--- west.console.txt 2019-08-24 18:12:56.115679494 +0000 +++ OUTPUT/west.console.txt 2019-08-26 13:21:58.737656369 +0000 @@ -3,6 +3,8 @@ west # ip route del default west # + ip route add default via 192.9.4.1 +Error: Nexthop has invalid gateway. west # certutil -D -n east -d sql:/etc/ipsec.d west # @@ -18,6 +20,7 @@ west # ipsec start Redirecting to: [initsystem] +changing /proc/sys/net/core/xfrm_acq_expires from 30 to 10 west # /testing/pluto/bin/wait-until-pluto-started west # @@ -35,13 +38,8 @@ west # ping -n -c 5 -I 192.1.2.45 192.1.2.23 PING 192.1.2.23 (192.1.2.23) from 192.1.2.45 : 56(84) bytes of data. -64 bytes from 192.1.2.23: icmp_seq=2 ttl=64 time=0.XXX ms -64 bytes from 192.1.2.23: icmp_seq=3 ttl=64 time=0.XXX ms -64 bytes from 192.1.2.23: icmp_seq=4 ttl=64 time=0.XXX ms -64 bytes from 192.1.2.23: icmp_seq=5 ttl=64 time=0.XXX ms --- 192.1.2.23 ping statistics --- -5 packets transmitted, 4 received, 20% packet loss, time XXXX -rtt min/avg/max/mdev = 0.XXX/0.XXX/0.XXX/0.XXX ms +5 packets transmitted, 0 received, 100% packet loss, time XXXX west # # wait on OE retransmits and rekeying west # @@ -50,7 +48,6 @@ # should show established tunnel and no bare shunts west # ipsec whack --trafficstatus -006 #2: "private#192.1.2.23/32"[1] ...192.1.2.23, type=ESP, add_time=1234567890, inBytes=336, outBytes=336, id='192.1.2.23' west # ipsec whack --shuntstatus 000 Bare Shunt list: @@ -60,14 +57,10 @@ west # ping -n -c 2 -I 192.1.2.45 192.1.2.23 PING 192.1.2.23 (192.1.2.23) from 192.1.2.45 : 56(84) bytes of data. -64 bytes from 192.1.2.23: icmp_seq=1 ttl=64 time=0.XXX ms -64 bytes from 192.1.2.23: icmp_seq=2 ttl=64 time=0.XXX ms --- 192.1.2.23 ping statistics --- -2 packets transmitted, 2 received, 0% packet loss, time XXXX -rtt min/avg/max/mdev = 0.XXX/0.XXX/0.XXX/0.XXX ms +2 packets transmitted, 0 received, 100% packet loss, time XXXX west # ipsec whack --trafficstatus -006 #2: "private#192.1.2.23/32"[1] ...192.1.2.23, type=ESP, add_time=1234567890, inBytes=504, outBytes=504, id='192.1.2.23' west # echo "waiting on east to send delete for this IPsec SA" waiting on east to send delete for this IPsec SA @@ -137,14 +130,6 @@ socket out priority 0 ptype main src 0.0.0.0/0 dst 0.0.0.0/0 socket in priority 0 ptype main -src 0.0.0.0/0 dst 0.0.0.0/0 - socket out priority 0 ptype main -src 0.0.0.0/0 dst 0.0.0.0/0 - socket in priority 0 ptype main -src 0.0.0.0/0 dst 0.0.0.0/0 - socket out priority 0 ptype main -src 0.0.0.0/0 dst 0.0.0.0/0 - socket in priority 0 ptype main west # ping -n -c 1 -I 192.1.2.45 192.1.2.23 PING 192.1.2.23 (192.1.2.23) from 192.1.2.45 : 56(84) bytes of data. @@ -156,28 +141,12 @@ sleep 5 west # ip xfrm state -src 192.1.2.23 dst 192.1.2.45 - proto esp spi 0xSPISPI reqid REQID mode tunnel - replay-window 32 flag af-unspec - aead rfc4106(gcm(aes)) 0xENCAUTHKEY 128 -src 192.1.2.45 dst 192.1.2.23 - proto esp spi 0xSPISPI reqid REQID mode tunnel - replay-window 32 flag af-unspec - aead rfc4106(gcm(aes)) 0xENCAUTHKEY 128 west # ip xfrm pol src 192.1.2.45/32 dst 192.1.2.23/32 dir out priority 1564639 ptype main - tmpl src 192.1.2.45 dst 192.1.2.23 - proto esp reqid 16441 mode tunnel -src 192.1.2.23/32 dst 192.1.2.45/32 - dir fwd priority 1564639 ptype main - tmpl src 192.1.2.23 dst 192.1.2.45 - proto esp reqid 16441 mode tunnel -src 192.1.2.23/32 dst 192.1.2.45/32 - dir in priority 1564639 ptype main - tmpl src 192.1.2.23 dst 192.1.2.45 - proto esp reqid 16441 mode tunnel + tmpl src 0.0.0.0 dst 0.0.0.0 + proto esp reqid 0 mode transport src 192.1.2.253/32 dst 192.1.2.45/32 dir fwd priority 1564639 ptype main src 192.1.2.253/32 dst 192.1.2.45/32 @@ -226,41 +195,28 @@ socket out priority 0 ptype main src 0.0.0.0/0 dst 0.0.0.0/0 socket in priority 0 ptype main -src 0.0.0.0/0 dst 0.0.0.0/0 - socket out priority 0 ptype main -src 0.0.0.0/0 dst 0.0.0.0/0 - socket in priority 0 ptype main -src 0.0.0.0/0 dst 0.0.0.0/0 - socket out priority 0 ptype main -src 0.0.0.0/0 dst 0.0.0.0/0 - socket in priority 0 ptype main west # # should show established tunnel and no bare shunts west # ipsec whack --trafficstatus -006 #4: "private#192.1.2.23/32"[2] ...192.1.2.23, type=ESP, add_time=1234567890, inBytes=0, outBytes=0, id='192.1.2.23' west # ipsec whack --shuntstatus 000 Bare Shunt list: 000 +000 192.1.2.45/32:8 -1-> 192.1.2.23/32:0 => %hold 0 %acquire-netlink west # # ping should succeed through tunnel west # ping -n -c 2 -I 192.1.2.45 192.1.2.23 PING 192.1.2.23 (192.1.2.23) from 192.1.2.45 : 56(84) bytes of data. -64 bytes from 192.1.2.23: icmp_seq=1 ttl=64 time=0.XXX ms -64 bytes from 192.1.2.23: icmp_seq=2 ttl=64 time=0.XXX ms --- 192.1.2.23 ping statistics --- -2 packets transmitted, 2 received, 0% packet loss, time XXXX -rtt min/avg/max/mdev = 0.XXX/0.XXX/0.XXX/0.XXX ms +2 packets transmitted, 0 received, 100% packet loss, time XXXX west # ipsec whack --trafficstatus -006 #4: "private#192.1.2.23/32"[2] ...192.1.2.23, type=ESP, add_time=1234567890, inBytes=168, outBytes=168, id='192.1.2.23' west # # both ends should show a tunnel west # ipsec whack --trafficstatus -006 #4: "private#192.1.2.23/32"[2] ...192.1.2.23, type=ESP, add_time=1234567890, inBytes=168, outBytes=168, id='192.1.2.23' west # west # ../bin/check-for-core.sh