⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 east-console.txt

📁 This a good VPN source
💻 TXT
字号:
east:~# D=/testing/scripts/ipsec.conf-myid-01east:~# export IPSEC_CONFS="$D/etc-nomyid"east:~# ipsec setup start ipsec_setup: Starting Openswan IPsec VERSIONeast:~# sleep 4east:~# /testing/pluto/basic-pluto-01/eroutewait.sh trapeast:~# ipsec auto --status000 interface ipsec0/eth1 192.1.2.23000 %myid = (none)000 debug none000  000 algorithm ESP encrypt: id=3, name=ESP_3DES, ivlen=64, keysizemin=168, keysizemax=168000 algorithm ESP encrypt: id=12, name=ESP_AES, ivlen=128, keysizemin=128, keysizemax=256000 algorithm ESP auth attr: id=1, name=AUTH_ALGORITHM_HMAC_MD5, keysizemin=128, keysizemax=128000 algorithm ESP auth attr: id=2, name=AUTH_ALGORITHM_HMAC_SHA1, keysizemin=160, keysizemax=160000 algorithm ESP auth attr: id=9, name=AUTH_ALGORITHM_ID9, keysizemin=128, keysizemax=128000  000 algorithm IKE encrypt: id=7, name=OAKLEY_AES_CBC, blocksize=16, keydeflen=128000 algorithm IKE encrypt: id=5, name=OAKLEY_3DES_CBC, blocksize=8, keydeflen=192000 algorithm IKE hash: id=2, name=OAKLEY_SHA, hashsize=20000 algorithm IKE hash: id=1, name=OAKLEY_MD5, hashsize=16000 algorithm IKE dh group: id=2, name=OAKLEY_GROUP_MODP1024, bits=1024000 algorithm IKE dh group: id=5, name=OAKLEY_GROUP_MODP1536, bits=1536000 algorithm IKE dh group: id=14, name=OAKLEY_GROUP_MODP2048, bits=2048000 algorithm IKE dh group: id=15, name=OAKLEY_GROUP_MODP3072, bits=3072000 algorithm IKE dh group: id=16, name=OAKLEY_GROUP_MODP4096, bits=4096000 algorithm IKE dh group: id=17, name=OAKLEY_GROUP_MODP6144, bits=6144000 algorithm IKE dh group: id=18, name=OAKLEY_GROUP_MODP8192, bits=8192000  000 stats db_ops.c: {curr_cnt, total_cnt, maxsz} :context={0,0,0} trans={0,0,0} attrs={0,0,0} 000  000 "block": 192.1.2.23[%myid]---192.1.2.254...%group; unrouted; eroute owner: #0000 "block":   ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0000 "block":   policy: TUNNEL+PFS+GROUP+GROUTED+REJECT+NEVER_NEGOTIATE+lKOD+rKOD; prio: 32,0; interface: eth1; 000 "block":   newest ISAKMP SA: #0; newest IPsec SA: #0; 000 "block":   IKE algorithms wanted: 5_000-1-5, 5_000-1-2, 5_000-2-5, 5_000-2-2, flags=-strict000 "block":   IKE algorithms found:  5_192-1_128-5, 5_192-1_128-2, 5_192-2_160-5, 5_192-2_160-2, 000 "block":   ESP algorithms wanted: 3_000-1, 3_000-2, flags=-strict000 "block":   ESP algorithms loaded: 3_000-1, 3_000-2, flags=-strict000 "clear": 192.1.2.23[%myid]---192.1.2.254...%group; unrouted; eroute owner: #0000 "clear":   ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0000 "clear":   policy: TUNNEL+PFS+GROUP+GROUTED+PASS+NEVER_NEGOTIATE+lKOD+rKOD; prio: 32,0; interface: eth1; 000 "clear":   newest ISAKMP SA: #0; newest IPsec SA: #0; 000 "clear":   IKE algorithms wanted: 5_000-1-5, 5_000-1-2, 5_000-2-5, 5_000-2-2, flags=-strict000 "clear":   IKE algorithms found:  5_192-1_128-5, 5_192-1_128-2, 5_192-2_160-5, 5_192-2_160-2, 000 "clear":   ESP algorithms wanted: 3_000-1, 3_000-2, flags=-strict000 "clear":   ESP algorithms loaded: 3_000-1, 3_000-2, flags=-strict000 "clear-or-private": 192.1.2.23[%myid]---192.1.2.254...