找回密码
 立即注册

QQ登录

只需一步,快速开始

搜索
广告投放联系QQ68610888
查看: 1376|回复: 3

openwrt PPP 频繁拨号 附上日志

[复制链接]
发表于 2018-9-10 15:29 | 显示全部楼层 |阅读模式
总不停的拨号,微信上不去,网上各种方法都试过了,有没有遇到和我这个一样的?
附日志

Mon Sep 10 15:19:00 2018 authpriv.info ipsec_starter[2475]: charon stopped after 200 ms
Mon Sep 10 15:19:00 2018 authpriv.info ipsec_starter[2475]: ipsec starter stopped
Mon Sep 10 15:19:04 2018 authpriv.info ipsec_starter[2549]: Starting strongSwan 5.5.3 IPsec [starter]...
Mon Sep 10 15:19:04 2018 daemon.err modprobe: ah4 is already loaded
Mon Sep 10 15:19:04 2018 daemon.err modprobe: esp4 is already loaded
Mon Sep 10 15:19:04 2018 daemon.err modprobe: ipcomp is already loaded
Mon Sep 10 15:19:04 2018 daemon.err modprobe: xfrm4_tunnel is already loaded
Mon Sep 10 15:19:04 2018 daemon.err modprobe: xfrm_user is already loaded
Mon Sep 10 15:19:04 2018 daemon.info : 00[DMN] Starting IKE charon daemon (strongSwan 5.5.3, Linux 4.4.92, mips)
Mon Sep 10 15:19:04 2018 daemon.info : 00[KNL] known interfaces and IP addresses:
Mon Sep 10 15:19:04 2018 daemon.info : 00[KNL]   lo
Mon Sep 10 15:19:04 2018 daemon.info : 00[KNL]     127.0.0.1
Mon Sep 10 15:19:04 2018 daemon.info : 00[KNL]     ::1
Mon Sep 10 15:19:04 2018 daemon.info : 00[KNL]   eth0
Mon Sep 10 15:19:04 2018 daemon.info : 00[KNL]     fe80::7a8a:20ff:febc:4685
Mon Sep 10 15:19:04 2018 daemon.info : 00[KNL]   br-lan
Mon Sep 10 15:19:04 2018 daemon.info : 00[KNL]     192.168.200.1
Mon Sep 10 15:19:04 2018 daemon.info : 00[KNL]     240e:fe:f01:500::1
Mon Sep 10 15:19:04 2018 daemon.info : 00[KNL]     fe80::7a8a:20ff:febc:4685
Mon Sep 10 15:19:04 2018 daemon.info : 00[KNL]   eth0.1
Mon Sep 10 15:19:04 2018 daemon.info : 00[KNL]   eth0.2
Mon Sep 10 15:19:04 2018 daemon.info : 00[KNL]     fe80::7a8a:20ff:febc:4685
Mon Sep 10 15:19:04 2018 daemon.info : 00[KNL]   pppoe-wan
Mon Sep 10 15:19:04 2018 daemon.info : 00[KNL]     100.64.6.230
Mon Sep 10 15:19:04 2018 daemon.info : 00[KNL]     240e:fa:ef:6a:7a8a:2042:24bc:4685
Mon Sep 10 15:19:04 2018 daemon.info : 00[KNL]     fe80::7a8a:2042:24bc:4685
Mon Sep 10 15:19:04 2018 daemon.info : 00[LIB] loaded plugins: charon aes des rc2 sha2 sha1 md5 random nonce x509 revocation constraints pubkey pkcs1 pgp dnskey sshkey pem fips-prf gmp xcbc hmac attr kernel-netlink resolve socket-default connmark stroke updown xauth-generic
Mon Sep 10 15:19:04 2018 daemon.info : 00[JOB] spawning 16 worker threads
Mon Sep 10 15:19:04 2018 authpriv.info ipsec_starter[2574]: charon (2575) started after 40 ms
Mon Sep 10 15:19:04 2018 daemon.info : 07[KNL] 139.198.125.122 is not a local address or the interface is down
Mon Sep 10 15:19:04 2018 daemon.info : 05[KNL] using 100.64.6.230 as address to reach 139.198.125.122/32
Mon Sep 10 15:19:04 2018 daemon.info : 05[IKE] queueing IKE_VENDOR task
Mon Sep 10 15:19:04 2018 daemon.info : 05[IKE] queueing IKE_INIT task
Mon Sep 10 15:19:04 2018 daemon.info : 05[IKE] queueing IKE_NATD task
Mon Sep 10 15:19:04 2018 daemon.info : 05[IKE] queueing IKE_CERT_PRE task
Mon Sep 10 15:19:04 2018 daemon.info : 05[IKE] queueing IKE_AUTH task
Mon Sep 10 15:19:04 2018 daemon.info : 05[IKE] queueing IKE_CERT_POST task
Mon Sep 10 15:19:04 2018 daemon.info : 05[IKE] queueing IKE_CONFIG task
Mon Sep 10 15:19:04 2018 daemon.info : 05[IKE] queueing IKE_AUTH_LIFETIME task
Mon Sep 10 15:19:04 2018 daemon.info : 05[IKE] queueing IKE_MOBIKE task
Mon Sep 10 15:19:04 2018 daemon.info : 05[IKE] queueing IKE_ME task
Mon Sep 10 15:19:04 2018 daemon.info : 05[IKE] queueing CHILD_CREATE task
Mon Sep 10 15:19:04 2018 daemon.info : 05[IKE] activating new tasks
Mon Sep 10 15:19:04 2018 daemon.info : 05[IKE]   activating IKE_VENDOR task
Mon Sep 10 15:19:04 2018 daemon.info : 05[IKE]   activating IKE_INIT task
Mon Sep 10 15:19:04 2018 daemon.info : 05[IKE]   activating IKE_NATD task
Mon Sep 10 15:19:04 2018 daemon.info : 05[IKE]   activating IKE_CERT_PRE task
Mon Sep 10 15:19:04 2018 daemon.info : 05[IKE]   activating IKE_ME task
Mon Sep 10 15:19:04 2018 daemon.info : 05[IKE]   activating IKE_AUTH task
Mon Sep 10 15:19:04 2018 daemon.info : 05[IKE]   activating IKE_CERT_POST task
Mon Sep 10 15:19:04 2018 daemon.info : 05[IKE]   activating IKE_CONFIG task
Mon Sep 10 15:19:04 2018 daemon.info : 05[IKE]   activating CHILD_CREATE task
Mon Sep 10 15:19:04 2018 daemon.info : 05[IKE]   activating IKE_AUTH_LIFETIME task
Mon Sep 10 15:19:04 2018 daemon.info : 05[IKE]   activating IKE_MOBIKE task
Mon Sep 10 15:19:04 2018 daemon.info : 05[IKE] initiating IKE_SA chaogong[1] to 139.198.125.122
Mon Sep 10 15:19:04 2018 authpriv.info : 05[IKE] initiating IKE_SA chaogong[1] to 139.198.125.122
Mon Sep 10 15:19:04 2018 daemon.info : 05[IKE] IKE_SA chaogong[1] state change: CREATED => CONNECTING
Mon Sep 10 15:19:04 2018 daemon.info : 05[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Mon Sep 10 15:19:04 2018 daemon.info : 05[NET] sending packet: from 100.64.6.230[500] to 139.198.125.122[500] (464 bytes)
Mon Sep 10 15:19:04 2018 daemon.info : 09[NET] received packet: from 139.198.125.122[500] to 100.64.6.230[500] (489 bytes)
Mon Sep 10 15:19:04 2018 daemon.info : 09[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
Mon Sep 10 15:19:04 2018 daemon.info : 09[IKE] received FRAGMENTATION_SUPPORTED notify
Mon Sep 10 15:19:04 2018 daemon.info : 09[IKE] received SIGNATURE_HASH_ALGORITHMS notify
Mon Sep 10 15:19:05 2018 daemon.info : 09[IKE] local host is behind NAT, sending keep alives
Mon Sep 10 15:19:05 2018 daemon.info : 09[IKE] remote host is behind NAT
Mon Sep 10 15:19:05 2018 daemon.info : 09[IKE] received cert request for unknown ca with keyid 8d:d8:89:95:69:db:0f:97:90:62:7e:a5:ce:cc:8e:12:f1:93:d5:96
Mon Sep 10 15:19:05 2018 daemon.info : 09[IKE] received 1 cert requests for an unknown ca
Mon Sep 10 15:19:05 2018 daemon.info : 09[IKE] reinitiating already active tasks
Mon Sep 10 15:19:05 2018 daemon.info : 09[IKE]   IKE_CERT_PRE task
Mon Sep 10 15:19:05 2018 daemon.info : 09[IKE]   IKE_AUTH task
Mon Sep 10 15:19:05 2018 daemon.info : 09[IKE] authentication of 'nash-sz' (myself) with pre-shared key
Mon Sep 10 15:19:05 2018 daemon.info : 09[IKE] successfully created shared key MAC
Mon Sep 10 15:19:05 2018 daemon.info : 09[IKE] building INTERNAL_IP4_DNS attribute
Mon Sep 10 15:19:05 2018 daemon.info : 09[IKE] establishing CHILD_SA chaogong
Mon Sep 10 15:19:05 2018 authpriv.info : 09[IKE] establishing CHILD_SA chaogong
Mon Sep 10 15:19:05 2018 daemon.info : 09[KNL] got SPI c655cb97
Mon Sep 10 15:19:05 2018 daemon.info : 09[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH CPRQ(ADDR DNS) SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_6_ADDR) N(ADD_6_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Mon Sep 10 15:19:05 2018 daemon.info : 09[NET] sending packet: from 100.64.6.230[4500] to 139.198.125.122[4500] (332 bytes)
Mon Sep 10 15:19:05 2018 daemon.info : 06[NET] received packet: from 139.198.125.122[4500] to 100.64.6.230[4500] (252 bytes)
Mon Sep 10 15:19:05 2018 daemon.info : 06[ENC] parsed IKE_AUTH response 1 [ IDr AUTH CPRP(ADDR) SA TSi TSr N(AUTH_LFT) N(MOBIKE_SUP) N(ADD_4_ADDR) ]
Mon Sep 10 15:19:05 2018 daemon.info : 06[IKE] authentication of 'nashwork' with pre-shared key successful
Mon Sep 10 15:19:05 2018 daemon.info : 06[IKE] IKE_SA chaogong[1] established between 100.64.6.230[nash-sz]...139.198.125.122[nashwork]
Mon Sep 10 15:19:05 2018 authpriv.info : 06[IKE] IKE_SA chaogong[1] established between 100.64.6.230[nash-sz]...139.198.125.122[nashwork]
Mon Sep 10 15:19:05 2018 daemon.info : 06[IKE] IKE_SA chaogong[1] state change: CONNECTING => ESTABLISHED
Mon Sep 10 15:19:05 2018 daemon.info : 06[IKE] scheduling reauthentication in 3257s
Mon Sep 10 15:19:05 2018 daemon.info : 06[IKE] maximum IKE_SA lifetime 3437s
Mon Sep 10 15:19:05 2018 daemon.info : 06[IKE] processing INTERNAL_IP4_ADDRESS attribute
Mon Sep 10 15:19:05 2018 daemon.info : 06[KNL] 100.64.6.230 is on interface pppoe-wan
Mon Sep 10 15:19:05 2018 daemon.info : 06[IKE] installing new virtual IP 172.56.0.6
Mon Sep 10 15:19:05 2018 daemon.info : 06[KNL] virtual IP 172.56.0.6 installed on pppoe-wan
Mon Sep 10 15:19:05 2018 daemon.info : 06[KNL] adding SAD entry with SPI c655cb97 and reqid {1}
Mon Sep 10 15:19:05 2018 daemon.info : 06[KNL]   using encryption algorithm AES_CBC with key size 128
Mon Sep 10 15:19:05 2018 daemon.info : 06[KNL]   using integrity algorithm HMAC_SHA1_96 with key size 160
Mon Sep 10 15:19:05 2018 daemon.info : 06[KNL]   using replay window of 32 packets
Mon Sep 10 15:19:05 2018 daemon.info : 06[KNL] adding SAD entry with SPI c85cde0d and reqid {1}
Mon Sep 10 15:19:05 2018 daemon.info : 06[KNL]   using encryption algorithm AES_CBC with key size 128
Mon Sep 10 15:19:05 2018 daemon.info : 06[KNL]   using integrity algorithm HMAC_SHA1_96 with key size 160
Mon Sep 10 15:19:05 2018 daemon.info : 06[KNL]   using replay window of 0 packets
Mon Sep 10 15:19:05 2018 daemon.info : 06[KNL] adding policy 172.56.0.6/32 === 172.24.0.0/24 out [priority 571327, refcount 1]
Mon Sep 10 15:19:05 2018 daemon.info : 06[KNL] adding policy 172.24.0.0/24 === 172.56.0.6/32 in [priority 371327, refcount 1]
Mon Sep 10 15:19:05 2018 daemon.info : 06[KNL] adding policy 172.24.0.0/24 === 172.56.0.6/32 fwd [priority 371327, refcount 1]
Mon Sep 10 15:19:05 2018 daemon.info : 06[KNL] policy 172.56.0.6/32 === 172.24.0.0/24 out already exists, increasing refcount
