Re: ipsec VPN

From: Thomas Beer <nohuman(at)gmail.com>
Date: Tue, 30 Nov 2004 17:47:07 +0100

Hi,

ich versuch noch mal mein Glück mit Ipsec!

> % setkey -D

setkey -D
192.168.2.2 192.168.2.8
        esp mode=tunnel spi=889221295(0x350070af) reqid=0(0x00000000)
        E: 3des-cbc 76c52359 4f493b5f 4aa89dbb 3cbabd39 d3c041b7 f2a0004d
        A: hmac-sha1 8c00dcb0 60e1d07d dc764168 8f051666 3883b1f5
        seq=0x0000000f replay=4 flags=0x00000000 state=mature
        created: Nov 30 17:29:55 2004 current: Nov 30 17:31:03 2004
        diff: 68(s) hard: 900(s) soft: 720(s)
        last: Nov 30 17:30:53 2004 hard: 0(s) soft: 0(s)
        current: 1776(bytes) hard: 0(bytes) soft: 0(bytes)
        allocated: 15 hard: 0 soft: 0
        sadb_seq=1 pid=678 refcnt=2
192.168.2.8 192.168.2.2
        esp mode=tunnel spi=216811875(0x0cec4963) reqid=0(0x00000000)
        E: 3des-cbc 7710a450 fc84245c 8f011bcc 52a8eaa9 f7cccc02 2d8dd854
        A: hmac-sha1 655df519 fc75c7d3 10d5427c 4bdcfc73 ab89b238
        seq=0x00000000 replay=4 flags=0x00000000 state=mature
        created: Nov 30 17:29:55 2004 current: Nov 30 17:31:03 2004
        diff: 68(s) hard: 900(s) soft: 720(s)
        last: Nov 30 17:30:58 2004 hard: 0(s) soft: 0(s)
        current: 2502(bytes) hard: 0(bytes) soft: 0(bytes)
        allocated: 28 hard: 0 soft: 0
        sadb_seq=0 pid=678 refcnt=1

> % setkey -DP

setkey -DP
192.168.2.8[any] 0.0.0.0/0[any] any
        in ipsec
        esp/tunnel/192.168.2.8-192.168.2.2/require
        spid=1 seq=1 pid=679
        refcnt=1
0.0.0.0/0[any] 192.168.2.8[any] any
        out ipsec
        esp/tunnel/192.168.2.2-192.168.2.8/require
        spid=2 seq=0 pid=679
        refcnt=1

> auf FreeBSD und die Ausgabe von
>
> % ipseccmd show all

Local Policy
-----------------------
    Local Policy Name: wifi
    Description:
    Last Changed: Fri Nov 26 16:33:47 2004
    Policy Path:
HKLM\SOFTWARE\Policies\Microsoft\Windows\IPSec\Policy\Local\ipsecPolicy{2585cf0b-587a-4d2e-a80f-a07878cedcae}

Generic MM Filters
------------------------------

Generic MM Filter #1:
 Name : 4
 Filter Id : {93E3BF55-2A6B-4137-B179-1008AC51C7FB}
 Policy Id : {E6C31F1A-64DC-4B94-85CB-6F109B67A1FA}
        Name : 2
        Policy Id : {E6C31F1A-64DC-4B94-85CB-6F109B67A1FA}
        Flags : 2 (Default)
        Soft SA expiration time : 28800
        Offer #1
                3DES SHA1 DH Group 2
                Quickmode limit : 0, Lifetime 0Kbytes/28800seconds
        Offer #2
                3DES MD5 DH Group 2
                Quickmode limit : 0, Lifetime 0Kbytes/28800seconds
        Offer #3
                DES SHA1 DH Group 1
                Quickmode limit : 0, Lifetime 0Kbytes/28800seconds
        Offer #4
                DES MD5 DH Group 1
                Quickmode limit : 0, Lifetime 0Kbytes/28800seconds
 Src Addr : Me
 Des Addr : 192.168.2.2
 Mirrored : True
 Interface Type : LAN
 Auth Methods Id: {15D44B0B-3D49-4368-B457-F74F565DD7AD}
        AM #1 : Preshared Key : *************** :-)

Generic MM Filter #2:
 Name : 3
 Filter Id : {7950E7D7-C01D-415A-B42E-B2659F3D5EF0}
 Policy Id : {E6C31F1A-64DC-4B94-85CB-6F109B67A1FA}
        Name : 2
        Policy Id : {E6C31F1A-64DC-4B94-85CB-6F109B67A1FA}
        Flags : 2 (Default)
        Soft SA expiration time : 28800
        Offer #1
                3DES SHA1 DH Group 2
                Quickmode limit : 0, Lifetime 0Kbytes/28800seconds
        Offer #2
                3DES MD5 DH Group 2
                Quickmode limit : 0, Lifetime 0Kbytes/28800seconds
        Offer #3
                DES SHA1 DH Group 1
                Quickmode limit : 0, Lifetime 0Kbytes/28800seconds
        Offer #4
                DES MD5 DH Group 1
                Quickmode limit : 0, Lifetime 0Kbytes/28800seconds
 Src Addr : Me
 Des Addr : 192.168.2.8
 Mirrored : True
 Interface Type : LAN
 Auth Methods Id: {6C19988B-FF71-4DB6-8F41-40BCDABDFF64}
        AM #1 : Preshared Key : *************** :-)

Specific MM Filters
------------------------------

Specific MM Filter #1:
 Name : 4
 Filter Id : {93E3BF55-2A6B-4137-B179-1008AC51C7FB}
 Policy Id : {E6C31F1A-64DC-4B94-85CB-6F109B67A1FA}
 Src Addr : 192.168.2.8
 Des Addr : 192.168.2.2
 Direction : Outbound, Weight : 69206017
 Interface Type : LAN
 Auth Methods Id: {15D44B0B-3D49-4368-B457-F74F565DD7AD}

Specific MM Filter #2:
 Name : 4
 Filter Id : {93E3BF55-2A6B-4137-B179-1008AC51C7FB}
 Policy Id : {E6C31F1A-64DC-4B94-85CB-6F109B67A1FA}
 Src Addr : 192.168.2.2
 Des Addr : 192.168.2.8
 Direction : Inbound, Weight : 69206017
 Interface Type : LAN
 Auth Methods Id: {15D44B0B-3D49-4368-B457-F74F565DD7AD}

Specific MM Filter #3:
 Name : 4
 Filter Id : {93E3BF55-2A6B-4137-B179-1008AC51C7FB}
 Policy Id : {E6C31F1A-64DC-4B94-85CB-6F109B67A1FA}
 Src Addr : 169.254.166.129
 Des Addr : 192.168.2.2
 Direction : Outbound, Weight : 69206017
 Interface Type : LAN
 Auth Methods Id: {15D44B0B-3D49-4368-B457-F74F565DD7AD}

Specific MM Filter #4:
 Name : 4
 Filter Id : {93E3BF55-2A6B-4137-B179-1008AC51C7FB}
 Policy Id : {E6C31F1A-64DC-4B94-85CB-6F109B67A1FA}
 Src Addr : 192.168.2.2
 Des Addr : 169.254.166.129
 Direction : Inbound, Weight : 69206017
 Interface Type : LAN
 Auth Methods Id: {15D44B0B-3D49-4368-B457-F74F565DD7AD}

Generic Transport Filters
------------------------------
No filters

Specific Transport Filters
------------------------------
No filters

Generic Tunnel Filters
------------------------------

Generic Tunnel Filter #1:
 Name : 3
 Filter Id : {7950E7D7-C01D-415A-B42E-B2659F3D5EF0}
 Policy Id : {7238523F-70FA-11D1-864C-14A300000000}
        Name : Sicherheit erforderlich
        Policy Id : {7238523F-70FA-11D1-864C-14A300000000}
        Flags : 1 (Tunnel)
        Offer #1
                Algo #1 : Encryption 3DES SHA1
                PFS : False, Lifetime 100000Kbytes/900seconds
        Offer #2
                Algo #1 : Encryption 3DES MD5
                PFS : False, Lifetime 100000Kbytes/900seconds
        Offer #3
                Algo #1 : Encryption DES SHA1
                PFS : False, Lifetime 100000Kbytes/900seconds
        Offer #4
                Algo #1 : Encryption DES MD5
                PFS : False, Lifetime 100000Kbytes/900seconds
 Src Addr : Any
 Des Addr : Me
 Src Tunnel Addr : Any
 Des Tunnel Addr : 192.168.2.8
 Protocol : 0 Src Port : 0 Des Port : 0
 Inbound Passthru
 Mirrored : False
 Interface Type : LAN

Generic Tunnel Filter #2:
 Name : 4
 Filter Id : {93E3BF55-2A6B-4137-B179-1008AC51C7FB}
 Policy Id : {7238523F-70FA-11D1-864C-14A300000000}
        Name : Sicherheit erforderlich
        Policy Id : {7238523F-70FA-11D1-864C-14A300000000}
        Flags : 1 (Tunnel)
        Offer #1
                Algo #1 : Encryption 3DES SHA1
                PFS : False, Lifetime 100000Kbytes/900seconds
        Offer #2
                Algo #1 : Encryption 3DES MD5
                PFS : False, Lifetime 100000Kbytes/900seconds
        Offer #3
                Algo #1 : Encryption DES SHA1
                PFS : False, Lifetime 100000Kbytes/900seconds
        Offer #4
                Algo #1 : Encryption DES MD5
                PFS : False, Lifetime 100000Kbytes/900seconds
 Src Addr : Me
 Des Addr : Any
 Src Tunnel Addr : Any
 Des Tunnel Addr : 192.168.2.2
 Protocol : 0 Src Port : 0 Des Port : 0
 Inbound Passthru
 Mirrored : False
 Interface Type : LAN

Specific Tunnel Filters
------------------------------

Specific Tunnel Filter #1:
 Name : 3
 Filter Id : {7950E7D7-C01D-415A-B42E-B2659F3D5EF0}
 Policy Id : {7238523F-70FA-11D1-864C-14A300000000}
 Src Addr : Any
 Des Addr : 192.168.2.8
 Src Tunnel Addr : Any
 Des Tunnel Addr : 192.168.2.8
 Protocol : 0 Src Port : 0 Des Port : 0
 Inbound Passthru
 Direction : Inbound, Weight : 34615297
 Interface Type : LAN

Specific Tunnel Filter #2:
 Name : 3
 Filter Id : {7950E7D7-C01D-415A-B42E-B2659F3D5EF0}
 Policy Id : {7238523F-70FA-11D1-864C-14A300000000}
 Src Addr : Any
 Des Addr : 169.254.166.129
 Src Tunnel Addr : Any
 Des Tunnel Addr : 192.168.2.8
 Protocol : 0 Src Port : 0 Des Port : 0
 Inbound Passthru
 Direction : Inbound, Weight : 34615297
 Interface Type : LAN

Specific Tunnel Filter #3:
 Name : 4
 Filter Id : {93E3BF55-2A6B-4137-B179-1008AC51C7FB}
 Policy Id : {7238523F-70FA-11D1-864C-14A300000000}
 Src Addr : 192.168.2.8
 Des Addr : Any
 Src Tunnel Addr : Any
 Des Tunnel Addr : 192.168.2.2
 Protocol : 0 Src Port : 0 Des Port : 0
 Direction : Outbound, Weight : 34615296
 Interface Type : LAN

Specific Tunnel Filter #4:
 Name : 4
 Filter Id : {93E3BF55-2A6B-4137-B179-1008AC51C7FB}
 Policy Id : {7238523F-70FA-11D1-864C-14A300000000}
 Src Addr : 169.254.166.129
 Des Addr : Any
 Src Tunnel Addr : Any
 Des Tunnel Addr : 192.168.2.2
 Protocol : 0 Src Port : 0 Des Port : 0
 Direction : Outbound, Weight : 34615296
 Interface Type : LAN

Main Mode Policies
------------------------------

Main Mode Policy #1:
 Name : 2
 Policy Id : {E6C31F1A-64DC-4B94-85CB-6F109B67A1FA}
 Flags : 2 (Default)
 Soft SA expiration time : 28800
 Offer #1
         3DES SHA1 DH Group 2
         Quickmode limit : 0, Lifetime 0Kbytes/28800seconds
 Offer #2
         3DES MD5 DH Group 2
         Quickmode limit : 0, Lifetime 0Kbytes/28800seconds
 Offer #3
         DES SHA1 DH Group 1
         Quickmode limit : 0, Lifetime 0Kbytes/28800seconds
 Offer #4
         DES MD5 DH Group 1
         Quickmode limit : 0, Lifetime 0Kbytes/28800seconds

Quick Mode Policies
------------------------------

Quick Mode Policy #1:
 Name : Sicherheit erforderlich
 Policy Id : {7238523F-70FA-11D1-864C-14A300000000}
 Flags : 1 (Tunnel)
 Offer #1
         Algo #1 : Encryption 3DES SHA1
         PFS : False, Lifetime 100000Kbytes/900seconds
 Offer #2
         Algo #1 : Encryption 3DES MD5
         PFS : False, Lifetime 100000Kbytes/900seconds
 Offer #3
         Algo #1 : Encryption DES SHA1
         PFS : False, Lifetime 100000Kbytes/900seconds
 Offer #4
         Algo #1 : Encryption DES MD5
         PFS : False, Lifetime 100000Kbytes/900seconds

Main Mode Authentication Methods
------------------------------

Main Mode Authentication Methods #1:
 Auth Methods Id: {15D44B0B-3D49-4368-B457-F74F565DD7AD}
         AM #1 : Preshared Key : *************** :-)

Main Mode Authentication Methods #2:
 Auth Methods Id: {6C19988B-FF71-4DB6-8F41-40BCDABDFF64}
         AM #1 : Preshared Key : *************** :-)

IKE Statistics
------------------------------
 Main Modes 2
 Quick Modes 6
 Soft SAs 0
 Authentication Failures 0
 Active Acquire 1
 Active Receive 0
 Acquire fail 0
 Receive fail 0
 Send fail 0
 Acquire Heap size 2
 Receive Heap size 2
 Negotiation Failures 3
 Invalid Cookies Rcvd 0
 Total Acquire 7
 TotalGetSpi 6
 TotalKeyAdd 6
 TotalKeyUpdate 6
 GetSpiFail 0
 KeyAddFail 0
 KeyUpdateFail 0
 IsadbListSize 1
 ConnListSize 0

IPSec Statistics
------------------------------
 Active Assoc 1
 Pending Key 0
 Key Adds 6
 Key Deletes 5
 ReKeys 0
 Active Tunnels 1
 Bad SPI Pkts 410
 Pkts not Decrypted 0
 Pkts not Authenticated 0
 Pkts with Replay Detection 0
 Confidential Bytes Sent 41,465
 Confidential Bytes Received 26,434
 Authenticated Bytes Sent 53,544
 Authenticated Bytes Received 33,056
 Offloaded Bytes Sent 0
 Offloaded Bytes Received 0
 Bytes Sent In Tunnels 41,465
 Bytes Received In Tunnels 43,168
 Transport Bytes Sent 0
 Transport Bytes Received 0

Main Mode SAs
------------------------------

Main Mode SA #1:
 From 192.168.2.8
  To 192.168.2.2
 Policy Id : {E6C31F1A-64DC-4B94-85CB-6F109B67A1FA}
 Offer Used :
        3DES SHA1 DH Group 2
        Quickmode limit : 0, Lifetime 0Kbytes/28800seconds
 Auth Used : Preshared Key
 Initiator cookie b10961c6c7df8e68
 Responder cookie 7b9568cceaa665f4
 Source UDP Encap port : 500 Dest UDP Encap port: 500

