/testing/guestbin/swan-prep --x509 --x509name notyetvalid Preparing X.509 files west # certutil -d sql:/etc/ipsec.d -D -n east west # ipsec _stackmanager start west # mkdir -p /var/run/pluto west # # set a time in the future so notyetvalid and east certs are valid here west # faketime -f +370d ipsec pluto --config /etc/ipsec.conf west # /testing/pluto/bin/wait-until-pluto-started west # # if faketime works, adding conn should not give a warning about cert west # ipsec auto --add nss-cert 002 added connection description "nss-cert" west # echo "initdone" initdone west # ipsec whack --impair suppress-retransmits west # ipsec auto --up nss-cert 002 "nss-cert" #1: initiating v2 parent SA 1v2 "nss-cert" #1: initiate 1v2 "nss-cert" #1: STATE_PARENT_I1: sent v2I1, expected v2R1 1v2 "nss-cert" #2: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048} 002 "nss-cert" #2: IKE SA authentication request rejected by peer: AUTHENTICATION_FAILED 000 "nss-cert" #2: scheduling retry attempt 1 of an unlimited number, but releasing whack west # echo done done west # # will only show up on east - note "expired" is wrong and should be "not yet valid" west # grep "ERROR" /tmp/pluto.log west # west # ../bin/check-for-core.sh west # if [ -f /sbin/ausearch ]; then ausearch -r -m avc -ts recent ; fi