DMC

You might also like

Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 3

System: Android 5.

1
Model: X9009
Device Id: 6069dd95fb18ee6ef1fc30c2527bd393

Feb 18 13:57:28 00[DMN] Starting IKE charon daemon (strongSwan 5.5.3, Android 5.1 -
X9009EX_11_A.31_180814, X9009 - OPPO/X9009/OPPO, Linux 3.10.72+, aarch64)
Feb 18 13:57:28 00[LIB] loaded plugins: androidbridge charon android-log openssl
fips-prf random nonce pubkey chapoly curve25519 pkcs1 pkcs8 pem xcbc hmac socket-
default revocation eap-identity eap-mschapv2 eap-md5 eap-gtc eap-tls
Feb 18 13:57:28 00[JOB] spawning 16 worker threads
Feb 18 13:57:28 08[IKE] initiating IKE_SA android[1] to 51.75.62.48
Feb 18 13:57:29 08[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP)
N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Feb 18 13:57:29 08[NET] sending packet: from 10.96.202.148[33192] to
51.75.62.48[500] (746 bytes)
Feb 18 13:57:29 11[NET] received packet: from 51.75.62.48[500] to
10.96.202.148[33192] (38 bytes)
Feb 18 13:57:29 11[ENC] parsed IKE_SA_INIT response 0 [ N(INVAL_KE) ]
Feb 18 13:57:29 11[IKE] peer didn't accept DH group ECP_256, it requested MODP_2048
Feb 18 13:57:29 11[IKE] initiating IKE_SA android[1] to 51.75.62.48
Feb 18 13:57:29 11[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP)
N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Feb 18 13:57:29 11[NET] sending packet: from 10.96.202.148[33192] to
51.75.62.48[500] (938 bytes)
Feb 18 13:57:29 12[NET] received packet: from 51.75.62.48[500] to
10.96.202.148[33192] (464 bytes)
Feb 18 13:57:29 12[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP)
N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
Feb 18 13:57:29 12[IKE] local host is behind NAT, sending keep alives
Feb 18 13:57:29 12[IKE] sending cert request for "O=Digital Signature Trust Co.,
CN=DST Root CA X3"
Feb 18 13:57:29 12[IKE] establishing CHILD_SA android
Feb 18 13:57:29 12[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) CERTREQ
CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR)
N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Feb 18 13:57:29 12[NET] sending packet: from 10.96.202.148[40596] to
51.75.62.48[4500] (576 bytes)
Feb 18 13:57:30 13[NET] received packet: from 51.75.62.48[4500] to
10.96.202.148[40596] (1236 bytes)
Feb 18 13:57:30 13[ENC] parsed IKE_AUTH response 1 [ EF(1/3) ]
Feb 18 13:57:30 13[ENC] received fragment #1 of 3, waiting for complete IKE message
Feb 18 13:57:30 14[NET] received packet: from 51.75.62.48[4500] to
10.96.202.148[40596] (1236 bytes)
Feb 18 13:57:30 14[ENC] parsed IKE_AUTH response 1 [ EF(2/3) ]
Feb 18 13:57:30 14[ENC] received fragment #2 of 3, waiting for complete IKE message
Feb 18 13:57:31 07[IKE] retransmit 1 of request with message ID 1
Feb 18 13:57:31 07[NET] sending packet: from 10.96.202.148[40596] to
51.75.62.48[4500] (576 bytes)
Feb 18 13:57:34 10[IKE] retransmit 2 of request with message ID 1
Feb 18 13:57:34 10[NET] sending packet: from 10.96.202.148[40596] to
51.75.62.48[4500] (576 bytes)
Feb 18 13:57:34 09[NET] received packet: from 51.75.62.48[4500] to
10.96.202.148[40596] (644 bytes)
Feb 18 13:57:34 09[ENC] parsed IKE_AUTH response 1 [ EF(3/3) ]
Feb 18 13:57:34 09[ENC] received fragment #3 of 3, reassembling fragmented IKE
message
Feb 18 13:57:34 09[ENC] parsed IKE_AUTH response 1 [ IDr CERT CERT AUTH
EAP/REQ/ID ]
Feb 18 13:57:34 09[IKE] received end entity cert "CN=51-75-62-48-pl.gitfeature.com"
Feb 18 13:57:34 09[IKE] received issuer cert "C=US, O=Let's Encrypt, CN=Let's
Encrypt Authority X3"
Feb 18 13:57:34 09[CFG] using certificate "CN=51-75-62-48-pl.gitfeature.com"
Feb 18 13:57:34 09[CFG] using untrusted intermediate certificate "C=US, O=Let's
Encrypt, CN=Let's Encrypt Authority X3"
Feb 18 13:57:34 09[CFG] checking certificate status of "CN=51-75-62-48-
pl.gitfeature.com"
Feb 18 13:57:34 09[LIB] building CRED_CERTIFICATE - OCSP_REQUEST failed, tried 0
builders
Feb 18 13:57:34 09[CFG] generating ocsp request failed
Feb 18 13:57:34 09[CFG] ocsp check failed, fallback to crl
Feb 18 13:57:34 09[CFG] certificate status is not available
Feb 18 13:57:34 09[CFG] using trusted ca certificate "O=Digital Signature Trust
Co., CN=DST Root CA X3"
Feb 18 13:57:34 09[CFG] checking certificate status of "C=US, O=Let's Encrypt,
CN=Let's Encrypt Authority X3"
Feb 18 13:57:34 09[LIB] building CRED_CERTIFICATE - OCSP_REQUEST failed, tried 0
builders
Feb 18 13:57:34 09[CFG] generating ocsp request failed
Feb 18 13:57:34 09[CFG] ocsp check failed, fallback to crl
Feb 18 13:57:34 09[CFG] fetching crl from
'http://crl.identrust.com/DSTROOTCAX3CRL.crl' ...
Feb 18 13:57:35 09[CFG] using trusted certificate "O=Digital Signature Trust Co.,
CN=DST Root CA X3"
Feb 18 13:57:35 09[CFG] crl correctly signed by "O=Digital Signature Trust Co.,
CN=DST Root CA X3"
Feb 18 13:57:35 09[CFG] crl is valid: until Mar 10 03:04:56 2019
Feb 18 13:57:35 09[CFG] certificate status is good
Feb 18 13:57:35 09[CFG] reached self-signed root ca with a path length of 1
Feb 18 13:57:35 09[IKE] authentication of '51-75-62-48-pl.gitfeature.com' with
RSA_EMSA_PKCS1_SHA2_256 successful
Feb 18 13:57:35 09[IKE] server requested EAP_IDENTITY (id 0x00), sending
'6069dd95fb18ee6ef1fc30c2527bd393'
Feb 18 13:57:35 09[ENC] generating IKE_AUTH request 2 [ EAP/RES/ID ]
Feb 18 13:57:35 09[NET] sending packet: from 10.96.202.148[40596] to
51.75.62.48[4500] (112 bytes)
Feb 18 13:57:35 08[NET] received packet: from 51.75.62.48[4500] to
10.96.202.148[40596] (96 bytes)
Feb 18 13:57:35 08[ENC] parsed IKE_AUTH response 2 [ EAP/REQ/MD5 ]
Feb 18 13:57:35 08[IKE] server requested EAP_MD5 authentication (id 0x01)
Feb 18 13:57:35 08[ENC] generating IKE_AUTH request 3 [ EAP/RES/MD5 ]
Feb 18 13:57:35 08[NET] sending packet: from 10.96.202.148[40596] to
51.75.62.48[4500] (96 bytes)
Feb 18 13:57:36 11[NET] received packet: from 51.75.62.48[4500] to
10.96.202.148[40596] (80 bytes)
Feb 18 13:57:36 11[ENC] parsed IKE_AUTH response 3 [ EAP/SUCC ]
Feb 18 13:57:36 11[IKE] EAP method EAP_MD5 succeeded, no MSK established
Feb 18 13:57:36 11[IKE] authentication of '6069dd95fb18ee6ef1fc30c2527bd393'
(myself) with EAP
Feb 18 13:57:36 11[ENC] generating IKE_AUTH request 4 [ AUTH ]
Feb 18 13:57:36 11[NET] sending packet: from 10.96.202.148[40596] to
51.75.62.48[4500] (112 bytes)
Feb 18 13:57:36 12[NET] received packet: from 51.75.62.48[4500] to
10.96.202.148[40596] (240 bytes)
Feb 18 13:57:36 12[ENC] parsed IKE_AUTH response 4 [ AUTH CPRP(ADDR DNS) SA TSi TSr
N(MOBIKE_SUP) N(NO_ADD_ADDR) ]
Feb 18 13:57:36 12[IKE] authentication of '51-75-62-48-pl.gitfeature.com' with EAP
successful
Feb 18 13:57:36 12[IKE] IKE_SA android[1] established between
10.96.202.148[6069dd95fb18ee6ef1fc30c2527bd393]...51.75.62.48[51-75-62-48-
pl.gitfeature.com]
Feb 18 13:57:36 12[IKE] scheduling rekeying in 35796s
Feb 18 13:57:36 12[IKE] maximum IKE_SA lifetime 36396s
Feb 18 13:57:36 12[IKE] installing DNS server 51.75.62.48
Feb 18 13:57:36 12[IKE] installing new virtual IP 10.1.83.175
Feb 18 13:57:36 12[IKE] CHILD_SA android{1} established with SPIs 3d53547c_i
c1c65c18_o and TS 10.1.83.175/32 === 0.0.0.0/0
Feb 18 13:57:36 12[DMN] setting up TUN device for CHILD_SA android{1}
Feb 18 13:57:36 12[DMN] successfully created TUN device
Feb 18 13:57:36 12[IKE] peer supports MOBIKE
Feb 18 13:57:37 15[IKE] sending address list update using MOBIKE
Feb 18 13:57:37 15[ENC] generating INFORMATIONAL request 5 [ N(NO_ADD_ADDR) ]
Feb 18 13:57:37 15[NET] sending packet: from 10.96.202.148[40596] to
51.75.62.48[4500] (80 bytes)
Feb 18 13:57:37 07[NET] received packet: from 51.75.62.48[4500] to
10.96.202.148[40596] (80 bytes)
Feb 18 13:57:37 07[ENC] parsed INFORMATIONAL response 5 [ ]
Feb 18 13:57:46 00[IKE] deleting IKE_SA android[1] between
10.96.202.148[6069dd95fb18ee6ef1fc30c2527bd393]...51.75.62.48[51-75-62-48-
pl.gitfeature.com]
Feb 18 13:57:46 00[IKE] sending DELETE for IKE_SA android[1]
Feb 18 13:57:46 00[ENC] generating INFORMATIONAL request 6 [ D ]
Feb 18 13:57:46 00[NET] sending packet: from 10.96.202.148[40596] to
51.75.62.48[4500] (80 bytes)

You might also like