#31
|
|||
|
|||
Re: дебаг
Alex Korchmar написал(а) к Sergey Anokhin в Feb 19 10:33:04 по местному времени:
From: Alex Korchmar <noreply@linux.e-moe.ru> Sergey Anokhin <Sergey.Anokhin@p999.f10.n5034.z2.fidonet.org> wrote: SA> я подозреваю в какой-то момент моргнула память или пул сломался SA> из-за паники, холд ресет и т.п. и вот оно починиться не может. SA> или может на сайте bug.freebsd.org написать? писать надо полюбому - где-то в ядре есть код, написанный мудаком, не проверяющим считанные с диска данные, прежде чем совать их в какие-то указатели. но для этого надо получить абсолютно понятную и воспроизводимую проблему, а не мильен разных. для начала - разориться таки на второй диск и побайтово скопировать этот пул. > Alex --- ifmail v.2.15dev5.4 |
#32
|
|||
|
|||
Re: дебаг
Sergey Anokhin написал(а) к All в Feb 19 10:20:01 по местному времени:
> Паникует на отладочной выдаче из-за options IPSEC_DEBUG в ядре. > Убери пока её из ядра и паниковать перестанет при остановке ракуна > по этой причине перестанет. попробовать можно, но как дебажить? оно не заводилось все равно: (pts/2)[root@server:/usr/obj/usr/src/amd64.amd64/sys/SERVER]# cat /var/log/racoon.log 2019-02-11 11:29:04: INFO: @(#)ipsec-tools 0.8.2 (http://ipsec-tools.sourceforge.net) 2019-02-11 11:29:04: INFO: @(#)This product linked OpenSSL 1.1.1a-freebsd 20 Nov 2018 (http://www.openssl.org/) 2019-02-11 11:29:04: INFO: Reading configuration from "/usr/local/etc/racoon/racoon.conf" 2019-02-11 11:29:04: INFO: 85.113.221.175[4500] used for NAT-T 2019-02-11 11:29:04: INFO: 85.113.221.175[4500] used as isakmp port (fd=4) 2019-02-11 11:29:04: INFO: 85.113.221.175[500] used as isakmp port (fd=5) 2019-02-11 11:29:32: INFO: respond new phase 1 negotiation: 85.113.221.175[500]<=>2.94.40.126[500] 2019-02-11 11:29:32: INFO: begin Identity Protection mode. 2019-02-11 11:29:32: INFO: received broken Microsoft ID: MS NT5 ISAKMPOAKLEY 2019-02-11 11:29:32: INFO: received Vendor ID: RFC 3947 2019-02-11 11:29:32: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02 2019-02-11 11:29:32: INFO: received Vendor ID: FRAGMENTATION 2019-02-11 11:29:32: [2.94.40.126] INFO: Selected NAT-T version: RFC 3947 2019-02-11 11:29:32: ERROR: invalid DН group 20. 2019-02-11 11:29:32: ERROR: invalid DН group 19. Feb 11 11:29:32 server racoon[11786]: phase1(ident R msg1): 0.000773 2019-02-11 11:29:34: NOTIFY: the packet is retransmitted by 2.94.40.126[500] (1). 2019-02-11 11:29:34: [85.113.221.175] INFO: Нashing 85.113.221.175[500] with algo #2 2019-02-11 11:29:34: INFO: NAT-D payload #0 verified 2019-02-11 11:29:34: [2.94.40.126] INFO: Нashing 2.94.40.126[500] with algo #2 2019-02-11 11:29:34: INFO: NAT-D payload #1 doesn't match 2019-02-11 11:29:34: INFO: NAT detected: PEER 2019-02-11 11:29:34: [2.94.40.126] INFO: Нashing 2.94.40.126[500] with algo #2 Feb 11 11:29:34 server racoon[11786]: oakleydhgenerate(MODP2048): 0.009921 2019-02-11 11:29:34: [85.113.221.175] INFO: Нashing 85.113.221.175[500] with algo #2 2019-02-11 11:29:34: INFO: Adding remote and local NAT-D payloads. Feb 11 11:29:34 server racoon[11786]: oakleydhcompute(MODP2048): 0.009789 Feb 11 11:29:34 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=64): 0.000034 Feb 11 11:29:34 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=273): 0.000007 2019-02-11 11:29:34: INFO: NAT-T: ports changed to: 2.94.40.126[4500]<->85.113.221.175[4500] Feb 11 11:29:34 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=293): 0.000007 Feb 11 11:29:34 server syslogd: last message repeated 1 times Feb 11 11:29:34 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=1): 0.000005 Feb 11 11:29:34 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=20): 0.000004 Feb 11 11:29:34 server racoon[11786]: phase1(ident R msg2): 0.072129 Feb 11 11:29:34 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=48): 0.000024 Feb 11 11:29:34 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=744): 0.000007 Feb 11 11:29:34 server racoon[11786]: oakleyvalidateauth(pre-shared key): 0.000024 2019-02-11 11:29:34: INFO: ISAKMP-SA established 85.113.221.175[4500]-2.94.40.126[4500] spi:db59961a6b1ec965:4050be33b9ea5086 Feb 11 11:29:34 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=744): 0.000006 Feb 11 11:29:34 server racoon[11786]: algoakley_encdefencrypt(aes klen=256 size=48): 0.000002 Feb 11 11:29:34 server racoon[11786]: phase1(ident R msg3): 0.000215 Feb 11 11:29:34 server racoon[11786]: phase1(Identity Protection): 2.207223 Feb 11 11:29:34 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=32): 0.000003 Feb 11 11:29:34 server racoon[11786]: algoakley_encdefencrypt(aes klen=256 size=64): 0.000002 2019-02-11 11:29:34: INFO: respond new phase 2 negotiation: 85.113.221.175[4500]<=>2.94.40.126[4500] 2019-02-11 11:29:34: INFO: no policy found, try to generate the policy : 2.94.40.126/32[1701] 85.113.221.175/32[1701] proto=udp dir=in reqid=0 Feb 11 11:29:34 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=304): 0.000009 2019-02-11 11:29:34: INFO: Adjusting my encmode UDP-Transport->Transport Feb 11 11:29:34 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=276): 0.000008 2019-02-11 11:29:34: INFO: Adjusting peer's encmode UDP-Transport(4)->Transport(2) 2019-02-11 11:29:34: WARNING: authtype mismatched: my:hmac-md5 peer:hmac-sha Feb 11 11:29:34 server racoon[11786]: phase2(???): 0.000463 Feb 11 11:29:34 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=188): 0.000005 Feb 11 11:29:34 server racoon[11786]: algoakley_encdefencrypt(aes klen=256 size=176): 0.000003 Feb 11 11:29:34 server racoon[11786]: phase2(quick R msg1): 0.000167 2019-02-11 11:29:34: ERROR: pfkey UPDATE failed: No such process 2019-02-11 11:29:34: INFO: IPsec-SA established: ESP 85.113.221.175[4500]->2.94.40.126[4500] spi=3498292410(0xd083b4ba) Feb 11 11:29:34 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=32): 0.000018 Feb 11 11:29:34 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=69): 0.000005 Feb 11 11:29:34 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=69): 0.000004 Feb 11 11:29:34 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=89): 0.000004 Feb 11 11:29:34 server syslogd: last message repeated 1 times Feb 11 11:29:34 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=69): 0.000004 Feb 11 11:29:34 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=89): 0.000003 Feb 11 11:29:34 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=89): 0.000004 Feb 11 11:29:34 server racoon[11786]: phase2(???): 0.000260 2019-02-11 11:30:04: ERROR: 2.94.40.126 give up to get IPsec-SA due to time up to wait. 2019-02-11 11:30:09: INFO: purged IPsec-SA proto_id=ESP spi=3498292410. Feb 11 11:30:09 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=48): 0.000008 Feb 11 11:30:09 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=20): 0.000007 2019-02-11 11:30:09: INFO: ISAKMP-SA expired 85.113.221.175[4500]-2.94.40.126[4500] spi:db59961a6b1ec965:4050be33b9ea5086 Feb 11 11:30:09 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=64): 0.000004 2019-02-11 11:30:09: INFO: ISAKMP-SA deleted 85.113.221.175[4500]-2.94.40.126[4500] spi:db59961a6b1ec965:4050be33b9ea5086 Feb 11 11:30:09 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=32): 0.000004 2019-02-11 11:30:42: INFO: respond new phase 1 negotiation: 85.113.221.175[500]<=>2.94.40.126[500] 2019-02-11 11:30:42: INFO: begin Identity Protection mode. 2019-02-11 11:30:42: INFO: received broken Microsoft ID: MS NT5 ISAKMPOAKLEY 2019-02-11 11:30:42: INFO: received Vendor ID: RFC 3947 2019-02-11 11:30:42: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02 2019-02-11 11:30:42: INFO: received Vendor ID: FRAGMENTATION 2019-02-11 11:30:42: [2.94.40.126] INFO: Selected NAT-T version: RFC 3947 2019-02-11 11:30:42: ERROR: invalid DН group 20. 2019-02-11 11:30:42: ERROR: invalid DН group 19. Feb 11 11:30:42 server racoon[11786]: phase1(ident R msg1): 0.000404 2019-02-11 11:30:44: NOTIFY: the packet is retransmitted by 2.94.40.126[500] (1). 2019-02-11 11:30:44: [85.113.221.175] INFO: Нashing 85.113.221.175[500] with algo #2 2019-02-11 11:30:44: INFO: NAT-D payload #0 verified 2019-02-11 11:30:44: [2.94.40.126] INFO: Нashing 2.94.40.126[500] with algo #2 2019-02-11 11:30:44: INFO: NAT-D payload #1 doesn't match 2019-02-11 11:30:44: INFO: NAT detected: PEER 2019-02-11 11:30:44: [2.94.40.126] INFO: Нashing 2.94.40.126[500] with algo #2 Feb 11 11:30:44 server racoon[11786]: oakleydhgenerate(MODP2048): 0.009808 2019-02-11 11:30:44: [85.113.221.175] INFO: Нashing 85.113.221.175[500] with algo #2 2019-02-11 11:30:44: INFO: Adding remote and local NAT-D payloads. Feb 11 11:30:44 server racoon[11786]: oakleydhcompute(MODP2048): 0.009764 Feb 11 11:30:44 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=64): 0.000008 Feb 11 11:30:44 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=273): 0.000005 Feb 11 11:30:44 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=293): 0.000005 Feb 11 11:30:44 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=293): 0.000004 Feb 11 11:30:44 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=1): 0.000004 Feb 11 11:30:44 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=20): 0.000003 Feb 11 11:30:44 server racoon[11786]: phase1(ident R msg2): 0.020479 2019-02-11 11:30:45: INFO: NAT-T: ports changed to: 2.94.40.126[4500]<->85.113.221.175[4500] Feb 11 11:30:45 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=48): 0.000008 Feb 11 11:30:45 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=744): 0.000012 Feb 11 11:30:45 server racoon[11786]: oakleyvalidateauth(pre-shared key): 0.000028 2019-02-11 11:30:45: INFO: ISAKMP-SA established 85.113.221.175[4500]-2.94.40.126[4500] spi:1b913044ad40a821:f0c1fde17e81f519 Feb 11 11:30:45 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=744): 0.000006 Feb 11 11:30:45 server racoon[11786]: algoakley_encdefencrypt(aes klen=256 size=48): 0.000002 Feb 11 11:30:45 server racoon[11786]: phase1(ident R msg3): 0.000217 Feb 11 11:30:45 server racoon[11786]: phase1(Identity Protection): 2.208631 2019-02-11 11:30:45: INFO: respond new phase 2 negotiation: 85.113.221.175[4500]<=>2.94.40.126[4500] Feb 11 11:30:45 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=304): 0.000006 2019-02-11 11:30:45: INFO: Update the generated policy : 2.94.40.126/32[1701] 85.113.221.175/32[1701] proto=udp dir=in reqid=0 Feb 11 11:30:45 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=276): 0.000005 2019-02-11 11:30:45: INFO: Adjusting my encmode UDP-Transport->Transport 2019-02-11 11:30:45: INFO: Adjusting peer's encmode UDP-Transport(4)->Transport(2) 2019-02-11 11:30:45: WARNING: authtype mismatched: my:hmac-md5 peer:hmac-sha Feb 11 11:30:45 server racoon[11786]: phase2(???): 0.000380 Feb 11 11:30:45 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=188): 0.000004 Feb 11 11:30:45 server racoon[11786]: algoakley_encdefencrypt(aes klen=256 size=176): 0.000002 Feb 11 11:30:45 server racoon[11786]: phase2(quick R msg1): 0.000150 Feb 11 11:30:45 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=32): 0.000004 Feb 11 11:30:45 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=69): 0.000007 2019-02-11 11:30:45: ERROR: pfkey UPDATE failed: No such process 2019-02-11 11:30:45: INFO: IPsec-SA established: ESP 85.113.221.175[4500]->2.94.40.126[4500] spi=2527207140(0x96a21ee4) Feb 11 11:30:45 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=69): 0.000006 Feb 11 11:30:45 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=89): 0.000004 Feb 11 11:30:45 server syslogd: last message repeated 1 times Feb 11 11:30:45 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=69): 0.000004 Feb 11 11:30:45 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=89): 0.000004 Feb 11 11:30:45 server syslogd: last message repeated 1 times Feb 11 11:30:45 server racoon[11786]: phase2(???): 0.000255 Feb 11 11:31:03 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=48): 0.000008 2019-02-11 11:31:03: INFO: deleting a generated policy. Feb 11 11:31:03 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=20): 0.000006 2019-02-11 11:31:03: INFO: purged IPsec-SA proto_id=ESP spi=2527207140. 2019-02-11 11:31:03: ERROR: pfkey X_SPDDELETE failed: Invalid argument 2019-02-11 11:31:03: ERROR: pfkey X_SPDDELETE failed: Invalid argument 2019-02-11 11:31:03: INFO: ISAKMP-SA expired 85.113.221.175[4500]-2.94.40.126[4500] spi:1b913044ad40a821:f0c1fde17e81f519 2019-02-11 11:31:03: INFO: ISAKMP-SA deleted 85.113.221.175[4500]-2.94.40.126[4500] spi:1b913044ad40a821:f0c1fde17e81f519 Feb 11 11:31:03 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=64): 0.000004 Feb 11 11:31:03 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=32): 0.000005 2019-02-11 11:31:10: INFO: respond new phase 1 negotiation: 85.113.221.175[500]<=>2.94.40.126[500] 2019-02-11 11:31:10: INFO: begin Identity Protection mode. 2019-02-11 11:31:10: INFO: received broken Microsoft ID: MS NT5 ISAKMPOAKLEY 2019-02-11 11:31:10: INFO: received Vendor ID: RFC 3947 2019-02-11 11:31:10: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02 2019-02-11 11:31:10: INFO: received Vendor ID: FRAGMENTATION 2019-02-11 11:31:10: [2.94.40.126] INFO: Selected NAT-T version: RFC 3947 2019-02-11 11:31:10: ERROR: invalid DН group 20. 2019-02-11 11:31:10: ERROR: invalid DН group 19. Feb 11 11:31:10 server racoon[11786]: phase1(ident R msg1): 0.000603 2019-02-11 11:31:10: [85.113.221.175] INFO: Нashing 85.113.221.175[500] with algo #2 2019-02-11 11:31:10: INFO: NAT-D payload #0 verified 2019-02-11 11:31:10: [2.94.40.126] INFO: Нashing 2.94.40.126[500] with algo #2 2019-02-11 11:31:10: INFO: NAT-D payload #1 doesn't match 2019-02-11 11:31:10: INFO: NAT detected: PEER 2019-02-11 11:31:10: [2.94.40.126] INFO: Нashing 2.94.40.126[500] with algo #2 Feb 11 11:31:10 server racoon[11786]: oakleydhgenerate(MODP2048): 0.009807 2019-02-11 11:31:10: [85.113.221.175] INFO: Нashing 85.113.221.175[500] with algo #2 2019-02-11 11:31:10: INFO: Adding remote and local NAT-D payloads. Feb 11 11:31:10 server racoon[11786]: oakleydhcompute(MODP2048): 0.009781 Feb 11 11:31:10 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=64): 0.000007 Feb 11 11:31:10 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=273): 0.000005 Feb 11 11:31:10 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=293): 0.000005 Feb 11 11:31:10 server syslogd: last message repeated 1 times Feb 11 11:31:10 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=1): 0.000003 Feb 11 11:31:10 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=20): 0.000004 Feb 11 11:31:10 server racoon[11786]: phase1(ident R msg2): 0.020556 2019-02-11 11:31:10: INFO: NAT-T: ports changed to: 2.94.40.126[4500]<->85.113.221.175[4500] Feb 11 11:31:10 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=48): 0.000020 Feb 11 11:31:10 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=744): 0.000007 Feb 11 11:31:10 server racoon[11786]: oakleyvalidateauth(pre-shared key): 0.000020 2019-02-11 11:31:10: INFO: ISAKMP-SA established 85.113.221.175[4500]-2.94.40.126[4500] spi:396a8f2099229364:6abcad2086dfc52b Feb 11 11:31:10 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=744): 0.000005 Feb 11 11:31:10 server racoon[11786]: algoakley_encdefencrypt(aes klen=256 size=48): 0.000002 Feb 11 11:31:10 server racoon[11786]: phase1(ident R msg3): 0.000193 Feb 11 11:31:10 server racoon[11786]: phase1(Identity Protection): 0.213493 2019-02-11 11:31:10: INFO: respond new phase 2 negotiation: 85.113.221.175[4500]<=>2.94.40.126[4500] Feb 11 11:31:10 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=304): 0.000009 2019-02-11 11:31:10: INFO: Update the generated policy : 2.94.40.126/32[1701] 85.113.221.175/32[1701] proto=udp dir=in reqid=0 Feb 11 11:31:10 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=276): 0.000008 2019-02-11 11:31:10: INFO: Adjusting my encmode UDP-Transport->Transport 2019-02-11 11:31:10: INFO: Adjusting peer's encmode UDP-Transport(4)->Transport(2) 2019-02-11 11:31:10: WARNING: authtype mismatched: my:hmac-md5 peer:hmac-sha Feb 11 11:31:10 server racoon[11786]: phase2(???): 0.000528 Feb 11 11:31:10 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=188): 0.000005 Feb 11 11:31:10 server racoon[11786]: algoakley_encdefencrypt(aes klen=256 size=176): 0.000003 Feb 11 11:31:10 server racoon[11786]: phase2(quick R msg1): 0.000166 Feb 11 11:31:10 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=32): 0.000005 Feb 11 11:31:10 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=69): 0.000007 2019-02-11 11:31:10: ERROR: pfkey UPDATE failed: No such process Feb 11 11:31:10 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=69): 0.000006 2019-02-11 11:31:10: INFO: IPsec-SA established: ESP 85.113.221.175[4500]->2.94.40.126[4500] spi=2227569773(0x84c6046d) Feb 11 11:31:10 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=89): 0.000006 Feb 11 11:31:10 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=89): 0.000004 Feb 11 11:31:10 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=69): 0.000004 Feb 11 11:31:10 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=89): 0.000004 Feb 11 11:31:10 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=89): 0.000003 Feb 11 11:31:10 server racoon[11786]: phase2(???): 0.000238 Feb 11 11:31:19 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=48): 0.000010 2019-02-11 11:31:19: INFO: deleting a generated policy. Feb 11 11:31:19 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=20): 0.000007 2019-02-11 11:31:19: INFO: purged IPsec-SA proto_id=ESP spi=2227569773. 2019-02-11 11:31:19: ERROR: pfkey X_SPDDELETE failed: Invalid argument 2019-02-11 11:31:19: ERROR: pfkey X_SPDDELETE failed: Invalid argument 2019-02-11 11:31:19: INFO: ISAKMP-SA expired 85.113.221.175[4500]-2.94.40.126[4500] spi:396a8f2099229364:6abcad2086dfc52b 2019-02-11 11:31:19: INFO: ISAKMP-SA deleted 85.113.221.175[4500]-2.94.40.126[4500] spi:396a8f2099229364:6abcad2086dfc52b Feb 11 11:31:19 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=64): 0.000004 Feb 11 11:31:19 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=32): 0.000004 2019-02-11 11:31:42: INFO: respond new phase 1 negotiation: 85.113.221.175[500]<=>2.94.40.126[500] 2019-02-11 11:31:42: INFO: begin Identity Protection mode. 2019-02-11 11:31:42: INFO: received broken Microsoft ID: MS NT5 ISAKMPOAKLEY 2019-02-11 11:31:42: INFO: received Vendor ID: RFC 3947 2019-02-11 11:31:42: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02 2019-02-11 11:31:42: INFO: received Vendor ID: FRAGMENTATION 2019-02-11 11:31:42: [2.94.40.126] INFO: Selected NAT-T version: RFC 3947 2019-02-11 11:31:42: ERROR: invalid DН group 20. 2019-02-11 11:31:42: ERROR: invalid DН group 19. Feb 11 11:31:42 server racoon[11786]: phase1(ident R msg1): 0.000423 2019-02-11 11:31:42: [85.113.221.175] INFO: Нashing 85.113.221.175[500] with algo #2 2019-02-11 11:31:42: INFO: NAT-D payload #0 verified 2019-02-11 11:31:42: [2.94.40.126] INFO: Нashing 2.94.40.126[500] with algo #2 2019-02-11 11:31:42: INFO: NAT-D payload #1 doesn't match 2019-02-11 11:31:42: INFO: NAT detected: PEER 2019-02-11 11:31:42: [2.94.40.126] INFO: Нashing 2.94.40.126[500] with algo #2 Feb 11 11:31:42 server racoon[11786]: oakleydhgenerate(MODP2048): 0.009807 2019-02-11 11:31:42: [85.113.221.175] INFO: Нashing 85.113.221.175[500] with algo #2 2019-02-11 11:31:42: INFO: Adding remote and local NAT-D payloads. Feb 11 11:31:42 server racoon[11786]: oakleydhcompute(MODP2048): 0.009782 Feb 11 11:31:42 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=64): 0.000006 Feb 11 11:31:42 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=273): 0.000005 Feb 11 11:31:42 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=293): 0.000005 Feb 11 11:31:42 server syslogd: last message repeated 1 times Feb 11 11:31:42 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=1): 0.000004 Feb 11 11:31:42 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=20): 0.000004 Feb 11 11:31:42 server racoon[11786]: phase1(ident R msg2): 0.020327 2019-02-11 11:31:44: NOTIFY: the packet is retransmitted by 2.94.40.126[500] (1). 2019-02-11 11:31:44: INFO: NAT-T: ports changed to: 2.94.40.126[4500]<->85.113.221.175[4500] Feb 11 11:31:44 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=48): 0.000017 Feb 11 11:31:44 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=744): 0.000013 Feb 11 11:31:44 server racoon[11786]: oakleyvalidateauth(pre-shared key): 0.000036 2019-02-11 11:31:44: INFO: ISAKMP-SA established 85.113.221.175[4500]-2.94.40.126[4500] spi:6b717a38b85d9d20:07657bc7f113e209 Feb 11 11:31:44 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=744): 0.000009 Feb 11 11:31:44 server racoon[11786]: algoakley_encdefencrypt(aes klen=256 size=48): 0.000002 Feb 11 11:31:44 server racoon[11786]: phase1(ident R msg3): 0.000269 Feb 11 11:31:44 server racoon[11786]: phase1(Identity Protection): 2.208778 2019-02-11 11:31:44: INFO: respond new phase 2 negotiation: 85.113.221.175[4500]<=>2.94.40.126[4500] Feb 11 11:31:44 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=304): 0.000011 2019-02-11 11:31:44: INFO: Update the generated policy : 2.94.40.126/32[1701] 85.113.221.175/32[1701] proto=udp dir=in reqid=0 Feb 11 11:31:44 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=276): 0.000005 2019-02-11 11:31:44: INFO: Adjusting my encmode UDP-Transport->Transport 2019-02-11 11:31:44: INFO: Adjusting peer's encmode UDP-Transport(4)->Transport(2) 2019-02-11 11:31:44: WARNING: authtype mismatched: my:hmac-md5 peer:hmac-sha Feb 11 11:31:44 server racoon[11786]: phase2(???): 0.000426 Feb 11 11:31:44 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=188): 0.000005 Feb 11 11:31:44 server racoon[11786]: algoakley_encdefencrypt(aes klen=256 size=176): 0.000002 Feb 11 11:31:44 server racoon[11786]: phase2(quick R msg1): 0.000147 2019-02-11 11:31:44: ERROR: pfkey UPDATE failed: No such process 2019-02-11 11:31:44: INFO: IPsec-SA established: ESP 85.113.221.175[4500]->2.94.40.126[4500] spi=3083749385(0xb7ce4809) Feb 11 11:31:44 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=32): 0.000004 Feb 11 11:31:44 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=69): 0.000007 Feb 11 11:31:44 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=69): 0.000006 Feb 11 11:31:44 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=89): 0.000006 Feb 11 11:31:44 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=89): 0.000004 Feb 11 11:31:44 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=69): 0.000004 Feb 11 11:31:44 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=89): 0.000003 Feb 11 11:31:44 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=89): 0.000004 Feb 11 11:31:44 server racoon[11786]: phase2(???): 0.000271 Feb 11 11:31:57 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=48): 0.000010 2019-02-11 11:31:57: INFO: deleting a generated policy. Feb 11 11:31:57 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=20): 0.000009 2019-02-11 11:31:57: INFO: purged IPsec-SA proto_id=ESP spi=3083749385. 2019-02-11 11:31:57: ERROR: pfkey X_SPDDELETE failed: Invalid argument 2019-02-11 11:31:57: ERROR: pfkey X_SPDDELETE failed: Invalid argument 2019-02-11 11:31:57: INFO: ISAKMP-SA expired 85.113.221.175[4500]-2.94.40.126[4500] spi:6b717a38b85d9d20:07657bc7f113e209 2019-02-11 11:31:57: INFO: ISAKMP-SA deleted 85.113.221.175[4500]-2.94.40.126[4500] spi:6b717a38b85d9d20:07657bc7f113e209 Feb 11 11:31:57 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=64): 0.000004 Feb 11 11:31:57 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=32): 0.000004 2019-02-11 11:32:15: INFO: respond new phase 1 negotiation: 85.113.221.175[500]<=>2.94.40.126[500] 2019-02-11 11:32:15: INFO: begin Identity Protection mode. 2019-02-11 11:32:15: INFO: received broken Microsoft ID: MS NT5 ISAKMPOAKLEY 2019-02-11 11:32:15: INFO: received Vendor ID: RFC 3947 2019-02-11 11:32:15: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02 2019-02-11 11:32:15: INFO: received Vendor ID: FRAGMENTATION 2019-02-11 11:32:15: [2.94.40.126] INFO: Selected NAT-T version: RFC 3947 2019-02-11 11:32:15: ERROR: invalid DН group 20. 2019-02-11 11:32:15: ERROR: invalid DН group 19. Feb 11 11:32:15 server racoon[11786]: phase1(ident R msg1): 0.000556 2019-02-11 11:32:15: [85.113.221.175] INFO: Нashing 85.113.221.175[500] with algo #2 2019-02-11 11:32:15: INFO: NAT-D payload #0 verified 2019-02-11 11:32:15: [2.94.40.126] INFO: Нashing 2.94.40.126[500] with algo #2 2019-02-11 11:32:15: INFO: NAT-D payload #1 doesn't match 2019-02-11 11:32:15: INFO: NAT detected: PEER Feb 11 11:32:15 server racoon[11786]: oakleydhgenerate(MODP2048): 0.009822 2019-02-11 11:32:15: [2.94.40.126] INFO: Нashing 2.94.40.126[500] with algo #2 2019-02-11 11:32:15: [85.113.221.175] INFO: Нashing 85.113.221.175[500] with algo #2 2019-02-11 11:32:15: INFO: Adding remote and local NAT-D payloads. Feb 11 11:32:15 server racoon[11786]: oakleydhcompute(MODP2048): 0.009736 Feb 11 11:32:15 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=64): 0.000007 Feb 11 11:32:15 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=273): 0.000005 Feb 11 11:32:15 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=293): 0.000004 Feb 11 11:32:15 server syslogd: last message repeated 1 times Feb 11 11:32:15 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=1): 0.000003 Feb 11 11:32:15 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=20): 0.000004 Feb 11 11:32:15 server racoon[11786]: phase1(ident R msg2): 0.020514 2019-02-11 11:32:15: INFO: NAT-T: ports changed to: 2.94.40.126[4500]<->85.113.221.175[4500] Feb 11 11:32:15 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=48): 0.000007 Feb 11 11:32:15 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=744): 0.000006 Feb 11 11:32:15 server racoon[11786]: oakleyvalidateauth(pre-shared key): 0.000021 2019-02-11 11:32:15: INFO: ISAKMP-SA established 85.113.221.175[4500]-2.94.40.126[4500] spi:df512cd375223f7f:09e602cd766b8b28 Feb 11 11:32:15 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=744): 0.000006 Feb 11 11:32:15 server racoon[11786]: algoakley_encdefencrypt(aes klen=256 size=48): 0.000002 Feb 11 11:32:15 server racoon[11786]: phase1(ident R msg3): 0.000189 Feb 11 11:32:15 server racoon[11786]: phase1(Identity Protection): 0.212391 2019-02-11 11:32:15: INFO: respond new phase 2 negotiation: 85.113.221.175[4500]<=>2.94.40.126[4500] Feb 11 11:32:15 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=304): 0.000007 2019-02-11 11:32:15: INFO: Update the generated policy : 2.94.40.126/32[1701] 85.113.221.175/32[1701] proto=udp dir=in reqid=0 Feb 11 11:32:15 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=276): 0.000006 2019-02-11 11:32:15: INFO: Adjusting my encmode UDP-Transport->Transport 2019-02-11 11:32:15: INFO: Adjusting peer's encmode UDP-Transport(4)->Transport(2) 2019-02-11 11:32:15: WARNING: authtype mismatched: my:hmac-md5 peer:hmac-sha Feb 11 11:32:15 server racoon[11786]: phase2(???): 0.000606 Feb 11 11:32:15 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=188): 0.000005 Feb 11 11:32:15 server racoon[11786]: algoakley_encdefencrypt(aes klen=256 size=176): 0.000002 Feb 11 11:32:15 server racoon[11786]: phase2(quick R msg1): 0.000176 2019-02-11 11:32:15: ERROR: pfkey UPDATE failed: No such process 2019-02-11 11:32:15: INFO: IPsec-SA established: ESP 85.113.221.175[4500]->2.94.40.126[4500] spi=1313920295(0x4e50d527) Feb 11 11:32:15 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=32): 0.000005 Feb 11 11:32:15 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=69): 0.000008 Feb 11 11:32:15 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=69): 0.000006 Feb 11 11:32:15 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=89): 0.000006 Feb 11 11:32:15 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=89): 0.000008 Feb 11 11:32:15 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=69): 0.000004 Feb 11 11:32:15 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=89): 0.000004 Feb 11 11:32:15 server syslogd: last message repeated 1 times Feb 11 11:32:15 server racoon[11786]: phase2(???): 0.000295 Feb 11 11:32:34 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=48): 0.000009 2019-02-11 11:32:34: INFO: deleting a generated policy. Feb 11 11:32:34 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=20): 0.000008 2019-02-11 11:32:34: INFO: purged IPsec-SA proto_id=ESP spi=1313920295. 2019-02-11 11:32:34: ERROR: pfkey X_SPDDELETE failed: Invalid argument 2019-02-11 11:32:34: ERROR: pfkey X_SPDDELETE failed: Invalid argument 2019-02-11 11:32:34: INFO: ISAKMP-SA expired 85.113.221.175[4500]-2.94.40.126[4500] spi:df512cd375223f7f:09e602cd766b8b28 2019-02-11 11:32:34: INFO: ISAKMP-SA deleted 85.113.221.175[4500]-2.94.40.126[4500] spi:df512cd375223f7f:09e602cd766b8b28 Feb 11 11:32:34 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=64): 0.000004 Feb 11 11:32:34 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=32): 0.000005 2019-02-11 11:32:45: INFO: respond new phase 1 negotiation: 85.113.221.175[500]<=>2.94.40.126[1] 2019-02-11 11:32:45: INFO: begin Identity Protection mode. 2019-02-11 11:32:45: INFO: received broken Microsoft ID: MS NT5 ISAKMPOAKLEY 2019-02-11 11:32:45: INFO: received Vendor ID: RFC 3947 2019-02-11 11:32:45: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02 2019-02-11 11:32:45: INFO: received Vendor ID: FRAGMENTATION 2019-02-11 11:32:45: [2.94.40.126] INFO: Selected NAT-T version: RFC 3947 2019-02-11 11:32:45: ERROR: invalid DН group 20. 2019-02-11 11:32:45: ERROR: invalid DН group 19. Feb 11 11:32:45 server racoon[11786]: phase1(ident R msg1): 0.000577 2019-02-11 11:32:45: [85.113.221.175] INFO: Нashing 85.113.221.175[500] with algo #2 2019-02-11 11:32:45: INFO: NAT-D payload #0 verified 2019-02-11 11:32:45: [2.94.40.126] INFO: Нashing 2.94.40.126[1] with algo #2 2019-02-11 11:32:45: INFO: NAT-D payload #1 doesn't match 2019-02-11 11:32:45: INFO: NAT detected: PEER 2019-02-11 11:32:45: [2.94.40.126] INFO: Нashing 2.94.40.126[1] with algo #2 Feb 11 11:32:45 server racoon[11786]: oakleydhgenerate(MODP2048): 0.009763 2019-02-11 11:32:45: [85.113.221.175] INFO: Нashing 85.113.221.175[500] with algo #2 2019-02-11 11:32:45: INFO: Adding remote and local NAT-D payloads. Feb 11 11:32:45 server racoon[11786]: oakleydhcompute(MODP2048): 0.009711 Feb 11 11:32:45 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=64): 0.000006 Feb 11 11:32:45 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=273): 0.000005 Feb 11 11:32:45 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=293): 0.000005 Feb 11 11:32:45 server syslogd: last message repeated 1 times Feb 11 11:32:45 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=1): 0.000003 Feb 11 11:32:45 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=20): 0.000004 Feb 11 11:32:45 server racoon[11786]: phase1(ident R msg2): 0.020326 2019-02-11 11:32:45: INFO: NAT-T: ports changed to: 2.94.40.126[1024]<->85.113.221.175[4500] Feb 11 11:32:45 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=48): 0.000009 Feb 11 11:32:45 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=744): 0.000010 Feb 11 11:32:45 server racoon[11786]: oakleyvalidateauth(pre-shared key): 0.000031 Feb 11 11:32:45 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=744): 0.000009 Feb 11 11:32:45 server racoon[11786]: algoakley_encdefencrypt(aes klen=256 size=48): 0.000002 2019-02-11 11:32:45: INFO: ISAKMP-SA established 85.113.221.175[4500]-2.94.40.126[1024] spi:44bca54d00362454:6269f502fdc9e976 Feb 11 11:32:45 server racoon[11786]: phase1(ident R msg3): 0.000233 Feb 11 11:32:45 server racoon[11786]: phase1(Identity Protection): 0.156706 Feb 11 11:32:45 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=32): 0.000003 Feb 11 11:32:45 server racoon[11786]: algoakley_encdefencrypt(aes klen=256 size=64): 0.000002 2019-02-11 11:32:45: INFO: respond new phase 2 negotiation: 85.113.221.175[4500]<=>2.94.40.126[1024] Feb 11 11:32:45 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=304): 0.000006 2019-02-11 11:32:45: INFO: Update the generated policy : 2.94.40.126/32[1701] 85.113.221.175/32[1701] proto=udp dir=in reqid=0 Feb 11 11:32:45 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=276): 0.000005 2019-02-11 11:32:45: INFO: Adjusting my encmode UDP-Transport->Transport 2019-02-11 11:32:45: INFO: Adjusting peer's encmode UDP-Transport(4)->Transport(2) 2019-02-11 11:32:45: WARNING: authtype mismatched: my:hmac-md5 peer:hmac-sha Feb 11 11:32:45 server racoon[11786]: phase2(???): 0.000558 Feb 11 11:32:45 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=188): 0.000011 Feb 11 11:32:45 server racoon[11786]: algoakley_encdefencrypt(aes klen=256 size=176): 0.000004 Feb 11 11:32:45 server racoon[11786]: phase2(quick R msg1): 0.000182 2019-02-11 11:32:45: ERROR: pfkey UPDATE failed: No such process 2019-02-11 11:32:45: INFO: IPsec-SA established: ESP 85.113.221.175[4500]->2.94.40.126[1024] spi=2103813879(0x7d65a6f7) Feb 11 11:32:45 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=32): 0.000005 Feb 11 11:32:45 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=69): 0.000008 Feb 11 11:32:45 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=69): 0.000006 Feb 11 11:32:45 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=89): 0.000006 Feb 11 11:32:45 server syslogd: last message repeated 1 times Feb 11 11:32:45 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=69): 0.000006 Feb 11 11:32:45 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=89): 0.000005 Feb 11 11:32:45 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=89): 0.000006 Feb 11 11:32:45 server racoon[11786]: phase2(???): 0.000322 Feb 11 11:32:54 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=48): 0.000009 2019-02-11 11:32:54: INFO: deleting a generated policy. Feb 11 11:32:54 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=20): 0.000016 2019-02-11 11:32:54: INFO: purged IPsec-SA proto_id=ESP spi=2103813879. 2019-02-11 11:32:54: ERROR: pfkey X_SPDDELETE failed: Invalid argument 2019-02-11 11:32:54: ERROR: pfkey X_SPDDELETE failed: Invalid argument 2019-02-11 11:32:54: INFO: ISAKMP-SA expired 85.113.221.175[4500]-2.94.40.126[1024] spi:44bca54d00362454:6269f502fdc9e976 2019-02-11 11:32:54: INFO: ISAKMP-SA deleted 85.113.221.175[4500]-2.94.40.126[1024] spi:44bca54d00362454:6269f502fdc9e976 Feb 11 11:32:54 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=64): 0.000003 Feb 11 11:32:54 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=32): 0.000004 2019-02-11 11:34:20: INFO: respond new phase 1 negotiation: 85.113.221.175[500]<=>2.94.40.126[500] 2019-02-11 11:34:20: INFO: begin Identity Protection mode. 2019-02-11 11:34:20: INFO: received broken Microsoft ID: MS NT5 ISAKMPOAKLEY 2019-02-11 11:34:20: INFO: received Vendor ID: RFC 3947 2019-02-11 11:34:20: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02 2019-02-11 11:34:20: INFO: received Vendor ID: FRAGMENTATION 2019-02-11 11:34:20: [2.94.40.126] INFO: Selected NAT-T version: RFC 3947 2019-02-11 11:34:20: ERROR: invalid DН group 20. 2019-02-11 11:34:20: ERROR: invalid DН group 19. Feb 11 11:34:20 server racoon[11786]: phase1(ident R msg1): 0.000701 2019-02-11 11:34:21: [85.113.221.175] INFO: Нashing 85.113.221.175[500] with algo #2 2019-02-11 11:34:21: INFO: NAT-D payload #0 verified 2019-02-11 11:34:21: [2.94.40.126] INFO: Нashing 2.94.40.126[500] with algo #2 2019-02-11 11:34:21: INFO: NAT-D payload #1 doesn't match 2019-02-11 11:34:21: INFO: NAT detected: PEER 2019-02-11 11:34:21: [2.94.40.126] INFO: Нashing 2.94.40.126[500] with algo #2 Feb 11 11:34:21 server racoon[11786]: oakleydhgenerate(MODP2048): 0.009809 2019-02-11 11:34:21: [85.113.221.175] INFO: Нashing 85.113.221.175[500] with algo #2 2019-02-11 11:34:21: INFO: Adding remote and local NAT-D payloads. Feb 11 11:34:21 server racoon[11786]: oakleydhcompute(MODP2048): 0.009806 Feb 11 11:34:21 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=64): 0.000007 Feb 11 11:34:21 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=273): 0.000004 Feb 11 11:34:21 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=293): 0.000005 Feb 11 11:34:21 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=293): 0.000004 Feb 11 11:34:21 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=1): 0.000004 Feb 11 11:34:21 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=20): 0.000004 Feb 11 11:34:21 server racoon[11786]: phase1(ident R msg2): 0.020767 2019-02-11 11:34:21: INFO: NAT-T: ports changed to: 2.94.40.126[4500]<->85.113.221.175[4500] Feb 11 11:34:21 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=48): 0.000015 Feb 11 11:34:21 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=744): 0.000007 Feb 11 11:34:21 server racoon[11786]: oakleyvalidateauth(pre-shared key): 0.000022 Feb 11 11:34:21 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=744): 0.000006 Feb 11 11:34:21 server racoon[11786]: algoakley_encdefencrypt(aes klen=256 size=48): 0.000002 Feb 11 11:34:21 server racoon[11786]: phase1(ident R msg3): 0.000190 Feb 11 11:34:21 server racoon[11786]: phase1(Identity Protection): 0.310649 2019-02-11 11:34:21: INFO: ISAKMP-SA established 85.113.221.175[4500]-2.94.40.126[4500] spi:8d0b739f3c0fc13b:81da7670150730c3 2019-02-11 11:34:21: INFO: respond new phase 2 negotiation: 85.113.221.175[4500]<=>2.94.40.126[4500] Feb 11 11:34:21 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=304): 0.000007 Feb 11 11:34:21 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=276): 0.000006 2019-02-11 11:34:21: INFO: Update the generated policy : 2.94.40.126/32[1701] 85.113.221.175/32[1701] proto=udp dir=in reqid=0 2019-02-11 11:34:21: INFO: Adjusting my encmode UDP-Transport->Transport 2019-02-11 11:34:21: INFO: Adjusting peer's encmode UDP-Transport(4)->Transport(2) 2019-02-11 11:34:21: WARNING: authtype mismatched: my:hmac-md5 peer:hmac-sha Feb 11 11:34:21 server racoon[11786]: phase2(???): 0.000487 Feb 11 11:34:21 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=188): 0.000006 Feb 11 11:34:21 server racoon[11786]: algoakley_encdefencrypt(aes klen=256 size=176): 0.000002 Feb 11 11:34:21 server racoon[11786]: phase2(quick R msg1): 0.000182 Feb 11 11:34:21 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=32): 0.000004 Feb 11 11:34:21 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=69): 0.000005 Feb 11 11:34:21 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=69): 0.000004 Feb 11 11:34:21 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=89): 0.000005 Feb 11 11:34:21 server syslogd: last message repeated 1 times Feb 11 11:34:21 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=69): 0.000004 2019-02-11 11:34:21: ERROR: pfkey UPDATE failed: No such process 2019-02-11 11:34:21: INFO: IPsec-SA established: ESP 85.113.221.175[4500]->2.94.40.126[4500] spi=3000062578(0xb2d15272) Feb 11 11:34:21 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=89): 0.000006 Feb 11 11:34:21 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=89): 0.000004 Feb 11 11:34:21 server racoon[11786]: phase2(???): 0.000494 2019-02-11 11:34:51: ERROR: 2.94.40.126 give up to get IPsec-SA due to time up to wait. Feb 11 11:34:56 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=48): 0.000009 2019-02-11 11:34:56: INFO: purged IPsec-SA proto_id=ESP spi=3000062578. Feb 11 11:34:56 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=20): 0.000008 Feb 11 11:34:56 server racoon[11786]: algoakley_encdefdecrypt(aes klen=256 size=64): 0.000003 2019-02-11 11:34:56: INFO: ISAKMP-SA expired 85.113.221.175[4500]-2.94.40.126[4500] spi:8d0b739f3c0fc13b:81da7670150730c3 Feb 11 11:34:56 server racoon[11786]: algoakley_hmacdef_one(hmacsha1 size=32): 0.000005 --- Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Thunderbird/60.5.0 |
#33
|
|||
|
|||
Re: дебаг
Eugene Grosbein написал(а) к Sergey Anokhin в Feb 19 15:12:54 по местному времени:
12 февр. 2019, вторник, в 10:20 NOVT, Sergey Anokhin написал(а): >> Паникует на отладочной выдаче из-за options IPSEC_DEBUG в ядре. >> Убери пока её из ядра и паниковать перестанет при остановке ракуна >> по этой причине перестанет. SA> попробовать можно, но как дебажить? оно не заводилось все равно: Ты сначала стабилизируй систему, чтобы не паниковала, всё остальное потом. И я подозреваю, что у тебя опять порт собран с недефолтными опциями. Нынче у порта по дефолту включены все нужные опции и не включены лишние, так что можешь просто поставить пакет, удалив свой самосбор. С пакетом (с дефолтной сборкой) всё работает. Eugene --- slrn/1.0.3 (FreeBSD) |
