--- north.console.txt 2019-08-24 18:12:56.106679811 +0000 +++ OUTPUT/north.console.txt 2019-08-26 13:21:37.633395262 +0000 @@ -43,18 +43,14 @@ north # ping -n -c 2 -I 192.1.3.33 192.1.2.23 PING 192.1.2.23 (192.1.2.23) from 192.1.3.33 : 56(84) bytes of data. -64 bytes from 192.1.2.23: icmp_seq=1 ttl=64 time=0.XXX ms -64 bytes from 192.1.2.23: icmp_seq=2 ttl=64 time=0.XXX ms --- 192.1.2.23 ping statistics --- -2 packets transmitted, 2 received, 0% packet loss, time XXXX -rtt min/avg/max/mdev = 0.XXX/0.XXX/0.XXX/0.XXX ms +2 packets transmitted, 0 received, 100% packet loss, time XXXX north # # ping should succeed through tunnel north # # should show established tunnel and no bare shunts north # ipsec whack --trafficstatus -006 #2: "private-or-clear#192.1.2.0/24"[1] 10.0.10.1/32=== ...192.1.2.23, type=ESP, add_time=1234567890, inBytes=168, outBytes=168, id='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org', lease=10.0.10.1/32 north # ipsec whack --shuntstatus 000 Bare Shunt list: @@ -65,31 +61,13 @@ XFRM state: src 192.1.2.23 dst 192.1.3.33 proto esp spi 0xSPISPI reqid REQID mode tunnel - replay-window 32 flag af-unspec - aead rfc4106(gcm(aes)) 0xENCAUTHKEY 128 - encap type espinudp sport 4500 dport 4500 addr 0.0.0.0 -src 192.1.3.33 dst 192.1.2.23 - proto esp spi 0xSPISPI reqid REQID mode tunnel - replay-window 32 flag af-unspec - aead rfc4106(gcm(aes)) 0xENCAUTHKEY 128 - encap type espinudp sport 4500 dport 4500 addr 0.0.0.0 + replay-window 0 + sel src 192.1.2.23/32 dst 192.1.3.33/32 src 192.1.3.33 dst 192.1.2.23 proto esp spi 0xSPISPI reqid REQID mode transport replay-window 0 sel src 192.1.3.33/32 dst 192.1.2.23/32 proto icmp type 8 code 0 dev eth1 XFRM policy: -src 10.0.10.1/32 dst 192.1.2.23/32 - dir out priority 1564639 ptype main - tmpl src 192.1.3.33 dst 192.1.2.23 - proto esp reqid REQID mode tunnel -src 192.1.2.23/32 dst 10.0.10.1/32 - dir fwd priority 1564639 ptype main - tmpl src 192.1.2.23 dst 192.1.3.33 - proto esp reqid REQID mode tunnel -src 192.1.2.23/32 dst 10.0.10.1/32 - dir in priority 1564639 ptype main - tmpl src 192.1.2.23 dst 192.1.3.33 - proto esp reqid REQID mode tunnel src 192.1.2.253/32 dst 192.1.3.33/32 dir fwd priority 1564639 ptype main src 192.1.2.253/32 dst 192.1.3.33/32 @@ -102,10 +80,6 @@ dir fwd priority 1564639 ptype main src 192.1.3.254/32 dst 192.1.3.33/32 dir in priority 1564639 ptype main -src 192.1.3.33/32 dst 192.1.2.23/32 - dir out priority 1564639 ptype main - tmpl src 192.1.3.33 dst 192.1.2.23 - proto esp reqid REQID mode tunnel src 192.1.3.33/32 dst 192.1.2.253/32 dir out priority 1564639 ptype main src 192.1.3.33/32 dst 192.1.3.253/32 @@ -116,6 +90,8 @@ dir out priority 1564647 ptype main tmpl src 0.0.0.0 dst 0.0.0.0 proto esp reqid REQID mode transport +src 192.1.3.33/32 dst 192.1.2.23/32 + dir out priority 1564647 ptype main XFRM done IPSEC mangle TABLES NEW_IPSEC_CONN mangle TABLES @@ -136,14 +112,12 @@ iptables -t nat -L -n Chain PREROUTING (policy ACCEPT) target prot opt source destination -DNAT all -- 192.1.2.23 10.0.10.1 policy match dir in pol ipsec to:192.1.3.33 Chain INPUT (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination Chain POSTROUTING (policy ACCEPT) target prot opt source destination -SNAT all -- 0.0.0.0/0 192.1.2.23 policy match dir out pol ipsec to:10.0.10.1 north # echo done done @@ -155,48 +129,27 @@ north # ping -n -c 4 192.1.2.23 PING 192.1.2.23 (192.1.2.23) 56(84) bytes of data. -64 bytes from 192.1.2.23: icmp_seq=1 ttl=64 time=0.XXX ms -64 bytes from 192.1.2.23: icmp_seq=2 ttl=64 time=0.XXX ms -64 bytes from 192.1.2.23: icmp_seq=3 ttl=64 time=0.XXX ms -64 bytes from 192.1.2.23: icmp_seq=4 ttl=64 time=0.XXX ms --- 192.1.2.23 ping statistics --- -4 packets transmitted, 4 received, 0% packet loss, time XXXX -rtt min/avg/max/mdev = 0.XXX/0.XXX/0.XXX/0.XXX ms +4 packets transmitted, 0 received, 100% packet loss, time XXXX north # # jacob two two for east? north # ipsec whack --trafficstatus -006 #2: "private-or-clear#192.1.2.0/24"[1] 10.0.10.1/32=== ...192.1.2.23, type=ESP, add_time=1234567890, inBytes=504, outBytes=504, id='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org', lease=10.0.10.1/32 north # ipsec whack --trafficstatus -006 #2: "private-or-clear#192.1.2.0/24"[1] 10.0.10.1/32=== ...192.1.2.23, type=ESP, add_time=1234567890, inBytes=504, outBytes=504, id='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org', lease=10.0.10.1/32 north # ../../pluto/bin/ipsec-look.sh | sed "s/\(.\)port [0-9][0-9][0-9][0-9] /\1port XXXX /g" north NOW XFRM state: -src 192.1.2.23 dst 192.1.3.33 - proto esp spi 0xSPISPI reqid REQID mode tunnel - replay-window 32 flag af-unspec - aead rfc4106(gcm(aes)) 0xENCAUTHKEY 128 - encap type espinudp sport XXXX dport XXXX addr 0.0.0.0 src 192.1.3.33 dst 192.1.2.23 + proto esp spi 0xSPISPI reqid REQID mode transport + replay-window 0 + sel src 192.1.3.33/32 dst 192.1.2.23/32 proto udp sport SPORT dport XXXX dev eth1 +src 192.1.2.23 dst 192.1.3.33 proto esp spi 0xSPISPI reqid REQID mode tunnel - replay-window 32 flag af-unspec - aead rfc4106(gcm(aes)) 0xENCAUTHKEY 128 - encap type espinudp sport XXXX dport XXXX addr 0.0.0.0 + replay-window 0 + sel src 192.1.2.23/32 dst 192.1.3.33/32 XFRM policy: -src 10.0.10.1/32 dst 192.1.2.23/32 - dir out priority 1564639 ptype main - tmpl src 192.1.3.33 dst 192.1.2.23 - proto esp reqid REQID mode tunnel -src 192.1.2.23/32 dst 10.0.10.1/32 - dir fwd priority 1564639 ptype main - tmpl src 192.1.2.23 dst 192.1.3.33 - proto esp reqid REQID mode tunnel -src 192.1.2.23/32 dst 10.0.10.1/32 - dir in priority 1564639 ptype main - tmpl src 192.1.2.23 dst 192.1.3.33 - proto esp reqid REQID mode tunnel src 192.1.2.253/32 dst 192.1.3.33/32 dir fwd priority 1564639 ptype main src 192.1.2.253/32 dst 192.1.3.33/32 @@ -209,10 +162,6 @@ dir fwd priority 1564639 ptype main src 192.1.3.254/32 dst 192.1.3.33/32 dir in priority 1564639 ptype main -src 192.1.3.33/32 dst 192.1.2.23/32 - dir out priority 1564639 ptype main - tmpl src 192.1.3.33 dst 192.1.2.23 - proto esp reqid REQID mode tunnel src 192.1.3.33/32 dst 192.1.2.253/32 dir out priority 1564639 ptype main src 192.1.3.33/32 dst 192.1.3.253/32 @@ -223,6 +172,8 @@ dir out priority 1564647 ptype main tmpl src 0.0.0.0 dst 0.0.0.0 proto esp reqid REQID mode transport +src 192.1.3.33/32 dst 192.1.2.23/32 + dir out priority 1564647 ptype main XFRM done IPSEC mangle TABLES NEW_IPSEC_CONN mangle TABLES @@ -245,6 +196,8 @@ grep IKEv2_AUTH_ /tmp/pluto.log | auth method: IKEv2_AUTH_NULL (0xd) | auth method: IKEv2_AUTH_RSA (0x1) +| auth method: IKEv2_AUTH_NULL (0xd) +| auth method: IKEv2_AUTH_RSA (0x1) north # north # ../bin/check-for-core.sh