Mon Sep 10 15:19:05 2018 daemon.info : 06[KNL] updating policy 172.56.0.6/32 === 172.24.0.0/24 out [priority 371327, refcount 2]
Mon Sep 10 15:19:05 2018 daemon.info : 06[KNL] getting a local address in traffic selector 172.56.0.6/32
Mon Sep 10 15:19:05 2018 daemon.info : 06[KNL] using host 172.56.0.6
Mon Sep 10 15:19:05 2018 daemon.info : 06[KNL] getting iface name for index 6
Mon Sep 10 15:19:05 2018 daemon.info : 06[KNL] using 100.64.0.1 as nexthop and pppoe-wan as dev to reach 139.198.125.122/32
Mon Sep 10 15:19:05 2018 daemon.info : 06[KNL] installing route: 172.24.0.0/24 via 100.64.0.1 src 172.56.0.6 dev pppoe-wan
Mon Sep 10 15:19:05 2018 daemon.info : 06[KNL] getting iface index for pppoe-wan
Mon Sep 10 15:19:05 2018 daemon.info : 06[IKE] CHILD_SA chaogong{1} established with SPIs c655cb97_i c85cde0d_o and TS 172.56.0.6/32 === 172.24.0.0/24
Mon Sep 10 15:19:05 2018 authpriv.info : 06[IKE] CHILD_SA chaogong{1} established with SPIs c655cb97_i c85cde0d_o and TS 172.56.0.6/32 === 172.24.0.0/24
Mon Sep 10 15:19:05 2018 daemon.info : 06[IKE] received AUTH_LIFETIME of 10148s, reauthentication already scheduled in 3257s
Mon Sep 10 15:19:05 2018 daemon.info : 06[IKE] peer supports MOBIKE
Mon Sep 10 15:19:05 2018 daemon.info : 06[IKE] got additional MOBIKE peer address: 172.56.0.2
Mon Sep 10 15:19:05 2018 daemon.info : 06[IKE] activating new tasks
Mon Sep 10 15:19:05 2018 daemon.info : 06[IKE] nothing to initiate
Mon Sep 10 15:19:05 2018 daemon.info : 13[KNL] getting iface index for pppoe-wan
Mon Sep 10 15:19:25 2018 daemon.info : 04[KNL] querying policy 172.56.0.6/32 === 172.24.0.0/24 out
Mon Sep 10 15:19:25 2018 daemon.info : 04[KNL] querying SAD entry with SPI c85cde0d
Mon Sep 10 15:19:29 2018 daemon.info : 07[KNL] querying policy 172.56.0.6/32 === 172.24.0.0/24 out
Mon Sep 10 15:19:29 2018 daemon.info : 07[KNL] querying SAD entry with SPI c85cde0d
Mon Sep 10 15:19:29 2018 daemon.info : 07[IKE] sending keep alive to 139.198.125.122[4500]
Mon Sep 10 15:19:35 2018 daemon.info : 08[KNL] querying policy 172.24.0.0/24 === 172.56.0.6/32 in
Mon Sep 10 15:19:35 2018 daemon.info : 08[KNL] querying policy 172.24.0.0/24 === 172.56.0.6/32 fwd
Mon Sep 10 15:19:35 2018 daemon.info : 08[KNL] querying SAD entry with SPI c655cb97
Mon Sep 10 15:19:35 2018 daemon.info : 08[IKE] sending DPD request
Mon Sep 10 15:19:35 2018 daemon.info : 08[IKE] queueing IKE_MOBIKE task
Mon Sep 10 15:19:35 2018 daemon.info : 08[IKE] activating new tasks
Mon Sep 10 15:19:35 2018 daemon.info : 08[IKE]   activating IKE_MOBIKE task
Mon Sep 10 15:19:35 2018 daemon.info : 08[KNL] using 100.64.6.230 as address to reach 139.198.125.122/32
Mon Sep 10 15:19:35 2018 daemon.info : 08[ENC] generating INFORMATIONAL request 2 [ N(NATD_S_IP) N(NATD_D_IP) ]
Mon Sep 10 15:19:35 2018 daemon.info : 08[KNL] using 100.64.6.230 as address to reach 139.198.125.122/32
Mon Sep 10 15:19:35 2018 daemon.info : 08[NET] sending packet: from 100.64.6.230[4500] to 139.198.125.122[4500] (124 bytes)
Mon Sep 10 15:19:35 2018 daemon.info : 05[NET] received packet: from 139.198.125.122[4500] to 100.64.6.230[4500] (124 bytes)
Mon Sep 10 15:19:35 2018 daemon.info : 05[ENC] parsed INFORMATIONAL response 2 [ N(NATD_S_IP) N(NATD_D_IP) ]
Mon Sep 10 15:19:35 2018 daemon.info : 05[IKE] activating new tasks
Mon Sep 10 15:19:35 2018 daemon.info : 05[IKE] nothing to initiate
Mon Sep 10 15:19:49 2018 daemon.info : 12[KNL] querying policy 172.56.0.6/32 === 172.24.0.0/24 out
Mon Sep 10 15:19:49 2018 daemon.info : 12[KNL] querying SAD entry with SPI c85cde0d
Mon Sep 10 15:19:59 2018 daemon.info : 10[KNL] querying policy 172.56.0.6/32 === 172.24.0.0/24 out
Mon Sep 10 15:19:59 2018 daemon.info : 10[KNL] querying SAD entry with SPI c85cde0d
Mon Sep 10 15:19:59 2018 daemon.info : 10[IKE] sending keep alive to 139.198.125.122[4500]
Mon Sep 10 15:20:00 2018 cron.info crond[725]: USER root pid 2639 cmd /bin/sh /etc/check_ipsec.sh
Mon Sep 10 15:20:00 2018 daemon.info : 00[DMN] signal of type SIGINT received. Shutting down
Mon Sep 10 15:20:00 2018 daemon.info : 00[IKE] queueing IKE_DELETE task
Mon Sep 10 15:20:00 2018 daemon.info : 00[IKE] activating new tasks
Mon Sep 10 15:20:00 2018 daemon.info : 00[IKE]   activating IKE_DELETE task
Mon Sep 10 15:20:00 2018 daemon.info : 00[IKE] deleting IKE_SA chaogong[1] between 100.64.6.230[nash-sz]...139.198.125.122[nashwork]
Mon Sep 10 15:20:00 2018 authpriv.info : 00[IKE] deleting IKE_SA chaogong[1] between 100.64.6.230[nash-sz]...139.198.125.122[nashwork]
Mon Sep 10 15:20:00 2018 daemon.info : 00[IKE] IKE_SA chaogong[1] state change: ESTABLISHED => DELETING
Mon Sep 10 15:20:00 2018 daemon.info : 00[IKE] sending DELETE for IKE_SA chaogong[1]
Mon Sep 10 15:20:00 2018 daemon.info : 00[ENC] generating INFORMATIONAL request 3 [ D ]
Mon Sep 10 15:20:00 2018 daemon.info : 00[NET] sending packet: from 100.64.6.230[4500] to 139.198.125.122[4500] (76 bytes)
Mon Sep 10 15:20:00 2018 daemon.info : 00[IKE] IKE_SA chaogong[1] state change: DELETING => DESTROYING
Mon Sep 10 15:20:00 2018 daemon.info : 00[KNL] deleting policy 172.56.0.6/32 === 172.24.0.0/24 out
Mon Sep 10 15:20:00 2018 daemon.info : 00[KNL] policy still used by another CHILD_SA, not removed
Mon Sep 10 15:20:00 2018 daemon.info : 00[KNL] updating policy 172.56.0.6/32 === 172.24.0.0/24 out [priority 571327, refcount 1]
Mon Sep 10 15:20:00 2018 daemon.info : 00[KNL] deleting policy 172.24.0.0/24 === 172.56.0.6/32 in
Mon Sep 10 15:20:00 2018 daemon.info : 00[KNL] deleting policy 172.24.0.0/24 === 172.56.0.6/32 fwd
Mon Sep 10 15:20:00 2018 daemon.info : 00[KNL] deleting policy 172.56.0.6/32 === 172.24.0.0/24 out
Mon Sep 10 15:20:00 2018 daemon.info : 00[KNL] getting iface index for pppoe-wan
Mon Sep 10 15:20:00 2018 daemon.info : 00[KNL] deleting SAD entry with SPI c655cb97
Mon Sep 10 15:20:00 2018 daemon.info : 00[KNL] deleted SAD entry with SPI c655cb97
Mon Sep 10 15:20:00 2018 daemon.info : 00[KNL] deleting SAD entry with SPI c85cde0d
Mon Sep 10 15:20:00 2018 daemon.info : 00[KNL] deleted SAD entry with SPI c85cde0d
Mon Sep 10 15:20:00 2018 daemon.info : 00[KNL] deleting virtual IP 172.56.0.6
Mon Sep 10 15:20:01 2018 authpriv.info ipsec_starter[2574]: charon stopped after 200 ms
Mon Sep 10 15:20:01 2018 authpriv.info ipsec_starter[2574]: ipsec starter stopped
Mon Sep 10 15:20:04 2018 authpriv.info ipsec_starter[2647]: Starting strongSwan 5.5.3 IPsec [starter]...
Mon Sep 10 15:20:04 2018 daemon.err modprobe: ah4 is already loaded
Mon Sep 10 15:20:04 2018 daemon.err modprobe: esp4 is already loaded
Mon Sep 10 15:20:04 2018 daemon.err modprobe: ipcomp is already loaded
Mon Sep 10 15:20:04 2018 daemon.err modprobe: xfrm4_tunnel is already loaded
Mon Sep 10 15:20:04 2018 daemon.err modprobe: xfrm_user is already loaded
Mon Sep 10 15:20:04 2018 daemon.info : 00[DMN] Starting IKE charon daemon (strongSwan 5.5.3, Linux 4.4.92, mips)
Mon Sep 10 15:20:04 2018 daemon.info : 00[KNL] known interfaces and IP addresses:
Mon Sep 10 15:20:04 2018 daemon.info : 00[KNL]   lo
Mon Sep 10 15:20:04 2018 daemon.info : 00[KNL]     127.0.0.1
Mon Sep 10 15:20:04 2018 daemon.info : 00[KNL]     ::1
Mon Sep 10 15:20:04 2018 daemon.info : 00[KNL]   eth0
Mon Sep 10 15:20:04 2018 daemon.info : 00[KNL]     fe80::7a8a:20ff:febc:4685
Mon Sep 10 15:20:04 2018 daemon.info : 00[KNL]   br-lan
Mon Sep 10 15:20:04 2018 daemon.info : 00[KNL]     192.168.200.1
Mon Sep 10 15:20:04 2018 daemon.info : 00[KNL]     240e:fe:f01:500::1
Mon Sep 10 15:20:04 2018 daemon.info : 00[KNL]     fe80::7a8a:20ff:febc:4685
Mon Sep 10 15:20:04 2018 daemon.info : 00[KNL]   eth0.1
Mon Sep 10 15:20:04 2018 daemon.info : 00[KNL]   eth0.2
Mon Sep 10 15:20:04 2018 daemon.info : 00[KNL]     fe80::7a8a:20ff:febc:4685
Mon Sep 10 15:20:04 2018 daemon.info : 00[KNL]   pppoe-wan
Mon Sep 10 15:20:04 2018 daemon.info : 00[KNL]     100.64.6.230
Mon Sep 10 15:20:04 2018 daemon.info : 00[KNL]     240e:fa:ef:6a:7a8a:2042:24bc:4685
Mon Sep 10 15:20:04 2018 daemon.info : 00[KNL]     fe80::7a8a:2042:24bc:4685
Mon Sep 10 15:20:04 2018 daemon.info : 00[LIB] loaded plugins: charon aes des rc2 sha2 sha1 md5 random nonce x509 revocation constraints pubkey pkcs1 pgp dnskey sshkey pem fips-prf gmp xcbc hmac attr kernel-netlink resolve socket-default connmark stroke updown xauth-generic
Mon Sep 10 15:20:04 2018 daemon.info : 00[JOB] spawning 16 worker threads
Mon Sep 10 15:20:04 2018 authpriv.info ipsec_starter[2672]: charon (2673) started after 40 ms
Mon Sep 10 15:20:04 2018 daemon.info : 07[KNL] 139.198.125.122 is not a local address or the interface is down
Mon Sep 10 15:20:04 2018 daemon.info : 08[KNL] using 100.64.6.230 as address to reach 139.198.125.122/32
Mon Sep 10 15:20:04 2018 daemon.info : 08[IKE] queueing IKE_VENDOR task
Mon Sep 10 15:20:04 2018 daemon.info : 08[IKE] queueing IKE_INIT task
Mon Sep 10 15:20:04 2018 daemon.info : 08[IKE] queueing IKE_NATD task
Mon Sep 10 15:20:04 2018 daemon.info : 08[IKE] queueing IKE_CERT_PRE task
Mon Sep 10 15:20:04 2018 daemon.info : 08[IKE] queueing IKE_AUTH task
Mon Sep 10 15:20:04 2018 daemon.info : 08[IKE] queueing IKE_CERT_POST task
Mon Sep 10 15:20:04 2018 daemon.info : 08[IKE] queueing IKE_CONFIG task
Mon Sep 10 15:20:04 2018 daemon.info : 08[IKE] queueing IKE_AUTH_LIFETIME task
Mon Sep 10 15:20:04 2018 daemon.info : 08[IKE] queueing IKE_MOBIKE task
Mon Sep 10 15:20:04 2018 daemon.info : 08[IKE] queueing IKE_ME task
Mon Sep 10 15:20:04 2018 daemon.info : 08[IKE] queueing CHILD_CREATE task
Mon Sep 10 15:20:04 2018 daemon.info : 08[IKE] activating new tasks
Mon Sep 10 15:20:04 2018 daemon.info : 08[IKE]   activating IKE_VENDOR task
Mon Sep 10 15:20:04 2018 daemon.info : 08[IKE]   activating IKE_INIT task
Mon Sep 10 15:20:04 2018 daemon.info : 08[IKE]   activating IKE_NATD task
Mon Sep 10 15:20:04 2018 daemon.info : 08[IKE]   activating IKE_CERT_PRE task
Mon Sep 10 15:20:04 2018 daemon.info : 08[IKE]   activating IKE_ME task
Mon Sep 10 15:20:04 2018 daemon.info : 08[IKE]   activating IKE_AUTH task
Mon Sep 10 15:20:04 2018 daemon.info : 08[IKE]   activating IKE_CERT_POST task
Mon Sep 10 15:20:04 2018 daemon.info : 08[IKE]   activating IKE_CONFIG task
Mon Sep 10 15:20:04 2018 daemon.info : 08[IKE]   activating CHILD_CREATE task
Mon Sep 10 15:20:04 2018 daemon.info : 08[IKE]   activating IKE_AUTH_LIFETIME task
Mon Sep 10 15:20:04 2018 daemon.info : 08[IKE]   activating IKE_MOBIKE task
Mon Sep 10 15:20:04 2018 daemon.info : 08[IKE] initiating IKE_SA chaogong[1] to 139.198.125.122
Mon Sep 10 15:20:04 2018 authpriv.info : 08[IKE] initiating IKE_SA chaogong[1] to 139.198.125.122
Mon Sep 10 15:20:04 2018 daemon.info : 08[IKE] IKE_SA chaogong[1] state change: CREATED => CONNECTING
Mon Sep 10 15:20:04 2018 daemon.info : 08[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Mon Sep 10 15:20:04 2018 daemon.info : 08[NET] sending packet: from 100.64.6.230[500] to 139.198.125.122[500] (464 bytes)
Mon Sep 10 15:20:04 2018 daemon.info : 05[NET] received packet: from 139.198.125.122[500] to 100.64.6.230[500] (489 bytes)
Mon Sep 10 15:20:04 2018 daemon.info : 05[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
Mon Sep 10 15:20:04 2018 daemon.info : 05[IKE] received FRAGMENTATION_SUPPORTED notify
Mon Sep 10 15:20:04 2018 daemon.info : 05[IKE] received SIGNATURE_HASH_ALGORITHMS notify
Mon Sep 10 15:20:05 2018 daemon.info : 05[IKE] local host is behind NAT, sending keep alives
Mon Sep 10 15:20:05 2018 daemon.info : 05[IKE] remote host is behind NAT
Mon Sep 10 15:20:05 2018 daemon.info : 05[IKE] received cert request for unknown ca with keyid 8d:d8:89:95:69:db:0f:97:90:62:7e:a5:ce:cc:8e:12:f1:93:d5:96
Mon Sep 10 15:20:05 2018 daemon.info : 05[IKE] received 1 cert requests for an unknown ca
Mon Sep 10 15:20:05 2018 daemon.info : 05[IKE] reinitiating already active tasks
Mon Sep 10 15:20:05 2018 daemon.info : 05[IKE]   IKE_CERT_PRE task
Mon Sep 10 15:20:05 2018 daemon.info : 05[IKE]   IKE_AUTH task
Mon Sep 10 15:20:05 2018 daemon.info : 05[IKE] authentication of 'nash-sz' (myself) with pre-shared key
Mon Sep 10 15:20:05 2018 daemon.info : 05[IKE] successfully created shared key MAC
Mon Sep 10 15:20:05 2018 daemon.info : 05[IKE] building INTERNAL_IP4_DNS attribute
Mon Sep 10 15:20:05 2018 daemon.info : 05[IKE] establishing CHILD_SA chaogong
Mon Sep 10 15:20:05 2018 authpriv.info : 05[IKE] establishing CHILD_SA chaogong
Mon Sep 10 15:20:05 2018 daemon.info : 05[KNL] got SPI c752064c
Mon Sep 10 15:20:05 2018 daemon.info : 05[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH CPRQ(ADDR DNS) SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_6_ADDR) N(ADD_6_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Mon Sep 10 15:20:05 2018 daemon.info : 05[NET] sending packet: from 100.64.6.230[4500] to 139.198.125.122[4500] (332 bytes)
Mon Sep 10 15:20:05 2018 daemon.info : 09[NET] received packet: from 139.198.125.122[4500] to 100.64.6.230[4500] (252 bytes)
Mon Sep 10 15:20:05 2018 daemon.info : 09[ENC] parsed IKE_AUTH response 1 [ IDr AUTH CPRP(ADDR) SA TSi TSr N(AUTH_LFT) N(MOBIKE_SUP) N(ADD_4_ADDR) ]
Mon Sep 10 15:20:05 2018 daemon.info : 09[IKE] authentication of 'nashwork' with pre-shared key successful
Mon Sep 10 15:20:05 2018 daemon.info : 09[IKE] IKE_SA chaogong[1] established between 100.64.6.230[nash-sz]...139.198.125.122[nashwork]
Mon Sep 10 15:20:05 2018 authpriv.info : 09[IKE] IKE_SA chaogong[1] established between 100.64.6.230[nash-sz]...139.198.125.122[nashwork]
Mon Sep 10 15:20:05 2018 daemon.info : 09[IKE] IKE_SA chaogong[1] state change: CONNECTING => ESTABLISHED
Mon Sep 10 15:20:05 2018 daemon.info : 09[IKE] scheduling reauthentication in 3378s
Mon Sep 10 15:20:05 2018 daemon.info : 09[IKE] maximum IKE_SA lifetime 3558s
Mon Sep 10 15:20:05 2018 daemon.info : 09[IKE] processing INTERNAL_IP4_ADDRESS attribute
Mon Sep 10 15:20:05 2018 daemon.info : 09[KNL] 100.64.6.230 is on interface pppoe-wan
Mon Sep 10 15:20:05 2018 daemon.info : 09[IKE] installing new virtual IP 172.56.0.6
Mon Sep 10 15:20:05 2018 daemon.info : 09[KNL] virtual IP 172.56.0.6 installed on pppoe-wan
Mon Sep 10 15:20:05 2018 daemon.info : 09[KNL] adding SAD entry with SPI c752064c and reqid {1}
Mon Sep 10 15:20:05 2018 daemon.info : 09[KNL]   using encryption algorithm AES_CBC with key size 128
Mon Sep 10 15:20:05 2018 daemon.info : 09[KNL]   using integrity algorithm HMAC_SHA1_96 with key size 160
Mon Sep 10 15:20:05 2018 daemon.info : 09[KNL]   using replay window of 32 packets
Mon Sep 10 15:20:05 2018 daemon.info : 09[KNL] adding SAD entry with SPI c73fad98 and reqid {1}
Mon Sep 10 15:20:05 2018 daemon.info : 09[KNL]   using encryption algorithm AES_CBC with key size 128
Mon Sep 10 15:20:05 2018 daemon.info : 09[KNL]   using integrity algorithm HMAC_SHA1_96 with key size 160
Mon Sep 10 15:20:05 2018 daemon.info : 09[KNL]   using replay window of 0 packets
Mon Sep 10 15:20:05 2018 daemon.info : 09[KNL] adding policy 172.56.0.6/32 === 172.24.0.0/24 out [priority 571327, refcount 1]
Mon Sep 10 15:20:05 2018 daemon.info : 09[KNL] adding policy 172.24.0.0/24 === 172.56.0.6/32 in [priority 371327, refcount 1]
Mon Sep 10 15:20:05 2018 daemon.info : 09[KNL] adding policy 172.24.0.0/24 === 172.56.0.6/32 fwd [priority 371327, refcount 1]
Mon Sep 10 15:20:05 2018 daemon.info : 09[KNL] policy 172.56.0.6/32 === 172.24.0.0/24 out already exists, increasing refcount
Mon Sep 10 15:20:05 2018 daemon.info : 09[KNL] updating policy 172.56.0.6/32 === 172.24.0.0/24 out [priority 371327, refcount 2]
Mon Sep 10 15:20:05 2018 daemon.info : 09[KNL] getting a local address in traffic selector 172.56.0.6/32
Mon Sep 10 15:20:05 2018 daemon.info : 09[KNL] using host 172.56.0.6
Mon Sep 10 15:20:05 2018 daemon.info : 09[KNL] getting iface name for index 6
Mon Sep 10 15:20:05 2018 daemon.info : 09[KNL] using 100.64.0.1 as nexthop and pppoe-wan as dev to reach 139.198.125.122/32
Mon Sep 10 15:20:05 2018 daemon.info : 09[KNL] installing route: 172.24.0.0/24 via 100.64.0.1 src 172.56.0.6 dev pppoe-wan
Mon Sep 10 15:20:05 2018 daemon.info : 09[KNL] getting iface index for pppoe-wan
Mon Sep 10 15:20:05 2018 daemon.info : 09[IKE] CHILD_SA chaogong{1} established with SPIs c752064c_i c73fad98_o and TS 172.56.0.6/32 === 172.24.0.0/24
Mon Sep 10 15:20:05 2018 authpriv.info : 09[IKE] CHILD_SA chaogong{1} established with SPIs c752064c_i c73fad98_o and TS 172.56.0.6/32 === 172.24.0.0/24
Mon Sep 10 15:20:05 2018 daemon.info : 09[IKE] received AUTH_LIFETIME of 10236s, reauthentication already scheduled in 3378s
Mon Sep 10 15:20:05 2018 daemon.info : 09[IKE] peer supports MOBIKE
Mon Sep 10 15:20:05 2018 daemon.info : 09[IKE] got additional MOBIKE peer address: 172.56.0.2
Mon Sep 10 15:20:05 2018 daemon.info : 09[IKE] activating new tasks
Mon Sep 10 15:20:05 2018 daemon.info : 09[IKE] nothing to initiate
Mon Sep 10 15:20:05 2018 daemon.info : 12[KNL] getting iface index for pppoe-wan
Mon Sep 10 15:20:25 2018 daemon.info : 06[KNL] querying policy 172.56.0.6/32 === 172.24.0.0/24 out
Mon Sep 10 15:20:25 2018 daemon.info : 06[KNL] querying SAD entry with SPI c73fad98
Mon Sep 10 15:20:29 2018 daemon.info : 07[KNL] querying policy 172.56.0.6/32 === 172.24.0.0/24 out
Mon Sep 10 15:20:29 2018 daemon.info : 07[KNL] querying SAD entry with SPI c73fad98
Mon Sep 10 15:20:29 2018 daemon.info : 07[IKE] sending keep alive to 139.198.125.122[4500]
Mon Sep 10 15:20:35 2018 daemon.info : 03[KNL] querying policy 172.24.0.0/24 === 172.56.0.6/32 in
Mon Sep 10 15:20:35 2018 daemon.info : 03[KNL] querying policy 172.24.0.0/24 === 172.56.0.6/32 fwd
Mon Sep 10 15:20:35 2018 daemon.info : 03[KNL] querying SAD entry with SPI c752064c
Mon Sep 10 15:20:35 2018 daemon.info : 03[IKE] sending DPD request
Mon Sep 10 15:20:35 2018 daemon.info : 03[IKE] queueing IKE_MOBIKE task
Mon Sep 10 15:20:35 2018 daemon.info : 03[IKE] activating new tasks
Mon Sep 10 15:20:35 2018 daemon.info : 03[IKE]   activating IKE_MOBIKE task
Mon Sep 10 15:20:35 2018 daemon.info : 03[KNL] using 100.64.6.230 as address to reach 139.198.125.122/32
Mon Sep 10 15:20:35 2018 daemon.info : 03[ENC] generating INFORMATIONAL request 2 [ N(NATD_S_IP) N(NATD_D_IP) ]
Mon Sep 10 15:20:35 2018 daemon.info : 03[KNL] using 100.64.6.230 as address to reach 139.198.125.122/32
Mon Sep 10 15:20:35 2018 daemon.info : 03[NET] sending packet: from 100.64.6.230[4500] to 139.198.125.122[4500] (124 bytes)
Mon Sep 10 15:20:35 2018 daemon.info : 08[NET] received packet: from 139.198.125.122[4500] to 100.64.6.230[4500] (124 bytes)
Mon Sep 10 15:20:35 2018 daemon.info : 08[ENC] parsed INFORMATIONAL response 2 [ N(NATD_S_IP) N(NATD_D_IP) ]
Mon Sep 10 15:20:35 2018 daemon.info : 08[IKE] activating new tasks
Mon Sep 10 15:20:35 2018 daemon.info : 08[IKE] nothing to initiate
Mon Sep 10 15:20:49 2018 daemon.info : 10[KNL] querying policy 172.56.0.6/32 === 172.24.0.0/24 out
Mon Sep 10 15:20:49 2018 daemon.info : 10[KNL] querying SAD entry with SPI c73fad98
