--- west.console.txt 2019-08-24 18:12:56.322672198 +0000 +++ OUTPUT/west.console.txt 2019-08-26 13:15:01.509264166 +0000 @@ -14,7 +14,6 @@ # confirm clear text does not get through west # ../../pluto/bin/ping-once.sh --down -I 192.0.1.254 192.0.2.254 -[ 00.00] IN=eth1 OUT= MAC=12:00:00:64:64:45:12:00:00:64:64:23:08:00 SRC=192.0.2.254 DST=192.0.1.254 LEN=XXXX TOS=0x00 PREC=0x00 TTL=64 ID=XXXXX PROTO=ICMP TYPE=0 CODE=0 ID=XXXX SEQ=1 down west # ipsec start @@ -80,15 +79,7 @@ cp /tmp/nflog-50.pcap OUTPUT/nflog-50.pcap west # tcpdump -n -r OUTPUT/nflog-50.pcap -reading from file OUTPUT/nflog-50.pcap, link-type NFLOG (Linux netfilter log messages) -IP 192.0.1.254 > 192.0.2.254: ICMP echo request, id XXXX, seq 1, length 64 -IP 192.0.2.254 > 192.0.1.254: ICMP echo reply, id XXXX, seq 1, length 64 -IP 192.0.1.254 > 192.0.2.254: ICMP echo request, id XXXX, seq 2, length 64 -IP 192.0.2.254 > 192.0.1.254: ICMP echo reply, id XXXX, seq 2, length 64 -IP 192.0.1.254 > 192.0.2.254: ICMP echo request, id XXXX, seq 3, length 64 -IP 192.0.2.254 > 192.0.1.254: ICMP echo reply, id XXXX, seq 3, length 64 -IP 192.0.1.254 > 192.0.2.254: ICMP echo request, id XXXX, seq 4, length 64 -IP 192.0.2.254 > 192.0.1.254: ICMP echo reply, id XXXX, seq 4, length 64 +tcpdump: truncated dump file; tried to read 4 file header bytes, only got 0 west # echo done done @@ -116,6 +107,8 @@ west # ipsec stop Redirecting to: [initsystem] +Shutting down pluto IKE daemon +002 shutting down west # # show no nflog left behind west #