/testing/guestbin/swan-prep kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@east dynamic-iface-01]# ipsec start Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Redirecting to: /etc/init.d/ipsec start Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Starting pluto IKE daemon for IPsec: kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@east dynamic-iface-01]# /testing/pluto/bin/wait-until-pluto-started kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@east dynamic-iface-01]# ipsec auto --add west-east 002 added connection description "west-east" kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@east dynamic-iface-01]# ipsec auto --add float-east 002 added connection description "float-east" kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@east dynamic-iface-01]# ipsec auto --add west-float 002 added connection description "west-float" kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@east dynamic-iface-01]# echo "initdone" initdone kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@east dynamic-iface-01]# ../../pluto/bin/ipsec-look.sh ==== cut ==== start raw xfrm state: src 192.1.2.23/32 dst 192.1.2.66/32 \ dir out priority 1040351 ptype main \ tmpl src 192.1.2.23 dst 192.1.2.66\ proto esp reqid 16393 mode tunnel\ src 192.1.2.66/32 dst 192.1.2.23/32 \ dir fwd priority 1040351 ptype main \ tmpl src 192.1.2.66 dst 192.1.2.23\ proto esp reqid 16393 mode tunnel\ src 192.1.2.66/32 dst 192.1.2.23/32 \ dir in priority 1040351 ptype main \ tmpl src 192.1.2.66 dst 192.1.2.23\ proto esp reqid 16393 mode tunnel\ src 192.1.2.23/32 dst 192.1.2.45/32 \ dir out priority 1040351 ptype main \ tmpl src 192.1.2.23 dst 192.1.2.45\ proto esp reqid 16389 mode tunnel\ src 192.1.2.45/32 dst 192.1.2.23/32 \ dir fwd priority 1040351 ptype main \ tmpl src 192.1.2.45 dst 192.1.2.23\ proto esp reqid 16389 mode tunnel\ src 192.1.2.45/32 dst 192.1.2.23/32 \ dir in priority 1040351 ptype main \ tmpl src 192.1.2.45 dst 192.1.2.23\ proto esp reqid 16389 mode tunnel\ end raw xfrm state: ==== tuc ==== east Mon Aug 26 13:17:26 UTC 2019 XFRM state: src 192.1.2.66 dst 192.1.2.23 proto esp spi 0x34457ae7 reqid 16393 mode tunnel replay-window 32 flag af-unspec auth-trunc hmac(sha1) 0x3cb2956c4d44637bce54342d0efe5bef9624752c 96 enc cbc(aes) 0x974b382a353a0583f48770a211bc4295 anti-replay context: seq 0x0, oseq 0x0, bitmap 0x00000000 src 192.1.2.23 dst 192.1.2.66 proto esp spi 0xeed10ec8 reqid 16393 mode tunnel replay-window 32 flag af-unspec auth-trunc hmac(sha1) 0x3cf9854ca95e1188c3c4e1cd898770968ea4fb3b 96 enc cbc(aes) 0xa2d6ba22fa344eee502c9c0a53eb7a19 anti-replay context: seq 0x0, oseq 0x0, bitmap 0x00000000 src 192.1.2.45 dst 192.1.2.23 proto esp spi 0xc3611246 reqid 16389 mode tunnel replay-window 32 flag af-unspec auth-trunc hmac(sha1) 0x55b56f56eb72c79bd8702026427b68c0df155d86 96 enc cbc(aes) 0xa69f39fc9fc45cf86bc883ad6128a85f anti-replay context: seq 0x2, oseq 0x0, bitmap 0x00000003 src 192.1.2.23 dst 192.1.2.45 proto esp spi 0xb7ddbd8d reqid 16389 mode tunnel replay-window 32 flag af-unspec auth-trunc hmac(sha1) 0x7e7e6e3626e823214fbfa39ea70967e09dbe109f 96 enc cbc(aes) 0x25df3c5c2e4a33bb066cd5845e1900e9 anti-replay context: seq 0x0, oseq 0x0, bitmap 0x00000000 XFRM policy: src 192.1.2.23/32 dst 192.1.2.45/32 dir out priority 1040351 ptype main tmpl src 192.1.2.23 dst 192.1.2.45 proto esp reqid 16389 mode tunnel src 192.1.2.23/32 dst 192.1.2.66/32 dir out priority 1040351 ptype main tmpl src 192.1.2.23 dst 192.1.2.66 proto esp reqid 16393 mode tunnel src 192.1.2.45/32 dst 192.1.2.23/32 dir fwd priority 1040351 ptype main tmpl src 192.1.2.45 dst 192.1.2.23 proto esp reqid 16389 mode tunnel src 192.1.2.45/32 dst 192.1.2.23/32 dir in priority 1040351 ptype main tmpl src 192.1.2.45 dst 192.1.2.23 proto esp reqid 16389 mode tunnel src 192.1.2.66/32 dst 192.1.2.23/32 dir fwd priority 1040351 ptype main tmpl src 192.1.2.66 dst 192.1.2.23 proto esp reqid 16393 mode tunnel src 192.1.2.66/32 dst 192.1.2.23/32 dir in priority 1040351 ptype main tmpl src 192.1.2.66 dst 192.1.2.23 proto esp reqid 16393 mode tunnel XFRM done IPSEC mangle TABLES NEW_IPSEC_CONN mangle TABLES ROUTING TABLES default via 192.1.2.254 dev eth1 192.0.1.0/24 via 192.1.2.45 dev eth1 192.0.2.0/24 dev eth0 proto kernel scope link src 192.0.2.254 192.1.2.0/24 dev eth1 proto kernel scope link src 192.1.2.23 NSS_CERTIFICATES Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@east dynamic-iface-01]# : ==== cut ==== kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@east dynamic-iface-01]# ipsec auto --status whack: is Pluto running? connect() for "/run/pluto/pluto.ctl" failed (111 Connection refused) kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@east dynamic-iface-01 33]# >>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 final.sh 'ipsec auto --status' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 final.sh 'if [ -f /sbin/ausearch ]; then ausearch -r -m avc -ts recent ; fi' <<<<<<<<<