ridervka Posted Monday at 04:45 PM Share Posted Monday at 04:45 PM Всем привет. Может сможете помочь или направить куда-нибудь) Клиенты жалуются на обрыв VPN, как правило переподключение помогало, но иногда только перезагрузка компа. ОС Windows 10, 11. За один час было 29 out of memory МодельGiga SE (KN-2410) EAEU Сервисный код723-653-283-165-046 Версия ОС4.1.7 [I] Nov 11 15:43:46 ipsec: 12[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 15:43:46 ipsec: 12[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 15:43:46 ipsec: 12[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 15:43:46 ipsec: 12[IKE] CHILD_SA VirtualIPServerIKE2{4934} established with SPIs cb531478_i 843647be_o and TS 0.0.0.0/0 === 172.20.8.1/32 [E] Nov 11 15:43:46 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist5" @ "192.168.0.4" from "95.55.35.180". [C] Nov 11 15:43:46 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. [I] Nov 11 15:43:47 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 15:43:47 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 15:43:47 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). [I] Nov 11 15:43:50 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. [I] Nov 11 15:43:55 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). [I] Nov 11 15:43:57 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. [I] Nov 11 15:44:02 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). [I] Nov 11 15:44:08 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. [I] Nov 11 15:44:08 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. [I] Nov 11 15:44:08 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. [I] Nov 11 15:44:08 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. [I] Nov 11 15:44:14 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. [I] Nov 11 15:44:19 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). [I] Nov 11 15:44:19 ipsec: 08[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID [I] Nov 11 15:44:19 ipsec: 08[IKE] received MS-Negotiation Discovery Capable vendor ID [I] Nov 11 15:44:19 ipsec: 08[IKE] received Vid-Initial-Contact vendor ID [I] Nov 11 15:44:19 ipsec: 08[IKE] 81.211.81.53 is initiating an IKE_SA [I] Nov 11 15:44:19 ipsec: 08[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=256/ [...] [I] Nov 11 15:44:19 ipsec: 08[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256 [I] Nov 11 15:44:19 ipsec: 08[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024 [I] Nov 11 15:44:19 ipsec: 08[IKE] remote host is behind NAT [I] Nov 11 15:44:20 ipsec: 12[IKE] received 73 cert requests for an unknown ca [I] Nov 11 15:44:20 ipsec: 12[CFG] looking for peer configs matching 213.33.195.46[%any]...81.211.81.53[192.168.1.98] [I] Nov 11 15:44:20 ipsec: 12[CFG] selected peer config 'VirtualIPServerIKE2' [I] Nov 11 15:44:20 ipsec: 12[IKE] initiating EAP_IDENTITY method (id 0x00) [I] Nov 11 15:44:20 ipsec: 12[IKE] peer supports MOBIKE, but disabled in config [I] Nov 11 15:44:20 ipsec: 12[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with RSA signature successful [I] Nov 11 15:44:20 ipsec: 12[IKE] sending end entity cert "CN=sakdjfwelfwe.keenetic.link" [I] Nov 11 15:44:20 ipsec: 12[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R10" [I] Nov 11 15:44:20 ipsec: 03[IKE] received EAP identity 'buh' [I] Nov 11 15:44:20 ipsec: 03[IKE] initiating EAP_MSCHAPV2 method (id 0x69) [I] Nov 11 15:44:20 ipsec: 14[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established [I] Nov 11 15:44:20 ipsec: 10[IKE] authentication of '192.168.1.98' with EAP successful [I] Nov 11 15:44:20 ipsec: 10[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with EAP [I] Nov 11 15:44:20 ipsec: 10[IKE] IKE_SA VirtualIPServerIKE2[1520] established between 213.33.195.46[sakdjfwelfwe.keenetic.link]...81.211.81.53[192.168.1.98] [I] Nov 11 15:44:20 ipsec: 10[IKE] peer requested virtual IP %any [I] Nov 11 15:44:20 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Nov 11 15:44:20 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": allocated address "172.20.8.1" for user "buh" @ "192.168.1.98" from "81.211.81.53". [I] Nov 11 15:44:20 ndm: Core::Session: client disconnected. [I] Nov 11 15:44:20 ipsec: 10[IKE] assigning virtual IP 172.20.8.1 to peer 'buh' [I] Nov 11 15:44:20 ipsec: 10[IKE] peer requested virtual IP %any6 [I] Nov 11 15:44:20 ipsec: 10[IKE] no virtual IP found for %any6 requested by 'buh' [I] Nov 11 15:44:20 ipsec: 10[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 15:44:20 ipsec: 10[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 15:44:20 ipsec: 10[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 15:44:20 ipsec: 10[IKE] CHILD_SA VirtualIPServerIKE2{4935} established with SPIs c2bd530b_i 640bbb26_o and TS 0.0.0.0/0 === 172.20.8.1/32 [W] Nov 11 15:44:20 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.1" connected. [I] Nov 11 15:44:20 ipsec: 10[CFG] scheduling RADIUS Interim-Updates every 5s [I] Nov 11 15:44:20 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 15:44:20 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 15:44:21 ipsec: 12[IKE] retransmit 1 of request with message ID 14 [I] Nov 11 15:44:22 ndhcps: DHCPINFORM received for 172.20.8.1 from 00:00:00:00:00:00. [I] Nov 11 15:44:22 ndhcps: sending INFORM to 00:00:00:00:00:00. [I] Nov 11 15:44:22 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. [I] Nov 11 15:44:22 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. [I] Nov 11 15:44:23 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. [I] Nov 11 15:44:23 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. [I] Nov 11 15:44:29 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. [I] Nov 11 15:44:35 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). [I] Nov 11 15:44:38 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. [I] Nov 11 15:44:38 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. [I] Nov 11 15:44:38 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. [I] Nov 11 15:44:38 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. [I] Nov 11 15:44:40 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. [I] Nov 11 15:44:41 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. [I] Nov 11 15:44:44 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. [I] Nov 11 15:44:44 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. [I] Nov 11 15:44:49 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). [I] Nov 11 15:44:52 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. [I] Nov 11 15:44:52 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. [I] Nov 11 15:44:52 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. [I] Nov 11 15:44:53 ipsec: 07[IKE] received DELETE for ESP CHILD_SA with SPI d57d5006 [I] Nov 11 15:44:53 ipsec: 07[IKE] closing CHILD_SA VirtualIPServerIKE2{4931} with SPIs cbf57ebb_i (289136 bytes) d57d5006_o (1228259 bytes) and TS 0.0.0.0/0 === 172.20.8.5/32 [I] Nov 11 15:44:53 ipsec: 07[IKE] sending DELETE for ESP CHILD_SA with SPI cbf57ebb [I] Nov 11 15:44:53 ipsec: 07[IKE] CHILD_SA closed [I] Nov 11 15:44:53 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. [I] Nov 11 15:44:53 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 15:44:53 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 15:44:59 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. [I] Nov 11 15:45:03 ipsec: 05[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 15:45:03 ipsec: 05[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 15:45:03 ipsec: 05[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 15:45:03 ipsec: 05[IKE] CHILD_SA VirtualIPServerIKE2{4936} established with SPIs ca9477e2_i c50521e8_o and TS 0.0.0.0/0 === 172.20.8.5/32 [E] Nov 11 15:45:03 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "urist" @ "192.168.1.43" from "81.211.81.53". [C] Nov 11 15:45:03 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. [I] Nov 11 15:45:03 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 15:45:03 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 15:45:04 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). [I] Nov 11 15:45:07 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. [I] Nov 11 15:45:12 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). [I] Nov 11 15:45:13 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. [I] Nov 11 15:45:13 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. [I] Nov 11 15:45:18 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). [I] Nov 11 15:45:23 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. [I] Nov 11 15:45:23 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. [I] Nov 11 15:45:24 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. [I] Nov 11 15:45:24 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. [I] Nov 11 15:45:24 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. [I] Nov 11 15:45:30 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. [I] Nov 11 15:45:30 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. [I] Nov 11 15:45:30 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. [I] Nov 11 15:45:30 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. [I] Nov 11 15:45:34 ipsec: 06[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 15:45:34 ipsec: 06[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 15:45:34 ipsec: 06[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 15:45:34 ipsec: 06[IKE] inbound CHILD_SA VirtualIPServerIKE2{4937} established with SPIs c6c2447a_i 218b3d1e_o and TS 0.0.0.0/0 === 172.20.8.2/32 [E] Nov 11 15:45:34 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "urist2" @ "192.168.1.100" from "81.211.81.53". [C] Nov 11 15:45:34 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. [I] Nov 11 15:45:34 ipsec: 07[IKE] received DELETE for ESP CHILD_SA with SPI f8421fd6 [I] Nov 11 15:45:34 ipsec: 07[IKE] closing CHILD_SA VirtualIPServerIKE2{4910} with SPIs cff5fd09_i (64628 bytes) f8421fd6_o (23185 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 [I] Nov 11 15:45:34 ipsec: 07[IKE] sending DELETE for ESP CHILD_SA with SPI cff5fd09 [I] Nov 11 15:45:34 ipsec: 07[IKE] CHILD_SA closed [I] Nov 11 15:45:34 ipsec: 07[IKE] outbound CHILD_SA VirtualIPServerIKE2{4937} established with SPIs c6c2447a_i 218b3d1e_o and TS 0.0.0.0/0 === 172.20.8.2/32 [I] Nov 11 15:45:34 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 15:45:34 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 15:45:36 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. [I] Nov 11 15:45:36 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. [I] Nov 11 15:45:41 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). [I] Nov 11 15:45:44 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. [I] Nov 11 15:45:44 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. [I] Nov 11 15:45:44 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. [I] Nov 11 15:45:45 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. [I] Nov 11 15:45:52 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. [I] Nov 11 15:45:52 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. [I] Nov 11 15:45:52 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. [I] Nov 11 15:45:53 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. [I] Nov 11 15:46:02 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. [I] Nov 11 15:46:02 ndm: Core::Syslog: last message repeated 5 times. [I] Nov 11 15:46:03 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. [I] Nov 11 15:46:03 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. [I] Nov 11 15:46:04 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. [I] Nov 11 15:46:08 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. [I] Nov 11 15:46:08 ndm: Core::Syslog: last message repeated 2 times. [I] Nov 11 15:46:13 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). [I] Nov 11 15:46:17 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. [I] Nov 11 15:46:17 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. [I] Nov 11 15:46:17 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. [I] Nov 11 15:46:17 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. [I] Nov 11 15:46:24 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. [I] Nov 11 15:46:25 ndm: Core::Syslog: last message repeated 5 times. [I] Nov 11 15:46:26 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. [I] Nov 11 15:46:26 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. [I] Nov 11 15:46:26 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. [I] Nov 11 15:46:32 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. [I] Nov 11 15:46:37 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). [I] Nov 11 15:46:41 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. [I] Nov 11 15:46:46 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). [I] Nov 11 15:46:47 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. [I] Nov 11 15:46:52 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). [I] Nov 11 15:46:58 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. [I] Nov 11 15:46:58 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. [I] Nov 11 15:46:58 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. [I] Nov 11 15:46:58 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. [I] Nov 11 15:47:04 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. [I] Nov 11 15:47:04 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. [I] Nov 11 15:47:09 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). [I] Nov 11 15:47:12 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. [I] Nov 11 15:47:17 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). [I] Nov 11 15:47:18 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. [I] Nov 11 15:47:23 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). [I] Nov 11 15:47:30 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. [I] Nov 11 15:47:30 ndm: Core::Syslog: last message repeated 2 times. [I] Nov 11 15:47:31 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. [I] Nov 11 15:47:31 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. [I] Nov 11 15:47:31 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. [I] Nov 11 15:47:37 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. [I] Nov 11 15:47:37 ndm: Core::Syslog: last message repeated 2 times. [I] Nov 11 15:47:42 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). [I] Nov 11 15:47:45 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. [I] Nov 11 15:47:45 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. [I] Nov 11 15:47:45 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. [I] Nov 11 15:47:45 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. [I] Nov 11 15:47:51 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. [I] Nov 11 15:47:56 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). [I] Nov 11 15:47:59 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. [I] Nov 11 15:48:04 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). [I] Nov 11 15:48:05 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. [I] Nov 11 15:48:05 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. [I] Nov 11 15:48:10 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). [I] Nov 11 15:48:16 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. [I] Nov 11 15:48:16 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. [I] Nov 11 15:48:16 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. [I] Nov 11 15:48:17 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. [I] Nov 11 15:48:22 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. [I] Nov 11 15:48:22 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. [I] Nov 11 15:48:22 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. [I] Nov 11 15:48:23 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. [I] Nov 11 15:48:26 ipsec: 08[IKE] received DELETE for ESP CHILD_SA with SPI d6426d2e [I] Nov 11 15:48:26 ipsec: 08[IKE] closing CHILD_SA VirtualIPServerIKE2{4932} with SPIs cc2c7542_i (17587 bytes) d6426d2e_o (2137 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 [I] Nov 11 15:48:26 ipsec: 08[IKE] sending DELETE for ESP CHILD_SA with SPI cc2c7542 [I] Nov 11 15:48:26 ipsec: 08[IKE] CHILD_SA closed [I] Nov 11 15:48:26 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 15:48:26 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 15:48:28 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. [I] Nov 11 15:48:28 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. [I] Nov 11 15:48:28 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. [I] Nov 11 15:48:29 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. [I] Nov 11 15:48:29 ipsec: 07[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 15:48:29 ipsec: 07[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 15:48:29 ipsec: 07[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 15:48:29 ipsec: 07[IKE] CHILD_SA VirtualIPServerIKE2{4938} established with SPIs c1740e0a_i 04231192_o and TS 0.0.0.0/0 === 172.20.8.1/32 [E] Nov 11 15:48:29 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist" @ "192.168.1.149" from "188.64.164.33". [C] Nov 11 15:48:29 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. [I] Nov 11 15:48:29 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 15:48:29 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 15:48:34 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. [I] Nov 11 15:48:34 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. [I] Nov 11 15:48:34 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. [I] Nov 11 15:48:35 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. [I] Nov 11 15:48:35 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. [I] Nov 11 15:48:40 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. [I] Nov 11 15:48:45 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). [I] Nov 11 15:48:49 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. [I] Nov 11 15:48:49 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. [I] Nov 11 15:48:49 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. [I] Nov 11 15:48:49 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. [I] Nov 11 15:48:54 ipsec: 14[IKE] received DELETE for ESP CHILD_SA with SPI 843647be [I] Nov 11 15:48:54 ipsec: 14[IKE] closing CHILD_SA VirtualIPServerIKE2{4934} with SPIs cb531478_i (10213 bytes) 843647be_o (170 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 [I] Nov 11 15:48:54 ipsec: 14[IKE] sending DELETE for ESP CHILD_SA with SPI cb531478 [I] Nov 11 15:48:54 ipsec: 14[IKE] CHILD_SA closed [I] Nov 11 15:48:54 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 15:48:54 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 15:48:55 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. [I] Nov 11 15:48:55 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. [I] Nov 11 15:48:55 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. [I] Nov 11 15:48:55 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. [I] Nov 11 15:49:01 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. [I] Nov 11 15:49:06 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). [I] Nov 11 15:49:08 ipsec: 07[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 15:49:08 ipsec: 07[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 15:49:08 ipsec: 07[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 15:49:08 ipsec: 07[IKE] CHILD_SA VirtualIPServerIKE2{4939} established with SPIs cda7bdf0_i 21105fb4_o and TS 0.0.0.0/0 === 172.20.8.1/32 [E] Nov 11 15:49:08 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist5" @ "192.168.0.4" from "95.55.35.180". [C] Nov 11 15:49:08 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. [I] Nov 11 15:49:08 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 15:49:08 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 15:49:10 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. [I] Nov 11 15:49:15 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). [I] Nov 11 15:49:15 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. [I] Nov 11 15:49:20 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). [I] Nov 11 15:49:26 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. [I] Nov 11 15:49:26 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. [I] Nov 11 15:49:27 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. [I] Nov 11 15:49:27 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. [I] Nov 11 15:49:32 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. [I] Nov 11 15:49:33 ndm: Core::Syslog: last message repeated 4 times. [I] Nov 11 15:49:34 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. [I] Nov 11 15:49:34 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. [I] Nov 11 15:49:34 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. [I] Nov 11 15:49:40 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. [I] Nov 11 15:49:40 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. [I] Nov 11 15:49:40 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. [I] Nov 11 15:49:40 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. [I] Nov 11 15:49:46 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. [I] Nov 11 15:49:46 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. [I] Nov 11 15:49:46 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. [I] Nov 11 15:49:46 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. [I] Nov 11 15:49:52 ipsec: 14[IKE] received DELETE for ESP CHILD_SA with SPI 7e7fb176 [I] Nov 11 15:49:52 ipsec: 14[IKE] closing CHILD_SA VirtualIPServerIKE2{4933} with SPIs cfdac811_i (147104 bytes) 7e7fb176_o (511055 bytes) and TS 0.0.0.0/0 === 172.20.8.5/32 [I] Nov 11 15:49:52 ipsec: 14[IKE] sending DELETE for ESP CHILD_SA with SPI cfdac811 [I] Nov 11 15:49:52 ipsec: 14[IKE] CHILD_SA closed [I] Nov 11 15:49:53 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 15:49:53 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 15:49:53 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. [I] Nov 11 15:49:53 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. [I] Nov 11 15:49:53 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. [I] Nov 11 15:49:53 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. [I] Nov 11 15:49:53 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. [I] Nov 11 15:49:56 ipsec: 06[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 15:49:56 ipsec: 06[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 15:49:56 ipsec: 06[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 15:49:56 ipsec: 06[IKE] CHILD_SA VirtualIPServerIKE2{4940} established with SPIs cffd2a8c_i ed21425c_o and TS 0.0.0.0/0 === 172.20.8.5/32 [E] Nov 11 15:49:56 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "urist3" @ "192.168.1.75" from "81.211.81.53". [C] Nov 11 15:49:56 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. [I] Nov 11 15:49:56 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 15:49:56 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 15:49:59 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. [I] Nov 11 15:50:04 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). [I] Nov 11 15:50:11 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. [I] Nov 11 15:50:11 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. [I] Nov 11 15:50:11 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. [I] Nov 11 15:50:11 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. [I] Nov 11 15:52:25 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(52:eb:a4:8d:5e:55) had been aged-out and disassociated (idle silence). [I] Nov 11 15:53:28 ipsec: 10[IKE] received DELETE for ESP CHILD_SA with SPI 640bbb26 [I] Nov 11 15:53:28 ipsec: 10[IKE] closing CHILD_SA VirtualIPServerIKE2{4935} with SPIs c2bd530b_i (80059 bytes) 640bbb26_o (78360 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 [I] Nov 11 15:53:28 ipsec: 10[IKE] sending DELETE for ESP CHILD_SA with SPI c2bd530b [I] Nov 11 15:53:28 ipsec: 10[IKE] CHILD_SA closed [I] Nov 11 15:53:28 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh". [W] Nov 11 15:53:28 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected. [I] Nov 11 15:53:28 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 15:53:28 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 15:53:30 ipsec: 06[IKE] received DELETE for ESP CHILD_SA with SPI 04231192 [I] Nov 11 15:53:30 ipsec: 06[IKE] closing CHILD_SA VirtualIPServerIKE2{4938} with SPIs c1740e0a_i (22866 bytes) 04231192_o (125 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 [I] Nov 11 15:53:30 ipsec: 06[IKE] sending DELETE for ESP CHILD_SA with SPI c1740e0a [I] Nov 11 15:53:30 ipsec: 06[IKE] CHILD_SA closed [I] Nov 11 15:53:30 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 15:53:30 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 15:53:31 ipsec: 07[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 15:53:31 ipsec: 07[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 15:53:31 ipsec: 07[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 15:53:31 ipsec: 07[IKE] CHILD_SA VirtualIPServerIKE2{4941} established with SPIs c4096ac8_i cc6741d6_o and TS 0.0.0.0/0 === 172.20.8.1/32 [E] Nov 11 15:53:31 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist" @ "192.168.1.149" from "188.64.164.33". [C] Nov 11 15:53:31 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. [I] Nov 11 15:53:31 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 15:53:31 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 15:53:33 ipsec: 11[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 15:53:33 ipsec: 11[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 15:53:33 ipsec: 11[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 15:53:33 ipsec: 11[IKE] CHILD_SA VirtualIPServerIKE2{4942} established with SPIs c02510b9_i ac92dcca_o and TS 0.0.0.0/0 === 172.20.8.1/32 [I] Nov 11 15:53:33 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh". [I] Nov 11 15:53:33 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3223654585". [I] Nov 11 15:53:33 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "2895305930". [W] Nov 11 15:53:33 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.1" connected. [I] Nov 11 15:53:33 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 15:53:33 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 15:54:54 ipsec: 13[IKE] received DELETE for ESP CHILD_SA with SPI c50521e8 [I] Nov 11 15:54:54 ipsec: 13[IKE] closing CHILD_SA VirtualIPServerIKE2{4936} with SPIs ca9477e2_i (394580 bytes) c50521e8_o (1449747 bytes) and TS 0.0.0.0/0 === 172.20.8.5/32 [I] Nov 11 15:54:54 ipsec: 13[IKE] sending DELETE for ESP CHILD_SA with SPI ca9477e2 [I] Nov 11 15:54:54 ipsec: 13[IKE] CHILD_SA closed [I] Nov 11 15:54:55 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 15:54:55 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 15:55:03 ipsec: 11[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 15:55:03 ipsec: 11[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 15:55:03 ipsec: 11[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 15:55:03 ipsec: 11[IKE] CHILD_SA VirtualIPServerIKE2{4943} established with SPIs ceb06920_i 256efb8c_o and TS 0.0.0.0/0 === 172.20.8.5/32 [E] Nov 11 15:55:03 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "urist" @ "192.168.1.43" from "81.211.81.53". [C] Nov 11 15:55:03 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. [I] Nov 11 15:55:03 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 15:55:03 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 15:55:50 ipsec: 11[IKE] received retransmit of request with ID 19, retransmitting response [I] Nov 11 15:58:06 ipsec: 06[IKE] received DELETE for ESP CHILD_SA with SPI 21105fb4 [I] Nov 11 15:58:06 ipsec: 06[IKE] closing CHILD_SA VirtualIPServerIKE2{4939} with SPIs cda7bdf0_i (22956 bytes) 21105fb4_o (4164 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 [I] Nov 11 15:58:06 ipsec: 06[IKE] sending DELETE for ESP CHILD_SA with SPI cda7bdf0 [I] Nov 11 15:58:06 ipsec: 06[IKE] CHILD_SA closed [I] Nov 11 15:58:06 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 15:58:07 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 15:58:14 ipsec: 13[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 15:58:14 ipsec: 13[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 15:58:14 ipsec: 13[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 15:58:14 ipsec: 13[IKE] CHILD_SA VirtualIPServerIKE2{4944} established with SPIs cd7db2f2_i 76a60e46_o and TS 0.0.0.0/0 === 172.20.8.1/32 [E] Nov 11 15:58:14 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist5" @ "192.168.0.4" from "95.55.35.180". [C] Nov 11 15:58:14 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. [I] Nov 11 15:58:15 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 15:58:15 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 15:58:33 ipsec: 09[IKE] received DELETE for ESP CHILD_SA with SPI cc6741d6 [I] Nov 11 15:58:33 ipsec: 09[IKE] closing CHILD_SA VirtualIPServerIKE2{4941} with SPIs c4096ac8_i (17522 bytes) cc6741d6_o (305 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 [I] Nov 11 15:58:33 ipsec: 09[IKE] sending DELETE for ESP CHILD_SA with SPI c4096ac8 [I] Nov 11 15:58:33 ipsec: 09[IKE] CHILD_SA closed [I] Nov 11 15:58:33 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 15:58:33 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 15:58:34 ipsec: 15[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 15:58:34 ipsec: 15[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 15:58:34 ipsec: 15[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 15:58:34 ipsec: 15[IKE] CHILD_SA VirtualIPServerIKE2{4945} established with SPIs ce5635ef_i 64b33500_o and TS 0.0.0.0/0 === 172.20.8.1/32 [E] Nov 11 15:58:34 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist" @ "192.168.1.149" from "188.64.164.33". [C] Nov 11 15:58:34 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. [I] Nov 11 15:58:34 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 15:58:34 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 15:59:57 ipsec: 06[IKE] received DELETE for ESP CHILD_SA with SPI ed21425c [I] Nov 11 15:59:57 ipsec: 06[IKE] closing CHILD_SA VirtualIPServerIKE2{4940} with SPIs cffd2a8c_i (41828 bytes) ed21425c_o (20953 bytes) and TS 0.0.0.0/0 === 172.20.8.5/32 [I] Nov 11 15:59:57 ipsec: 06[IKE] sending DELETE for ESP CHILD_SA with SPI cffd2a8c [I] Nov 11 15:59:57 ipsec: 06[IKE] CHILD_SA closed [I] Nov 11 15:59:57 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 15:59:57 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:00:00 ipsec: 06[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:00:00 ipsec: 06[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 16:00:00 ipsec: 06[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:00:00 ipsec: 06[IKE] CHILD_SA VirtualIPServerIKE2{4946} established with SPIs c25e54e2_i 44a0130a_o and TS 0.0.0.0/0 === 172.20.8.5/32 [E] Nov 11 16:00:01 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "urist3" @ "192.168.1.75" from "81.211.81.53". [C] Nov 11 16:00:01 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. [I] Nov 11 16:00:01 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:00:01 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:01:30 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.215 from 3c:a6:f6:70:85:3f. [I] Nov 11 16:01:30 ndhcps: sending ACK of 172.16.1.215 to 3c:a6:f6:70:85:3f. [I] Nov 11 16:01:45 ipsec: 10[IKE] received DELETE for ESP CHILD_SA with SPI 256efb8c [I] Nov 11 16:01:45 ipsec: 10[IKE] closing CHILD_SA VirtualIPServerIKE2{4943} with SPIs ceb06920_i (538173 bytes) 256efb8c_o (1818325 bytes) and TS 0.0.0.0/0 === 172.20.8.5/32 [I] Nov 11 16:01:45 ipsec: 10[IKE] sending DELETE for ESP CHILD_SA with SPI ceb06920 [I] Nov 11 16:01:45 ipsec: 10[IKE] CHILD_SA closed [I] Nov 11 16:01:45 ipsec: 13[IKE] received DELETE for IKE_SA VirtualIPServerIKE2[1518] [I] Nov 11 16:01:45 ipsec: 13[IKE] deleting IKE_SA VirtualIPServerIKE2[1518] between 213.33.195.46[sakdjfwelfwe.keenetic.link]...81.211.81.53[192.168.1.43] [I] Nov 11 16:01:45 ipsec: 13[IKE] IKE_SA deleted [I] Nov 11 16:01:45 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:01:45 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:01:48 ipsec: 09[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID [I] Nov 11 16:01:48 ipsec: 09[IKE] received MS-Negotiation Discovery Capable vendor ID [I] Nov 11 16:01:48 ipsec: 09[IKE] received Vid-Initial-Contact vendor ID [I] Nov 11 16:01:48 ipsec: 09[IKE] 81.211.81.53 is initiating an IKE_SA [I] Nov 11 16:01:48 ipsec: 09[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=256/ [...] [I] Nov 11 16:01:48 ipsec: 09[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256 [I] Nov 11 16:01:48 ipsec: 09[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024 [I] Nov 11 16:01:48 ipsec: 09[IKE] remote host is behind NAT [I] Nov 11 16:01:48 ipsec: 11[IKE] received 80 cert requests for an unknown ca [I] Nov 11 16:01:48 ipsec: 11[CFG] looking for peer configs matching 213.33.195.46[%any]...81.211.81.53[192.168.1.43] [I] Nov 11 16:01:48 ipsec: 11[CFG] selected peer config 'VirtualIPServerIKE2' [I] Nov 11 16:01:48 ipsec: 11[IKE] initiating EAP_IDENTITY method (id 0x00) [I] Nov 11 16:01:48 ipsec: 11[IKE] peer supports MOBIKE, but disabled in config [I] Nov 11 16:01:48 ipsec: 11[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with RSA signature successful [I] Nov 11 16:01:48 ipsec: 11[IKE] sending end entity cert "CN=sakdjfwelfwe.keenetic.link" [I] Nov 11 16:01:48 ipsec: 11[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R10" [I] Nov 11 16:01:48 ipsec: 10[IKE] received EAP identity 'urist' [I] Nov 11 16:01:48 ipsec: 10[IKE] initiating EAP_MSCHAPV2 method (id 0xBA) [I] Nov 11 16:01:48 ipsec: 11[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established [I] Nov 11 16:01:48 ipsec: 15[IKE] authentication of '192.168.1.43' with EAP successful [I] Nov 11 16:01:48 ipsec: 15[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with EAP [I] Nov 11 16:01:48 ipsec: 15[IKE] IKE_SA VirtualIPServerIKE2[1521] established between 213.33.195.46[sakdjfwelfwe.keenetic.link]...81.211.81.53[192.168.1.43] [I] Nov 