/testing/guestbin/swan-prep --x509 Preparing X.509 files west # # ensure that clear text does not get through west # iptables -A INPUT -i eth1 -s 192.0.2.0/24 -j DROP west # iptables -I INPUT -m policy --dir in --pol ipsec -j ACCEPT west # ipsec start Redirecting to: [initsystem] west # /testing/pluto/bin/wait-until-pluto-started west # ipsec auto --add west 002 added connection description "west" west # echo "initdone" initdone west # ipsec whack --impair suppress-retransmits west # ipsec auto --up west 002 "west" #1: initiating v2 parent SA 1v2 "west" #1: initiate 1v2 "west" #1: STATE_PARENT_I1: sent v2I1, expected v2R1 003 "west" #1: Can't find the certificate or private key from the NSS CKA_ID 003 "west" #1: Failed to find our RSA key 002 "west" #3: initiating v2 parent SA to replace #1 1v2 "west" #3: STATE_PARENT_I0: initiate, replacing #1 002 "west" #1: deleting state (STATE_PARENT_I2) and NOT sending notification 1v2 "west" #3: STATE_PARENT_I1: sent v2I1, expected v2R1 003 "west" #3: Can't find the certificate or private key from the NSS CKA_ID 003 "west" #3: Failed to find our RSA key west # ping -n -c 2 -I 192.0.1.254 192.0.2.254 PING 192.0.2.254 (192.0.2.254) from 192.0.1.254 : 56(84) bytes of data. --- 192.0.2.254 ping statistics --- 2 packets transmitted, 0 received, 100% packet loss, time XXXX west # sleep 50 west # ping -n -c 2 -I 192.0.1.254 192.0.2.254 PING 192.0.2.254 (192.0.2.254) from 192.0.1.254 : 56(84) bytes of data. --- 192.0.2.254 ping statistics --- 2 packets transmitted, 0 received, 100% packet loss, time XXXX west # grep reauthentication /tmp/pluto.log west # echo done done west # ipsec whack --trafficstatus whack: is Pluto running? connect() for "/run/pluto/pluto.ctl" failed (111 Connection refused) west # ipsec status | grep "STATE_" whack: is Pluto running? connect() for "/run/pluto/pluto.ctl" failed (111 Connection refused) west # west # ../bin/check-for-core.sh west # if [ -f /sbin/ausearch ]; then ausearch -r -m avc -ts recent ; fi