/testing/guestbin/swan-prep --x509 --x509name west-ekuCritical Preparing X.509 files kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-27-criticalflag-clientAuth\[root@west ikev2-x509-27-criticalflag-clientAuth]# certutil -D -n east -d sql:/etc/ipsec.d kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-27-criticalflag-clientAuth\[root@west ikev2-x509-27-criticalflag-clientAuth]# # confirm that the network is alive kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-27-criticalflag-clientAuth\[root@west ikev2-x509-27-criticalflag-clientAuth]# ../../pluto/bin/wait-until-alive -I 192.0.1.254 192.0.2.254 destination -I 192.0.1.254 192.0.2.254 is alive kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-27-criticalflag-clientAuth\[root@west ikev2-x509-27-criticalflag-clientAuth]# # ensure that clear text does not get through kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-27-criticalflag-clientAuth\[root@west ikev2-x509-27-criticalflag-clientAuth]# iptables -A INPUT -i eth1 -s 192.0.2.0/24 -j LOGDROP kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-27-criticalflag-clientAuth\[root@west ikev2-x509-27-criticalflag-clientAuth]# iptables -I INPUT -m policy --dir in --pol ipsec -j ACCEPT kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-27-criticalflag-clientAuth\[root@west ikev2-x509-27-criticalflag-clientAuth]# # confirm clear text does not get through kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-27-criticalflag-clientAuth\[root@west ikev2-x509-27-criticalflag-clientAuth]# ../../pluto/bin/ping-once.sh --down -I 192.0.1.254 192.0.2.254 ==== cut ==== ping -q -n -c 1 -i 2 -w 1 -I 192.0.1.254 192.0.2.254 ==== tuc ==== ==== cut ==== PING 192.0.2.254 (192.0.2.254) from 192.0.1.254 : 56(84) bytes of data. --- 192.0.2.254 ping statistics --- 1 packets transmitted, 0 received, 100% packet loss, time 0ms ==== tuc ==== down kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-27-criticalflag-clientAuth\[root@west ikev2-x509-27-criticalflag-clientAuth]# ipsec start Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Redirecting to: /etc/init.d/ipsec start Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Starting pluto IKE daemon for IPsec: kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-27-criticalflag-clientAuth\[root@west ikev2-x509-27-criticalflag-clientAuth]# /testing/pluto/bin/wait-until-pluto-started kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-27-criticalflag-clientAuth\[root@west ikev2-x509-27-criticalflag-clientAuth]# ipsec auto --add ikev2-westnet-eastnet-x509-cr 002 added connection description "ikev2-westnet-eastnet-x509-cr" kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-27-criticalflag-clientAuth\[root@west ikev2-x509-27-criticalflag-clientAuth]# echo "initdone" initdone kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-27-criticalflag-clientAuth\[root@west ikev2-x509-27-criticalflag-clientAuth]# ipsec auto --up ikev2-westnet-eastnet-x509-cr 002 "ikev2-westnet-eastnet-x509-cr" #1: initiating v2 parent SA 181 "ikev2-westnet-eastnet-x509-cr" #1: initiate 002 "ikev2-westnet-eastnet-x509-cr": constructed local IKE proposals for ikev2-westnet-eastnet-x509-cr (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 181 "ikev2-westnet-eastnet-x509-cr" #1: STATE_PARENT_I1: sent v2I1, expected v2R1 002 "ikev2-westnet-eastnet-x509-cr": constructed local ESP/AH proposals for ikev2-westnet-eastnet-x509-cr (IKE SA initiator emitting ESP/AH proposals): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 182 "ikev2-westnet-eastnet-x509-cr" #2: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048} 002 "ikev2-westnet-eastnet-x509-cr" #2: IKE SA authentication request rejected by peer: AUTHENTICATION_FAILED 000 "ikev2-westnet-eastnet-x509-cr" #2: scheduling retry attempt 1 of an unlimited number, but releasing whack kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-27-criticalflag-clientAuth\[root@west ikev2-x509-27-criticalflag-clientAuth]# ping -n -c4 -I 192.0.1.254 192.0.2.254 PING 192.0.2.254 (192.0.2.254) from 192.0.1.254 : 56(84) bytes of data. --- 192.0.2.254 ping statistics --- 4 packets transmitted, 0 received, 100% packet loss, time 59ms kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-27-criticalflag-clientAuth\[root@west ikev2-x509-27-criticalflag-clientAuth 1]# >>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 westrun.sh 'ping -n -c4 -I 192.0.1.254 192.0.2.254' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 westrun.sh 'ipsec whack --trafficstatus' <<<<<<<<< /dev/null && grep "verify_end_cert trying profile" /tmp/pluto.log kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-x509-27-criticalflag-clientAuth\[root@west ikev2-x509-27-criticalflag-clientAuth 1]# >>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 final.sh 'hostname | grep east > /dev/null && grep "verify_end_cert trying profile" /tmp/pluto.log' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 final.sh 'ipsec auto --status' <<<<<<<<<