11 16:01:48 ipsec: 15[IKE] peer requested virtual IP %any [I] Nov 11 16:01:48 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Nov 11 16:01:48 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": allocated address "172.20.8.2" for user "urist" @ "192.168.1.43" from "81.211.81.53". [I] Nov 11 16:01:48 ipsec: 15[IKE] assigning virtual IP 172.20.8.2 to peer 'urist' [I] Nov 11 16:01:48 ipsec: 15[IKE] peer requested virtual IP %any6 [I] Nov 11 16:01:48 ipsec: 15[IKE] no virtual IP found for %any6 requested by 'urist' [I] Nov 11 16:01:48 ndm: Core::Session: client disconnected. [I] Nov 11 16:01:48 ipsec: 15[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:01:48 ipsec: 15[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 16:01:48 ipsec: 15[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:01:48 ipsec: 15[IKE] CHILD_SA VirtualIPServerIKE2{4947} established with SPIs ccf9c8c6_i 61c3e888_o and TS 0.0.0.0/0 === 172.20.8.2/32 [W] Nov 11 16:01:48 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist" @ "192.168.1.43" with IP "172.20.8.2" connected. [I] Nov 11 16:01:49 ipsec: 15[CFG] scheduling RADIUS Interim-Updates every 5s [I] Nov 11 16:01:49 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:01:49 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:01:50 ndhcps: DHCPINFORM received for 172.20.8.2 from 00:00:00:00:00:00. [I] Nov 11 16:01:50 ndhcps: sending INFORM to 00:00:00:00:00:00. [I] Nov 11 16:03:07 ipsec: 03[IKE] received DELETE for ESP CHILD_SA with SPI ac92dcca [I] Nov 11 16:03:07 ipsec: 03[IKE] closing CHILD_SA VirtualIPServerIKE2{4942} with SPIs c02510b9_i (19660 bytes) ac92dcca_o (12229 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 [I] Nov 11 16:03:07 ipsec: 03[IKE] sending DELETE for ESP CHILD_SA with SPI c02510b9 [I] Nov 11 16:03:07 ipsec: 03[IKE] CHILD_SA closed [I] Nov 11 16:03:07 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh". [I] Nov 11 16:03:07 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3223654585". [I] Nov 11 16:03:07 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "2895305930". [W] Nov 11 16:03:07 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected. [I] Nov 11 16:03:07 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:03:07 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:03:19 ipsec: 10[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:03:19 ipsec: 10[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 16:03:19 ipsec: 10[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:03:19 ipsec: 10[IKE] CHILD_SA VirtualIPServerIKE2{4948} established with SPIs c0832d3f_i 3279f1d4_o and TS 0.0.0.0/0 === 172.20.8.1/32 [I] Nov 11 16:03:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh". [I] Nov 11 16:03:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3229822271". [I] Nov 11 16:03:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "846852564". [W] Nov 11 16:03:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.1" connected. [I] Nov 11 16:03:19 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:03:19 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:03:33 ipsec: 11[IKE] received DELETE for ESP CHILD_SA with SPI 76a60e46 [I] Nov 11 16:03:33 ipsec: 11[IKE] closing CHILD_SA VirtualIPServerIKE2{4944} with SPIs cd7db2f2_i (19430 bytes) 76a60e46_o (890 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 [I] Nov 11 16:03:33 ipsec: 11[IKE] sending DELETE for ESP CHILD_SA with SPI cd7db2f2 [I] Nov 11 16:03:33 ipsec: 11[IKE] CHILD_SA closed [I] Nov 11 16:03:33 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:03:33 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:03:35 ipsec: 03[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:03:35 ipsec: 03[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 16:03:35 ipsec: 03[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:03:35 ipsec: 03[IKE] CHILD_SA VirtualIPServerIKE2{4949} established with SPIs cc955732_i 3f7a2bb6_o and TS 0.0.0.0/0 === 172.20.8.1/32 [E] Nov 11 16:03:35 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist5" @ "192.168.0.4" from "95.55.35.180". [C] Nov 11 16:03:35 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. [I] Nov 11 16:03:35 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:03:35 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:04:01 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.229 from 30:07:4d:70:2d:ed. [I] Nov 11 16:04:01 ndhcps: sending ACK of 172.16.1.229 to 30:07:4d:70:2d:ed. [I] Nov 11 16:04:23 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.160 from 00:17:c8:ba:be:b4. [I] Nov 11 16:04:23 ndhcps: sending ACK of 172.16.1.160 to 00:17:c8:ba:be:b4. [I] Nov 11 16:05:47 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(6a:b4:23:20:41:85) had been aged-out and disassociated (idle silence). [I] Nov 11 16:06:09 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.227 from 62:b2:12:d5:da:d2. [I] Nov 11 16:06:10 ndhcps: sending ACK of 172.16.1.227 to 62:b2:12:d5:da:d2. [I] Nov 11 16:06:33 ipsec: 06[IKE] received DELETE for ESP CHILD_SA with SPI 218b3d1e [I] Nov 11 16:06:33 ipsec: 06[IKE] closing CHILD_SA VirtualIPServerIKE2{4937} with SPIs c6c2447a_i (29114 bytes) 218b3d1e_o (5943 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 [I] Nov 11 16:06:33 ipsec: 06[IKE] sending DELETE for ESP CHILD_SA with SPI c6c2447a [I] Nov 11 16:06:33 ipsec: 06[IKE] CHILD_SA closed [I] Nov 11 16:06:33 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:06:33 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:06:43 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.239 from 98:ee:cb:c3:a2:53. [I] Nov 11 16:06:43 ndhcps: sending ACK of 172.16.1.239 to 98:ee:cb:c3:a2:53. [I] Nov 11 16:06:57 ipsec: 11[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:06:57 ipsec: 11[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 16:06:57 ipsec: 11[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:06:57 ipsec: 11[IKE] CHILD_SA VirtualIPServerIKE2{4950} established with SPIs cf29f19b_i e3523ed4_o and TS 0.0.0.0/0 === 172.20.8.2/32 [E] Nov 11 16:06:57 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "urist2" @ "192.168.1.100" from "81.211.81.53". [C] Nov 11 16:06:57 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. [I] Nov 11 16:06:57 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:06:57 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:07:18 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.183 from 00:0b:82:97:12:32. [I] Nov 11 16:07:18 ndhcps: sending ACK of 172.16.1.183 to 00:0b:82:97:12:32. [I] Nov 11 16:08:07 ipsec: 15[IKE] received DELETE for ESP CHILD_SA with SPI 3279f1d4 [I] Nov 11 16:08:07 ipsec: 15[IKE] closing CHILD_SA VirtualIPServerIKE2{4948} with SPIs c0832d3f_i (25401 bytes) 3279f1d4_o (9754 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 [I] Nov 11 16:08:07 ipsec: 15[IKE] sending DELETE for ESP CHILD_SA with SPI c0832d3f [I] Nov 11 16:08:07 ipsec: 15[IKE] CHILD_SA closed [I] Nov 11 16:08:07 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh". [I] Nov 11 16:08:07 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3229822271". [I] Nov 11 16:08:07 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "846852564". [W] Nov 11 16:08:07 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected. [I] Nov 11 16:08:07 ipsec: 10[IKE] received DELETE for IKE_SA VirtualIPServerIKE2[1520] [I] Nov 11 16:08:07 ipsec: 10[IKE] deleting IKE_SA VirtualIPServerIKE2[1520] between 213.33.195.46[sakdjfwelfwe.keenetic.link]...81.211.81.53[192.168.1.98] [I] Nov 11 16:08:07 ipsec: 10[IKE] IKE_SA deleted [I] Nov 11 16:08:07 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:08:07 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:08:10 ipsec: 06[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID [I] Nov 11 16:08:10 ipsec: 06[IKE] received MS-Negotiation Discovery Capable vendor ID [I] Nov 11 16:08:10 ipsec: 06[IKE] received Vid-Initial-Contact vendor ID [I] Nov 11 16:08:10 ipsec: 06[IKE] 81.211.81.53 is initiating an IKE_SA [I] Nov 11 16:08:10 ipsec: 06[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=256/ [...] [I] Nov 11 16:08:10 ipsec: 06[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256 [I] Nov 11 16:08:10 ipsec: 06[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024 [I] Nov 11 16:08:10 ipsec: 06[IKE] remote host is behind NAT [I] Nov 11 16:08:10 ipsec: 08[IKE] received 73 cert requests for an unknown ca [I] Nov 11 16:08:10 ipsec: 08[CFG] looking for peer configs matching 213.33.195.46[%any]...81.211.81.53[192.168.1.98] [I] Nov 11 16:08:10 ipsec: 08[CFG] selected peer config 'VirtualIPServerIKE2' [I] Nov 11 16:08:10 ipsec: 08[IKE] initiating EAP_IDENTITY method (id 0x00) [I] Nov 11 16:08:10 ipsec: 08[IKE] peer supports MOBIKE, but disabled in config [I] Nov 11 16:08:10 ipsec: 08[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with RSA signature successful [I] Nov 11 16:08:10 ipsec: 08[IKE] sending end entity cert "CN=sakdjfwelfwe.keenetic.link" [I] Nov 11 16:08:10 ipsec: 08[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R10" [I] Nov 11 16:08:10 ipsec: 05[IKE] received EAP identity 'buh' [I] Nov 11 16:08:10 ipsec: 05[IKE] initiating EAP_MSCHAPV2 method (id 0xB9) [I] Nov 11 16:08:10 ipsec: 12[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established [I] Nov 11 16:08:10 ipsec: 15[IKE] authentication of '192.168.1.98' with EAP successful [I] Nov 11 16:08:10 ipsec: 15[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with EAP [I] Nov 11 16:08:10 ipsec: 15[IKE] IKE_SA VirtualIPServerIKE2[1522] established between 213.33.195.46[sakdjfwelfwe.keenetic.link]...81.211.81.53[192.168.1.98] [I] Nov 11 16:08:10 ipsec: 15[IKE] peer requested virtual IP %any [I] Nov 11 16:08:10 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Nov 11 16:08:10 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": allocated address "172.20.8.1" for user "buh" @ "192.168.1.98" from "81.211.81.53". [I] Nov 11 16:08:10 ndm: Core::Session: client disconnected. [I] Nov 11 16:08:10 ipsec: 15[IKE] assigning virtual IP 172.20.8.1 to peer 'buh' [I] Nov 11 16:08:10 ipsec: 15[IKE] peer requested virtual IP %any6 [I] Nov 11 16:08:10 ipsec: 15[IKE] no virtual IP found for %any6 requested by 'buh' [I] Nov 11 16:08:10 ipsec: 15[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:08:10 ipsec: 15[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 16:08:10 ipsec: 15[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:08:10 ipsec: 15[IKE] CHILD_SA VirtualIPServerIKE2{4951} established with SPIs ca70fd17_i a65a68c0_o and TS 0.0.0.0/0 === 172.20.8.1/32 [W] Nov 11 16:08:10 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.1" connected. [I] Nov 11 16:08:10 ipsec: 15[CFG] scheduling RADIUS Interim-Updates every 5s [I] Nov 11 16:08:10 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:08:10 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:08:12 ndhcps: DHCPINFORM received for 172.20.8.1 from 00:00:00:00:00:00. [I] Nov 11 16:08:12 ndhcps: sending INFORM to 00:00:00:00:00:00. [I] Nov 11 16:08:13 ipsec: 10[IKE] received DELETE for ESP CHILD_SA with SPI 64b33500 [I] Nov 11 16:08:13 ipsec: 10[IKE] closing CHILD_SA VirtualIPServerIKE2{4945} with SPIs ce5635ef_i (26505 bytes) 64b33500_o (6233 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 [I] Nov 11 16:08:13 ipsec: 10[IKE] sending DELETE for ESP CHILD_SA with SPI ce5635ef [I] Nov 11 16:08:13 ipsec: 10[IKE] CHILD_SA closed [I] Nov 11 16:08:13 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:08:13 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:08:21 ipsec: 13[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID [I] Nov 11 16:08:21 ipsec: 13[IKE] received MS-Negotiation Discovery Capable vendor ID [I] Nov 11 16:08:21 ipsec: 13[IKE] received Vid-Initial-Contact vendor ID [I] Nov 11 16:08:21 ipsec: 13[IKE] 37.122.20.103 is initiating an IKE_SA [I] Nov 11 16:08:21 ipsec: 13[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=256/ [...] [I] Nov 11 16:08:21 ipsec: 13[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256 [I] Nov 11 16:08:21 ipsec: 13[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024 [I] Nov 11 16:08:21 ipsec: 13[IKE] remote host is behind NAT [I] Nov 11 16:08:22 ipsec: 15[IKE] received 279 cert requests for an unknown ca [I] Nov 11 16:08:22 ipsec: 15[CFG] looking for peer configs matching 213.33.195.46[%any]...37.122.20.103[192.168.0.32] [I] Nov 11 16:08:22 ipsec: 15[CFG] selected peer config 'VirtualIPServerIKE2' [I] Nov 11 16:08:22 ipsec: 15[IKE] initiating EAP_IDENTITY method (id 0x00) [I] Nov 11 16:08:22 ipsec: 15[IKE] peer supports MOBIKE, but disabled in config [I] Nov 11 16:08:22 ipsec: 15[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with RSA signature successful [I] Nov 11 16:08:22 ipsec: 15[IKE] sending end entity cert "CN=sakdjfwelfwe.keenetic.link" [I] Nov 11 16:08:22 ipsec: 15[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R10" [I] Nov 11 16:08:50 ipsec: 03[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:08:50 ipsec: 03[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 16:08:50 ipsec: 03[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:08:50 ipsec: 03[IKE] CHILD_SA VirtualIPServerIKE2{4952} established with SPIs c3bf492b_i d62cf4f8_o and TS 0.0.0.0/0 === 172.20.8.1/32 [E] Nov 11 16:08:50 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist" @ "192.168.1.149" from "188.64.164.33". [C] Nov 11 16:08:50 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. [I] Nov 11 16:08:50 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:08:50 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:08:51 ipsec: 15[JOB] deleting half open IKE_SA with 37.122.20.103 after timeout [I] Nov 11 16:11:55 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.216 from 98:ee:cb:c3:a4:51. [I] Nov 11 16:11:55 ndhcps: sending ACK of 172.16.1.216 to 98:ee:cb:c3:a4:51. [I] Nov 11 16:11:58 ipsec: 11[IKE] received DELETE for ESP CHILD_SA with SPI 61c3e888 [I] Nov 11 16:11:58 ipsec: 11[IKE] closing CHILD_SA VirtualIPServerIKE2{4947} with SPIs ccf9c8c6_i (18132 bytes) 61c3e888_o (14350 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 [I] Nov 11 16:11:58 ipsec: 11[IKE] sending DELETE for ESP CHILD_SA with SPI ccf9c8c6 [I] Nov 11 16:11:58 ipsec: 11[IKE] CHILD_SA closed [I] Nov 11 16:11:58 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "urist". [W] Nov 11 16:11:58 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "urist" @ "192.168.1.43" from "81.211.81.53" disconnected. [I] Nov 11 16:11:58 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:11:58 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:12:05 ipsec: 15[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:12:05 ipsec: 15[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 16:12:05 ipsec: 15[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:12:05 ipsec: 15[IKE] CHILD_SA VirtualIPServerIKE2{4953} established with SPIs cf7ac52f_i 95038c86_o and TS 0.0.0.0/0 === 172.20.8.2/32 [I] Nov 11 16:12:05 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "urist". [I] Nov 11 16:12:05 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3480929583". [I] Nov 11 16:12:05 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "2500037766". [W] Nov 11 16:12:05 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist" @ "192.168.1.43" with IP "172.20.8.2" connected. [I] Nov 11 16:12:05 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:12:05 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:12:33 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.214 from 0a:f3:57:79:4b:d0. [I] Nov 11 16:12:34 ndhcps: sending ACK of 172.16.1.214 to 0a:f3:57:79:4b:d0. [I] Nov 11 16:13:06 ipsec: 15[IKE] received DELETE for ESP CHILD_SA with SPI 3f7a2bb6 [I] Nov 11 16:13:06 ipsec: 15[IKE] closing CHILD_SA VirtualIPServerIKE2{4949} with SPIs cc955732_i (29353 bytes) 3f7a2bb6_o (9144 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 [I] Nov 11 16:13:06 ipsec: 15[IKE] sending DELETE for ESP CHILD_SA with SPI cc955732 [I] Nov 11 16:13:06 ipsec: 15[IKE] CHILD_SA closed [I] Nov 11 16:13:06 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:13:06 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:13:23 ipsec: 13[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:13:23 ipsec: 13[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 16:13:23 ipsec: 13[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:13:23 ipsec: 13[IKE] CHILD_SA VirtualIPServerIKE2{4954} established with SPIs cf723d42_i 2e05af2e_o and TS 0.0.0.0/0 === 172.20.8.1/32 [E] Nov 11 16:13:23 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist5" @ "192.168.0.4" from "95.55.35.180". [C] Nov 11 16:13:23 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. [I] Nov 11 16:13:24 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:13:24 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:13:46 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(52:eb:a4:8d:5e:55) had associated (has FT caps). [I] Nov 11 16:13:46 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(52:eb:a4:8d:5e:55) set key