[GUIDA] xl2tpd/strongSwan per VPN L2TP/IPsec su DGA413x/TG78x

  • 196 Risposte
  • 12657 Visite

0 Utenti e 1 Visitatore stanno visualizzando questo topic.

Offline falconet

  • Nuovo Iscritto
  • *
  • 4
Re:[GUIDA] xl2tpd/strongSwan per VPN L2TP/IPsec su DGA413x/TG78x
« Risposta #195 il: 23 Giugno 2020, 05:30 »
siete grandi :)

sarebbe ancora piu perfetto se fosse possibile ampliare i campi della lista dei dispositivi



aggiungendo :
Access Point
Notebook
Switch
Router
Smartphone
IP Cam
Tablet
VoIP

ve ne sarei grato  :pray:

Offline lorenzocanalelc

  • Membro Anziano
  • ***
  • 369
  • Sesso: Maschio
Re:[GUIDA] xl2tpd/strongSwan per VPN L2TP/IPsec su DGA413x/TG78x
« Risposta #196 il: 06 Luglio 2020, 12:29 »
Buongiorno a tutti, torno in questo post perché ho appena scoperto un problema che si verifica dopo la disconnessione. Mi spiego, quando mi connetto alla VPN va tutto bene, il client si autentica senza problemi e la VPN funziona. Una volta disconnesso però sembra che qualcosa si blocchi e non riesco ne a riconnettermi alla VPN ne ad accedere alla GUI da remoto (e forse anche da locale) riesco solo a connettermi via SSH, dando il comando "ipsec restart" torna tutto a funzionare. Questo è il log completo dalla connessione alla disconnessione
Codice: [Seleziona]
Mon Jul  6 12:15:14 2020 authpriv.info ipsec: 07[NET] received packet: from "clientip"[500] to "serverip"[500] (788 bytes)
Mon Jul  6 12:15:14 2020 daemon.info ipsec: 07[NET] received packet: from "clientip"[500] to "serverip"[500] (788 bytes)
Mon Jul  6 12:15:14 2020 authpriv.info ipsec: 07[ENC] parsed ID_PROT request 0 [ SA V V V V V V V V V V V V ]
Mon Jul  6 12:15:14 2020 daemon.info ipsec: 07[ENC] parsed ID_PROT request 0 [ SA V V V V V V V V V V V V ]
Mon Jul  6 12:15:14 2020 authpriv.info ipsec: 07[IKE] received NAT-T (RFC 3947) vendor ID
Mon Jul  6 12:15:14 2020 daemon.info ipsec: 07[IKE] received NAT-T (RFC 3947) vendor ID
Mon Jul  6 12:15:14 2020 authpriv.info ipsec: 07[IKE] received draft-ietf-ipsec-nat-t-ike vendor ID
Mon Jul  6 12:15:14 2020 daemon.info ipsec: 07[IKE] received draft-ietf-ipsec-nat-t-ike vendor ID
Mon Jul  6 12:15:14 2020 authpriv.info ipsec: 07[IKE] received draft-ietf-ipsec-nat-t-ike-08 vendor ID
Mon Jul  6 12:15:14 2020 daemon.info ipsec: 07[IKE] received draft-ietf-ipsec-nat-t-ike-08 vendor ID
Mon Jul  6 12:15:14 2020 authpriv.info ipsec: 07[IKE] received draft-ietf-ipsec-nat-t-ike-07 vendor ID
Mon Jul  6 12:15:14 2020 daemon.info ipsec: 07[IKE] received draft-ietf-ipsec-nat-t-ike-07 vendor ID
Mon Jul  6 12:15:14 2020 authpriv.info ipsec: 07[IKE] received draft-ietf-ipsec-nat-t-ike-06 vendor ID
Mon Jul  6 12:15:14 2020 daemon.info ipsec: 07[IKE] received draft-ietf-ipsec-nat-t-ike-06 vendor ID
Mon Jul  6 12:15:14 2020 authpriv.info ipsec: 07[IKE] received draft-ietf-ipsec-nat-t-ike-05 vendor ID
Mon Jul  6 12:15:14 2020 daemon.info ipsec: 07[IKE] received draft-ietf-ipsec-nat-t-ike-05 vendor ID
