--- road.console.txt 2019-08-24 18:12:56.297673079 +0000 +++ OUTPUT/road.console.txt 2019-08-26 13:19:29.784871438 +0000 @@ -47,10 +47,19 @@ # expired #1 and #2. trafficstatus should be empty road # ipsec whack --trafficstatus +whack: is Pluto running? connect() for "/run/pluto/pluto.ctl" failed (111 Connection refused) road # ../../pluto/bin/ipsec-look.sh road NOW XFRM state: +src 192.1.2.23 dst 192.1.3.209 + proto esp spi 0xSPISPI reqid REQID mode tunnel + replay-window 32 flag af-unspec + aead rfc4106(gcm(aes)) 0xENCAUTHKEY 128 +src 192.1.3.209 dst 192.1.2.23 + proto esp spi 0xSPISPI reqid REQID mode tunnel + replay-window 32 flag af-unspec + aead rfc4106(gcm(aes)) 0xENCAUTHKEY 128 XFRM policy: src 192.1.2.253/32 dst 192.1.3.209/32 dir fwd priority 1564639 ptype main @@ -76,6 +85,18 @@ dir fwd priority 1564639 ptype main src 192.1.3.254/32 dst 192.1.3.209/32 dir in priority 1564639 ptype main +src 192.1.2.23/32 dst 192.1.3.209/32 + dir fwd priority 2088927 ptype main + tmpl src 192.1.2.23 dst 192.1.3.209 + proto esp reqid REQID mode tunnel +src 192.1.2.23/32 dst 192.1.3.209/32 + dir in priority 2088927 ptype main + tmpl src 192.1.2.23 dst 192.1.3.209 + proto esp reqid REQID mode tunnel +src 192.1.3.209/32 dst 192.1.2.23/32 + dir out priority 2088927 ptype main + tmpl src 192.1.3.209 dst 192.1.2.23 + proto esp reqid REQID mode tunnel src 192.1.3.209/32 dst 192.1.2.0/24 dir out priority 2088935 ptype main tmpl src 0.0.0.0 dst 0.0.0.0 @@ -98,15 +119,16 @@ road # ping -n -c 4 -I 192.1.3.209 192.1.2.23 PING 192.1.2.23 (192.1.2.23) from 192.1.3.209 : 56(84) bytes of data. +64 bytes from 192.1.2.23: icmp_seq=1 ttl=64 time=0.XXX ms 64 bytes from 192.1.2.23: icmp_seq=2 ttl=64 time=0.XXX ms 64 bytes from 192.1.2.23: icmp_seq=3 ttl=64 time=0.XXX ms 64 bytes from 192.1.2.23: icmp_seq=4 ttl=64 time=0.XXX ms --- 192.1.2.23 ping statistics --- -4 packets transmitted, 3 received, 25% packet loss, time XXXX +4 packets transmitted, 4 received, 0% packet loss, time XXXX rtt min/avg/max/mdev = 0.XXX/0.XXX/0.XXX/0.XXX ms road # ipsec whack --trafficstatus -006 #4: "private-or-clear#192.1.2.0/24"[2] ...192.1.2.23, type=ESP, add_time=1234567890, inBytes=252, outBytes=252, id='ID_NULL' +whack: is Pluto running? connect() for "/run/pluto/pluto.ctl" failed (111 Connection refused) road # ../../pluto/bin/ipsec-look.sh road NOW @@ -119,10 +141,6 @@ proto esp spi 0xSPISPI reqid REQID mode tunnel replay-window 32 flag af-unspec aead rfc4106(gcm(aes)) 0xENCAUTHKEY 128 -src 192.1.3.209 dst 192.1.2.23 - proto esp spi 0xSPISPI reqid REQID mode transport - replay-window 0 - sel src 192.1.3.209/32 dst 192.1.2.23/32 proto icmp type 8 code 0 dev eth0 XFRM policy: src 192.1.2.253/32 dst 192.1.3.209/32 dir fwd priority 1564639 ptype main @@ -192,10 +210,6 @@ proto esp spi 0xSPISPI reqid REQID mode tunnel replay-window 32 flag af-unspec aead rfc4106(gcm(aes)) 0xENCAUTHKEY 128 -src 192.1.3.209 dst 192.1.2.23 - proto esp spi 0xSPISPI reqid REQID mode transport - replay-window 0 - sel src 192.1.3.209/32 dst 192.1.2.23/32 proto icmp type 8 code 0 dev eth0 XFRM policy: src 192.1.2.253/32 dst 192.1.3.209/32 dir fwd priority 1564639 ptype main