--- road.console.txt	2019-08-24 18:12:56.166677696 +0000
+++ OUTPUT/road.console.txt	2019-08-26 18:26:44.732436581 +0000
@@ -48,6 +48,7 @@
  # tunnel should be gone
 road #
  ipsec whack --trafficstatus
+whack: is Pluto running?  connect() for "/run/pluto/pluto.ctl" failed (111 Connection refused)
 road #
  echo done
 done
@@ -55,12 +56,34 @@
  ../../pluto/bin/ipsec-look.sh
 road NOW
 XFRM state:
+src 192.1.2.23 dst 192.1.3.209
+	proto esp spi 0xSPISPI reqid REQID mode tunnel
+	replay-window 32 flag af-unspec
+	aead rfc4106(gcm(aes)) 0xENCAUTHKEY 128
+src 192.1.3.209 dst 192.1.2.23
+	proto esp spi 0xSPISPI reqid REQID mode tunnel
+	replay-window 32 flag af-unspec
+	aead rfc4106(gcm(aes)) 0xENCAUTHKEY 128
 XFRM policy:
+src 0.0.0.0/0 dst 192.0.2.100/32
+	dir fwd priority 1040383 ptype main
+	tmpl src 192.1.2.23 dst 192.1.3.209
+		proto esp reqid REQID mode tunnel
+src 0.0.0.0/0 dst 192.0.2.100/32
+	dir in priority 1040383 ptype main
+	tmpl src 192.1.2.23 dst 192.1.3.209
+		proto esp reqid REQID mode tunnel
+src 192.0.2.100/32 dst 0.0.0.0/0
+	dir out priority 1040383 ptype main
+	tmpl src 192.1.3.209 dst 192.1.2.23
+		proto esp reqid REQID mode tunnel
 XFRM done
 IPSEC mangle TABLES
 NEW_IPSEC_CONN mangle TABLES
 ROUTING TABLES
+0.0.0.0/1 via 192.1.3.254 dev eth0 src 192.0.2.100
 default via 192.1.3.254 dev eth0
+128.0.0.0/1 via 192.1.3.254 dev eth0 src 192.0.2.100
 192.1.3.0/24 dev eth0 proto kernel scope link src 192.1.3.209
 NSS_CERTIFICATES
 Certificate Nickname                                         Trust Attributes