/testing/guestbin/swan-prep --x509 Preparing X.509 files kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-20-multicert-rightid-san-wildcard\[root@west ikev2-x509-20-multicert-rightid-san-wildcard]# certutil -D -n east -d sql:/etc/ipsec.d kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-20-multicert-rightid-san-wildcard\[root@west ikev2-x509-20-multicert-rightid-san-wildcard]# ipsec start Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Redirecting to: /etc/init.d/ipsec start Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Starting pluto IKE daemon for IPsec: kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-20-multicert-rightid-san-wildcard\[root@west ikev2-x509-20-multicert-rightid-san-wildcard]# /testing/pluto/bin/wait-until-pluto-started kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-20-multicert-rightid-san-wildcard\[root@west ikev2-x509-20-multicert-rightid-san-wildcard]# ipsec auto --add main 002 added connection description "main" kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-20-multicert-rightid-san-wildcard\[root@west ikev2-x509-20-multicert-rightid-san-wildcard]# ipsec whack --impair suppress-retransmits kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-20-multicert-rightid-san-wildcard\[root@west ikev2-x509-20-multicert-rightid-san-wildcard]# echo "initdone" initdone kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-20-multicert-rightid-san-wildcard\[root@west ikev2-x509-20-multicert-rightid-san-wildcard]# ipsec auto --up main 002 "main" #1: initiating v2 parent SA 181 "main" #1: initiate 002 "main": constructed local IKE proposals for main (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 181 "main" #1: STATE_PARENT_I1: sent v2I1, expected v2R1 002 "main" #1: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds 002 "main": constructed local ESP/AH proposals for main (IKE SA initiator emitting ESP/AH proposals): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 182 "main" #2: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048} 002 "main" #2: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds 002 "main" #2: IKE SA authentication request rejected by peer: AUTHENTICATION_FAILED 000 "main" #2: scheduling retry attempt 1 of an unlimited number, but releasing whack kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-20-multicert-rightid-san-wildcard\[root@west ikev2-x509-20-multicert-rightid-san-wildcard]# echo "done" done kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-20-multicert-rightid-san-wildcard\[root@west ikev2-x509-20-multicert-rightid-san-wildcard]# # we should see conn other being up kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-20-multicert-rightid-san-wildcard\[root@west ikev2-x509-20-multicert-rightid-san-wildcard]# ipsec whack --trafficstatus whack: is Pluto running? connect() for "/run/pluto/pluto.ctl" failed (111 Connection refused) kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-20-multicert-rightid-san-wildcard\[root@west ikev2-x509-20-multicert-rightid-san-wildcard 33]# >>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 final.sh 'ipsec whack --trafficstatus' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 final.sh '# On east, we should see it has switched' <<<<<<<<< /dev/null && grep switched /tmp/pluto.log kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-20-multicert-rightid-san-wildcard\[root@west ikev2-x509-20-multicert-rightid-san-wildcard 1]# >>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 final.sh 'hostname | grep east > /dev/null && grep switched /tmp/pluto.log' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 final.sh 'ipsec whack --shutdown' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 final.sh 'ipsec auto --status' <<<<<<<<<