/testing/guestbin/swan-prep kroot@swantest:/home/build/libreswan/testing/pluto/newoe-07-ike-replace-initiator\[root@east newoe-07-ike-replace-initiator]# cp policies/* /etc/ipsec.d/policies/ kroot@swantest:/home/build/libreswan/testing/pluto/newoe-07-ike-replace-initiator\[root@east newoe-07-ike-replace-initiator]# ipsec start Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Redirecting to: /etc/init.d/ipsec start Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Starting pluto IKE daemon for IPsec: kroot@swantest:/home/build/libreswan/testing/pluto/newoe-07-ike-replace-initiator\[root@east newoe-07-ike-replace-initiator]# /testing/pluto/bin/wait-until-pluto-started kroot@swantest:/home/build/libreswan/testing/pluto/newoe-07-ike-replace-initiator\[root@east newoe-07-ike-replace-initiator]# # give OE policies time to load kroot@swantest:/home/build/libreswan/testing/pluto/newoe-07-ike-replace-initiator\[root@east newoe-07-ike-replace-initiator]# sleep 5 kroot@swantest:/home/build/libreswan/testing/pluto/newoe-07-ike-replace-initiator\[root@east newoe-07-ike-replace-initiator]# echo "initdone" initdone kroot@swantest:/home/build/libreswan/testing/pluto/newoe-07-ike-replace-initiator\[root@east newoe-07-ike-replace-initiator]# ../../pluto/bin/ipsec-look.sh ==== cut ==== start raw xfrm state: src 192.1.2.23/32 dst 192.1.3.209/32 \ dir out priority 2088927 ptype main \ tmpl src 192.1.2.23 dst 192.1.3.209\ proto esp reqid 16433 mode tunnel\ src 192.1.3.209/32 dst 192.1.2.23/32 \ dir fwd priority 2088927 ptype main \ tmpl src 192.1.3.209 dst 192.1.2.23\ proto esp reqid 16433 mode tunnel\ src 192.1.3.209/32 dst 192.1.2.23/32 \ dir in priority 2088927 ptype main \ tmpl src 192.1.3.209 dst 192.1.2.23\ proto esp reqid 16433 mode tunnel\ src 192.1.2.23/32 dst 192.1.2.0/24 \ dir out priority 2088935 ptype main \ tmpl src 0.0.0.0 dst 0.0.0.0\ proto esp reqid 0 mode transport\ src 192.1.2.23/32 dst 192.1.3.0/24 \ dir out priority 2088935 ptype main \ tmpl src 0.0.0.0 dst 0.0.0.0\ proto esp reqid 0 mode transport\ src 192.1.2.253/32 dst 192.1.2.23/32 \ dir fwd priority 1564639 ptype main \ src 192.1.2.253/32 dst 192.1.2.23/32 \ dir in priority 1564639 ptype main \ src 192.1.2.23/32 dst 192.1.2.253/32 \ dir out priority 1564639 ptype main \ src 192.1.3.253/32 dst 192.1.2.23/32 \ dir fwd priority 1564639 ptype main \ src 192.1.3.253/32 dst 192.1.2.23/32 \ dir in priority 1564639 ptype main \ src 192.1.2.23/32 dst 192.1.3.253/32 \ dir out priority 1564639 ptype main \ src 192.1.3.254/32 dst 192.1.2.23/32 \ dir fwd priority 1564639 ptype main \ src 192.1.3.254/32 dst 192.1.2.23/32 \ dir in priority 1564639 ptype main \ src 192.1.2.23/32 dst 192.1.3.254/32 \ dir out priority 1564639 ptype main \ src 192.1.2.254/32 dst 192.1.2.23/32 \ dir fwd priority 1564639 ptype main \ src 192.1.2.254/32 dst 192.1.2.23/32 \ dir in priority 1564639 ptype main \ src 192.1.2.23/32 dst 192.1.2.254/32 \ dir out priority 1564639 ptype main \ end raw xfrm state: ==== tuc ==== east Mon Aug 26 13:17:31 UTC 2019 XFRM state: src 192.1.3.209 dst 192.1.2.23 proto esp spi 0xf57f90b1 reqid 16433 mode tunnel replay-window 32 flag af-unspec aead rfc4106(gcm(aes)) 0x482d1e3b16ee424571091151a9faf3f45c7623543179155493cf3608f5925a4fbcebbfa5 128 anti-replay context: seq 0x13, oseq 0x0, bitmap 0x0007ffff src 192.1.2.23 dst 192.1.3.209 proto esp spi 0xb99ccafb reqid 16433 mode tunnel replay-window 32 flag af-unspec aead rfc4106(gcm(aes)) 0xc7cdf54e39ce2c936af9ae9dcce2ae5b42eaa297127d2aa780d4da75cd952d0642e87619 128 anti-replay context: seq 0x0, oseq 0x13, bitmap 0x00000000 XFRM policy: src 192.1.2.23/32 dst 192.1.2.253/32 dir out priority 1564639 ptype main src 192.1.2.23/32 dst 192.1.2.254/32 dir out priority 1564639 ptype main src 192.1.2.23/32 dst 192.1.3.253/32 dir out priority 1564639 ptype main src 192.1.2.23/32 dst 192.1.3.254/32 dir out priority 1564639 ptype main src 192.1.2.253/32 dst 192.1.2.23/32 dir fwd priority 1564639 ptype main src 192.1.2.253/32 dst 192.1.2.23/32 dir in priority 1564639 ptype main src 192.1.2.254/32 dst 192.1.2.23/32 dir fwd priority 1564639 ptype main src 192.1.2.254/32 dst 192.1.2.23/32 dir in priority 1564639 ptype main src 192.1.3.253/32 dst 192.1.2.23/32 dir fwd priority 1564639 ptype main src 192.1.3.253/32 dst 192.1.2.23/32 dir in priority 1564639 ptype main src 192.1.3.254/32 dst 192.1.2.23/32 dir fwd priority 1564639 ptype main src 192.1.3.254/32 dst 192.1.2.23/32 dir in priority 1564639 ptype main src 192.1.2.23/32 dst 192.1.3.209/32 dir out priority 2088927 ptype main tmpl src 192.1.2.23 dst 192.1.3.209 proto esp reqid 16433 mode tunnel src 192.1.3.209/32 dst 192.1.2.23/32 dir fwd priority 2088927 ptype main tmpl src 192.1.3.209 dst 192.1.2.23 proto esp reqid 16433 mode tunnel src 192.1.3.209/32 dst 192.1.2.23/32 dir in priority 2088927 ptype main tmpl src 192.1.3.209 dst 192.1.2.23 proto esp reqid 16433 mode tunnel src 192.1.2.23/32 dst 192.1.2.0/24 dir out priority 2088935 ptype main tmpl src 0.0.0.0 dst 0.0.0.0 proto esp reqid 0 mode transport src 192.1.2.23/32 dst 192.1.3.0/24 dir out priority 2088935 ptype main tmpl src 0.0.0.0 dst 0.0.0.0 proto esp reqid 0 mode transport XFRM done IPSEC mangle TABLES NEW_IPSEC_CONN mangle TABLES ROUTING TABLES default via 192.1.2.254 dev eth1 192.0.1.0/24 via 192.1.2.45 dev eth1 192.0.2.0/24 dev eth0 proto kernel scope link src 192.0.2.254 192.1.2.0/24 dev eth1 proto kernel scope link src 192.1.2.23 NSS_CERTIFICATES Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI kroot@swantest:/home/build/libreswan/testing/pluto/newoe-07-ike-replace-initiator\[root@east newoe-07-ike-replace-initiator]# : ==== cut ==== kroot@swantest:/home/build/libreswan/testing/pluto/newoe-07-ike-replace-initiator\[root@east newoe-07-ike-replace-initiator]# ipsec auto --status whack: is Pluto running? connect() for "/run/pluto/pluto.ctl" failed (111 Connection refused) kroot@swantest:/home/build/libreswan/testing/pluto/newoe-07-ike-replace-initiator\[root@east newoe-07-ike-replace-initiator 33]# >>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 final.sh 'ipsec auto --status' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 final.sh 'if [ -f /sbin/ausearch ]; then ausearch -r -m avc -ts recent ; fi' <<<<<<<<<