/testing/guestbin/swan-prep kroot@swantest:/home/build/libreswan/testing/pluto/newoe-27-replace-sa-auth-authnull\[root@road newoe-27-replace-sa-auth-authnull]# cp policies/* /etc/ipsec.d/policies/ kroot@swantest:/home/build/libreswan/testing/pluto/newoe-27-replace-sa-auth-authnull\[root@road newoe-27-replace-sa-auth-authnull]# echo "192.1.2.0/24" >> /etc/ipsec.d/policies/private-or-clear kroot@swantest:/home/build/libreswan/testing/pluto/newoe-27-replace-sa-auth-authnull\[root@road newoe-27-replace-sa-auth-authnull]# ipsec start Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Redirecting to: /etc/init.d/ipsec start Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Starting pluto IKE daemon for IPsec: kroot@swantest:/home/build/libreswan/testing/pluto/newoe-27-replace-sa-auth-authnull\[root@road newoe-27-replace-sa-auth-authnull]# /testing/pluto/bin/wait-until-pluto-started kroot@swantest:/home/build/libreswan/testing/pluto/newoe-27-replace-sa-auth-authnull\[root@road newoe-27-replace-sa-auth-authnull]# ipsec auto --add authenticated 002 added connection description "authenticated" kroot@swantest:/home/build/libreswan/testing/pluto/newoe-27-replace-sa-auth-authnull\[root@road newoe-27-replace-sa-auth-authnull]# # ensure for tests acquires expire before our failureshunt=2m kroot@swantest:/home/build/libreswan/testing/pluto/newoe-27-replace-sa-auth-authnull\[root@road newoe-27-replace-sa-auth-authnull]# echo 30 > /proc/sys/net/core/xfrm_acq_expires kroot@swantest:/home/build/libreswan/testing/pluto/newoe-27-replace-sa-auth-authnull\[root@road newoe-27-replace-sa-auth-authnull]# # give OE policies time to load kroot@swantest:/home/build/libreswan/testing/pluto/newoe-27-replace-sa-auth-authnull\[root@road newoe-27-replace-sa-auth-authnull]# sleep 5 kroot@swantest:/home/build/libreswan/testing/pluto/newoe-27-replace-sa-auth-authnull\[root@road newoe-27-replace-sa-auth-authnull]# echo "initdone" initdone kroot@swantest:/home/build/libreswan/testing/pluto/newoe-27-replace-sa-auth-authnull\[root@road newoe-27-replace-sa-auth-authnull]# # setup authenticated static conn kroot@swantest:/home/build/libreswan/testing/pluto/newoe-27-replace-sa-auth-authnull\[root@road newoe-27-replace-sa-auth-authnull]# ipsec auto --up authenticated 002 "authenticated" #1: initiating v2 parent SA 181 "authenticated" #1: initiate 002 "authenticated": constructed local IKE proposals for authenticated (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 181 "authenticated" #1: STATE_PARENT_I1: sent v2I1, expected v2R1 010 "authenticated" #1: STATE_PARENT_I1: retransmission; will wait 2 seconds for response 010 "authenticated" #1: STATE_PARENT_I1: retransmission; will wait 4 seconds for response 031 "authenticated" #1: STATE_PARENT_I1: 5 second timeout exceeded after 2 retransmits. No response (or no acceptable response) to our first IKEv2 message 002 "authenticated" #1: deleting state (STATE_PARENT_I1) aged 8.011s and NOT sending notification kroot@swantest:/home/build/libreswan/testing/pluto/newoe-27-replace-sa-auth-authnull\[root@road newoe-27-replace-sa-auth-authnull 31]# >>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 31 roadrun.sh 'ipsec auto --up authenticated' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 31 roadrun.sh '# should show established tunnel and no bare shunts' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 roadrun.sh 'ping -n -c 2 -I 192.1.3.209 192.1.2.23' <<<<<<<<<ev) (in free_signal_handlers() at server.c:624) /etc/init.d/ipsec: line 120: 1426 Aborted (core dumped) ${IPSEC_EXECDIR}/pluto --config ${IPSEC_CONF} ${PLUTO_OPTIONS} kroot@swantest:/home/build/libreswan/testing/pluto/newoe-27-replace-sa-auth-authnull\[root@road newoe-27-replace-sa-auth-authnull]# /testing/pluto/bin/wait-until-pluto-started whack: Pluto is not running (no "/run/pluto/pluto.ctl") kroot@swantest:/home/build/libreswan/testing/pluto/newoe-27-replace-sa-auth-authnull\[root@road newoe-27-replace-sa-auth-authnull 33]# >>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 roadrun.sh '/testing/pluto/bin/wait-until-pluto-started' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 roadrun.sh '# give OE policies time to load' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 roadrun.sh 'ping -n -c 2 -I 192.1.3.209 192.1.2.23' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 roadrun.sh '# There should NOT be an IPsec SA, and no shunt since we received failure' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 roadrun.sh 'ipsec whack --trafficstatus' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 roadrun.sh 'ipsec whack --shuntstatus' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 final.sh 'ipsec whack --trafficstatus' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 final.sh '# east shows the authnull is matched on preferred non-null connection,' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 final.sh '# then cannot find a (non-authnull) match and rejects it. So an' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 final.sh '# additional 'authenticated' partial state lingers' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 final.sh 'ipsec status | grep STATE_' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 final.sh '# verify no packets were dropped due to missing SPD policies' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 final.sh 'ipsec auto --status' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 final.sh 'if [ -f /sbin/ausearch ]; then ausearch -r -m avc -ts recent ; fi' <<<<<<<<<