/testing/guestbin/swan-prep --x509 Preparing X.509 files kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-poc-whack\[root@road certoe-03-poc-whack]# certutil -D -n road -d sql:/etc/ipsec.d kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-poc-whack\[root@road certoe-03-poc-whack]# certutil -D -n east -d sql:/etc/ipsec.d kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-poc-whack\[root@road certoe-03-poc-whack]# cp road-ikev2-oe.conf /etc/ipsec.d/ikev2-oe.conf kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-poc-whack\[root@road certoe-03-poc-whack]# cp policies/* /etc/ipsec.d/policies/ kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-poc-whack\[root@road certoe-03-poc-whack]# echo "192.1.2.0/24" >> /etc/ipsec.d/policies/private-or-clear kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-poc-whack\[root@road certoe-03-poc-whack]# ipsec start Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Redirecting to: /etc/init.d/ipsec start Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Starting pluto IKE daemon for IPsec: kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-poc-whack\[root@road certoe-03-poc-whack]# /testing/pluto/bin/wait-until-pluto-started kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-poc-whack\[root@road certoe-03-poc-whack]# ipsec whack --impair suppress-retransmits kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-poc-whack\[root@road certoe-03-poc-whack]# # ensure for tests acquires expire before our failureshunt=2m kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-poc-whack\[root@road certoe-03-poc-whack]# echo 30 > /proc/sys/net/core/xfrm_acq_expires kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-poc-whack\[root@road certoe-03-poc-whack]# # give OE policies time to load kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-poc-whack\[root@road certoe-03-poc-whack]# sleep 5 kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-poc-whack\[root@road certoe-03-poc-whack]# ip -s xfrm monitor > /tmp/xfrm-monitor.out & [1] 29644 kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-poc-whack\[root@road certoe-03-poc-whack]# echo "initdone" initdone kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-poc-whack\[root@road certoe-03-poc-whack]# #secret sauce whack vs packet triggred. kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-poc-whack\[root@road certoe-03-poc-whack]# ipsec whack --oppohere 192.1.3.209 --oppothere 192.1.2.23 002 initiate on demand from 192.1.3.209:0 to 192.1.2.23:0 proto=0 because: whack 181 "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #1: initiate 002 "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23: constructed local IKE proposals for private-or-clear#192.1.2.0/24 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 002 "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #1: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds 002 "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23: constructed local ESP/AH proposals for private-or-clear#192.1.2.0/24 (IKE SA initiator emitting ESP/AH proposals): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 002 "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds 003 "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: Certificate E=testing@libreswan.org,CN=Libreswan test CA for mainca,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA failed IPsec verification 003 "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: ERROR: The certificate was signed using a signature algorithm that is disabled because it is not secure. 002 "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: X509: Certificate rejected for this connection 002 "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: X509: CERT payload bogus or revoked 036 "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: encountered fatal error in state STATE_PARENT_I2 kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-poc-whack\[root@road certoe-03-poc-whack 36]# >>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 36 roadrun.sh 'ipsec whack --oppohere 192.1.3.209 --oppothere 192.1.2.23' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 36 roadrun.sh '# wait on OE retransmits and rekeying' <<<<<<<<< /tmp/xfrm-monitor.out kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-poc-whack\[root@road certoe-03-poc-whack]# # should show established tunnel and no bare shunts kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-poc-whack\[root@road certoe-03-poc-whack]# ipsec whack --trafficstatus kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-poc-whack\[root@road certoe-03-poc-whack]# ipsec