/testing/guestbin/swan-prep kroot@swantest:/home/build/libreswan/testing/pluto/newoe-18-poc-clear\[root@east newoe-18-poc-clear]# cp policies/* /etc/ipsec.d/policies/ kroot@swantest:/home/build/libreswan/testing/pluto/newoe-18-poc-clear\[root@east newoe-18-poc-clear]# echo "192.1.3.0/24" >> /etc/ipsec.d/policies/clear kroot@swantest:/home/build/libreswan/testing/pluto/newoe-18-poc-clear\[root@east newoe-18-poc-clear]# ipsec start Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Redirecting to: /etc/init.d/ipsec start Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Starting pluto IKE daemon for IPsec: kroot@swantest:/home/build/libreswan/testing/pluto/newoe-18-poc-clear\[root@east newoe-18-poc-clear]# /testing/pluto/bin/wait-until-pluto-started kroot@swantest:/home/build/libreswan/testing/pluto/newoe-18-poc-clear\[root@east newoe-18-poc-clear]# # give OE policies time to load kroot@swantest:/home/build/libreswan/testing/pluto/newoe-18-poc-clear\[root@east newoe-18-poc-clear]# sleep 5 kroot@swantest:/home/build/libreswan/testing/pluto/newoe-18-poc-clear\[root@east newoe-18-poc-clear]# echo "initdone" initdone kroot@swantest:/home/build/libreswan/testing/pluto/newoe-18-poc-clear\[root@east newoe-18-poc-clear]# ../../pluto/bin/ipsec-look.sh ==== cut ==== start raw xfrm state: src 192.1.2.253/32 dst 192.1.2.23/32 \ dir fwd priority 1564639 ptype main \ src 192.1.2.253/32 dst 192.1.2.23/32 \ dir in priority 1564639 ptype main \ src 192.1.2.23/32 dst 192.1.2.253/32 \ dir out priority 1564639 ptype main \ src 192.1.3.253/32 dst 192.1.2.23/32 \ dir fwd priority 1564639 ptype main \ src 192.1.3.253/32 dst 192.1.2.23/32 \ dir in priority 1564639 ptype main \ src 192.1.2.23/32 dst 192.1.3.253/32 \ dir out priority 1564639 ptype main \ src 192.1.3.254/32 dst 192.1.2.23/32 \ dir fwd priority 1564639 ptype main \ src 192.1.3.254/32 dst 192.1.2.23/32 \ dir in priority 1564639 ptype main \ src 192.1.2.23/32 dst 192.1.3.254/32 \ dir out priority 1564639 ptype main \ src 192.1.2.254/32 dst 192.1.2.23/32 \ dir fwd priority 1564639 ptype main \ src 192.1.2.254/32 dst 192.1.2.23/32 \ dir in priority 1564639 ptype main \ src 192.1.2.23/32 dst 192.1.2.254/32 \ dir out priority 1564639 ptype main \ src 192.1.3.0/24 dst 192.1.2.23/32 \ dir fwd priority 1564639 ptype main \ src 192.1.3.0/24 dst 192.1.2.23/32 \ dir in priority 1564639 ptype main \ src 192.1.2.23/32 dst 192.1.3.0/24 \ dir out priority 1564639 ptype main \ end raw xfrm state: ==== tuc ==== east Mon Aug 26 13:17:01 UTC 2019 XFRM state: XFRM policy: src 192.1.2.23/32 dst 192.1.2.253/32 dir out priority 1564639 ptype main src 192.1.2.23/32 dst 192.1.2.254/32 dir out priority 1564639 ptype main src 192.1.2.23/32 dst 192.1.3.0/24 dir out priority 1564639 ptype main src 192.1.2.23/32 dst 192.1.3.253/32 dir out priority 1564639 ptype main src 192.1.2.23/32 dst 192.1.3.254/32 dir out priority 1564639 ptype main src 192.1.2.253/32 dst 192.1.2.23/32 dir fwd priority 1564639 ptype main src 192.1.2.253/32 dst 192.1.2.23/32 dir in priority 1564639 ptype main src 192.1.2.254/32 dst 192.1.2.23/32 dir fwd priority 1564639 ptype main src 192.1.2.254/32 dst 192.1.2.23/32 dir in priority 1564639 ptype main src 192.1.3.0/24 dst 192.1.2.23/32 dir fwd priority 1564639 ptype main src 192.1.3.0/24 dst 192.1.2.23/32 dir in priority 1564639 ptype main src 192.1.3.253/32 dst 192.1.2.23/32 dir fwd priority 1564639 ptype main src 192.1.3.253/32 dst 192.1.2.23/32 dir in priority 1564639 ptype main src 192.1.3.254/32 dst 192.1.2.23/32 dir fwd priority 1564639 ptype main src 192.1.3.254/32 dst 192.1.2.23/32 dir in priority 1564639 ptype main XFRM done IPSEC mangle TABLES NEW_IPSEC_CONN mangle TABLES ROUTING TABLES default via 192.1.2.254 dev eth1 192.0.1.0/24 via 192.1.2.45 dev eth1 192.0.2.0/24 dev eth0 proto kernel scope link src 192.0.2.254 192.1.2.0/24 dev eth1 proto kernel scope link src 192.1.2.23 NSS_CERTIFICATES Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI kroot@swantest:/home/build/libreswan/testing/pluto/newoe-18-poc-clear\[root@east newoe-18-poc-clear]# # should not show any hits kroot@swantest:/home/build/libreswan/testing/pluto/newoe-18-poc-clear\[root@east newoe-18-poc-clear]# grep "negotiated connection" /tmp/pluto.log kroot@swantest:/home/build/libreswan/testing/pluto/newoe-18-poc-clear\[root@east newoe-18-poc-clear 1]# >>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 final.sh 'grep "negotiated connection" /tmp/pluto.log' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 final.sh 'ipsec auto --status' <<<<<<<<<