⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 spi1-console.txt

📁 This a good VPN source
💻 TXT
📖 第 1 页 / 共 3 页
字号:
Starting UML PATH/start.shspawn PATH singleLinux version XXXXOn node 0 totalpages: 8192Kernel command line:Calibrating delay loop... XXXX bogomipsDentry-cache hash table entries: NUMBERSInode-cache hash table entries: NUMBERSMount-cache hash table entries: NUMBERSBuffer-cache hash table entries: NUMBERSPage-cache hash table entries: NUMEBRSPOSIX conformance testing by UNIFIXLinux NET4.0 for Linux 2.4Based upon Swansea University Computer Society NET3.039Initializing RT netlink socketStarting kswapdVFS: Diskquotas version dquot_6.4.0 initializeddevfs: VERSION Richard Gooch (rgooch@atnf.csiro.au)devfs: boot_options Qpty: 256 Unix98 ptys configuredSLIP: version 0.8.4-NET3.019-NEWTTY (dynamic channels, max=256).loop: loaded (max 8 devices)PPP generic driver version VERSIONUniversal TUN/TAP device driver VERSIONNET4: Linux TCP/IP 1.0 for NET4.0IP Protocols: ICMP, UDP, TCPIP: routing cache hash table of 512 buckets, 4KbytesTCP: Hash tables configured (established 2048 bind 2048)IPv4 over IPv4 tunneling driverGRE over IPv4 tunneling driverNET4: Unix domain sockets 1.0/SMP for Linux NET4.0.Mounted devfs on /devINIT: version 2.78 bootingActivating swap...Calculating module dependanciesdone.Loading modules: LISTChecking all file systems...Parallelizing fsck version 1.18 (11-Nov-1999)Setting kernel variables.Mounting local filesystems.../dev/shm on /tmp type tmpfs (rw)/dev/shm on /var/run type tmpfs (rw)devpts on /dev/pts type devpts (rw,mode=0622)none on /usr/share type hostfs (ro)Enabling packet forwarding: done.Configuring network interfaces: done.Cleaning: /tmp /var/lock /var/run.Initializing random number generator... done.Recovering nvi editor sessions... done.Give root password for maintenance(or type Control-D for normal startup): west:~# klogd -c 4 -x -f /tmp/klog.logwest:~# TZ=GMT export TZwest:~# ipsec spi --clearwest:~# ipsec eroute --clearwest:~# ipsec klipsdebug --set pfkeywest:~# ipsec eroute --add --eraf inet --src 192.0.1.0/24 --dst 192.0.2.0/24 --said %trapsubnetwest:~# ipsec tncfg --attach --virtual ipsec0 --physical eth1west:~# ifconfig ipsec0 inet 192.1.2.45 netmask 0xffffff00 broadcast 192.1.2.255 upwest:~# arp -s 192.1.2.23 10:00:00:64:64:45west:~# arp -s 192.1.2.254 10:00:00:64:64:45west:~# ipsec lookwest NOW192.0.1.0/24       -> 192.0.2.0/24       => %trapsubnet (0)ipsec0->eth1 mtu=16260(1500)->1500Destination     Gateway         Genmask         Flags   MSS Window  irtt Ifacewest:~# route add -host 192.0.2.1 gw 192.1.2.23 dev ipsec0west:~# ipsec pf_key --daemon /var/run/pf_key.pid >/tmp/pfkey.txtwest:~# echo start nowstart nowwest:~# kill `cat /var/run/pf_key.pid`west:~# cat /tmp/pfkey.txt; echo ===pfkey v2 msg. type=7(register) seq=1 len=5 pid=987 errno=0 satype=2(AH)version=2 type=7 errno=0 satype=2 len=5 seq=1 pid=987 {ext=14 len=3 bytes=0x000000000300a000a00000000200800080000000 } pfkey v2 msg. type=7(register) seq=2 len=9 pid=987 errno=0 satype=3(ESP)version=2 type=7 errno=0 satype=3 len=9 seq=2 pid=987 {ext=14 len=4 bytes=0x0000000009008000800000000300a000a00000000200800080000000 } {ext=15 len=3 bytes=0x000000000c808000000100000340a800a8000000 } pfkey v2 msg. type=7(register) seq=3 len=4 pid=987 errno=0 satype=9(IPIP)version=2 type=7 errno=0 satype=9 len=4 seq=3 pid=987 {ext=15 len=2 bytes=0x000000000100200020000000 } pfkey v2 msg. type=7(register) seq=4 len=4 pid=987 errno=0 satype=10(COMP)version=2 type=7 errno=0 satype=10 len=4 seq=4 