/testing/guestbin/swan-prep --x509 Preparing X.509 files kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-cop-whack\[root@road certoe-03-cop-whack]# certutil -D -n road -d sql:/etc/ipsec.d kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-cop-whack\[root@road certoe-03-cop-whack]# certutil -D -n east -d sql:/etc/ipsec.d kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-cop-whack\[root@road certoe-03-cop-whack]# cp road-ikev2-oe.conf /etc/ipsec.d/ikev2-oe.conf kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-cop-whack\[root@road certoe-03-cop-whack]# cp policies/* /etc/ipsec.d/policies/ kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-cop-whack\[root@road certoe-03-cop-whack]# echo "192.1.2.0/24" >> /etc/ipsec.d/policies/private-or-clear kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-cop-whack\[root@road certoe-03-cop-whack]# ipsec start Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Redirecting to: /etc/init.d/ipsec start Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Starting pluto IKE daemon for IPsec: kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-cop-whack\[root@road certoe-03-cop-whack]# /testing/pluto/bin/wait-until-pluto-started kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-cop-whack\[root@road certoe-03-cop-whack]# ipsec whack --impair suppress-retransmits kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-cop-whack\[root@road certoe-03-cop-whack]# # ensure for tests acquires expire before our failureshunt=2m kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-cop-whack\[root@road certoe-03-cop-whack]# echo 30 > /proc/sys/net/core/xfrm_acq_expires kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-cop-whack\[root@road certoe-03-cop-whack]# # give OE policies time to load kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-cop-whack\[root@road certoe-03-cop-whack]# sleep 5 kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-cop-whack\[root@road certoe-03-cop-whack]# ip -s xfrm monitor > /tmp/xfrm-monitor.out & [1] 29527 kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-cop-whack\[root@road certoe-03-cop-whack]# echo "initdone" initdone kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-cop-whack\[root@road certoe-03-cop-whack]# # secret sauce whack vs packet triggred. kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-cop-whack\[root@road certoe-03-cop-whack]# ipsec whack --oppohere 192.1.3.209 --oppothere 192.1.2.23 002 initiate on demand from 192.1.3.209:0 to 192.1.2.23:0 proto=0 because: whack 181 "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #1: initiate 002 "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23: constructed local IKE proposals for private-or-clear#192.1.2.0/24 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 002 "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #1: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds 002 "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23: constructed local ESP/AH proposals for private-or-clear#192.1.2.0/24 (IKE SA initiator emitting ESP/AH proposals): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 002 "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds 003 "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: Certificate E=testing@libreswan.org,CN=Libreswan test CA for mainca,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA failed IPsec verification 003 "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: ERROR: The certificate was signed using a signature algorithm that is disabled because it is not secure. 002 "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: X509: Certificate rejected for this connection 002 "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: X509: CERT payload bogus or revoked 036 "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: encountered fatal error in state STATE_PARENT_I2 kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-cop-whack\[root@road certoe-03-cop-whack 36]# >>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 36 roadrun.sh 'ipsec whack --oppohere 192.1.3.209 --oppothere 192.1.2.23' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 36 roadrun.sh '# wait on OE retransmits and rekeying' <<<<<<<<< /dev/null 2> /dev/null [1]+ Terminated ip -s xfrm monitor > /tmp/xfrm-monitor.out kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-cop-whack\[root@road certoe-03-cop-whack]# cp /tmp/xfrm-monitor.out OUTPUT/road.xfrm-monitor.txt kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-cop-whack\[root@road certoe-03-cop-whack]# # ping should succeed through tunnel kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-cop-whack\[root@road certoe-03-cop-whack]# ping -n -c 2 -I 192.1.3.209 192.1.2.23 PING 192.1.2.23 (192.1.2.23) from 192.1.3.209 : 56(84) bytes of data. --- 192.1.2.23 ping statistics --- 2 packets transmitted, 0 received, 100% packet loss, time 4ms kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-cop-whack\[root@road certoe-03-cop-whack 1]# >>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 roadrun.sh 'ping -n -c 2 -I 192.1.3.209 192.1.2.23' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 roadrun.sh 'ipsec whack --trafficstatus' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 final.sh 'ipsec whack --trafficstatus' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 final.sh 'grep "negotiated connection" /tmp/pluto.log' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 final.sh '# you should see both RSA and NULL' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 final.sh 'ipsec auto --status' <<<<<<<<<