--- west.console.txt 2019-08-24 18:12:56.315672445 +0000 +++ OUTPUT/west.console.txt 2019-08-26 13:20:32.817664559 +0000 @@ -29,17 +29,11 @@ west # ping -n -c 4 10.0.10.1 PING 10.0.10.1 (10.0.10.1) 56(84) bytes of data. -64 bytes from 10.0.10.1: icmp_seq=1 ttl=64 time=0.XXX ms -64 bytes from 10.0.10.1: icmp_seq=2 ttl=64 time=0.XXX ms -64 bytes from 10.0.10.1: icmp_seq=3 ttl=64 time=0.XXX ms -64 bytes from 10.0.10.1: icmp_seq=4 ttl=64 time=0.XXX ms --- 10.0.10.1 ping statistics --- -4 packets transmitted, 4 received, 0% packet loss, time XXXX -rtt min/avg/max/mdev = 0.XXX/0.XXX/0.XXX/0.XXX ms +4 packets transmitted, 0 received, 100% packet loss, time XXXX west # ipsec whack --trafficstatus -006 #2: "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23, type=ESP, add_time=1234567890, inBytes=252, outBytes=252, id='ID_NULL' -006 #4: "private-or-clear#192.1.2.0/24"[2] ...192.1.2.254===10.0.10.1/32, type=ESP, add_time=1234567890, inBytes=588, outBytes=588, id='ID_NULL', lease=10.0.10.1/32 +whack: is Pluto running? connect() for "/run/pluto/pluto.ctl" failed (111 Connection refused) west # iptables -t nat -L -n Chain PREROUTING (policy ACCEPT) @@ -54,24 +48,6 @@ ../../pluto/bin/ipsec-look.sh west NOW XFRM state: -src 192.1.2.254 dst 192.1.2.45 - proto esp spi 0xSPISPI reqid REQID mode tunnel - replay-window 0 - sel src 192.1.2.254/32 dst 192.1.2.45/32 -src 192.1.2.45 dst 192.1.2.254 - proto esp spi 0xSPISPI reqid REQID mode transport - replay-window 0 - sel src 192.1.2.45/32 dst 192.1.2.254/32 proto udp sport SPORT dport 53 dev eth1 -src 192.1.2.254 dst 192.1.2.45 - proto esp spi 0xSPISPI reqid REQID mode tunnel - replay-window 32 flag af-unspec - aead rfc4106(gcm(aes)) 0xENCAUTHKEY 128 - encap type espinudp sport 4500 dport 4500 addr 0.0.0.0 -src 192.1.2.45 dst 192.1.2.254 - proto esp spi 0xSPISPI reqid REQID mode tunnel - replay-window 32 flag af-unspec - aead rfc4106(gcm(aes)) 0xENCAUTHKEY 128 - encap type espinudp sport 4500 dport 4500 addr 0.0.0.0 src 192.1.2.23 dst 192.1.2.45 proto esp spi 0xSPISPI reqid REQID mode tunnel replay-window 32 flag af-unspec @@ -99,14 +75,6 @@ dir fwd priority 1564639 ptype main src 192.1.3.254/32 dst 192.1.2.45/32 dir in priority 1564639 ptype main -src 10.0.10.1/32 dst 192.1.2.45/32 - dir fwd priority 2088927 ptype main - tmpl src 192.1.2.254 dst 192.1.2.45 - proto esp reqid REQID mode tunnel -src 10.0.10.1/32 dst 192.1.2.45/32 - dir in priority 2088927 ptype main - tmpl src 192.1.2.254 dst 192.1.2.45 - proto esp reqid REQID mode tunnel src 192.1.2.23/32 dst 192.1.2.45/32 dir fwd priority 2088927 ptype main tmpl src 192.1.2.23 dst 192.1.2.45 @@ -115,10 +83,6 @@ dir in priority 2088927 ptype main tmpl src 192.1.2.23 dst 192.1.2.45 proto esp reqid REQID mode tunnel -src 192.1.2.45/32 dst 10.0.10.1/32 - dir out priority 2088927 ptype main - tmpl src 192.1.2.45 dst 192.1.2.254 - proto esp reqid REQID mode tunnel src 192.1.2.45/32 dst 192.1.2.23/32 dir out priority 2088927 ptype main tmpl src 192.1.2.45 dst 192.1.2.23 @@ -127,8 +91,6 @@ dir out priority 2088935 ptype main tmpl src 0.0.0.0 dst 0.0.0.0 proto esp reqid REQID mode transport -src 192.1.2.45/32 dst 192.1.2.254/32 - dir out priority 2088935 ptype main XFRM done IPSEC mangle TABLES NEW_IPSEC_CONN mangle TABLES