⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 spi1-console.txt

📁 This a good VPN source
💻 TXT
📖 第 1 页 / 共 4 页
字号:
klips_debug:pfkey_msg_build: pfkey_msg=0pDEADF00D allocated 88 bytes, &(extensions[0])=0pDEADF00Dklips_debug:pfkey_msg_build: copying 24 bytes from extensions[1]=0pDEADF00D to=0pDEADF00Dklips_debug:pfkey_msg_build: copying 24 bytes from extensions[5]=0pDEADF00D to=0pDEADF00Dklips_debug:pfkey_msg_build: copying 24 bytes from extensions[6]=0pDEADF00D to=0pDEADF00Dklips_debug:pfkey_msg_build: extensions permitted=00001c7b, seen=00000063, required=00000063.klips_debug:pfkey_msg_parse: parsing message ver=2, type=3(add), errno=0, satype=9(IPIP), len=11, res=0, seq=1, pid=987.klips_debug:pfkey_msg_parse: satype 9(IPIP) conversion to proto gives 4 for msg_type 3(add).klips_debug:pfkey_msg_parse: remain=9 ext_type=1(security-association) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_sa_parse.klips_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=12345678 replay=0 state=1 auth=0 encrypt=0 flags=1 ref=5.klips_debug:pfkey_msg_parse: remain=6 ext_type=5(source-address) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_address_parse.klips_debug:pfkey_address_parse: found exttype=5(source-address) family=2(AF_INET) address=192.1.2.23 proto=0 port=0.klips_debug:pfkey_msg_parse: remain=3 ext_type=6(destination-address) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_address_parse.klips_debug:pfkey_address_parse: found exttype=6(destination-address) family=2(AF_INET) address=192.1.2.45 proto=0 port=0.klips_debug:pfkey_msg_parse: extensions permitted=00001c7b, seen=00000063, required=00000063.klips_debug:pfkey_upmsg: allocating 88 bytes...klips_debug:pfkey_upmsg: ...allocated at 0pDEADF00D.klips_debug:pfkey_add_parse: sending up add reply message for satype=9(IPIP) to socket=0pDEADF00D succeeded.klips_debug:pfkey_add_parse: successful for SA: tun0x12345678@192.1.2.45klips_debug:pfkey_release: sock=0pDEADF00D sk=0pDEADF00Dklips_debug:pfkey_destroy_socket: .klips_debug:pfkey_remove_socket: .klips_debug:pfkey_remove_socket: succeeded.klips_debug:pfkey_destroy_socket: pfkey_remove_socket called.klips_debug:pfkey_destroy_socket: sk(0pDEADF00D)->(&0pDEADF00D)receive_queue.{next=0pDEADF00D,prev=0pDEADF00D}.klips_debug:pfkey_destroy_socket: skb=0pDEADF00D freed.klips_debug:pfkey_destroy_socket: destroyed.klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_release: succeeded.klips_debug:pfkey_create: sock=0pDEADF00D type:3 state:1 flags:0 protocol:2klips_debug:pfkey_create: sock->fasync_list=0pDEADF00D sk->sleep=0pDEADF00D.klips_debug:pfkey_insert_socket: sk=0pDEADF00Dklips_debug:pfkey_list_insert_socket: allocating 8 bytes for socketp=0pDEADF00Dklips_debug:pfkey_create: Socket sock=0pDEADF00D sk=0pDEADF00D initialised.klips_debug:pfkey_sendmsg: .klips_debug:pfkey_sendmsg: allocating 120 bytes for downward message.klips_debug:pfkey_sendmsg: msg sent for parsing.klips_debug:pfkey_msg_interp: parsing message ver=2, type=13, errno=0, satype=9(IPIP), len=15, res=0, seq=1, pid=987.klips_debug:pfkey_msg_interp: allocated extr->ips=0pDEADF00D.klips_debug:pfkey_msg_interp: satype 9 lookups to proto=4.klips_debug:pfkey_msg_parse: parsing message ver=2, type=13(x-groupsa), errno=0, satype=9(IPIP), len=15, res=0, seq=1, pid=987.klips_debug:pfkey_msg_parse: satype 9(IPIP) conversion to proto gives 4 for msg_type 13(x-groupsa).klips_debug:pfkey_msg_parse: remain=13 ext_type=1(security-association) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_sa_parse.klips_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=12345678 replay=0 state=0 auth=0 encrypt=0 flags=0 ref=-1.klips_debug:pfkey_msg_parse: remain=10 ext_type=6(destination-address) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_address_parse.klips_debug:pfkey_address_parse: found exttype=6(destination-address) family=2(AF_INET) address=192.1.2.45 proto=0 port=0.klips_debug:pfkey_msg_parse: remain=7 ext_type=18(X-satype2) ext_len=1 parsing ext 0pDEADF00D with parser pfkey_x_satype_parse.klips_debug:pfkey_x_satype_parse: len=1 ext=18(X-satype2) satype=3(ESP) res=0,0,0.klips_debug:pfkey_msg_parse: remain=6 ext_type=19(X-security-association) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_sa_parse.klips_debug:pfkey_sa_parse: successfully found len=3 exttype=19(X-security-association) spi=12345678 replay=0 state=0 auth=0 encrypt=0 flags=0 ref=-1.klips_debug:pfkey_msg_parse: remain=3 ext_type=20(X-destination-address2) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_address_parse.klips_debug:pfkey_address_parse: found exttype=20(X-destination-address2) family=2(AF_INET) address=192.1.2.45 proto=0 port=0.klips_debug:pfkey_msg_parse: extensions permitted=001c0043, seen=001c0043, required=00000043.klips_debug:pfkey_msg_interp: processing ext 1 0pDEADF00D with processor 0pDEADF00D.klips_debug:pfkey_sa_process: .klips_debug:pfkey_msg_interp: processing ext 6 0pDEADF00D with processor 0pDEADF00D.klips_debug:pfkey_address_process:klips_debug:pfkey_address_process: found address family=2, AF_INET, 192.1.2.45.klips_debug:pfkey_address_process: found dst address.klips_debug:pfkey_address_process: allocating 16 bytes for saddr.klips_debug:pfkey_address_process: ips_said.dst set to 192.1.2.45.klips_debug:pfkey_address_process: successful.klips_debug:pfkey_msg_interp: processing ext 18 0pDEADF00D with processor 0pDEADF00D.klips_debug:pfkey_x_satype_process: .klips_debug:pfkey_x_satype_process: protocol==50 decoded from satype==3(ESP).klips_debug:pfkey_msg_interp: processing ext 19 0pDEADF00D with processor 0pDEADF00D.klips_debug:pfkey_sa_process: .klips_debug:pfkey_msg_interp: processing ext 20 0pDEADF00D with processor 0pDEADF00D.klips_debug:pfkey_address_process:klips_debug:pfkey_address_process: found address family=2, AF_INET, 192.1.2.45.klips_debug:pfkey_address_process: found 2nd dst address.klips_debug:pfkey_address_process: allocating 16 bytes for saddr.klips_debug:pfkey_address_process: ips_said.dst set to 192.1.2.45.klips_debug:pfkey_address_process: successful.klips_debug:pfkey_msg_interp: parsing message type 13(x-groupsa) with msg_parser 0pDEADF00D.klips_debug:pfkey_x_grpsa_parse: .klips_debug:pfkey_x_grpsa_parse: linking ipsec_sa SA: tun0x12345678@192.1.2.45 with esp0x12345678@192.1.2.45.klips_debug:pfkey_msg_hdr_build:klips_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=0pDEADF00D pfkey_ext=0pDEADF00D *pfkey_ext=0pDEADF00D.klips_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=0pDEADF00D pfkey_ext=0pDEADF00D *pfkey_ext=0pDEADF00D.klips_debug:pfkey_safe_build: error=0klips_debug:pfkey_safe_build:success.klips_debug:pfkey_sa_build: spi=12345678 replay=0 sa_state=0 auth=0 encrypt=0 flags=0klips_debug:pfkey_safe_build: error=0klips_debug:pfkey_safe_build:success.klips_debug:pfkey_address_build: exttype=6 proto=0 prefixlen=0klips_debug:pfkey_address_build: found address family AF_INET.klips_debug:pfkey_address_build: found address=192.1.2.45:0.klips_debug:pfkey_address_build: successful.klips_debug:pfkey_safe_build: error=0klips_debug:pfkey_safe_build:success.klips_debug:pfkey_x_satype_build:klips_debug:pfkey_safe_build: error=0klips_debug:pfkey_safe_build:success.klips_debug:pfkey_sa_build: spi=12345678 replay=0 sa_state=0 auth=0 encrypt=0 flags=0klips_debug:pfkey_safe_build: error=0klips_debug:pfkey_safe_build:success.klips_debug:pfkey_address_build: exttype=20 proto=0 prefixlen=0klips_debug:pfkey_address_build: found address family AF_INET.klips_debug:pfkey_address_build: found address=192.1.2.45:0.klips_debug:pfkey_address_build: successful.klips_debug:pfkey_safe_build: error=0klips_debug:pfkey_safe_build:success.klips_debug:pfkey_msg_build: pfkey_msg=0pDEADF00D allocated 120 bytes, &(extensions[0])=0pDEADF00Dklips_debug:pfkey_msg_build: copying 24 bytes from extensions[1]=0pDEADF00D to=0pDEADF00Dklips_debug:pfkey_msg_build: copying 24 bytes from extensions[6]=0pDEADF00D to=0pDEADF00Dklips_debug:pfkey_msg_build: copying 8 bytes from extensions[18]=0pDEADF00D to=0pDEADF00Dklips_debug:pfkey_msg_build: copying 24 bytes from extensions[19]=0pDEADF00D to=0pDEADF00Dklips_debug:pfkey_msg_build: copying 24 bytes from extensions[20]=0pDEADF00D to=0pDEADF00Dklips_debug:pfkey_msg_build: extensions permitted=001c0043, seen=001c0043, required=00000043.klips_debug:pfkey_msg_parse: parsing message ver=2, type=13(x-groupsa), errno=0, satype=9(IPIP), len=15, res=0, seq=1, pid=987.klips_debug:pfkey_msg_parse: satype 9(IPIP) conversion to proto gives 4 for msg_type 13(x-groupsa).klips_debug:pfkey_msg_parse: remain=13 ext_type=1(security-association) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_sa_parse.klips_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=12345678 replay=0 state=0 auth=0 encrypt=0 flags=0 ref=6.klips_debug:pfkey_msg_parse: remain=10 ext_type=6(destination-address) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_address_parse.klips_debug:pfkey_address_parse: found exttype=6(destination-address) family=2(AF_INET) address=192.1.2.45 proto=0 port=0.klips_debug:pfkey_msg_parse: remain=7 ext_type=18(X-satype2) ext_len=1 parsing ext 0pDEADF00D with parser pfkey_x_satype_parse.klips_debug:pfkey_x_satype_parse: len=1 ext=18(X-satype2) satype=3(ESP) res=0,0,0.klips_debug:pfkey_msg_parse: remain=6 ext_type=19(X-security-association) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_sa_parse.klips_debug:pfkey_sa_parse: successfully found len=3 exttype=19(X-security-association) spi=12345678 replay=0 state=0 auth=0 encrypt=0 flags=0 ref=7.klips_debug:pfkey_msg_parse: remain=3 ext_type=20(X-destination-address2) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_address_parse.klips_debug:pfkey_address_parse: found exttype=20(X-destination-address2) family=2(AF_INET) address=192.1.2.45 proto=0 port=0.klips_debug:pfkey_msg_parse: extensions permitted=001c0043, seen=001c0043, required=00000043.klips_debug:pfkey_upmsg: allocating 120 bytes...klips_debug:pfkey_upmsg: ...allocated at 0pDEADF00D.klips_debug:pfkey_x_grpsa_parse: sending up x_grpsa reply message for satype=9(IPIP) to socket=0pDEADF00D succeeded.klips_debug:pfkey_x_grpsa_parse: succeeded in sending x_grpsa reply message.klips_debug:pfkey_release: sock=0pDEADF00D sk=0pDEADF00Dklips_debug:pfkey_destroy_socket: .klips_debug:pfkey_remove_socket: .klips_debug:pfkey_remove_socket: succeeded.klips_debug:pfkey_destroy_socket: pfkey_remove_socket called.klips_debug:pfkey_destroy_socket: sk(0pDEADF00D)->(&0pDEADF00D)receive_queue.{next=0pDEADF00D,prev=0pDEADF00D}.klips_debug:pfkey_destroy_socket: skb=0pDEADF00D freed.klips_debug:pfkey_destroy_socket: destroyed.klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_release: succeeded.klips_debug:ipsec_rcv: <<< Info -- skb->dev=eth1 dev=eth1 klips_debug:ipsec_rcv: assigning packet ownership to virtual device ipsec0 from physical device eth1.klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:136 id:65383 frag_off:0 ttl:64 proto:50 chk:63125 saddr:192.1.2.23 daddr:192.1.2.45klips_debug:ipsec_rcv_decap_once: decap (50) from 192.1.2.23 -> 192.1.2.45klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, src=192.1.2.23 of pkt agrees with expected SA source address policy.klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45 First SA in group.klips_debug:ipsec_rcv: packet from 192.1.2.23 received with seq=1 (iv)=0x4c20452f3cb09211 iplen=136 esplen=104 sa=esp0x12345678@192.1.2.45klips_debug:ipsec_rcv: encalg = 3, authalg = 2.klips_debug:ipsec_rcv: authentication successful.klips_debug:ipsec_rcv: padlen=2, contents: 0x<offset>: 0x<value> 0x<value> ...klips_debug:           00: 01 02klips_debug:ipsec_rcv: packet decrypted from 192.1.2.23: next_header = 4, padding = 2klips_debug:ipsec_rcv: trimming to 104.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -