📄 spi1-console.txt
字号:
klips_debug:ipsec_rcv: after <ESP_3DES_HMAC_MD5>, SA:esp0x12345678@192.1.2.45:klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:65383 frag_off:0 ttl:64 proto:4 chk:63203 saddr:192.1.2.23 daddr:192.1.2.45klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, Another IPSEC header to process.klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x40000.klips_debug:ipsec_rcv: IPIP tunnel stripped.klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:63 proto:1 (ICMP) chk:47270 saddr:192.0.2.1 daddr:192.0.1.1 type:code=8:0klips_debug:ipsec_rcv: IPIP SA sets skb->nfmark=0x50000.klips_debug:ipsec_rcv: netif_rx() called.klips_debug:ipsec_rcv: <<< Info -- skb->dev=eth1 dev=eth1 klips_debug:ipsec_rcv: assigning packet ownership to virtual device ipsec0 from physical device eth1.klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:65384 frag_off:0 ttl:64 proto:50 chk:63124 saddr:192.1.2.23 daddr:192.1.2.45klips_debug:ipsec_rcv_decap_once: decap (50) from 192.1.2.23 -> 192.1.2.45klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, src=192.1.2.23 of pkt agrees with expected SA source address policy.klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45 First SA in group.klips_debug:ipsec_rcv: packet from 192.1.2.23 received with seq=2 (iv)=0x1a7041e3dc9176e8 iplen=136 esplen=104 sa=esp0x12345678@192.1.2.45klips_debug:ipsec_rcv: encalg = 3, authalg = 2.klips_debug:ipsec_rcv: authentication successful.klips_debug:ipsec_rcv: padlen=2, contents: 0x<offset>: 0x<value> 0x<value> ...klips_debug: 00: 01 02klips_debug:ipsec_rcv: packet decrypted from 192.1.2.23: next_header = 4, padding = 2klips_debug:ipsec_rcv: trimming to 104.klips_debug:ipsec_rcv: after <ESP_3DES_HMAC_MD5>, SA:esp0x12345678@192.1.2.45:klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:65384 frag_off:0 ttl:64 proto:4 chk:63202 saddr:192.1.2.23 daddr:192.1.2.45klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, Another IPSEC header to process.klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x40000.klips_debug:ipsec_rcv: IPIP tunnel stripped.klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:63 proto:1 (ICMP) chk:47270 saddr:192.0.2.1 daddr:192.0.1.1 type:code=8:0klips_debug:ipsec_rcv: IPIP SA sets skb->nfmark=0x50000.klips_debug:ipsec_rcv: netif_rx() called.klips_debug:ipsec_rcv: <<< Info -- skb->dev=eth1 dev=eth1 klips_debug:ipsec_rcv: assigning packet ownership to virtual device ipsec0 from physical device eth1.klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:65385 frag_off:0 ttl:64 proto:50 chk:63123 saddr:192.1.2.23 daddr:192.1.2.45klips_debug:ipsec_rcv_decap_once: decap (50) from 192.1.2.23 -> 192.1.2.45klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, src=192.1.2.23 of pkt agrees with expected SA source address policy.klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45 First SA in group.klips_debug:ipsec_rcv: packet from 192.1.2.23 received with seq=3 (iv)=0x5df8cd51ba5e0c01 iplen=136 esplen=104 sa=esp0x12345678@192.1.2.45klips_debug:ipsec_rcv: encalg = 3, authalg = 2.klips_debug:ipsec_rcv: authentication successful.klips_debug:ipsec_rcv: padlen=2, contents: 0x<offset>: 0x<value> 0x<value> ...klips_debug: 00: 01 02klips_debug:ipsec_rcv: packet decrypted from 192.1.2.23: next_header = 4, padding = 2klips_debug:ipsec_rcv: trimming to 104.klips_debug:ipsec_rcv: after <ESP_3DES_HMAC_MD5>, SA:esp0x12345678@192.1.2.45:klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:65385 frag_off:0 ttl:64 proto:4 chk:63201 saddr:192.1.2.23 daddr:192.1.2.45klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, Another IPSEC header to process.klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x40000.klips_debug:ipsec_rcv: IPIP tunnel stripped.klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:63 proto:1 (ICMP) chk:47270 saddr:192.0.2.1 daddr:192.0.1.1 type:code=8:0klips_debug:ipsec_rcv: IPIP SA sets skb->nfmark=0x50000.klips_debug:ipsec_rcv: netif_rx() called.klips_debug:ipsec_rcv: <<< Info -- skb->dev=eth1 dev=eth1 klips_debug:ipsec_rcv: assigning packet ownership to virtual device ipsec0 from physical device eth1.klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:65386 frag_off:0 ttl:64 proto:50 chk:63122 saddr:192.1.2.23 daddr:192.1.2.45klips_debug:ipsec_rcv_decap_once: decap (50) from 192.1.2.23 -> 192.1.2.45klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, src=192.1.2.23 of pkt agrees with expected SA source address policy.klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45 First SA in group.klips_debug:ipsec_rcv: packet from 192.1.2.23 received with seq=4 (iv)=0xab6606983f572fbd iplen=136 esplen=104 sa=esp0x12345678@192.1.2.45klips_debug:ipsec_rcv: encalg = 3, authalg = 2.klips_debug:ipsec_rcv: authentication successful.klips_debug:ipsec_rcv: padlen=2, contents: 0x<offset>: 0x<value> 0x<value> ...klips_debug: 00: 01 02klips_debug:ipsec_rcv: packet decrypted from 192.1.2.23: next_header = 4, padding = 2klips_debug:ipsec_rcv: trimming to 104.klips_debug:ipsec_rcv: after <ESP_3DES_HMAC_MD5>, SA:esp0x12345678@192.1.2.45:klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:65386 frag_off:0 ttl:64 proto:4 chk:63200 saddr:192.1.2.23 daddr:192.1.2.45klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, Another IPSEC header to process.klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x40000.klips_debug:ipsec_rcv: IPIP tunnel stripped.klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:63 proto:1 (ICMP) chk:47270 saddr:192.0.2.1 daddr:192.0.1.1 type:code=8:0klips_debug:ipsec_rcv: IPIP SA sets skb->nfmark=0x50000.klips_debug:ipsec_rcv: netif_rx() called.klips_debug:ipsec_rcv: <<< Info -- skb->dev=eth1 dev=eth1 klips_debug:ipsec_rcv: assigning packet ownership to virtual device ipsec0 from physical device eth1.klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:65387 frag_off:0 ttl:64 proto:50 chk:63121 saddr:192.1.2.23 daddr:192.1.2.45klips_debug:ipsec_rcv_decap_once: decap (50) from 192.1.2.23 -> 192.1.2.45klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, src=192.1.2.23 of pkt agrees with expected SA source address policy.klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45 First SA in group.klips_debug:ipsec_rcv: packet from 192.1.2.23 received with seq=5 (iv)=0x6eeafbc6f1a5c54a iplen=136 esplen=104 sa=esp0x12345678@192.1.2.45klips_debug:ipsec_rcv: encalg = 3, authalg = 2.klips_debug:ipsec_rcv: authentication successful.klips_debug:ipsec_rcv: padlen=2, contents: 0x<offset>: 0x<value> 0x<value> ...klips_debug: 00: 01 02klips_debug:ipsec_rcv: packet decrypted from 192.1.2.23: next_header = 4, padding = 2klips_debug:ipsec_rcv: trimming to 104.klips_debug:ipsec_rcv: after <ESP_3DES_HMAC_MD5>, SA:esp0x12345678@192.1.2.45:klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:65387 