⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 spi1-console.txt

📁 This a good VPN source
💻 TXT
📖 第 1 页 / 共 2 页
字号:
Starting UML PATH/start.shspawn PATH singleLinux version XXXXOn node 0 totalpages: 8192Kernel command line:Calibrating delay loop... XXXX bogomipsDentry-cache hash table entries: NUMBERSInode-cache hash table entries: NUMBERSMount-cache hash table entries: NUMBERSBuffer-cache hash table entries: NUMBERSPage-cache hash table entries: NUMEBRSPOSIX conformance testing by UNIFIXLinux NET4.0 for Linux 2.4Based upon Swansea University Computer Society NET3.039Initializing RT netlink socketStarting kswapdVFS: Diskquotas version dquot_6.4.0 initializeddevfs: VERSION Richard Gooch (rgooch@atnf.csiro.au)devfs: boot_options Qpty: 256 Unix98 ptys configuredSLIP: version 0.8.4-NET3.019-NEWTTY (dynamic channels, max=256).loop: loaded (max 8 devices)PPP generic driver version VERSIONUniversal TUN/TAP device driver VERSIONNET4: Linux TCP/IP 1.0 for NET4.0IP Protocols: ICMP, UDP, TCPIP: routing cache hash table of 512 buckets, 4KbytesTCP: Hash tables configured (established 2048 bind 2048)IPv4 over IPv4 tunneling driverGRE over IPv4 tunneling driverNET4: Unix domain sockets 1.0/SMP for Linux NET4.0.Mounted devfs on /devINIT: version 2.78 bootingActivating swap...Calculating module dependanciesdone.Loading modules: LISTChecking all file systems...Parallelizing fsck version 1.18 (11-Nov-1999)Setting kernel variables.Mounting local filesystems.../dev/shm on /tmp type tmpfs (rw)/dev/shm on /var/run type tmpfs (rw)devpts on /dev/pts type devpts (rw,mode=0622)none on /usr/share type hostfs (ro)Enabling packet forwarding: done.Configuring network interfaces: done.Cleaning: /tmp /var/lock /var/run.Initializing random number generator... done.Recovering nvi editor sessions... done.Give root password for maintenance(or type Control-D for normal startup): west:~# klogd -c 4 -x -f /tmp/klog.logwest:~# TZ=GMT export TZwest:~# ipsec spi --clearwest:~# ipsec eroute --clearwest:~# enckey=0x4043434545464649494a4a4c4c4f4f515152525454575758west:~# inspi=0x01000583west:~# outspi=$inspiwest:~# eastip=192.1.2.23west:~# westip=192.1.2.45west:~# source=192.0.2.0/24west:~# dst=192.0.1.0/24west:~# ipsec spi --af inet --edst $eastip  --spi $outspi --proto esp --src $westip --esp 3des --enckey $enckey west:~# ipsec spi --af inet --edst $eastip  --spi $outspi --proto tun --src $westip --dst $eastip --ip4west:~# ipsec spigrp inet $eastip $outspi tun inet $eastip $outspi esp west:~# ipsec eroute --add --eraf inet --src $source --dst $dst --said tun$inspi@$eastipwest:~# ipsec spi --af inet --edst $westip --spi $inspi  --proto esp --src $eastip --esp 3des --enckey $enckey west:~# ipsec spi --af inet --edst $westip --spi $inspi  --proto tun --src $eastip --dst $westip --ip4west:~# ipsec spigrp inet $westip $inspi tun inet $westip $inspi esp west:~# route add -net 192.0.1.0 netmask 255.255.255.0 gw 192.1.2.45 dev ipsec0SIOCADDRT: Network is unreachablewest:~# ipsec tncfg --attach --virtual ipsec0 --physical eth1west:~# ifconfig ipsec0 inet 192.1.2.45 netmask 0xffffff00 broadcast 192.1.2.255 upwest:~# arp -s 192.0.1.1  10:00:00:ab:cd:01west:~# arp -s 192.1.2.23 10:00:00:64:64:23west:~# arp -s 192.1.2.254 10:00:00:64:64:23west:~# ipsec lookwest NOW192.0.2.0/24       -> 192.0.1.0/24       => tun0x1000583@192.1.2.23 esp0x1000583@192.1.2.23  (0)ipsec0->eth1 mtu=16260(1500)->1500esp0x1000583@192.1.2.23 ESP_3DES: dir=out src=192.1.2.45 iv_bits=64bits iv=0xDEADF00DDEADF00D eklen=192 life(c,s,h)= refcount=4 ref=2esp0x1000583@192.1.2.45 ESP_3DES: dir=in  src=192.1.2.23 iv_bits=64bits iv=0xDEADF00DDEADF00D eklen=192 life(c,s,h)= refcount=4 ref=7tun0x1000583@192.1.2.23 IPIP: dir=out src=192.1.2.45 life(c,s,h)= refcount=4 ref=3tun0x1000583@192.1.2.45 IPIP: dir=in  src=192.1.2.23 life(c,s,h)= refcount=4 ref=8Destination     Gateway         Genmask         Flags   MSS Window  irtt Ifacewest:~# ipsec klipsdebug --all west:~# ipsec setup stopIPSEC EVENT: KLIPS device ipsec0 shut down.ipsec_setup: Stopping Openswan IPsec...ipsec_setup: stop ordered, but IPsec does not appear to be running!ipsec_setup: doing cleanup anyway...west:~# kill `cat /var/run/klogd.pid`; cat /tmp/klog.logklogd 1.3-3#33.1, log source = /proc/kmsg started.west:~# halt -p -fPower down.klips_debug:pfkey_x_debug_process: setklips_debug:pfkey_msg_interp: parsing message type 16(x-debug) with msg_parser 0pDEADF00D.klips_debug:pfkey_x_msg_debug_parse: .klips_debug:ipsec_sa_wipe: removing SA=unk0:0@<invalid>(0pDEADF00D), SAref=11, table=0(0pDEADF00D), entry=11 from the refTable.klips_debug:ipsec_sa_put: ipsec_sa SA:unk0:0@<invalid>, ref:-1 reference count decremented.klips_debug:pfkey_release: sock=0pDEADF00D sk=0pDEADF00Dklips_debug:pfkey_destroy_socket: .klips_debug:pfkey_remove_socket: .klips_debug:pfkey_remove_socket: succeeded.klips_debug:pfkey_destroy_socket: pfkey_remove_socket called.klips_debug:pfkey_destroy_socket: sk(0pDEADF00D)->(&0pDEADF00D)receive_queue.{next=0pDEADF00D,prev=0pDEADF00D}.klips_debug:pfkey_destroy_socket: destroyed.klips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_list_remove_socket: removing sock=0pDEADF00Dklips_debug:pfkey_release: succeeded.klips_debug:ipsec_rcv: <<< Info -- skb->dev=eth1 dev=eth1 klips_debug:ipsec_rcv: assigning packet ownership to virtual device ipsec0 from physical device eth1.klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:124 id:17050 frag_off:0 ttl:64 proto:50 chk:45935 saddr:192.1.2.23 daddr:192.1.2.45klips_debug:ipsec_rcv_decap_once: decap (50) from 192.1.2.23 -> 192.1.2.45klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=73 of SA:esp.1000583@192.1.2.45 requested.klips_debug:ipsec_rcv: SA:esp.1000583@192.1.2.45, src=192.1.2.23 of pkt agrees with expected SA source address policy.klips_debug:ipsec_rcv: SA:esp.1000583@192.1.2.45 First SA in group.klips_debug:ipsec_rcv: natt_type=0 tdbp->ips_natt_type=0 : okklips_debug:ipsec_rcv: padlen=2, contents: 0x<offset>: 0x<value> 0x<value> ...klips_debug:           00: 01 02klips_debug:ipsec_rcv: packet decrypted from 192.1.2.23: next_header = 4, padding = 2klips_debug:ipsec_rcv: trimming to 104.klips_debug:ipsec_rcv: after <ESP_3DES>, SA:esp.1000583@192.1.2.45:klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:104 id:17050 frag_off:0 ttl:64 proto:4 chk:46001 saddr:192.1.2.23 daddr:192.1.2.45klips_debug:ipsec_rcv: SA:esp.1000583@192.1.2.45, Another IPSEC header to process.klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x70000.klips_debug:ipsec_rcv: IPIP tunnel stripped.klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:63 proto:1 (ICMP) chk:47270 saddr:192.0.2.1 daddr:192.0.1.1 type:code=8:0klips_debug:ipsec_rcv: IPIP SA sets skb->nfmark=0xf0000.klips_debug:ipsec_rcv: netif_rx() called.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -