--- east.console.txt 2019-08-24 18:12:56.280673678 +0000 +++ OUTPUT/east.console.txt 2019-08-26 13:28:04.190861285 +0000 @@ -10,8 +10,6 @@ east # ipsec auto --status 000 using kernel interface: netkey -000 interface eth1/eth1 [2001:db8:1:2::23]:500 -000 interface eth0/eth0 [2001:db8:0:2::254]:500 000 interface lo/lo [::1]:500 000 interface lo/lo 127.0.0.1:4500 000 interface lo/lo 127.0.0.1:500 @@ -105,8 +103,8 @@ 000 000 Connection list: 000 -000 "v6-tunnel": 2001:db8:1:2::23<2001:db8:1:2::23>[@east]...2001:db8:1:2::45<2001:db8:1:2::45>[@west]; unrouted; eroute owner: #0 -000 "v6-tunnel": oriented; my_ip=unset; their_ip=unset; my_updown=ipsec _updown; +000 "v6-tunnel": 2001:db8:1:2::45<2001:db8:1:2::45>[@west]...2001:db8:1:2::23<2001:db8:1:2::23>[@east]; unrouted; eroute owner: #0 +000 "v6-tunnel": unoriented; my_ip=unset; their_ip=unset; my_updown=ipsec _updown; 000 "v6-tunnel": xauth us:none, xauth them:none, my_username=[any]; their_username=[any] 000 "v6-tunnel": our auth:rsasig, their auth:rsasig 000 "v6-tunnel": modecfg info: us:none, them:none, modecfg policy:push, dns:unset, domains:unset, banner:unset, cat:unset; @@ -116,9 +114,9 @@ 000 "v6-tunnel": retransmit-interval: 9999ms; retransmit-timeout: 99s; 000 "v6-tunnel": initial-contact:no; cisco-unity:no; fake-strongswan:no; send-vendorid:no; send-no-esp-tfc:no; 000 "v6-tunnel": policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO; -000 "v6-tunnel": conn_prio: 128,128; interface: eth1; metric: 0; mtu: unset; sa_prio:auto; sa_tfc:none; +000 "v6-tunnel": conn_prio: 128,128; interface: ; metric: 0; mtu: unset; sa_prio:auto; sa_tfc:none; 000 "v6-tunnel": nflog-group: unset; mark: unset; vti-iface:unset; vti-routing:no; vti-shared:no; nic-offload:auto; -000 "v6-tunnel": our idtype: ID_FQDN; our id=@east; their idtype: ID_FQDN; their id=@west +000 "v6-tunnel": our idtype: ID_FQDN; our id=@west; their idtype: ID_FQDN; their id=@east 000 "v6-tunnel": dpd: action:hold; delay:0; timeout:0; nat-t: encaps:auto; nat_keepalive:yes; ikev1_natt:both 000 "v6-tunnel": newest ISAKMP SA: #0; newest IPsec SA: #0; 000 @@ -137,29 +135,7 @@ ../../pluto/bin/ipsec-look.sh east NOW XFRM state: -src 2001:db8:1:2::45 dst 2001:db8:1:2::23 - proto esp spi 0xSPISPI reqid REQID mode tunnel - replay-window 32 flag af-unspec - auth-trunc hmac(sha1) 0xHASHKEY 96 - enc cbc(aes) 0xENCKEY -src 2001:db8:1:2::23 dst 2001:db8:1:2::45 - proto esp spi 0xSPISPI reqid REQID mode tunnel - replay-window 32 flag af-unspec - auth-trunc hmac(sha1) 0xHASHKEY 96 - enc cbc(aes) 0xENCKEY XFRM policy: -src 2001:db8:1:2::23/128 dst 2001:db8:1:2::45/128 - dir out priority 1015679 ptype main - tmpl src 2001:db8:1:2::23 dst 2001:db8:1:2::45 - proto esp reqid REQID mode tunnel -src 2001:db8:1:2::45/128 dst 2001:db8:1:2::23/128 - dir fwd priority 1015679 ptype main - tmpl src 2001:db8:1:2::45 dst 2001:db8:1:2::23 - proto esp reqid REQID mode tunnel -src 2001:db8:1:2::45/128 dst 2001:db8:1:2::23/128 - dir in priority 1015679 ptype main - tmpl src 2001:db8:1:2::45 dst 2001:db8:1:2::23 - proto esp reqid REQID mode tunnel src ::/0 dst ::/0 proto ipv6-icmp type 135 dir fwd priority 1 ptype main src ::/0 dst ::/0 proto ipv6-icmp type 135 @@ -180,13 +156,8 @@ 192.0.1.0/24 via 192.1.2.45 dev eth1 192.0.2.0/24 dev eth0 proto kernel scope link src 192.0.2.254 192.1.2.0/24 dev eth1 proto kernel scope link src 192.1.2.23 -::1 dev lo proto kernel metric 256 -2001:db8:0:2::/64 dev eth0 proto kernel metric 256 -2001:db8::/48 via 2001:db8:1:2::45 dev eth1 -2001:db8:1:2::/64 dev eth1 proto kernel metric 256 -fe80::/64 dev eth1 proto kernel metric 256 fe80::/64 dev eth0 proto kernel metric 256 -default via 2001:db8:1:2::254 dev eth1 +fe80::/64 dev eth1 proto kernel metric 256 NSS_CERTIFICATES Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI