--- road.console.txt 2019-08-24 18:12:56.169677590 +0000 +++ OUTPUT/road.console.txt 2019-08-26 13:10:00.331808834 +0000 @@ -34,6 +34,7 @@ 1v2 "road-east-x509-ipv4"[1] 192.1.2.23 #2: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048} 002 "road-east-x509-ipv4"[1] 192.1.2.23 #2: certificate verified OK: E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA 002 "road-east-x509-ipv4"[1] 192.1.2.23 #2: IKEv2 mode peer ID is ID_DER_ASN1_DN: 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' +003 "road-east-x509-ipv4"[1] 192.1.2.23 #2: Authenticated using RSA 002 "road-east-x509-ipv4"[1] 192.1.2.23 #2: received INTERNAL_IP4_ADDRESS 192.0.2.100 002 "road-east-x509-ipv4"[1] 192.1.2.23 #2: negotiated connection [192.0.2.100-192.0.2.100:0-65535 0] -> [192.0.2.0-192.0.2.255:0-65535 0] 004 "road-east-x509-ipv4"[1] 192.1.2.23 #2: STATE_V2_IPSEC_I: IPsec SA established tunnel mode {ESP/NAT=>0xESPESP <0xESPESP xfrm=AES_GCM_16_256-NONE NATOA=none NATD=192.1.2.23:4500 DPD=passive} @@ -61,6 +62,7 @@ 1v2 "road-west-x509-ipv4"[1] 192.1.2.45 #4: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048} 002 "road-west-x509-ipv4"[1] 192.1.2.45 #4: certificate verified OK: E=user-west@testing.libreswan.org,CN=west.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA 002 "road-west-x509-ipv4"[1] 192.1.2.45 #4: IKEv2 mode peer ID is ID_DER_ASN1_DN: 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=west.testing.libreswan.org, E=user-west@testing.libreswan.org' +003 "road-west-x509-ipv4"[1] 192.1.2.45 #4: Authenticated using RSA 002 "road-west-x509-ipv4"[1] 192.1.2.45 #4: received INTERNAL_IP4_ADDRESS 192.0.2.100 002 "road-west-x509-ipv4"[1] 192.1.2.45 #4: negotiated connection [192.0.2.100-192.0.2.100:0-65535 0] -> [192.0.1.0-192.0.1.255:0-65535 0] 004 "road-west-x509-ipv4"[1] 192.1.2.45 #4: STATE_V2_IPSEC_I: IPsec SA established tunnel mode {ESP/NAT=>0xESPESP <0xESPESP xfrm=AES_GCM_16_256-NONE NATOA=none NATD=192.1.2.45:4500 DPD=passive}