done in WPA2/WPA2PSK. [I] Nov 11 16:13:46 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.251 from 52:eb:a4:8d:5e:55. [I] Nov 11 16:13:46 ndhcps: sending ACK of 172.16.1.251 to 52:eb:a4:8d:5e:55. [I] Nov 11 16:13:47 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.251 from 52:eb:a4:8d:5e:55. [I] Nov 11 16:13:48 ndhcps: sending ACK of 172.16.1.251 to 52:eb:a4:8d:5e:55. [I] Nov 11 16:13:50 ipsec: 06[IKE] received DELETE for ESP CHILD_SA with SPI a65a68c0 [I] Nov 11 16:13:50 ipsec: 06[IKE] closing CHILD_SA VirtualIPServerIKE2{4951} with SPIs ca70fd17_i (63189 bytes) a65a68c0_o (166515 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 [I] Nov 11 16:13:50 ipsec: 06[IKE] sending DELETE for ESP CHILD_SA with SPI ca70fd17 [I] Nov 11 16:13:50 ipsec: 06[IKE] CHILD_SA closed [I] Nov 11 16:13:50 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh". [W] Nov 11 16:13:50 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected. [I] Nov 11 16:13:50 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:13:50 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:13:52 ipsec: 07[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:13:52 ipsec: 07[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 16:13:52 ipsec: 07[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:13:52 ipsec: 07[IKE] CHILD_SA VirtualIPServerIKE2{4955} established with SPIs c0ff9576_i e8296596_o and TS 0.0.0.0/0 === 172.20.8.1/32 [I] Nov 11 16:13:52 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh". [I] Nov 11 16:13:52 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3237975414". [I] Nov 11 16:13:52 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "3895027094". [W] Nov 11 16:13:52 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.1" connected. [I] Nov 11 16:13:52 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:13:52 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:14:11 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(52:eb:a4:8d:5e:55) had deauthenticated by STA (reason: STA is leaving or has left BSS). [I] Nov 11 16:15:54 ipsec: 03[IKE] received DELETE for ESP CHILD_SA with SPI e3523ed4 [I] Nov 11 16:15:54 ipsec: 03[IKE] closing CHILD_SA VirtualIPServerIKE2{4950} with SPIs cf29f19b_i (6372 bytes) e3523ed4_o (2702 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 [I] Nov 11 16:15:54 ipsec: 03[IKE] sending DELETE for ESP CHILD_SA with SPI cf29f19b [I] Nov 11 16:15:54 ipsec: 03[IKE] CHILD_SA closed [I] Nov 11 16:15:54 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(e6:29:c0:f6:d9:c9) had associated (has FT caps). [I] Nov 11 16:15:54 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:15:54 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:15:54 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(e6:29:c0:f6:d9:c9) set key done in WPA2/WPA2PSK. [I] Nov 11 16:15:54 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.207 from e6:29:c0:f6:d9:c9. [I] Nov 11 16:15:55 ndhcps: sending ACK of 172.16.1.207 to e6:29:c0:f6:d9:c9. [I] Nov 11 16:15:56 dropbear: Child connection from 92.255.85.253:61202 [E] Nov 11 16:15:58 dropbear: Login attempt for nonexistent user 'user' [I] Nov 11 16:15:59 ipsec: 11[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:15:59 ipsec: 11[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 16:15:59 ipsec: 11[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:15:59 ipsec: 11[IKE] inbound CHILD_SA VirtualIPServerIKE2{4956} established with SPIs c318f629_i 79d589cc_o and TS 0.0.0.0/0 === 172.20.8.4/32 [E] Nov 11 16:15:59 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist2" @ "192.168.1.70" from "79.139.193.172". [C] Nov 11 16:15:59 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. [I] Nov 11 16:15:59 ipsec: 13[IKE] received DELETE for ESP CHILD_SA with SPI 90131018 [I] Nov 11 16:15:59 ipsec: 13[IKE] closing CHILD_SA VirtualIPServerIKE2{4925} with SPIs cb989fc1_i (103449 bytes) 90131018_o (36898 bytes) and TS 0.0.0.0/0 === 172.20.8.4/32 [I] Nov 11 16:15:59 ipsec: 13[IKE] sending DELETE for ESP CHILD_SA with SPI cb989fc1 [I] Nov 11 16:15:59 ipsec: 13[IKE] CHILD_SA closed [I] Nov 11 16:15:59 ipsec: 13[IKE] outbound CHILD_SA VirtualIPServerIKE2{4956} established with SPIs c318f629_i 79d589cc_o and TS 0.0.0.0/0 === 172.20.8.4/32 [I] Nov 11 16:15:59 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:15:59 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:16:00 dropbear: Exit before auth from <92.255.85.253:61202>: Error reading: Connection reset by peer [I] Nov 11 16:16:22 ipsec: 12[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:16:22 ipsec: 12[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 16:16:22 ipsec: 12[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:16:22 ipsec: 12[IKE] CHILD_SA VirtualIPServerIKE2{4957} established with SPIs cae8b6a3_i 6c6afcbc_o and TS 0.0.0.0/0 === 172.20.8.2/32 [E] Nov 11 16:16:23 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "urist2" @ "192.168.1.100" from "81.211.81.53". [C] Nov 11 16:16:23 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. [I] Nov 11 16:16:23 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:16:23 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:18:20 ipsec: 14[IKE] received DELETE for ESP CHILD_SA with SPI d62cf4f8 [I] Nov 11 16:18:20 ipsec: 14[IKE] closing CHILD_SA VirtualIPServerIKE2{4952} with SPIs c3bf492b_i (709268 bytes) d62cf4f8_o (4561643 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 [I] Nov 11 16:18:20 ipsec: 14[IKE] sending DELETE for ESP CHILD_SA with SPI c3bf492b [I] Nov 11 16:18:20 ipsec: 14[IKE] CHILD_SA closed [I] Nov 11 16:18:20 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:18:20 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:18:21 ipsec: 03[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:18:21 ipsec: 03[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 16:18:21 ipsec: 03[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:18:21 ipsec: 03[IKE] CHILD_SA VirtualIPServerIKE2{4958} established with SPIs cb91fb1a_i a7348cb0_o and TS 0.0.0.0/0 === 172.20.8.1/32 [E] Nov 11 16:18:21 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist" @ "192.168.1.149" from "188.64.164.33". [C] Nov 11 16:18:21 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. [I] Nov 11 16:18:21 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:18:21 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:18:32 ipsec: 05[IKE] received DELETE for ESP CHILD_SA with SPI 2e05af2e [I] Nov 11 16:18:32 ipsec: 05[IKE] closing CHILD_SA VirtualIPServerIKE2{4954} with SPIs cf723d42_i (19891 bytes) 2e05af2e_o (250 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 [I] Nov 11 16:18:32 ipsec: 05[IKE] sending DELETE for ESP CHILD_SA with SPI cf723d42 [I] Nov 11 16:18:32 ipsec: 05[IKE] CHILD_SA closed [I] Nov 11 16:18:32 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:18:32 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:18:32 ipsec: 14[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:18:32 ipsec: 14[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 16:18:32 ipsec: 14[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:18:32 ipsec: 14[IKE] CHILD_SA VirtualIPServerIKE2{4959} established with SPIs c67588c6_i b157dcc8_o and TS 0.0.0.0/0 === 172.20.8.1/32 [E] Nov 11 16:18:32 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist5" @ "192.168.0.4" from "95.55.35.180". [C] Nov 11 16:18:32 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. [I] Nov 11 16:18:32 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:18:32 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:19:13 ipsec: 09[IKE] received DELETE for ESP CHILD_SA with SPI b157dcc8 [I] Nov 11 16:19:13 ipsec: 09[IKE] closing CHILD_SA VirtualIPServerIKE2{4959} with SPIs c67588c6_i (322 bytes) b157dcc8_o (681 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 [I] Nov 11 16:19:13 ipsec: 09[IKE] sending DELETE for ESP CHILD_SA with SPI c67588c6 [I] Nov 11 16:19:13 ipsec: 09[IKE] CHILD_SA closed [I] Nov 11 16:19:13 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:19:13 ipsec: 11[IKE] received DELETE for IKE_SA VirtualIPServerIKE2[1506] [I] Nov 11 16:19:13 ipsec: 11[IKE] deleting IKE_SA VirtualIPServerIKE2[1506] between 213.33.195.46[sakdjfwelfwe.keenetic.link]...95.55.35.180[192.168.0.4] [I] Nov 11 16:19:13 ipsec: 11[IKE] IKE_SA deleted [I] Nov 11 16:19:13 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:19:16 ipsec: 08[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID [I] Nov 11 16:19:16 ipsec: 08[IKE] received MS-Negotiation Discovery Capable vendor ID [I] Nov 11 16:19:16 ipsec: 08[IKE] received Vid-Initial-Contact vendor ID [I] Nov 11 16:19:16 ipsec: 08[IKE] 95.55.35.180 is initiating an IKE_SA [I] Nov 11 16:19:16 ipsec: 08[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=256/ [...] [I] Nov 11 16:19:16 ipsec: 08[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256 [I] Nov 11 16:19:16 ipsec: 08[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024 [I] Nov 11 16:19:16 ipsec: 08[IKE] remote host is behind NAT [I] Nov 11 16:19:17 ipsec: 10[IKE] received 46 cert requests for an unknown ca [I] Nov 11 16:19:17 ipsec: 10[CFG] looking for peer configs matching 213.33.195.46[%any]...95.55.35.180[192.168.0.4] [I] Nov 11 16:19:17 ipsec: 10[CFG] selected peer config 'VirtualIPServerIKE2' [I] Nov 11 16:19:17 ipsec: 10[IKE] initiating EAP_IDENTITY method (id 0x00) [I] Nov 11 16:19:17 ipsec: 10[IKE] peer supports MOBIKE, but disabled in config [I] Nov 11 16:19:17 ipsec: 10[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with RSA signature successful [I] Nov 11 16:19:17 ipsec: 10[IKE] sending end entity cert "CN=sakdjfwelfwe.keenetic.link" [I] Nov 11 16:19:17 ipsec: 10[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R10" [I] Nov 11 16:19:17 ipsec: 15[IKE] received EAP identity 'metodist5' [I] Nov 11 16:19:17 ipsec: 15[IKE] initiating EAP_MSCHAPV2 method (id 0xA0) [I] Nov 11 16:19:17 ipsec: 12[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established [I] Nov 11 16:19:17 ipsec: 14[IKE] authentication of '192.168.0.4' with EAP successful [I] Nov 11 16:19:17 ipsec: 14[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with EAP [I] Nov 11 16:19:17 ipsec: 14[IKE] IKE_SA VirtualIPServerIKE2[1524] established between 213.33.195.46[sakdjfwelfwe.keenetic.link]...95.55.35.180[192.168.0.4] [I] Nov 11 16:19:17 ipsec: 14[IKE] peer requested virtual IP %any [I] Nov 11 16:19:17 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Nov 11 16:19:17 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": allocated address "172.20.8.3" for user "metodist5" @ "192.168.0.4" from "95.55.35.180". [I] Nov 11 16:19:17 ndm: Core::Session: client disconnected. [I] Nov 11 16:19:17 ipsec: 14[IKE] assigning virtual IP 172.20.8.3 to peer 'metodist5' [I] Nov 11 16:19:17 ipsec: 14[IKE] peer requested virtual IP %any6 [I] Nov 11 16:19:17 ipsec: 14[IKE] no virtual IP found for %any6 requested by 'metodist5' [I] Nov 11 16:19:17 ipsec: 14[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:19:17 ipsec: 14[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 16:19:17 ipsec: 14[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:19:17 ipsec: 14[IKE] CHILD_SA VirtualIPServerIKE2{4960} established with SPIs c08babca_i bcfd1b78_o and TS 0.0.0.0/0 === 172.20.8.3/32 [W] Nov 11 16:19:17 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "metodist5" @ "192.168.0.4" with IP "172.20.8.3" connected. [I] Nov 11 16:19:17 ipsec: 14[CFG] scheduling RADIUS Interim-Updates every 5s [I] Nov 11 16:19:17 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:19:17 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:19:19 ndhcps: DHCPINFORM received for 172.20.8.3 from 00:00:00:00:00:00. [I] Nov 11 16:19:19 ndhcps: sending INFORM to 00:00:00:00:00:00. [I] Nov 11 16:19:58 ipsec: 13[IKE] received DELETE for ESP CHILD_SA with SPI bcfd1b78 [I] Nov 11 16:19:58 ipsec: 13[IKE] closing CHILD_SA VirtualIPServerIKE2{4960} with SPIs c08babca_i (18933 bytes) bcfd1b78_o (4151 bytes) and TS 0.0.0.0/0 === 172.20.8.3/32 [I] Nov 11 16:19:58 ipsec: 13[IKE] sending DELETE for ESP CHILD_SA with SPI c08babca [I] Nov 11 16:19:58 ipsec: 13[IKE] CHILD_SA closed [I] Nov 11 16:19:58 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "metodist5". [W] Nov 11 16:19:58 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "metodist5" @ "192.168.0.4" from "95.55.35.180" disconnected. [I] Nov 11 16:19:58 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:19:58 ipsec: 06[IKE] received DELETE for IKE_SA VirtualIPServerIKE2[1524] [I] Nov 11 16:19:58 ipsec: 06[IKE] deleting IKE_SA VirtualIPServerIKE2[1524] between 213.33.195.46[sakdjfwelfwe.keenetic.link]...95.55.35.180[192.168.0.4] [I] Nov 11 16:19:58 ipsec: 06[IKE] IKE_SA deleted [I] Nov 11 16:19:58 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:20:19 ipsec: 06[IKE] received DELETE for ESP CHILD_SA with SPI e8296596 [I] Nov 11 16:20:19 ipsec: 06[IKE] closing CHILD_SA VirtualIPServerIKE2{4955} with SPIs c0ff9576_i (52411 bytes) e8296596_o (42263 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 [I] Nov 11 16:20:19 ipsec: 06[IKE] sending DELETE for ESP CHILD_SA with SPI c0ff9576 [I] Nov 11 16:20:19 ipsec: 06[IKE] CHILD_SA closed [I] Nov 11 16:20:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh". [I] Nov 11 16:20:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3237975414". [I] Nov 11 16:20:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "3895027094". [W] Nov 11 16:20:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected. [I] Nov 11 16:20:19 ipsec: 03[IKE] received DELETE for IKE_SA VirtualIPServerIKE2[1522] [I] Nov 11 16:20:19 ipsec: 03[IKE] deleting IKE_SA VirtualIPServerIKE2[1522] between 213.33.195.46[sakdjfwelfwe.keenetic.link]...81.211.81.53[192.168.1.98] [I] Nov 11 16:20:19 ipsec: 03[IKE] IKE_SA deleted [I] Nov 11 16:20:19 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:20:19 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:20:21 ipsec: 13[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID [I] Nov 11 16:20:21 ipsec: 13[IKE] received MS-Negotiation Discovery Capable vendor ID [I] Nov 11 16:20:21 ipsec: 13[IKE] received Vid-Initial-Contact vendor ID [I] Nov 11 16:20:21 ipsec: 13[IKE] 81.211.81.53 is initiating an IKE_SA [I] Nov 11 16:20:21 ipsec: 13[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=256/ [...] [I] Nov 11 16:20:21 ipsec: 13[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256 [I] Nov 11 16:20:21 ipsec: 13[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024 [I] Nov 11 16:20:21 ipsec: 13[IKE] remote host is behind NAT [I] Nov 11 16:20:22 ipsec: 15[IKE] received 73 cert requests for an unknown ca [I] Nov 11 16:20:22 ipsec: 15[CFG] looking for peer configs matching 213.33.195.46[%any]...81.211.81.53[192.168.1.98] [I] Nov 11 16:20:22 ipsec: 15[CFG] selected peer config 'VirtualIPServerIKE2' [I] Nov 11 16:20:22 ipsec: 15[IKE] initiating EAP_IDENTITY method (id 0x00) [I] Nov 11 16:20:22 ipsec: 15[IKE] peer supports MOBIKE, but disabled in config [I] Nov 11 16:20:22 ipsec: 15[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with RSA signature successful [I] Nov 11 16:20:22 ipsec: 15[IKE] sending end entity cert "CN=sakdjfwelfwe.keenetic.link" [I] Nov 11 16:20:22 ipsec: 15[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R10" [I] Nov 11 16:20:22 ipsec: 03[IKE] received EAP identity 'buh' [I] Nov 11 16:20:22 ipsec: 03[IKE] initiating EAP_MSCHAPV2 method (id 0xEC) [I] Nov 11 16:20:22 ipsec: 11[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established [I] Nov 11 16:20:22 ipsec: 07[IKE] authentication of '192.168.1.98' with EAP successful [I] Nov 11 16:20:22 ipsec: 07[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with EAP [I] Nov 11 16:20:22 ipsec: 07[IKE] IKE_SA VirtualIPServerIKE2[1525] established between 213.33.195.46[sakdjfwelfwe.keenetic.link]...81.211.81.53[192.168.1.98] [I] Nov 11 16:20:22 ipsec: 07[IKE] peer requested virtual IP %any [I] Nov 11 16:20:22 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Nov 11 16:20:22 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": allocated address "172.20.8.1" for user "buh" @ "192.168.1.98" from "81.211.81.53". [I] Nov 11 16:20:22 ndm: Core::Session: client disconnected. [I] Nov 11 16:20:22 ipsec: 07[IKE] assigning virtual IP 172.20.8.1 to peer 'buh' [I] Nov 11 16:20:22 ipsec: 07[IKE] peer requested virtual IP %any6 [I] Nov 11 16:20:22 ipsec: 07[IKE] no virtual IP found for %any6 requested by 'buh' [I] Nov 11 16:20:22 ipsec: 07[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:20:22 ipsec: 07[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 16:20:22 ipsec: 07[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:20:22 ipsec: 07[IKE] CHILD_SA VirtualIPServerIKE2{4961} established with SPIs cf51480a_i 1a6ef356_o and TS 0.0.0.0/0 === 172.20.8.1/32 [W] Nov 11 16:20:22 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.1" connected. [I] Nov 11 16:20:22 ipsec: 07[CFG] scheduling RADIUS Interim-Updates every 5s [I] Nov 11 16:20:22 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:20:22 