Mon Jul  6 12:15:14 2020 authpriv.info ipsec: 07[IKE] received draft-ietf-ipsec-nat-t-ike-04 vendor ID
Mon Jul  6 12:15:14 2020 daemon.info ipsec: 07[IKE] received draft-ietf-ipsec-nat-t-ike-04 vendor ID
Mon Jul  6 12:15:14 2020 authpriv.info ipsec: 07[IKE] received draft-ietf-ipsec-nat-t-ike-03 vendor ID
Mon Jul  6 12:15:14 2020 daemon.info ipsec: 07[IKE] received draft-ietf-ipsec-nat-t-ike-03 vendor ID
Mon Jul  6 12:15:14 2020 authpriv.info ipsec: 07[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor ID
Mon Jul  6 12:15:14 2020 daemon.info ipsec: 07[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor ID
Mon Jul  6 12:15:14 2020 authpriv.info ipsec: 07[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
Mon Jul  6 12:15:14 2020 daemon.info ipsec: 07[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
Mon Jul  6 12:15:14 2020 authpriv.info ipsec: 07[IKE] received FRAGMENTATION vendor ID
Mon Jul  6 12:15:14 2020 daemon.info ipsec: 07[IKE] received FRAGMENTATION vendor ID
Mon Jul  6 12:15:14 2020 authpriv.info ipsec: 07[IKE] received DPD vendor ID
Mon Jul  6 12:15:14 2020 daemon.info ipsec: 07[IKE] received DPD vendor ID
Mon Jul  6 12:15:14 2020 authpriv.info ipsec: 07[IKE] "clientip" is initiating a Main Mode IKE_SA
Mon Jul  6 12:15:14 2020 daemon.info ipsec: 07[IKE] "clientip" is initiating a Main Mode IKE_SA
Mon Jul  6 12:15:14 2020 authpriv.info ipsec: 07[ENC] generating ID_PROT response 0 [ SA V V V ]
Mon Jul  6 12:15:14 2020 daemon.info ipsec: 07[ENC] generating ID_PROT response 0 [ SA V V V ]
Mon Jul  6 12:15:14 2020 authpriv.info ipsec: 07[NET] sending packet: from "serverip"[500] to "clientip"[500] (136 bytes)
Mon Jul  6 12:15:14 2020 daemon.info ipsec: 07[NET] sending packet: from "serverip"[500] to "clientip"[500] (136 bytes)
Mon Jul  6 12:15:14 2020 authpriv.info ipsec: 09[NET] received packet: from "clientip"[500] to "serverip"[500] (380 bytes)
Mon Jul  6 12:15:14 2020 daemon.info ipsec: 09[NET] received packet: from "clientip"[500] to "serverip"[500] (380 bytes)
Mon Jul  6 12:15:14 2020 authpriv.info ipsec: 09[ENC] parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
Mon Jul  6 12:15:14 2020 daemon.info ipsec: 09[ENC] parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
Mon Jul  6 12:15:15 2020 authpriv.info ipsec: 09[IKE] remote host is behind NAT
Mon Jul  6 12:15:15 2020 daemon.info ipsec: 09[IKE] remote host is behind NAT
Mon Jul  6 12:15:15 2020 authpriv.info ipsec: 09[ENC] generating ID_PROT response 0 [ KE No NAT-D NAT-D ]
Mon Jul  6 12:15:15 2020 daemon.info ipsec: 09[ENC] generating ID_PROT response 0 [ KE No NAT-D NAT-D ]
Mon Jul  6 12:15:15 2020 authpriv.info ipsec: 09[NET] sending packet: from "serverip"[500] to "clientip"[500] (396 bytes)
Mon Jul  6 12:15:15 2020 daemon.info ipsec: 09[NET] sending packet: from "serverip"[500] to "clientip"[500] (396 bytes)
Mon Jul  6 12:15:15 2020 authpriv.info ipsec: 11[NET] received packet: from "clientip"[4500] to "serverip"[4500] (108 bytes)
Mon Jul  6 12:15:15 2020 daemon.info ipsec: 11[NET] received packet: from "clientip"[4500] to "serverip"[4500] (108 bytes)
Mon Jul  6 12:15:15 2020 authpriv.info ipsec: 11[ENC] parsed ID_PROT request 0 [ ID HASH N(INITIAL_CONTACT) ]
Mon Jul  6 12:15:15 2020 daemon.info ipsec: 11[ENC] parsed ID_PROT request 0 [ ID HASH N(INITIAL_CONTACT) ]
Mon Jul  6 12:15:15 2020 authpriv.info ipsec: 11[CFG] looking for pre-shared key peer configs matching "serverip"..."clientip"[192.168.1.140]
Mon Jul  6 12:15:15 2020 daemon.info ipsec: 11[CFG] looking for pre-shared key peer configs matching "serverip"..."clientip"[192.168.1.140]
Mon Jul  6 12:15:15 2020 authpriv.info ipsec: 11[CFG] selected peer config "l2tp-server"
Mon Jul  6 12:15:15 2020 daemon.info ipsec: 11[CFG] selected peer config "l2tp-server"
Mon Jul  6 12:15:15 2020 authpriv.info ipsec: 11[IKE] IKE_SA l2tp-server[1] established between "serverip"["serverip"]..."clientip"[192.168.1.140]
Mon Jul  6 12:15:15 2020 daemon.info ipsec: 11[IKE] IKE_SA l2tp-server[1] established between "serverip"["serverip"]..."clientip"[192.168.1.140]
Mon Jul  6 12:15:15 2020 authpriv.info ipsec: 11[IKE] scheduling reauthentication in 2951s
Mon Jul  6 12:15:15 2020 daemon.info ipsec: 11[IKE] scheduling reauthentication in 2951s
Mon Jul  6 12:15:15 2020 authpriv.info ipsec: 11[IKE] maximum IKE_SA lifetime 3491s
Mon Jul  6 12:15:15 2020 daemon.info ipsec: 11[IKE] maximum IKE_SA lifetime 3491s
Mon Jul  6 12:15:15 2020 authpriv.info ipsec: 11[ENC] generating ID_PROT response 0 [ ID HASH ]
Mon Jul  6 12:15:15 2020 daemon.info ipsec: 11[ENC] generating ID_PROT response 0 [ ID HASH ]
Mon Jul  6 12:15:15 2020 authpriv.info ipsec: 11[NET] sending packet: from "serverip"[4500] to "clientip"[4500] (92 bytes)
Mon Jul  6 12:15:15 2020 daemon.info ipsec: 11[NET] sending packet: from "serverip"[4500] to "clientip"[4500] (92 bytes)
Mon Jul  6 12:15:16 2020 authpriv.info ipsec: 08[NET] received packet: from "clientip"[4500] to "serverip"[4500] (332 bytes)
Mon Jul  6 12:15:16 2020 daemon.info ipsec: 08[NET] received packet: from "clientip"[4500] to "serverip"[4500] (332 bytes)
Mon Jul  6 12:15:16 2020 authpriv.info ipsec: 08[ENC] parsed QUICK_MODE request 1070226255 [ HASH SA No ID ID NAT-OA NAT-OA ]
Mon Jul  6 12:15:16 2020 daemon.info ipsec: 08[ENC] parsed QUICK_MODE request 1070226255 [ HASH SA No ID ID NAT-OA NAT-OA ]
Mon Jul  6 12:15:16 2020 authpriv.info ipsec: 08[ENC] generating QUICK_MODE response 1070226255 [ HASH SA No ID ID NAT-OA NAT-OA ]
Mon Jul  6 12:15:16 2020 daemon.info ipsec: 08[ENC] generating QUICK_MODE response 1070226255 [ HASH SA No ID ID NAT-OA NAT-OA ]
Mon Jul  6 12:15:16 2020 authpriv.info ipsec: 08[NET] sending packet: from "serverip"[4500] to "clientip"[4500] (204 bytes)
Mon Jul  6 12:15:16 2020 daemon.info ipsec: 08[NET] sending packet: from "serverip"[4500] to "clientip"[4500] (204 bytes)
Mon Jul  6 12:15:16 2020 authpriv.info ipsec: 10[NET] received packet: from "clientip"[4500] to "serverip"[4500] (76 bytes)
Mon Jul  6 12:15:16 2020 daemon.info ipsec: 10[NET] received packet: from "clientip"[4500] to "serverip"[4500] (76 bytes)
Mon Jul  6 12:15:16 2020 authpriv.info ipsec: 10[ENC] parsed QUICK_MODE request 1070226255 [ HASH ]
Mon Jul  6 12:15:16 2020 daemon.info ipsec: 10[ENC] parsed QUICK_MODE request 1070226255 [ HASH ]
Mon Jul  6 12:15:16 2020 authpriv.info ipsec: 10[IKE] CHILD_SA l2tp-server{1} established with SPIs c64ed2fa_i 09cdb424_o and TS "serverip"/32[udp/l2f] === "clientip"/32[udp/54007]
Mon Jul  6 12:15:16 2020 daemon.info ipsec: 10[IKE] CHILD_SA l2tp-server{1} established with SPIs c64ed2fa_i 09cdb424_o and TS "serverip"/32[udp/l2f] === "clientip"/32[udp/54007]
Mon Jul  6 12:15:16 2020 local0.notice vpn: + 192.168.1.140 "clientip" -- "serverip"
Mon Jul  6 12:15:16 2020 daemon.notice xl2tpd[4935]: Connection established to "clientip", 54007.  Local: 40661, Remote: 13 (ref=0/0).  LNS session is 'default'
Mon Jul  6 12:15:16 2020 daemon.debug xl2tpd[4935]: start_pppd: I'm running:
Mon Jul  6 12:15:16 2020 daemon.debug xl2tpd[4935]: "/usr/sbin/pppd"
Mon Jul  6 12:15:16 2020 daemon.debug xl2tpd[4935]: "passive"
Mon Jul  6 12:15:16 2020 daemon.debug xl2tpd[4935]: "nodetach"
Mon Jul  6 12:15:16 2020 daemon.debug xl2tpd[4935]: "192.168.1.245:192.168.1.246"
Mon Jul  6 12:15:16 2020 daemon.debug xl2tpd[4935]: "refuse-pap"
Mon Jul  6 12:15:16 2020 daemon.debug xl2tpd[4935]: "refuse-chap"
Mon Jul  6 12:15:16 2020 daemon.debug xl2tpd[4935]: "name"
Mon Jul  6 12:15:16 2020 daemon.debug xl2tpd[4935]: "tchvpn"
Mon Jul  6 12:15:16 2020 daemon.debug xl2tpd[4935]: "file"
Mon Jul  6 12:15:16 2020 daemon.debug xl2tpd[4935]: "/etc/ppp/options.xl2tpd"
Mon Jul  6 12:15:16 2020 daemon.debug xl2tpd[4935]: "pppol2tp.so"
Mon Jul  6 12:15:16 2020 daemon.debug xl2tpd[4935]: "pppol2tp"
Mon Jul  6 12:15:16 2020 daemon.debug xl2tpd[4935]: "8"
Mon Jul  6 12:15:16 2020 daemon.debug xl2tpd[4935]: "pppol2tp_lns_mode"
Mon Jul  6 12:15:16 2020 daemon.debug xl2tpd[4935]: "pppol2tp_tunnel_id"
Mon Jul  6 12:15:16 2020 daemon.debug xl2tpd[4935]: "40661"
Mon Jul  6 12:15:16 2020 daemon.debug xl2tpd[4935]: "pppol2tp_session_id"
Mon Jul  6 12:15:16 2020 daemon.debug xl2tpd[4935]: "60829"
Mon Jul  6 12:15:16 2020 daemon.notice xl2tpd[4935]: Call established with "clientip", Local: 60829, Remote: 14049, Serial: 1
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: Plugin pppol2tp.so loaded.
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: pppd options in effect:
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: nodetach # (from command line)
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: logfile /var/log/xl2tpd.log # (from /etc/ppp/options.xl2tpd)
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: maxfail 0 # (from /etc/ppp/options)
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: dump # (from /etc/ppp/options.xl2tpd)
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: plugin pppol2tp.so # (from command line)