whack --shuntstatus 000 Bare Shunt list: 000 kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-poc-whack\[root@road certoe-03-poc-whack]# ../../pluto/bin/ipsec-look.sh ==== cut ==== start raw xfrm state: src 192.1.3.209/32 dst 192.1.2.0/24 \ dir out priority 1564647 ptype main \ tmpl src 0.0.0.0 dst 0.0.0.0\ proto esp reqid 0 mode transport\ src 192.1.2.253/32 dst 192.1.3.209/32 \ dir fwd priority 1564639 ptype main \ src 192.1.2.253/32 dst 192.1.3.209/32 \ dir in priority 1564639 ptype main \ src 192.1.3.209/32 dst 192.1.2.253/32 \ dir out priority 1564639 ptype main \ src 192.1.3.253/32 dst 192.1.3.209/32 \ dir fwd priority 1564639 ptype main \ src 192.1.3.253/32 dst 192.1.3.209/32 \ dir in priority 1564639 ptype main \ src 192.1.3.209/32 dst 192.1.3.253/32 \ dir out priority 1564639 ptype main \ src 192.1.3.254/32 dst 192.1.3.209/32 \ dir fwd priority 1564639 ptype main \ src 192.1.3.254/32 dst 192.1.3.209/32 \ dir in priority 1564639 ptype main \ src 192.1.3.209/32 dst 192.1.3.254/32 \ dir out priority 1564639 ptype main \ src 192.1.2.254/32 dst 192.1.3.209/32 \ dir fwd priority 1564639 ptype main \ src 192.1.2.254/32 dst 192.1.3.209/32 \ dir in priority 1564639 ptype main \ src 192.1.3.209/32 dst 192.1.2.254/32 \ dir out priority 1564639 ptype main \ src 0.0.0.0/0 dst 0.0.0.0/0 \ socket out priority 0 ptype main \ src 0.0.0.0/0 dst 0.0.0.0/0 \ socket in priority 0 ptype main \ src 0.0.0.0/0 dst 0.0.0.0/0 \ socket out priority 0 ptype main \ src 0.0.0.0/0 dst 0.0.0.0/0 \ socket in priority 0 ptype main \ src 0.0.0.0/0 dst 0.0.0.0/0 \ socket out priority 0 ptype main \ src 0.0.0.0/0 dst 0.0.0.0/0 \ socket in priority 0 ptype main \ src 0.0.0.0/0 dst 0.0.0.0/0 \ socket out priority 0 ptype main \ src 0.0.0.0/0 dst 0.0.0.0/0 \ socket in priority 0 ptype main \ end raw xfrm state: ==== tuc ==== road Mon Aug 26 13:19:22 UTC 2019 XFRM state: src 192.1.2.23 dst 192.1.3.209 proto esp spi 0x7e2c8db8 reqid 16437 mode tunnel replay-window 0 anti-replay context: seq 0x0, oseq 0x0, bitmap 0x00000000 sel src 192.1.2.23/32 dst 192.1.3.209/32 XFRM policy: src 192.1.2.253/32 dst 192.1.3.209/32 dir fwd priority 1564639 ptype main src 192.1.2.253/32 dst 192.1.3.209/32 dir in priority 1564639 ptype main src 192.1.2.254/32 dst 192.1.3.209/32 dir fwd priority 1564639 ptype main src 192.1.2.254/32 dst 192.1.3.209/32 dir in priority 1564639 ptype main src 192.1.3.209/32 dst 192.1.2.253/32 dir out priority 1564639 ptype main src 192.1.3.209/32 dst 192.1.2.254/32 dir out priority 1564639 ptype main src 192.1.3.209/32 dst 192.1.3.253/32 dir out priority 1564639 ptype main src 192.1.3.209/32 dst 192.1.3.254/32 dir out priority 1564639 ptype main src 192.1.3.253/32 dst 192.1.3.209/32 dir fwd priority 1564639 ptype main src 192.1.3.253/32 dst 192.1.3.209/32 dir in priority 1564639 ptype main src 192.1.3.254/32 dst 192.1.3.209/32 dir fwd priority 1564639 ptype main src 192.1.3.254/32 dst 192.1.3.209/32 dir in priority 1564639 ptype main src 192.1.3.209/32 dst 192.1.2.0/24 dir out priority 1564647 ptype main tmpl src 0.0.0.0 dst 0.0.0.0 proto esp reqid 0 mode transport XFRM done IPSEC mangle TABLES NEW_IPSEC_CONN mangle TABLES ROUTING TABLES default via 192.1.3.254 dev eth0 192.1.3.0/24 dev eth0 proto kernel scope link src 192.1.3.209 NSS_CERTIFICATES Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI Libreswan test CA for mainca - Libreswan CT,, east-ec P,, hashsha1 P,, nic P,, north P,, west P,, west-ec P,, kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-poc-whack\[root@road certoe-03-poc-whack]# killall ip > /dev/null 2> /dev/null kroot@swantest:/home/build/libreswan/testing/pluto/certoe-03-poc-whack\[root@road certoe-03-poc-whack 1]# >>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 roadrun.sh 'killall ip > /dev/null 2> /dev/null' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 roadrun.sh 'ping -n -c 2 -I 192.1.3.209 192.1.2.23' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 roadrun.sh 'ipsec whack --trafficstatus' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 final.sh 'ipsec whack --trafficstatus' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 final.sh '# A tunnel should have established' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 final.sh 'grep "negotiated connection" /tmp/pluto.log' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 final.sh '# you should see both RSA and NULL' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 final.sh 'ipsec auto --status' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 final.sh 'if [ -f /sbin/ausearch ]; then ausearch -r -m avc -ts recent ; fi' <<<<<<<<<