⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 japan-console.txt

📁 This a good VPN source
💻 TXT
字号:
Starting UML PATH/start.shspawn PATH singleLinux version XXXXOn node 0 totalpages: 8192Kernel command line:Calibrating delay loop... XXXX bogomipsDentry-cache hash table entries: NUMBERSInode-cache hash table entries: NUMBERSMount-cache hash table entries: NUMBERSBuffer-cache hash table entries: NUMBERSPage-cache hash table entries: NUMEBRSPOSIX conformance testing by UNIFIXLinux NET4.0 for Linux 2.4Based upon Swansea University Computer Society NET3.039Initializing RT netlink socketStarting kswapdVFS: Diskquotas version dquot_6.4.0 initializeddevfs: VERSION Richard Gooch (rgooch@atnf.csiro.au)devfs: boot_options Qpty: 256 Unix98 ptys configuredSLIP: version 0.8.4-NET3.019-NEWTTY (dynamic channels, max=256).loop: loaded (max 8 devices)PPP generic driver version VERSIONUniversal TUN/TAP device driver VERSIONNET4: Linux TCP/IP 1.0 for NET4.0IP Protocols: ICMP, UDP, TCPIP: routing cache hash table of 512 buckets, 4KbytesTCP: Hash tables configured (established 2048 bind 2048)IPv4 over IPv4 tunneling driverGRE over IPv4 tunneling driverNET4: Unix domain sockets 1.0/SMP for Linux NET4.0.Mounted devfs on /devINIT: version 2.78 bootingActivating swap...Calculating module dependanciesdone.Loading modules: LISTChecking all file systems...Parallelizing fsck version 1.18 (11-Nov-1999)Setting kernel variables.Mounting local filesystems.../dev/shm on /tmp type tmpfs (rw)/dev/shm on /var/run type tmpfs (rw)devpts on /dev/pts type devpts (rw,mode=0622)none on /usr/share type hostfs (ro)Enabling packet forwarding: done.Configuring network interfaces: done.Cleaning: /tmp /var/lock /var/run.Initializing random number generator... done.Recovering nvi editor sessions... done.Give root password for maintenance(or type Control-D for normal startup): japan:~# klogd -c 4 -x -f /tmp/klog.logjapan:~# set -xjapan:~# CFG="--config /testing/pluto/co-terminal-02/japan.conf" export CFG+ CFG=--config /testing/pluto/co-terminal-02/japan.conf+ export CFGjapan:~# : just for when we run it interactively + : just for when we run it interactivelyjapan:~# ipsec setup $CFG stop+ ipsec setup --config /testing/pluto/co-terminal-02/japan.conf stopipsec_setup: Stopping Openswan IPsec...ipsec_setup: stop ordered, but IPsec does not appear to be running!ipsec_setup: doing cleanup anyway...japan:~# rndc stop >/dev/null 2>&1+ rndc stopjapan:~# named+ namedjapan:~# : confirm that my key is present in DNS+ : confirm that my key is present in DNSjapan:~# dig 2.1.0.192.in-addr.arpa. key+ dig 2.1.0.192.in-addr.arpa. key; <<>> DiG VERSION<<>> 2.1.0.192.in-addr.arpa. key;; global options:  printcmd;; Got answer:;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12345;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 2;; QUESTION SECTION:;2.1.0.192.in-addr.arpa.		IN	KEY;; ANSWER SECTION:2.1.0.192.in-addr.arpa.	604800	IN	KEY	16896 4 1 AQOSRxzbj35bnNsMbTeQ81+tGulyaYNR0HHt25tzzSrCrQGm9YGMFpA4 50Aq/P3A/Tb4DO4qCX03M4aZZ6RpfToMPKxZQSPrOe0cv+lkCxf6IlA2 h2CG7b8m6slVOF/fOhQrnjDDusQiv0RZFSu6k4J3F8VndVXHAEPU9aF2 F7WIuQ==;; AUTHORITY SECTION:1.0.192.in-addr.arpa.	604800	IN	NS	NSSERVER1.0.192.in-addr.arpa.	604800	IN	NS	NSSERVER;; ADDITIONAL SECTION:nic.uml.freeswan.org.	604800	IN	A	192.1.2.254beet.uml.freeswan.org.	604800	IN	A	192.1.2.129;; Query time: 25 msec;; SERVER: 192.1.2.254#53(192.1.2.254);; WHEN: DATE;; MSG SIZE  rcvd: SIZEjapan:~# dig japan.uml.freeswan.org. key+ dig japan.uml.freeswan.org. key; <<>> DiG VERSION<<>> japan.uml.freeswan.org. key;; global options:  printcmd;; Got answer:;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12345;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 2;; QUESTION SECTION:;japan.uml.freeswan.org.		