/testing/guestbin/swan-prep west # # confirm that the network is alive west # ../../pluto/bin/wait-until-alive -I 192.0.1.254 192.0.2.254 destination -I 192.0.1.254 192.0.2.254 is alive west # # ensure that clear text does not get through west # iptables -A INPUT -i eth1 -s 192.0.2.0/24 -j LOGDROP west # # confirm clear text does not get through west # ../../pluto/bin/ping-once.sh --down -I 192.0.1.254 192.0.2.254 down west # ipsec start Redirecting to: [initsystem] west # /testing/pluto/bin/wait-until-pluto-started west # ipsec auto --add labeled 002 added connection description "labeled" west # echo "initdone" initdone west # # for port re-use in tests with protoport selectors west # echo 1 >/proc/sys/net/ipv4/tcp_tw_reuse west # ipsec auto --up labeled 002 "labeled" #1: initiating Main Mode 1v1 "labeled" #1: STATE_MAIN_I1: initiate 1v1 "labeled" #1: STATE_MAIN_I2: sent MI2, expecting MR2 1v1 "labeled" #1: STATE_MAIN_I3: sent MI3, expecting MR3 002 "labeled" #1: Peer ID is ID_FQDN: '@east' 003 "labeled" #1: Authenticated using RSA 004 "labeled" #1: STATE_MAIN_I4: ISAKMP SA established {auth=RSA_SIG cipher=AES_CBC_256 integ=HMAC_SHA2_256 group=MODP2048} 002 "labeled" #2: initiating Quick Mode RSASIG+AUTHENTICATE+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO 1v1 "labeled" #2: STATE_QUICK_I1: initiate 003 "labeled" #2: ERROR: netlink XFRM_MSG_UPDPOLICY response for flow esp.ESPSPIi@192.1.2.45 included errno 22: Invalid argument 002 "labeled" #2: raw_eroute() in setup_half_ipsec_sa() failed to add inbound 003 "labeled" #2: ERROR: netlink XFRM_MSG_UPDPOLICY response for flow ah.AHSPIi@192.1.2.23 included errno 22: Invalid argument 003 "labeled" #2: ERROR: netlink XFRM_MSG_DELPOLICY response for flow esp.ESPSPIi@192.1.2.45 included errno 22: Invalid argument 003 "labeled" #2: ERROR: netlink XFRM_MSG_DELPOLICY response for flow esp.ESPSPIi@192.1.2.45 included errno 22: Invalid argument 002 "labeled" #2: raw_eroute in teardown_half_ipsec_sa() failed to delete inbound 032 "labeled" #2: STATE_QUICK_I1: internal error 002 "labeled" #2: deleting state (STATE_QUICK_I1) and NOT sending notification 003 "labeled" #2: ERROR: netlink response for Del SA ah.AHSPIi@192.1.2.23 included errno 3: No such process 003 "labeled" #2: ERROR: netlink XFRM_MSG_DELPOLICY response for flow esp.ESPSPIi@192.1.2.45 included errno 22: Invalid argument 003 "labeled" #2: ERROR: netlink XFRM_MSG_DELPOLICY response for flow esp.ESPSPIi@192.1.2.45 included errno 22: Invalid argument 002 "labeled" #2: raw_eroute in teardown_half_ipsec_sa() failed to delete inbound 003 "labeled" #2: ERROR: netlink response for Del SA ah.AHSPIi@192.1.2.45 included errno 3: No such process west # echo test | nc -p 4301 -vvv 192.0.1.254 4300 Ncat: Version 7.70 ( https://nmap.org/ncat ) NCAT DEBUG: Using system default trusted CA certificates and those in PATH/share/ncat/ca-bundle.crt. NCAT DEBUG: Unable to load trusted CA certificates from PATH/share/ncat/ca-bundle.crt: error:02001002:system library:fopen:No such file or directory libnsock nsock_iod_new2(): nsock_iod_new (IOD #1) libnsock nsock_connect_tcp(): TCP connection requested to 192.0.1.254:4300 (IOD #1) EID 8 libnsock mksock_bind_addr(): Binding to 0.0.0.0:4301 (IOD #1) libnsock nsock_trace_handler_callback(): Callback: CONNECT ERROR [Connection refused (111)] for EID 8 [192.0.1.254:4300] Ncat: Connection refused. west # echo done done west # ../../pluto/bin/ipsec-look.sh west NOW XFRM state: XFRM policy: XFRM done IPSEC mangle TABLES NEW_IPSEC_CONN mangle TABLES ROUTING TABLES default via 192.1.2.254 dev eth1 192.0.1.0/24 dev eth0 proto kernel scope link src 192.0.1.254 192.0.2.0/24 via 192.1.2.23 dev eth1 192.1.2.0/24 dev eth1 proto kernel scope link src 192.1.2.45 NSS_CERTIFICATES Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI west # west # ipsec whack --shutdown 002 shutting down west # west # ../bin/check-for-core.sh west # if [ -f /sbin/ausearch ]; then ausearch -r -m avc -ts recent ; fi