/testing/guestbin/swan-prep --x509 Preparing X.509 files kroot@swantest:/home/build/libreswan/testing/pluto/ikev1-hostpair-02\[root@road ikev1-hostpair-02]# ipsec start Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Redirecting to: /etc/init.d/ipsec start Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Error: Peer netns reference is invalid. Starting pluto IKE daemon for IPsec: kroot@swantest:/home/build/libreswan/testing/pluto/ikev1-hostpair-02\[root@road ikev1-hostpair-02]# /testing/pluto/bin/wait-until-pluto-started kroot@swantest:/home/build/libreswan/testing/pluto/ikev1-hostpair-02\[root@road ikev1-hostpair-02]# ipsec whack --impair delete-on-retransmit kroot@swantest:/home/build/libreswan/testing/pluto/ikev1-hostpair-02\[root@road ikev1-hostpair-02]# ipsec whack --impair revival kroot@swantest:/home/build/libreswan/testing/pluto/ikev1-hostpair-02\[root@road ikev1-hostpair-02]# ipsec auto --add westnet-eastnet-ipv4-psk-ikev1 002 added connection description "westnet-eastnet-ipv4-psk-ikev1" kroot@swantest:/home/build/libreswan/testing/pluto/ikev1-hostpair-02\[root@road ikev1-hostpair-02]# echo "initdone" initdone kroot@swantest:/home/build/libreswan/testing/pluto/ikev1-hostpair-02\[root@road ikev1-hostpair-02]# ipsec whack --xauthname 'use3' --xauthpass 'use1pass' --initiate --name westnet-eastnet-ipv4-psk-ikev1 002 "westnet-eastnet-ipv4-psk-ikev1" #1: initiating Main Mode 102 "westnet-eastnet-ipv4-psk-ikev1" #1: STATE_MAIN_I1: initiate 104 "westnet-eastnet-ipv4-psk-ikev1" #1: STATE_MAIN_I2: sent MI2, expecting MR2 002 "westnet-eastnet-ipv4-psk-ikev1" #1: I am sending my cert 002 "westnet-eastnet-ipv4-psk-ikev1" #1: I am sending a certificate request 106 "westnet-eastnet-ipv4-psk-ikev1" #1: STATE_MAIN_I3: sent MI3, expecting MR3 002 "westnet-eastnet-ipv4-psk-ikev1" #1: Peer ID is ID_DER_ASN1_DN: 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' 002 "westnet-eastnet-ipv4-psk-ikev1" #1: certificate verified OK: E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA 003 "westnet-eastnet-ipv4-psk-ikev1" #1: Authenticated using RSA 004 "westnet-eastnet-ipv4-psk-ikev1" #1: STATE_MAIN_I4: ISAKMP SA established {auth=RSA_SIG cipher=AES_CBC_256 integ=HMAC_SHA2_256 group=MODP2048} 041 "westnet-eastnet-ipv4-psk-ikev1" #1: westnet-eastnet-ipv4-psk-ikev1 prompt for Username: 040 "westnet-eastnet-ipv4-psk-ikev1" #1: westnet-eastnet-ipv4-psk-ikev1 prompt for Password: 002 "westnet-eastnet-ipv4-psk-ikev1" #1: XAUTH: Answering XAUTH challenge with user='use3' 004 "westnet-eastnet-ipv4-psk-ikev1" #1: STATE_XAUTH_I1: XAUTH client - possibly awaiting CFG_set {auth=RSA_SIG cipher=AES_CBC_256 integ=HMAC_SHA2_256 group=MODP2048} 002 "westnet-eastnet-ipv4-psk-ikev1" #1: XAUTH: Successfully Authenticated 004 "westnet-eastnet-ipv4-psk-ikev1" #1: STATE_XAUTH_I1: XAUTH client - possibly awaiting CFG_set {auth=RSA_SIG cipher=AES_CBC_256 integ=HMAC_SHA2_256 group=MODP2048} 002 "westnet-eastnet-ipv4-psk-ikev1" #1: Received IP address 192.0.2.1/32 002 "westnet-eastnet-ipv4-psk-ikev1" #1: setting ip source address to 192.0.2.1/32 004 "westnet-eastnet-ipv4-psk-ikev1" #1: STATE_MAIN_I4: ISAKMP SA established {auth=RSA_SIG cipher=AES_CBC_256 integ=HMAC_SHA2_256 group=MODP2048} 002 "westnet-eastnet-ipv4-psk-ikev1" #2: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP+XAUTH+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO {using isakmp#1 msgid:8df44ddf proposal=defaults pfsgroup=MODP2048} 115 "westnet-eastnet-ipv4-psk-ikev1" #2: STATE_QUICK_I1: initiate 002 "westnet-eastnet-ipv4-psk-ikev1" #2: route-client output: Error: Peer netns reference is invalid. 002 "westnet-eastnet-ipv4-psk-ikev1" #2: route-client output: Error: Peer netns reference is invalid. 002 "westnet-eastnet-ipv4-psk-ikev1" #2: route-client output: Error: Peer netns reference is invalid. 