IN	KEY;; ANSWER SECTION:japan.uml.freeswan.org.	604800	IN	KEY	16896 4 1 AQOSRxzbj35bnNsMbTeQ81+tGulyaYNR0HHt25tzzSrCrQGm9YGMFpA4 50Aq/P3A/Tb4DO4qCX03M4aZZ6RpfToMPKxZQSPrOe0cv+lkCxf6IlA2 h2CG7b8m6slVOF/fOhQrnjDDusQiv0RZFSu6k4J3F8VndVXHAEPU9aF2 F7WIuQ==;; AUTHORITY SECTION:uml.freeswan.org.	604800	IN	NS	NSSERVERuml.freeswan.org.	604800	IN	NS	NSSERVER;; ADDITIONAL SECTION:nic.root-servers.net.	604800	IN	A	192.1.2.254carrot.uml.freeswan.org. 604800	IN	A	192.1.2.130;; Query time: 25 msec;; SERVER: 192.1.2.254#53(192.1.2.254);; WHEN: DATE;; MSG SIZE  rcvd: SIZEjapan:~# ipsec setup $CFG start+ ipsec setup --config /testing/pluto/co-terminal-02/japan.conf startipsec_setup: Starting Openswan IPsec VERSIONjapan:~# sleep 2+ sleep 2japan:~# ipsec eroute+ ipsec eroute0          0.0.0.0/0          -> 0.0.0.0/0          => %trapjapan:~# /testing/pluto/co-terminal-02/eroutewait.sh trap+ /testing/pluto/co-terminal-02/eroutewait.sh trapjapan:~# ipsec auto  $CFG --delete packetdefault+ ipsec auto --config /testing/pluto/co-terminal-02/japan.conf --delete packetdefaultjapan:~# ipsec auto  $CFG --add japan--wavesec+ ipsec auto --config /testing/pluto/co-terminal-02/japan.conf --add japan--wavesecjapan:~# ipsec whack --listen+ ipsec whack --listen002 listening for IKE messages002 forgetting secrets002 loading secrets from "/etc/ipsec.secrets"japan:~# ipsec auto  $CFG --add clear+ ipsec auto --config /testing/pluto/co-terminal-02/japan.conf --add clearjapan:~# ipsec whack --listen+ ipsec whack --listen002 listening for IKE messages002 forgetting secrets002 loading secrets from "/etc/ipsec.secrets"002 loading group "/etc/ipsec.d/policies/clear"japan:~# ipsec auto  $CFG --route clear+ ipsec auto --config /testing/pluto/co-terminal-02/japan.conf --route clearjapan:~# /testing/pluto/co-terminal-02/eroutewait.sh pass+ /testing/pluto/co-terminal-02/eroutewait.sh passjapan:~# ipsec whack --debug-oppo --debug-control --debug-controlmore + ipsec whack --debug-oppo --debug-control --debug-controlmorejapan:~# ipsec auto  $CFG --add private-or-clear+ ipsec auto --config /testing/pluto/co-terminal-02/japan.conf --add private-or-clearjapan:~# ipsec whack --listen+ ipsec whack --listen002 listening for IKE messages002 forgetting secrets002 loading secrets from "/etc/ipsec.secrets"002 loading group "/etc/ipsec.d/policies/private-or-clear"002 loading group "/etc/ipsec.d/policies/clear"japan:~# ipsec auto  $CFG --route private-or-clear+ ipsec auto --config /testing/pluto/co-terminal-02/japan.conf --route private-or-clearjapan:~# sh /testing/pluto/co-terminal-02/eroutewait.sh trap+ sh /testing/pluto/co-terminal-02/eroutewait.sh trapjapan:~# ipsec eroute | sed -e 's/^[0-9]* /n /' -e 's/tun0x..../tun0xABCD/'+ ipsec eroute+ sed -e 's/^[0-9]* /n /' -e s/tun0x..../tun0xABCD/n          192.0.1.2/32       -> 0.0.0.0/0          => %trapn          192.0.1.2/32       -> 192.1.2.129/32     => %passn          192.0.1.2/32       -> 192.1.2.130/32     => %passn          192.0.1.2/32       -> 192.1.2.254/32     => %passn          192.0.1.2/32       -> 192.1.3.254/32     => %passjapan:~# ipsec auto $CFG --up japan--wavesec+ ipsec auto --config /testing/pluto/co-terminal-02/japan.conf --up japan--wavesec104 "japan--wavesec" #1: STATE_MAIN_I1: initiate106 "japan--wavesec" #1: STATE_MAIN_I2: sent MI2, expecting MR2108 "japan--wavesec" #1: STATE_MAIN_I3: sent MI3, expecting MR3004 "japan--wavesec" #1: STATE_MAIN_I4: ISAKMP SA established117 "japan--wavesec" #2: STATE_QUICK_I1: initiate003 "japan--wavesec" #2: conflict on eroute (), switching eroute to private-or-clear#0.0.0.0/0 and linking japan--wavesec004 "japan--wavesec" #2: STATE_QUICK_I2: sent QI2, IPsec SA establishedjapan:~# ipsec eroute | sed -e 's/^[0-9]* /n /' -e 's/tun0x..../tun0xABCD/'+ ipsec eroute+ sed -e 's/^[0-9]* /n /' -e s/tun0x..../tun0xABCD/n          192.0.1.2/32       -> 0.0.0.0/0          => %trapn          192.0.1.2/32       -> 192.1.2.129/32     => %passn          192.0.1.2/32       -> 192.1.2.130/32     => %passn          192.0.1.2/32       -> 192.1.2.254/32     => %passn          192.0.1.2/32       -> 192.1.3.254/32     => %passjapan:~# ping -c 1 1.2.3.4+ ping -c 1 1.2.3.4PING 1.2.3.4 (1.2.3.4): 56 data bytes64 bytes from 1.2.3.4: icmp_seq=0 ttl=257 time=999 ms--- 1.2.3.4 ping statistics ---1 packets transmitted, 1 packets received, 0% packet lossround-trip min/avg/max = 3.1/4.5/9.26 msjapan:~# /testing/pluto/co-terminal-02/eroutewait.sh tun0+ /testing/pluto/co-terminal-02/eroutewait.sh tun0japan:~# ipsec eroute | sed -e 's/^[0-9]* /n /' -e 's/tun0x..../tun0xABCD/'+ ipsec eroute+ sed -e 's/^[0-9]* /n /' -e s/tun0x..../tun0xABCD/n          192.0.1.2/32       -> 0.0.0.0/0          => %trapn          192.0.1.2/32       -> 1.2.3.4/32         => tun0xABCD@192.0.1.254n         192.0.1.2/32       -> 192.1.2.129/32     => %passn          192.0.1.2/32       -> 192.1.2.130/32     => %passn         192.0.1.2/32       -> 192.1.2.254/32     => %passn          192.0.1.2/32       -> 192.1.3.254/32     => %passjapan:~# ping -c 1 1.2.3.4+ ping -c 1 1.2.3.4PING 1.2.3.4 (1.2.3.4): 56 data bytes64 bytes from 1.2.3.4: icmp_seq=0 ttl=257 time=999 ms--- 1.2.3.4 ping statistics ---1 packets transmitted, 1 packets received, 0% packet lossround-trip min/avg/max = 3.1/4.5/9.26 msjapan:~# sleep 1+ sleep 1japan:~# ping -c 1 192.0.2.2+ ping -c 1 192.0.2.2PING 192.0.2.2 (192.0.2.2): 56 data bytes64 bytes from 192.0.2.2: icmp_seq=0 ttl=257 time=999 ms--- 192.0.2.2 ping statistics ---1 packets transmitted, 1 packets received, 0% packet lossround-trip min/avg/max = 3.1/4.5/9.26 msjapan:~# /testing/pluto/co-terminal-02/eroutewait.sh 192.1.2.23+ /testing/pluto/co-terminal-02/eroutewait.sh 192.1.2.23japan:~# ping -c 1 192.0.2.2+ ping -c 1 192.0.2.2PING 192.0.2.2 (192.0.2.2): 56 data bytes64 bytes from 192.0.2.2: icmp_seq=0 ttl=257 time=999 ms--- 192.0.2.2 ping statistics ---1 packets transmitted, 1 packets received, 0% packet lossround-trip min/avg/max = 3.1/4.5/9.26 msjapan:~# ipsec eroute | sed -e 's/^[0-9]* /n /' -e 's/tun0x..../tun0xABCD/'+ ipsec eroute+ sed -e 's/^[0-9]* /n /' -e s/tun0x..../tun0xABCD/n          192.0.1.2/32       -> 0.0.0.0/0          => %trapn          192.0.1.2/32       -> 1.2.3.4/32         => tun0xABCD@192.0.1.254n          192.0.1.2/32       -> 192.0.2.2/32       => tun0xABCD@192.1.2.23n         192.0.1.2/32       -> 192.1.2.129/32     => %passn          192.0.1.2/32       -> 192.1.2.130/32     => %passn         192.0.1.2/32       -> 192.1.2.254/32     => %passn          192.0.1.2/32       -> 192.1.3.254/32     => %passjapan:~# echo done+ echo donedonejapan:~# + : ==== tuc ==== :japan:~# ipsec setup stop+ ipsec setup stopipsec_setup: Stopping Openswan IPsec...ipsec_setup: stop ordered, but IPsec does not appear to be running!ipsec_setup: doing cleanup anyway...japan:~# kill `cat /var/run/klogd.pid`; cat /tmp/klog.log++ cat /var/run/klogd.pid+ kill 84+ cat /tmp/klog.logklogd 1.3-3#33.1, log source = /proc/kmsg started.japan:~# halt -p -f+ halt -p -fPower down.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -