/testing/guestbin/swan-prep kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@east dynamic-iface-01]# ipsec start Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Redirecting to: /etc/init.d/ipsec start Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Starting pluto IKE daemon for IPsec: kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@east dynamic-iface-01]# /testing/pluto/bin/wait-until-pluto-started kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@east dynamic-iface-01]# ipsec auto --add west-east 002 added connection description "west-east" kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@east dynamic-iface-01]# ipsec auto --add float-east 002 added connection description "float-east" kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@east dynamic-iface-01]# ipsec auto --add west-float 002 added connection description "west-float" kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@east dynamic-iface-01]# echo "initdone" initdone kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@east dynamic-iface-01]# ../../pluto/bin/ipsec-look.sh ==== cut ==== start raw xfrm state: src 192.1.2.23/32 dst 192.1.2.66/32 \ dir out priority 1040351 ptype main \ tmpl src 192.1.2.23 dst 192.1.2.66\ proto esp reqid 16393 mode tunnel\ src 192.1.2.66/32 dst 192.1.2.23/32 \ dir fwd priority 1040351 ptype main \ tmpl src 192.1.2.66 dst 192.1.2.23\ proto esp reqid 16393 mode tunnel\ src 192.1.2.66/32 dst 192.1.2.23/32 \ dir in priority 1040351 ptype main \ tmpl src 192.1.2.66 dst 192.1.2.23\ proto esp reqid 16393 mode tunnel\ src 192.1.2.23/32 dst 192.1.2.45/32 \ dir out priority 1040351 ptype main \ tmpl src 192.1.2.23 dst 192.1.2.45\ proto esp reqid 16389 mode tunnel\ src 192.1.2.45/32 dst 192.1.2.23/32 \ dir fwd priority 1040351 ptype main \ tmpl src 192.1.2.45 dst 192.1.2.23\ proto esp reqid 16389 mode tunnel\ src 192.1.2.45/32 dst 192.1.2.23/32 \ dir in priority 1040351 ptype main \ tmpl src 192.1.2.45 dst 192.1.2.23\ proto esp reqid 16389 mode tunnel\ end raw xfrm state: ==== tuc ==== east Mon Aug 26 18:30:52 UTC 2019 XFRM state: src 192.1.2.66 dst 192.1.2.23 proto esp spi 0x80c6c526 reqid 16393 mode tunnel replay-window 32 flag af-unspec auth-trunc hmac(sha1) 0x3363c507284dcdda4f571b70c80ead6cf248e5e7 96 enc cbc(aes) 0x79556de9fa6c0a18972eb6ee02685d93 anti-replay context: seq 0x0, oseq 0x0, bitmap 0x00000000 src 192.1.2.23 dst 192.1.2.66 proto esp spi 0x39ffbcd5 reqid 16393 mode tunnel replay-window 32 flag af-unspec auth-trunc hmac(sha1) 0xbe5a91dc83803074c651e0f516c929d22b131681 96 enc cbc(aes) 0xd39fd9c09d6faa6afdaf53009875ab97 anti-replay context: seq 0x0, oseq 0x0, bitmap 0x00000000 src 192.1.2.45 dst 192.1.2.23 proto esp spi 0x5836f8a4 reqid 16389 mode tunnel replay-window 32 flag af-unspec auth-trunc hmac(sha1) 0xcfe8ddba696a5d7d30ba7924a896604bcd5ad319 96 enc cbc(aes) 0x13624c1e107e46b8f7a2bf62d021389e anti-replay context: seq 0x2, oseq 0x0, bitmap 0x00000003 src 192.1.2.23 dst 192.1.2.45 proto esp spi 0xe681fc54 reqid 16389 mode tunnel replay-window 32 flag af-unspec auth-trunc hmac(sha1) 0x70bd2e6452fad42a4e5aeddae9d76dae00b34af6 96 enc cbc(aes) 0x38eecc705662701961856fc38bab3cfc anti-replay context: seq 0x0, oseq 0x0, bitmap 0x00000000 XFRM policy: src 192.1.2.23/32 dst 192.1.2.45/32 dir out priority 1040351 ptype main tmpl src 192.1.2.23 dst 192.1.2.45 proto esp reqid 16389 mode tunnel src 192.1.2.23/32 dst 192.1.2.66/32 dir out priority 1040351 ptype main tmpl src 192.1.2.23 dst 192.1.2.66 proto esp reqid 16393 mode tunnel src 192.1.2.45/32 dst 192.1.2.23/32 dir fwd priority 1040351 ptype main tmpl src 192.1.2.45 dst 192.1.2.23 proto esp reqid 16389 mode tunnel src 192.1.2.45/32 dst 192.1.2.23/32 dir in priority 1040351 ptype main tmpl src 192.1.2.45 dst 192.1.2.23 proto esp reqid 16389 mode tunnel src 192.1.2.66/32 dst 192.1.2.23/32 dir fwd priority 1040351 ptype main tmpl src 192.1.2.66 dst 192.1.2.23 proto esp reqid 16393 mode tunnel src 192.1.2.66/32 dst 192.1.2.23/32 dir in priority 1040351 ptype main tmpl src 192.1.2.66 dst 192.1.2.23 proto esp reqid 16393 mode tunnel XFRM done IPSEC mangle TABLES NEW_IPSEC_CONN mangle TABLES ROUTING TABLES default via 192.1.2.254 dev eth1 192.0.1.0/24 via 192.1.2.45 dev eth1 192.0.2.0/24 dev eth0 proto kernel scope link src 192.0.2.254 192.1.2.0/24 dev eth1 proto kernel scope link src 192.1.2.23 NSS_CERTIFICATES Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@east dynamic-iface-01]# : ==== cut ==== kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@east dynamic-iface-01]# ipsec auto --status whack: is Pluto running? connect() for "/run/pluto/pluto.ctl" failed (111 Connection refused) kroot@swantest:/home/build/libreswan/testing/pluto/dynamic-iface-01\[root@east dynamic-iface-01 33]# >>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 final.sh 'ipsec auto --status' <<<<<<<<<