%opportunisticgroup; unrouted; eroute owner: #0000 "clear-or-private":   ike_life: 3600s; ipsec_life: 3600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 3000 "clear-or-private":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+DONTREKEY+OPPORTUNISTIC+GROUP+GROUTED+PASS+failurePASS+lKOD+rKOD; prio: 32,0; interface: eth1; 000 "clear-or-private":   newest ISAKMP SA: #0; newest IPsec SA: #0; 000 "clear-or-private":   IKE algorithms wanted: 5_000-1-5, 5_000-1-2, 5_000-2-5, 5_000-2-2, flags=-strict000 "clear-or-private":   IKE algorithms found:  5_192-1_128-5, 5_192-1_128-2, 5_192-2_160-5, 5_192-2_160-2, 000 "clear-or-private":   ESP algorithms wanted: 3_000-1, 3_000-2, flags=-strict000 "clear-or-private":   ESP algorithms loaded: 3_000-1, 3_000-2, flags=-strict000 "packetdefault": 0.0.0.0/0===192.1.2.23[%myid]---192.1.2.254...%opportunistic; prospective erouted; eroute owner: #0000 "packetdefault":   ike_life: 3600s; ipsec_life: 3600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 3000 "packetdefault":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+DONTREKEY+OPPORTUNISTIC+failurePASS+lKOD+rKOD; prio: 0,0; interface: eth1; 000 "packetdefault":   newest ISAKMP SA: #0; newest IPsec SA: #0; 000 "packetdefault":   IKE algorithms wanted: 5_000-1-5, 5_000-1-2, 5_000-2-5, 5_000-2-2, flags=-strict000 "packetdefault":   IKE algorithms found:  5_192-1_128-5, 5_192-1_128-2, 5_192-2_160-5, 5_192-2_160-2, 000 "packetdefault":   ESP algorithms wanted: 3_000-1, 3_000-2, flags=-strict000 "packetdefault":   ESP algorithms loaded: 3_000-1, 3_000-2, flags=-strict000 "private": 192.1.2.23[%myid]---192.1.2.254...%opportunisticgroup; unrouted; eroute owner: #0000 "private":   ike_life: 3600s; ipsec_life: 3600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 3000 "private":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+DONTREKEY+OPPORTUNISTIC+GROUP+GROUTED+failureDROP+lKOD+rKOD; prio: 32,0; interface: eth1; 000 "private":   newest ISAKMP SA: #0; newest IPsec SA: #0; 000 "private":   IKE algorithms wanted: 5_000-1-5, 5_000-1-2, 5_000-2-5, 5_000-2-2, flags=-strict000 "private":   IKE algorithms found:  5_192-1_128-5, 5_192-1_128-2, 5_192-2_160-5, 5_192-2_160-2, 000 "private":   ESP algorithms wanted: 3_000-1, 3_000-2, flags=-strict000 "private":   ESP algorithms loaded: 3_000-1, 3_000-2, flags=-strict000 "private-or-clear": 192.1.2.23[%myid]---192.1.2.254...