/l3/users/clint/uatoken/debian3.unix.nt/root :1 :2 |
|
#l3
l3 l3cd l3-config l3pwd l3shot l3-agent l3_close_session l3_fix_prompt l3_save_last_line l3upload |
#l3cd
|
#l3pwd
|
#cat .l3rc
l3cd= |
#ping 10.0.17.111
PING 10.0.17.111 (10.0.17.111) 56(84) bytes of data. 64 bytes from 10.0.17.111: icmp_seq=1 ttl=127 time=0.169 ms --- 10.0.17.111 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.169/0.169/0.169/0.000 ms |
#vim /etc/apt/sources.list
--- /tmp/l3-saved-1291.6033.20149 2009-04-06 06:41:53.000000000 +0300 +++ /etc/apt/sources.list 2009-04-06 06:42:06.000000000 +0300 @@ -1 +1 @@ -deb http://debian.org.ua/debian etch main +deb http://10.0.35.1:9999/debian etch main |
#apt-cache search openswan
[root@debian3:~]# apt-get update Получено:1 http://10.0.35.1 etch Release.gpg [386B] Получено:2 http://10.0.35.1 etch Release [58,2kB] Ign http://10.0.35.1 etch/main Packages Получено:3 http://10.0.35.1 etch/main Packages [5620kB] Получено 5678kB за 3s (1881kB/c) Чтение списков пакетов... Готово freeswan - IPSEC utilities transition package to Openswan freeswan-modules-source - IPSEC kernel modules transition package to Openswan kernel-patch-freeswan - IPSEC kernel support transition package to Openswan kvpnc - vpn clients frontend for KDE linux-patch-openswan - IPSEC Linux kernel support for Openswan openswan - IPSEC utilities for Openswan openswan-modules-source - IPSEC kernel modules source for Openswan strongswan - IPSec utilities for strongSwan |
#apt-get install openswan
Настраивается пакет libgmp3c2 (4.2.1+dfsg-4) ... Настраивается пакет ipsec-tools (0.6.6-3.1etch1) ... Настраивается пакет host (20000331-9) ... Настраивается пакет libatm1 (2.4.1-17) ... Настраивается пакет iproute (20061002-3) ... Настраивается пакет openswan (2.4.6+dfsg.2-1.1) ... Disabling opportunistic encryption (OE) in config file ... already disabled ipsec_setup: Starting Openswan IPsec 2.4.6... ipsec_setup: insmod /lib/modules/2.6.18-5-xen-686/kernel/net/key/af_key.ko ipsec_setup: insmod /lib/modules/2.6.18-5-xen-686/kernel/net/ipv4/ah4.ko ipsec_setup: insmod /lib/modules/2.6.18-5-xen-686/kernel/net/ipv4/esp4.ko ipsec_setup: insmod /lib/modules/2.6.18-5-xen-686/kernel/net/ipv4/ipcomp.ko ipsec_setup: insmod /lib/modules/2.6.18-5-xen-686/kernel/net/ipv4/tunnel4.ko ipsec_setup: insmod /lib/modules/2.6.18-5-xen-686/kernel/net/ipv4/xfrm4_tunnel.ko ipsec_setup: insmod /lib/modules/2.6.18-5-xen-686/kernel/net/xfrm/xfrm_user.ko ipsec_setup: insmod /lib/modules/2.6.18-5-xen-686/kernel/crypto/sha1.ko ipsec_setup: insmod /lib/modules/2.6.18-5-xen-686/kernel/crypto/des.ko ipsec_setup: insmod /lib/modules/2.6.18-5-xen-686/kernel/crypto/aes.ko |
#vim /etc/ip
|
#cp /etc/ipsec.conf /etc/ipsec.conf_
[root@debian3:~]# vim /etc/ipsec.conf |
#vim include /etc/ipsec.d/examples/l2tp-cert.conf
|
#apt-get install smbfs
┌─────────────────────────────────────────────────┤ Samba Server ├─────────────────────────────────────────────────┐ │ │ │ Если компьютер получает информацию о своём IP-адресе от службы DHCP по сети, тогда DHCP-сервер также может │ │ предоставлять информацию о серверах WINS ("серверы имён NetBIOS"), доступных в сети. Чтобы настройки WINS, │ │ предоставленные сервером DHCP, автоматически считывались из /etc/samba/dhcp.conf, нужно изменить файл smb.conf. │ │ │ │ Чтобы использовать эту возможность, нужно установить пакет dhcp3-client. │ │ │ │ Изменить smb.conf для использования настроек WINS из DHCP? │ │ │ │ <Да> <Нет> │ │ │ └──────────────────────────────────────────────────────────────────────────────────────────────────────────────────┘ Выбор ранее не выбранного пакета samba-common. (Чтение базы данных... на данный момент установлено 23800 файлов и каталогов.) Распаковывается пакет samba-common (из файла .../samba-common_3.0.24-6etch10_i386.deb)... Выбор ранее не выбранного пакета smbfs. Распаковывается пакет smbfs (из файла .../smbfs_3.0.24-6etch10_i386.deb)... Настраивается пакет samba-common (3.0.24-6etch10) ... Настраивается пакет smbfs (3.0.24-6etch10) ... |
#smbm
smbmnt smbmount |
#smbmount //192.168.16.1/backup_CA /mnt -o username=administrator
cli_negprot: SMB signing is mandatory and we have disabled it. 2752: protocol negotiation failed SMB connection failed |
#mount //192.168.16.1/backup_CA /mnt
cli_negprot: SMB signing is mandatory and we have disabled it. 2770: protocol negotiation failed SMB connection failed |
#mount \\
mount: you must specify the filesystem type |
#mount -t smbfs
Usage: mount.smbfs service mountpoint [-n] [-o options,...] Version 3.0.24 Options: username=<arg> SMB username password=<arg> SMB password credentials=<filename> file with username/password krb use kerberos (active directory) netbiosname=<arg> source NetBIOS name uid=<arg> mount uid or username gid=<arg> mount gid or groupname ... codepage=<arg> server codepage (cp850) unicode use unicode when communicating with server lfs large file system support ttl=<arg> dircache time to live guest don't prompt for a password ro mount read-only rw mount read-write This command is designed to be run from within /bin/mount by giving the option '-t smbfs'. For example: mount -t smbfs -o username=tridge,password=foobar //fjall/test /data/test |
#mount -t smbfs \\192.