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: require-mschap-v2 # (from /etc/ppp/options.xl2tpd)
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: refuse-pap # (from command line)
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: refuse-chap # (from command line)
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: name tchvpn # (from command line)
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: pppol2tp 8 # (from command line)
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: pppol2tp_lns_mode # (from command line)
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: pppol2tp_tunnel_id 40661 # (from command line)
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: pppol2tp_session_id 60829 # (from command line)
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: pppol2tp 8 # (from command line)
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: pppol2tp_lns_mode # (from command line)
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: pppol2tp_tunnel_id 40661 # (from command line)
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: pppol2tp_session_id 60829 # (from command line)
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: noaccomp # (from /etc/ppp/options.xl2tpd)
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: nopcomp # (from /etc/ppp/options.xl2tpd)
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: passive # (from command line)
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: lcp-echo-failure 5 # (from /etc/ppp/options.xl2tpd)
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: lcp-echo-interval 30 # (from /etc/ppp/options.xl2tpd)
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: lcp-echo-adaptive # (from /etc/ppp/options.xl2tpd)
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: novj # (from /etc/ppp/options.xl2tpd)
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: novjccomp # (from /etc/ppp/options.xl2tpd)
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: noipdefault # (from /etc/ppp/options)
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: ms-dns xxx # [don't know how to print value] # (from /etc/ppp/options.xl2tpd)
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: 192.168.1.245:192.168.1.246 # (from command line)
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: noccp # (from /etc/ppp/options.xl2tpd)
Mon Jul  6 12:15:16 2020 daemon.notice pppd[29845]: pppd 2.4.7 started by root, uid 0
Mon Jul  6 12:15:16 2020 daemon.info pppd[29845]: Using interface ppp1
Mon Jul  6 12:15:16 2020 daemon.notice pppd[29845]: Connect: ppp1 <-->
Mon Jul  6 12:15:19 2020 daemon.warn pppd[29845]: Warning - secret file /etc/ppp/chap-secrets has world and/or group access
Mon Jul  6 12:15:20 2020 daemon.notice miniupnpd[6911]: ProcessInterfaceWatchNotify RTM_NEWADDR index=49 fam=2
Mon Jul  6 12:15:20 2020 user.err syslog: ILibGetLocalIPAddressList :292>No matching interface