%opportunisticgroup; unrouted; eroute owner: #0000 "private-or-clear":   ike_life: 3600s; ipsec_life: 3600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 3000 "private-or-clear":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+DONTREKEY+OPPORTUNISTIC+GROUP+GROUTED+failurePASS+lKOD+rKOD; prio: 32,0; interface: eth1; 000 "private-or-clear":   newest ISAKMP SA: #0; newest IPsec SA: #0; 000 "private-or-clear":   IKE algorithms wanted: 5_000-1-5, 5_000-1-2, 5_000-2-5, 5_000-2-2, flags=-strict000 "private-or-clear":   IKE algorithms found:  5_192-1_128-5, 5_192-1_128-2, 5_192-2_160-5, 5_192-2_160-2, 000 "private-or-clear":   ESP algorithms wanted: 3_000-1, 3_000-2, flags=-strict000 "private-or-clear":   ESP algorithms loaded: 3_000-1, 3_000-2, flags=-strict000 "private-or-clear#0.0.0.0/32": 192.1.2.23[%myid]---192.1.2.254...%opportunistic===?; prospective erouted; eroute owner: #0000 "private-or-clear#0.0.0.0/32":   ike_life: 3600s; ipsec_life: 3600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 3000 "private-or-clear#0.0.0.0/32":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+DONTREKEY+OPPORTUNISTIC+failurePASS+lKOD+rKOD; prio: 32,0; interface: eth1; 000 "private-or-clear#0.0.0.0/32":   newest ISAKMP SA: #0; newest IPsec SA: #0; 000 "private-or-clear#0.0.0.0/32":   IKE algorithms wanted: 5_000-1-5, 5_000-1-2, 5_000-2-5, 5_000-2-2, flags=-strict000 "private-or-clear#0.0.0.0/32":   IKE algorithms found:  5_192-1_128-5, 5_192-1_128-2, 5_192-2_160-5, 5_192-2_160-2, 000 "private-or-clear#0.0.0.0/32":   ESP algorithms wanted: 3_000-1, 3_000-2, flags=-strict000 "private-or-clear#0.0.0.0/32":   ESP algorithms loaded: 3_000-1, 3_000-2, flags=-strict000  000  east:~# ipsec setup stopIPSEC EVENT: KLIPS device ipsec0 shut down.ipsec_setup: Stopping Openswan IPsec...east:~# ipsec erouteeast:~# export IPSEC_CONFS="$D/etc-myid"east:~# ipsec setup start ipsec_setup: Starting Openswan IPsec VERSIONeast:~# sleep 4east:~# /testing/pluto/basic-pluto-01/eroutewait.sh trapeast:~# ipsec auto --status000 interface ipsec0/eth1 192.1.2.23000 %myid = @freeswan.org000 debug none000  000 algorithm ESP encrypt: id=3, name=ESP_3DES, ivlen=64, keysizemin=168, keysizemax=168000 algorithm ESP encrypt: id=12, name=ESP_AES, ivlen=128, keysizemin=128, keysizemax=256000 algorithm ESP auth attr: id=1, name=AUTH_ALGORITHM_HMAC_MD5, keysizemin=128, keysizemax=128000 algorithm ESP auth attr: id=2, name=AUTH_ALGORITHM_HMAC_SHA1, keysizemin=160, keysizemax=160000 algorithm ESP auth attr: id=9, name=AUTH_ALGORITHM_ID9, keysizemin=128, keysizemax=128000  000 algorithm IKE encrypt: id=7, name=OAKLEY_AES_CBC, blocksize=16, keydeflen=128000 algorithm IKE encrypt: id=5, name=OAKLEY_3DES_CBC, blocksize=8, keydeflen=192000 algorithm IKE hash: id=2, name=OAKLEY_SHA, hashsize=20000 algorithm IKE hash: id=1, name=OAKLEY_MD5, hashsize=16000 algorithm IKE dh group: id=2, name=OAKLEY_GROUP_MODP1024, bits=1024000 algorithm IKE dh group: id=5, name=OAKLEY_GROUP_MODP1536, bits=1536000 algorithm IKE dh group: id=14, name=OAKLEY_GROUP_MODP2048, bits=2048000 algorithm IKE dh group: id=15, name=OAKLEY_GROUP_MODP3072, bits=3072000 algorithm IKE dh group: id=16, name=OAKLEY_GROUP_MODP4096, bits=4096000 algorithm IKE dh group: id=17, name=OAKLEY_GROUP_MODP6144, bits=6144000 algorithm IKE dh group: id=18, name=OAKLEY_GROUP_MODP8192, bits=8192000  000 stats db_ops.c: {curr_cnt, total_cnt, maxsz} :context={0,0,0} trans={0,0,0} attrs={0,0,0} 000  000 "block": 192.1.2.23[%myid]---192.1.2.254...