|
#mount //192.168.16.1/backup_CA /mnt -o username=administrator
[root@debian3:~]# apt-get install smbclient Чтение списков пакетов... Готово Построение дерева зависимостей... Готово НОВЫЕ пакеты, которые будут установлены: smbclient обновлено 0, установлено 1 новых пакетов, для удаления отмечено 0 пакетов, и 59 пакетов не обновлено. Необходимо скачать 3882kБ архивов. После распаковки объем занятого дискового пространства возрастёт на 9789kB. Получено:1 http://10.0.35.1 etch/main smbclient 3.0.24-6etch10 [3882kB] Получено 3882kB за 0s (10,9MB/c) Выбор ранее не выбранного пакета smbclient. (Чтение базы данных... на данный момент установлено 23849 файлов и каталогов.) Распаковывается пакет smbclient (из файла .../smbclient_3.0.24-6etch10_i386.deb)... Настраивается пакет smbclient (3.0.24-6etch10) ... cli_negprot: SMB signing is mandatory and we have disabled it. 2837: protocol negotiation failed SMB connection failed |
#/etc/init.d/sa
|
#apt-get install samba
Importing accout for user55...ok Importing accout for user56...ok Importing accout for user57...ok Importing accout for user58...ok Importing accout for user59...ok Importing accout for user60...ok Importing accout for user61...ok Importing accout for user62...ok Importing accout for user63...ok Importing accout for user64...ok ... Importing accout for user193...ok Importing accout for user194...ok Importing accout for user195...ok Importing accout for user196...ok Importing accout for user197...ok Importing accout for user198...ok Importing accout for user199...ok Importing accout for user200...ok Importing accout for mega...ok Starting Samba daemons: nmbd smbd. |
#/etc/init.d/samba restart
[root@debian3:~]# mount //192.168.16.1/backup_CA /mnt -o username=administrator cli_negprot: SMB signing is mandatory and we have disabled it. 2999: protocol negotiation failed SMB connection failed Stopping Samba daemons: nmbd smbd. Starting Samba daemons: nmbd smbd. |
#mount //192.168.16.1/backup_CA /mnt -o username=administrator
cli_negprot: SMB signing is mandatory and we have disabled it. 3036: protocol negotiation failed SMB connection failed |
#dmesg | tail
ReiserFS: hda1: journal params: device hda1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 ReiserFS: hda1: checking transaction log (hda1) ReiserFS: hda1: Using r5 hash to sort names Serial: 8250/16550 driver $Revision: 1.90 $ 4 ports, IRQ sharing enabled NET: Registered protocol family 10 lo: Disabled Privacy Extensions IPv6 over IPv4 tunneling driver eth0: no IPv6 routers present NET: Registered protocol family 15 Initializing IPsec netlink socket |
#less /var/log/daemon.log
|
#less /var/log/samba/
|
#less /var/log/samba/log.smbd
|
#less /var/log/samba/log.nmbd
|
#less /var/log/syslog
|
#less /var/log/messages
|
#smbc
[root@debian3:~]# mount //192.168.16.1/backup_CA /mnt -o username=administrator cli_negprot: SMB signing is mandatory and we have disabled it. 3102: protocol negotiation failed SMB connection failed smbcacls smbclient smbcontrol smbcquotas |
#smbclient //192.168.16.1
\\192.168.16.1: Not enough '\' characters in service Использование: [-?] [-?EgV] [-?EgV] [-?EgVNkP] [-?|--help] [--usage] [-R|--name-resolve NAME-RESOLVE-ORDER] [-M|--message HOST] [-I|--ip-address IP] [-E|--stderr] [-L|--list HOST] [-t|--terminal CODE] [-m|--max-protocol LEVEL] [-T|--tar <c|x>IXFqgbNan] [-D|--directory DIR] [-c|--command STRING] [-b|--send-buffer BYTES] [-p|--port PORT] [-g|--grepable] [-d|--debuglevel DEBUGLEVEL] [-s|--configfile CONFIGFILE] [-l|--log-basename LOGFILEBASE] [-V|--version] [-O|--socket-options SOCKETOPTIONS] [-n|--netbiosname NETBIOSNAME] [-W|--workgroup WORKGROUP] [-i|--scope SCOPE] [-U|--user USERNAME] [-N|--no-pass] [-k|--kerberos] [-A|--authentication-file FILE] [-S|--signing on|off|required] [-P|--machine-pass] service <password> |
#smbclient \\
\192.168.16.1: Not enough '\' characters in service Использование: [-?] [-?EgV] [-?EgV] [-?EgVNkP] [-?|--help] [--usage] [-R|--name-resolve NAME-RESOLVE-ORDER] [-M|--message HOST] [-I|--ip-address IP] [-E|--stderr] [-L|--list HOST] [-t|--terminal CODE] [-m|--max-protocol LEVEL] [-T|--tar <c|x>IXFqgbNan] [-D|--directory DIR] [-c|--command STRING] [-b|--send-buffer BYTES] [-p|--port PORT] [-g|--grepable] [-d|--debuglevel DEBUGLEVEL] [-s|--configfile CONFIGFILE] [-l|--log-basename LOGFILEBASE] [-V|--version] [-O|--socket-options SOCKETOPTIONS] [-n|--netbiosname NETBIOSNAME] [-W|--workgroup WORKGROUP] [-i|--scope SCOPE] [-U|--user USERNAME] [-N|--no-pass] [-k|--kerberos] [-A|--authentication-file FILE] [-S|--signing on|off|required] [-P|--machine-pass] service <password> |
#smbclient -L
Password: Anonymous login successful Domain=[UATOKEN] OS=[Windows Server 2003 3790] Server=[Windows Server 2003 5.2] Sharename Type Comment --------- ---- ------- backup_CA Disk IPC$ IPC Remote IPC NETLOGON Disk Logon server share CertEnroll Disk Certificate Services share ADMIN$ Disk Remote Admin ... Domain=[UATOKEN] OS=[Windows Server 2003 3790] Server=[Windows Server 2003 5.2] Server Comment --------- ------- DEBIAN3 debian3 server SERVER0 SERVER01 Workgroup Master --------- ------- TECH DEBIAN UATOKEN SERVER0 |
#mount \\192.168.16.1\
mount: you must specify the filesystem type |
#mount \\192.168.16.1\backup_CA /mnt -o username=administrator -t smbfs
Usage: mount.smbfs service mountpoint [-n] [-o options,...] Version 3.0.24 Options: username=<arg> SMB username password=<arg> SMB password credentials=<filename> file with username/password krb use kerberos (active directory) netbiosname=<arg> source NetBIOS name uid=<arg> mount uid or username gid=<arg> mount gid or groupname ... codepage=<arg> server codepage (cp850) unicode use unicode when communicating with server lfs large file system support ttl=<arg> dircache time to live guest don't prompt for a password ro mount read-only rw mount read-write This command is designed to be run from within /bin/mount by giving the option '-t smbfs'. For example: mount -t smbfs -o username=tridge,password=foobar //fjall/test /data/test |