pid=987 {ext=15 len=2 bytes=0x000000000200010001000000 } pf_key: Exiting on signal 15===west:~# ipsec eroute0          192.0.1.0/24       -> 192.0.2.0/24       => %trapsubnetwest:~# ipsec setup stopIPSEC EVENT: KLIPS device ipsec0 shut down.ipsec_setup: Stopping Openswan IPsec...ipsec_setup: stop ordered, but IPsec does not appear to be running!ipsec_setup: doing cleanup anyway...west:~# kill `cat /var/run/klogd.pid`; cat /tmp/klog.logklogd 1.3-3#33.1, log source = /proc/kmsg started.west:~# halt -p -fPower down.klips_debug:pfkey_x_debug_process: setklips_debug:pfkey_msg_interp: parsing message type 16(x-debug) with msg_parser 0pDEADF00D.klips_debug:pfkey_x_msg_debug_parse: .klips_debug:pfkey_release: sock=0pDEADF00D sk=0pDEADF00Dklips_debug:pfkey_destroy_socket: .klips_debug:pfkey_remove_socket: .klips_debug:pfkey_remove_socket: succeeded.klips_debug:pfkey_destroy_socket: pfkey_remove_socket called.klips_debug:pfkey_destroy_socket: sk(0pDEADF00D)->(&0pDEADF00D)receive_queue.{next=0pDEADF00D,prev=0pDEADF00D}.klips_debug:pfkey_destroy_socket: destroyed.klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_release: succeeded.klips_debug:pfkey_create: sock=0pDEADF00D type:3 state:1 flags:0 protocol:2klips_debug:pfkey_create: sock->fasync_list=0pDEADF00D sk->sleep=0pDEADF00D.klips_debug:pfkey_insert_socket: sk=0pDEADF00Dklips_debug:pfkey_list_insert_socket: allocating 8 bytes for socketp=0pDEADF00Dklips_debug:pfkey_create: Socket sock=0pDEADF00D sk=0pDEADF00D initialised.klips_debug:pfkey_sendmsg: .klips_debug:pfkey_sendmsg: allocating 184 bytes for downward message.klips_debug:pfkey_sendmsg: msg sent for parsing.klips_debug:pfkey_msg_interp: parsing message ver=2, type=14, errno=0, satype=11(INT), len=23, res=0, seq=1, pid=987.klips_debug:pfkey_msg_interp: allocated extr->ips=0pDEADF00D.klips_debug:pfkey_msg_interp: satype 11 lookups to proto=61.klips_debug:pfkey_msg_parse: parsing message ver=2, type=14(x-addflow(eroute)), errno=0, satype=11(INT), len=23, res=0, seq=1, pid=987.klips_debug:pfkey_msg_parse: satype 11(INT) conversion to proto gives 61 for msg_type 14(x-addflow(eroute)).klips_debug:pfkey_msg_parse: remain=21, ext_type=1(security-association), ext_len=3.klips_debug:pfkey_msg_parse: extensions permitted=05e00c63, required=01e00043.klips_debug:pfkey_msg_parse: parsing ext type=1(security-association) remain=21.klips_debug:pfkey_msg_parse: remain=21 ext_type=1(security-association) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_sa_parse.klips_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=00000105 replay=0 state=0 auth=0 encrypt=0 flags=0 ref=-1.klips_debug:pfkey_msg_parse: Extension 1(security-association) parsed.klips_debug:pfkey_msg_parse: parsing ext type=5(source-address) remain=18.klips_debug:pfkey_msg_parse: remain=18 ext_type=5(source-address) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_address_parse.klips_debug:pfkey_address_parse: found exttype=5(source-address) family=2(AF_INET) address=0.0.0.0 proto=0 port=0.klips_debug:pfkey_address_parse: successful.klips_debug:pfkey_msg_parse: Extension 5(source-address) parsed.klips_debug:pfkey_msg_parse: parsing ext type=6(destination-address) remain=15.klips_debug:pfkey_msg_parse: remain=15 ext_type=6(destination-address) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_address_parse.klips_debug:pfkey_address_parse: found exttype=6(destination-address) family=2(AF_INET) address=0.0.0.0 proto=0 port=0.klips_debug:pfkey_address_parse: successful.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -