Фев 26 23:57:56 ndm
Core::Syslog: the system log has been cleared.
Фев 26 23:58:08 ipsec
12[IKE] 94.29.*.* is initiating an IKE_SA
Фев 26 23:58:08 ipsec
12[CFG] received proposals: IKE:AES_CBC=256/AES_CBC=128/HMAC_SHA2_512_256/HMAC_SHA2_384_192/HMAC_SHA2_256_128/HMAC_SHA1_96/PRF_HMAC_SHA2_512/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_256/PRF_HMAC_SHA1/MODP_2048_256/ECP_384/ECP_256/MODP_2048/MODP_1536, IKE:AES_GCM_16=256/AES_GCM_16=128/PRF_HMAC_SHA2_512/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_256/PRF_HMAC_SHA1/MODP_2048_256/ECP_384/ECP_256/MODP_2048/MODP_1536
Фев 26 23:58:08 ipsec
12[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256
Фев 26 23:58:08 ipsec
12[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Фев 26 23:58:08 ipsec
12[IKE] remote host is behind NAT
Фев 26 23:58:08 ipsec
12[IKE] DH group MODP_2048_256 unacceptable, requesting MODP_2048
Фев 26 23:58:08 ipsec
15[IKE] 94.29.*.* is initiating an IKE_SA
Фев 26 23:58:08 ipsec
15[CFG] received proposals: IKE:AES_CBC=256/AES_CBC=128/HMAC_SHA2_512_256/HMAC_SHA2_384_192/HMAC_SHA2_256_128/HMAC_SHA1_96/PRF_HMAC_SHA2_512/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_256/PRF_HMAC_SHA1/MODP_2048/MODP_2048_256/ECP_384/ECP_256/MODP_1536, IKE:AES_GCM_16=256/AES_GCM_16=128/PRF_HMAC_SHA2_512/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_256/PRF_HMAC_SHA1/MODP_2048/MODP_2048_256/ECP_384/ECP_256/MODP_1536
Фев 26 23:58:08 ipsec
15[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256
Фев 26 23:58:08 ipsec
15[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Фев 26 23:58:08 ipsec
15[IKE] remote host is behind NAT
Фев 26 23:58:08 ipsec
14[CFG] looking for peer configs matching 95.68.*.*[%any]...94.29.*.*[Lw*]
Фев 26 23:58:08 ipsec
14[CFG] selected peer config 'VirtualIPServerIKE2'
Фев 26 23:58:08 ipsec
14[IKE] initiating EAP_IDENTITY method (id 0x00)
Фев 26 23:58:08 ipsec
14[IKE] peer supports MOBIKE, but disabled in config
Фев 26 23:58:08 ipsec
14[IKE] authentication of '*.keenetic.name' (myself) with RSA_EMSA_PKCS1_SHA2_256 successful
Фев 26 23:58:08 ipsec
14[IKE] sending end entity cert "CN=*.keenetic.name"
Фев 26 23:58:08 ipsec
14[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R3"
Фев 26 23:58:08 ipsec
05[IKE] received EAP identity 'Lw*'
Фев 26 23:58:08 ipsec
05[IKE] initiating EAP_MSCHAPV2 method (id 0xDA)
Фев 26 23:58:08 ipsec
06[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established
Фев 26 23:58:09 ipsec
09[IKE] authentication of 'Lw*' with EAP successful
Фев 26 23:58:09 ipsec
09[IKE] authentication of '*.keenetic.name' (myself) with EAP
Фев 26 23:58:09 ipsec
09[IKE] IKE_SA VirtualIPServerIKE2[76] established between 95.68.*.*[*.keenetic.name]...94.29.*.*[Lw*]
Фев 26 23:58:09 ipsec
09[IKE] peer requested virtual IP %any
Фев 26 23:58:09 ndm
Core::Server: started Session /var/run/ndm.core.socket.
Фев 26 23:58:09 ndm
IpSec::CryptoMapInfo: "VirtualIPServerIKE2": allocated address "172.20.*.*" for user "Lw*" @ "Lw*" from "94.29.*.*".
Фев 26 23:58:09 ndm
Core::Session: client disconnected.
Фев 26 23:58:09 ipsec
09[IKE] assigning virtual IP 172.20.*.* to peer 'Lw*'
Фев 26 23:58:09 ipsec
09[CFG] received proposals: ESP:AES_GCM_16=256/AES_GCM_16=128/NO_EXT_SEQ, ESP:AES_CBC=256/AES_CBC=128/HMAC_SHA2_512_256/HMAC_SHA2_384_192/HMAC_SHA2_256_128/HMAC_SHA1_96/NO_EXT_SEQ
Фев 26 23:58:09 ipsec
09[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
Фев 26 23:58:09 ipsec
09[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
Фев 26 23:58:09 ipsec
09[IKE] CHILD_SA VirtualIPServerIKE2{33} established with SPIs c2dc31c0_i c7fda6b5_o and TS 0.0.0.0/0 === 172.20.*.*/32
Фев 26 23:58:09 ndm
IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "Lw*" @ "Lw*" with IP "172.20.*.*" connected.
Фев 26 23:58:09 ipsec
09[CFG] scheduling RADIUS Interim-Updates every 5s
Фев 26 23:58:09 ndm
IpSec::Netfilter: start reloading netfilter configuration...
Фев 26 23:58:09 ndm
IpSec::Netfilter: netfilter configuration reloading is done.
Фев 26 23:58:21 ipsec
11[IKE] 178.176.*.* is initiating an IKE_SA
Фев 26 23:58:21 ipsec
11[CFG] received proposals: IKE:AES_CBC=256/AES_CBC=128/HMAC_SHA2_512_256/HMAC_SHA2_384_192/HMAC_SHA2_256_128/HMAC_SHA1_96/PRF_HMAC_SHA2_512/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_256/PRF_HMAC_SHA1/MODP_2048_256/ECP_384/ECP_256/MODP_2048/MODP_1536, IKE:AES_GCM_16=256/AES_GCM_16=128/PRF_HMAC_SHA2_512/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_256/PRF_HMAC_SHA1/MODP_2048_256/ECP_384/ECP_256/MODP_2048/MODP_1536
Фев 26 23:58:21 ipsec
11[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256
Фев 26 23:58:21 ipsec
11[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Фев 26 23:58:21 ipsec
11[IKE] remote host is behind NAT
Фев 26 23:58:21 ipsec
11[IKE] DH group MODP_2048_256 unacceptable, requesting MODP_2048
Фев 26 23:58:21 ipsec
09[IKE] 178.176.*.* is initiating an IKE_SA
Фев 26 23:58:21 ipsec
09[CFG] received proposals: IKE:AES_CBC=256/AES_CBC=128/HMAC_SHA2_512_256/HMAC_SHA2_384_192/HMAC_SHA2_256_128/HMAC_SHA1_96/PRF_HMAC_SHA2_512/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_256/PRF_HMAC_SHA1/MODP_2048/MODP_2048_256/ECP_384/ECP_256/MODP_1536, IKE:AES_GCM_16=256/AES_GCM_16=128/PRF_HMAC_SHA2_512/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_256/PRF_HMAC_SHA1/MODP_2048/MODP_2048_256/ECP_384/ECP_256/MODP_1536
Фев 26 23:58:21 ipsec
09[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256
Фев 26 23:58:21 ipsec
09[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Фев 26 23:58:21 ipsec
09[IKE] remote host is behind NAT
Фев 26 23:58:22 ipsec
10[CFG] looking for peer configs matching 95.68.*.*[%any]...178.176.*.*[Lw*]
Фев 26 23:58:22 ipsec
10[CFG] selected peer config 'VirtualIPServerIKE2'
Фев 26 23:58:22 ipsec
10[IKE] initiating EAP_IDENTITY method (id 0x00)
Фев 26 23:58:22 ipsec
10[IKE] peer supports MOBIKE, but disabled in config
Фев 26 23:58:22 ipsec
10[IKE] authentication of '*.keenetic.name' (myself) with RSA_EMSA_PKCS1_SHA2_256 successful
Фев 26 23:58:22 ipsec
10[IKE] sending end entity cert "CN=*.keenetic.name"
Фев 26 23:58:22 ipsec
10[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R3"
Фев 26 23:58:22 ipsec
12[IKE] received EAP identity 'Lw*'
Фев 26 23:58:22 ipsec
12[IKE] initiating EAP_MSCHAPV2 method (id 0xEE)
Фев 26 23:58:22 ipsec
08[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established
Фев 26 23:58:22 ipsec
14[IKE] authentication of 'Lw*' with EAP successful
Фев 26 23:58:22 ipsec
14[IKE] authentication of '*.keenetic.name' (myself) with EAP
Фев 26 23:58:22 ipsec
14[IKE] canceling IKE_SA setup due to uniqueness policy
Фев 26 23:58:48 ipsec
11[IKE] retransmit 1 of request with message ID 0
Фев 26 23:58:56 ipsec
13[IKE] retransmit 2 of request with message ID 0
Фев 26 23:59:06 ipsec
11[IKE] retransmit 3 of request with message ID 0
Фев 26 23:59:17 ipsec
05[IKE] retransmit 4 of request with message ID 0
Фев 26 23:59:29 ipsec
04[IKE] retransmit 5 of request with message ID 0
Фев 26 23:59:41 ipsec
13[IKE] retransmit 6 of request with message ID 0
Фев 26 23:59:56 ipsec
14[IKE] retransmit 7 of request with message ID 0
Фев 27 00:00:11 ipsec
08[IKE] retransmit 8 of request with message ID 0
Фев 27 00:00:29 ipsec
10[IKE] giving up after 8 retransmits
Фев 27 00:00:29 ndm
IpSec::Configurator: "VirtualIPServerIKE2": remote peer is down.
Фев 27 00:00:29 ndm
IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "Lw*" @ "Lw*" from "94.29.*.*" disconnected.
Фев 27 00:00:29 ndm
IpSec::Netfilter: start reloading netfilter configuration...
Фев 27 00:00:29 ndm
IpSec::Netfilter: netfilter configuration reloading is done.
Это про то как не работает режим "Always-on VPN" встроенного клиента Самсунга при отключении Wi-Fi на телефоне с переходом на его сотовую связь.