#mount //
cli_negprot: SMB signing is mandatory and we have disabled it. 3152: protocol negotiation failed SMB connection failed |
#smbclient -L \\192.168.16.1
Password: Anonymous login successful Domain=[UATOKEN] OS=[Windows Server 2003 3790] Server=[Windows Server 2003 5.2] Sharename Type Comment --------- ---- ------- backup_CA Disk IPC$ IPC Remote IPC NETLOGON Disk Logon server share CertEnroll Disk Certificate Services share ADMIN$ Disk Remote Admin ... Domain=[UATOKEN] OS=[Windows Server 2003 3790] Server=[Windows Server 2003 5.2] Server Comment --------- ------- DEBIAN3 debian3 server SERVER0 SERVER01 Workgroup Master --------- ------- TECH DEBIAN UATOKEN SERVER0 |
#smbclient
\192.168.16.1: Not enough '\' characters in service Использование: [-?] [-?EgV] [-?EgV] [-?EgVNkP] [-?|--help] [--usage] [-R|--name-resolve NAME-RESOLVE-ORDER] [-M|--message HOST] [-I|--ip-address IP] [-E|--stderr] [-L|--list HOST] [-t|--terminal CODE] [-m|--max-protocol LEVEL] [-T|--tar <c|x>IXFqgbNan] [-D|--directory DIR] [-c|--command STRING] [-b|--send-buffer BYTES] [-p|--port PORT] [-g|--grepable] [-d|--debuglevel DEBUGLEVEL] [-s|--configfile CONFIGFILE] [-l|--log-basename LOGFILEBASE] [-V|--version] [-O|--socket-options SOCKETOPTIONS] [-n|--netbiosname NETBIOSNAME] [-W|--workgroup WORKGROUP] [-i|--scope SCOPE] [-U|--user USERNAME] [-N|--no-pass] [-k|--kerberos] [-A|--authentication-file FILE] [-S|--signing on|off|required] [-P|--machine-pass] service <password> |
#smbclient \\192.168.16.1\backup_CA
\192.168.16.1backup_CA: Not enough '\' characters in service Использование: [-?] [-?EgV] [-?EgV] [-?EgVNkP] [-?|--help] [--usage] [-R|--name-resolve NAME-RESOLVE-ORDER] [-M|--message HOST] [-I|--ip-address IP] [-E|--stderr] [-L|--list HOST] [-t|--terminal CODE] [-m|--max-protocol LEVEL] [-T|--tar <c|x>IXFqgbNan] [-D|--directory DIR] [-c|--command STRING] [-b|--send-buffer BYTES] [-p|--port PORT] [-g|--grepable] [-d|--debuglevel DEBUGLEVEL] [-s|--configfile CONFIGFILE] [-l|--log-basename LOGFILEBASE] [-V|--version] [-O|--socket-options SOCKETOPTIONS] [-n|--netbiosname NETBIOSNAME] [-W|--workgroup WORKGROUP] [-i|--scope SCOPE] [-U|--user USERNAME] [-N|--no-pass] [-k|--kerberos] [-A|--authentication-file FILE] [-S|--signing on|off|required] [-P|--machine-pass] service <password> |
#smbclient \\192.168.16.1\backup_CA\
> \192.168.16.1backup_CA: Not enough '\' characters in service Использование: [-?] [-?EgV] [-?EgV] [-?EgVNkP] [-?|--help] [--usage] [-R|--name-resolve NAME-RESOLVE-ORDER] [-M|--message HOST] [-I|--ip-address IP] [-E|--stderr] [-L|--list HOST] [-t|--terminal CODE] [-m|--max-protocol LEVEL] [-T|--tar <c|x>IXFqgbNan] [-D|--directory DIR] [-c|--command STRING] [-b|--send-buffer BYTES] [-p|--port PORT] [-g|--grepable] [-d|--debuglevel DEBUGLEVEL] [-s|--configfile CONFIGFILE] [-l|--log-basename LOGFILEBASE] [-V|--version] [-O|--socket-options SOCKETOPTIONS] [-n|--netbiosname NETBIOSNAME] [-W|--workgroup WORKGROUP] [-i|--scope SCOPE] [-U|--user USERNAME] [-N|--no-pass] [-k|--kerberos] [-A|--authentication-file FILE] [-S|--signing on|off|required] [-P|--machine-pass] service <password> |
#smbclient //192.168.16.1/backup_CA
Password: Anonymous login successful Domain=[UATOKEN] OS=[Windows Server 2003 3790] Server=[Windows Server 2003 5.2] tree connect failed: NT_STATUS_ACCESS_DENIED |
#smbclient //192.168.16.1/backup_CA -U administrator
Password: Domain=[UATOKEN] OS=[Windows Server 2003 3790] Server=[Windows Server 2003 5.2] smb: \> ls . D 0 Mon Apr 6 04:32:11 2009 .. D 0 Mon Apr 6 04:32:11 2009 certnew.cer A 2058 Mon Apr 6 04:30:08 2009 priv_key_vpn_server.pvk A 636 Mon Apr 6 04:29:04 2009 server0.p12 A 2853 Mon Apr 6 04:04:17 2009 65393 blocks of size 32768. 18624 blocks available smb: \> prompt ... Error opening local file .mozilla getting file \.profile of size 110 as .profile (107,4 kb/s) (average 421,1 kb/s) Error opening local file .ssh getting file \.viminfo of size 5687 as .viminfo (2776,7 kb/s) (average 757,7 kb/s) getting file \.vimrc of size 51 as .vimrc (16,6 kb/s) (average 626,9 kb/s) getting file \1234 of size 0 as 1234 (0,0 kb/s) (average 560,9 kb/s) getting file \certnew.cer of size 2058 as certnew.cer (669,9 kb/s) (average 575,8 kb/s) getting file \priv_key_vpn_server.pvk of size 636 as priv_key_vpn_server.pvk (310,5 kb/s) (average 553,7 kb/s) getting file \server0.p12 of size 2853 as server0.p12 (1393,0 kb/s) (average 618,2 kb/s) smb: \> exit |
#ls
1234 certnew.cer priv_key_vpn_server.pvk server0.p12 |
#file priv_key_vpn_server.pvk
priv_key_vpn_server.pvk: data |
#file certnew.cer
certnew.cer: ASCII text, with CRLF line terminators |
#vim certnew.cer
|
#vim server0.p12
|
#file server0.p12
server0.p12: data |
#. /etc/bash_completion
|
#openssl p
passwd pkcs12 pkcs7 pkcs8 |
#openssl pkcs12 -export -in server0.p12 -outkey vpn-server-private-key.pem -out vpn-server.pem
Usage: pkcs12 [options] where options are -export output PKCS12 file -chain add certificate chain -inkey file private key if not infile -certfile f add all certs in f -CApath arg - PEM format directory of CA's -CAfile arg - PEM format file of CA's -name "name" use name as friendly name -caname "nm" use nm as CA friendly name (can be used more than once). ... -keypbe alg specify private key PBE algorithm (default 3DES) -keyex set MS key exchange type -keysig set MS key signature type -password p set import/export password source -passin p input file pass phrase source -passout p output file pass phrase source -engine e use engine e, possibly a hardware device. -rand file:file:... load the file (or the files in the directory) into the random number generator |
