2019-04-02 07:01:51 info 10[NET]: received packet: from 89.102.125.177[4500] to 90.178.88.106[4500] (128 bytes) 2019-04-02 07:01:51 info 10[ENC]: parsed INFORMATIONAL request 75 [ ] 2019-04-02 07:01:51 info 10[ENC]: generating INFORMATIONAL response 75 [ ] 2019-04-02 07:01:51 info 10[NET]: sending packet: from 90.178.88.106[4500] to 89.102.125.177[4500] (80 bytes) 2019-04-02 07:02:01 info /usr/sbin/cron[21440]: (root) CMD (nethist_stats.lua) 2019-04-02 07:02:01 info /usr/sbin/cron[21439]: (root) CMD (/usr/bin/rainbow_button_sync.sh) 2019-04-02 07:03:01 info /usr/sbin/cron[21476]: (root) CMD (/usr/bin/rainbow_button_sync.sh) 2019-04-02 07:03:51 info 12[NET]: received packet: from 89.102.125.177[4500] to 90.178.88.106[4500] (128 bytes) 2019-04-02 07:03:51 info 12[ENC]: parsed INFORMATIONAL request 76 [ ] 2019-04-02 07:03:51 info 12[ENC]: generating INFORMATIONAL response 76 [ ] 2019-04-02 07:03:51 info 12[NET]: sending packet: from 90.178.88.106[4500] to 89.102.125.177[4500] (80 bytes) 2019-04-02 07:04:01 info /usr/sbin/cron[21508]: (root) CMD (/usr/bin/rainbow_button_sync.sh) 2019-04-02 07:04:01 info /usr/sbin/cron[21510]: (root) CMD (nethist_stats.lua) 2019-04-02 07:05:01 info /usr/sbin/cron[21540]: (root) CMD ( /usr/bin/notifier) 2019-04-02 07:05:01 info /usr/sbin/cron[21539]: (root) CMD (/usr/bin/rainbow_button_sync.sh) 2019-04-02 07:05:51 info 05[NET]: received packet: from 89.102.125.177[4500] to 90.178.88.106[4500] (96 bytes) 2019-04-02 07:05:51 info 05[ENC]: parsed INFORMATIONAL request 77 [ ] 2019-04-02 07:05:51 info 05[ENC]: generating INFORMATIONAL response 77 [ ] 2019-04-02 07:05:51 info 05[NET]: sending packet: from 90.178.88.106[4500] to 89.102.125.177[4500] (80 bytes) 2019-04-02 07:06:01 info /usr/sbin/cron[21606]: (root) CMD (/usr/bin/rainbow_button_sync.sh) 2019-04-02 07:06:01 info /usr/sbin/cron[21607]: (root) CMD (nethist_stats.lua) 2019-04-02 07:07:01 info /usr/sbin/cron[21636]: (root) CMD (/usr/bin/rainbow_button_sync.sh) 2019-04-02 07:07:46 info 14[NET]: received packet: from 89.102.125.177[4500] to 90.178.88.106[4500] (800 bytes) 2019-04-02 07:07:46 info 14[ENC]: parsed CREATE_CHILD_SA request 78 [ No KE N(REKEY_SA) SA TSi TSr N(USE_TRANSP) ] 2019-04-02 07:07:48 info 14[CFG]: selected proposal: ESP:AES_CBC_256/HMAC_SHA2_256_128/MODP_4096/NO_EXT_SEQ 2019-04-02 07:07:48 info 14[IKE]: inbound CHILD_SA jezekus{50} established with SPIs c4182ac8_i 0767a17a_o and TS 90.178.88.106/32[gre] === 89.102.125.177/32[gre] 2019-04-02 07:07:48 info 14[31760]: Last message 'inbound CHILD_SA jez' repeated 1 times, suppressed by syslog-ng on turris 2019-04-02 07:07:48 info 14[ENC]: generating CREATE_CHILD_SA response 78 [ N(USE_TRANSP) SA No KE TSi TSr ] 2019-04-02 07:07:48 info 14[NET]: sending packet: from 90.178.88.106[4500] to 89.102.125.177[4500] (736 bytes) 2019-04-02 07:07:57 info 13[NET]: received packet: from 89.102.125.177[4500] to 90.178.88.106[4500] (96 