Mon Sep 10 15:20:59 2018 daemon.info : 11[KNL] querying policy 172.56.0.6/32 === 172.24.0.0/24 out
Mon Sep 10 15:20:59 2018 daemon.info : 11[KNL] querying SAD entry with SPI c73fad98
Mon Sep 10 15:20:59 2018 daemon.info : 11[IKE] sending keep alive to 139.198.125.122[4500]
Mon Sep 10 15:21:00 2018 cron.info crond[725]: USER root pid 2737 cmd /bin/sh /etc/check_ipsec.sh
Mon Sep 10 15:21:01 2018 daemon.info : 00[DMN] signal of type SIGINT received. Shutting down
Mon Sep 10 15:21:01 2018 daemon.info : 00[IKE] queueing IKE_DELETE task
Mon Sep 10 15:21:01 2018 daemon.info : 00[IKE] activating new tasks
Mon Sep 10 15:21:01 2018 daemon.info : 00[IKE]   activating IKE_DELETE task
Mon Sep 10 15:21:01 2018 daemon.info : 00[IKE] deleting IKE_SA chaogong[1] between 100.64.6.230[nash-sz]...139.198.125.122[nashwork]
Mon Sep 10 15:21:01 2018 authpriv.info : 00[IKE] deleting IKE_SA chaogong[1] between 100.64.6.230[nash-sz]...139.198.125.122[nashwork]
Mon Sep 10 15:21:01 2018 daemon.info : 00[IKE] IKE_SA chaogong[1] state change: ESTABLISHED => DELETING
Mon Sep 10 15:21:01 2018 daemon.info : 00[IKE] sending DELETE for IKE_SA chaogong[1]
Mon Sep 10 15:21:01 2018 daemon.info : 00[ENC] generating INFORMATIONAL request 3 [ D ]
Mon Sep 10 15:21:01 2018 daemon.info : 00[NET] sending packet: from 100.64.6.230[4500] to 139.198.125.122[4500] (76 bytes)
Mon Sep 10 15:21:01 2018 daemon.info : 00[IKE] IKE_SA chaogong[1] state change: DELETING => DESTROYING
Mon Sep 10 15:21:01 2018 daemon.info : 00[KNL] deleting policy 172.56.0.6/32 === 172.24.0.0/24 out
Mon Sep 10 15:21:01 2018 daemon.info : 00[KNL] policy still used by another CHILD_SA, not removed
Mon Sep 10 15:21:01 2018 daemon.info : 00[KNL] updating policy 172.56.0.6/32 === 172.24.0.0/24 out [priority 571327, refcount 1]
Mon Sep 10 15:21:01 2018 daemon.info : 00[KNL] deleting policy 172.24.0.0/24 === 172.56.0.6/32 in
Mon Sep 10 15:21:01 2018 daemon.info : 00[KNL] deleting policy 172.24.0.0/24 === 172.56.0.6/32 fwd
Mon Sep 10 15:21:01 2018 daemon.info : 00[KNL] deleting policy 172.56.0.6/32 === 172.24.0.0/24 out
Mon Sep 10 15:21:01 2018 daemon.info : 00[KNL] getting iface index for pppoe-wan
Mon Sep 10 15:21:01 2018 daemon.info : 00[KNL] deleting SAD entry with SPI c752064c
Mon Sep 10 15:21:01 2018 daemon.info : 00[KNL] deleted SAD entry with SPI c752064c
Mon Sep 10 15:21:01 2018 daemon.info : 00[KNL] deleting SAD entry with SPI c73fad98
Mon Sep 10 15:21:01 2018 daemon.info : 00[KNL] deleted SAD entry with SPI c73fad98
Mon Sep 10 15:21:01 2018 daemon.info : 00[KNL] deleting virtual IP 172.56.0.6
Mon Sep 10 15:21:01 2018 authpriv.info ipsec_starter[2672]: charon stopped after 200 ms
Mon Sep 10 15:21:01 2018 authpriv.info ipsec_starter[2672]: ipsec starter stopped
Mon Sep 10 15:21:04 2018 authpriv.info ipsec_starter[2745]: Starting strongSwan 5.5.3 IPsec [starter]...
Mon Sep 10 15:21:04 2018 daemon.err modprobe: ah4 is already loaded
Mon Sep 10 15:21:04 2018 daemon.err modprobe: esp4 is already loaded
Mon Sep 10 15:21:04 2018 daemon.err modprobe: ipcomp is already loaded
Mon Sep 10 15:21:04 2018 daemon.err modprobe: xfrm4_tunnel is already loaded
Mon Sep 10 15:21:04 2018 daemon.err modprobe: xfrm_user is already loaded
Mon Sep 10 15:21:04 2018 daemon.info : 00[DMN] Starting IKE charon daemon (strongSwan 5.5.3, Linux 4.4.92, mips)
Mon Sep 10 15:21:04 2018 daemon.info : 00[KNL] known interfaces and IP addresses:
Mon Sep 10 15:21:04 2018 daemon.info : 00[KNL]   lo
Mon Sep 10 15:21:04 2018 daemon.info : 00[KNL]     127.0.0.1
Mon Sep 10 15:21:04 2018 daemon.info : 00[KNL]     ::1
Mon Sep 10 15:21:04 2018 daemon.info : 00[KNL]   eth0
Mon Sep 10 15:21:04 2018 daemon.info : 00[KNL]     fe80::7a8a:20ff:febc:4685
Mon Sep 10 15:21:04 2018 daemon.info : 00[KNL]   br-lan
Mon Sep 10 15:21:04 2018 daemon.info : 00[KNL]     192.168.200.1
Mon Sep 10 15:21:04 2018 daemon.info : 00[KNL]     240e:fe:f01:500::1
Mon Sep 10 15:21:04 2018 daemon.info : 00[KNL]     fe80::7a8a:20ff:febc:4685
Mon Sep 10 15:21:04 2018 daemon.info : 00[KNL]   eth0.1
Mon Sep 10 15:21:04 2018 daemon.info : 00[KNL]   eth0.2
Mon Sep 10 15:21:04 2018 daemon.info : 00[KNL]     fe80::7a8a:20ff:febc:4685
Mon Sep 10 15:21:04 2018 daemon.info : 00[KNL]   pppoe-wan
Mon Sep 10 15:21:04 2018 daemon.info : 00[KNL]     100.64.6.230
Mon Sep 10 15:21:04 2018 daemon.info : 00[KNL]     240e:fa:ef:6a:7a8a:2042:24bc:4685
Mon Sep 10 15:21:04 2018 daemon.info : 00[KNL]     fe80::7a8a:2042:24bc:4685
Mon Sep 10 15:21:04 2018 daemon.info : 00[LIB] loaded plugins: charon aes des rc2 sha2 sha1 md5 random nonce x509 revocation constraints pubkey pkcs1 pgp dnskey sshkey pem fips-prf gmp xcbc hmac attr kernel-netlink resolve socket-default connmark stroke updown xauth-generic
Mon Sep 10 15:21:04 2018 daemon.info : 00[JOB] spawning 16 worker threads
Mon Sep 10 15:21:04 2018 authpriv.info ipsec_starter[2771]: charon (2772) started after 40 ms
Mon Sep 10 15:21:04 2018 daemon.info : 08[KNL] 139.198.125.122 is not a local address or the interface is down
Mon Sep 10 15:21:04 2018 daemon.info : 04[KNL] using 100.64.6.230 as address to reach 139.198.125.122/32
Mon Sep 10 15:21:04 2018 daemon.info : 04[IKE] queueing IKE_VENDOR task
Mon Sep 10 15:21:04 2018 daemon.info : 04[IKE] queueing IKE_INIT task
Mon Sep 10 15:21:04 2018 daemon.info : 04[IKE] queueing IKE_NATD task
Mon Sep 10 15:21:04 2018 daemon.info : 04[IKE] queueing IKE_CERT_PRE task
Mon Sep 10 15:21:04 2018 daemon.info : 04[IKE] queueing IKE_AUTH task
Mon Sep 10 15:21:04 2018 daemon.info : 04[IKE] queueing IKE_CERT_POST task
Mon Sep 10 15:21:04 2018 daemon.info : 04[IKE] queueing IKE_CONFIG task
Mon Sep 10 15:21:04 2018 daemon.info : 04[IKE] queueing IKE_AUTH_LIFETIME task
Mon Sep 10 15:21:04 2018 daemon.info : 04[IKE] queueing IKE_MOBIKE task
Mon Sep 10 15:21:04 2018 daemon.info : 04[IKE] queueing IKE_ME task
Mon Sep 10 15:21:04 2018 daemon.info : 04[IKE] queueing CHILD_CREATE task
Mon Sep 10 15:21:04 2018 daemon.info : 04[IKE] activating new tasks
Mon Sep 10 15:21:04 2018 daemon.info : 04[IKE]   activating IKE_VENDOR task
Mon Sep 10 15:21:04 2018 daemon.info : 04[IKE]   activating IKE_INIT task
Mon Sep 10 15:21:04 2018 daemon.info : 04[IKE]   activating IKE_NATD task
Mon Sep 10 15:21:04 2018 daemon.info : 04[IKE]   activating IKE_CERT_PRE task
Mon Sep 10 15:21:04 2018 daemon.info : 04[IKE]   activating IKE_ME task
Mon Sep 10 15:21:04 2018 daemon.info : 04[IKE]   activating IKE_AUTH task
Mon Sep 10 15:21:04 2018 daemon.info : 04[IKE]   activating IKE_CERT_POST task
Mon Sep 10 15:21:04 2018 daemon.info : 04[IKE]   activating IKE_CONFIG task
Mon Sep 10 15:21:04 2018 daemon.info : 04[IKE]   activating CHILD_CREATE task
Mon Sep 10 15:21:04 2018 daemon.info : 04[IKE]   activating IKE_AUTH_LIFETIME task
Mon Sep 10 15:21:04 2018 daemon.info : 04[IKE]   activating IKE_MOBIKE task
Mon Sep 10 15:21:04 2018 daemon.info : 04[IKE] initiating IKE_SA chaogong[1] to 139.198.125.122
Mon Sep 10 15:21:04 2018 authpriv.info : 04[IKE] initiating IKE_SA chaogong[1] to 139.198.125.122
Mon Sep 10 15:21:04 2018 daemon.info : 04[IKE] IKE_SA chaogong[1] state change: CREATED => CONNECTING
Mon Sep 10 15:21:04 2018 daemon.info : 04[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Mon Sep 10 15:21:04 2018 daemon.info : 04[NET] sending packet: from 100.64.6.230[500] to 139.198.125.122[500] (464 bytes)
Mon Sep 10 15:21:04 2018 daemon.info : 07[NET] received packet: from 139.198.125.122[500] to 100.64.6.230[500] (489 bytes)
Mon Sep 10 15:21:04 2018 daemon.info : 07[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
Mon Sep 10 15:21:04 2018 daemon.info : 07[IKE] received FRAGMENTATION_SUPPORTED notify
Mon Sep 10 15:21:04 2018 daemon.info : 07[IKE] received SIGNATURE_HASH_ALGORITHMS notify
Mon Sep 10 15:21:05 2018 daemon.info : 07[IKE] local host is behind NAT, sending keep alives
Mon Sep 10 15:21:05 2018 daemon.info : 07[IKE] remote host is behind NAT
Mon Sep 10 15:21:05 2018 daemon.info : 07[IKE] received cert request for unknown ca with keyid 8d:d8:89:95:69:db:0f:97:90:62:7e:a5:ce:cc:8e:12:f1:93:d5:96
Mon Sep 10 15:21:05 2018 daemon.info : 07[IKE] received 1 cert requests for an unknown ca
Mon Sep 10 15:21:05 2018 daemon.info : 07[IKE] reinitiating already active tasks
Mon Sep 10 15:21:05 2018 daemon.info : 07[IKE]   IKE_CERT_PRE task
Mon Sep 10 15:21:05 2018 daemon.info : 07[IKE]   IKE_AUTH task
Mon Sep 10 15:21:05 2018 daemon.info : 07[IKE] authentication of 'nash-sz' (myself) with pre-shared key
Mon Sep 10 15:21:05 2018 daemon.info : 07[IKE] successfully created shared key MAC
Mon Sep 10 15:21:05 2018 daemon.info : 07[IKE] building INTERNAL_IP4_DNS attribute
Mon Sep 10 15:21:05 2018 daemon.info : 07[IKE] establishing CHILD_SA chaogong
Mon Sep 10 15:21:05 2018 authpriv.info : 07[IKE] establishing CHILD_SA chaogong
Mon Sep 10 15:21:05 2018 daemon.info : 07[KNL] got SPI c93db8c7
Mon Sep 10 15:21:05 2018 daemon.info : 07[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH CPRQ(ADDR DNS) SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_6_ADDR) N(ADD_6_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Mon Sep 10 15:21:05 2018 daemon.info : 07[NET] sending packet: from 100.64.6.230[4500] to 139.198.125.122[4500] (332 bytes)
Mon Sep 10 15:21:05 2018 daemon.info : 09[NET] received packet: from 139.198.125.122[4500] to 100.64.6.230[4500] (252 bytes)
Mon Sep 10 15:21:05 2018 daemon.info : 09[ENC] parsed IKE_AUTH response 1 [ IDr AUTH CPRP(ADDR) SA TSi TSr N(AUTH_LFT) N(MOBIKE_SUP) N(ADD_4_ADDR) ]
Mon Sep 10 15:21:05 2018 daemon.info : 09[IKE] authentication of 'nashwork' with pre-shared key successful
Mon Sep 10 15:21:05 2018 daemon.info : 09[IKE] IKE_SA chaogong[1] established between 100.64.6.230[nash-sz]...139.198.125.122[nashwork]
Mon Sep 10 15:21:05 2018 authpriv.info : 09[IKE] IKE_SA chaogong[1] established between 100.64.6.230[nash-sz]...139.198.125.122[nashwork]
Mon Sep 10 15:21:05 2018 daemon.info : 09[IKE] IKE_SA chaogong[1] state change: CONNECTING => ESTABLISHED
Mon Sep 10 15:21:05 2018 daemon.info : 09[IKE] scheduling reauthentication in 3336s
Mon Sep 10 15:21:05 2018 daemon.info : 09[IKE] maximum IKE_SA lifetime 3516s
Mon Sep 10 15:21:05 2018 daemon.info : 09[IKE] processing INTERNAL_IP4_ADDRESS attribute
Mon Sep 10 15:21:05 2018 daemon.info : 09[KNL] 100.64.6.230 is on interface pppoe-wan
Mon Sep 10 15:21:05 2018 daemon.info : 09[IKE] installing new virtual IP 172.56.0.6
Mon Sep 10 15:21:05 2018 daemon.info : 09[KNL] virtual IP 172.56.0.6 installed on pppoe-wan
Mon Sep 10 15:21:05 2018 daemon.info : 09[KNL] adding SAD entry with SPI c93db8c7 and reqid {1}
Mon Sep 10 15:21:05 2018 daemon.info : 09[KNL]   using encryption algorithm AES_CBC with key size 128
Mon Sep 10 15:21:05 2018 daemon.info : 09[KNL]   using integrity algorithm HMAC_SHA1_96 with key size 160
Mon Sep 10 15:21:05 2018 daemon.info : 09[KNL]   using replay window of 32 packets
Mon Sep 10 15:21:05 2018 daemon.info : 09[KNL] adding SAD entry with SPI c030f1f0 and reqid {1}
Mon Sep 10 15:21:05 2018 daemon.info : 09[KNL]   using encryption algorithm AES_CBC with key size 128
Mon Sep 10 15:21:05 2018 daemon.info : 09[KNL]   using integrity algorithm HMAC_SHA1_96 with key size 160
Mon Sep 10 15:21:05 2018 daemon.info : 09[KNL]   using replay window of 0 packets
Mon Sep 10 15:21:05 2018 daemon.info : 09[KNL] adding policy 172.56.0.6/32 === 172.24.0.0/24 out [priority 571327, refcount 1]
Mon Sep 10 15:21:05 2018 daemon.info : 09[KNL] adding policy 172.24.0.0/24 === 172.56.0.6/32 in [priority 371327, refcount 1]
Mon Sep 10 15:21:05 2018 daemon.info : 09[KNL] adding policy 172.24.0.0/24 === 172.56.0.6/32 fwd [priority 371327, refcount 1]
Mon Sep 10 15:21:05 2018 daemon.info : 09[KNL] policy 172.56.0.6/32 === 172.24.0.0/24 out already exists, increasing refcount
Mon Sep 10 15:21:05 2018 daemon.info : 09[KNL] updating policy 172.56.0.6/32 === 172.24.0.0/24 out [priority 371327, refcount 2]
Mon Sep 10 15:21:05 2018 daemon.info : 09[KNL] getting a local address in traffic selector 172.56.0.6/32
Mon Sep 10 15:21:05 2018 daemon.info : 09[KNL] using host 172.56.0.6
Mon Sep 10 15:21:05 2018 daemon.info : 09[KNL] getting iface name for index 6
Mon Sep 10 15:21:05 2018 daemon.info : 09[KNL] using 100.64.0.1 as nexthop and pppoe-wan as dev to reach 139.198.125.122/32
Mon Sep 10 15:21:05 2018 daemon.info : 09[KNL] installing route: 172.24.0.0/24 via 100.64.0.1 src 172.56.0.6 dev pppoe-wan
Mon Sep 10 15:21:05 2018 daemon.info : 09[KNL] getting iface index for pppoe-wan
Mon Sep 10 15:21:05 2018 daemon.info : 09[IKE] CHILD_SA chaogong{1} established with SPIs c93db8c7_i c030f1f0_o and TS 172.56.0.6/32 === 172.24.0.0/24
Mon Sep 10 15:21:05 2018 authpriv.info : 09[IKE] CHILD_SA chaogong{1} established with SPIs c93db8c7_i c030f1f0_o and TS 172.56.0.6/32 === 172.24.0.0/24
Mon Sep 10 15:21:05 2018 daemon.info : 09[IKE] received AUTH_LIFETIME of 9840s, reauthentication already scheduled in 3336s
Mon Sep 10 15:21:05 2018 daemon.info : 09[IKE] peer supports MOBIKE
Mon Sep 10 15:21:05 2018 daemon.info : 09[IKE] got additional MOBIKE peer address: 172.56.0.2
Mon Sep 10 15:21:05 2018 daemon.info : 09[IKE] activating new tasks
Mon Sep 10 15:21:05 2018 daemon.info : 09[IKE] nothing to initiate
Mon Sep 10 15:21:05 2018 daemon.info : 13[KNL] getting iface index for pppoe-wan
Mon Sep 10 15:21:25 2018 daemon.info : 06[KNL] querying policy 172.56.0.6/32 === 172.24.0.0/24 out
Mon Sep 10 15:21:25 2018 daemon.info : 06[KNL] querying SAD entry with SPI c030f1f0
Mon Sep 10 15:21:29 2018 daemon.info : 08[KNL] querying policy 172.56.0.6/32 === 172.24.0.0/24 out
Mon Sep 10 15:21:29 2018 daemon.info : 08[KNL] querying SAD entry with SPI c030f1f0
Mon Sep 10 15:21:29 2018 daemon.info : 08[IKE] sending keep alive to 139.198.125.122[4500]
Mon Sep 10 15:21:35 2018 daemon.info : 03[KNL] querying policy 172.24.0.0/24 === 172.56.0.6/32 in
Mon Sep 10 15:21:35 2018 daemon.info : 03[KNL] querying policy 172.24.0.0/24 === 172.56.0.6/32 fwd
Mon Sep 10 15:21:35 2018 daemon.info : 03[KNL] querying SAD entry with SPI c93db8c7
Mon Sep 10 15:21:35 2018 daemon.info : 03[IKE] sending DPD request
Mon Sep 10 15:21:35 2018 daemon.info : 03[IKE] queueing IKE_MOBIKE task
Mon Sep 10 15:21:35 2018 daemon.info : 03[IKE] activating new tasks
Mon Sep 10 15:21:35 2018 daemon.info : 03[IKE]   activating IKE_MOBIKE task
Mon Sep 10 15:21:35 2018 daemon.info : 03[KNL] using 100.64.6.230 as address to reach 139.198.125.122/32
Mon Sep 10 15:21:35 2018 daemon.info : 03[ENC] generating INFORMATIONAL request 2 [ N(NATD_S_IP) N(NATD_D_IP) ]
Mon Sep 10 15:21:35 2018 daemon.info : 03[KNL] using 100.64.6.230 as address to reach 139.198.125.122/32
Mon Sep 10 15:21:35 2018 daemon.info : 03[NET] sending packet: from 100.64.6.230[4500] to 139.198.125.122[4500] (124 bytes)
Mon Sep 10 15:21:35 2018 daemon.info : 04[NET] received packet: from 139.198.125.122[4500] to 100.64.6.230[4500] (124 bytes)
Mon Sep 10 15:21:35 2018 daemon.info : 04[ENC] parsed INFORMATIONAL response 2 [ N(NATD_S_IP) N(NATD_D_IP) ]
Mon Sep 10 15:21:35 2018 daemon.info : 04[IKE] activating new tasks
Mon Sep 10 15:21:35 2018 daemon.info : 04[IKE] nothing to initiate
Mon Sep 10 15:21:49 2018 daemon.info : 10[KNL] querying policy 172.56.0.6/32 === 172.24.0.0/24 out
Mon Sep 10 15:21:49 2018 daemon.info : 10[KNL] querying SAD entry with SPI c030f1f0
Mon Sep 10 15:21:59 2018 daemon.info : 11[KNL] querying policy 172.56.0.6/32 === 172.24.0.0/24 out
Mon Sep 10 15:21:59 2018 daemon.info : 11[KNL] querying SAD entry with SPI c030f1f0
Mon Sep 10 15:21:59 2018 daemon.info : 11[IKE] sending keep alive to 139.198.125.122[4500]
Mon Sep 10 15:22:00 2018 cron.info crond[725]: USER root pid 2836 cmd /bin/sh /etc/check_ipsec.sh
Mon Sep 10 15:22:01 2018 daemon.info : 00[DMN] signal of type SIGINT received. Shutting down
Mon Sep 10 15:22:01 2018 daemon.info : 00[IKE] queueing IKE_DELETE task
Mon Sep 10 15:22:01 2018 daemon.info : 00[IKE] activating new tasks
Mon Sep 10 15:22:01 2018 daemon.info : 00[IKE]   activating IKE_DELETE task
Mon Sep 10 15:22:01 2018 daemon.info : 00[IKE] deleting IKE_SA chaogong[1] between 100.64.6.230[nash-sz]...139.198.125.122[nashwork]
Mon Sep 10 15:22:01 2018 authpriv.info : 00[IKE] deleting IKE_SA chaogong[1] between 100.64.6.230[nash-sz]...139.198.125.122[nashwork]
Mon Sep 10 15:22:01 2018 daemon.info : 00[IKE] IKE_SA chaogong[1] state change: ESTABLISHED => DELETING
Mon Sep 10 15:22:01 2018 daemon.info : 00[IKE] sending DELETE for IKE_SA chaogong[1]
Mon Sep 10 15:22:01 2018 daemon.info : 00[ENC] generating INFORMATIONAL request 3 [ D ]
Mon Sep 10 15:22:01 2018 daemon.info : 00[NET] sending packet: from 100.64.6.230[4500] to 139.198.125.122[4500] (76 bytes)
Mon Sep 10 15:22:01 2018 daemon.info : 00[IKE] IKE_SA chaogong[1] state change: DELETING => DESTROYING
Mon Sep 10 15:22:01 2018 daemon.info : 00[KNL] deleting policy 172.56.0.6/32 === 172.24.0.0/24 out
Mon Sep 10 15:22:01 2018 daemon.info : 00[KNL] policy still used by another CHILD_SA, not removed
Mon Sep 10 15:22:01 2018 daemon.info : 00[KNL] updating policy 172.56.0.6/32 === 172.24.0.0/24 out [priority 571327, refcount 1]
Mon Sep 10 15:22:01 2018 daemon.info : 00[KNL] deleting policy 172.24.0.0/24 === 172.56.0.6/32 in
Mon Sep 10 15:22:01 2018 daemon.info : 00[KNL] deleting policy 172.24.0.0/24 === 172.56.0.6/32 fwd
Mon Sep 10 15:22:01 2018 daemon.info : 00[KNL] deleting policy 172.56.0.6/32 === 172.24.0.0/24 out
Mon Sep 10 15:22:01 2018 daemon.info : 00[KNL] getting iface index for pppoe-wan
Mon Sep 10 15:22:01 2018 daemon.info : 00[KNL] deleting SAD entry with SPI c93db8c7
Mon Sep 10 15:22:01 2018 daemon.info : 00[KNL] deleted SAD entry with SPI c93db8c7
Mon Sep 10 15:22:01 2018 daemon.info : 00[KNL] deleting SAD entry with SPI c030f1f0
Mon Sep 10 15:22:01 2018 daemon.info : 00[KNL] deleted SAD entry with SPI c030f1f0
Mon Sep 10 15:22:01 2018 daemon.info : 00[KNL] deleting virtual IP 172.56.0.6
Mon Sep 10 15:22:01 2018 authpriv.info ipsec_starter[2771]: charon stopped after 200 ms
Mon Sep 10 15:22:01 2018 authpriv.info ipsec_starter[2771]: ipsec starter stopped
Mon Sep 10 15:22:04 2018 authpriv.info ipsec_starter[2844]: Starting strongSwan 5.5.3 IPsec [starter]...
Mon Sep 10 15:22:04 2018 daemon.err modprobe: ah4 is already loaded
Mon Sep 10 15:22:04 2018 daemon.err modprobe: esp4 is already loaded
Mon Sep 10 15:22:04 2018 daemon.err modprobe: ipcomp is already loaded
Mon Sep 10 15:22:04 2018 daemon.err modprobe: xfrm4_tunnel is already loaded
Mon Sep 10 15:22:04 2018 daemon.err modprobe: xfrm_user is already loaded
Mon Sep 10 15:22:04 2018 daemon.info : 00[DMN] Starting IKE charon daemon (strongSwan 5.5.3, Linux 4.4.92, mips)
Mon Sep 10 15:22:04 2018 daemon.info : 00[KNL] known interfaces and IP addresses:
Mon Sep 10 15:22:04 2018 daemon.info : 00[KNL]   lo
Mon Sep 10 15:22:04 2018 daemon.info : 00[KNL]     127.0.0.1
Mon Sep 10 15:22:04 2018 daemon.info : 00[KNL]     ::1
Mon Sep 10 15:22:04 2018 daemon.info : 00[KNL]   eth0
Mon Sep 10 15:22:04 2018 daemon.info : 00[KNL]     fe80::7a8a:20ff:febc:4685
Mon Sep 10 15:22:04 2018 daemon.info : 00[KNL]   br-lan
Mon Sep 10 15:22:04 2018 daemon.info : 00[KNL]     192.168.200.1
Mon Sep 10 15:22:04 2018 daemon.info : 00[KNL]     240e:fe:f01:500::1
Mon Sep 10 15:22:04 2018 daemon.info : 00[KNL]     fe80::7a8a:20ff:febc:4685
Mon Sep 10 15:22:04 2018 daemon.info : 00[KNL]   eth0.1
Mon Sep 10 15:22:04 2018 daemon.info : 00[KNL]   eth0.2
Mon Sep 10 15:22:04 2018 daemon.info : 00[KNL]     fe80::7a8a:20ff:febc:4685
Mon Sep 10 15:22:04 2018 daemon.info : 00[KNL]   pppoe-wan
Mon Sep 10 15:22:04 2018 daemon.info : 00[KNL]     100.64.6.230
Mon Sep 10 15:22:04 2018 daemon.info : 00[KNL]     240e:fa:ef:6a:7a8a:2042:24bc:4685
Mon Sep 10 15:22:04 2018 daemon.info : 00[KNL]     fe80::7a8a:2042:24bc:4685
Mon Sep 10 15:22:04 2018 daemon.info : 00[LIB] loaded plugins: charon aes des rc2 sha2 sha1 md5 random nonce x509 revocation constraints pubkey pkcs1 pgp dnskey sshkey pem fips-prf gmp xcbc hmac attr kernel-netlink resolve socket-default connmark stroke updown xauth-generic
Mon Sep 10 15:22:04 2018 daemon.info : 00[JOB] spawning 16 worker threads
Mon Sep 10 15:22:04 2018 authpriv.info ipsec_starter[2869]: charon (2870) started after 40 ms
Mon Sep 10 15:22:04 2018 daemon.info : 06[KNL] 139.198.125.122 is not a local address or the interface is down
Mon Sep 10 15:22:04 2018 daemon.info : 05[KNL] using 100.64.6.230 as address to reach 139.198.125.122/32
Mon Sep 10 15:22:04 2018 daemon.info : 05[IKE] queueing IKE_VENDOR task
Mon Sep 10 15:22:04 2018 daemon.info : 05[IKE] queueing IKE_INIT task
Mon Sep 10 15:22:04 2018 daemon.info : 05[IKE] queueing IKE_NATD task
Mon Sep 10 15:22:04 2018 daemon.info : 05[IKE] queueing IKE_CERT_PRE task
Mon Sep 10 15:22:04 2018 daemon.info : 05[IKE] queueing IKE_AUTH task
Mon Sep 10 15:22:04 2018 daemon.info : 05[IKE] queueing IKE_CERT_POST task
Mon Sep 10 15:22:04 2018 daemon.info : 05[IKE] queueing IKE_CONFIG task
Mon Sep 10 15:22:04 2018 daemon.info : 05[IKE] queueing IKE_AUTH_LIFETIME task
Mon Sep 10 15:22:04 2018 daemon.info : 05[IKE] queueing IKE_MOBIKE task
Mon Sep 10 15:22:04 2018 daemon.info : 05[IKE] queueing IKE_ME task
Mon Sep 10 15:22:04 2018 daemon.info : 05[IKE] queueing CHILD_CREATE task
Mon Sep 10 15:22:04 2018 daemon.info : 05[IKE] activating new tasks
Mon Sep 10 15:22:04 2018 daemon.info : 05[IKE]   activating IKE_VENDOR task
Mon Sep 10 15:22:04 2018 daemon.info : 05[IKE]   activating IKE_INIT task
Mon Sep 10 15:22:04 2018 daemon.info : 05[IKE]   activating IKE_NATD task
Mon Sep 10 15:22:04 2018 daemon.info : 05[IKE]   activating IKE_CERT_PRE task
Mon Sep 10 15:22:04 2018 daemon.info : 05[IKE]   activating IKE_ME task
Mon Sep 10 15:22:04 2018 daemon.info : 05[IKE]   activating IKE_AUTH task
Mon Sep 10 15:22:04 2018 daemon.info : 05[IKE]   activating IKE_CERT_POST task
Mon Sep 10 15:22:04 2018 daemon.info : 05[IKE]   activating IKE_CONFIG task
Mon Sep 10 15:22:04 2018 daemon.info : 05[IKE]   activating CHILD_CREATE task
Mon Sep 10 15:22:04 2018 daemon.info : 05[IKE]   activating IKE_AUTH_LIFETIME task
Mon Sep 10 15:22:04 2018 daemon.info : 05[IKE]   activating IKE_MOBIKE task
Mon Sep 10 15:22:04 2018 daemon.info : 05[IKE] initiating IKE_SA chaogong[1] to 139.198.125.122
Mon Sep 10 15:22:04 2018 authpriv.info : 05[IKE] initiating IKE_SA chaogong[1] to 139.198.125.122
Mon Sep 10 15:22:04 2018 daemon.info : 05[IKE] IKE_SA chaogong[1] state change: CREATED => CONNECTING
Mon Sep 10 15:22:04 2018 daemon.info : 05[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Mon Sep 10 15:22:04 2018 daemon.info : 05[NET] sending packet: from 100.64.6.230[500] to 139.198.125.122[500] (464 bytes)
Mon Sep 10 15:22:04 2018 daemon.info : 08[NET] received packet: from 139.198.125.122[500] to 100.64.6.230[500] (489 bytes)
Mon Sep 10 15:22:04 2018 daemon.info : 08[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
Mon Sep 10 15:22:04 2018 daemon.info : 08[IKE] received FRAGMENTATION_SUPPORTED notify
Mon Sep 10 15:22:04 2018 daemon.info : 08[IKE] received SIGNATURE_HASH_ALGORITHMS notify
Mon Sep 10 15:22:05 2018 daemon.info : 08[IKE] local host is behind NAT, sending keep alives
Mon Sep 10 15:22:05 2018 daemon.info : 08[IKE] remote host is behind NAT
Mon Sep 10 15:22:05 2018 daemon.info : 08[IKE] received cert request for unknown ca with keyid 8d:d8:89:95:69:db:0f:97:90:62:7e:a5:ce:cc:8e:12:f1:93:d5:96
Mon Sep 10 15:22:05 2018 daemon.info : 08[IKE] received 1 cert requests for an unknown ca
Mon Sep 10 15:22:05 2018 daemon.info : 08[IKE] reinitiating already active tasks
Mon Sep 10 15:22:05 2018 daemon.info : 08[IKE]   IKE_CERT_PRE task
Mon Sep 10 15:22:05 2018 daemon.info : 08[IKE]   IKE_AUTH task
Mon Sep 10 15:22:05 2018 daemon.info : 08[IKE] authentication of 'nash-sz' (myself) with pre-shared key
Mon Sep 10 15:22:05 2018 daemon.info : 08[IKE] successfully created shared key MAC
Mon Sep 10 15:22:05 2018 daemon.info : 08[IKE] building INTERNAL_IP4_DNS attribute
Mon Sep 10 15:22:05 2018 daemon.info : 08[IKE] establishing CHILD_SA chaogong
Mon Sep 10 15:22:05 2018 authpriv.info : 08[IKE] establishing CHILD_SA chaogong
Mon Sep 10 15:22:05 2018 daemon.info : 08[KNL] got SPI c5925a3d
Mon Sep 10 15:22:05 2018 daemon.info : 08[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH CPRQ(ADDR DNS) SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_6_ADDR) N(ADD_6_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Mon Sep 10 15:22:05 2018 daemon.info : 08[NET] sending packet: from 100.64.6.230[4500] to 139.198.125.122[4500] (332 bytes)
Mon Sep 10 15:22:05 2018 daemon.info : 09[NET] received packet: from 139.198.125.122[4500] to 100.64.6.230[4500] (252 bytes)
Mon Sep 10 15:22:05 2018 daemon.info : 09[ENC] parsed IKE_AUTH response 1 [ IDr AUTH CPRP(ADDR) SA TSi TSr N(AUTH_LFT) N(MOBIKE_SUP) N(ADD_4_ADDR) ]
Mon Sep 10 15:22:05 2018 daemon.info : 09[IKE] authentication of 'nashwork' with pre-shared key successful
Mon Sep 10 15:22:05 2018 daemon.info : 09[IKE] IKE_SA chaogong[1] established between 100.64.6.230[nash-sz]...139.198.125.122[nashwork]
Mon Sep 10 15:22:05 2018 authpriv.info : 09[IKE] IKE_SA chaogong[1] established between 100.64.6.230[nash-sz]...139.198.125.122[nashwork]
Mon Sep 10 15:22:05 2018 daemon.info : 09[IKE] IKE_SA chaogong[1] state change: CONNECTING => ESTABLISHED
Mon Sep 10 15:22:05 2018 daemon.info : 09[IKE] scheduling reauthentication in 3277s
Mon Sep 10 15:22:05 2018 daemon.info : 09[IKE] maximum IKE_SA lifetime 3457s
Mon Sep 10 15:22:05 2018 daemon.info : 09[IKE] processing INTERNAL_IP4_ADDRESS attribute
Mon Sep 10 15:22:05 2018 daemon.info : 09[KNL] 100.64.6.230 is on interface pppoe-wan
Mon Sep 10 15:22:05 2018 daemon.info : 09[IKE] installing new virtual IP 172.56.0.6
Mon Sep 10 15:22:05 2018 daemon.info : 09[KNL] virtual IP 172.56.0.6 installed on pppoe-wan
Mon Sep 10 15:22:05 2018 daemon.info : 09[KNL] adding SAD entry with SPI c5925a3d and reqid {1}
Mon Sep 10 15:22:05 2018 daemon.info : 09[KNL]   using encryption algorithm AES_CBC with key size 128
Mon Sep 10 15:22:05 2018 daemon.info : 09[KNL]   using integrity algorithm HMAC_SHA1_96 with key size 160
Mon Sep 10 15:22:05 2018 daemon.info : 09[KNL]   using replay window of 32 packets
Mon Sep 10 15:22:05 2018 daemon.info : 09[KNL] adding SAD entry with SPI cfc95f2e and reqid {1}
Mon Sep 10 15:22:05 2018 daemon.info : 09[KNL]   using encryption algorithm AES_CBC with key size 128
Mon Sep 10 15:22:05 2018 daemon.info : 09[KNL]   using integrity algorithm HMAC_SHA1_96 with key size 160
Mon Sep 10 15:22:05 2018 daemon.info : 09[KNL]   using replay window of 0 packets
Mon Sep 10 15:22:05 2018 daemon.info : 09[KNL] adding policy 172.56.0.6/32 === 172.24.0.0/24 out [priority 571327, refcount 1]
Mon Sep 10 15:22:05 2018 daemon.info : 09[KNL] adding policy 172.24.0.0/24 === 172.56.0.6/32 in [priority 371327, refcount 1]
Mon Sep 10 15:22:05 2018 daemon.info : 09[KNL] adding policy 172.24.0.0/24 === 172.56.0.6/32 fwd [priority 371327, refcount 1]
Mon Sep 10 15:22:05 2018 daemon.info : 09[KNL] policy 172.56.0.6/32 === 172.24.0.0/24 out already exists, increasing refcount
Mon Sep 10 15:22:05 2018 daemon.info : 09[KNL] updating policy 172.56.0.6/32 === 172.24.0.0/24 out [priority 371327, refcount 2]
Mon Sep 10 15:22:05 2018 daemon.info : 09[KNL] getting a local address in traffic selector 172.56.0.6/32
Mon Sep 10 15:22:05 2018 daemon.info : 09[KNL] using host 172.56.0.6
Mon Sep 10 15:22:05 2018 daemon.info : 09[KNL] getting iface name for index 6
Mon Sep 10 15:22:05 2018 daemon.info : 09[KNL] using 100.64.0.1 as nexthop and pppoe-wan as dev to reach 139.198.125.122/32
Mon Sep 10 15:22:05 2018 daemon.info : 09[KNL] installing route: 172.24.0.0/24 via 100.64.0.1 src 172.56.0.6 dev pppoe-wan
Mon Sep 10 15:22:05 2018 daemon.info : 09[KNL] getting iface index for pppoe-wan
Mon Sep 10 15:22:05 2018 daemon.info : 09[IKE] CHILD_SA chaogong{1} established with SPIs c5925a3d_i cfc95f2e_o and TS 172.56.0.6/32 === 172.24.0.0/24
Mon Sep 10 15:22:05 2018 authpriv.info : 09[IKE] CHILD_SA chaogong{1} established with SPIs c5925a3d_i cfc95f2e_o and TS 172.56.0.6/32 === 172.24.0.0/24
Mon Sep 10 15:22:05 2018 daemon.info : 09[IKE] received AUTH_LIFETIME of 10137s, reauthentication already scheduled in 3277s
Mon Sep 10 15:22:05 2018 daemon.info : 09[IKE] peer supports MOBIKE
Mon Sep 10 15:22:05 2018 daemon.info : 09[IKE] got additional MOBIKE peer address: 172.56.0.2
Mon Sep 10 15:22:05 2018 daemon.info : 09[IKE] activating new tasks
Mon Sep 10 15:22:05 2018 daemon.info : 09[IKE] nothing to initiate
Mon Sep 10 15:22:05 2018 daemon.info : 12[KNL] getting iface index for pppoe-wan
Mon Sep 10 15:22:25 2018 daemon.info : 04[KNL] querying policy 172.56.0.6/32 === 172.24.0.0/24 out
Mon Sep 10 15:22:25 2018 daemon.info : 04[KNL] querying SAD entry with SPI cfc95f2e
Mon Sep 10 15:22:29 2018 daemon.info : 06[KNL] querying policy 172.56.0.6/32 === 172.24.0.0/24 out
Mon Sep 10 15:22:29 2018 daemon.info : 06[KNL] querying SAD entry with SPI cfc95f2e
Mon Sep 10 15:22:29 2018 daemon.info : 06[IKE] sending keep alive to 139.198.125.122[4500]
Mon Sep 10 15:22:35 2018 daemon.info : 07[KNL] querying policy 172.24.0.0/24 === 172.56.0.6/32 in
Mon Sep 10 15:22:35 2018 daemon.info : 07[KNL] querying policy 172.24.0.0/24 === 172.56.0.6/32 fwd
Mon Sep 10 15:22:35 2018 daemon.info : 07[KNL] querying SAD entry with SPI c5925a3d
Mon Sep 10 15:22:35 2018 daemon.info : 07[IKE] sending DPD request
Mon Sep 10 15:22:35 2018 daemon.info : 07[IKE] queueing IKE_MOBIKE task
Mon Sep 10 15:22:35 2018 daemon.info : 07[IKE] activating new tasks
Mon Sep 10 15:22:35 2018 daemon.info : 07[IKE]   activating IKE_MOBIKE task
Mon Sep 10 15:22:35 2018 daemon.info : 07[KNL] using 100.64.6.230 as address to reach 139.198.125.122/32
Mon Sep 10 15:22:35 2018 daemon.info : 07[ENC] generating INFORMATIONAL request 2 [ N(NATD_S_IP) N(NATD_D_IP) ]
Mon Sep 10 15:22:35 2018 daemon.info : 07[KNL] using 100.64.6.230 as address to reach 139.198.125.122/32
Mon Sep 10 15:22:35 2018 daemon.info : 07[NET] sending packet: from 100.64.6.230[4500] to 139.198.125.122[4500] (124 bytes)
Mon Sep 10 15:22:35 2018 daemon.info : 05[NET] received packet: from 139.198.125.122[4500] to 100.64.6.230[4500] (124 bytes)
Mon Sep 10 15:22:35 2018 daemon.info : 05[ENC] parsed INFORMATIONAL response 2 [ N(NATD_S_IP) N(NATD_D_IP) ]
Mon Sep 10 15:22:35 2018 daemon.info : 05[IKE] activating new tasks
Mon Sep 10 15:22:35 2018 daemon.info : 05[IKE] nothing to initiate
Mon Sep 10 15:22:39 2018 daemon.info : 09[KNL] creating roam job due to route change
Mon Sep 10 15:22:39 2018 daemon.info : 09[KNL] using 100.64.6.230 as address to reach 139.198.125.122/32
Mon Sep 10 15:22:39 2018 daemon.info : 09[IKE] keeping connection path 100.64.6.230 - 139.198.125.122
Mon Sep 10 15:22:49 2018 daemon.info : 14[KNL] querying policy 172.56.0.6/32 === 172.24.0.0/24 out
Mon Sep 10 15:22:49 2018 daemon.info : 14[KNL] querying SAD entry with SPI cfc95f2e
Mon Sep 10 15:22:59 2018 daemon.info : 15[KNL] querying policy 172.56.0.6/32 === 172.24.0.0/24 out
Mon Sep 10 15:22:59 2018 daemon.info : 15[KNL] querying SAD entry with SPI cfc95f2e
Mon Sep 10 15:22:59 2018 daemon.info : 15[IKE] sending keep alive to 139.198.125.122[4500]
Mon Sep 10 15:23:00 2018 cron.info crond[725]: USER root pid 2939 cmd /bin/sh /etc/check_ipsec.sh
Mon Sep 10 15:23:01 2018 daemon.info : 00[DMN] signal of type SIGINT received. Shutting down
Mon Sep 10 15:23:01 2018 daemon.info : 00[IKE] queueing IKE_DELETE task
Mon Sep 10 15:23:01 2018 daemon.info : 00[IKE] activating new tasks
Mon Sep 10 15:23:01 2018 daemon.info : 00[IKE]   activating IKE_DELETE task
Mon Sep 10 15:23:01 2018 daemon.info : 00[IKE] deleting IKE_SA chaogong[1] between 100.64.6.230[nash-sz]...139.198.125.122[nashwork]
Mon Sep 10 15:23:01 2018 authpriv.info : 00[IKE] deleting IKE_SA chaogong[1] between 100.64.6.230[nash-sz]...139.198.125.122[nashwork]
Mon Sep 10 15:23:01 2018 daemon.info : 00[IKE] IKE_SA chaogong[1] state change: ESTABLISHED => DELETING
Mon Sep 10 15:23:01 2018 daemon.info : 00[IKE] sending DELETE for IKE_SA chaogong[1]
Mon Sep 10 15:23:01 2018 daemon.info : 00[ENC] generating INFORMATIONAL request 3 [ D ]
Mon Sep 10 15:23:01 2018 daemon.info : 00[NET] sending packet: from 100.64.6.230[4500] to 139.198.125.122[4500] (76 bytes)
Mon Sep 10 15:23:01 2018 daemon.info : 00[IKE] IKE_SA chaogong[1] state change: DELETING => DESTROYING
Mon Sep 10 15:23:01 2018 daemon.info : 00[KNL] deleting policy 172.56.0.6/32 === 172.24.0.0/24 out
Mon Sep 10 15:23:01 2018 daemon.info : 00[KNL] policy still used by another CHILD_SA, not removed
Mon Sep 10 15:23:01 2018 daemon.info : 00[KNL] updating policy 172.56.0.6/32 === 172.24.0.0/24 out [priority 571327, refcount 1]
Mon Sep 10 15:23:01 2018 daemon.info : 00[KNL] deleting policy 172.24.0.0/24 === 172.56.0.6/32 in
Mon Sep 10 15:23:01 2018 daemon.info : 00[KNL] deleting policy 172.24.0.0/24 === 172.56.0.6/32 fwd
Mon Sep 10 15:23:01 2018 daemon.info : 00[KNL] deleting policy 172.56.0.6/32 === 172.24.0.0/24 out
Mon Sep 10 15:23:01 2018 daemon.info : 00[KNL] getting iface index for pppoe-wan
Mon Sep 10 15:23:01 2018 daemon.info : 00[KNL] deleting SAD entry with SPI c5925a3d
Mon Sep 10 15:23:01 2018 daemon.info : 00[KNL] deleted SAD entry with SPI c5925a3d
Mon Sep 10 15:23:01 2018 daemon.info : 00[KNL] deleting SAD entry with SPI cfc95f2e
Mon Sep 10 15:23:01 2018 daemon.info : 00[KNL] deleted SAD entry with SPI cfc95f2e
Mon Sep 10 15:23:01 2018 daemon.info : 00[KNL] deleting virtual IP 172.56.0.6
Mon Sep 10 15:23:01 2018 authpriv.info ipsec_starter[2869]: charon stopped after 200 ms
Mon Sep 10 15:23:01 2018 authpriv.info ipsec_starter[2869]: ipsec starter stopped
Mon Sep 10 15:23:04 2018 authpriv.info ipsec_starter[2947]: Starting strongSwan 5.5.3 IPsec [starter]...
Mon Sep 10 15:23:04 2018 daemon.err modprobe: ah4 is already loaded
Mon Sep 10 15:23:04 2018 daemon.err modprobe: esp4 is already loaded
Mon Sep 10 15:23:04 2018 daemon.err modprobe: ipcomp is already loaded
Mon Sep 10 15:23:04 2018 daemon.err modprobe: xfrm4_tunnel is already loaded
Mon Sep 10 15:23:04 2018 daemon.err modprobe: xfrm_user is already loaded
Mon Sep 10 15:23:04 2018 daemon.info : 00[DMN] Starting IKE charon daemon (strongSwan 5.5.3, Linux 4.4.92, mips)
Mon Sep 10 15:23:04 2018 daemon.info : 00[KNL] known interfaces and IP addresses:
Mon Sep 10 15:23:04 2018 daemon.info : 00[KNL]   lo
Mon Sep 10 15:23:04 2018 daemon.info : 00[KNL]     127.0.0.1
Mon Sep 10 15:23:04 2018 daemon.info : 00[KNL]     ::1
Mon Sep 10 15:23:04 2018 daemon.info : 00[KNL]   eth0
Mon Sep 10 15:23:04 2018 daemon.info : 00[KNL]     fe80::7a8a:20ff:febc:4685
Mon Sep 10 15:23:04 2018 daemon.info : 00[KNL]   br-lan
Mon Sep 10 15:23:04 2018 daemon.info : 00[KNL]     192.168.200.1
Mon Sep 10 15:23:04 2018 daemon.info : 00[KNL]     240e:fe:f01:500::1
Mon Sep 10 15:23:04 2018 daemon.info : 00[KNL]     fe80::7a8a:20ff:febc:4685
Mon Sep 10 15:23:04 2018 daemon.info : 00[KNL]   eth0.1
Mon Sep 10 15:23:04 2018 daemon.info : 00[KNL]   eth0.2
Mon Sep 10 15:23:04 2018 daemon.info : 00[KNL]     fe80::7a8a:20ff:febc:4685
Mon Sep 10 15:23:04 2018 daemon.info : 00[KNL]   pppoe-wan
Mon Sep 10 15:23:04 2018 daemon.info : 00[KNL]     100.64.6.230
Mon Sep 10 15:23:04 2018 daemon.info : 00[KNL]     240e:fa:ef:6a:7a8a:2042:24bc:4685
Mon Sep 10 15:23:04 2018 daemon.info : 00[KNL]     fe80::7a8a:2042:24bc:4685
Mon Sep 10 15:23:04 2018 daemon.info : 00[LIB] loaded plugins: charon aes des rc2 sha2 sha1 md5 random nonce x509 revocation constraints pubkey pkcs1 pgp dnskey sshkey pem fips-prf gmp xcbc hmac attr kernel-netlink resolve socket-default connmark stroke updown xauth-generic
Mon Sep 10 15:23:04 2018 daemon.info : 00[JOB] spawning 16 worker threads
Mon Sep 10 15:23:04 2018 authpriv.info ipsec_starter[2972]: charon (2973) started after 40 ms
Mon Sep 10 15:23:04 2018 daemon.info : 03[KNL] 139.198.125.122 is not a local address or the interface is down
Mon Sep 10 15:23:04 2018 daemon.info : 09[KNL] using 100.64.6.230 as address to reach 139.198.125.122/32
Mon Sep 10 15:23:04 2018 daemon.info : 09[IKE] queueing IKE_VENDOR task
Mon Sep 10 15:23:04 2018 daemon.info : 09[IKE] queueing IKE_INIT task
Mon Sep 10 15:23:04 2018 daemon.info : 09[IKE] queueing IKE_NATD task
Mon Sep 10 15:23:04 2018 daemon.info : 09[IKE] queueing IKE_CERT_PRE task
Mon Sep 10 15:23:04 2018 daemon.info : 09[IKE] queueing IKE_AUTH task
Mon Sep 10 15:23:04 2018 daemon.info : 09[IKE] queueing IKE_CERT_POST task
Mon Sep 10 15:23:04 2018 daemon.info : 09[IKE] queueing IKE_CONFIG task
Mon Sep 10 15:23:04 2018 daemon.info : 09[IKE] queueing IKE_AUTH_LIFETIME task
Mon Sep 10 15:23:04 2018 daemon.info : 09[IKE] queueing IKE_MOBIKE task
Mon Sep 10 15:23:04 2018 daemon.info : 09[IKE] queueing IKE_ME task
Mon Sep 10 15:23:04 2018 daemon.info : 09[IKE] queueing CHILD_CREATE task
Mon Sep 10 15:23:04 2018 daemon.info : 09[IKE] activating new tasks
Mon Sep 10 15:23:04 2018 daemon.info : 09[IKE]   activating IKE_VENDOR task
Mon Sep 10 15:23:04 2018 daemon.info : 09[IKE]   activating IKE_INIT task
Mon Sep 10 15:23:04 2018 daemon.info : 09[IKE]   activating IKE_NATD task
Mon Sep 10 15:23:04 2018 daemon.info : 09[IKE]   activating IKE_CERT_PRE task
Mon Sep 10 15:23:04 2018 daemon.info : 09[IKE]   activating IKE_ME task
Mon Sep 10 15:23:04 2018 daemon.info : 09[IKE]   activating IKE_AUTH task
Mon Sep 10 15:23:04 2018 daemon.info : 09[IKE]   activating IKE_CERT_POST task
Mon Sep 10 15:23:04 2018 daemon.info : 09[IKE]   activating IKE_CONFIG task
Mon Sep 10 15:23:04 2018 daemon.info : 09[IKE]   activating CHILD_CREATE task
