--- west.console.txt 2019-08-24 18:12:56.316672409 +0000 +++ OUTPUT/west.console.txt 2019-08-26 13:21:06.737476971 +0000 @@ -19,19 +19,14 @@ west # ping -c 4 -I 192.1.2.45 192.1.2.23 PING 192.1.2.23 (192.1.2.23) from 192.1.2.45 : 56(84) bytes of data. -64 bytes from 192.1.2.23: icmp_seq=2 ttl=64 time=0.XXX ms -64 bytes from 192.1.2.23: icmp_seq=3 ttl=64 time=0.XXX ms -64 bytes from 192.1.2.23: icmp_seq=4 ttl=64 time=0.XXX ms --- 192.1.2.23 ping statistics --- -4 packets transmitted, 3 received, 25% packet loss, time XXXX -rtt min/avg/max/mdev = 0.XXX/0.XXX/0.XXX/0.XXX ms +4 packets transmitted, 0 received, 100% packet loss, time XXXX west # echo "initdone" initdone west # ipsec whack --trafficstatus -006 #2: "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23, type=ESP, add_time=1234567890, inBytes=252, outBytes=252, id='ID_NULL' -006 #4: "private-or-clear#192.1.2.0/24"[2] ...192.1.2.254===10.0.10.1/32, type=ESP, add_time=1234567890, inBytes=252, outBytes=252, id='ID_NULL', lease=10.0.10.1/32 +whack: is Pluto running? connect() for "/run/pluto/pluto.ctl" failed (111 Connection refused) west # iptables -t nat -L -n Chain PREROUTING (policy ACCEPT) @@ -46,28 +41,6 @@ ../../pluto/bin/ipsec-look.sh west NOW XFRM state: -src 192.1.2.254 dst 192.1.2.45 - proto esp spi 0xSPISPI reqid REQID mode tunnel - replay-window 32 flag af-unspec - aead rfc4106(gcm(aes)) 0xENCAUTHKEY 128 - encap type espinudp sport 4500 dport 4500 addr 0.0.0.0 -src 192.1.2.45 dst 192.1.2.254 - proto esp spi 0xSPISPI reqid REQID mode tunnel - replay-window 32 flag af-unspec - aead rfc4106(gcm(aes)) 0xENCAUTHKEY 128 - encap type espinudp sport 4500 dport 4500 addr 0.0.0.0 -src 192.1.2.23 dst 192.1.2.45 - proto esp spi 0xSPISPI reqid REQID mode tunnel - replay-window 32 flag af-unspec - aead rfc4106(gcm(aes)) 0xENCAUTHKEY 128 -src 192.1.2.45 dst 192.1.2.23 - proto esp spi 0xSPISPI reqid REQID mode tunnel - replay-window 32 flag af-unspec - aead rfc4106(gcm(aes)) 0xENCAUTHKEY 128 -src 192.1.2.45 dst 192.1.2.23 - proto esp spi 0xSPISPI reqid REQID mode transport - replay-window 0 - sel src 192.1.2.45/32 dst 192.1.2.23/32 proto icmp type 8 code 0 dev eth1 XFRM policy: src 192.1.2.253/32 dst 192.1.2.45/32 dir fwd priority 1564639 ptype main @@ -87,34 +60,12 @@ dir fwd priority 1564639 ptype main src 192.1.3.254/32 dst 192.1.2.45/32 dir in priority 1564639 ptype main -src 10.0.10.1/32 dst 192.1.2.45/32 - dir fwd priority 2088927 ptype main - tmpl src 192.1.2.254 dst 192.1.2.45 - proto esp reqid REQID mode tunnel -src 10.0.10.1/32 dst 192.1.2.45/32 - dir in priority 2088927 ptype main - tmpl src 192.1.2.254 dst 192.1.2.45 - proto esp reqid REQID mode tunnel -src 192.1.2.23/32 dst 192.1.2.45/32 - dir fwd priority 2088927 ptype main - tmpl src 192.1.2.23 dst 192.1.2.45 - proto esp reqid REQID mode tunnel -src 192.1.2.23/32 dst 192.1.2.45/32 - dir in priority 2088927 ptype main - tmpl src 192.1.2.23 dst 192.1.2.45 - proto esp reqid REQID mode tunnel -src 192.1.2.45/32 dst 10.0.10.1/32 - dir out priority 2088927 ptype main - tmpl src 192.1.2.45 dst 192.1.2.254 - proto esp reqid REQID mode tunnel -src 192.1.2.45/32 dst 192.1.2.23/32 - dir out priority 2088927 ptype main - tmpl src 192.1.2.45 dst 192.1.2.23 - proto esp reqid REQID mode tunnel src 192.1.2.45/32 dst 192.1.2.0/24 dir out priority 2088935 ptype main tmpl src 0.0.0.0 dst 0.0.0.0 proto esp reqid REQID mode transport +src 192.1.2.45/32 dst 192.1.2.23/32 + dir out priority 2088935 ptype main XFRM done IPSEC mangle TABLES NEW_IPSEC_CONN mangle TABLES