/testing/guestbin/swan-prep kroot@swantest:/home/build/libreswan/testing/pluto/newoe-19-poc-poc-clear\[root@east newoe-19-poc-poc-clear]# cp policies/* /etc/ipsec.d/policies/ kroot@swantest:/home/build/libreswan/testing/pluto/newoe-19-poc-poc-clear\[root@east newoe-19-poc-poc-clear]# echo "192.1.3.0/24" >> /etc/ipsec.d/policies/private-or-clear kroot@swantest:/home/build/libreswan/testing/pluto/newoe-19-poc-poc-clear\[root@east newoe-19-poc-poc-clear]# echo "0.0.0.0/0" >> /etc/ipsec.d/policies/clear kroot@swantest:/home/build/libreswan/testing/pluto/newoe-19-poc-poc-clear\[root@east newoe-19-poc-poc-clear]# ipsec start Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Redirecting to: /etc/init.d/ipsec start Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Starting pluto IKE daemon for IPsec: kroot@swantest:/home/build/libreswan/testing/pluto/newoe-19-poc-poc-clear\[root@east newoe-19-poc-poc-clear]# /testing/pluto/bin/wait-until-pluto-started kroot@swantest:/home/build/libreswan/testing/pluto/newoe-19-poc-poc-clear\[root@east newoe-19-poc-poc-clear]# # give OE policies time to load kroot@swantest:/home/build/libreswan/testing/pluto/newoe-19-poc-poc-clear\[root@east newoe-19-poc-poc-clear]# sleep 5 kroot@swantest:/home/build/libreswan/testing/pluto/newoe-19-poc-poc-clear\[root@east newoe-19-poc-poc-clear]# echo "initdone" initdone kroot@swantest:/home/build/libreswan/testing/pluto/newoe-19-poc-poc-clear\[root@east newoe-19-poc-poc-clear]# ../../pluto/bin/ipsec-look.sh ==== cut ==== start raw xfrm state: src 192.1.2.23/32 dst 192.1.3.209/32 \ dir out priority 2088927 ptype main \ tmpl src 192.1.2.23 dst 192.1.3.209\ proto esp reqid 16433 mode tunnel\ src 192.1.3.209/32 dst 192.1.2.23/32 \ dir fwd priority 2088927 ptype main \ tmpl src 192.1.3.209 dst 192.1.2.23\ proto esp reqid 16433 mode tunnel\ src 192.1.3.209/32 dst 192.1.2.23/32 \ dir in priority 2088927 ptype main \ tmpl src 192.1.3.209 dst 192.1.2.23\ proto esp reqid 16433 mode tunnel\ src 192.1.2.23/32 dst 192.1.3.0/24 \ dir out priority 2088935 ptype main \ tmpl src 0.0.0.0 dst 0.0.0.0\ proto esp reqid 0 mode transport\ src 192.1.2.253/32 dst 192.1.2.23/32 \ dir fwd priority 1564639 ptype main \ src 192.1.2.253/32 dst 192.1.2.23/32 \ dir in priority 1564639 ptype main \ src 192.1.2.23/32 dst 192.1.2.253/32 \ dir out priority 1564639 ptype main \ src 192.1.3.253/32 dst 192.1.2.23/32 \ dir fwd priority 1564639 ptype main \ src 192.1.3.253/32 dst 192.1.2.23/32 \ dir in priority 1564639 ptype main \ src 192.1.2.23/32 dst 192.1.3.253/32 \ dir out priority 1564639 ptype main \ src 192.1.3.254/32 dst 192.1.2.23/32 \ dir fwd priority 1564639 ptype main \ src 192.1.3.254/32 dst 192.1.2.23/32 \ dir in priority 1564639 ptype main \ src 192.1.2.23/32 dst 192.1.3.254/32 \ dir out priority 1564639 ptype main \ src 192.1.2.254/32 dst 192.1.2.23/32 \ dir fwd priority 1564639 ptype main \ src 192.1.2.254/32 dst 192.1.2.23/32 \ dir in priority 1564639 ptype main \ src 192.1.2.23/32 dst 192.1.2.254/32 \ dir out priority 1564639 ptype main \ src 0.0.0.0/0 dst 192.1.2.23/32 \ dir fwd priority 1564639 ptype main \ src 0.0.0.0/0 dst 192.1.2.23/32 \ dir in priority 1564639 ptype main \ src 192.1.2.23/32 dst 0.0.0.0/0 \ dir out priority 1564639 ptype main \ end raw xfrm state: ==== tuc ==== east Mon Aug 26 13:18:57 UTC 2019 XFRM state: src 192.1.3.209 dst 192.1.2.23 proto esp spi 0x306468d2 reqid 16433 mode tunnel replay-window 32 flag af-unspec aead rfc4106(gcm(aes)) 0x6c06a80669b8ff7d5190b6991e86db7cc373090aa38416a1cc4cbd9e19ce5175fc193aa1 128 anti-replay context: seq 0x2, oseq 0x0, bitmap 0x00000003 src 192.1.2.23 dst 192.1.3.209 proto esp spi 0xa3d6579a reqid 16433 mode tunnel replay-window 32 flag af-unspec aead rfc4106(gcm(aes)) 0xec46b0b1043bd2afbef779ed18197acfba2edf888add22d6d77d2e11dcd2fff4cca3cd5b 128 anti-replay context: seq 0x0, oseq 0x0, bitmap 0x00000000 XFRM policy: src 0.0.0.0/0 dst 192.1.2.23/32 dir fwd priority 1564639 ptype main src 0.0.0.0/0 dst 192.1.2.23/32 dir in priority 1564639 ptype main src 192.1.2.23/32 dst 0.0.0.0/0 dir out priority 1564639 ptype main src 192.1.2.23/32 dst 192.1.2.253/32 dir out priority 1564639 ptype main src 192.1.2.23/32 dst 192.1.2.254/32 dir out priority 1564639 ptype main src 192.1.2.23/32 dst 192.1.3.253/32 dir out priority 1564639 ptype main src 192.1.2.23/32 dst 192.1.3.254/32 dir out priority 1564639 ptype main src 192.1.2.253/32 dst 192.1.2.23/32 dir fwd priority 1564639 ptype main src 192.1.2.253/32 dst 192.1.2.23/32 dir in priority 1564639 ptype main src 192.1.2.254/32 dst 192.1.2.23/32 dir fwd priority 1564639 ptype main src 192.1.2.254/32 dst 192.1.2.23/32 dir in priority 1564639 ptype main src 192.1.3.253/32 dst 192.1.2.23/32 dir fwd priority 1564639 ptype main src 192.1.3.253/32 dst 192.1.2.23/32 dir in priority 1564639 ptype main src 192.1.3.254/32 dst 192.1.2.23/32 dir fwd priority 1564639 ptype main src 192.1.3.254/32 dst 192.1.2.23/32 dir in priority 1564639 ptype main src 192.1.2.23/32 dst 192.1.3.209/32 dir out priority 2088927 ptype main tmpl src 192.1.2.23 dst 192.1.3.209 proto esp reqid 16433 mode tunnel src 192.1.3.209/32 dst 192.1.2.23/32 dir fwd priority 2088927 ptype main tmpl src 192.1.3.209 dst 192.1.2.23 proto esp reqid 16433 mode tunnel src 192.1.3.209/32 dst 192.1.2.23/32 dir in priority 2088927 ptype main tmpl src 192.1.3.209 dst 192.1.2.23 proto esp reqid 16433 mode tunnel src 192.1.2.23/32 dst 192.1.3.0/24 dir out priority 2088935 ptype main tmpl src 0.0.0.0 dst 0.0.0.0 proto esp reqid 0 mode transport XFRM done IPSEC mangle TABLES NEW_IPSEC_CONN mangle TABLES ROUTING TABLES default via 192.1.2.254 dev eth1 192.0.1.0/24 via 192.1.2.45 dev eth1 192.0.2.0/24 dev eth0 proto kernel scope link src 192.0.2.254 192.1.2.0/24 dev eth1 proto kernel scope link src 192.1.2.23 NSS_CERTIFICATES Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI kroot@swantest:/home/build/libreswan/testing/pluto/newoe-19-poc-poc-clear\[root@east newoe-19-poc-poc-clear]# # A tunnel should have established kroot@swantest:/home/build/libreswan/testing/pluto/newoe-19-poc-poc-clear\[root@east newoe-19-poc-poc-clear]# grep "negotiated connection" /tmp/pluto.log "private-or-clear#192.1.3.0/24"[1] ...192.1.3.209 #2: negotiated connection [192.1.2.23-192.1.2.23:0-65535 0] -> [192.1.3.209-192.1.3.209:0-65535 0] kroot@swantest:/home/build/libreswan/testing/pluto/newoe-19-poc-poc-clear\[root@east newoe-19-poc-poc-clear]# : ==== cut ==== kroot@swantest:/home/build/libreswan/testing/pluto/newoe-19-poc-poc-clear\[root@east newoe-19-poc-poc-clear]# ipsec auto --status whack: is Pluto running? connect() for "/run/pluto/pluto.ctl" failed (111 Connection refused) kroot@swantest:/home/build/libreswan/testing/pluto/newoe-19-poc-poc-clear\[root@east newoe-19-poc-poc-clear 33]# >>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 final.sh 'ipsec auto --status' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 final.sh 'if [ -f /sbin/ausearch ]; then ausearch -r -m avc -ts recent ; fi' <<<<<<<<<