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:20:25 ndhcps: DHCPINFORM received for 172.20.8.1 from 00:00:00:00:00:00. [I] Nov 11 16:20:25 ndhcps: sending INFORM to 00:00:00:00:00:00. [I] Nov 11 16:20:59 ipsec: 05[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID [I] Nov 11 16:20:59 ipsec: 05[IKE] received MS-Negotiation Discovery Capable vendor ID [I] Nov 11 16:20:59 ipsec: 05[IKE] received Vid-Initial-Contact vendor ID [I] Nov 11 16:20:59 ipsec: 05[IKE] 95.55.35.180 is initiating an IKE_SA [I] Nov 11 16:20:59 ipsec: 05[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=256/ [...] [I] Nov 11 16:20:59 ipsec: 05[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256 [I] Nov 11 16:20:59 ipsec: 05[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024 [I] Nov 11 16:20:59 ipsec: 05[IKE] remote host is behind NAT [I] Nov 11 16:20:59 ipsec: 09[IKE] received 46 cert requests for an unknown ca [I] Nov 11 16:20:59 ipsec: 09[CFG] looking for peer configs matching 213.33.195.46[%any]...95.55.35.180[192.168.0.4] [I] Nov 11 16:20:59 ipsec: 09[CFG] selected peer config 'VirtualIPServerIKE2' [I] Nov 11 16:20:59 ipsec: 09[IKE] initiating EAP_IDENTITY method (id 0x00) [I] Nov 11 16:20:59 ipsec: 09[IKE] peer supports MOBIKE, but disabled in config [I] Nov 11 16:20:59 ipsec: 09[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with RSA signature successful [I] Nov 11 16:20:59 ipsec: 09[IKE] sending end entity cert "CN=sakdjfwelfwe.keenetic.link" [I] Nov 11 16:20:59 ipsec: 09[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R10" [I] Nov 11 16:21:00 ipsec: 11[IKE] received EAP identity 'metodist5' [I] Nov 11 16:21:00 ipsec: 11[IKE] initiating EAP_MSCHAPV2 method (id 0x29) [I] Nov 11 16:21:00 ipsec: 05[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established [I] Nov 11 16:21:00 ipsec: 14[IKE] authentication of '192.168.0.4' with EAP successful [I] Nov 11 16:21:00 ipsec: 14[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with EAP [I] Nov 11 16:21:00 ipsec: 14[IKE] IKE_SA VirtualIPServerIKE2[1526] established between 213.33.195.46[sakdjfwelfwe.keenetic.link]...95.55.35.180[192.168.0.4] [I] Nov 11 16:21:00 ipsec: 14[IKE] peer requested virtual IP %any [I] Nov 11 16:21:00 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Nov 11 16:21:00 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": allocated address "172.20.8.3" for user "metodist5" @ "192.168.0.4" from "95.55.35.180". [I] Nov 11 16:21:00 ndm: Core::Session: client disconnected. [I] Nov 11 16:21:00 ipsec: 14[IKE] assigning virtual IP 172.20.8.3 to peer 'metodist5' [I] Nov 11 16:21:00 ipsec: 14[IKE] peer requested virtual IP %any6 [I] Nov 11 16:21:00 ipsec: 14[IKE] no virtual IP found for %any6 requested by 'metodist5' [I] Nov 11 16:21:00 ipsec: 14[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:21:00 ipsec: 14[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 16:21:00 ipsec: 14[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:21:00 ipsec: 14[IKE] CHILD_SA VirtualIPServerIKE2{4962} established with SPIs c6e50121_i 7ac03e24_o and TS 0.0.0.0/0 === 172.20.8.3/32 [W] Nov 11 16:21:00 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "metodist5" @ "192.168.0.4" with IP "172.20.8.3" connected. [I] Nov 11 16:21:00 ipsec: 14[CFG] scheduling RADIUS Interim-Updates every 5s [I] Nov 11 16:21:00 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:21:00 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:21:02 ndhcps: DHCPINFORM received for 172.20.8.3 from 00:00:00:00:00:00. [I] Nov 11 16:21:02 ndhcps: sending INFORM to 00:00:00:00:00:00. [I] Nov 11 16:21:22 ipsec: 12[IKE] received DELETE for ESP CHILD_SA with SPI 95038c86 [I] Nov 11 16:21:22 ipsec: 12[IKE] closing CHILD_SA VirtualIPServerIKE2{4953} with SPIs cf7ac52f_i (80979 bytes) 95038c86_o (393204 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 [I] Nov 11 16:21:22 ipsec: 12[IKE] sending DELETE for ESP CHILD_SA with SPI cf7ac52f [I] Nov 11 16:21:22 ipsec: 12[IKE] CHILD_SA closed [I] Nov 11 16:21:22 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "urist". [I] Nov 11 16:21:22 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3480929583". [I] Nov 11 16:21:22 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "2500037766". [W] Nov 11 16:21:22 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "urist" @ "192.168.1.43" from "81.211.81.53" disconnected. [I] Nov 11 16:21:22 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:21:22 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:21:23 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.188 from 80:e8:2c:f5:64:35. [I] Nov 11 16:21:23 ndhcps: sending ACK of 172.16.1.188 to 80:e8:2c:f5:64:35. [I] Nov 11 16:21:28 ipsec: 03[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:21:28 ipsec: 03[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 16:21:28 ipsec: 03[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:21:28 ipsec: 03[IKE] CHILD_SA VirtualIPServerIKE2{4963} established with SPIs c6c4af17_i fb6aa2fc_o and TS 0.0.0.0/0 === 172.20.8.2/32 [I] Nov 11 16:21:28 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "urist". [I] Nov 11 16:21:28 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3334778647". [I] Nov 11 16:21:28 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "4218069756". [W] Nov 11 16:21:28 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist" @ "192.168.1.43" with IP "172.20.8.2" connected. [I] Nov 11 16:21:28 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:21:28 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:22:14 dropbear: Child connection from 81.161.238.160:56178 [I] Nov 11 16:22:18 ndm: Core::Server: started Session /var/run/ndm.core.socket. [E] Nov 11 16:22:18 ndm: Core::Authenticator: access to "cli" denied for user "root". [E] Nov 11 16:22:18 ndm: Core::Authenticator: access to "sftp" denied for user "root". [W] Nov 11 16:22:18 dropbear: Bad password attempt for 'root' from 81.161.238.160:56178 [I] Nov 11 16:22:18 ndm: Core::Session: client disconnected. [I] Nov 11 16:22:19 ipsec: 09[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID [I] Nov 11 16:22:19 ipsec: 09[IKE] received MS-Negotiation Discovery Capable vendor ID [I] Nov 11 16:22:19 ipsec: 09[IKE] received Vid-Initial-Contact vendor ID [I] Nov 11 16:22:19 ipsec: 09[IKE] 37.122.20.103 is initiating an IKE_SA [I] Nov 11 16:22:19 ipsec: 09[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=256/ [...] [I] Nov 11 16:22:19 ipsec: 09[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256 [I] Nov 11 16:22:19 ipsec: 09[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024 [I] Nov 11 16:22:19 ipsec: 09[IKE] remote host is behind NAT [I] Nov 11 16:22:19 dropbear: Exit before auth from <81.161.238.160:56178>: (user 'root', 1 fails): Exited normally [I] Nov 11 16:22:19 ipsec: 08[IKE] received 279 cert requests for an unknown ca [I] Nov 11 16:22:19 ipsec: 08[CFG] looking for peer configs matching 213.33.195.46[%any]...37.122.20.103[192.168.0.32] [I] Nov 11 16:22:19 ipsec: 08[CFG] selected peer config 'VirtualIPServerIKE2' [I] Nov 11 16:22:19 ipsec: 08[IKE] initiating EAP_IDENTITY method (id 0x00) [I] Nov 11 16:22:19 ipsec: 08[IKE] peer supports MOBIKE, but disabled in config [I] Nov 11 16:22:19 ipsec: 08[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with RSA signature successful [I] Nov 11 16:22:19 ipsec: 08[IKE] sending end entity cert "CN=sakdjfwelfwe.keenetic.link" [I] Nov 11 16:22:19 ipsec: 08[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R10" [I] Nov 11 16:22:49 ipsec: 08[JOB] deleting half open IKE_SA with 37.122.20.103 after timeout [I] Nov 11 16:23:02 ipsec: 11[IKE] retransmit 1 of request with message ID 16 [I] Nov 11 16:25:22 ipsec: 03[IKE] received DELETE for ESP CHILD_SA with SPI a7348cb0 [I] Nov 11 16:25:22 ipsec: 03[IKE] closing CHILD_SA VirtualIPServerIKE2{4958} with SPIs cb91fb1a_i (32994 bytes) a7348cb0_o (16185 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 [I] Nov 11 16:25:22 ipsec: 03[IKE] sending DELETE for ESP CHILD_SA with SPI cb91fb1a [I] Nov 11 16:25:22 ipsec: 03[IKE] CHILD_SA closed [I] Nov 11 16:25:22 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:25:22 ipsec: 12[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:25:22 ipsec: 12[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 16:25:22 ipsec: 12[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:25:22 ipsec: 12[IKE] CHILD_SA VirtualIPServerIKE2{4964} established with SPIs c25a3303_i d6e03dd8_o and TS 0.0.0.0/0 === 172.20.8.1/32 [I] Nov 11 16:25:22 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [E] Nov 11 16:25:22 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist" @ "192.168.1.149" from "188.64.164.33". [C] Nov 11 16:25:22 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. [I] Nov 11 16:25:22 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:25:22 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:25:28 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(32:5c:4a:56:a2:9d) had associated (has FT caps). [I] Nov 11 16:25:28 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(32:5c:4a:56:a2:9d) set key done in WPA2/WPA2PSK. [I] Nov 11 16:25:28 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.197 from 32:5c:4a:56:a2:9d. [I] Nov 11 16:25:29 ndhcps: sending ACK of 172.16.1.197 to 32:5c:4a:56:a2:9d. [I] Nov 11 16:26:24 ipsec: 13[IKE] received DELETE for ESP CHILD_SA with SPI 6c6afcbc [I] Nov 11 16:26:24 ipsec: 13[IKE] closing CHILD_SA VirtualIPServerIKE2{4957} with SPIs cae8b6a3_i (12211 bytes) 6c6afcbc_o (10349 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 [I] Nov 11 16:26:24 ipsec: 13[IKE] sending DELETE for ESP CHILD_SA with SPI cae8b6a3 [I] Nov 11 16:26:24 ipsec: 13[IKE] CHILD_SA closed [I] Nov 11 16:26:24 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:26:24 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:26:24 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(32:5c:4a:56:a2:9d) FT authenticated successfully. [I] Nov 11 16:26:24 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(32:5c:4a:56:a2:9d) had re-associated from 50:ff:20:62:07:5c (FT roam). [I] Nov 11 16:26:32 ipsec: 07[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:26:32 ipsec: 07[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 16:26:32 ipsec: 07[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:26:32 ipsec: 07[IKE] CHILD_SA VirtualIPServerIKE2{4965} established with SPIs cc6398fb_i 5199c94c_o and TS 0.0.0.0/0 === 172.20.8.2/32 [E] Nov 11 16:26:33 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "urist2" @ "192.168.1.100" from "81.211.81.53". [C] Nov 11 16:26:33 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. [I] Nov 11 16:26:33 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:26:33 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:28:06 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(7e:fb:25:d2:79:ed) FT authenticated successfully. [I] Nov 11 16:28:06 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(7e:fb:25:d2:79:ed) had re-associated from 50:ff:20:62:07:5c (FT roam). [I] Nov 11 16:30:00 ipsec: 13[IKE] received DELETE for ESP CHILD_SA with SPI 1a6ef356 [I] Nov 11 16:30:00 ipsec: 13[IKE] closing CHILD_SA VirtualIPServerIKE2{4961} with SPIs cf51480a_i (116055 bytes) 1a6ef356_o (318045 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 [I] Nov 11 16:30:00 ipsec: 13[IKE] sending DELETE for ESP CHILD_SA with SPI cf51480a [I] Nov 11 16:30:00 ipsec: 13[IKE] CHILD_SA closed [I] Nov 11 16:30:00 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh". [W] Nov 11 16:30:00 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected. [I] Nov 11 16:30:00 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:30:00 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:30:24 ipsec: 10[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:30:24 ipsec: 10[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 16:30:24 ipsec: 10[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:30:24 ipsec: 10[IKE] CHILD_SA VirtualIPServerIKE2{4966} established with SPIs cbaf5ba8_i 3da76c7a_o and TS 0.0.0.0/0 === 172.20.8.1/32 [I] Nov 11 16:30:24 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh". [I] Nov 11 16:30:24 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3417267112". [I] Nov 11 16:30:24 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "1034382458". [W] Nov 11 16:30:24 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.1" connected. [I] Nov 11 16:30:24 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:30:24 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:30:32 ipsec: 07[IKE] retransmit 1 of request with message ID 1 [I] Nov 11 16:31:23 ipsec: 10[IKE] received DELETE for ESP CHILD_SA with SPI fb6aa2fc [I] Nov 11 16:31:23 ipsec: 10[IKE] closing CHILD_SA VirtualIPServerIKE2{4963} with SPIs c6c4af17_i (4611 bytes) fb6aa2fc_o (6392 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 [I] Nov 11 16:31:23 ipsec: 10[IKE] sending DELETE for ESP CHILD_SA with SPI c6c4af17 [I] Nov 11 16:31:23 ipsec: 10[IKE] CHILD_SA closed [I] Nov 11 16:31:23 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "urist". [I] Nov 11 16:31:23 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3334778647". [I] Nov 11 16:31:23 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "4218069756". [W] Nov 11 16:31:23 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "urist" @ "192.168.1.43" from "81.211.81.53" disconnected. [I] Nov 11 16:31:23 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:31:23 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:31:33 ipsec: 13[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:31:33 ipsec: 13[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 16:31:33 ipsec: 13[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:31:33 ipsec: 13[IKE] CHILD_SA VirtualIPServerIKE2{4967} established with SPIs c8faa1e0_i eddb3678_o and TS 0.0.0.0/0 === 172.20.8.2/32 [I] Nov 11 16:31:33 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "urist". [I] Nov 11 16:31:33 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3371868640". [I] Nov 11 16:31:33 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "3990566520". [W] Nov 11 16:31:33 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist" @ "192.168.1.43" with IP "172.20.8.2" connected. [I] Nov 11 16:31:33 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:31:33 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:32:06 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.156 from 98:ee:cb:c3:a4:7b. [I] Nov 11 16:32:06 ndhcps: sending ACK of 172.16.1.156 to 98:ee:cb:c3:a4:7b. [I] Nov 11 16:33:46 ipsec: 11[IKE] retransmit 1 of request with message ID 2 [I] Nov 11 16:35:00 ipsec: 05[IKE] received DELETE for ESP CHILD_SA with SPI d6e03dd8 [I] Nov 11 16:35:00 ipsec: 05[IKE] closing CHILD_SA VirtualIPServerIKE2{4964} with SPIs c25a3303_i (15566 bytes) d6e03dd8_o (1940 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 [I] Nov 11 16:35:00 ipsec: 05[IKE] sending DELETE for ESP CHILD_SA with SPI c25a3303 [I] Nov 11 16:35:00 ipsec: 05[IKE] CHILD_SA closed [I] Nov 11 16:35:00 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:35:00 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:35:15 ipsec: 08[IKE] retransmit 1 of request with message ID 3 [I] Nov 11 16:35:16 ipsec: 06[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:35:16 ipsec: 06[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 16:35:16 ipsec: 06[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:35:16 ipsec: 06[IKE] CHILD_SA VirtualIPServerIKE2{4968} established with SPIs c5c9473b_i c813308e_o and TS 0.0.0.0/0 === 172.20.8.1/32 [E] Nov 11 16:35:16 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist" @ "192.168.1.149" from "188.64.164.33". [C] Nov 11 16:35:16 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. [I] Nov 11 16:35:16 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:35:16 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:35:33 bndstrg: band steering: send BTM request to 7e:fb:25:d2:79:ed for roam to 5GHz band [I] Nov 11 16:35:34 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(7e:fb:25:d2:79:ed) had associated (has FT caps). [I] Nov 11 16:35:34 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(7e:fb:25:d2:79:ed) set key done in WPA2/WPA2PSK. [I] Nov 11 16:35:34 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.174 from 7e:fb:25:d2:79:ed. [I] Nov 11 16:35:35 ndhcps: sending ACK of 172.16.1.174 to 7e:fb:25:d2:79:ed. [I] Nov 11 16:36:04 bndstrg: band steering: send BTM request to 7e:fb:25:d2:79:ed for roam to 5GHz band [I] Nov 11 16:36:05 bndstrg: band steering: WNM client 7e:fb:25:d2:79:ed accepted 5GHz band [I] Nov 11 16:36:05 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(7e:fb:25:d2:79:ed) FT authenticated successfully. [I] Nov 11 16:36:05 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(7e:fb:25:d2:79:ed) had re-associated from 52:ff:20:82:07:5c (FT roam). [I] Nov 11 16:36:15 ipsec: 05[IKE] received DELETE for ESP CHILD_SA with SPI 5199c94c [I] Nov 11 16:36:15 ipsec: 05[IKE] closing CHILD_SA VirtualIPServerIKE2{4965} with SPIs cc6398fb_i (11259 bytes) 5199c94c_o (6535 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 [I] Nov 11 16:36:15 ipsec: 05[IKE] sending DELETE for ESP CHILD_SA with SPI cc6398fb [I] Nov 11 16:36:15 ipsec: 05[IKE] CHILD_SA closed [I] Nov 11 16:36:16 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:36:16 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:36:25 ipsec: 12[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:36:25 ipsec: 12[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 16:36:25 ipsec: 12[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:36:25 ipsec: 12[IKE] CHILD_SA VirtualIPServerIKE2{4969} established with SPIs c5d66e6f_i 16ee5a36_o and TS 0.0.0.0/0 === 172.20.8.2/32 [E] Nov 11 16:36:25 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "urist2" @ "192.168.1.100" from "81.211.81.53". [C] Nov 11 16:36:25 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. [I] Nov 11 16:36:25 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:36:25 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:36:39 ipsec: 12[IKE] received DELETE for ESP CHILD_SA with SPI 3da76c7a [I] Nov 11 16:36:39 ipsec: 12[IKE] closing CHILD_SA VirtualIPServerIKE2{4966} with SPIs cbaf5ba8_i (22735 bytes) 3da76c7a_o (9064 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 [I] Nov 11 16:36:39 ipsec: 12[IKE] sending DELETE for ESP CHILD_SA with SPI cbaf5ba8 [I] Nov 11 16:36:39 ipsec: 12[IKE] CHILD_SA closed [I] Nov 11 16:36:39 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh". [I] Nov 11 16:36:39 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3417267112". [I] Nov 11 16:36:39 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "1034382458". [W] Nov 11 16:36:39 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected. [I] Nov 11 16:36:40 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:36:40 ipsec: 10[IKE] received DELETE for IKE_SA VirtualIPServerIKE2[1525] [I] Nov 11 16:36:40 ipsec: 10[IKE] deleting IKE_SA VirtualIPServerIKE2[1525] between 213.33.195.46[sakdjfwelfwe.keenetic.link]...81.211.81.53[192.168.1.98] [I] Nov 11 16:36:40 ipsec: 10[IKE] IKE_SA deleted [I] Nov 11 16:36:40 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:36:41 ipsec: 12[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID [I] Nov 11 16:36:41 ipsec: 12[IKE] received MS-Negotiation Discovery Capable vendor ID [I] Nov 11 16:36:41 ipsec: 12[IKE] received Vid-Initial-Contact vendor ID [I] Nov 11 16:36:41 ipsec: 12[IKE] 81.211.81.53 is initiating an IKE_SA [I] Nov 11 16:36:41 ipsec: 12[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=256/ [...] [I] Nov 11 16:36:41 ipsec: 12[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256 [I] Nov 11 16:36:41 ipsec: 12[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024 [I] Nov 11 16:36:41 ipsec: 12[IKE] remote host is behind NAT [I] Nov 11 16:36:41 ipsec: 15[IKE] received 73 cert requests for an unknown ca [I] Nov 11 16:36:41 ipsec: 15[CFG] looking for peer configs matching 213.33.195.46[%any]...81.211.81.53[192.168.1.98] [I] Nov 11 16:36:41 ipsec: 15[CFG] selected peer config 'VirtualIPServerIKE2' [I] Nov 11 16:36:41 ipsec: 15[IKE] initiating EAP_IDENTITY method (id 0x00) [I] Nov 11 16:36:41 ipsec: 15[IKE] peer supports MOBIKE, but disabled in config [I] Nov 11 16:36:41 ipsec: 15[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with RSA signature successful [I] Nov 11 16:36:41 ipsec: 15[IKE] sending end entity cert "CN=sakdjfwelfwe.keenetic.link" [I] Nov 11 16:36:41 ipsec: 15[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R10" [I] Nov 11 16:36:41 ipsec: 09[IKE] received EAP identity 'buh' [I] Nov 11 16:36:41 ipsec: 09[IKE] initiating EAP_MSCHAPV2 method (id 0xFD) [I] Nov 11 16:36:41 ipsec: 06[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established [I] Nov 11 16:36:41 ipsec: 12[IKE] authentication of '192.168.1.98' with EAP successful [I] Nov 11 16:36:41 ipsec: 12[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with EAP [I] Nov 11 16:36:41 ipsec: 12[IKE] IKE_SA VirtualIPServerIKE2[1528] established between 213.33.195.46[sakdjfwelfwe.keenetic.link]...81.211.81.53[192.168.1.98] [I] Nov 11 16:36:41 ipsec: 12[IKE] peer requested virtual IP %any [I] Nov 11 16:36:41 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Nov 11 16:36:41 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": allocated address "172.20.8.1" for user "buh" @ "192.168.1.98" from "81.211.81.53". [I] Nov 11 16:36:41 ipsec: 12[IKE] assigning virtual IP 172.20.8.1 to peer 'buh' [I] Nov 11 16:36:41 ipsec: 12[IKE] peer requested virtual IP %any6 [I] Nov 11 16:36:41 ipsec: 12[IKE] no virtual IP found for %any6 requested by 'buh' [I] Nov 11 16:36:41 ipsec: 12[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:36:41 ipsec: 12[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 16:36:41 ipsec: 12[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:36:41 ndm: Core::Session: client disconnected. [I] Nov 11 16:36:41 ipsec: 12[IKE] CHILD_SA VirtualIPServerIKE2{4970} established with SPIs cdcc2325_i 7865b3d4_o and TS 0.0.0.0/0 === 172.20.8.1/32 [W] Nov 11 16:36:41 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.1" connected. [I] Nov 11 16:36:41 ipsec: 12[CFG] scheduling RADIUS Interim-Updates every 5s [I] Nov 11 16:36:41 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:36:41 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:36:44 ndhcps: DHCPINFORM received for 172.20.8.1 from 00:00:00:00:00:00. [I] Nov 11 16:36:44 ndhcps: sending INFORM to 00:00:00:00:00:00. [I] Nov 11 16:37:49 ipsec: 12[IKE] retransmit 1 of request with message ID 6 [I] Nov 11 16:39:44 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(32:5c:4a:56:a2:9d) had been aged-out and disassociated (idle silence). [I] Nov 11 16:41:19 ipsec: 14[IKE] received DELETE for ESP CHILD_SA with SPI eddb3678 [I] Nov 11 16:41:19 ipsec: 14[IKE] closing CHILD_SA VirtualIPServerIKE2{4967} with SPIs c8faa1e0_i (10920 bytes) eddb3678_o (10443 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 [I] Nov 11 16:41:19 ipsec: 14[IKE] sending DELETE for ESP CHILD_SA with SPI c8faa1e0 [I] Nov 11 16:41:19 ipsec: 14[IKE] CHILD_SA closed [I] Nov 11 16:41:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "urist". [I] Nov 11 16:41:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3371868640". [I] Nov 11 16:41:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "3990566520". [W] Nov 11 16:41:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "urist" @ "192.168.1.43" from "81.211.81.53" disconnected. [I] Nov 11 16:41:19 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:41:19 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:41:26 ipsec: 03[IKE] retransmit 1 of request with message ID 469 [I] Nov 11 16:41:32 ipsec: 12[IKE] received DELETE for ESP CHILD_SA with SPI c813308e [I] Nov 11 16:41:32 ipsec: 12[IKE] closing CHILD_SA VirtualIPServerIKE2{4968} with SPIs c5c9473b_i (15237 bytes) c813308e_o (798 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 [I] Nov 11 16:41:32 ipsec: 12[IKE] sending DELETE for ESP CHILD_SA with SPI c5c9473b [I] Nov 11 16:41:32 ipsec: 12[IKE] CHILD_SA closed [I] Nov 11 16:41:33 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:41:33 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:41:38 ipsec: 07[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:41:38 ipsec: 07[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 16:41:38 ipsec: 07[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:41:38 ipsec: 07[IKE] CHILD_SA VirtualIPServerIKE2{4971} established with SPIs c1ec8967_i 85654b80_o and TS 0.0.0.0/0 === 172.20.8.2/32 [I] Nov 11 16:41:38 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "urist". [I] Nov 11 16:41:38 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3253504359". [I] Nov 11 16:41:38 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "2238008192". [W] Nov 11 16:41:38 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist" @ "192.168.1.43" with IP "172.20.8.2" connected. [I] Nov 11 16:41:39 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 11 16:41:39 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 11 16:41:44 ipsec: 11[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:41:44 ipsec: 11[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 11 16:41:44 ipsec: 11[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 11 16:41:44 ipsec: 11[IKE] CHILD_SA VirtualIPServerIKE2{4972} established with SPIs cd70d6d3_i 3b3d16fa_o and TS 0.0.0.0/0 === 172.20.8.1/32 [E] Nov 11 16:41:44 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist" @ "192.168.1.149" from "188.64.164.33". [C] Nov 11 16:41:44 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. [I] Nov 11 16:41:44 ndm: IpSec::Netfilter: start reloading netfilter configuration... Quote Link to comment Share on other sites More sharing options...
Le ecureuil Posted Tuesday at 08:54 AM Share Posted Tuesday at 08:54 AM Если есть возможность, проверьте на версии 4.3. Quote Link to comment Share on other sites More sharing options...
ridervka Posted Tuesday at 06:27 PM Author Share Posted Tuesday at 06:27 PM (edited) Обновился до 4.2.1. посмотрим что будет. Пока жалоб не поступало) П.С. или в 4.2.1 гут быть такие же симптомы? Что-то я не нашел 4.3. Дадите ссылку? Edited Tuesday at 06:32 PM by ridervka Quote Link to comment Share on other sites More sharing options...
stefbarinov Posted 22 hours ago Share Posted 22 hours ago 9 часов назад, ridervka сказал: Обновился до 4.2.1. посмотрим что будет. Пока жалоб не поступало Оставайтесь на стабильной ветке, раз жалоб нет. На альфе могут появиться вновь Quote Link to comment Share on other sites More sharing options...
Le ecureuil Posted 17 hours ago Share Posted 17 hours ago Все это переделано и должно быть нормально в 4.3. Если есть возможность и желание - лучше проверять там. В 4.2 относительно 4.1 никаких существенных изменений нет. Quote Link to comment Share on other sites More sharing options...
ridervka Posted 6 hours ago Author Share Posted 6 hours ago (edited) Ver 4.2.1 отключается пользователи metodist5 и urist. Ошибки out of memory теперь не наблюдается. Теперь перед отключением пользователей в логах такие записи ipsec: 13[IKE] sending DELETE for ESP CHILD_SA with SPI xxxxxxxx ipsec: 13[IKE] CHILD_SA closed Не понимаю, кто инициирует закрытие соединения и почему сессии рвутся? Помогите пожалуйста разобраться П.С. какое нужно выставлять MTU на интернетовском интерфейсе? 1500 так и оставляем? Менял на 1472 [W] Nov 13 17:38:57 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "metodist5" @ "192.168.0.4" with IP "172.20.8.2" connected. [I] Nov 13 17:38:57 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 17:38:57 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 17:39:25 ipsec: 08[IKE] retransmit 1 of request with message ID 70 [I] Nov 13 17:39:48 dropbear: Child connection from 156.194.88.157:36150 [I] Nov 13 17:39:49 dropbear: Child connection from 156.194.88.157:36774 [I] Nov 13 17:39:50 dropbear: Exit before auth from <156.194.88.157:36150>: Exited normally [I] Nov 13 17:39:50 dropbear: Exit before auth from <156.194.88.157:36774>: Exited normally [I] Nov 13 17:39:54 dropbear: Child connection from 156.194.88.157:38936 [I] Nov 13 17:40:25 dropbear: Child connection from 156.194.88.157:57089 [E] Nov 13 17:40:49 dropbear: Login attempt for nonexistent user 'NL5xUDpV2xRa' [I] Nov 13 17:40:49 dropbear: Exit before auth from <156.194.88.157:57089>: Bad buf_getptr [I] Nov 13 17:41:17 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(62:b2:12:d5:da:d2) had associated (has FT caps). [I] Nov 13 17:41:18 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(62:b2:12:d5:da:d2) set key done in WPA2/WPA2PSK. [I] Nov 13 17:41:18 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.227 from 62:b2:12:d5:da:d2. [I] Nov 13 17:41:18 ndhcps: sending ACK of 172.16.1.227 to 62:b2:12:d5:da:d2. [I] Nov 13 17:41:23 dropbear: Exit before auth from <193.111.250.12:38340>: (user 'root', 1 fails): Timeout before auth [I] Nov 13 17:42:19 ipsec: 07[IKE] retransmit 1 of request with message ID 73 [I] Nov 13 17:42:26 bndstrg: band steering: send BTM request to e6:29:c0:f6:d9:c9 for roam to 2.4GHz band (Low RSSI: -81) [W] Nov 13 17:42:26 bndstrg: band steering: WNM client e6:29:c0:f6:d9:c9 rejected 2.4GHz band (code: 7) [I] Nov 13 17:42:28 ipsec: 11[IKE] retransmit 2 of request with message ID 73 [I] Nov 13 17:42:36 bndstrg: band steering: send BTM request to e6:29:c0:f6:d9:c9 for roam to 2.4GHz band (Low RSSI: -81) [W] Nov 13 17:42:36 bndstrg: band steering: WNM client e6:29:c0:f6:d9:c9 rejected 2.4GHz band (code: 7) [I] Nov 13 17:42:38 ipsec: 13[IKE] retransmit 3 of request with message ID 73 [I] Nov 13 17:42:48 ipsec: 06[IKE] retransmit 4 of request with message ID 73 [I] Nov 13 17:42:56 bndstrg: band steering: send BTM request to e6:29:c0:f6:d9:c9 for roam to 2.4GHz band (Low RSSI: -81) [W] Nov 13 17:42:57 bndstrg: band steering: WNM client e6:29:c0:f6:d9:c9 rejected 2.4GHz band (code: 7) [I] Nov 13 17:43:00 ipsec: 12[IKE] retransmit 5 of request with message ID 73 [I] Nov 13 17:43:13 ipsec: 06[IKE] retransmit 6 of request with message ID 73 [I] Nov 13 17:43:20 ipsec: 06[IKE] received DELETE for ESP CHILD_SA with SPI ab943318 [I] Nov 13 17:43:20 ipsec: 06[IKE] closing CHILD_SA VirtualIPServerIKE2{163} with SPIs c5e31428_i (2851 bytes) ab943318_o (1865 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 [I] Nov 13 17:43:20 ipsec: 06[IKE] sending DELETE for ESP CHILD_SA with SPI c5e31428 [I] Nov 13 17:43:20 ipsec: 06[IKE] CHILD_SA closed [W] Nov 13 17:43:20 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "urist" @ "192.168.1.43" from "81.211.81.53" disconnected. [I] Nov 13 17:43:20 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 17:43:20 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 17:43:27 ipsec: 07[IKE] retransmit 7 of request with message ID 73 [I] Nov 13 17:43:27 ipsec: 05[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 17:43:27 ipsec: 05[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 13 17:43:27 ipsec: 05[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 17:43:27 ipsec: 05[IKE] CHILD_SA VirtualIPServerIKE2{168} established with SPIs cb043b32_i 5c00efee_o and TS 0.0.0.0/0 === 172.20.8.2/32 [W] Nov 13 17:43:27 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist" @ "192.168.1.43" with IP "172.20.8.2" connected. [I] Nov 13 17:43:28 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 17:43:28 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 17:43:43 ipsec: 15[IKE] retransmit 8 of request with message ID 73 [I] Nov 13 17:44:00 ipsec: 01[IKE] giving up after 8 retransmits [E] Nov 13 17:44:00 ndm: IpSec::Configurator: "VirtualIPServerIKE2": remote peer is down. [W] Nov 13 17:44:00 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "metodist" @ "192.168.1.149" from "188.64.164.33" disconnected. [I] Nov 13 17:44:00 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 17:44:00 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 17:44:51 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.226 from 1a:93:23:9b:a4:f5. [I] Nov 13 17:44:51 ndhcps: sending ACK of 172.16.1.226 to 1a:93:23:9b:a4:f5. [I] Nov 13 17:44:54 dropbear: Exit before auth from <156.194.88.157:38936>: Timeout before auth [I] Nov 13 17:45:38 ndm: Netfilter::Util::BfdManager: "Ssh": unban remote host 217.144.185.121. [I] Nov 13 17:45:38 dropbear: Child connection from 217.144.185.121:41296 [E] Nov 13 17:45:39 dropbear: Login attempt for nonexistent user 'user' [I] Nov 13 17:45:39 dropbear: Exit before auth from <217.144.185.121:41296>: Exited normally [I] Nov 13 17:45:39 dropbear: Child connection from 217.144.185.121:41310 [E] Nov 13 17:45:40 dropbear: Login attempt for nonexistent user 'user' [I] Nov 13 17:45:40 ndm: Netfilter::Util::Conntrack: flushed 899 IPv4 connections for 217.144.185.121. [I] Nov 13 17:45:40 ndm: Netfilter::Util::BfdManager: "Ssh": ban remote host 217.144.185.121 for 15 minutes. [I] Nov 13 17:48:10 ipsec: 08[IKE] received DELETE for ESP CHILD_SA with SPI 0858f1da [I] Nov 13 17:48:10 ipsec: 08[IKE] closing CHILD_SA VirtualIPServerIKE2{167} with SPIs cfcc5f62_i (21726 bytes) 0858f1da_o (2330 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 [I] Nov 13 17:48:10 ipsec: 08[IKE] sending DELETE for ESP CHILD_SA with SPI cfcc5f62 [I] Nov 13 17:48:10 ipsec: 08[IKE] CHILD_SA closed [W] Nov 13 17:48:10 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "metodist5" @ "192.168.0.4" from "92.100.219.255" disconnected. [I] Nov 13 17:48:10 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 17:48:10 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 17:48:18 ipsec: 10[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 17:48:18 ipsec: 10[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 13 17:48:18 ipsec: 10[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 17:48:18 ipsec: 10[IKE] CHILD_SA VirtualIPServerIKE2{169} established with SPIs cff00ae6_i 164d58b4_o and TS 0.0.0.0/0 === 172.20.8.2/32 [W] Nov 13 17:48:18 