/testing/guestbin/swan-prep kroot@swantest:/home/build/libreswan/testing/pluto/newoe-05-hold-pass\[root@east newoe-05-hold-pass]# cp policies/* /etc/ipsec.d/policies/ kroot@swantest:/home/build/libreswan/testing/pluto/newoe-05-hold-pass\[root@east newoe-05-hold-pass]# ipsec start Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Redirecting to: /etc/init.d/ipsec start Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Starting pluto IKE daemon for IPsec: kroot@swantest:/home/build/libreswan/testing/pluto/newoe-05-hold-pass\[root@east newoe-05-hold-pass]# /testing/pluto/bin/wait-until-pluto-started kroot@swantest:/home/build/libreswan/testing/pluto/newoe-05-hold-pass\[root@east newoe-05-hold-pass]# # give OE policies time to load kroot@swantest:/home/build/libreswan/testing/pluto/newoe-05-hold-pass\[root@east newoe-05-hold-pass]# sleep 5 kroot@swantest:/home/build/libreswan/testing/pluto/newoe-05-hold-pass\[root@east newoe-05-hold-pass]# echo "initdone" initdone kroot@swantest:/home/build/libreswan/testing/pluto/newoe-05-hold-pass\[root@east newoe-05-hold-pass]# ../../pluto/bin/ipsec-look.sh ==== cut ==== start raw xfrm state: src 192.1.2.23/32 dst 192.1.3.209/32 \ dir out priority 2088927 ptype main \ tmpl src 192.1.2.23 dst 192.1.3.209\ proto esp reqid 16437 mode tunnel\ src 192.1.3.209/32 dst 192.1.2.23/32 \ dir fwd priority 2088927 ptype main \ tmpl src 192.1.3.209 dst 192.1.2.23\ proto esp reqid 16437 mode tunnel\ src 192.1.3.209/32 dst 192.1.2.23/32 \ dir in priority 2088927 ptype main \ tmpl src 192.1.3.209 dst 192.1.2.23\ proto esp reqid 16437 mode tunnel\ src 192.1.2.23/32 dst 192.1.2.0/24 \ dir out priority 2088935 ptype main \ tmpl src 0.0.0.0 dst 0.0.0.0\ proto esp reqid 0 mode transport\ src 192.1.2.23/32 dst 192.1.3.0/24 \ dir out priority 2088935 ptype main \ tmpl src 0.0.0.0 dst 0.0.0.0\ proto esp reqid 0 mode transport\ src 192.1.2.23/32 dst 7.0.0.0/8 \ dir out priority 2088951 ptype main \ tmpl src 0.0.0.0 dst 0.0.0.0\ proto esp reqid 0 mode transport\ src 192.1.2.253/32 dst 192.1.2.23/32 \ dir fwd priority 1564639 ptype main \ src 192.1.2.253/32 dst 192.1.2.23/32 \ dir in priority 1564639 ptype main \ src 192.1.2.23/32 dst 192.1.2.253/32 \ dir out priority 1564639 ptype main \ src 192.1.3.253/32 dst 192.1.2.23/32 \ dir fwd priority 1564639 ptype main \ src 192.1.3.253/32 dst 192.1.2.23/32 \ dir in priority 1564639 ptype main \ src 192.1.2.23/32 dst 192.1.3.253/32 \ dir out priority 1564639 ptype main \ src 192.1.3.254/32 dst 192.1.2.23/32 \ dir fwd priority 1564639 ptype main \ src 192.1.3.254/32 dst 192.1.2.23/32 \ dir in priority 1564639 ptype main \ src 192.1.2.23/32 dst 192.1.3.254/32 \ dir out priority 1564639 ptype main \ src 192.1.2.254/32 dst 192.1.2.23/32 \ dir fwd priority 1564639 ptype main \ src 192.1.2.254/32 dst 192.1.2.23/32 \ dir in priority 1564639 ptype main \ src 192.1.2.23/32 dst 192.1.2.254/32 \ dir out priority 1564639 ptype main \ end raw xfrm state: ==== tuc ==== east Mon Aug 26 13:20:36 UTC 2019 XFRM state: src 192.1.3.209 dst 192.1.2.23 proto esp spi 0xdffa626a reqid 16437 mode tunnel replay-window 32 flag af-unspec aead