#openssl pkcs12 -export -in server0.p12 -outkey
Usage: pkcs12 [options] where options are -export output PKCS12 file -chain add certificate chain -inkey file private key if not infile -certfile f add all certs in f -CApath arg - PEM format directory of CA's -CAfile arg - PEM format file of CA's -name "name" use name as friendly name -caname "nm" use nm as CA friendly name (can be used more than once). ... -keypbe alg specify private key PBE algorithm (default 3DES) -keyex set MS key exchange type -keysig set MS key signature type -password p set import/export password source -passin p input file pass phrase source -passout p output file pass phrase source -engine e use engine e, possibly a hardware device. -rand file:file:... load the file (or the files in the directory) into the random number generator |
#openssl pkcs12 -export -in server0.p12
unable to load private key |
#ls
1234 certnew.cer priv_key_vpn_server.pvk server0.p12 vpn-server.pem |
#openssl pkcs12 -export -in -inkey priv_key_vpn_server.pvk
|
#file vpn-server.pem
vpn-server.pem: empty |
#rm vpn-server.pem
|
#vim /etc/ipsec.d/
|
#vim /etc/ipsec.d/examples/l2tp-cert
|
#vim /etc/ipsec.d/examples/l2tp-cert.conf
--- /tmp/l3-saved-1291.20297.5057 2009-04-06 07:52:25.000000000 +0300 +++ /etc/ipsec.d/examples/l2tp-cert.conf 2009-04-06 07:53:49.000000000 +0300 @@ -19,8 +19,8 @@ left=10.0.17.1 #left=%defaultroute # or you can use: left=YourIPAddress -# leftrsasigkey=%cert - leftcert=server_cert.pem + leftrsasigkey=/root/priv_key_vpn_server.pvk + leftcert=/root/certnew.cer # For updated Windows 2000/XP clients, # to support old clients as well, use leftprotoport=17/%any leftprotoport=17/1701 |
#/etc/init.d/ipsec restart
ipsec_setup: (/etc/ipsec.d/examples/l2tp-cert.conf, line 33) parameter is not within a section -- `restart' aborted |
#vim /etc/ipsec.d/examples/l2tp-cert.conf
|
#vim /etc/ipsec.d/examples/l2tp-cert.conf
|
#vim /etc/ipsec.d/
|
#vim /etc/ipsec.d/policies/
|
#/etc/init.d/ipsec restart
5 #$ 6 # Manual: ipsec.conf.5$ 7 $ 8 $ 9 version^I2.0^I# conforms to second version of ipsec.conf specification$ 10 $ 11 # basic configuration$ 12 config setup$ 13 ^I# plutodebug / klipsdebug = "all", "none" or a combation from below:$ 14 ^I# "raw crypt parsing emitting control klips pfkey natt x509 private"$ ... ~ ~ ~ ~ ~ ~ ~ ~ "/etc/ipsec.conf" 36L, 1019C записано сь ipsec_setup: (/etc/ipsec.conf, line 33) (/etc/ipsec.conf, line 33) include syntax error in "include " -- `restart' aborted |
#/etc/init.d/ipsec restart
5 #$ 6 # Manual: ipsec.conf.5$ 7 $ 8 $ 9 version^I2.0^I# conforms to second version of ipsec.conf specification$ 10 $ 11 # basic configuration$ 12 config setup$ 13 ^I# plutodebug / klipsdebug = "all", "none" or a combation from below:$ 14 ^I# "raw crypt parsing emitting control klips pfkey natt x509 private"$ ... ~ ~ ~ ~ ~ ~ ~ ~ "/etc/ipsec.conf" 35L, 1018C записано сь ipsec_setup: (/etc/ipsec.d/examples/l2tp-psk.conf, line 16) parameter is not within a section -- `restart' aborted |
#vim /etc/ipsec.d/examples/l2tp-psk.conf
|
#vim /etc/ipsec
|
#/etc/init.d/ipsec restart
5 # RSA private key for this host, authenticating it to any other host$ 6 # which knows the public part. Suitable public keys, for ipsec.conf, DNS,$ 7 # or configuration of other implementations, can be extracted conveniently$ 8 # with "ipsec showhostkey".$ 9 #$ ~ $ 10 10.0.17.1 10.0.17.111: PSK "12345678"$ 11 $ ~ ~ ... ~ ~ ~ ~ ~ ~ ~ ~ "/etc/ipsec.secrets" 11L, 503C записано сь ipsec_setup: (/etc/ipsec.d/examples/l2tp-psk.conf, line 16) parameter is not within a section -- `restart' aborted |
#vim /etc/ipsec.d/examples/l2tp-psk.conf
--- /tmp/l3-saved-1291.6259.1996 2009-04-06 07:59:13.000000000 +0300 +++ /etc/ipsec.d/examples/l2tp-psk.conf 2009-04-06 08:00:48.000000000 +0300 @@ -25,7 +25,7 @@ # l2tp-over-ipsec is transport mode type=transport # - left=10.0.17.1 + left=192.168.20.1 # # For updated Windows 2000/XP clients, # to support old clients as well, use leftprotoport=17/%any @@ -33,7 +33,7 @@ # # The remote user. # - right=10.0.17.111 + right=192.168.20.2 # Using the magic port of "0" means "any one single port". This is # a work around required for Apple OSX clients that use a randomly # high port, but propose "0" instead of their port. |
#vim /etc/ipsec.secrets
--- /tmp/l3-saved-1291.12520.8383 2009-04-06 08:01:04.000000000 +0300 +++ /etc/ipsec.secrets 2009-04-06 08:01:23.000000000 +0300 @@ -8,4 +8,4 @@ # with "ipsec showhostkey". # -10.0.17.1 10.0.17.111: PSK "12345678" +192.168.20.1 192.168.20.2: PSK "12345678" |
#/etc/init.d/ipsec restart
ipsec_setup: (/etc/ipsec.d/examples/l2tp-psk.conf, line 16) parameter is not within a section -- `restart' aborted |
#vim /etc/ipsec.d/examples/l2tp-psk.conf
|
#vim /etc/ipsec.conf
--- /tmp/l3-saved-1291.7171.24081 2009-04-06 08:03:38.000000000 +0300 +++ /etc/ipsec.conf 2009-04-06 08:04:37.000000000 +0300 @@ -20,6 +20,8 @@ # NAT-TRAVERSAL support, see README.NAT-Traversal nat_traversal=yes virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12 + OE=off + protostack=netkey # # enable this if you see "failed to find any available worker" nhelpers=0 |
#/etc/init.d/ipsec stop
ipsec_setup: (/etc/ipsec.conf, line 23) unknown parameter name "OE" -- `stop' may not work ipsec_setup: Stopping Openswan IPsec... |
#/etc/init.d/ipsec start
ipsec_setup: (/etc/ipsec.conf, line 23) unknown parameter name "OE" -- `start' aborted |
#/etc/init.d/ipsec start
5 #$ 6 # Manual: ipsec.conf.5$ 7 $ 8 $ 9 version^I2.0^I# conforms to second version of ipsec.conf specification$ 10 $ 11 # basic configuration$ 12 config setup$ 13 ^I# plutodebug / klipsdebug = "all", "none" or a combation from below:$ 14 ^I# "raw crypt parsing emitting control klips pfkey natt x509 private"$ ... 37 $ ~ ~ ~ ~ ~ ~ ~ "/etc/ipsec.conf" 37L, 1046C записано сь ipsec_setup: (/etc/ipsec.conf, line 24) parameter is not within a section -- `start' aborted |