002 "westnet-eastnet-ipv4-psk-ikev1" #2: route-client output: Error: Peer netns reference is invalid. 002 "westnet-eastnet-ipv4-psk-ikev1" #2: route-client output: Error: Peer netns reference is invalid. 002 "westnet-eastnet-ipv4-psk-ikev1" #2: route-client output: Error: Peer netns reference is invalid. 002 "westnet-eastnet-ipv4-psk-ikev1" #2: route-client output: Error: Peer netns reference is invalid. 002 "westnet-eastnet-ipv4-psk-ikev1" #2: route-client output: Error: Peer netns reference is invalid. 002 "westnet-eastnet-ipv4-psk-ikev1" #2: route-client output: Error: Peer netns reference is invalid. 002 "westnet-eastnet-ipv4-psk-ikev1" #2: route-client output: Error: Peer netns reference is invalid. 002 "westnet-eastnet-ipv4-psk-ikev1" #2: route-client output: Error: Peer netns reference is invalid. 002 "westnet-eastnet-ipv4-psk-ikev1" #2: route-client output: Error: Peer netns reference is invalid. 002 "westnet-eastnet-ipv4-psk-ikev1" #2: route-client output: Error: Peer netns reference is invalid. 002 "westnet-eastnet-ipv4-psk-ikev1" #2: route-client output: Error: Peer netns reference is invalid. 002 "westnet-eastnet-ipv4-psk-ikev1" #2: route-client output: Error: Peer netns reference is invalid. 004 "westnet-eastnet-ipv4-psk-ikev1" #2: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0x4e3c55e6 <0x8a54f83c xfrm=AES_CBC_128-HMAC_SHA1_96 NATOA=none NATD=192.1.2.23:4500 DPD=passive username=use3} kroot@swantest:/home/build/libreswan/testing/pluto/ikev1-hostpair-02\[root@road ikev1-hostpair-02]# ping -n -c 2 -I 192.0.2.1 192.1.2.23 PING 192.1.2.23 (192.1.2.23) from 192.0.2.1 : 56(84) bytes of data. 64 bytes from 192.1.2.23: icmp_seq=1 ttl=64 time=0.093 ms 64 bytes from 192.1.2.23: icmp_seq=2 ttl=64 time=0.070 ms --- 192.1.2.23 ping statistics --- 2 packets transmitted, 2 received, 0% packet loss, time 57ms rtt min/avg/max/mdev = 0.070/0.081/0.093/0.014 ms kroot@swantest:/home/build/libreswan/testing/pluto/ikev1-hostpair-02\[root@road ikev1-hostpair-02]# ipsec whack --trafficstatus 006 #2: "westnet-eastnet-ipv4-psk-ikev1", username=use3, type=ESP, add_time=0, inBytes=168, outBytes=168 kroot@swantest:/home/build/libreswan/testing/pluto/ikev1-hostpair-02\[root@road ikev1-hostpair-02]# # create havoc kroot@swantest:/home/build/libreswan/testing/pluto/ikev1-hostpair-02\[root@road ikev1-hostpair-02]# ipsec whack --impair send-no-delete kroot@swantest:/home/build/libreswan/testing/pluto/ikev1-hostpair-02\[root@road ikev1-hostpair-02]# ipsec auto --add westnet-eastnet-ipv4-psk-ikev1 connect(pluto_ctl) failed: Connection refused kroot@swantest:/home/build/libreswan/testing/pluto/ikev1-hostpair-02\[root@road ikev1-hostpair-02 255]# >>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 255 roadrun.sh 'ipsec auto --add westnet-eastnet-ipv4-psk-ikev1' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 roadrun.sh 'ipsec whack --xauthname 'use3' --xauthpass 'use1pass' --initiate --name westnet-eastnet-ipv4-psk-ikev1' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 255 roadrun.sh 'ipsec auto --add westnet-eastnet-ipv4-psk-ikev1' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 roadrun.sh 'ipsec whack --xauthname 'use3' --xauthpass 'use1pass' --initiate --name westnet-eastnet-ipv4-psk-ikev1' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 255 roadrun.sh 'ipsec auto --add westnet-eastnet-ipv4-psk-ikev1' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 roadrun.sh 'ipsec whack --xauthname 'use3' --xauthpass 'use1pass' --initiate --name westnet-eastnet-ipv4-psk-ikev1' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 roadrun.sh 'ping -n -c 4 -I 192.0.2.1 192.1.2.23' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 roadrun.sh 'ipsec whack --trafficstatus' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 final.sh 'ipsec status | grep STATE_' <<<<<<<<<