#34
|
|||
|
|||
Re: дебаг
Eugene Grosbein написал(а) к Sergey Anokhin в Feb 19 15:14:21 по местному времени:
12 февр. 2019, вторник, в 09:58 NOVT, Sergey Anokhin написал(а): >> Тебе пора писать в stable@freebsd.org вот с этой информацией, >> у тебя повреждён пул и из-за бага в ядре оно не может его починить. SA> я подозреваю в какой-то момент моргнула память или пул сломался SA> из-за паники, холд ресет и т.п. и вот оно починиться не может. SA> или может на сайте bug.freebsd.org написать? И туда, и туда. SA> Я ответил, но оно не отправилось, у меня single hdd Зачем тебе тогда ZFS? С single hdd только больше проблем в случае ZFS. Eugene -- Устав от вечных упований, Устав от радостных пиров --- slrn/1.0.3 (FreeBSD) |
#35
|
|||
|
|||
Re: дебаг
Sergey Anokhin написал(а) к All в Feb 19 11:04:06 по местному времени:
SA> я подозреваю в какой-то момент моргнула память или пул сломался SA> из-за паники, холд ресет и т.п. и вот оно починиться не может. SA> или может на сайте bug.freebsd.org написать? > писать надо полюбому - где-то в ядре есть код, написанный мудаком, не Напишу во все места > проверяющим считанные с диска данные, прежде чем совать их в какие-то указатели. > но для этого надо получить абсолютно понятную и воспроизводимую проблему, а не > мильен разных. После того как я версию пула обновил, в дебаге оно стало повторяться все. Смысл простой, что-то побилось, и оно при попытке починить/прочитать оно падает. > для начала - разориться таки на второй диск и побайтово скопировать этот пул. Ну он есть, только вставить надо, побайтово? Типа если штатными методами то упадет в корку при копировании/клонировании? Вообще есть старинный аппаратный рейд и два 500гб харда, походу в 12 версии сломали много чего. --- Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Thunderbird/60.5.0 |
#36
|
|||
|
|||
Re: дебаг
Sergey Anokhin написал(а) к All в Feb 19 11:25:57 по местному времени:
> Зачем тебе тогда ZFS? С single hdd только больше проблем в случае ZFS. дык тестинг, наверно и клонировать проще zfs чем dump/restore? --- Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Thunderbird/60.5.0 |
#37
|
|||
|
|||
Re: дебаг
Sergey Anokhin написал(а) к All в Feb 19 11:32:24 по местному времени:
>> Паникует на отладочной выдаче из-за options IPSEC_DEBUG в ядре. >> Убери пока её из ядра и паниковать перестанет при остановке ракуна >> по этой причине перестанет. SA> попробовать можно, но как дебажить? оно не заводилось все равно: > Ты сначала стабилизируй систему, чтобы не паниковала, всё остальное потом. Короче сначала ядро пересобрать без опции > И я подозреваю, что у тебя опять порт собран с недефолтными опциями. > Нынче у порта по дефолту включены все нужные опции и не включены лишние, > так что можешь просто поставить пакет, удалив свой самосбор. > С пакетом (с дефолтной сборкой) всё работает. x x [ ] ADMINPORT Enable Admin port x x x x [x] DEBUG Build with debugging support x x x x [x] DOCS Build and/or install documentation x x x x [x] DPD Dead Peer Detection x x x x [ ] EXAMPLES Build and/or install examples x x x x [x] FRAG IKE fragmentation payload support x x x x [ ] GSSAPI GSSAPI Security API support x x x x [x] НYBRID Нybrid, Xauth and Mode-cfg support x x x x [x] IDEA IDEA encryption (patented) x x x x [x] IPV6 IPv6 protocol support x x x x [ ] LDAP LDAP authentication (Xauth server) x x x x [x] NATT NAT-Traversal (kernel-patch required before 11.1) x x x x [ ] NATTF require NAT-Traversal (fail without kernel-patch) x x x x [ ] PAM PAM authentication (Xauth server) x x x x [ ] RADIUS Radius authentication (Xauth server) x x x x [x] RC5 RC5 encryption (patented) x x x x [x] SAUNSPEC Unspecified SA mode x x x x [x] STATS Statistics logging function x x x x [x] WCPSKEY Allow wildcard matching for pre-shared keys --- Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Thunderbird/60.5.0 |
#38
|
|||
|
|||
Re: дебаг
Sergey Anokhin написал(а) к All в Feb 19 12:25:03 по местному времени:
> Ты сначала стабилизируй систему, чтобы не паниковала, всё остальное потом. > И я подозреваю, что у тебя опять порт собран с недефолтными опциями. > Нынче у порта по дефолту включены все нужные опции и не включены лишние, > так что можешь просто поставить пакет, удалив свой самосбор. > С пакетом (с дефолтной сборкой) всё работает. да, проверил все так. спасибо! ты был прав. вычистил все опции, оставил дефолт, собрал и отключил дебаг. ядро не трогал, завелось. Но баг я все равно запостил, кернел паника это плохо. --- Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Thunderbird/60.5.0 |
#39
|
|||
|
|||
Re: дебаг
Alex Korchmar написал(а) к Sergey Anokhin в Feb 19 13:03:08 по местному времени:
From: Alex Korchmar <noreply@linux.e-moe.ru> Sergey Anokhin <Sergey.Anokhin@p999.f10.n5034.z2.fidonet.org> wrote: SA> Ну он есть, только вставить надо, побайтово? Типа если штатными методами штатные методы могут скрыть проблему. А нужно 100% воспроизведение ситуации - иначе никто чинить не будет в принципе. > Alex P.S. не факт, конечно, что и так-то будут :-( --- ifmail v.2.15dev5.4 |
#40
|
|||
|
|||
Re: дебаг
Alex Korchmar написал(а) к Eugene Grosbein в Feb 19 13:22:39 по местному времени:
From: Alex Korchmar <noreply@linux.e-moe.ru> Eugene Grosbein <Eugene.Grosbein@f1.n5006.z2.fidonet.org> wrote: EG> Зачем тебе тогда ZFS? С single hdd только больше проблем в случае ZFS. говорит нам гражданин, в арубу понатащивший zfs. > Alex P.S. зачем нам эта freebsd, где половина "works as intended", а вторая падает - вот это действительно сложный вопрос. --- ifmail v.2.15dev5.4 |