bytes) 2019-04-02 07:07:57 info 13[ENC]: parsed INFORMATIONAL request 79 [ D ] 2019-04-02 07:07:57 info 13[IKE]: received DELETE for ESP CHILD_SA with SPI 08b41f38 2019-04-02 07:07:57 info 13[IKE]: closing CHILD_SA jezekus{49} with SPIs ce6b6bb4_i (48557 bytes) 08b41f38_o (39285 bytes) and TS 90.178.88.106/32[gre] === 89.102.125.177/32[gre] 2019-04-02 07:07:57 info 13[31760]: Last message 'closing CHILD_SA jez' repeated 1 times, suppressed by syslog-ng on turris 2019-04-02 07:07:57 info 13[IKE]: sending DELETE for ESP CHILD_SA with SPI ce6b6bb4 2019-04-02 07:07:57 info 13[IKE]: CHILD_SA closed 2019-04-02 07:07:57 info 13[IKE]: outbound CHILD_SA jezekus{50} established with SPIs c4182ac8_i 0767a17a_o and TS 90.178.88.106/32[gre] === 89.102.125.177/32[gre] 2019-04-02 07:07:57 info 13[31760]: Last message 'outbound CHILD_SA je' repeated 1 times, suppressed by syslog-ng on turris 2019-04-02 07:07:57 info 13[ENC]: generating INFORMATIONAL response 79 [ D ] 2019-04-02 07:07:57 info 13[NET]: sending packet: from 90.178.88.106[4500] to 89.102.125.177[4500] (80 bytes) 2019-04-02 07:08:01 info /usr/sbin/cron[21670]: (root) CMD (/usr/bin/rainbow_button_sync.sh) 2019-04-02 07:08:01 info /usr/sbin/cron[21671]: (root) CMD (nethist_stats.lua) 2019-04-02 07:09:01 info /usr/sbin/cron[21699]: (root) CMD (/usr/bin/rainbow_button_sync.sh) 2019-04-02 07:09:57 info 06[NET]: received packet: from 89.102.125.177[4500] to 90.178.88.106[4500] (160 bytes) 2019-04-02 07:09:57 info 06[ENC]: parsed INFORMATIONAL request 80 [ ] 2019-04-02 07:09:57 info 06[ENC]: generating INFORMATIONAL response 80 [ ] 2019-04-02 07:09:57 info 06[NET]: sending packet: from 90.178.88.106[4500] to 89.102.125.177[4500] (80 bytes) 2019-04-02 07:10:01 info /usr/sbin/cron[21734]: (root) CMD (/usr/bin/rainbow_button_sync.sh) 2019-04-02 07:10:01 info /usr/sbin/cron[21735]: (root) CMD (nethist_stats.lua) 2019-04-02 07:10:01 info /usr/sbin/cron[21736]: (root) CMD ( /usr/bin/notifier) 2019-04-02 07:10:45 info hostapd[]: wlan1: STA 38:ea:a7:c0:5f:c2 IEEE 802.11: deauthenticated due to local deauth request 2019-04-02 07:10:46 info hostapd[]: wlan1: STA 38:ea:a7:c0:5f:c2 IEEE 802.11: authenticated 2019-04-02 07:10:46 info hostapd[]: wlan1: STA 38:ea:a7:c0:5f:c2 IEEE 802.11: associated (aid 1) 2019-04-02 07:10:47 info hostapd[]: wlan1: STA 38:ea:a7:c0:5f:c2 RADIUS: starting accounting session 9D6DBFB1F47F69C6 2019-04-02 07:10:47 info hostapd[]: wlan1: STA 38:ea:a7:c0:5f:c2 WPA: pairwise key handshake completed (RSN) 2019-04-02 07:10:53 warning odhcpd[2078]: DHCPV6 SOLICIT IA_NA from 0003000138eaa7c05fc2 on br-lan: ok 2a00:1028:83d4:172e::f87/128 fd23:d406:c77f::f87/128 2019-04-02 07:10:53 info dnsmasq-dhcp[3921]: read /etc/ethers - 0 addresses 2019-04-02 07:10:54 warning odhcpd[2078]: DHCPV6 REQUEST IA_NA from 0003000138eaa7c05fc2 on br-lan: ok 2a00:1028:83d4:172e::f87/128 fd23:d406:c77f::f87/128 2019-04-02 07:10:54 info dnsmasq-dhcp[3921]: read /etc/ethers - 0 addresses 2019-04-02 07:10:58 info dnsmasq-dhcp[3921]: DHCPREQUEST(br-lan) 192.168.8.192 38:ea:a7:c0:5f:c2 2019-04-02 07:10:58 info dnsmasq-dhcp[3921]: DHCPACK(br-lan) 192.168.8.192 38:ea:a7:c0:5f:c2 HPC05FC2 2019-04-02 07:11:01 info /usr/sbin/cron[21804]: (root) CMD (/usr/bin/rainbow_button_sync.sh) 2019-04-02 07:11:57 info 15[NET]: received packet: from 89.102.125.177[4500] to 90.178.88.106[4500] (128 bytes) 2019-04-02 07:11:57 info 15[ENC]: parsed INFORMATIONAL request 81 [ ] 2019-04-02 07:11:57 info 15[ENC]: generating INFORMATIONAL response 81 [ ] 2019-04-02 07:11:57 info 15[NET]: sending packet: from 90.178.88.106[4500] to 89.102.125.177[4500] (80 bytes) 2019-04-02 07:12:01 info /usr/sbin/cron[21836]: (root) CMD (/usr/sbin/logrotate -s /tmp/logrotate.state /etc/logrotate.conf) 2019-04-02 07:12:01 info /usr/sbin/cron[21837]: (root) CMD (/usr/bin/rainbow_button_sync.sh) 2019-04-02 07:12:01 info /usr/sbin/cron[21839]: (root) CMD (nethist_stats.lua) 2019-04-02 07:13:01 info /usr/sbin/cron[21866]: (root) CMD (/usr/bin/rainbow_button_sync.sh) 2019-04-02 07:13:57 info 08[NET]: received packet: from 89.102.125.177[4500] to 90.178.88.106[4500] (144 bytes) 2019-04-02 07:13:57 info 08[ENC]: parsed INFORMATIONAL request 82 [ ] 2019-04-02 07:13:57 info 08[ENC]: generating INFORMATIONAL response 82 [ ] 2019-04-02 07:13:57 info 08[NET]: sending packet: from 90.178.88.106[4500] to 89.102.125.177[4500] (80 bytes) 2019-04-02 07:14:01 info /usr/sbin/cron[21897]: (root) CMD (/usr/bin/rainbow_button_sync.sh) 2019-04-02 07:14:01 info /usr/sbin/cron[21898]: (root) CMD (nethist_stats.lua) 2019-04-02 07:15:01 info /usr/sbin/cron[21929]: (root) CMD ( /usr/bin/notifier) 2019-04-02 07:15:01 info /usr/sbin/cron[21928]: (root) CMD (/usr/bin/rainbow_button_sync.sh) 2019-04-02 07:15:57 info 11[NET]: received packet: from 89.102.125.177[4500] to 90.178.88.106[4500] (144 bytes) 2019-04-02 07:15:57 info 11[ENC]: parsed INFORMATIONAL request 83 [ ] 2019-04-02 07:15:57 info 11[ENC]: generating INFORMATIONAL response 83 [ ] 2019-04-02 07:15:57 info 11[NET]: sending packet: from 90.178.88.106[4500] to 89.102.125.177[4500] (80 bytes) 2019-04-02 07:16:01 info /usr/sbin/cron[21996]: (root) CMD (/usr/bin/rainbow_button_sync.sh) 2019-04-02 07:16:01 info /usr/sbin/cron[21997]: (root) CMD (nethist_stats.lua) 2019-04-02 07:17:01 info /usr/sbin/cron[22025]: (root) CMD (/usr/bin/rainbow_button_sync.sh) 2019-04-02 07:17:57 info 09[NET]: received packet: from 89.102.125.177[4500] to 90.178.88.106[4500] (144 bytes) 2019-04-02 07:17:57 info 09[ENC]: parsed INFORMATIONAL request 84 [ ] 2019-04-02 07:17:57 info 09[ENC]: generating INFORMATIONAL response 84 [ ] 2019-04-02 07:17:57 info 09[NET]: sending packet: from 90.178.88.106[4500] to 89.102.125.177[4500] (80 bytes) 2019-04-02 07:18:01 info /usr/sbin/cron[22056]: (root) CMD (/usr/bin/rainbow_button_sync.sh) 2019-04-02 07:18:01 info /usr/sbin/cron[22057]: (root) CMD (nethist_stats.lua) 2019-04-02 07:19:01 info /usr/sbin/cron[22099]: (root) CMD (/usr/bin/rainbow_button_sync.sh) 2019-04-02 07:19:57 info 07[NET]: received packet: from 89.102.125.177[4500] to 90.178.88.106[4500] (112 bytes) 2019-04-02 07:19:57 info 07[ENC]: parsed INFORMATIONAL request 85 [ ] 2019-04-02 07:19:57 info 07[ENC]: generating INFORMATIONAL response 85 [ ] 2019-04-02 07:19:57 info 07[NET]: sending packet: from 90.178.88.106[4500] to 89.102.125.177[4500] (80 bytes) 2019-04-02 07:20:01 info /usr/sbin/cron[22135]: (root) CMD (/usr/bin/rainbow_button_sync.sh) 2019-04-02 07:20:01 info /usr/sbin/cron[22136]: (root) CMD (nethist_stats.lua) 2019-04-02 07:20:01 info /usr/sbin/cron[22137]: (root) CMD ( /usr/bin/notifier) 2019-04-02 07:20:45 info hostapd[]: wlan1: STA 38:ea:a7:c0:5f:c2 IEEE 802.11: deauthenticated due to local deauth request 2019-04-02 07:20:46 info hostapd[]: wlan1: STA 38:ea:a7:c0:5f:c2 IEEE 802.11: authenticated 2019-04-02 07:20:46 info hostapd[]: wlan1: STA 38:ea:a7:c0:5f:c2 IEEE 802.11: associated (aid 1) 2019-04-02 07:20:47 info hostapd[]: wlan1: STA 38:ea:a7:c0:5f:c2 RADIUS: starting accounting session 84D71D2C2E2F9C62 2019-04-02 07:20:47 info hostapd[]: wlan1: STA 38:ea:a7:c0:5f:c2 WPA: pairwise key handshake completed (RSN) 2019-04-02 07:20:55 warning odhcpd[2078]: DHCPV6 SOLICIT IA_NA from 0003000138eaa7c05fc2 on br-lan: ok 2a00:1028:83d4:172e::f87/128 fd23:d406:c77f::f87/128 2019-04-02 07:20:55 info dnsmasq-dhcp[3921]: read /etc/ethers - 0 addresses 2019-04-02 07:20:56 warning odhcpd[2078]: DHCPV6 REQUEST IA_NA from 0003000138eaa7c05fc2 on br-lan: ok 2a00:1028:83d4:172e::f87/128 fd23:d406:c77f::f87/128 2019-04-02 07:20:56 info dnsmasq-dhcp[3921]: read /etc/ethers - 0 addresses 2019-04-02 07:21:01 info /usr/sbin/cron[22205]: (root) CMD (/usr/bin/rainbow_button_sync.sh) 2019-04-02 07:21:05 info dnsmasq-dhcp[3921]: DHCPREQUEST(br-lan) 192.168.8.192 38:ea:a7:c0:5f:c2 2019-04-02 07:21:05 info dnsmasq-dhcp[3921]: DHCPACK(br-lan) 192.168.8.192 38:ea:a7:c0:5f:c2 HPC05FC2 2019-04-02 07:21:57 info 06[NET]: received packet: from 89.102.125.177[4500] to 90.178.88.106[4500] (128 bytes) 2019-04-02 07:21:57 info 06[ENC]: parsed INFORMATIONAL request 86 [ ] 2019-04-02 07:21:57 info 06[ENC]: generating INFORMATIONAL response 86 [ ] 2019-04-02 07:21:57 info 06[NET]: sending packet: from 90.178.88.106[4500] to 89.102.125.177[4500] (80 bytes) 2019-04-02 07:22:01 info /usr/sbin/cron[22232]: (root) CMD (nethist_stats.lua) 2019-04-02 07:22:01 info /usr/sbin/cron[22234]: (root) CMD (/usr/bin/rainbow_button_sync.sh) 2019-04-02 07:23:01 info /usr/sbin/cron[22273]: (root) CMD (/usr/bin/rainbow_button_sync.sh) 2019-04-02 07:23:57 info 04[NET]: received packet: from 89.102.125.177[4500] to 90.178.88.106[4500] (144 bytes) 2019-04-02 07:23:57 info 04[ENC]: parsed INFORMATIONAL request 87 [ ] 2019-04-02 07:23:57 info 04[ENC]: generating INFORMATIONAL response 87 [ ] 2019-04-02 07:23:57 info 04[NET]: sending packet: from 90.178.88.106[4500] to 89.102.125.177[4500] (80 bytes) 2019-04-02 07:24:01 info /usr/sbin/cron[22306]: (root) CMD (/usr/bin/rainbow_button_sync.sh) 2019-04-02 07:24:01 info /usr/sbin/cron[22307]: (root) CMD (nethist_stats.lua) 2019-04-02 07:25:01 info /usr/sbin/cron[22337]: (root) CMD (/usr/bin/rainbow_button_sync.sh) 2019-04-02 07:25:01 info /usr/sbin/cron[22338]: (root) CMD ( /usr/bin/notifier) 2019-04-02 07:25:59 info 10[NET]: received packet: from 89.102.125.177[4500] to 90.178.88.106[4500] (128 bytes) 2019-04-02 07:25:59 info 10[ENC]: parsed INFORMATIONAL request 88 [ ] 2019-04-02 07:25:59 info 10[ENC]: generating INFORMATIONAL response 88 [ ] 2019-04-02 07:25:59 info 10[NET]: sending packet: from 90.178.88.106[4500] to 89.102.125.177[4500] (80 bytes) 2019-04-02 07:26:01 info /usr/sbin/cron[22403]: (root) CMD (/usr/bin/rainbow_button_sync.sh) 2019-04-02 07:26:01 info /usr/sbin/cron[22404]: (root) CMD (nethist_stats.lua) 2019-04-02 07:27:01 info /usr/sbin/cron[22434]: (root) CMD (/usr/bin/rainbow_button_sync.sh) 2019-04-02 07:28:01 info /usr/sbin/cron[22465]: (root) CMD (nethist_stats.lua) 2019-04-02 07:28:01 info /usr/sbin/cron[22466]: (root) CMD (/usr/bin/rainbow_button_sync.sh) 2019-04-02 07:28:02 info 12[IKE]: initiator did not reauthenticate as requested 2019-04-02 07:28:02 info 12[IKE]: reauthenticating IKE_SA jezekus[20] actively 2019-04-02 07:28:02 info 12[31760]: Last message 'reauthenticating IKE' repeated 1 times, suppressed by syslog-ng on turris 2019-04-02 07:28:02 info 12[IKE]: deleting IKE_SA jezekus[20] between 90.178.88.106[90.178.88.106]...89.102.125.177[89.102.125.177] 2019-04-02 07:28:02 info 12[31760]: Last message 'deleting IKE_SA jeze' repeated 1 times, suppressed by syslog-ng on turris 2019-04-02 07:28:02 info 12[IKE]: sending DELETE for IKE_SA jezekus[20] 2019-04-02 07:28:02 info 12[ENC]: generating INFORMATIONAL request 0 [ D ] 2019-04-02 07:28:02 info 12[NET]: sending packet: from 90.178.88.106[4500] to 89.102.125.177[4500] (80 bytes) 2019-04-02 07:28:02 info 05[NET]: received packet: from 89.102.125.177[4500] to 90.178.88.106[4500] (96 bytes) 2019-04-02 07:28:02 info 05[ENC]: parsed INFORMATIONAL response 0 [ ] 2019-04-02 07:28:02 info 05[IKE]: IKE_SA deleted 2019-04-02 07:28:02 info 05[31760]: Last message 'IKE_SA deleted' repeated 1 times, suppressed by syslog-ng on turris 2019-04-02 07:28:02 info 05[IKE]: restarting CHILD_SA jezekus 2019-04-02 07:28:02 info 05[IKE]: initiating IKE_SA jezekus[21] to 89.102.125.177 2019-04-02 07:28:02 info 05[31760]: Last message 'initiating IKE_SA je' repeated 1 times, suppressed by syslog-ng on turris 2019-04-02 07:28:02 info 13[NET]: received packet: from 89.102.125.177[4500] to 90.178.88.106[4500] (328 bytes) 2019-04-02 07:28:02 info 13[ENC]: parsed IKE_SA_INIT request 0 [ N(NATD_D_IP) N(NATD_S_IP) No KE SA ] 2019-04-02 07:28:02 info 13[IKE]: 89.102.125.177 is initiating an IKE_SA 2019-04-02 07:28:02 info 13[31760]: Last message '89.102.125.177 is in' repeated 1 times, suppressed by syslog-ng on turris 2019-04-02 07:28:02 info 13[CFG]: selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_4096 2019-04-02 07:28:02 info 13[IKE]: DH group ECP_521 unacceptable, requesting MODP_4096 2019-04-02 07:28:02 info 13[ENC]: generating IKE_SA_INIT response 0 [ N(INVAL_KE) ] 2019-04-02 07:28:02 info 13[NET]: sending packet: from 90.178.88.106[4500] to 89.102.125.177[4500] (38 bytes) 2019-04-02 07:28:02 info 05[ENC]: generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ] 2019-04-02 07:28:02 info 05[NET]: sending packet: from 90.178.88.106[4500] to 89.102.125.177[4500] (890 bytes) 2019-04-02 07:28:05 info 14[NET]: received packet: from 89.102.125.177[4500] to 90.178.88.106[4500] (692 bytes) 2019-04-02 07:28:05 info 14[ENC]: parsed IKE_SA_INIT request 0 [ N(NATD_D_IP) N(NATD_S_IP) No KE SA ] 2019-04-02 07:28:05 info 14[IKE]: 89.102.125.177 is initiating an IKE_SA 2019-04-02 07:28:05 info 14[31760]: Last message '89.102.125.177 is in' repeated 1 times, suppressed by syslog-ng on turris 2019-04-02 07:28:05 info 14[CFG]: selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_4096 2019-04-02 07:28:06 info 14[ENC]: generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(MULT_AUTH) ] 2019-04-02 07:28:06 info 14[NET]: sending packet: from 90.178.88.106[4500] to 89.102.125.177[4500] (696 bytes) 2019-04-02 07:28:06 info 06[IKE]: retransmit 1 of request with message ID 0 2019-04-02 07:28:06 info 06[NET]: sending packet: from 90.178.88.106[4500] to 89.102.125.177[4500] (890 bytes) 2019-04-02 07:28:11 info 15[NET]: received packet: from 89.102.125.177[4500] to 90.178.88.106[4500] (685 bytes) 2019-04-02 07:28:11 info 15[ENC]: parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ ] 2019-04-02 07:28:11 info 15[CFG]: selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_4096 2019-04-02 07:28:11 info 08[NET]: received packet: from 89.102.125.177[4500] to 90.178.88.106[4500] (692 bytes) 2019-04-02 07:28:11 info 08[ENC]: parsed IKE_SA_INIT request 0 [ N(NATD_D_IP) N(NATD_S_IP) No KE SA ] 2019-04-02 07:28:11 info 08[IKE]: received retransmit of request with ID 0, retransmitting response 2019-04-02 07:28:11 info 08[NET]: sending packet: from 90.178.88.106[4500] to 89.102.125.177[4500] (696 bytes) 2019-04-02 07:28:12 info 15[IKE]: authentication of '90.178.88.106' (myself) with pre-shared key 2019-04-02 07:28:12 info 15[IKE]: establishing CHILD_SA jezekus{51} reqid 7 2019-04-02 07:28:12 info 15[31760]: Last message 'establishing CHILD_S' repeated 1 times, suppressed by syslog-ng on turris 2019-04-02 07:28:12 info 15[ENC]: generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH N(USE_TRANSP) SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_6_ADDR) N(ADD_6_ADDR) N(ADD_6_ADDR) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ] 2019-04-02 07:28:12 info 15[NET]: sending packet: from 90.178.88.106[4500] to 89.102.125.177[4500] (480 bytes) 2019-04-02 07:28:14 info 09[NET]: received packet: from 89.102.125.177[4500] to 90.178.88.106[4500] (685 bytes) 2019-04-02 07:28:14 info 09[ENC]: parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ ] 2019-04-02 07:28:14 info 09[IKE]: received message ID 0, expected 1, ignored 2019-04-02 07:28:14 info 04[NET]: received packet: from 89.102.125.177[4500] to 90.178.88.106[4500] (352 bytes) 2019-04-02 07:28:14 info 04[ENC]: parsed IKE_AUTH request 1 [ IDi AUTH N(INIT_CONTACT) SA TSi TSr N(USE_TRANSP) ] 2019-04-02 07:28:14 info 04[CFG]: looking for peer configs matching 90.178.88.106[%any]...89.102.125.177[89.102.125.177] 2019-04-02 07:28:14 info 04[CFG]: selected peer config 'jezekus' 2019-04-02 07:28:14 info 04[IKE]: authentication of '89.102.125.177' with pre-shared key successful 2019-04-02 07:28:14 info 04[IKE]: authentication of '90.178.88.106' (myself) with pre-shared key 2019-04-02 07:28:14 info 04[IKE]: IKE_SA jezekus[23] established between 90.178.88.106[90.178.88.106]...89.102.125.177[89.102.125.177] 2019-04-02 07:28:14 info 04[31760]: Last message 'IKE_SA jezekus[23] e' repeated 1 times, suppressed by syslog-ng on turris 2019-04-02 07:28:14 info 04[IKE]: scheduling reauthentication in 9732s 2019-04-02 07:28:14 info 04[IKE]: maximum IKE_SA lifetime 10272s 2019-04-02 07:28:14 info 04[CFG]: selected proposal: ESP:AES_CBC_256/HMAC_SHA2_256_128/NO_EXT_SEQ 2019-04-02 07:28:14 info 04[IKE]: CHILD_SA jezekus{52} established with SPIs cfde5fb7_i 08abb54d_o and TS 90.178.88.106/32[gre] === 89.102.125.177/32[gre] 2019-04-02 07:28:14 info 04[31760]: Last message 'CHILD_SA jezekus{52}' repeated 1 times, suppressed by syslog-ng on turris 2019-04-02 07:28:14 info 04[ENC]: generating IKE_AUTH response 1 [ IDr AUTH N(USE_TRANSP) SA TSi TSr N(AUTH_LFT) ] 2019-04-02 07:28:14 info 04[NET]: sending packet: from 90.178.88.106[4500] to 89.102.125.177[4500] (240 bytes) 2019-04-02 07:28:14 info 10[NET]: received packet: from 89.102.125.177[4500] to 90.178.88.106[4500] (256 bytes) 2019-04-02 07:28:14 info 10[ENC]: parsed INFORMATIONAL request 0 [ D ] 2019-04-02 07:28:14 info 10[IKE]: received DELETE for IKE_SA jezekus[21] 2019-04-02 07:28:14 info 10[IKE]: deleting IKE_SA jezekus[21] between 90.178.88.106[90.178.88.106]...89.102.125.177[89.102.125.177] 2019-04-02 07:28:14 info 10[31760]: Last message 'deleting IKE_SA jeze' repeated 1 times, suppressed by syslog-ng on turris 2019-04-02 07:28:14 info 10[IKE]: IKE_SA deleted 2019-04-02 07:28:14 info 10[31760]: Last message 'IKE_SA deleted' repeated 1 times, suppressed by syslog-ng on turris 2019-04-02 07:28:14 info 10[ENC]: generating INFORMATIONAL response 0 [ ] 2019-04-02 07:28:14 info 10[NET]: sending packet: from 90.178.88.106[4500] to 89.102.125.177[4500] (80 bytes)