rfc4106(gcm(aes)) 0xe9b7672c6d6c2b38d6bfd7cd4a9d124eca8b6941b49b93eaeb1b6c1b1cb2e2416d0b7b8d 128 anti-replay context: seq 0x3, oseq 0x0, bitmap 0x00000007 src 192.1.2.23 dst 192.1.3.209 proto esp spi 0x283fe166 reqid 16437 mode tunnel replay-window 32 flag af-unspec aead rfc4106(gcm(aes)) 0xa845550ee3332f8f9324c784f1a5d0d2c3638406ea9ceee14d03d4ee75f466c1014d63e0 128 anti-replay context: seq 0x0, oseq 0x3, bitmap 0x00000000 XFRM policy: src 192.1.2.23/32 dst 192.1.2.253/32 dir out priority 1564639 ptype main src 192.1.2.23/32 dst 192.1.2.254/32 dir out priority 1564639 ptype main src 192.1.2.23/32 dst 192.1.3.253/32 dir out priority 1564639 ptype main src 192.1.2.23/32 dst 192.1.3.254/32 dir out priority 1564639 ptype main src 192.1.2.253/32 dst 192.1.2.23/32 dir fwd priority 1564639 ptype main src 192.1.2.253/32 dst 192.1.2.23/32 dir in priority 1564639 ptype main src 192.1.2.254/32 dst 192.1.2.23/32 dir fwd priority 1564639 ptype main src 192.1.2.254/32 dst 192.1.2.23/32 dir in priority 1564639 ptype main src 192.1.3.253/32 dst 192.1.2.23/32 dir fwd priority 1564639 ptype main src 192.1.3.253/32 dst 192.1.2.23/32 dir in priority 1564639 ptype main src 192.1.3.254/32 dst 192.1.2.23/32 dir fwd priority 1564639 ptype main src 192.1.3.254/32 dst 192.1.2.23/32 dir in priority 1564639 ptype main src 192.1.2.23/32 dst 192.1.3.209/32 dir out priority 2088927 ptype main tmpl src 192.1.2.23 dst 192.1.3.209 proto esp reqid 16437 mode tunnel src 192.1.3.209/32 dst 192.1.2.23/32 dir fwd priority 2088927 ptype main tmpl src 192.1.3.209 dst 192.1.2.23 proto esp reqid 16437 mode tunnel src 192.1.3.209/32 dst 192.1.2.23/32 dir in priority 2088927 ptype main tmpl src 192.1.3.209 dst 192.1.2.23 proto esp reqid 16437 mode tunnel src 192.1.2.23/32 dst 192.1.2.0/24 dir out priority 2088935 ptype main tmpl src 0.0.0.0 dst 0.0.0.0 proto esp reqid 0 mode transport src 192.1.2.23/32 dst 192.1.3.0/24 dir out priority 2088935 ptype main tmpl src 0.0.0.0 dst 0.0.0.0 proto esp reqid 0 mode transport src 192.1.2.23/32 dst 7.0.0.0/8 dir out priority 2088951 ptype main tmpl src 0.0.0.0 dst 0.0.0.0 proto esp reqid 0 mode transport XFRM done IPSEC mangle TABLES NEW_IPSEC_CONN mangle TABLES ROUTING TABLES default via 192.1.2.254 dev eth1 192.0.1.0/24 via 192.1.2.45 dev eth1 192.0.2.0/24 dev eth0 proto kernel scope link src 192.0.2.254 192.1.2.0/24 dev eth1 proto kernel scope link src 192.1.2.23 NSS_CERTIFICATES Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI kroot@swantest:/home/build/libreswan/testing/pluto/newoe-05-hold-pass\[root@east newoe-05-hold-pass]# : ==== cut ==== kroot@swantest:/home/build/libreswan/testing/pluto/newoe-05-hold-pass\[root@east newoe-05-hold-pass]# ipsec auto --status whack: is Pluto running? connect() for "/run/pluto/pluto.ctl" failed (111 Connection refused) kroot@swantest:/home/build/libreswan/testing/pluto/newoe-05-hold-pass\[root@east newoe-05-hold-pass 33]# >>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 final.sh 'ipsec auto --status' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 final.sh 'if [ -f /sbin/ausearch ]; then ausearch -r -m avc -ts recent ; fi' <<<<<<<<<