frag_off:0 ttl:64 proto:4 chk:63199 saddr:192.1.2.23 daddr:192.1.2.45klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, Another IPSEC header to process.klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x40000.klips_debug:ipsec_rcv: IPIP tunnel stripped.klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:63 proto:1 (ICMP) chk:47270 saddr:192.0.2.1 daddr:192.0.1.1 type:code=8:0klips_debug:ipsec_rcv: IPIP SA sets skb->nfmark=0x50000.klips_debug:ipsec_rcv: netif_rx() called.klips_debug:ipsec_rcv: <<< Info -- skb->dev=eth1 dev=eth1 klips_debug:ipsec_rcv: assigning packet ownership to virtual device ipsec0 from physical device eth1.klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:65388 frag_off:0 ttl:64 proto:50 chk:63120 saddr:192.1.2.23 daddr:192.1.2.45klips_debug:ipsec_rcv_decap_once: decap (50) from 192.1.2.23 -> 192.1.2.45klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, src=192.1.2.23 of pkt agrees with expected SA source address policy.klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45 First SA in group.klips_debug:ipsec_rcv: packet from 192.1.2.23 received with seq=6 (iv)=0xb4cfb47d779633a7 iplen=136 esplen=104 sa=esp0x12345678@192.1.2.45klips_debug:ipsec_rcv: encalg = 3, authalg = 2.klips_debug:ipsec_rcv: authentication successful.klips_debug:ipsec_rcv: padlen=2, contents: 0x<offset>: 0x<value> 0x<value> ...klips_debug: 00: 01 02klips_debug:ipsec_rcv: packet decrypted from 192.1.2.23: next_header = 4, padding = 2klips_debug:ipsec_rcv: trimming to 104.klips_debug:ipsec_rcv: after <ESP_3DES_HMAC_MD5>, SA:esp0x12345678@192.1.2.45:klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:65388 frag_off:0 ttl:64 proto:4 chk:63198 saddr:192.1.2.23 daddr:192.1.2.45klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, Another IPSEC header to process.klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x40000.klips_debug:ipsec_rcv: IPIP tunnel stripped.klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:63 proto:1 (ICMP) chk:47270 saddr:192.0.2.1 daddr:192.0.1.1 type:code=8:0klips_debug:ipsec_rcv: IPIP SA sets skb->nfmark=0x50000.klips_debug:ipsec_rcv: netif_rx() called.klips_debug:ipsec_rcv: <<< Info -- skb->dev=eth1 dev=eth1 klips_debug:ipsec_rcv: assigning packet ownership to virtual device ipsec0 from physical device eth1.klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:65389 frag_off:0 ttl:64 proto:50 chk:63119 saddr:192.1.2.23 daddr:192.1.2.45klips_debug:ipsec_rcv_decap_once: decap (50) from 192.1.2.23 -> 192.1.2.45klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, src=192.1.2.23 of pkt agrees with expected SA source address policy.klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45 First SA in group.klips_debug:ipsec_rcv: packet from 192.1.2.23 received with seq=7 (iv)=0xe5af03df09bb1909 iplen=136 esplen=104 sa=esp0x12345678@192.1.2.45klips_debug:ipsec_rcv: encalg = 3, authalg = 2.klips_debug:ipsec_rcv: authentication successful.klips_debug:ipsec_rcv: padlen=2, contents: 0x<offset>: 0x<value> 0x<value> ...klips_debug: 00: 01 02klips_debug:ipsec_rcv: packet decrypted from 192.1.2.23: next_header = 4, padding = 2klips_debug:ipsec_rcv: trimming to 104.klips_debug:ipsec_rcv: after <ESP_3DES_HMAC_MD5>, SA:esp0x12345678@192.1.2.45:klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:65389 frag_off:0 ttl:64 proto:4 chk:63197 saddr:192.1.2.23 daddr:192.1.2.45klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, Another IPSEC header to process.klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x40000.klips_debug:ipsec_rcv: IPIP tunnel stripped.klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:63 proto:1 (ICMP) chk:47270 saddr:192.0.2.1 daddr:192.0.1.1 type:code=8:0klips_debug:ipsec_rcv: IPIP SA sets skb->nfmark=0x50000.klips_debug:ipsec_rcv: netif_rx() called.klips_debug:ipsec_rcv: <<< Info -- skb->dev=eth1 dev=eth1 klips_debug:ipsec_rcv: assigning packet ownership to virtual device ipsec0 from physical device eth1.klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:65390 frag_off:0 ttl:64 proto:50 chk:63118 saddr:192.1.2.23 daddr:192.1.2.45klips_debug:ipsec_rcv_decap_once: decap (50) from 192.1.2.23 -> 192.1.2.45klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, src=192.1.2.23 of pkt agrees with expected SA source address policy.klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45 First SA in group.klips_debug:ipsec_rcv: packet from 192.1.2.23 received with seq=8 (iv)=0xd3a77702bc8788c0 iplen=136 esplen=104 sa=esp0x12345678@192.1.2.45klips_debug:ipsec_rcv: encalg = 3, authalg = 2.klips_debug:ipsec_rcv: authentication successful.klips_debug:ipsec_rcv: padlen=2, contents: 0x<offset>: 0x<value> 0x<value> ...klips_debug: 00: 01 02klips_debug:ipsec_rcv: packet decrypted from 192.1.2.23: next_header = 4, padding = 2klips_debug:ipsec_rcv: trimming to 104.klips_debug:ipsec_rcv: after <ESP_3DES_HMAC_MD5>, SA:esp0x12345678@192.1.2.45:klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:65390 frag_off:0 ttl:64 proto:4 chk:63196 saddr:192.1.2.23 daddr:192.1.2.45klips_debug:ipsec_rcv: SA:esp0x12345678@192.1.2.45, Another IPSEC header to process.klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x40000.klips_debug:ipsec_rcv: IPIP tunnel stripped.klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:63 proto:1 (ICMP) chk:47270 saddr:192.0.2.1 daddr:192.0.1.1 type:code=8:0klips_debug:ipsec_rcv: IPIP SA sets skb->nfmark=0x50000.klips_debug:ipsec_rcv: netif_rx() called.klips_debug:pfkey_create: sock=0pDEADF00D type:3 state:1 flags:0 protocol:2klips_debug:pfkey_create: sock->fasync_list=0pDEADF00D sk->sleep=0pDEADF00D.klips_debug:pfkey_insert_socket: sk=0pDEADF00Dklips_debug:pfkey_list_insert_socket: allocating 8 bytes for socketp=0pDEADF00Dklips_debug:pfkey_create: Socket sock=0pDEADF00D sk=0pDEADF00D initialised.klips_debug:pfkey_sendmsg: .klips_debug:pfkey_sendmsg: allocating 72 bytes for downward message.klips_debug:pfkey_sendmsg: msg sent for parsing.klips_debug:pfkey_msg_interp: parsing message ver=2, type=16, errno=0, satype=0(UNKNOWN), len=9, res=0, seq=1, pid=987.klips_debug:pfkey_msg_interp: allocated extr->ips=0pDEADF00D.klips_debug:pfkey_msg_parse: parsing message ver=2, type=16(x-debug), errno=0, satype=0(UNKNOWN), len=9, res=0, seq=1, pid=987.klips_debug:pfkey_msg_parse: remain=7 ext_type=25(X-set-debug) ext_len=7 parsing ext 0pDEADF00D with parser pfkey_x_ext_debug_parse.klips_debug:pfkey_msg_parse: extensions permitted=02000001, seen=02000001, required=02000001.klips_debug:pfkey_msg_interp: processing ext 25 0pDEADF00D with processor 0pDEADF00D.klips_debug:pfkey_x_debug_process: .klips_debug:pfkey_x_debug_process: unset
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -