--- east.console.txt 2019-08-24 18:12:56.320672268 +0000 +++ OUTPUT/east.console.txt 2019-08-26 18:32:23.313582359 +0000 @@ -6,6 +6,7 @@ east # ipsec start Redirecting to: [initsystem] +Another app is currently holding the xtables lock. Perhaps you want to use the -w option? east # /testing/pluto/bin/wait-until-pluto-started east # @@ -22,7 +23,7 @@ # only east should show 1 tunnel, as road was restarted east # ipsec whack --trafficstatus -006 #2: "authenticated"[1] 192.1.3.209, type=ESP, add_time=1234567890, inBytes=168, outBytes=168, id='@road' +whack: is Pluto running? connect() for "/run/pluto/pluto.ctl" failed (111 Connection refused) east # # east shows the authnull is matched on preferred non-null connection, east # @@ -31,13 +32,12 @@ # additional 'authenticated' partial state lingers east # ipsec status | grep STATE_ -000 #1: "authenticated"[1] 192.1.3.209:500 STATE_PARENT_R2 (received v2I2, PARENT SA established); EVENT_SA_REKEY in XXs; newest ISAKMP; idle; -000 #2: "authenticated"[1] 192.1.3.209:500 STATE_V2_IPSEC_R (IPsec SA established); EVENT_SA_REKEY in XXs; newest IPSEC; eroute owner; isakmp#1; idle; -000 #3: "authenticated"[1] 192.1.3.209:500 STATE_PARENT_R1 (received v2I1, sent v2R1); EVENT_SO_DISCARD in XXs; idle; +whack: is Pluto running? connect() for "/run/pluto/pluto.ctl" failed (111 Connection refused) east # # verify no packets were dropped due to missing SPD policies east # grep -v -P "\t0$" /proc/net/xfrm_stat +XfrmOutNoStates 2 east # east # ../bin/check-for-core.sh