Quick Mode SAs
------------------------------

Quick Mode SA #1:
 Filter Id : {93E3BF55-2A6B-4137-B179-1008AC51C7FB}
  Tunnel Filter
  From 192.168.2.8
   To Any
  Protocol : 0 Src Port : 0 Des Port : 0
  Direction : Outbound
  Tunnel From 192.168.2.8
  Tunnel To 192.168.2.2
 Policy Id : {7238523F-70FA-11D1-864C-14A300000000}
 Offer Used :
        Algo #1 : Encryption 3DES SHA1 (24bytes/0rounds) (20secbytes/0secrounds)
                  MySpi 889221295 PeerSpi 216811875
        PFS : False, Lifetime 100000Kbytes/900seconds
 Initiator cookie b10961c6c7df8e68
 Responder cookie 7b9568cceaa665f4

The command completed successfully.

> % tcpdump -vvvv -i <if>

tcpdump -i wi0 -t
tcpdump: listening on wi0
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0xfc)
wifi.mobile.netbios-dgm > 192.168.2.15.netbios-dgm: NBT UDP PACKET(138)
wifi.mobile.netbios-dgm > 192.168.2.15.netbios-dgm: NBT UDP PACKET(138)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0xfd)
ibm.mobile > wifi.mobile: ESP(spi=0x0cec4963,seq=0xd6)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0xfe)
ibm.mobile > wifi.mobile: ESP(spi=0x0cec4963,seq=0xd7)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0xff)
ibm.mobile > wifi.mobile: ESP(spi=0x0cec4963,seq=0xd8)
arp who-has wifi.mobile tell ibm.mobile
arp who-has wifi.mobile tell ibm.mobile
arp reply wifi.mobile is-at 0:9:5b:91:85:6e
ibm.mobile > wifi.mobile: ESP(spi=0x0cec4963,seq=0xd9) [ttl 1]
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0x100)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0x101)
ibm.mobile > wifi.mobile: ESP(spi=0x0cec4963,seq=0xda)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0x102)
ibm.mobile > wifi.mobile: ESP(spi=0x0cec4963,seq=0xdb)
ibm.mobile > wifi.mobile: ESP(spi=0x0cec4963,seq=0xdc)
ibm.mobile > wifi.mobile: ESP(spi=0x0cec4963,seq=0xdd)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0x103)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0x104)
ibm.mobile > wifi.mobile: ESP(spi=0x0cec4963,seq=0xde)
ibm.mobile > wifi.mobile: ESP(spi=0x0cec4963,seq=0xdf)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0x105)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0x106)
ibm.mobile > wifi.mobile: ESP(spi=0x0cec4963,seq=0xe0)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0x107)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0x108)
ibm.mobile > wifi.mobile: ESP(spi=0x0cec4963,seq=0xe1)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0x109)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0x10a)
ibm.mobile > wifi.mobile: ESP(spi=0x0cec4963,seq=0xe2)
ibm.mobile > wifi.mobile: ESP(spi=0x0cec4963,seq=0xe3)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0x10b)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0x10c)
ibm.mobile > wifi.mobile: ESP(spi=0x0cec4963,seq=0xe4)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0x10d)
^C
39 packets received by filter
0 packets dropped by kernel

Unter dieser Konfiguration passiert folgendes wenn ich die Windows
Firewall & FreeBSD FW auf ganz offen stelle:

Beide können sich pingen, ich kann z.B. auf Samba Shares zugreifen.
Sobald ich die Windows Firewall nur auf 500 (192.168.2.8) öffne
kann erwartungsgemäß nur noch der M$ den FBSD pingen.

Das Problem das sich mir jetzt stellt ist, dass ich sie für ICMP
(m.E.) nicht weiter öffnen kann da ich alle Klick-and-Pray boxen
der M$ Firewall selektiert habe. Hab ich da was vergessen?

Firewall M$ Log:

#Version: 1.5
#Software: Microsoft Windows Firewall
#Time Format: Local
#Fields: date time action protocol src-ip dst-ip src-port dst-port
size tcpflags tcpsyn tcpack tcpwin icmptype icmpcode info path

2004-11-30 17:32:35 DROP UDP 0.0.0.0 255.255.255.255 68 67 328 - - - -
- - - RECEIVE
2004-11-30 17:32:37 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:42 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:43 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:44 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:45 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:46 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:47 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:48 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:49 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:50 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:51 DROP UDP 0.0.0.0 255.255.255.255 68 67 328 - - - -
- - - RECEIVE
2004-11-30 17:32:51 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:52 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:53 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:54 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:55 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:56 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:57 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:58 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:59 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:00 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:01 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:02 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:03 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:04 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:05 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:06 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:07 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:08 OPEN TCP 192.168.2.8 64.233.161.107 1375 443 - - -
- - - - - -
2004-11-30 17:33:13 OPEN TCP 192.168.2.8 192.168.2.2 1365 445 - - - - - - - - -
2004-11-30 17:33:13 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:14 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:22 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:29 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:29 CLOSE TCP 192.168.2.8 64.233.161.107 1375 443 - -
- - - - - - -
2004-11-30 17:33:29 OPEN TCP 192.168.2.8 64.233.161.106 1378 443 - - -
- - - - - -
2004-11-30 17:33:36 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:37 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:44 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:50 CLOSE TCP 192.168.2.8 64.233.161.106 1378 443 - -
- - - - - - -
2004-11-30 17:33:51 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:58 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:59 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:34:05 OPEN UDP 192.168.2.8 192.168.1.3 1045 53 - - - - - - - - -
2004-11-30 17:34:05 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:34:06 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:34:07 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:34:09 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:34:13 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:34:14 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:34:20 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:34:28 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:34:35 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:34:42 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:34:50 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:34:57 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:05 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:06 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:08 OPEN TCP 192.168.2.8 64.233.161.107 1379 443 - - -
- - - - - -
2004-11-30 17:35:13 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:20 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:27 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:27 CLOSE UDP 192.168.2.8 192.168.1.3 1045 53 - - - - - - - - -
2004-11-30 17:35:28 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:29 CLOSE TCP 192.168.2.8 64.233.161.107 1379 443 - -
- - - - - - -
2004-11-30 17:35:29 OPEN TCP 192.168.2.8 64.233.161.106 1380 443 - - -
- - - - - -
2004-11-30 17:35:29 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:32 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:35 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:36 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:38 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:41 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:42 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:49 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:50 CLOSE TCP 192.168.2.8 64.233.161.106 1380 443 - -
- - - - - - -
2004-11-30 17:35:50 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:51 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:57 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:00 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:04 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:05 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:11 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:12 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:17 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:18 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:19 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:20 OPEN UDP 192.168.2.8 192.168.1.3 1045 53 - - - - - - - - -
2004-11-30 17:36:20 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:21 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:22 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:24 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:25 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:26 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:28 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:32 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:33 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:34 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:41 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:42 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:44 OPEN UDP 192.168.2.8 192.168.1.3 137 137 - - - - - - - - -
2004-11-30 17:36:49 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:53 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:56 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:57 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND

Desweiteren frage ich mich, ob er, wenn ich alles offen habe, mittels
VPN kommuniziert oder einfach dran vorbei. Ich nehme, wegen den
tcpdumps an, dass er schon verschlüsselt kommuniziert.

Vielen Dank für die Hilfe Tom

To Unsubscribe: send mail to majordomo(at)de.FreeBSD.org
with "unsubscribe de-bsd-questions" in the body of the message
Received on Tue 30 Nov 2004 - 17:48:08 CET

search this site