#dpkg -S /etc/ipsec.conf
[root@debian3:~]# vim /etc/ipsec.conf openswan: /etc/ipsec.conf |
#vim /etc/apt/sources.list
--- /tmp/l3-saved-1291.14565.4906 2009-04-06 08:06:25.000000000 +0300 +++ /etc/apt/sources.list 2009-04-06 08:06:36.000000000 +0300 @@ -1 +1 @@ -deb http://10.0.35.1:9999/debian etch main +deb http://10.0.35.1:9999/debian unstable main |
#apt-get update
Получено:1 http://10.0.35.1 unstable Release.gpg [197B] Получено:2 http://10.0.35.1 unstable Release [92,6kB] Ign http://10.0.35.1 unstable/main Packages Получено:3 http://10.0.35.1 unstable/main Packages [7606kB] Получено 7698kB за 24s (308kB/c) Чтение списков пакетов... Готово |
#vim /etc/ipsec.conf
--- /tmp/l3-saved-1291.16155.16843 2009-04-06 08:09:01.000000000 +0300 +++ /etc/ipsec.conf 2009-04-06 08:09:33.000000000 +0300 @@ -48,3 +48,4 @@ # # at startup, uncomment this. # #auto=start +include /etc/ipsec.d/examples/l2tp-psk.conf |
#/etc/init.d/ipsec start
ipsec_setup: Openswan IPsec apparently already active, start aborted |
#/etc/init.d/ipsec re
ipsec_setup: Stopping Openswan IPsec... ipsec_setup: Starting Openswan IPsec U2.6.20/K2.6.18-5-xen-686... |
#vim /etc/ipsec.secrets
|
#tail -f /var/log/syslog
Apr 6 08:14:37 debian3 kernel: 4gb seg fixup, process nmbd (pid 4754), cs:ip 73:b7cc140e Apr 6 08:14:37 debian3 kernel: 4gb seg fixup, process nmbd (pid 4754), cs:ip 73:b7cc1422 Apr 6 08:14:47 debian3 kernel: printk: 16 messages suppressed. Apr 6 08:14:47 debian3 kernel: 4gb seg fixup, process nmbd (pid 4754), cs:ip 73:b7cc140e Apr 6 08:14:47 debian3 kernel: 4gb seg fixup, process nmbd (pid 4754), cs:ip 73:b7cc1422 Apr 6 08:14:57 debian3 kernel: printk: 12 messages suppressed. Apr 6 08:14:57 debian3 kernel: 4gb seg fixup, process nmbd (pid 4754), cs:ip 73:b7cc140e Apr 6 08:14:57 debian3 kernel: 4gb seg fixup, process nmbd (pid 4754), cs:ip 73:b7cc1422 Apr 6 08:15:00 debian3 kernel: printk: 2 messages suppressed. Apr 6 08:15:00 debian3 kernel: 4gb seg fixup, process gdmlogin (pid 4810), cs:ip 73:b784c40e Apr 6 08:15:07 debian3 kernel: printk: 422 messages suppressed. Apr 6 08:15:07 debian3 kernel: 4gb seg fixup, process nmbd (pid 4754), cs:ip 73:b7cc140e Apr 6 08:15:17 debian3 kernel: printk: 3 messages suppressed. Apr 6 08:15:17 debian3 kernel: 4gb seg fixup, process nmbd (pid 4754), cs:ip 73:b7cc140e Apr 6 08:15:17 debian3 kernel: 4gb seg fixup, process nmbd (pid 4754), cs:ip 73:b7cc1422 Apr 6 08:15:21 debian3 kernel: printk: 2 messages suppressed. Apr 6 08:15:21 debian3 kernel: 4gb seg fixup, process nmbd (pid 4754), cs:ip 73:b7cc140e Apr 6 08:15:26 debian3 kernel: printk: 11 messages suppressed. Apr 6 08:15:26 debian3 kernel: 4gb seg fixup, process pluto (pid 6038), cs:ip 73:b7d5b40e Apr 6 08:15:31 debian3 kernel: printk: 9206 messages suppressed. Apr 6 08:15:31 debian3 kernel: 4gb seg fixup, process nmbd (pid 4754), cs:ip 73:b7cc140e |
#tail -f /var/log/auth.log
Apr 6 08:15:40 debian3 pluto[6038]: packet from 192.168.16.254:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] method set to=106 Apr 6 08:15:40 debian3 pluto[6038]: packet from 192.168.16.254:500: ignoring Vendor ID payload [Vid-Initial-Contact] Apr 6 08:15:40 debian3 pluto[6038]: "L2TP-PSK-NAT"[5] 192.168.16.254 #5: responding to Main Mode from unknown peer 192.168.16.254 Apr 6 08:15:40 debian3 pluto[6038]: "L2TP-PSK-NAT"[5] 192.168.16.254 #5: Can't authenticate: no preshared key found for `192.168.16.3' and `%any'. Attribute OAKLEY_AUTHENTICATION_METHOD Apr 6 08:15:40 debian3 last message repeated 2 times Apr 6 08:15:40 debian3 pluto[6038]: "L2TP-PSK-NAT"[5] 192.168.16.254 #5: OAKLEY_DES_CBC is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Apr 6 08:15:41 debian3 pluto[6038]: "L2TP-PSK-NAT"[5] 192.168.16.254 #5: OAKLEY_DES_CBC is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Apr 6 08:15:41 debian3 pluto[6038]: "L2TP-PSK-NAT"[5] 192.168.16.254 #5: no acceptable Oakley Transform Apr 6 08:15:41 debian3 pluto[6038]: "L2TP-PSK-NAT"[5] 192.168.16.254 #5: sending notification NO_PROPOSAL_CHOSEN to 192.168.16.254:500 Apr 6 08:15:41 debian3 pluto[6038]: "L2TP-PSK-NAT"[5] 192.168.16.254: deleting connection "L2TP-PSK-NAT" instance with peer 192.168.16.254 {isakmp=#0/ipsec=#0} |
#tail -f /var/log/auth.log
Apr 6 08:15:56 debian3 pluto[6038]: "L2TP-PSK-NAT"[6] 192.168.16.254 #6: responding to Main Mode from unknown peer 192.168.16.254 Apr 6 08:15:56 debian3 pluto[6038]: "L2TP-PSK-NAT"[6] 192.168.16.254 #6: Can't authenticate: no preshared key found for `192.168.16.3' and `%any'. Attribute OAKLEY_AUTHENTICATION_METHOD Apr 6 08:15:56 debian3 last message repeated 2 times Apr 6 08:15:56 debian3 pluto[6038]: "L2TP-PSK-NAT"[6] 192.168.16.254 #6: OAKLEY_DES_CBC is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Apr 6 08:15:56 debian3 pluto[6038]: "L2TP-PSK-NAT"[6] 192.168.16.254 #6: OAKLEY_DES_CBC is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Apr 6 08:15:56 debian3 pluto[6038]: "L2TP-PSK-NAT"[6] 192.168.16.254 #6: no acceptable Oakley Transform Apr 6 08:15:57 debian3 pluto[6038]: "L2TP-PSK-NAT"[6] 192.168.16.254 #6: sending notification NO_PROPOSAL_CHOSEN to 192.168.16.254:500 Apr 6 08:15:57 debian3 pluto[6038]: "L2TP-PSK-NAT"[6] 192.168.16.254: deleting connection "L2TP-PSK-NAT" instance with peer 192.168.16.254 {isakmp=#0/ipsec=#0} Apr 6 08:16:12 debian3 pluto[6038]: packet from 192.168.16.254:500: ignoring Delete SA payload: not encrypted Apr 6 08:16:12 debian3 pluto[6038]: packet from 192.168.16.254:500: received and ignored informational message |
#vim /etc/ipsec.secrets
--- /tmp/l3-saved-1291.11834.7873 2009-04-06 08:16:56.000000000 +0300 +++ /etc/ipsec.secrets 2009-04-06 08:17:23.000000000 +0300 @@ -8,4 +8,4 @@ # with "ipsec showhostkey". # -192.168.20.1 192.168.20.2: PSK "12345678" +192.168.16.3 192.168.16.254: PSK "12345678" |
#tail -f /var/log/auth.log
Apr 6 08:17:26 debian3 pluto[6038]: "L2TP-PSK-NAT"[11] 192.168.16.254 #11: OAKLEY_DES_CBC is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Apr 6 08:17:26 debian3 pluto[6038]: "L2TP-PSK-NAT"[11] 192.168.16.254 #11: no acceptable Oakley Transform Apr 6 08:17:27 debian3 pluto[6038]: "L2TP-PSK-NAT"[11] 192.168.16.254 #11: sending notification NO_PROPOSAL_CHOSEN to 192.168.16.254:500 Apr 6 08:17:27 debian3 pluto[6038]: "L2TP-PSK-NAT"[11] 192.168.16.254: deleting connection "L2TP-PSK-NAT" instance with peer 192.168.16.254 {isakmp=#0/ipsec=#0} Apr 6 08:17:29 debian3 pluto[6038]: packet from 192.168.16.254:500: ignoring Delete SA payload: not encrypted Apr 6 08:17:29 debian3 pluto[6038]: packet from 192.168.16.254:500: received and ignored informational message Apr 6 08:17:32 debian3 pluto[6038]: packet from 192.168.16.254:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000004] Apr 6 08:17:32 debian3 pluto[6038]: packet from 192.168.16.254:500: ignoring Vendor ID payload [FRAGMENTATION] Apr 6 08:17:32 debian3 pluto[6038]: packet from 192.168.16.254:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] method set to=106 Apr 6 08:17:32 debian3 pluto[6038]: "L2TP-PSK-NAT"[12] 192.168.16.254 #12: responding to Main Mode from unknown peer 192.168.16.254 ... Apr 6 08:20:11 debian3 pluto[6038]: packet from 192.168.16.254:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] method set to=106 Apr 6 08:20:11 debian3 pluto[6038]: packet from 192.168.16.254:500: ignoring Vendor ID payload [Vid-Initial-Contact] Apr 6 08:20:11 debian3 pluto[6038]: "L2TP-PSK-NAT"[22] 192.168.16.254 #22: responding to Main Mode from unknown peer 192.168.16.254 Apr 6 08:20:11 debian3 pluto[6038]: "L2TP-PSK-NAT"[22] 192.168.16.254 #22: Can't authenticate: no preshared key found for `192.168.16.3' and `%any'. Attribute OAKLEY_AUTHENTICATION_METHOD Apr 6 08:20:11 debian3 last message repeated 2 times Apr 6 08:20:11 debian3 pluto[6038]: "L2TP-PSK-NAT"[22] 192.168.16.254 #22: OAKLEY_DES_CBC is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Apr 6 08:20:12 debian3 pluto[6038]: "L2TP-PSK-NAT"[22] 192.168.16.254 #22: OAKLEY_DES_CBC is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Apr 6 08:20:12 debian3 pluto[6038]: "L2TP-PSK-NAT"[22] 192.168.16.254 #22: no acceptable Oakley Transform Apr 6 08:20:12 debian3 pluto[6038]: "L2TP-PSK-NAT"[22] 192.168.16.254 #22: sending notification NO_PROPOSAL_CHOSEN to 192.168.16.254:500 Apr 6 08:20:12 debian3 pluto[6038]: "L2TP-PSK-NAT"[22] 192.168.16.254: deleting connection "L2TP-PSK-NAT" instance with peer 192.168.16.254 {isakmp=#0/ipsec=#0} |
#tail -f /var/log/auth.log
Apr 6 08:21:03 debian3 pluto[6038]: packet from 192.168.16.254:500: ignoring Vendor ID payload [FRAGMENTATION] Apr 6 08:21:03 debian3 pluto[6038]: packet from 192.168.16.254:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] method set to=106 Apr 6 08:21:03 debian3 pluto[6038]: "L2TP-PSK-NAT"[26] 192.168.16.254 #26: responding to Main Mode from unknown peer 192.168.16.254 Apr 6 08:21:04 debian3 pluto[6038]: "L2TP-PSK-NAT"[26] 192.168.16.254 #26: Can't authenticate: no preshared key found for `192.168.16.3' and `%any'. Attribute OAKLEY_AUTHENTICATION_METHOD Apr 6 08:21:04 debian3 last message repeated 2 times Apr 6 08:21:04 debian3 pluto[6038]: "L2TP-PSK-NAT"[26] 192.168.16.254 #26: OAKLEY_DES_CBC is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Apr 6 08:21:04 debian3 pluto[6038]: "L2TP-PSK-NAT"[26] 192.168.16.254 #26: OAKLEY_DES_CBC is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Apr 6 08:21:04 debian3 pluto[6038]: "L2TP-PSK-NAT"[26] 192.168.16.254 #26: no acceptable Oakley Transform Apr 6 08:21:04 debian3 pluto[6038]: "L2TP-PSK-NAT"[26] 192.168.16.254 #26: sending notification NO_PROPOSAL_CHOSEN to 192.168.16.254:500 Apr 6 08:21:04 debian3 pluto[6038]: "L2TP-PSK-NAT"[26] 192.168.16.254: deleting connection "L2TP-PSK-NAT" instance with peer 192.168.16.254 {isakmp=#0/ipsec=#0} Apr 6 08:21:07 debian3 pluto[6038]: packet from 192.168.16.254:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000004] Apr 6 08:21:07 debian3 pluto[6038]: packet from 192.168.16.254:500: ignoring Vendor ID payload [FRAGMENTATION] Apr 6 08:21:07 debian3 pluto[6038]: packet from 192.168.16.254:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] method set to=106 Apr 6 08:21:08 debian3 pluto[6038]: "L2TP-PSK-NAT"[27] 192.168.16.254 #27: responding to Main Mode from unknown peer 192.168.16.254 Apr 6 08:21:08 debian3 pluto[6038]: "L2TP-PSK-NAT"[27] 192.168.16.254 #27: Can't authenticate: no preshared key found for `192.168.16.3' and `%any'. Attribute OAKLEY_AUTHENTICATION_METHOD Apr 6 08:21:08 debian3 last message repeated 2 times Apr 6 08:21:08 debian3 pluto[6038]: "L2TP-PSK-NAT"[27] 192.168.16.254 #27: OAKLEY_DES_CBC is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Apr 6 08:21:08 debian3 pluto[6038]: "L2TP-PSK-NAT"[27] 192.168.16.254 #27: OAKLEY_DES_CBC is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Apr 6 08:21:08 debian3 pluto[6038]: "L2TP-PSK-NAT"[27] 192.168.16.254 #27: no acceptable Oakley Transform Apr 6 08:21:08 debian3 pluto[6038]: "L2TP-PSK-NAT"[27] 192.168.16.254 #27: sending notification NO_PROPOSAL_CHOSEN to 192.168.16.254:500 Apr 6 08:21:08 debian3 pluto[6038]: "L2TP-PSK-NAT"[27] 192.168.16.254: deleting connection "L2TP-PSK-NAT" instance with peer 192.168.16.254 {isakmp=#0/ipsec=#0} |
#vim /etc/ipsec.secrets
--- /tmp/l3-saved-1291.14082.20214 2009-04-06 08:21:46.000000000 +0300 +++ /etc/ipsec.secrets 2009-04-06 08:22:08.000000000 +0300 @@ -8,4 +8,4 @@ # with "ipsec showhostkey". # -192.168.16.3 10.0.17.11110.0.17.11110.0.17.11110.0.17.11110.0.17.11110.0.17.11110.0.17.11110.0.17.11110.0.17.11110.0.17.11110.0.17.11110.0.17.11110.0.17.11110.0.17.11110.0.17.11110.0.17.11110.0.17.11110.0.17.11110.0.17.111: PSK "12345678" +* * : PSK "12345678" |