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "metodist5" @ "192.168.0.4" with IP "172.20.8.2" connected. [I] Nov 13 17:48:18 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 17:48:18 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 17:49:01 bndstrg: band steering: send BTM request to dc:21:5c:61:b4:6c for roam to 2.4GHz band (Low RSSI: -93) [I] Nov 13 17:49:13 bndstrg: Core::Syslog: last message repeated 2 times. [I] Nov 13 17:49:19 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(dc:21:5c:61:b4:6c) had been aged-out and disassociated (retransmits limit reached). [I] Nov 13 17:50:40 dropbear: Exit before auth from <217.144.185.121:41310>: Timeout before auth [I] Nov 13 17:51:27 ndm: Netfilter::Util::BfdManager: "Ssh": unban remote host 193.111.250.12. [I] Nov 13 17:52:26 dropbear: Child connection from 92.255.85.107:44593 [I] Nov 13 17:52:26 ndm: Core::Server: started Session /var/run/ndm.core.socket. [E] Nov 13 17:52:26 ndm: Core::Authenticator: user "admin": invalid password. [E] Nov 13 17:52:28 ndm: Core::Authenticator: access to "sftp" denied for user "admin". [W] Nov 13 17:52:28 dropbear: Bad password attempt for 'admin' from 92.255.85.107:44593 [I] Nov 13 17:52:28 ndm: Core::Session: client disconnected. [I] Nov 13 17:52:28 dropbear: Exit before auth from <92.255.85.107:44593>: (user 'admin', 1 fails): Error reading: Connection reset by peer [I] Nov 13 17:52:55 ipsec: 05[IKE] received DELETE for ESP CHILD_SA with SPI ec63e890 [I] Nov 13 17:52:55 ipsec: 05[IKE] closing CHILD_SA VirtualIPServerIKE2{166} with SPIs c3a95a55_i (37304 bytes) ec63e890_o (7919 bytes) and TS 0.0.0.0/0 === 172.20.8.3/32 [I] Nov 13 17:52:55 ipsec: 05[IKE] sending DELETE for ESP CHILD_SA with SPI c3a95a55 [I] Nov 13 17:52:55 ipsec: 05[IKE] CHILD_SA closed [W] Nov 13 17:52:55 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected. [I] Nov 13 17:52:55 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 17:52:55 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 17:52:59 ipsec: 10[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 17:52:59 ipsec: 10[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 13 17:52:59 ipsec: 10[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 17:52:59 ipsec: 10[IKE] CHILD_SA VirtualIPServerIKE2{170} established with SPIs cdfd51ca_i 533b2282_o and TS 0.0.0.0/0 === 172.20.8.3/32 [W] Nov 13 17:52:59 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.3" connected. [I] Nov 13 17:52:59 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 17:52:59 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 17:53:08 ipsec: 01[IKE] received DELETE for ESP CHILD_SA with SPI 5c00efee [I] Nov 13 17:53:08 ipsec: 01[IKE] closing CHILD_SA VirtualIPServerIKE2{168} with SPIs cb043b32_i (141980 bytes) 5c00efee_o (3284374 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 [I] Nov 13 17:53:08 ipsec: 01[IKE] sending DELETE for ESP CHILD_SA with SPI cb043b32 [I] Nov 13 17:53:08 ipsec: 01[IKE] CHILD_SA closed [W] Nov 13 17:53:08 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "urist" @ "192.168.1.43" from "81.211.81.53" disconnected. [I] Nov 13 17:53:08 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 17:53:09 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 17:54:11 ipsec: 12[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 17:54:11 ipsec: 12[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 13 17:54:11 ipsec: 12[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 17:54:11 ipsec: 12[IKE] CHILD_SA VirtualIPServerIKE2{171} established with SPIs c648638f_i 2255a7d2_o and TS 0.0.0.0/0 === 172.20.8.2/32 [W] Nov 13 17:54:11 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist" @ "192.168.1.43" with IP "172.20.8.2" connected. [I] Nov 13 17:54:11 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 17:54:11 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 17:57:02 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(a6:32:ae:ea:f9:96) had been aged-out and disassociated (idle silence). [I] Nov 13 17:57:41 ipsec: 05[IKE] received DELETE for ESP CHILD_SA with SPI 164d58b4 [I] Nov 13 17:57:41 ipsec: 05[IKE] closing CHILD_SA VirtualIPServerIKE2{169} with SPIs cff00ae6_i (20502 bytes) 164d58b4_o (5076 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 [I] Nov 13 17:57:41 ipsec: 05[IKE] sending DELETE for ESP CHILD_SA with SPI cff00ae6 [I] Nov 13 17:57:41 ipsec: 05[IKE] CHILD_SA closed [W] Nov 13 17:57:41 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "metodist5" @ "192.168.0.4" from "92.100.219.255" disconnected. [I] Nov 13 17:57:41 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 17:57:41 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 17:57:41 ipsec: 07[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 17:57:41 ipsec: 07[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 13 17:57:41 ipsec: 07[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 17:57:41 ipsec: 07[IKE] CHILD_SA VirtualIPServerIKE2{172} established with SPIs c0f17a7f_i 2fbce3ee_o and TS 0.0.0.0/0 === 172.20.8.2/32 [W] Nov 13 17:57:41 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "metodist5" @ "192.168.0.4" with IP "172.20.8.2" connected. [I] Nov 13 17:57:42 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 17:57:42 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 17:57:59 ipsec: 10[IKE] received DELETE for ESP CHILD_SA with SPI 533b2282 [I] Nov 13 17:57:59 ipsec: 10[IKE] closing CHILD_SA VirtualIPServerIKE2{170} with SPIs cdfd51ca_i (7052 bytes) 533b2282_o (0 bytes) and TS 0.0.0.0/0 === 172.20.8.3/32 [I] Nov 13 17:57:59 ipsec: 10[IKE] sending DELETE for ESP CHILD_SA with SPI cdfd51ca [I] Nov 13 17:57:59 ipsec: 10[IKE] CHILD_SA closed [W] Nov 13 17:57:59 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected. [I] Nov 13 17:57:59 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 17:57:59 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 17:58:03 ipsec: 11[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 17:58:03 ipsec: 11[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 13 17:58:03 ipsec: 11[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 17:58:03 ipsec: 11[IKE] CHILD_SA VirtualIPServerIKE2{173} established with SPIs c69cc03c_i b8e4854e_o and TS 0.0.0.0/0 === 172.20.8.3/32 [W] Nov 13 17:58:04 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.3" connected. [I] Nov 13 17:58:04 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 17:58:04 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 17:58:45 ipsec: 12[IKE] received DELETE for ESP CHILD_SA with SPI 3fd96792 [I] Nov 13 17:58:45 ipsec: 12[IKE] closing CHILD_SA VirtualIPServerIKE2{162} with SPIs c4d2d504_i (190954 bytes) 3fd96792_o (1294182 bytes) and TS 0.0.0.0/0 === 172.20.8.4/32 [I] Nov 13 17:58:45 ipsec: 12[IKE] sending DELETE for ESP CHILD_SA with SPI c4d2d504 [I] Nov 13 17:58:45 ipsec: 12[IKE] CHILD_SA closed [W] Nov 13 17:58:45 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "rtk" @ "192.168.0.102" from "91.245.145.177" disconnected. [I] Nov 13 17:58:45 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 17:58:45 ipsec: 15[IKE] received DELETE for IKE_SA VirtualIPServerIKE2[56] [I] Nov 13 17:58:45 ipsec: 15[IKE] deleting IKE_SA VirtualIPServerIKE2[56] between 213.33.195.46[sakdjfwelfwe.keenetic.link]...91.245.145.177[192.168.0.102] [I] Nov 13 17:58:45 ipsec: 15[IKE] IKE_SA deleted [I] Nov 13 17:58:45 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 17:59:11 ipsec: 13[IKE] received DELETE for ESP CHILD_SA with SPI 2255a7d2 [I] Nov 13 17:59:11 ipsec: 13[IKE] closing CHILD_SA VirtualIPServerIKE2{171} with SPIs c648638f_i (3831 bytes) 2255a7d2_o (0 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 [I] Nov 13 17:59:11 ipsec: 13[IKE] sending DELETE for ESP CHILD_SA with SPI c648638f [I] Nov 13 17:59:11 ipsec: 13[IKE] CHILD_SA closed [W] Nov 13 17:59:11 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "urist" @ "192.168.1.43" from "81.211.81.53" disconnected. [I] Nov 13 17:59:11 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 17:59:11 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 17:59:20 ipsec: 14[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 17:59:20 ipsec: 14[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 13 17:59:20 ipsec: 14[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 17:59:20 ipsec: 14[IKE] CHILD_SA VirtualIPServerIKE2{174} established with SPIs c1df4731_i 3d63a076_o and TS 0.0.0.0/0 === 172.20.8.2/32 [W] Nov 13 17:59:20 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist" @ "192.168.1.43" with IP "172.20.8.2" connected. [I] Nov 13 17:59:20 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 17:59:20 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 18:00:00 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(7e:fb:25:d2:79:ed) had been aged-out and disassociated (idle silence). [I] Nov 13 18:00:01 ipsec: 09[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 18:00:01 ipsec: 09[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 13 18:00:01 ipsec: 09[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 18:00:01 ipsec: 09[IKE] inbound CHILD_SA VirtualIPServerIKE2{175} established with SPIs c7f7f636_i 05002f00_o and TS 0.0.0.0/0 === 172.20.8.7/32 [W] Nov 13 18:00:01 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "urist3" @ "192.168.1.75" from "81.211.81.53" disconnected. [W] Nov 13 18:00:01 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist3" @ "192.168.1.75" with IP "172.20.8.7" connected. [I] Nov 13 18:00:01 ipsec: 08[IKE] received DELETE for ESP CHILD_SA with SPI 023e626e [I] Nov 13 18:00:01 ipsec: 08[IKE] closing CHILD_SA VirtualIPServerIKE2{152} with SPIs c603aa50_i (1065027 bytes) 023e626e_o (2748218 bytes) and TS 0.0.0.0/0 === 172.20.8.7/32 [I] Nov 13 18:00:01 ipsec: 08[IKE] sending DELETE for ESP CHILD_SA with SPI c603aa50 [I] Nov 13 18:00:01 ipsec: 08[IKE] CHILD_SA closed [I] Nov 13 18:00:01 ipsec: 08[IKE] outbound CHILD_SA VirtualIPServerIKE2{175} established with SPIs c7f7f636_i 05002f00_o and TS 0.0.0.0/0 === 172.20.8.7/32 [I] Nov 13 18:00:01 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 18:00:01 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 18:00:40 ndm: Netfilter::Util::BfdManager: "Ssh": unban remote host 217.144.185.121. [I] Nov 13 18:00:40 dropbear: Child connection from 217.144.185.121:46890 [E] Nov 13 18:00:41 dropbear: Login attempt for nonexistent user 'user' [I] Nov 13 18:00:41 dropbear: Exit before auth from <217.144.185.121:46890>: Exited normally [I] Nov 13 18:00:41 dropbear: Child connection from 217.144.185.121:46896 [E] Nov 13 18:00:42 dropbear: Login attempt for nonexistent user 'user' [I] Nov 13 18:00:42 ndm: Netfilter::Util::Conntrack: flushed 843 IPv4 connections for 217.144.185.121. [I] Nov 13 18:00:42 ndm: Netfilter::Util::BfdManager: "Ssh": ban remote host 217.144.185.121 for 15 minutes. [I] Nov 13 18:01:47 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.173 from 00:0b:82:96:00:d1. [I] Nov 13 18:01:47 ndhcps: sending ACK of 172.16.1.173 to 00:0b:82:96:00:d1. [I] Nov 13 18:02:02 ipsec: 09[IKE] retransmit 1 of request with message ID 13 [I] Nov 13 18:03:04 ipsec: 08[IKE] received DELETE for ESP CHILD_SA with SPI b8e4854e [I] Nov 13 18:03:04 ipsec: 08[IKE] closing CHILD_SA VirtualIPServerIKE2{173} with SPIs c69cc03c_i (3545 bytes) b8e4854e_o (0 bytes) and TS 0.0.0.0/0 === 172.20.8.3/32 [I] Nov 13 18:03:04 ipsec: 08[IKE] sending DELETE for ESP CHILD_SA with SPI c69cc03c [I] Nov 13 18:03:04 ipsec: 08[IKE] CHILD_SA closed [W] Nov 13 18:03:04 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected. [I] Nov 13 18:03:04 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 18:03:04 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 18:03:06 ipsec: 13[IKE] received DELETE for ESP CHILD_SA with SPI 2fbce3ee [I] Nov 13 18:03:06 ipsec: 13[IKE] closing CHILD_SA VirtualIPServerIKE2{172} with SPIs c0f17a7f_i (22430 bytes) 2fbce3ee_o (4376 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 [I] Nov 13 18:03:06 ipsec: 13[IKE] sending DELETE for ESP CHILD_SA with SPI c0f17a7f [I] Nov 13 18:03:06 ipsec: 13[IKE] CHILD_SA closed [W] Nov 13 18:03:06 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "metodist5" @ "192.168.0.4" from "92.100.219.255" disconnected. [I] Nov 13 18:03:06 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 18:03:06 ipsec: 09[IKE] received DELETE for IKE_SA VirtualIPServerIKE2[76] [I] Nov 13 18:03:06 ipsec: 09[IKE] deleting IKE_SA VirtualIPServerIKE2[76] between 213.33.195.46[sakdjfwelfwe.keenetic.link]...92.100.219.255[192.168.0.4] [I] Nov 13 18:03:06 ipsec: 09[IKE] IKE_SA deleted [I] Nov 13 18:03:06 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 18:03:07 ipsec: 07[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID [I] Nov 13 18:03:07 ipsec: 07[IKE] received MS-Negotiation Discovery Capable vendor ID [I] Nov 13 18:03:07 ipsec: 07[IKE] received Vid-Initial-Contact vendor ID [I] Nov 13 18:03:07 ipsec: 07[IKE] 92.100.219.255 is initiating an IKE_SA [I] Nov 13 18:03:07 ipsec: 07[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=256/ [...] [I] Nov 13 18:03:07 ipsec: 07[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256 [I] Nov 13 18:03:07 ipsec: 07[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024 [I] Nov 13 18:03:07 ipsec: 07[IKE] remote host is behind NAT [I] Nov 13 18:03:07 ipsec: 01[IKE] received 46 cert requests for an unknown ca [I] Nov 13 18:03:07 ipsec: 01[CFG] looking for peer configs matching 213.33.195.46[%any]...92.100.219.255[192.168.0.4] [I] Nov 13 18:03:07 ipsec: 01[CFG] selected peer config 'VirtualIPServerIKE2' [I] Nov 13 18:03:07 ipsec: 01[IKE] initiating EAP_IDENTITY method (id 0x00) [I] Nov 13 18:03:07 ipsec: 01[IKE] peer supports MOBIKE [I] Nov 13 18:03:08 ipsec: 01[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with RSA signature successful [I] Nov 13 18:03:08 ipsec: 01[IKE] sending end entity cert "CN=sakdjfwelfwe.keenetic.link" [I] Nov 13 18:03:08 ipsec: 01[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R10" [I] Nov 13 18:03:08 ipsec: 08[IKE] received EAP identity 'metodist5' [I] Nov 13 18:03:08 ipsec: 08[IKE] initiating EAP_MSCHAPV2 method (id 0xF5) [I] Nov 13 18:03:08 ipsec: 13[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established [I] Nov 13 18:03:08 ipsec: 07[IKE] authentication of '192.168.0.4' with EAP successful [I] Nov 13 18:03:08 ipsec: 07[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with EAP [I] Nov 13 18:03:08 ipsec: 07[IKE] IKE_SA VirtualIPServerIKE2[77] established between 213.33.195.46[sakdjfwelfwe.keenetic.link]...92.100.219.255[192.168.0.4] [I] Nov 13 18:03:08 ipsec: 07[IKE] peer requested virtual IP %any [I] Nov 13 18:03:08 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Nov 13 18:03:08 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": allocated address "172.20.8.1" for user "metodist5" @ "192.168.0.4" from "92.100.219.255". [I] Nov 13 18:03:08 ndm: Core::Session: client disconnected. [I] Nov 13 18:03:08 ipsec: 07[IKE] assigning virtual IP 172.20.8.1 to peer 'metodist5' [I] Nov 13 18:03:08 ipsec: 07[IKE] peer requested virtual IP %any6 [I] Nov 13 18:03:08 ipsec: 07[IKE] no virtual IP found for %any6 requested by 'metodist5' [I] Nov 13 18:03:08 ipsec: 07[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 18:03:08 ipsec: 07[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 13 18:03:08 ipsec: 07[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 18:03:08 ipsec: 07[IKE] CHILD_SA VirtualIPServerIKE2{176} established with SPIs c359406a_i bcd5e168_o and TS 0.0.0.0/0 === 172.20.8.1/32 [W] Nov 13 18:03:08 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "metodist5" @ "192.168.0.4" with IP "172.20.8.1" connected. [I] Nov 13 18:03:08 ipsec: 07[CFG] scheduling RADIUS Interim-Updates every 5s [I] Nov 13 18:03:08 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 18:03:08 ndhcps: DHCPINFORM received for 172.20.8.1 from 00:00:00:00:00:00. [I] Nov 13 18:03:08 ndhcps: sending INFORM to 00:00:00:00:00:00. [I] Nov 13 18:03:08 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 18:03:09 ipsec: 06[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 18:03:09 ipsec: 06[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 13 18:03:09 ipsec: 06[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 18:03:09 ipsec: 06[IKE] CHILD_SA VirtualIPServerIKE2{177} established with SPIs c2ace520_i 7df09d4c_o and TS 0.0.0.0/0 === 172.20.8.3/32 [W] Nov 13 18:03:09 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.3" connected. [I] Nov 13 18:03:09 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 18:03:09 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 18:05:42 dropbear: Exit before auth from <217.144.185.121:46896>: Timeout before auth [I] Nov 13 18:06:04 ipsec: 05[IKE] retransmit 1 of request with message ID 2 [I] Nov 13 18:07:04 ipsec: 12[IKE] retransmit 1 of request with message ID 3 [I] Nov 13 18:08:09 ipsec: 10[IKE] received DELETE for ESP CHILD_SA with SPI 7df09d4c [I] Nov 13 18:08:09 ipsec: 10[IKE] closing CHILD_SA VirtualIPServerIKE2{177} with