Mon Jul  6 12:15:20 2020 user.err syslog: ILibGetLocalIPAddressList :292>No matching interface

Mon Jul  6 12:15:20 2020 user.err syslog: ILibGetLocalIPAddressList :292>No matching interface

Mon Jul  6 12:15:20 2020 user.err syslog: ILibGetLocalIPAddressList :292>No matching interface

Mon Jul  6 12:15:20 2020 daemon.notice miniupnpd[6911]: ProcessInterfaceWatchNotify RTM_DELADDR index=49 fam=2
Mon Jul  6 12:15:20 2020 daemon.notice miniupnpd[6911]: ProcessInterfaceWatchNotify RTM_NEWADDR index=49 fam=2
Mon Jul  6 12:15:20 2020 user.err syslog: ILibGetLocalIPAddressList :292>No matching interface

Mon Jul  6 12:15:20 2020 user.err syslog: ILibGetLocalIPAddressList :292>No matching interface

Mon Jul  6 12:15:20 2020 user.err syslog: ILibGetLocalIPAddressList :292>No matching interface

Mon Jul  6 12:15:20 2020 user.err syslog: ILibGetLocalIPAddressList :292>No matching interface

Mon Jul  6 12:15:20 2020 daemon.notice pppd[29845]: local  IP address 192.168.1.245
Mon Jul  6 12:15:20 2020 daemon.notice pppd[29845]: remote IP address 192.168.1.246
Mon Jul  6 12:15:46 2020 daemon.notice [4596]: [mobiled] (WaitingForDevice) runs WaitingForDevice-Main.check(timeout, 1)
Mon Jul  6 12:16:17 2020 daemon.err odhcp6c[825]: Failed to send DHCPV6 message to ff02::1:2 (Operation not permitted)
Mon Jul  6 12:16:35 2020 daemon.info transformer[3877]: async run: /usr/share/transformer/scripts/user_reload.sh
Mon Jul  6 12:16:35 2020 daemon.info transformer[3877]: async run: /etc/init.d/network reload ;
Mon Jul  6 12:16:37 2020 daemon.info dnsmasq[1345]: reading /tmp/resolv.conf.auto
Mon Jul  6 12:16:37 2020 daemon.info dnsmasq[1345]: using local addresses only for domain test
Mon Jul  6 12:16:37 2020 daemon.info dnsmasq[1345]: using local addresses only for domain onion
Mon Jul  6 12:16:37 2020 daemon.info dnsmasq[1345]: using local addresses only for domain localhost
Mon Jul  6 12:16:37 2020 daemon.info dnsmasq[1345]: using local addresses only for domain local
Mon Jul  6 12:16:37 2020 daemon.info dnsmasq[1345]: using local addresses only for domain invalid
Mon Jul  6 12:16:37 2020 daemon.info dnsmasq[1345]: using local addresses only for domain example.net
Mon Jul  6 12:16:37 2020 daemon.info dnsmasq[1345]: using local addresses only for domain example.org
Mon Jul  6 12:16:37 2020 daemon.info dnsmasq[1345]: using local addresses only for domain example.com
Mon Jul  6 12:16:37 2020 daemon.info dnsmasq[1345]: using nameserver "dnsnextdns"#53 [0]
Mon Jul  6 12:16:37 2020 daemon.info dnsmasq[1345]: using nameserver 85.38.28.7#53 [0]
Mon Jul  6 12:16:37 2020 daemon.info dnsmasq[1345]: using nameserver 85.38.28.6#53 [0]
Mon Jul  6 12:16:37 2020 daemon.info dnsmasq[1345]: using 3 more local addresses
Mon Jul  6 12:16:47 2020 daemon.notice [4596]: [mobiled] (WaitingForDevice) runs WaitingForDevice-Main.check(timeout, 1)
Mon Jul  6 12:16:55 2020 daemon.info transformer[3877]: async run: /etc/init.d/network reload ;
Mon Jul  6 12:16:57 2020 daemon.info dnsmasq[1345]: reading /tmp/resolv.conf.auto
Mon Jul  6 12:16:57 2020 daemon.info dnsmasq[1345]: using local addresses only for domain test
Mon Jul  6 12:16:57 2020 daemon.info dnsmasq[1345]: using local addresses only for domain onion
Mon Jul  6 12:16:57 2020 daemon.info dnsmasq[1345]: using local addresses only for domain localhost
Mon Jul  6 12:16:57 2020 daemon.info dnsmasq[1345]: using local addresses only for domain local
Mon Jul  6 12:16:57 2020 daemon.info dnsmasq[1345]: using local addresses only for domain invalid
Mon Jul  6 12:16:57 2020 daemon.info dnsmasq[1345]: using local addresses only for domain example.net
Mon Jul  6 12:16:57 2020 daemon.info dnsmasq[1345]: using local addresses only for domain example.org
Mon Jul  6 12:16:57 2020 daemon.info dnsmasq[1345]: using local addresses only for domain example.com
Mon Jul  6 12:16:57 2020 daemon.info dnsmasq[1345]: using nameserver "dnsnextdns"#53 [0]
Mon Jul  6 12:16:57 2020 daemon.info dnsmasq[1345]: using nameserver 85.38.28.7#53 [0]
Mon Jul  6 12:16:57 2020 daemon.info dnsmasq[1345]: using nameserver 85.38.28.6#53 [0]
Mon Jul  6 12:16:57 2020 daemon.info dnsmasq[1345]: using 3 more local addresses
Mon Jul  6 12:17:04 2020 daemon.info transformer[3877]: async run: /etc/init.d/network reload ;
Mon Jul  6 12:17:06 2020 daemon.info dnsmasq[1345]: reading /tmp/resolv.conf.auto
Mon Jul  6 12:17:06 2020 daemon.info dnsmasq[1345]: using local addresses only for domain test
Mon Jul  6 12:17:06 2020 daemon.info dnsmasq[1345]: using local addresses only for domain onion
Mon Jul  6 12:17:06 2020 daemon.info dnsmasq[1345]: using local addresses only for domain localhost
Mon Jul  6 12:17:06 2020 daemon.info dnsmasq[1345]: using local addresses only for domain local
Mon Jul  6 12:17:06 2020 daemon.info dnsmasq[1345]: using local addresses only for domain invalid
Mon Jul  6 12:17:06 2020 daemon.info dnsmasq[1345]: using local addresses only for domain example.net
Mon Jul  6 12:17:06 2020 daemon.info dnsmasq[1345]: using local addresses only for domain example.org
Mon Jul  6 12:17:06 2020 daemon.info dnsmasq[1345]: using local addresses only for domain example.com
Mon Jul  6 12:17:06 2020 daemon.info dnsmasq[1345]: using nameserver "dnsnextdns"#53 [0]
Mon Jul  6 12:17:06 2020 daemon.info dnsmasq[1345]: using nameserver "dnsnextdns"#53 [0]
Mon Jul  6 12:17:06 2020 daemon.info dnsmasq[1345]: using nameserver 85.38.28.7#53 [0]
Mon Jul  6 12:17:06 2020 daemon.info dnsmasq[1345]: using nameserver 85.38.28.6#53 [0]
Mon Jul  6 12:17:06 2020 daemon.info dnsmasq[1345]: using 3 more local addresses
Mon Jul  6 12:17:08 2020 daemon.info transformer[3877]: async run: /etc/init.d/network reload ;
Mon Jul  6 12:17:10 2020 daemon.info dnsmasq[1345]: reading /tmp/resolv.conf.auto
Mon Jul  6 12:17:10 2020 daemon.info dnsmasq[1345]: using local addresses only for domain test
Mon Jul  6 12:17:10 2020 daemon.info dnsmasq[1345]: using local addresses only for domain onion
Mon Jul  6 12:17:10 2020 daemon.info dnsmasq[1345]: using local addresses only for domain localhost
Mon Jul  6 12:17:10 2020 daemon.info dnsmasq[1345]: using local addresses only for domain local
Mon Jul  6 12:17:10 2020 daemon.info dnsmasq[1345]: using local addresses only for domain invalid
Mon Jul  6 12:17:10 2020 daemon.info dnsmasq[1345]: using local addresses only for domain example.net
Mon Jul  6 12:17:10 2020 daemon.info dnsmasq[1345]: using local addresses only for domain example.org
Mon Jul  6 12:17:10 2020 daemon.info dnsmasq[1345]: using local addresses only for domain example.com
Mon Jul  6 12:17:10 2020 daemon.info dnsmasq[1345]: using nameserver "dnsnextdns"#53 [0]
Mon Jul  6 12:17:10 2020 daemon.info dnsmasq[1345]: using nameserver "dnsnextdns"#53 [0]
Mon Jul  6 12:17:10 2020 daemon.info dnsmasq[1345]: using 3 more local addresses
Mon Jul  6 12:17:41 2020 daemon.info pppd[29845]: LCP terminated by peer (User request)
Mon Jul  6 12:17:41 2020 daemon.debug xl2tpd[4935]: result_code_avp: result code endianness fix for buggy Apple client. network=768, le=3
Mon Jul  6 12:17:41 2020 daemon.info xl2tpd[4935]: control_finish: Connection closed to "clientip", serial 1 ()
Mon Jul  6 12:17:41 2020 daemon.debug xl2tpd[4935]: Terminating pppd: sending TERM signal to pid 29845
Mon Jul  6 12:17:41 2020 daemon.debug xl2tpd[4935]: result_code_avp: result code endianness fix for buggy Apple client. network=256, le=1
Mon Jul  6 12:17:41 2020 daemon.info pppd[29845]: Connect time 2.4 minutes.
Mon Jul  6 12:17:41 2020 authpriv.info ipsec: 15[NET] received packet: from "clientip"[4500] to "serverip"[4500] (92 bytes)
Mon Jul  6 12:17:41 2020 daemon.info ipsec: 15[NET] received packet: from "clientip"[4500] to "serverip"[4500] (92 bytes)
Mon Jul  6 12:17:41 2020 authpriv.info ipsec: 15[ENC] parsed INFORMATIONAL_V1 request 395145047 [ HASH D ]
Mon Jul  6 12:17:41 2020 daemon.info pppd[29845]: Sent 377839 bytes, received 149946 bytes.
Mon Jul  6 12:17:41 2020 daemon.info ipsec: 15[ENC] parsed INFORMATIONAL_V1 request 395145047 [ HASH D ]
Mon Jul  6 12:17:41 2020 authpriv.info ipsec: 15[IKE] received DELETE for ESP CHILD_SA with SPI 09cdb424
Mon Jul  6 12:17:41 2020 daemon.info ipsec: 15[IKE] received DELETE for ESP CHILD_SA with SPI 09cdb424
Mon Jul  6 12:17:41 2020 daemon.info xl2tpd[4935]: control_finish: Connection closed to "clientip", port 54007 (), Local: 40661, Remote: 13
Mon Jul  6 12:17:41 2020 authpriv.info ipsec: 15[IKE] closing CHILD_SA l2tp-server{1} with SPIs c64ed2fa_i (173670 bytes) 09cdb424_o (396778 bytes) and TS "serverip"/32[udp/l2f] === "clientip"/32[udp/54007]
Mon Jul  6 12:17:41 2020 daemon.info ipsec: 15[IKE] closing CHILD_SA l2tp-server{1} with SPIs c64ed2fa_i (173670 bytes) 09cdb424_o (396778 bytes) and TS "serverip"/32[udp/l2f] === "clientip"/32[udp/54007]
Mon Jul  6 12:17:41 2020 daemon.notice miniupnpd[6911]: ProcessInterfaceWatchNotify RTM_DELADDR index=49 fam=2
Mon Jul  6 12:17:41 2020 daemon.info pppd[29845]: Terminating on signal 15
Mon Jul  6 12:17:44 2020 daemon.notice pppd[29845]: Connection terminated.
Mon Jul  6 12:17:44 2020 kern.warn kernel: [101458.583000] ABORT UNKNOWN Tx L2TP h_proto 0x0000ABORT UNKNOWN Tx L2TP h_proto 0x0000
Mon Jul  6 12:17:44 2020 kern.err kernel: [101460.635000] ppp->dev or netdev_path_next_dev(ppp->dev) is NULL!!!!!!
Mon Jul  6 12:17:44 2020 daemon.notice pppd[29845]: Modem hangup
Mon Jul  6 12:17:44 2020 daemon.info pppd[29845]: Exit.
Mon Jul  6 12:17:47 2020 daemon.notice [4596]: [mobiled] (WaitingForDevice) runs WaitingForDevice-Main.check(timeout, 1)
Mon Jul  6 12:17:49 2020 authpriv.info ipsec: 09[NET] received packet: from "clientip"[500] to "serverip"[500] (788 bytes)
Mon Jul  6 12:17:49 2020 daemon.info ipsec: 09[NET] received packet: from "clientip"[500] to "serverip"[500] (788 bytes)
Mon Jul  6 12:17:53 2020 authpriv.info ipsec: 04[MGR] ignoring request with ID 1196313593, already processing
Mon Jul  6 12:17:53 2020 daemon.info ipsec: 04[MGR] ignoring request with ID 1196313593, already processing
Mon Jul  6 12:17:56 2020 authpriv.info ipsec: 11[MGR] ignoring request with ID 1196313593, already processing
Mon Jul  6 12:17:56 2020 daemon.info ipsec: 11[MGR] ignoring request with ID 1196313593, already processing
Mon Jul  6 12:17:59 2020 authpriv.info ipsec: 08[MGR] ignoring request with ID 1196313593, already processing
Mon Jul  6 12:17:59 2020 daemon.info ipsec: 08[MGR] ignoring request with ID 1196313593, already processing