~ubuntu-branches/ubuntu/hardy/openswan/hardy-updates

« back to all changes in this revision

Viewing changes to testing/pluto/log.ref/ipsec-rsa-co/wi-log

  • Committer: Bazaar Package Importer
  • Author(s): Rene Mayrhofer
  • Date: 2005-01-27 16:10:11 UTC
  • mfrom: (1.1.1 upstream)
  • Revision ID: james.westby@ubuntu.com-20050127161011-idgybmyz3vwhpfiq
Tags: 2.3.0-2
Urgency HIGH due to security issue and problems with build-deps in sarge.
* Fix the security issue. Please see
  http://www.idefense.com/application/poi/display?id=190&
      type=vulnerabilities&flashstatus=false
  for more details. Thanks to Martin Schulze for informing me about
  this issue.
  Closes: #292458: Openswan XAUTH/PAM Buffer Overflow Vulnerability
* Added a Build-Dependency to lynx.
  Closes: #291143: openswan: FTBFS: Missing build dependency.

Show diffs side-by-side

added added

removed removed

Lines of Context:
30
30
002 "ipsec-rsa-c" #1: initiating Main Mode
31
31
104 "ipsec-rsa-c" #1: STATE_MAIN_I1: initiate
32
32
106 "ipsec-rsa-c" #1: STATE_MAIN_I2: sent MI2, expecting MR2
 
33
002 "ipsec-rsa-c" #1: I did not send a certificate because I do not have one.
33
34
108 "ipsec-rsa-c" #1: STATE_MAIN_I3: sent MI3, expecting MR3
34
35
002 "ipsec-rsa-c" #1: ISAKMP SA established
35
36
004 "ipsec-rsa-c" #1: STATE_MAIN_I4: ISAKMP SA established
36
37
002 "ipsec-rsa-c" #2: initiating Quick Mode RSASIG+ENCRYPT+AUTHENTICATE+COMPRESS+TUNNEL+UP
37
 
112 "ipsec-rsa-c" #2: STATE_QUICK_I1: initiate
 
38
117 "ipsec-rsa-c" #2: STATE_QUICK_I1: initiate
38
39
002 "ipsec-rsa-c" #2: sent QI2, IPsec SA established
39
40
004 "ipsec-rsa-c" #2: STATE_QUICK_I2: sent QI2, IPsec SA established
40
41
whackwest --status
41
42
000 interface virtual127.95.7.1/lo:w 127.95.7.1
42
43
000 %myid = (none)
43
 
000 debug raw+crypt+parsing+emitting+control+lifecycle+klips+dns+oppo+controlmore+pfkey+nattraversal+private
44
 
000  
45
 
000 "ipsec-rsa-c": 127.95.7.8/30===127.95.7.1:8500...127.95.7.2:8500===127.95.7.20/30; erouted; eroute owner: #2
 
44
000 debug raw+crypt+parsing+emitting+control+lifecycle+klips+dns+oppo+controlmore+pfkey+nattraversal+x509+private
 
45
000  
 
46
000  
 
47
000 algorithm IKE encrypt: id=7, name=OAKLEY_AES_CBC, blocksize=16, keydeflen=128
 
48
000 algorithm IKE encrypt: id=5, name=OAKLEY_3DES_CBC, blocksize=8, keydeflen=192
 
49
000 algorithm IKE hash: id=2, name=OAKLEY_SHA1, hashsize=20
 
50
000 algorithm IKE hash: id=1, name=OAKLEY_MD5, hashsize=16
 
51
000 algorithm IKE dh group: id=2, name=OAKLEY_GROUP_MODP1024, bits=1024
 
52
000 algorithm IKE dh group: id=5, name=OAKLEY_GROUP_MODP1536, bits=1536
 
53
000 algorithm IKE dh group: id=14, name=OAKLEY_GROUP_MODP2048, bits=2048
 
54
000 algorithm IKE dh group: id=15, name=OAKLEY_GROUP_MODP3072, bits=3072
 
55
000 algorithm IKE dh group: id=16, name=OAKLEY_GROUP_MODP4096, bits=4096
 
56
000 algorithm IKE dh group: id=17, name=OAKLEY_GROUP_MODP6144, bits=6144
 
57
000 algorithm IKE dh group: id=18, name=OAKLEY_GROUP_MODP8192, bits=8192
 
58
000  
 
59
000  
 
60
000 "ipsec-rsa-c": 127.95.7.8/30===127.95.7.1:8500[S?C]...127.95.7.2:8500[S?C]===127.95.7.20/30; erouted; eroute owner: #2
 
61
000 "ipsec-rsa-c":     srcip=unset; dstip=unset
46
62
000 "ipsec-rsa-c":   ike_life: 900s; ipsec_life: 800s; rekey_margin: 350s; rekey_fuzz: 100%; keyingtries: 2
47
63
000 "ipsec-rsa-c":   policy: RSASIG+ENCRYPT+AUTHENTICATE+COMPRESS+TUNNEL+UP; prio: 30,30; interface: lo:w; 
48
64
000 "ipsec-rsa-c":   newest ISAKMP SA: #1; newest IPsec SA: #2; 
 
65
000 "ipsec-rsa-c":   IKE algorithm newest: 3DES_CBC_192-MD5-MODP1536
49
66
000  
50
67
000 #2: "ipsec-rsa-c" STATE_QUICK_I2 (sent QI2, IPsec SA established); EVENT_SA_REPLACE in ???s; newest IPSEC; eroute owner
51
68
000 #2: "ipsec-rsa-c" ah.???@127.95.7.2 ah.???@127.95.7.1 esp.???@127.95.7.2 esp.???@127.95.7.1 comp.???@127.95.7.2 comp.???@127.95.7.1 tun.1002@127.95.7.2 tun.1001@127.95.7.1