SPIs c2ace520_i (11823 bytes) 7df09d4c_o (0 bytes) and TS 0.0.0.0/0 === 172.20.8.3/32 [I] Nov 13 18:08:09 ipsec: 10[IKE] sending DELETE for ESP CHILD_SA with SPI c2ace520 [I] Nov 13 18:08:09 ipsec: 10[IKE] CHILD_SA closed [W] Nov 13 18:08:09 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected. [I] Nov 13 18:08:09 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 18:08:09 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 18:08:21 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(30:07:4d:70:2d:ed) had been aged-out and disassociated (idle silence). [I] Nov 13 18:08:21 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(e6:29:c0:f6:d9:c9) had been aged-out and disassociated (idle silence). [I] Nov 13 18:09:09 ipsec: 09[IKE] retransmit 1 of request with message ID 6 [I] Nov 13 18:09:44 ipsec: 07[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 18:09:44 ipsec: 07[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 13 18:09:44 ipsec: 07[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 18:09:44 ipsec: 07[IKE] CHILD_SA VirtualIPServerIKE2{178} established with SPIs c4315ba6_i fdea3744_o and TS 0.0.0.0/0 === 172.20.8.3/32 [W] Nov 13 18:09:44 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.3" connected. [I] Nov 13 18:09:44 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 18:09:44 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 18:10:31 ipsec: 10[IKE] retransmit 1 of request with message ID 7 [I] Nov 13 18:11:24 ipsec: 15[IKE] retransmit 1 of request with message ID 8 [I] Nov 13 18:11:45 dropbear: Child connection from 137.184.179.251:6116 [I] Nov 13 18:11:48 dropbear: Exit before auth from <137.184.179.251:6116>: Unexpected packet type 20, expected 21 [I] Nov 13 18:12:18 dropbear: Child connection from 8.221.136.6:56344 [I] Nov 13 18:12:21 dropbear: Exit before auth from <8.221.136.6:56344>: Exited normally [I] Nov 13 18:12:21 dropbear: Child connection from 8.221.136.6:56360 [E] Nov 13 18:12:22 dropbear: Login attempt for nonexistent user '' [I] Nov 13 18:12:22 dropbear: Exit before auth from <8.221.136.6:56360>: Exited normally [I] Nov 13 18:13:07 ipsec: 14[IKE] received DELETE for ESP CHILD_SA with SPI 3d63a076 [I] Nov 13 18:13:07 ipsec: 14[IKE] closing CHILD_SA VirtualIPServerIKE2{174} with SPIs c1df4731_i (4226 bytes) 3d63a076_o (4265 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 [I] Nov 13 18:13:07 ipsec: 14[IKE] sending DELETE for ESP CHILD_SA with SPI c1df4731 [I] Nov 13 18:13:07 ipsec: 14[IKE] CHILD_SA closed [W] Nov 13 18:13:07 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "urist" @ "192.168.1.43" from "81.211.81.53" disconnected. [I] Nov 13 18:13:08 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 18:13:08 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 18:13:24 ipsec: 08[IKE] retransmit 1 of request with message ID 9 [I] Nov 13 18:14:18 ipsec: 15[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 18:14:18 ipsec: 15[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 13 18:14:18 ipsec: 15[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 18:14:18 ipsec: 15[IKE] CHILD_SA VirtualIPServerIKE2{179} established with SPIs c9591dd9_i 0afcc81e_o and TS 0.0.0.0/0 === 172.20.8.2/32 [W] Nov 13 18:14:18 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist" @ "192.168.1.43" with IP "172.20.8.2" connected. [I] Nov 13 18:14:18 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 18:14:18 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 18:14:44 ipsec: 08[IKE] received DELETE for ESP CHILD_SA with SPI fdea3744 [I] Nov 13 18:14:44 ipsec: 08[IKE] closing CHILD_SA VirtualIPServerIKE2{178} with SPIs c4315ba6_i (12815 bytes) fdea3744_o (0 bytes) and TS 0.0.0.0/0 === 172.20.8.3/32 [I] Nov 13 18:14:44 ipsec: 08[IKE] sending DELETE for ESP CHILD_SA with SPI c4315ba6 [I] Nov 13 18:14:44 ipsec: 08[IKE] CHILD_SA closed [W] Nov 13 18:14:44 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected. [I] Nov 13 18:14:44 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 18:14:44 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 18:14:47 ipsec: 13[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 18:14:47 ipsec: 13[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 13 18:14:47 ipsec: 13[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 18:14:47 ipsec: 13[IKE] CHILD_SA VirtualIPServerIKE2{180} established with SPIs c614e246_i 47071e16_o and TS 0.0.0.0/0 === 172.20.8.3/32 [W] Nov 13 18:14:47 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.3" connected. [I] Nov 13 18:14:47 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 18:14:47 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 18:15:42 ndm: Netfilter::Util::BfdManager: "Ssh": unban remote host 217.144.185.121. [I] Nov 13 18:15:42 dropbear: Child connection from 217.144.185.121:52034 [E] Nov 13 18:15:43 dropbear: Login attempt for nonexistent user 'user' [I] Nov 13 18:15:43 dropbear: Exit before auth from <217.144.185.121:52034>: Exited normally [I] Nov 13 18:15:43 dropbear: Child connection from 217.144.185.121:52036 [E] Nov 13 18:15:44 dropbear: Login attempt for nonexistent user 'user' [I] Nov 13 18:15:44 ndm: Netfilter::Util::Conntrack: flushed 826 IPv4 connections for 217.144.185.121. [I] Nov 13 18:15:44 ndm: Netfilter::Util::BfdManager: "Ssh": ban remote host 217.144.185.121 for 15 minutes. [I] Nov 13 18:19:48 ipsec: 15[IKE] received DELETE for ESP CHILD_SA with SPI 47071e16 [I] Nov 13 18:19:48 ipsec: 15[IKE] closing CHILD_SA VirtualIPServerIKE2{180} with SPIs c614e246_i (2852 bytes) 47071e16_o (0 bytes) and TS 0.0.0.0/0 === 172.20.8.3/32 [I] Nov 13 18:19:48 ipsec: 15[IKE] sending DELETE for ESP CHILD_SA with SPI c614e246 [I] Nov 13 18:19:48 ipsec: 15[IKE] CHILD_SA closed [W] Nov 13 18:19:48 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected. [I] Nov 13 18:19:48 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 18:19:48 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 18:19:53 ipsec: 09[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 18:19:53 ipsec: 09[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 13 18:19:53 ipsec: 09[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 18:19:53 ipsec: 09[IKE] CHILD_SA VirtualIPServerIKE2{181} established with SPIs cb6744af_i 27441e3e_o and TS 0.0.0.0/0 === 172.20.8.3/32 [W] Nov 13 18:19:53 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.3" connected. [I] Nov 13 18:19:54 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 18:19:54 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 18:20:44 dropbear: Exit before auth from <217.144.185.121:52036>: Timeout before auth [I] Nov 13 18:23:05 ipsec: 09[IKE] retransmit 1 of request with message ID 22 [I] Nov 13 18:24:54 ipsec: 09[IKE] received DELETE for ESP CHILD_SA with SPI 27441e3e [I] Nov 13 18:24:54 ipsec: 09[IKE] closing CHILD_SA VirtualIPServerIKE2{181} with SPIs cb6744af_i (12151 bytes) 27441e3e_o (0 bytes) and TS 0.0.0.0/0 === 172.20.8.3/32 [I] Nov 13 18:24:54 ipsec: 09[IKE] sending DELETE for ESP CHILD_SA with SPI cb6744af [I] Nov 13 18:24:54 ipsec: 09[IKE] CHILD_SA closed [W] Nov 13 18:24:54 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected. [I] Nov 13 18:24:54 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 18:24:54 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 18:25:00 ipsec: 10[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 18:25:00 ipsec: 10[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 13 18:25:00 ipsec: 10[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 18:25:00 ipsec: 10[IKE] CHILD_SA VirtualIPServerIKE2{182} established with SPIs cc4aba3a_i 821e44b2_o and TS 0.0.0.0/0 === 172.20.8.3/32 [W] Nov 13 18:25:00 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.3" connected. [I] Nov 13 18:25:00 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 18:25:00 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 18:25:53 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(de:3d:ae:ae:55:84) had been aged-out and disassociated (idle silence). [I] Nov 13 18:26:41 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(62:b2:12:d5:da:d2) had been aged-out and disassociated (idle silence). [I] Nov 13 18:27:52 ipsec: 15[IKE] received DELETE for IKE_SA VirtualIPServerIKE2[75] [I] Nov 13 18:27:52 ipsec: 15[IKE] deleting IKE_SA VirtualIPServerIKE2[75] between 213.33.195.46[sakdjfwelfwe.keenetic.link]...81.211.81.53[192.168.1.98] [I] Nov 13 18:27:52 ipsec: 15[IKE] IKE_SA deleted [W] Nov 13 18:27:52 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected. [I] Nov 13 18:27:52 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 18:27:52 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 18:30:44 ndm: Netfilter::Util::BfdManager: "Ssh": unban remote host 217.144.185.121. [I] Nov 13 18:30:44 dropbear: Child connection from 92.255.85.253:61958 [I] Nov 13 18:30:44 ndm: Core::Server: started Session /var/run/ndm.core.socket. [E] Nov 13 18:30:44 ndm: Core::Authenticator: user "admin": invalid password. [I] Nov 13 18:30:44 dropbear: Child connection from 217.144.185.121:46404 [E] Nov 13 18:30:45 dropbear: Login attempt for nonexistent user 'user' [I] Nov 13 18:30:45 dropbear: Exit before auth from <217.144.185.121:46404>: Exited normally [I] Nov 13 18:30:45 dropbear: Child connection from 217.144.185.121:53362 [E] Nov 13 18:30:45 ndm: Core::Authenticator: access to "sftp" denied for user "admin". [W] Nov 13 18:30:45 dropbear: Bad password attempt for 'admin' from 92.255.85.253:61958 [E] Nov 13 18:30:46 dropbear: Login attempt for nonexistent user 'user' [I] Nov 13 18:30:46 ndm: Netfilter::Util::Conntrack: flushed 433 IPv4 connections for 217.144.185.121. [I] Nov 13 18:30:46 ndm: Netfilter::Util::BfdManager: "Ssh": ban remote host 217.144.185.121 for 15 minutes. [I] Nov 13 18:30:46 ndm: Core::Session: client disconnected. [I] Nov 13 18:30:46 dropbear: Exit before auth from <92.255.85.253:61958>: (user 'admin', 1 fails): Error reading: Connection reset by peer [I] Nov 13 18:31:09 dropbear: Child connection from 66.240.192.85:44171 [I] Nov 13 18:31:10 dropbear: Exit before auth from <66.240.192.85:44171>: Error reading: Connection reset by peer [I] Nov 13 18:32:24 ipsec: 07[IKE] received DELETE for ESP CHILD_SA with SPI 0afcc81e [I] Nov 13 18:32:24 ipsec: 07[IKE] closing CHILD_SA VirtualIPServerIKE2{179} with SPIs c9591dd9_i (4329 bytes) 0afcc81e_o (5544 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 [I] Nov 13 18:32:24 ipsec: 07[IKE] sending DELETE for ESP CHILD_SA with SPI c9591dd9 [I] Nov 13 18:32:24 ipsec: 07[IKE] CHILD_SA closed [W] Nov 13 18:32:24 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "urist" @ "192.168.1.43" from "81.211.81.53" disconnected. [I] Nov 13 18:32:24 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 18:32:24 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 18:32:43 dropbear: Child connection from 92.255.85.107:10454 [I] Nov 13 18:32:43 ndm: Core::Server: started Session /var/run/ndm.core.socket. [E] Nov 13 18:32:43 ndm: Core::Authenticator: user "admin": invalid password. [E] Nov 13 18:32:44 ndm: Core::Authenticator: access to "sftp" denied for user "admin". [W] Nov 13 18:32:44 dropbear: Bad password attempt for 'admin' from 92.255.85.107:10454 [I] Nov 13 18:32:45 ndm: Core::Session: client disconnected. [I] Nov 13 18:32:45 dropbear: Exit before auth from <92.255.85.107:10454>: (user 'admin', 1 fails): Error reading: Connection reset by peer [I] Nov 13 18:33:09 ipsec: 13[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 18:33:09 ipsec: 13[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 13 18:33:09 ipsec: 13[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 18:33:09 ipsec: 13[IKE] CHILD_SA VirtualIPServerIKE2{183} established with SPIs cae7e783_i a0b79e22_o and TS 0.0.0.0/0 === 172.20.8.2/32 [W] Nov 13 18:33:09 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist" @ "192.168.1.43" with IP "172.20.8.2" connected. [I] Nov 13 18:33:09 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 18:33:09 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 18:35:46 dropbear: Exit before auth from <217.144.185.121:53362>: Timeout before auth [I] Nov 13 18:38:09 ipsec: 09[IKE] received DELETE for ESP CHILD_SA with SPI a0b79e22 [I] Nov 13 18:38:09 ipsec: 09[IKE] closing CHILD_SA VirtualIPServerIKE2{183} with SPIs cae7e783_i (1947 bytes) a0b79e22_o (0 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 [I] Nov 13 18:38:09 ipsec: 09[IKE] sending DELETE for ESP CHILD_SA with SPI cae7e783 [I] Nov 13 18:38:09 ipsec: 09[IKE] CHILD_SA closed [W] Nov 13 18:38:09 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "urist" @ "192.168.1.43" from "81.211.81.53" disconnected. [I] Nov 13 18:38:09 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 18:38:09 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 18:38:21 ipsec: 15[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 18:38:21 ipsec: 15[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 13 18:38:21 ipsec: 15[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 18:38:21 ipsec: 15[IKE] CHILD_SA VirtualIPServerIKE2{184} established with SPIs cec127c1_i 977074ba_o and TS 0.0.0.0/0 === 172.20.8.2/32 [W] Nov 13 18:38:21 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist" @ "192.168.1.43" with IP "172.20.8.2" connected. [I] Nov 13 18:38:21 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 18:38:21 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 18:41:10 ipsec: 14[IKE] retransmit 1 of request with message ID 36 [I] Nov 13 18:42:12 dropbear: Child connection from 81.161.238.160:50038 [I] Nov 13 18:42:16 ndm: Core::Server: started Session /var/run/ndm.core.socket. [E] Nov 13 18:42:16 ndm: Core::Authenticator: access to "cli" denied for user "root". [E] Nov 13 18:42:16 ndm: Core::Authenticator: access to "sftp" denied for user "root". [W] Nov 13 18:42:16 dropbear: Bad password attempt for 'root' from 81.161.238.160:50038 [I] Nov 13 18:42:16 ndm: Core::Session: client disconnected. [I] Nov 13 18:42:17 dropbear: Exit before auth from <81.161.238.160:50038>: (user 'root', 1 fails): Exited normally [I] Nov 13 18:43:21 ipsec: 10[IKE] received DELETE for ESP CHILD_SA with SPI 977074ba [I] Nov 13 18:43:21 ipsec: 10[IKE] closing CHILD_SA VirtualIPServerIKE2{184} with SPIs cec127c1_i (653 bytes) 977074ba_o (0 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 [I] Nov 13 18:43:21 ipsec: 10[IKE] sending DELETE for ESP CHILD_SA with SPI cec127c1 [I] Nov 13 18:43:21 ipsec: 10[IKE] CHILD_SA closed [W] Nov 13 18:43:21 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "urist" @ "192.168.1.43" from "81.211.81.53" disconnected. [I] Nov 13 18:43:21 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 18:43:21 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 18:43:29 ipsec: 06[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 18:43:29 ipsec: 06[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ [I] Nov 13 18:43:29 ipsec: 06[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ [I] Nov 13 18:43:29 ipsec: 06[IKE] CHILD_SA VirtualIPServerIKE2{185} established with SPIs c8c0d598_i b5f56422_o and TS 0.0.0.0/0 === 172.20.8.2/32 [W] Nov 13 18:43:29 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist" @ "192.168.1.43" with IP "172.20.8.2" connected. [I] Nov 13 18:43:29 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 18:43:29 ndm: IpSec::Netfilter: netfilter configuration reloading is done. [I] Nov 13 18:43:56 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.160 from 00:17:c8:ba:be:b4. [I] Nov 13 18:43:57 ndhcps: sending ACK of 172.16.1.160 to 00:17:c8:ba:be:b4. [I] Nov 13 18:45:46 ndm: Netfilter::Util::BfdManager: "Ssh": unban remote host 217.144.185.121. [I] Nov 13 18:45:46 dropbear: Child connection from 217.144.185.121:42022 [E] Nov 13 18:45:47 dropbear: Login attempt for nonexistent user 'user' [I] Nov 13 18:45:47 dropbear: Exit before auth from <217.144.185.121:42022>: Exited normally [I] Nov 13 18:45:47 dropbear: Child connection from 217.144.185.121:42038 [E] Nov 13 18:45:48 dropbear: Login attempt for nonexistent user 'user' [I] Nov 13 18:45:48 ndm: Netfilter::Util::Conntrack: flushed 737 IPv4 connections for 217.144.185.121. [I] Nov 13 18:45:48 ndm: Netfilter::Util::BfdManager: "Ssh": ban remote host 217.144.185.121 for 15 minutes. [I] Nov 13 18:48:21 ipsec: 06[IKE] received DELETE for ESP CHILD_SA with SPI bcd5e168 [I] Nov 13 18:48:21 ipsec: 06[IKE] closing CHILD_SA VirtualIPServerIKE2{176} with SPIs c359406a_i (3828380 bytes) bcd5e168_o (11686654 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 [I] Nov 13 18:48:21 ipsec: 06[IKE] sending DELETE for ESP CHILD_SA with SPI c359406a [I] Nov 13 18:48:21 ipsec: 06[IKE] CHILD_SA closed [W] Nov 13 18:48:21 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "metodist5" @ "192.168.0.4" from "92.100.219.255" disconnected. [I] Nov 13 18:48:21 ndm: IpSec::Netfilter: start reloading netfilter configuration... [I] Nov 13 18:48:21 ndm: IpSec::Netfilter: netfilter configuration reloading is done. Edited 6 hours ago by ridervka Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.