/testing/guestbin/swan-prep --x509 Preparing X.509 files kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-27-criticalflag-clientAuth\[root@east ikev2-x509-27-criticalflag-clientAuth]# ipsec start Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Redirecting to: /etc/init.d/ipsec start Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Starting pluto IKE daemon for IPsec: kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-27-criticalflag-clientAuth\[root@east ikev2-x509-27-criticalflag-clientAuth]# /testing/pluto/bin/wait-until-pluto-started kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-27-criticalflag-clientAuth\[root@east ikev2-x509-27-criticalflag-clientAuth]# ipsec auto --add ikev2-westnet-eastnet-x509-cr 002 added connection description "ikev2-westnet-eastnet-x509-cr" kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-27-criticalflag-clientAuth\[root@east ikev2-x509-27-criticalflag-clientAuth]# echo "initdone" initdone kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-27-criticalflag-clientAuth\[root@east ikev2-x509-27-criticalflag-clientAuth]# ../../pluto/bin/ipsec-look.sh ==== cut ==== start raw xfrm state: end raw xfrm state: ==== tuc ==== east Mon Aug 26 13:14:42 UTC 2019 XFRM state: XFRM policy: XFRM done IPSEC mangle TABLES NEW_IPSEC_CONN mangle TABLES ROUTING TABLES default via 192.1.2.254 dev eth1 192.0.1.0/24 via 192.1.2.45 dev eth1 192.0.2.0/24 dev eth0 proto kernel scope link src 192.0.2.254 192.1.2.0/24 dev eth1 proto kernel scope link src 192.1.2.23 NSS_CERTIFICATES Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI Libreswan test CA for mainca - Libreswan CT,, east u,u,u hashsha1 P,, nic P,, north P,, road P,, west P,, west-ec P,, kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-27-criticalflag-clientAuth\[root@east ikev2-x509-27-criticalflag-clientAuth]# # on east, it should show it failed the NSS IPsec profile and used the NSS TLS profile kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-27-criticalflag-clientAuth\[root@east ikev2-x509-27-criticalflag-clientAuth]# hostname | grep east > /dev/null && grep "verify_end_cert trying profile" /tmp/pluto.log | verify_end_cert trying profile IPsec kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-27-criticalflag-clientAuth\[root@east ikev2-x509-27-criticalflag-clientAuth]# : ==== cut ==== kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-27-criticalflag-clientAuth\[root@east ikev2-x509-27-criticalflag-clientAuth]# ipsec auto --status whack: is Pluto running? connect() for "/run/pluto/pluto.ctl" failed (111 Connection refused) kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-27-criticalflag-clientAuth\[root@east ikev2-x509-27-criticalflag-clientAuth 33]# >>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 final.sh 'ipsec auto --status' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 final.sh '../bin/check-for-core.sh' <<<<<<<<<