Mon Sep 10 15:23:04 2018 daemon.info : 09[IKE]   activating IKE_AUTH_LIFETIME task
Mon Sep 10 15:23:04 2018 daemon.info : 09[IKE]   activating IKE_MOBIKE task
Mon Sep 10 15:23:04 2018 daemon.info : 09[IKE] initiating IKE_SA chaogong[1] to 139.198.125.122
Mon Sep 10 15:23:04 2018 authpriv.info : 09[IKE] initiating IKE_SA chaogong[1] to 139.198.125.122
Mon Sep 10 15:23:04 2018 daemon.info : 09[IKE] IKE_SA chaogong[1] state change: CREATED => CONNECTING
Mon Sep 10 15:23:04 2018 daemon.info : 09[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Mon Sep 10 15:23:04 2018 daemon.info : 09[NET] sending packet: from 100.64.6.230[500] to 139.198.125.122[500] (464 bytes)
Mon Sep 10 15:23:04 2018 daemon.info : 07[NET] received packet: from 139.198.125.122[500] to 100.64.6.230[500] (489 bytes)
Mon Sep 10 15:23:04 2018 daemon.info : 07[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
Mon Sep 10 15:23:04 2018 daemon.info : 07[IKE] received FRAGMENTATION_SUPPORTED notify
Mon Sep 10 15:23:04 2018 daemon.info : 07[IKE] received SIGNATURE_HASH_ALGORITHMS notify
Mon Sep 10 15:23:05 2018 daemon.info : 07[IKE] local host is behind NAT, sending keep alives
Mon Sep 10 15:23:05 2018 daemon.info : 07[IKE] remote host is behind NAT
Mon Sep 10 15:23:05 2018 daemon.info : 07[IKE] received cert request for unknown ca with keyid 8d:d8:89:95:69:db:0f:97:90:62:7e:a5:ce:cc:8e:12:f1:93:d5:96
Mon Sep 10 15:23:05 2018 daemon.info : 07[IKE] received 1 cert requests for an unknown ca
Mon Sep 10 15:23:05 2018 daemon.info : 07[IKE] reinitiating already active tasks
Mon Sep 10 15:23:05 2018 daemon.info : 07[IKE]   IKE_CERT_PRE task
Mon Sep 10 15:23:05 2018 daemon.info : 07[IKE]   IKE_AUTH task
Mon Sep 10 15:23:05 2018 daemon.info : 07[IKE] authentication of 'nash-sz' (myself) with pre-shared key
Mon Sep 10 15:23:05 2018 daemon.info : 07[IKE] successfully created shared key MAC
Mon Sep 10 15:23:05 2018 daemon.info : 07[IKE] building INTERNAL_IP4_DNS attribute
Mon Sep 10 15:23:05 2018 daemon.info : 07[IKE] establishing CHILD_SA chaogong
Mon Sep 10 15:23:05 2018 authpriv.info : 07[IKE] establishing CHILD_SA chaogong
Mon Sep 10 15:23:05 2018 daemon.info : 07[KNL] got SPI ca95905a
Mon Sep 10 15:23:05 2018 daemon.info : 07[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH CPRQ(ADDR DNS) SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_6_ADDR) N(ADD_6_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Mon Sep 10 15:23:05 2018 daemon.info : 07[NET] sending packet: from 100.64.6.230[4500] to 139.198.125.122[4500] (332 bytes)
Mon Sep 10 15:23:05 2018 daemon.info : 08[NET] received packet: from 139.198.125.122[4500] to 100.64.6.230[4500] (252 bytes)
Mon Sep 10 15:23:05 2018 daemon.info : 08[ENC] parsed IKE_AUTH response 1 [ IDr AUTH CPRP(ADDR) SA TSi TSr N(AUTH_LFT) N(MOBIKE_SUP) N(ADD_4_ADDR) ]
Mon Sep 10 15:23:05 2018 daemon.info : 08[IKE] authentication of 'nashwork' with pre-shared key successful
Mon Sep 10 15:23:05 2018 daemon.info : 08[IKE] IKE_SA chaogong[1] established between 100.64.6.230[nash-sz]...139.198.125.122[nashwork]
Mon Sep 10 15:23:05 2018 authpriv.info : 08[IKE] IKE_SA chaogong[1] established between 100.64.6.230[nash-sz]...139.198.125.122[nashwork]
Mon Sep 10 15:23:05 2018 daemon.info : 08[IKE] IKE_SA chaogong[1] state change: CONNECTING => ESTABLISHED
Mon Sep 10 15:23:05 2018 daemon.info : 08[IKE] scheduling reauthentication in 3387s
Mon Sep 10 15:23:05 2018 daemon.info : 08[IKE] maximum IKE_SA lifetime 3567s
Mon Sep 10 15:23:05 2018 daemon.info : 08[IKE] processing INTERNAL_IP4_ADDRESS attribute
Mon Sep 10 15:23:05 2018 daemon.info : 08[KNL] 100.64.6.230 is on interface pppoe-wan
Mon Sep 10 15:23:05 2018 daemon.info : 08[IKE] installing new virtual IP 172.56.0.6
Mon Sep 10 15:23:05 2018 daemon.info : 08[KNL] virtual IP 172.56.0.6 installed on pppoe-wan
Mon Sep 10 15:23:05 2018 daemon.info : 08[KNL] adding SAD entry with SPI ca95905a and reqid {1}
Mon Sep 10 15:23:05 2018 daemon.info : 08[KNL]   using encryption algorithm AES_CBC with key size 128
Mon Sep 10 15:23:05 2018 daemon.info : 08[KNL]   using integrity algorithm HMAC_SHA1_96 with key size 160
Mon Sep 10 15:23:05 2018 daemon.info : 08[KNL]   using replay window of 32 packets
Mon Sep 10 15:23:05 2018 daemon.info : 08[KNL] adding SAD entry with SPI c7920dcc and reqid {1}
Mon Sep 10 15:23:05 2018 daemon.info : 08[KNL]   using encryption algorithm AES_CBC with key size 128
Mon Sep 10 15:23:05 2018 daemon.info : 08[KNL]   using integrity algorithm HMAC_SHA1_96 with key size 160
Mon Sep 10 15:23:05 2018 daemon.info : 08[KNL]   using replay window of 0 packets
Mon Sep 10 15:23:05 2018 daemon.info : 08[KNL] adding policy 172.56.0.6/32 === 172.24.0.0/24 out [priority 571327, refcount 1]
Mon Sep 10 15:23:05 2018 daemon.info : 08[KNL] adding policy 172.24.0.0/24 === 172.56.0.6/32 in [priority 371327, refcount 1]
Mon Sep 10 15:23:05 2018 daemon.info : 08[KNL] adding policy 172.24.0.0/24 === 172.56.0.6/32 fwd [priority 371327, refcount 1]
Mon Sep 10 15:23:05 2018 daemon.info : 08[KNL] policy 172.56.0.6/32 === 172.24.0.0/24 out already exists, increasing refcount
Mon Sep 10 15:23:05 2018 daemon.info : 08[KNL] updating policy 172.56.0.6/32 === 172.24.0.0/24 out [priority 371327, refcount 2]
Mon Sep 10 15:23:05 2018 daemon.info : 08[KNL] getting a local address in traffic selector 172.56.0.6/32
Mon Sep 10 15:23:05 2018 daemon.info : 08[KNL] using host 172.56.0.6
Mon Sep 10 15:23:05 2018 daemon.info : 08[KNL] getting iface name for index 6
Mon Sep 10 15:23:05 2018 daemon.info : 08[KNL] using 100.64.0.1 as nexthop and pppoe-wan as dev to reach 139.198.125.122/32
Mon Sep 10 15:23:05 2018 daemon.info : 08[KNL] installing route: 172.24.0.0/24 via 100.64.0.1 src 172.56.0.6 dev pppoe-wan
Mon Sep 10 15:23:05 2018 daemon.info : 08[KNL] getting iface index for pppoe-wan
Mon Sep 10 15:23:05 2018 daemon.info : 08[IKE] CHILD_SA chaogong{1} established with SPIs ca95905a_i c7920dcc_o and TS 172.56.0.6/32 === 172.24.0.0/24
Mon Sep 10 15:23:05 2018 authpriv.info : 08[IKE] CHILD_SA chaogong{1} established with SPIs ca95905a_i c7920dcc_o and TS 172.56.0.6/32 === 172.24.0.0/24
Mon Sep 10 15:23:05 2018 daemon.info : 08[IKE] received AUTH_LIFETIME of 10094s, reauthentication already scheduled in 3387s
Mon Sep 10 15:23:05 2018 daemon.info : 08[IKE] peer supports MOBIKE
Mon Sep 10 15:23:05 2018 daemon.info : 08[IKE] got additional MOBIKE peer address: 172.56.0.2
Mon Sep 10 15:23:05 2018 daemon.info : 08[IKE] activating new tasks
Mon Sep 10 15:23:05 2018 daemon.info : 08[IKE] nothing to initiate
Mon Sep 10 15:23:05 2018 daemon.info : 12[KNL] getting iface index for pppoe-wan
Mon Sep 10 15:23:25 2018 daemon.info : 06[KNL] querying policy 172.56.0.6/32 === 172.24.0.0/24 out
Mon Sep 10 15:23:25 2018 daemon.info : 06[KNL] querying SAD entry with SPI c7920dcc
Mon Sep 10 15:23:29 2018 daemon.info : 03[KNL] querying policy 172.56.0.6/32 === 172.24.0.0/24 out
Mon Sep 10 15:23:29 2018 daemon.info : 03[KNL] querying SAD entry with SPI c7920dcc
Mon Sep 10 15:23:29 2018 daemon.info : 03[IKE] sending keep alive to 139.198.125.122[4500]
Mon Sep 10 15:23:35 2018 daemon.info : 05[KNL] querying policy 172.24.0.0/24 === 172.56.0.6/32 in
Mon Sep 10 15:23:35 2018 daemon.info : 05[KNL] querying policy 172.24.0.0/24 === 172.56.0.6/32 fwd
Mon Sep 10 15:23:35 2018 daemon.info : 05[KNL] querying SAD entry with SPI ca95905a
Mon Sep 10 15:23:35 2018 daemon.info : 05[IKE] sending DPD request
Mon Sep 10 15:23:35 2018 daemon.info : 05[IKE] queueing IKE_MOBIKE task
Mon Sep 10 15:23:35 2018 daemon.info : 05[IKE] activating new tasks
Mon Sep 10 15:23:35 2018 daemon.info : 05[IKE]   activating IKE_MOBIKE task
Mon Sep 10 15:23:35 2018 daemon.info : 05[KNL] using 100.64.6.230 as address to reach 139.198.125.122/32
Mon Sep 10 15:23:35 2018 daemon.info : 05[ENC] generating INFORMATIONAL request 2 [ N(NATD_S_IP) N(NATD_D_IP) ]
Mon Sep 10 15:23:35 2018 daemon.info : 05[KNL] using 100.64.6.230 as address to reach 139.198.125.122/32
Mon Sep 10 15:23:35 2018 daemon.info : 05[NET] sending packet: from 100.64.6.230[4500] to 139.198.125.122[4500] (124 bytes)
Mon Sep 10 15:23:35 2018 daemon.info : 09[NET] received packet: from 139.198.125.122[4500] to 100.64.6.230[4500] (124 bytes)
Mon Sep 10 15:23:35 2018 daemon.info : 09[ENC] parsed INFORMATIONAL response 2 [ N(NATD_S_IP) N(NATD_D_IP) ]
Mon Sep 10 15:23:35 2018 daemon.info : 09[IKE] activating new tasks
Mon Sep 10 15:23:35 2018 daemon.info : 09[IKE] nothing to initiate
Mon Sep 10 15:23:49 2018 daemon.info : 10[KNL] querying policy 172.56.0.6/32 === 172.24.0.0/24 out
Mon Sep 10 15:23:49 2018 daemon.info : 10[KNL] querying SAD entry with SPI c7920dcc

只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
发表于 2018-9-10 16:37 | 显示全部楼层
恢复出厂设置,服务插件一个一个的安装,看到底是那个插件引起的
只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
回复 支持 反对

使用道具 举报

发表于 2018-9-10 16:42 来自手机 | 显示全部楼层
关闭mwan3试试
只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
回复 支持 反对

使用道具 举报

 楼主| 发表于 2018-9-10 20:24 | 显示全部楼层
谢谢各位,机器是客户公司刷好的默认配置,只是部分地方这样,现在发现有4个是这样的,但是只要换其它路由器就可以了,有没有遇到过类似的,指教一下
只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

关闭

欢迎大家光临恩山无线论坛上一条 /1 下一条

有疑问请添加管理员QQ86788181|手机版|小黑屋|Archiver|恩山无线论坛(常州市恩山计算机开发有限公司版权所有) ( 苏ICP备05084872号 )

GMT+8, 2024-9-24 02:30

Powered by Discuz! X3.5

© 2001-2024 Discuz! Team.

| 江苏省互联网有害信息举报中心 举报信箱:js12377 | @jischina.com.cn 举报电话:025-88802724 本站不良内容举报信箱:68610888@qq.com

快速回复 返回顶部 返回列表