#apt-get install tcpdump
[root@debian3:~]# tail -f /var/log/auth.log Apr 6 08:21:31 debian3 pluto[6038]: "L2TP-PSK-NAT"[29] 192.168.16.254 #29: responding to Main Mode from unknown peer 192.168.16.254 Apr 6 08:21:32 debian3 pluto[6038]: "L2TP-PSK-NAT"[29] 192.168.16.254 #29: Can't authenticate: no preshared key found for `192.168.16.3' and `%any'. Attribute OAKLEY_AUTHENTICATION_METHOD Apr 6 08:21:32 debian3 last message repeated 2 times Apr 6 08:21:32 debian3 pluto[6038]: "L2TP-PSK-NAT"[29] 192.168.16.254 #29: OAKLEY_DES_CBC is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Apr 6 08:21:32 debian3 pluto[6038]: "L2TP-PSK-NAT"[29] 192.168.16.254 #29: OAKLEY_DES_CBC is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Apr 6 08:21:32 debian3 pluto[6038]: "L2TP-PSK-NAT"[29] 192.168.16.254 #29: no acceptable Oakley Transform Apr 6 08:21:32 debian3 pluto[6038]: "L2TP-PSK-NAT"[29] 192.168.16.254 #29: sending notification NO_PROPOSAL_CHOSEN to 192.168.16.254:500 Apr 6 08:21:32 debian3 pluto[6038]: "L2TP-PSK-NAT"[29] 192.168.16.254: deleting connection "L2TP-PSK-NAT" instance with peer 192.168.16.254 {isakmp=#0/ipsec=#0} Apr 6 08:22:03 debian3 pluto[6038]: packet from 192.168.16.254:500: ignoring Delete SA payload: not encrypted ... Получено:1 http://10.0.35.1 unstable/main libpcap0.8 1.0.0-1 [107kB] Получено:2 http://10.0.35.1 unstable/main tcpdump 4.0.0-2 [325kB] Получено 433kB за 1s (330kB/c) Выбор ранее не выбранного пакета libpcap0.8. (Чтение базы данных... на данный момент установлено 24389 файлов и каталогов.) Распаковывается пакет libpcap0.8 (из файла .../libpcap0.8_1.0.0-1_i386.deb)... Выбор ранее не выбранного пакета tcpdump. Распаковывается пакет tcpdump (из файла .../tcpdump_4.0.0-2_i386.deb)... Настраивается пакет libpcap0.8 (1.0.0-1) ... Настраивается пакет tcpdump (4.0.0-2) ... |
#tcpdump -i eth0 -n icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes 08:23:09.075335 IP 192.168.16.254 > 192.168.16.3: ICMP echo request, id 1024, seq 16128, length 40 08:23:09.075351 IP 192.168.16.3 > 192.168.16.254: ICMP echo reply, id 1024, seq 16128, length 40 08:23:10.064654 IP 192.168.16.254 > 192.168.16.3: ICMP echo request, id 1024, seq 16384, length 40 08:23:10.064668 IP 192.168.16.3 > 192.168.16.254: ICMP echo reply, id 1024, seq 16384, length 40 08:23:11.064704 IP 192.168.16.254 > 192.168.16.3: ICMP echo request, id 1024, seq 16640, length 40 08:23:11.064716 IP 192.168.16.3 > 192.168.16.254: ICMP echo reply, id 1024, seq 16640, length 40 08:23:12.064762 IP 192.168.16.254 > 192.168.16.3: ICMP echo request, id 1024, seq 16896, length 40 08:23:12.064776 IP 192.168.16.3 > 192.168.16.254: ICMP echo reply, id 1024, seq 16896, length 40 8 packets captured 8 packets received by filter 0 packets dropped by kernel |
#tcpdump -i eth0 -n icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes 08:26:12.983576 IP 192.168.16.234 > 192.168.16.3: ICMP echo request, id 512, seq 256, length 40 08:26:12.983609 IP 192.168.16.3 > 192.168.16.234: ICMP echo reply, id 512, seq 256, length 40 08:26:13.980322 IP 192.168.16.234 > 192.168.16.3: ICMP echo request, id 512, seq 512, length 40 08:26:13.980338 IP 192.168.16.3 > 192.168.16.234: ICMP echo reply, id 512, seq 512, length 40 08:26:14.981816 IP 192.168.16.234 > 192.168.16.3: ICMP echo request, id 512, seq 768, length 40 08:26:14.981837 IP 192.168.16.3 > 192.168.16.234: ICMP echo reply, id 512, seq 768, length 40 6 packets captured 6 packets received by filter 0 packets dropped by kernel |
#tail -f /var/log/auth.log
Apr 6 08:27:42 debian3 pluto[6038]: packet from 192.168.16.234:500: ignoring Vendor ID payload [Vid-Initial-Contact] Apr 6 08:27:42 debian3 pluto[6038]: "L2TP-PSK-NAT"[44] 192.168.16.234 #44: responding to Main Mode from unknown peer 192.168.16.234 Apr 6 08:27:42 debian3 pluto[6038]: "L2TP-PSK-NAT"[44] 192.168.16.234 #44: Can't authenticate: no preshared key found for `192.168.16.3' and `%any'. Attribute OAKLEY_AUTHENTICATION_METHOD Apr 6 08:27:42 debian3 last message repeated 2 times Apr 6 08:27:42 debian3 pluto[6038]: "L2TP-PSK-NAT"[44] 192.168.16.234 #44: OAKLEY_DES_CBC is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Apr 6 08:27:42 debian3 pluto[6038]: "L2TP-PSK-NAT"[44] 192.168.16.234 #44: OAKLEY_DES_CBC is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Apr 6 08:27:42 debian3 pluto[6038]: "L2TP-PSK-NAT"[44] 192.168.16.234 #44: no acceptable Oakley Transform Apr 6 08:27:42 debian3 pluto[6038]: "L2TP-PSK-NAT"[44] 192.168.16.234 #44: sending notification NO_PROPOSAL_CHOSEN to 192.168.16.234:500 Apr 6 08:27:42 debian3 pluto[6038]: "L2TP-PSK-NAT"[44] 192.168.16.234: deleting connection "L2TP-PSK-NAT" instance with peer 192.168.16.234 {isakmp=#0/ipsec=#0} Apr 6 08:27:46 debian3 pluto[6038]: packet from 192.168.16.234:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000004] Apr 6 08:27:46 debian3 pluto[6038]: packet from 192.168.16.234:500: ignoring Vendor ID payload [FRAGMENTATION] Apr 6 08:27:46 debian3 pluto[6038]: packet from 192.168.16.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] method set to=106 Apr 6 08:27:46 debian3 pluto[6038]: packet from 192.168.16.234:500: ignoring Vendor ID payload [Vid-Initial-Contact] Apr 6 08:27:46 debian3 pluto[6038]: "L2TP-PSK-NAT"[45] 192.168.16.234 #45: responding to Main Mode from unknown peer 192.168.16.234 Apr 6 08:27:46 debian3 pluto[6038]: "L2TP-PSK-NAT"[45] 192.168.16.234 #45: Can't authenticate: no preshared key found for `192.168.16.3' and `%any'. Attribute OAKLEY_AUTHENTICATION_METHOD Apr 6 08:27:46 debian3 last message repeated 2 times Apr 6 08:27:46 debian3 pluto[6038]: "L2TP-PSK-NAT"[45] 192.168.16.234 #45: OAKLEY_DES_CBC is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Apr 6 08:27:46 debian3 pluto[6038]: "L2TP-PSK-NAT"[45] 192.168.16.234 #45: OAKLEY_DES_CBC is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Apr 6 08:27:46 debian3 pluto[6038]: "L2TP-PSK-NAT"[45] 192.168.16.234 #45: no acceptable Oakley Transform Apr 6 08:27:46 debian3 pluto[6038]: "L2TP-PSK-NAT"[45] 192.168.16.234 #45: sending notification NO_PROPOSAL_CHOSEN to 192.168.16.234:500 Apr 6 08:27:46 debian3 pluto[6038]: "L2TP-PSK-NAT"[45] 192.168.16.234: deleting connection "L2TP-PSK-NAT" instance with peer 192.168.16.234 {isakmp=#0/ipsec=#0} |
