--- road.console.txt 1970-01-01 00:00:00.000000000 +0000 +++ OUTPUT/road.console.txt 2019-08-26 13:24:28.527411991 +0000 @@ -0,0 +1,85 @@ +/testing/guestbin/swan-prep --x509 +Preparing X.509 files +road # + ipsec start +Redirecting to: [initsystem] +road # + /testing/pluto/bin/wait-until-pluto-started +road # + ipsec auto --add road-east-x509-ipv4 +002 added connection description "road-east-x509-ipv4" +road # + echo "initdone" +initdone +road # + #!/bin/sh +road # + ipsec auto --up road-east-x509-ipv4 +002 "road-east-x509-ipv4"[1] 192.1.2.23 #1: initiating v2 parent SA +1v2 "road-east-x509-ipv4"[1] 192.1.2.23 #1: initiate +1v2 "road-east-x509-ipv4"[1] 192.1.2.23 #1: STATE_PARENT_I1: sent v2I1, expected v2R1 +1v2 "road-east-x509-ipv4"[1] 192.1.2.23 #2: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048} +002 "road-east-x509-ipv4"[1] 192.1.2.23 #2: certificate verified OK: E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA +002 "road-east-x509-ipv4"[1] 192.1.2.23 #2: IKEv2 mode peer ID is ID_DER_ASN1_DN: 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' +003 "road-east-x509-ipv4"[1] 192.1.2.23 #2: Authenticated using RSA +002 "road-east-x509-ipv4"[1] 192.1.2.23 #2: received INTERNAL_IP4_ADDRESS 192.0.2.100 +002 "road-east-x509-ipv4"[1] 192.1.2.23 #2: negotiated connection [192.0.2.100-192.0.2.100:0-65535 0] -> [0.0.0.0-255.255.255.255:0-65535 0] +004 "road-east-x509-ipv4"[1] 192.1.2.23 #2: STATE_V2_IPSEC_I: IPsec SA established tunnel mode {ESP=>0xESPESP <0xESPESP xfrm=AES_GCM_16_256-NONE NATOA=none NATD=none DPD=active} +road # + ping -w 6 -n -c4 -I 192.0.2.100 192.1.2.23 +PING 192.1.2.23 (192.1.2.23) from 192.0.2.100 : 56(84) bytes of data. +64 bytes from 192.1.2.23: icmp_seq=1 ttl=64 time=0.XXX ms +64 bytes from 192.1.2.23: icmp_seq=2 ttl=64 time=0.XXX ms +64 bytes from 192.1.2.23: icmp_seq=3 ttl=64 time=0.XXX ms +64 bytes from 192.1.2.23: icmp_seq=4 ttl=64 time=0.XXX ms +--- 192.1.2.23 ping statistics --- +4 packets transmitted, 4 received, 0% packet loss, time XXXX +rtt min/avg/max/mdev = 0.XXX/0.XXX/0.XXX/0.XXX ms +road # + # Tunnel should be up +road # + ipsec whack --trafficstatus +006 #2: "road-east-x509-ipv4"[1] 192.1.2.23, type=ESP, add_time=1234567890, inBytes=336, outBytes=336, id='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org', lease=192.0.2.100/32 +road # + # Let R_U_THERE packets flow +road # + sleep 15 +road # + # Setting up block via iptables +road # + iptables -I INPUT -s 192.1.2.23/32 -d 0/0 -j DROP +road # + iptables -I OUTPUT -d 192.1.2.23/32 -s 0/0 -j DROP +road # + sleep 30 +road # + # Tunnel should be down (%trap/%hold) +road # + ipsec whack --trafficstatus +whack: is Pluto running? connect() for "/run/pluto/pluto.ctl" failed (111 Connection refused) +road # + iptables -D INPUT -s 192.1.2.23/32 -d 0/0 -j DROP +road # + iptables -D OUTPUT -d 192.1.2.23/32 -s 0/0 -j DROP +road # + sleep 30 +road # + # Tunnel should be back up now even without triggering traffic +road # + ipsec whack --trafficstatus +whack: is Pluto running? connect() for "/run/pluto/pluto.ctl" failed (111 Connection refused) +road # + ping -w 6 -q -n -c 4 -I 192.0.2.100 192.1.2.23 +PING 192.1.2.23 (192.1.2.23) from 192.0.2.100 : 56(84) bytes of data. +--- 192.1.2.23 ping statistics --- +4 packets transmitted, 4 received, 0% packet loss, time XXXX +rtt min/avg/max/mdev = 0.XXX/0.XXX/0.XXX/0.XXX ms +road # + echo done +done +road # +road # + ../bin/check-for-core.sh +road # + if [ -f /sbin/ausearch ]; then ausearch -r -m avc -ts recent ; fi +