/testing/guestbin/swan-prep kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@west dynamic-iface-01]# ipsec start Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Redirecting to: /etc/init.d/ipsec start Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Starting pluto IKE daemon for IPsec: kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@west dynamic-iface-01]# /testing/pluto/bin/wait-until-pluto-started kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@west dynamic-iface-01]# ipsec auto --add west-east 002 added connection description "west-east" kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@west dynamic-iface-01]# ipsec auto --add float-east 002 added connection description "float-east" kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@west dynamic-iface-01]# ipsec auto --add west-float 002 added connection description "west-float" kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@west dynamic-iface-01]# echo "initdone" initdone kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@west dynamic-iface-01]# ipsec auto --up west-east 002 "west-east" #1: initiating Main Mode 102 "west-east" #1: STATE_MAIN_I1: initiate 104 "west-east" #1: STATE_MAIN_I2: sent MI2, expecting MR2 106 "west-east" #1: STATE_MAIN_I3: sent MI3, expecting MR3 002 "west-east" #1: Peer ID is ID_FQDN: '@east' 003 "west-east" #1: Authenticated using RSA 004 "west-east" #1: STATE_MAIN_I4: ISAKMP SA established {auth=RSA_SIG cipher=AES_CBC_256 integ=HMAC_SHA2_256 group=MODP2048} 002 "west-east" #2: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO {using isakmp#1 msgid:4a61b340 proposal=defaults pfsgroup=MODP2048} 115 "west-east" #2: STATE_QUICK_I1: initiate 004 "west-east" #2: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP=>0xc3611246 <0xb7ddbd8d xfrm=AES_CBC_128-HMAC_SHA1_96 NATOA=none NATD=none DPD=passive} kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@west dynamic-iface-01]# ip addr add 192.1.2.66/24 dev eth1 kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@west dynamic-iface-01]# /sbin/arping -c 1 -U -I eth1 192.1.2.66 ARPING 192.1.2.66 from 192.1.2.66 eth1 Sent 1 probes (1 broadcast(s)) Received 0 response(s) kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@west dynamic-iface-01]# ipsec auto --ready 002 listening for IKE messages 002 adding interface eth1/eth1 (esp-hw-offload not supported by kernel) 192.1.2.66:500 002 adding interface eth1/eth1 192.1.2.66:4500 003 two interfaces match "west-float" (eth1, eth1) 002 "west-float": terminating SAs using this connection 002 forgetting secrets 002 loading secrets from "/etc/ipsec.secrets" 002 loaded private key for keyid: PKK_RSA:AQOm9dY/4 kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@west dynamic-iface-01]# ipsec auto --up float-east 002 "float-east" #3: initiating Main Mode 102 "float-east" #3: STATE_MAIN_I1: initiate 104 "float-east" #3: STATE_MAIN_I2: sent MI2, expecting MR2 106 "float-east" #3: STATE_MAIN_I3: sent MI3, expecting MR3 002 "float-east" #3: Peer ID is ID_FQDN: '@east' 003 "float-east" #3: Authenticated using RSA 004 "float-east" #3: STATE_MAIN_I4: ISAKMP SA established {auth=RSA_SIG cipher=AES_CBC_256 integ=HMAC_SHA2_256 group=MODP2048} 002 "float-east" #4: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO {using isakmp#3 msgid:aecbb725 proposal=defaults pfsgroup=MODP2048} 115 "float-east" #4: STATE_QUICK_I1: initiate 004 "float-east" #4: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP=>0x34457ae7 <0xeed10ec8 xfrm=AES_CBC_128-HMAC_SHA1_96 NATOA=none NATD=none DPD=passive} kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@west dynamic-iface-01]# ip addr del 192.1.2.66/24 dev eth1 kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@west dynamic-iface-01]# ipsec auto --ready 002 listening for IKE messages 002 shutting down interface eth1/eth1 192.1.2.66:4500 002 shutting down interface eth1/eth1 192.1.2.66:500 002 "float-east" #4: deleting state (STATE_QUICK_I2) aged 0.152s and sending notification 005 "float-east" #4: ESP traffic information: in=0B out=0B 003 ERROR: "float-east" #4: sendto on eth1 to 192.1.2.23:500 failed in delete notify. Errno 22: Invalid argument 002 "float-east" #3: deleting state (STATE_MAIN_I4) aged 0.180s and sending notification 003 ERROR: "float-east" #3: sendto on eth1 to 192.1.2.23:500 failed in delete notify. Errno 22: Invalid argument 002 unroute-host output: Error: Peer netns reference is invalid. 002 unroute-host output: Error: Peer netns reference is invalid. 002 unroute-host output: Error: Peer netns reference is invalid. 002 unroute-host output: Error: Peer netns reference is invalid. 002 unroute-host output: Error: Peer netns reference is invalid. 002 unroute-host output: Error: Peer netns reference is invalid. 002 unroute-host output: Error: Peer netns reference is invalid. 002 unroute-host output: Error: Peer netns reference is invalid. 002 unroute-host output: Error: Peer netns reference is invalid. 002 unroute-host output: Error: Peer netns reference is invalid. 002 unroute-host output: Error: Peer netns reference is invalid. 002 unroute-host output: Error: Peer netns reference is invalid. 002 unroute-host output: Error: Peer netns reference is invalid. 002 unroute-host output: Error: Peer netns reference is invalid. 002 unroute-host output: Error: Peer netns reference is invalid. 002 "float-east": terminating SAs using this connection 002 forgetting secrets 002 loading secrets from "/etc/ipsec.secrets" 002 loaded private key for keyid: PKK_RSA:AQOm9dY/4 kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@west dynamic-iface-01]# ipsec auto --up west-float 002 "west-float" #5: initiating Main Mode 102 "west-float" #5: STATE_MAIN_I1: initiate 010 "west-float" #5: STATE_MAIN_I1: retransmission; will wait 15 seconds for response 010 "west-float" #5: STATE_MAIN_I1: retransmission; will wait 30 seconds for response kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@west dynamic-iface-01]# # wait for pending cleanups kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@west dynamic-iface-01]# sleep 30 kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@west dynamic-iface-01]# sleep 30 kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@west dynamic-iface-01]# echo done done kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@west dynamic-iface-01]# ../../pluto/bin/ipsec-look.sh ==== cut ==== start raw xfrm state: src 192.1.2.45/32 dst 192.1.2.23/32 \ dir out priority 1040351 ptype main \ tmpl src 192.1.2.45 dst 192.1.2.23\ proto esp reqid 16389 mode tunnel\ src 192.1.2.23/32 dst 192.1.2.45/32 \ dir fwd priority 1040351 ptype main \ tmpl src 192.1.2.23 dst 192.1.2.45\ proto esp reqid 16389 mode tunnel\ src 192.1.2.23/32 dst 192.1.2.45/32 \ dir in priority 1040351 ptype main \ tmpl src 192.1.2.23 dst 192.1.2.45\ proto esp reqid 16389 mode tunnel\ end raw xfrm state: ==== tuc ==== west Mon Aug 26 13:17:26 UTC 2019 XFRM state: src 192.1.2.23 dst 192.1.2.45 proto esp spi 0xb7ddbd8d reqid 16389 mode tunnel replay-window 32 flag af-unspec auth-trunc hmac(sha1) 0x7e7e6e3626e823214fbfa39ea70967e09dbe109f 96 enc cbc(aes) 0x25df3c5c2e4a33bb066cd5845e1900e9 anti-replay context: seq 0x0, oseq 0x0, bitmap 0x00000000 src 192.1.2.45 dst 192.1.2.23 proto esp spi 0xc3611246 reqid 16389 mode tunnel replay-window 32 flag af-unspec auth-trunc hmac(sha1) 0x55b56f56eb72c79bd8702026427b68c0df155d86 96 enc cbc(aes) 0xa69f39fc9fc45cf86bc883ad6128a85f anti-replay context: seq 0x0, oseq 0x2, bitmap 0x00000000 XFRM policy: src 192.1.2.23/32 dst 192.1.2.45/32 dir fwd priority 1040351 ptype main tmpl src 192.1.2.23 dst 192.1.2.45 proto esp reqid 16389 mode tunnel src 192.1.2.23/32 dst 192.1.2.45/32 dir in priority 1040351 ptype main tmpl src 192.1.2.23 dst 192.1.2.45 proto esp reqid 16389 mode tunnel src 192.1.2.45/32 dst 192.1.2.23/32 dir out priority 1040351 ptype main tmpl src 192.1.2.45 dst 192.1.2.23 proto esp reqid 16389 mode tunnel XFRM done IPSEC mangle TABLES NEW_IPSEC_CONN mangle TABLES ROUTING TABLES default via 192.1.2.254 dev eth1 192.0.1.0/24 dev eth0 proto kernel scope link src 192.0.1.254 192.0.2.0/24 via 192.1.2.23 dev eth1 192.1.2.0/24 dev eth1 proto kernel scope link src 192.1.2.45 NSS_CERTIFICATES Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@west dynamic-iface-01]# : ==== cut ==== kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@west dynamic-iface-01]# ipsec auto --status whack: is Pluto running? connect() for "/run/pluto/pluto.ctl" failed (111 Connection refused) kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@west dynamic-iface-01 33]# >>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 final.sh 'ipsec auto --status' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 final.sh 'if [ -f /sbin/ausearch ]; then ausearch -r -m avc -ts recent ; fi' <<<<<<<<<