📄 wi-log
字号:
whackwest --name ipsec-rsa-c --delete --rsa --host 127.95.7.2 --ikeport 8500 --client 127.95.7.20/30 --dnskeyondemand --updown silly --to --updown sally --dnskeyondemand --host 127.95.7.1 --ikeport 8500 --client 127.95.7.8/30 --authenticate --encrypt --compress --rekeymargin 350 --ikelifetime 900 --ipseclifetime 800 --keyingtries 2002 added connection description "ipsec-rsa-c"whackeast --name ipsec-rsa-c --delete --rsa --host 127.95.7.2 --ikeport 8500 --client 127.95.7.20/30 --dnskeyondemand --updown silly --to --updown sally --dnskeyondemand --host 127.95.7.1 --ikeport 8500 --client 127.95.7.8/30 --authenticate --encrypt --rekeymargin 350 --ikelifetime 900 --ipseclifetime 800 --keyingtries 2002 added connection description "ipsec-rsa-c"whackwest --listen002 listening for IKE messages002 adding interface virtual127.95.7.1/lo:w 127.95.7.1002 loading secrets from "/tmp/ipsec.secrets/west"whackeast --listen002 listening for IKE messages002 adding interface virtual127.95.7.2/lo:e 127.95.7.2002 loading secrets from "/tmp/ipsec.secrets/east"whackwest --name ipsec-rsa-c --initiate002 "ipsec-rsa-c" #1: initiating Main Mode104 "ipsec-rsa-c" #1: STATE_MAIN_I1: initiate106 "ipsec-rsa-c" #1: STATE_MAIN_I2: sent MI2, expecting MR2002 "ipsec-rsa-c" #1: I did not send a certificate because I do not have one.108 "ipsec-rsa-c" #1: STATE_MAIN_I3: sent MI3, expecting MR3002 "ipsec-rsa-c" #1: ISAKMP SA established004 "ipsec-rsa-c" #1: STATE_MAIN_I4: ISAKMP SA established002 "ipsec-rsa-c" #2: initiating Quick Mode RSASIG+ENCRYPT+AUTHENTICATE+COMPRESS+TUNNEL+UP117 "ipsec-rsa-c" #2: STATE_QUICK_I1: initiate002 "ipsec-rsa-c" #2: sent QI2, IPsec SA established004 "ipsec-rsa-c" #2: STATE_QUICK_I2: sent QI2, IPsec SA establishedwhackwest --status000 interface virtual127.95.7.1/lo:w 127.95.7.1000 %myid = (none)000 debug raw+crypt+parsing+emitting+control+lifecycle+klips+dns+oppo+controlmore+pfkey+nattraversal+x509+private000 000 000 algorithm IKE encrypt: id=7, name=OAKLEY_AES_CBC, blocksize=16, keydeflen=128000 algorithm IKE encrypt: id=5, name=OAKLEY_3DES_CBC, blocksize=8, keydeflen=192000 algorithm IKE hash: id=2, name=OAKLEY_SHA1, hashsize=20000 algorithm IKE hash: id=1, name=OAKLEY_MD5, hashsize=16000 algorithm IKE dh group: id=2, name=OAKLEY_GROUP_MODP1024, bits=1024000 algorithm IKE dh group: id=5, name=OAKLEY_GROUP_MODP1536, bits=1536000 algorithm IKE dh group: id=14, name=OAKLEY_GROUP_MODP2048, bits=2048000 algorithm IKE dh group: id=15, name=OAKLEY_GROUP_MODP3072, bits=3072000 algorithm IKE dh group: id=16, name=OAKLEY_GROUP_MODP4096, bits=4096000 algorithm IKE dh group: id=17, name=OAKLEY_GROUP_MODP6144, bits=6144000 algorithm IKE dh group: id=18, name=OAKLEY_GROUP_MODP8192, bits=8192000 000 000 "ipsec-rsa-c": 127.95.7.8/30===127.95.7.1:8500[S?C]...127.95.7.2:8500[S?C]===127.95.7.20/30; erouted; eroute owner: #2000 "ipsec-rsa-c": srcip=unset; dstip=unset000 "ipsec-rsa-c": ike_life: 900s; ipsec_life: 800s; rekey_margin: 350s; rekey_fuzz: 100%; keyingtries: 2000 "ipsec-rsa-c": policy: RSASIG+ENCRYPT+AUTHENTICATE+COMPRESS+TUNNEL+UP+lKOD+rKOD; prio: 30,30; interface: lo:w; 000 "ipsec-rsa-c": newest ISAKMP SA: #1; newest IPsec SA: #2; 000 "ipsec-rsa-c": IKE algorithm newest: 3DES_CBC_192-MD5-MODP1536000 000 #2: "ipsec-rsa-c" STATE_QUICK_I2 (sent QI2, IPsec SA established); EVENT_SA_REPLACE in ???s; newest IPSEC; eroute owner000 #2: "ipsec-rsa-c" ah.???@127.95.7.2 ah.???@127.95.7.1 esp.???@127.95.7.2 esp.???@127.95.7.1 comp.???@127.95.7.2 comp.???@127.95.7.1 tun.1002@127.95.7.2 tun.1001@127.95.7.1000 #1: "ipsec-rsa-c" STATE_MAIN_I4 (ISAKMP SA established); EVENT_SA_REPLACE in ???s; newest ISAKMP000 whackwest --shutdown002 shutting downwhackeast --shutdown002 shutting down
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -