/testing/guestbin/swan-prep --x509 Preparing X.509 files road # ipsec start Redirecting to: [initsystem] road # /testing/pluto/bin/wait-until-pluto-started road # ipsec whack --impair suppress-retransmits road # ipsec auto --add road 002 added connection description "road" road # echo "initdone" initdone road # ipsec auto --up road 002 "road"[1] 192.1.2.23 #1: initiating v2 parent SA 1v2 "road"[1] 192.1.2.23 #1: initiate 1v2 "road"[1] 192.1.2.23 #1: STATE_PARENT_I1: sent v2I1, expected v2R1 1v2 "road"[1] 192.1.2.23 #2: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048} 002 "road"[1] 192.1.2.23 #2: IKE SA authentication request rejected by peer: AUTHENTICATION_FAILED 000 "road"[1] 192.1.2.23 #2: scheduling retry attempt 1 of an unlimited number, but releasing whack road # ping -n -I 192.0.2.100 -c 4 192.0.2.254 bind: Cannot assign requested address road # echo done done road # ipsec whack --trafficstatus road # ../../pluto/bin/ipsec-look.sh | sed "s/dport [0-9][0-9][0-9][0-9][0-9]/dport DPORT/" road NOW XFRM state: src 192.1.2.23 dst 192.1.3.209 proto esp spi 0xSPISPI reqid REQID mode tunnel replay-window 0 sel src 192.1.2.23/32 dst 192.1.3.209/32 XFRM policy: XFRM done IPSEC mangle TABLES NEW_IPSEC_CONN mangle TABLES ROUTING TABLES default via 192.1.3.254 dev eth0 192.1.3.0/24 dev eth0 proto kernel scope link src 192.1.3.209 NSS_CERTIFICATES Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI Libreswan test CA for mainca - Libreswan CT,, east P,, east-ec P,, hashsha1 P,, nic P,, north P,, road u,u,u west P,, west-ec P,, road # road # ../bin/check-for-core.sh road # if [ -f /sbin/ausearch ]; then ausearch -r -m avc -ts recent ; fi