l3cd=/users/clint/uatoken/debian3.unix.nt/root
Время первой команды журнала | 06:39:14 2009- 4- 6 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Время последней команды журнала | 08:26:25 2009- 4- 6 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Количество командных строк в журнале | 100 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Процент команд с ненулевым кодом завершения, % | 30.00 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Процент синтаксически неверно набранных команд, % | 0.00 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Суммарное время работы с терминалом *, час | 0.93 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Количество командных строк в единицу времени, команда/мин | 1.80 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Частота использования команд |
|
В журнал автоматически попадают все команды, данные в любом терминале системы.
Для того чтобы убедиться, что журнал на текущем терминале ведётся, и команды записываются, дайте команду w. В поле WHAT, соответствующем текущему терминалу, должна быть указана программа script.
Команды, при наборе которых были допущены синтаксические ошибки, выводятся перечёркнутым текстом:
$ l s-l bash: l: command not found |
Если код завершения команды равен нулю, команда была выполнена без ошибок. Команды, код завершения которых отличен от нуля, выделяются цветом.
$ test 5 -lt 4 |
Команды, ход выполнения которых был прерван пользователем, выделяются цветом.
$ find / -name abc find: /home/devi-orig/.gnome2: Keine Berechtigung find: /home/devi-orig/.gnome2_private: Keine Berechtigung find: /home/devi-orig/.nautilus/metafiles: Keine Berechtigung find: /home/devi-orig/.metacity: Keine Berechtigung find: /home/devi-orig/.inkscape: Keine Berechtigung ^C |
Команды, выполненные с привилегиями суперпользователя, выделяются слева красной чертой.
# id uid=0(root) gid=0(root) Gruppen=0(root) |
Изменения, внесённые в текстовый файл с помощью редактора, запоминаются и показываются в журнале в формате ed. Строки, начинающиеся символом "<", удалены, а строки, начинающиеся символом ">" -- добавлены.
$ vi ~/.bashrc
|
Для того чтобы изменить файл в соответствии с показанными в диффшоте изменениями, можно воспользоваться командой patch. Нужно скопировать изменения, запустить программу patch, указав в качестве её аргумента файл, к которому применяются изменения, и всавить скопированный текст:
$ patch ~/.bashrc |
Для того чтобы получить краткую справочную информацию о команде, нужно подвести к ней мышь. Во всплывающей подсказке появится краткое описание команды.
Если справочная информация о команде есть, команда выделяется голубым фоном, например: vi. Если справочная информация отсутствует, команда выделяется розовым фоном, например: notepad.exe. Справочная информация может отсутствовать в том случае, если (1) команда введена неверно; (2) если распознавание команды LiLaLo выполнено неверно; (3) если информация о команде неизвестна LiLaLo. Последнее возможно для редких команд.
Большие, в особенности многострочные, всплывающие подсказки лучше всего показываются браузерами KDE Konqueror, Apple Safari и Microsoft Internet Explorer. В браузерах Mozilla и Firefox они отображаются не полностью, а вместо перевода строки выводится специальный символ.
Время ввода команды, показанное в журнале, соответствует времени начала ввода командной строки, которое равно тому моменту, когда на терминале появилось приглашение интерпретатора
Имя терминала, на котором была введена команда, показано в специальном блоке. Этот блок показывается только в том случае, если терминал текущей команды отличается от терминала предыдущей.
Вывод не интересующих вас в настоящий момент элементов журнала, таких как время, имя терминала и других, можно отключить. Для этого нужно воспользоваться формой управления журналом вверху страницы.
Небольшие комментарии к командам можно вставлять прямо из командной строки. Комментарий вводится прямо в командную строку, после символов #^ или #v. Символы ^ и v показывают направление выбора команды, к которой относится комментарий: ^ - к предыдущей, v - к следующей. Например, если в командной строке было введено:
$ whoami
user
$ #^ Интересно, кто я?в журнале это будет выглядеть так:
$ whoami
user
Интересно, кто я? |
Если комментарий содержит несколько строк, его можно вставить в журнал следующим образом:
$ whoami
user
$ cat > /dev/null #^ Интересно, кто я?
Программа whoami выводит имя пользователя, под которым мы зарегистрировались в системе. - Она не может ответить на вопрос о нашем назначении в этом мире.В журнале это будет выглядеть так:
$ whoami user
|
Комментарии, не относящиеся непосредственно ни к какой из команд, добавляются точно таким же способом, только вместо симолов #^ или #v нужно использовать символы #=
1 2 3 4Группы команд, выполненных на разных терминалах, разделяются специальной линией. Под этой линией в правом углу показано имя терминала, на котором выполнялись команды. Для того чтобы посмотреть команды только одного сенса, нужно щёкнуть по этому названию.
LiLaLo (L3) расшифровывается как Live Lab Log.
Программа разработана для повышения эффективности обучения Unix/Linux-системам.
(c) Игорь Чубин, 2004-2008