq id=0x1 <deflate 15> <deflate(old#) 15> <bsd v1 15>] >-[pppd] sent [IPCP ConfReq id=0x1 <compress VJ 0f 01> <addr 10.152.2.1>] >-[pppd] rcvd [IPCP ConfReq id=0x1 <addr 0.0.0.0> <ms-dns1 0.0.0.0> <ms-dns2 0.0.0.0>] >-[pppd] sent [IPCP ConfNak id=0x1 <addr 10.152.2.2> <ms-dns1 72.14.179.5> <ms-dns2 72.14.188.5>] >-[pppd] rcvd [LCP ProtRej id=0x2 80 fd 01 01 00 0f 1a 04 78 00 18 04 78 00 15 03 2f] >-[pppd] Protocol-Reject for 'Compression Control Protocol' (0x80fd) received >-[pppd] rcvd [IPV6CP ConfReq id=0x1 <addr fe80::8638:35ff:fe53:c83a>] >-[pppd] Unsupported protocol 'IPv6 Control Protocol' (0x8057) received >-[pppd] sent [LCP ProtRej id=0x2 80 57 01 01 00 0e 01 0a 86 38 35 ff fe 53 c8 3a] >-[pppd] rcvd [IPCP ConfRej id=0x1 <compress VJ 0f 01>] >-[pppd] sent [IPCP ConfReq id=0x2 <addr 10.152.2.1>] >-[pppd] rcvd [IPCP ConfReq id=0x2 <addr 10.152.2.2> <ms-dns1 72.14.179.5> <ms-dns2 72.14.188.5>] >-[pppd] sent [IPCP ConfAck id=0x2 <addr 10.152.2.2> <ms-dns1 72.14.179.5> <ms-dns2 72.14.188.5>] >-[pppd] rcvd [IPCP ConfAck id=0x2 <addr 10.152.2.1>] >-[pppd] Cannot determine ethernet address for proxy ARP >-[pppd] local IP address 10.152.2.1 >-[pppd] remote IP address 10.152.2.2 >-[pppd] Script /etc/ppp/ip-up started (pid 17351) >-[pppd] Script /etc/ppp/ip-up finished (pid 17351), status = 0x0 >-[ntpd] Listen normally on 22 ppp0 10.152.2.1 UDP 123 >-[ntpd] peers refreshed >+[pluto] "L2TP-PSK-NAT"[2] 202.78.155.108 #2: STATE_QUICK_R2: IPsec SA established transport mode {ESP=>0x0bcbd8b3 <0x2fc15e77 xfrm=AES_256-HMAC_SHA1 NATOA=192.168.20.136 NATD=202.78.155.108:4500 DPD=enabled} >+[pluto] "L2TP-PSK-NAT"[2] 202.78.155.108 #1: received Delete SA(0x0bcbd8b3) payload: deleting IPSEC State #2 >+[pluto] "L2TP-PSK-NAT"[2] 202.78.155.108 #1: ERROR: netlink XFRM_MSG_DELPOLICY response for flow eroute_connection delete included errno 2: No such file or directory >+[pluto] "L2TP-PSK-NAT"[2] 202.78.155.108 #1: received and ignored informational message >+[pluto] "L2TP-PSK-NAT"[2] 202.78.155.108 #1: received Delete SA payload: deleting ISAKMP State #1 >+[pluto] "L2TP-PSK-NAT"[2] 202.78.155.108: deleting connection "L2TP-PSK-NAT" instance with peer 202.78.155.108 {isakmp=#0/ipsec=#0} >+[pluto] packet from 202.78.155.108:4500: received and ignored informational message
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 483576
: 357854