/testing/guestbin/swan-prep --x509 Preparing X.509 files east # ip route del default east # east # certutil -D -n west -d sql:/etc/ipsec.d east # cp east-ikev2-oe.conf /etc/ipsec.d/ikev2-oe.conf east # cp policies/* /etc/ipsec.d/policies/ east # echo "192.1.2.45/32" >> /etc/ipsec.d/policies/private east # restorecon -R /etc/ipsec.d east # ipsec start Redirecting to: [initsystem] east # /testing/pluto/bin/wait-until-pluto-started east # ipsec whack --impair suppress-retransmits east # # give OE policies time to load east # sleep 5 east # echo "initdone" initdone east # # confirm tunnel is up east # ipsec whack --trafficstatus 006 #2: "private#192.1.2.45/32"[1] ...192.1.2.45, type=ESP, add_time=1234567890, inBytes=504, outBytes=504, id='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=west.testing.libreswan.org, E=user-west@testing.libreswan.org' east # # east sends a delete by restarting east # ipsec restart Redirecting to: [initsystem] east # # give OE conns time to load east # sleep 5 east # # should be empty east # ipsec status |grep STATE_ east # echo waiting on west to re-initiate waiting on west to re-initiate east # # both ends should show a tunnel east # ipsec whack --trafficstatus 006 #2: "private#192.1.2.45/32"[1] ...192.1.2.45, type=ESP, add_time=1234567890, inBytes=168, outBytes=168, id='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=west.testing.libreswan.org, E=user-west@testing.libreswan.org' east # east # ../bin/check-for-core.sh east # if [ -f /sbin/ausearch ]; then ausearch -r -m avc -ts recent ; fi