%group; unrouted; eroute owner: #0000 "block":   ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0000 "block":   policy: TUNNEL+PFS+GROUP+GROUTED+REJECT+NEVER_NEGOTIATE+lKOD+rKOD; prio: 32,0; interface: eth1; 000 "block":   newest ISAKMP SA: #0; newest IPsec SA: #0; 000 "block":   IKE algorithms wanted: 5_000-1-5, 5_000-1-2, 5_000-2-5, 5_000-2-2, flags=-strict000 "block":   IKE algorithms found:  5_192-1_128-5, 5_192-1_128-2, 5_192-2_160-5, 5_192-2_160-2, 000 "block":   ESP algorithms wanted: 3_000-1, 3_000-2, flags=-strict000 "block":   ESP algorithms loaded: 3_000-1, 3_000-2, flags=-strict000 "clear": 192.1.2.23[%myid]---192.1.2.254...%group; unrouted; eroute owner: #0000 "clear":   ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0000 "clear":   policy: TUNNEL+PFS+GROUP+GROUTED+PASS+NEVER_NEGOTIATE+lKOD+rKOD; prio: 32,0; interface: eth1; 000 "clear":   newest ISAKMP SA: #0; newest IPsec SA: #0; 000 "clear":   IKE algorithms wanted: 5_000-1-5, 5_000-1-2, 5_000-2-5, 5_000-2-2, flags=-strict000 "clear":   IKE algorithms found:  5_192-1_128-5, 5_192-1_128-2, 5_192-2_160-5, 5_192-2_160-2, 000 "clear":   ESP algorithms wanted: 3_000-1, 3_000-2, flags=-strict000 "clear":   ESP algorithms loaded: 3_000-1, 3_000-2, flags=-strict000 "clear-or-private": 192.1.2.23[%myid]---192.1.2.254...%opportunisticgroup; unrouted; eroute owner: #0000 "clear-or-private":   ike_life: 3600s; ipsec_life: 3600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 3000 "clear-or-private":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+DONTREKEY+OPPORTUNISTIC+GROUP+GROUTED+PASS+failurePASS+lKOD+rKOD; prio: 32,0; interface: eth1; 000 "clear-or-private":   newest ISAKMP SA: #0; newest IPsec SA: #0; 000 "clear-or-private":   IKE algorithms wanted: 5_000-1-5, 5_000-1-2, 5_000-2-5, 5_000-2-2, flags=-strict000 "clear-or-private":   IKE algorithms found:  5_192-1_128-5, 5_192-1_128-2, 5_192-2_160-5, 5_192-2_160-2, 000 "clear-or-private":   ESP algorithms wanted: 3_000-1, 3_000-2, flags=-strict000 "clear-or-private":   ESP algorithms loaded: 3_000-1, 3_000-2, flags=-strict000 "packetdefault": 0.0.0.0/0===192.1.2.23[%myid]---192.1.2.254...%opportunistic; prospective erouted; eroute owner: #0000 "packetdefault":   ike_life: 3600s; ipsec_life: 3600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 3000 "packetdefault":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+DONTREKEY+OPPORTUNISTIC+failurePASS+lKOD+rKOD; prio: 0,0; interface: eth1; 000 "packetdefault":   newest ISAKMP SA: #0; newest IPsec SA: #0; 000 "packetdefault":   IKE algorithms wanted: 5_000-1-5, 5_000-1-2, 5_000-2-5, 5_000-2-2, flags=-strict000 "packetdefault":   IKE algorithms found:  5_192-1_128-5, 5_192-1_128-2, 5_192-2_160-5, 5_192-2_160-2, 000 "packetdefault":   ESP algorithms wanted: 3_000-1, 3_000-2, flags=-strict000 "packetdefault":   ESP algorithms loaded: 3_000-1, 3_000-2, flags=-strict000 "private": 192.1.2.23[%myid]---192.1.2.254...