/testing/guestbin/swan-prep kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-ecdsa-01\[root@west ikev2-ecdsa-01]# # confirm that the network is alive kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-ecdsa-01\[root@west ikev2-ecdsa-01]# ../../pluto/bin/wait-until-alive -I 192.0.1.254 192.0.2.254 destination -I 192.0.1.254 192.0.2.254 is alive kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-ecdsa-01\[root@west ikev2-ecdsa-01]# # ensure that clear text does not get through kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-ecdsa-01\[root@west ikev2-ecdsa-01]# iptables -A INPUT -i eth1 -s 192.0.2.0/24 -j LOGDROP kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-ecdsa-01\[root@west ikev2-ecdsa-01]# iptables -I INPUT -m policy --dir in --pol ipsec -j ACCEPT kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-ecdsa-01\[root@west ikev2-ecdsa-01]# # confirm clear text does not get through kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-ecdsa-01\[root@west ikev2-ecdsa-01]# ../../pluto/bin/ping-once.sh --down -I 192.0.1.254 192.0.2.254 ==== cut ==== ping -q -n -c 1 -i 2 -w 1 -I 192.0.1.254 192.0.2.254 ==== tuc ==== ==== cut ==== PING 192.0.2.254 (192.0.2.254) from 192.0.1.254 : 56(84) bytes of data. --- 192.0.2.254 ping statistics --- 1 packets transmitted, 0 received, 100% packet loss, time 0ms ==== tuc ==== down kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-ecdsa-01\[root@west ikev2-ecdsa-01]# /usr/bin/pk12util -i /testing/x509/strongswan/strongWest.p12 -d sql:/etc/ipsec.d -w /testing/x509/nss-pw pk12util: PKCS12 IMPORT SUCCESSFUL kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-ecdsa-01\[root@west ikev2-ecdsa-01]# # Tuomo: why doesn't ipsec checknss --settrust work here? kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-ecdsa-01\[root@west ikev2-ecdsa-01]# certutil -M -d sql:/etc/ipsec.d -n "strongSwan CA - strongSwan" -t CT,, kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-ecdsa-01\[root@west ikev2-ecdsa-01]# #ipsec start kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-ecdsa-01\[root@west ikev2-ecdsa-01]# ipsec _stackmanager start kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-ecdsa-01\[root@west ikev2-ecdsa-01]# ipsec pluto --config /etc/ipsec.conf --leak-detective kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-ecdsa-01\[root@west ikev2-ecdsa-01]# /testing/pluto/bin/wait-until-pluto-started kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-ecdsa-01\[root@west ikev2-ecdsa-01]# ipsec auto --add westnet-eastnet-ikev2 002 added connection description "westnet-eastnet-ikev2" kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-ecdsa-01\[root@west ikev2-ecdsa-01]# ipsec whack --impair suppress-retransmits kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-ecdsa-01\[root@west ikev2-ecdsa-01]# echo "initdone" initdone kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-ecdsa-01\[root@west ikev2-ecdsa-01]# ipsec auto --up westnet-eastnet-ikev2 002 "westnet-eastnet-ikev2" #1: initiating v2 parent SA 181 "westnet-eastnet-ikev2" #1: initiate 002 "westnet-eastnet-ikev2": constructed local IKE proposals for westnet-eastnet-ikev2 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 181 "westnet-eastnet-ikev2" #1: STATE_PARENT_I1: sent v2I1, expected v2R1 002 "westnet-eastnet-ikev2" #1: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds 002 "westnet-eastnet-ikev2": constructed local ESP/AH proposals for westnet-eastnet-ikev2 (IKE SA initiator emitting ESP/AH proposals): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 182 "westnet-eastnet-ikev2" #2: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048} 002 "westnet-eastnet-ikev2" #2: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds 002 "westnet-eastnet-ikev2" #2: IKE SA authentication request rejected by peer: AUTHENTICATION_FAILED 000 "westnet-eastnet-ikev2" #2: scheduling retry attempt 1 of an unlimited number, but releasing whack kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-ecdsa-01\[root@west ikev2-ecdsa-01]# ping -n -c 4 -I 192.0.1.254 192.0.2.254 PING 192.0.2.254 (192.0.2.254) from 192.0.1.254 : 56(84) bytes of data. --- 192.0.2.254 ping statistics --- 4 packets transmitted, 0 received, 100% packet loss, time 87ms kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-ecdsa-01\[root@west ikev2-ecdsa-01 1]# >>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 westrun.sh 'ping -n -c 4 -I 192.0.1.254 192.0.2.254' <<<<<<<<<