%opportunisticgroup; unrouted; eroute owner: #0000 "private":   ike_life: 3600s; ipsec_life: 3600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 3000 "private":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+DONTREKEY+OPPORTUNISTIC+GROUP+GROUTED+failureDROP+lKOD+rKOD; prio: 32,0; interface: eth1; 000 "private":   newest ISAKMP SA: #0; newest IPsec SA: #0; 000 "private":   IKE algorithms wanted: 5_000-1-5, 5_000-1-2, 5_000-2-5, 5_000-2-2, flags=-strict000 "private":   IKE algorithms found:  5_192-1_128-5, 5_192-1_128-2, 5_192-2_160-5, 5_192-2_160-2, 000 "private":   ESP algorithms wanted: 3_000-1, 3_000-2, flags=-strict000 "private":   ESP algorithms loaded: 3_000-1, 3_000-2, flags=-strict000 "private-or-clear": 192.1.2.23[%myid]---192.1.2.254...%opportunisticgroup; unrouted; eroute owner: #0000 "private-or-clear":   ike_life: 3600s; ipsec_life: 3600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 3000 "private-or-clear":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+DONTREKEY+OPPORTUNISTIC+GROUP+GROUTED+failurePASS+lKOD+rKOD; prio: 32,0; interface: eth1; 000 "private-or-clear":   newest ISAKMP SA: #0; newest IPsec SA: #0; 000 "private-or-clear":   IKE algorithms wanted: 5_000-1-5, 5_000-1-2, 5_000-2-5, 5_000-2-2, flags=-strict000 "private-or-clear":   IKE algorithms found:  5_192-1_128-5, 5_192-1_128-2, 5_192-2_160-5, 5_192-2_160-2, 000 "private-or-clear":   ESP algorithms wanted: 3_000-1, 3_000-2, flags=-strict000 "private-or-clear":   ESP algorithms loaded: 3_000-1, 3_000-2, flags=-strict000 "private-or-clear#0.0.0.0/32": 192.1.2.23[%myid]---192.1.2.254...%opportunistic===?; prospective erouted; eroute owner: #0000 "private-or-clear#0.0.0.0/32":   ike_life: 3600s; ipsec_life: 3600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 3000 "private-or-clear#0.0.0.0/32":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+DONTREKEY+OPPORTUNISTIC+failurePASS+lKOD+rKOD; prio: 32,0; interface: eth1; 000 "private-or-clear#0.0.0.0/32":   newest ISAKMP SA: #0; newest IPsec SA: #0; 000 "private-or-clear#0.0.0.0/32":   IKE algorithms wanted: 5_000-1-5, 5_000-1-2, 5_000-2-5, 5_000-2-2, flags=-strict000 "private-or-clear#0.0.0.0/32":   IKE algorithms found:  5_192-1_128-5, 5_192-1_128-2, 5_192-2_160-5, 5_192-2_160-2, 000 "private-or-clear#0.0.0.0/32":   ESP algorithms wanted: 3_000-1, 3_000-2, flags=-strict000 "private-or-clear#0.0.0.0/32":   ESP algorithms loaded: 3_000-1, 3_000-2, flags=-strict000  000  east:~# ipsec setup stopIPSEC EVENT: KLIPS device ipsec0 shut down.ipsec_setup: Stopping Openswan IPsec...

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -