/testing/guestbin/swan-prep
road #
 cp policies/* /etc/ipsec.d/policies/
road #
 cp ikev2-oe.conf /etc/ipsec.d/ikev2-oe.conf
road #
 echo "192.1.2.0/24"  >> /etc/ipsec.d/policies/private-or-clear
road #
 ipsec start
Redirecting to: [initsystem]
road #
 /testing/pluto/bin/wait-until-pluto-started
road #
 ipsec whack --impair suppress-retransmits
road #
 ipsec auto --add road-east
conn 'road-east': not found (tried aliases)
road #
 ipsec auto --add road-west
conn 'road-west': not found (tried aliases)
road #
 # give OE a chance to load conns
road #
 sleep 3
road #
 ipsec auto --status
000 using kernel interface: netkey
000 interface lo/lo 127.0.0.1:4500
000 interface lo/lo 127.0.0.1:500
000 interface eth0/eth0 192.1.3.209:4500
000 interface eth0/eth0 192.1.3.209:500
000  
000  
000 fips mode=disabled;
000 SElinux=XXXXX
000 seccomp=OFF
000  
000 config setup options:
000  
000 configdir=/etc, configfile=/etc/ipsec.conf, secrets=/etc/ipsec.secrets, ipsecdir=/etc/ipsec.d
000 nssdir=/etc/ipsec.d, dumpdir=/tmp, statsbin=unset
000 dnssec-rootkey-file=/var/lib/unbound/root.key, dnssec-trusted=<unset>
000 sbindir=PATH/sbin, libexecdir=PATH/libexec/ipsec
000 nhelpers=-1, uniqueids=yes, dnssec-enable=yes, perpeerlog=no, logappend=no, logip=yes, shuntlifetime=900s, xfrmlifetime=30s
000 ddos-cookies-threshold=50000, ddos-max-halfopen=25000, ddos-mode=auto
000 ikeport=500, ikebuf=0, msg_errqueue=yes, strictcrlpolicy=no, crlcheckinterval=0, listen=<any>, nflog-all=0
000 ocsp-enable=no, ocsp-strict=no, ocsp-timeout=2, ocsp-uri=<unset>
000 ocsp-trust-name=<unset>
000 ocsp-cache-size=1000, ocsp-cache-min-age=3600, ocsp-cache-max-age=86400, ocsp-method=get
000 global-redirect=no, global-redirect-to=<unset>
000 secctx-attr-type=XXXX
000 debug ...
000  
000 nat-traversal=yes, keep-alive=20, nat-ikeport=4500
000 virtual-private (%priv):
000  
000 Kernel algorithms supported:
000  
000 algorithm ESP encrypt: name=3DES_CBC, keysizemin=192, keysizemax=192
000 algorithm ESP encrypt: name=AES_CBC, keysizemin=128, keysizemax=256
000 algorithm ESP encrypt: name=AES_CCM_12, keysizemin=128, keysizemax=256
000 algorithm ESP encrypt: name=AES_CCM_16, keysizemin=128, keysizemax=256
000 algorithm ESP encrypt: name=AES_CCM_8, keysizemin=128, keysizemax=256
000 algorithm ESP encrypt: name=AES_CTR, keysizemin=128, keysizemax=256
000 algorithm ESP encrypt: name=AES_GCM_12, keysizemin=128, keysizemax=256
000 algorithm ESP encrypt: name=AES_GCM_16, keysizemin=128, keysizemax=256
000 algorithm ESP encrypt: name=AES_GCM_8, keysizemin=128, keysizemax=256
000 algorithm ESP encrypt: name=CAMELLIA_CBC, keysizemin=128, keysizemax=256
000 algorithm ESP encrypt: name=CHACHA20_POLY1305, keysizemin=256, keysizemax=256
000 algorithm ESP encrypt: name=NULL, keysizemin=0, keysizemax=0
000 algorithm ESP encrypt: name=NULL_AUTH_AES_GMAC, keysizemin=128, keysizemax=256
000 algorithm ESP encrypt: name=SERPENT_CBC, keysizemin=128, keysizemax=256
000 algorithm ESP encrypt: name=TWOFISH_CBC, keysizemin=128, keysizemax=256
000 algorithm AH/ESP auth: name=AES_CMAC_96, key-length=128
000 algorithm AH/ESP auth: name=AES_XCBC_96, key-length=128
000 algorithm AH/ESP auth: name=HMAC_MD5_96, key-length=128
000 algorithm AH/ESP auth: name=HMAC_SHA1_96, key-length=160
000 algorithm AH/ESP auth: name=HMAC_SHA2_256_128, key-length=256
000 algorithm AH/ESP auth: name=HMAC_SHA2_256_TRUNCBUG, key-length=256
000 algorithm AH/ESP auth: name=HMAC_SHA2_384_192, key-length=384
000 algorithm AH/ESP auth: name=HMAC_SHA2_512_256, key-length=512
000 algorithm AH/ESP auth: name=NONE, key-length=0
000  
000 IKE algorithms supported:
000  
000 algorithm IKE encrypt: v1id=5, v1name=OAKLEY_3DES_CBC, v2id=3, v2name=3DES, blocksize=8, keydeflen=192
000 algorithm IKE encrypt: v1id=8, v1name=OAKLEY_CAMELLIA_CBC, v2id=23, v2name=CAMELLIA_CBC, blocksize=16, keydeflen=128
000 algorithm IKE encrypt: v1id=-1, v1name=n/a, v2id=20, v2name=AES_GCM_C, blocksize=16, keydeflen=128
000 algorithm IKE encrypt: v1id=-1, v1name=n/a, v2id=19, v2name=AES_GCM_B, blocksize=16, keydeflen=128
000 algorithm IKE encrypt: v1id=-1, v1name=n/a, v2id=18, v2name=AES_GCM_A, blocksize=16, keydeflen=128
000 algorithm IKE encrypt: v1id=13, v1name=OAKLEY_AES_CTR, v2id=13, v2name=AES_CTR, blocksize=16, keydeflen=128
000 algorithm IKE encrypt: v1id=7, v1name=OAKLEY_AES_CBC, v2id=12, v2name=AES_CBC, blocksize=16, keydeflen=128
000 algorithm IKE encrypt: v1id=65004, v1name=OAKLEY_SERPENT_CBC, v2id=65004, v2name=SERPENT_CBC, blocksize=16, keydeflen=128
000 algorithm IKE encrypt: v1id=65005, v1name=OAKLEY_TWOFISH_CBC, v2id=65005, v2name=TWOFISH_CBC, blocksize=16, keydeflen=128
000 algorithm IKE encrypt: v1id=65289, v1name=OAKLEY_TWOFISH_CBC_SSH, v2id=65289, v2name=TWOFISH_CBC_SSH, blocksize=16, keydeflen=128
000 algorithm IKE encrypt: v1id=-1, v1name=n/a, v2id=28, v2name=CHACHA20_POLY1305, blocksize=16, keydeflen=256
000 algorithm IKE PRF: name=HMAC_MD5, hashlen=16
000 algorithm IKE PRF: name=HMAC_SHA1, hashlen=20
000 algorithm IKE PRF: name=HMAC_SHA2_256, hashlen=32
000 algorithm IKE PRF: name=HMAC_SHA2_384, hashlen=48
000 algorithm IKE PRF: name=HMAC_SHA2_512, hashlen=64
000 algorithm IKE PRF: name=AES_XCBC, hashlen=16
000 algorithm IKE DH Key Exchange: name=MODP1536, bits=1536
000 algorithm IKE DH Key Exchange: name=MODP2048, bits=2048
000 algorithm IKE DH Key Exchange: name=MODP3072, bits=3072
000 algorithm IKE DH Key Exchange: name=MODP4096, bits=4096
000 algorithm IKE DH Key Exchange: name=MODP6144, bits=6144
000 algorithm IKE DH Key Exchange: name=MODP8192, bits=8192
000 algorithm IKE DH Key Exchange: name=DH19, bits=512
000 algorithm IKE DH Key Exchange: name=DH20, bits=768
000 algorithm IKE DH Key Exchange: name=DH21, bits=1056
000 algorithm IKE DH Key Exchange: name=DH31, bits=256
000  
000 stats db_ops: {curr_cnt, total_cnt, maxsz} :context={0,0,0} trans={0,0,0} attrs={0,0,0} 
000  
000 Connection list:
000  
000 "block": 192.1.3.209---192.1.3.254...%group; unrouted; eroute owner: #0
000 "block":     oriented; my_ip=unset; their_ip=unset; my_updown=ipsec _updown;
000 "block":   xauth us:none, xauth them:none,  my_username=[any]; their_username=[any]
000 "block":   our auth:unset, their auth:unset
000 "block":   modecfg info: us:none, them:none, modecfg policy:push, dns:unset, domains:unset, banner:unset, cat:unset;
000 "block":   labeled_ipsec:no;
000 "block":   policy_label:unset;
000 "block":   ike_life: 0s; ipsec_life: 0s; replay_window: 0; rekey_margin: 0s; rekey_fuzz: 0%; keyingtries: 0;
000 "block":   retransmit-interval: 9999ms; retransmit-timeout: 99s;
000 "block":   initial-contact:no; cisco-unity:no; fake-strongswan:no; send-vendorid:no; send-no-esp-tfc:no;
000 "block":   policy: AUTH_NEVER+GROUP+GROUTED+REJECT+NEVER_NEGOTIATE;
000 "block":   conn_prio: 32,32; interface: eth0; metric: 0; mtu: unset; sa_prio:auto; sa_tfc:none;
000 "block":   nflog-group: unset; mark: unset; vti-iface:unset; vti-routing:no; vti-shared:no; nic-offload:no;
000 "block":   our idtype: ID_IPV4_ADDR; our id=192.1.3.209; their idtype: %none; their id=(none)
000 "block":   dpd: action:disabled; delay:0; timeout:0; nat-t: encaps:no; nat_keepalive:no; ikev1_natt:both
000 "block":   newest ISAKMP SA: #0; newest IPsec SA: #0;
000 "clear": 192.1.3.209---192.1.3.254...%group; unrouted; eroute owner: #0
000 "clear":     oriented; my_ip=unset; their_ip=unset; my_updown=ipsec _updown;
000 "clear":   xauth us:none, xauth them:none,  my_username=[any]; their_username=[any]
000 "clear":   our auth:unset, their auth:unset
000 "clear":   modecfg info: us:none, them:none, modecfg policy:push, dns:unset, domains:unset, banner:unset, cat:unset;
000 "clear":   labeled_ipsec:no;
000 "clear":   policy_label:unset;
000 "clear":   ike_life: 0s; ipsec_life: 0s; replay_window: 0; rekey_margin: 0s; rekey_fuzz: 0%; keyingtries: 0;
000 "clear":   retransmit-interval: 9999ms; retransmit-timeout: 99s;
000 "clear":   initial-contact:no; cisco-unity:no; fake-strongswan:no; send-vendorid:no; send-no-esp-tfc:no;
000 "clear":   policy: AUTH_NEVER+GROUP+GROUTED+PASS+NEVER_NEGOTIATE;
000 "clear":   conn_prio: 32,32; interface: eth0; metric: 0; mtu: unset; sa_prio:auto; sa_tfc:none;
000 "clear":   nflog-group: unset; mark: unset; vti-iface:unset; vti-routing:no; vti-shared:no; nic-offload:no;
000 "clear":   our idtype: ID_IPV4_ADDR; our id=192.1.3.209; their idtype: %none; their id=(none)
000 "clear":   dpd: action:disabled; delay:0; timeout:0; nat-t: encaps:no; nat_keepalive:no; ikev1_natt:both
000 "clear":   newest ISAKMP SA: #0; newest IPsec SA: #0;
000 "clear#192.1.2.253/32": 192.1.3.209---192.1.3.254...%any; prospective erouted; eroute owner: #0
000 "clear#192.1.2.253/32":     oriented; my_ip=unset; their_ip=unset; my_updown=ipsec _updown;
000 "clear#192.1.2.253/32":   xauth us:none, xauth them:none,  my_username=[any]; their_username=[any]
000 "clear#192.1.2.253/32":   our auth:unset, their auth:unset
000 "clear#192.1.2.253/32":   modecfg info: us:none, them:none, modecfg policy:push, dns:unset, domains:unset, banner:unset, cat:unset;
000 "clear#192.1.2.253/32":   labeled_ipsec:no;
000 "clear#192.1.2.253/32":   policy_label:unset;
000 "clear#192.1.2.253/32":   ike_life: 0s; ipsec_life: 0s; replay_window: 0; rekey_margin: 0s; rekey_fuzz: 0%; keyingtries: 0;
000 "clear#192.1.2.253/32":   retransmit-interval: 9999ms; retransmit-timeout: 99s;
000 "clear#192.1.2.253/32":   initial-contact:no; cisco-unity:no; fake-strongswan:no; send-vendorid:no; send-no-esp-tfc:no;
000 "clear#192.1.2.253/32":   policy: AUTH_NEVER+GROUPINSTANCE+PASS+NEVER_NEGOTIATE;
000 "clear#192.1.2.253/32":   conn_prio: 32,32; interface: eth0; metric: 0; mtu: unset; sa_prio:auto; sa_tfc:none;
000 "clear#192.1.2.253/32":   nflog-group: unset; mark: unset; vti-iface:unset; vti-routing:no; vti-shared:no; nic-offload:no;
000 "clear#192.1.2.253/32":   our idtype: ID_IPV4_ADDR; our id=192.1.3.209; their idtype: %none; their id=(none)
000 "clear#192.1.2.253/32":   dpd: action:disabled; delay:0; timeout:0; nat-t: encaps:no; nat_keepalive:no; ikev1_natt:both
000 "clear#192.1.2.253/32":   newest ISAKMP SA: #0; newest IPsec SA: #0;
000 "clear#192.1.3.253/32": 192.1.3.209---192.1.3.254...%any; prospective erouted; eroute owner: #0
000 "clear#192.1.3.253/32":     oriented; my_ip=unset; their_ip=unset; my_updown=ipsec _updown;
000 "clear#192.1.3.253/32":   xauth us:none, xauth them:none,  my_username=[any]; their_username=[any]
000 "clear#192.1.3.253/32":   our auth:unset, their auth:unset
000 "clear#192.1.3.253/32":   modecfg info: us:none, them:none, modecfg policy:push, dns:unset, domains:unset, banner:unset, cat:unset;
000 "clear#192.1.3.253/32":   labeled_ipsec:no;
000 "clear#192.1.3.253/32":   policy_label:unset;
000 "clear#192.1.3.253/32":   ike_life: 0s; ipsec_life: 0s; replay_window: 0; rekey_margin: 0s; rekey_fuzz: 0%; keyingtries: 0;
000 "clear#192.1.3.253/32":   retransmit-interval: 9999ms; retransmit-timeout: 99s;
000 "clear#192.1.3.253/32":   initial-contact:no; cisco-unity:no; fake-strongswan:no; send-vendorid:no; send-no-esp-tfc:no;
000 "clear#192.1.3.253/32":   policy: AUTH_NEVER+GROUPINSTANCE+PASS+NEVER_NEGOTIATE;
000 "clear#192.1.3.253/32":   conn_prio: 32,32; interface: eth0; metric: 0; mtu: unset; sa_prio:auto; sa_tfc:none;
000 "clear#192.1.3.253/32":   nflog-group: unset; mark: unset; vti-iface:unset; vti-routing:no; vti-shared:no; nic-offload:no;
000 "clear#192.1.3.253/32":   our idtype: ID_IPV4_ADDR; our id=192.1.3.209; their idtype: %none; their id=(none)
000 "clear#192.1.3.253/32":   dpd: action:disabled; delay:0; timeout:0; nat-t: encaps:no; nat_keepalive:no; ikev1_natt:both
000 "clear#192.1.3.253/32":   newest ISAKMP SA: #0; newest IPsec SA: #0;
000 "clear#192.1.3.254/32": 192.1.3.209---192.1.3.254...%any; prospective erouted; eroute owner: #0
000 "clear#192.1.3.254/32":     oriented; my_ip=unset; their_ip=unset; my_updown=ipsec _updown;
000 "clear#192.1.3.254/32":   xauth us:none, xauth them:none,  my_username=[any]; their_username=[any]
000 "clear#192.1.3.254/32":   our auth:unset, their auth:unset
000 "clear#192.1.3.254/32":   modecfg info: us:none, them:none, modecfg policy:push, dns:unset, domains:unset, banner:unset, cat:unset;
000 "clear#192.1.3.254/32":   labeled_ipsec:no;
000 "clear#192.1.3.254/32":   policy_label:unset;
000 "clear#192.1.3.254/32":   ike_life: 0s; ipsec_life: 0s; replay_window: 0; rekey_margin: 0s; rekey_fuzz: 0%; keyingtries: 0;
000 "clear#192.1.3.254/32":   retransmit-interval: 9999ms; retransmit-timeout: 99s;
000 "clear#192.1.3.254/32":   initial-contact:no; cisco-unity:no; fake-strongswan:no; send-vendorid:no; send-no-esp-tfc:no;
000 "clear#192.1.3.254/32":   policy: AUTH_NEVER+GROUPINSTANCE+PASS+NEVER_NEGOTIATE;
000 "clear#192.1.3.254/32":   conn_prio: 32,32; interface: eth0; metric: 0; mtu: unset; sa_prio:auto; sa_tfc:none;
000 "clear#192.1.3.254/32":   nflog-group: unset; mark: unset; vti-iface:unset; vti-routing:no; vti-shared:no; nic-offload:no;
000 "clear#192.1.3.254/32":   our idtype: ID_IPV4_ADDR; our id=192.1.3.209; their idtype: %none; their id=(none)
000 "clear#192.1.3.254/32":   dpd: action:disabled; delay:0; timeout:0; nat-t: encaps:no; nat_keepalive:no; ikev1_natt:both
000 "clear#192.1.3.254/32":   newest ISAKMP SA: #0; newest IPsec SA: #0;
000 "clear-or-private": 192.1.3.209[ID_NULL,+MC+CAT+S=C]---192.1.3.254...%opportunisticgroup[ID_NULL,MS+S=C]; unrouted; eroute owner: #0
000 "clear-or-private":     oriented; my_ip=unset; their_ip=unset; my_updown=ipsec _updown;
000 "clear-or-private":   xauth us:none, xauth them:none,  my_username=[any]; their_username=[any]
000 "clear-or-private":   our auth:null, their auth:null
000 "clear-or-private":   modecfg info: us:client, them:server, modecfg policy:push, dns:unset, domains:unset, banner:unset, cat:set;
000 "clear-or-private":   labeled_ipsec:no;
000 "clear-or-private":   policy_label:unset;
000 "clear-or-private":   ike_life: 3600s; ipsec_life: 28800s; replay_window: 32; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0;
000 "clear-or-private":   retransmit-interval: 9999ms; retransmit-timeout: 99s;
000 "clear-or-private":   initial-contact:no; cisco-unity:no; fake-strongswan:no; send-vendorid:no; send-no-esp-tfc:no;
000 "clear-or-private":   policy: AUTHNULL+ENCRYPT+TUNNEL+PFS+NEGO_PASS+OPPORTUNISTIC+GROUP+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS;
000 "clear-or-private":   conn_prio: 32,0; interface: eth0; metric: 0; mtu: unset; sa_prio:auto; sa_tfc:none;
000 "clear-or-private":   nflog-group: unset; mark: unset; vti-iface:unset; vti-routing:no; vti-shared:no; nic-offload:auto;
000 "clear-or-private":   our idtype: ID_NULL; our id=ID_NULL; their idtype: ID_NULL; their id=ID_NULL
000 "clear-or-private":   dpd: action:hold; delay:0; timeout:0; nat-t: encaps:auto; nat_keepalive:yes; ikev1_natt:both
000 "clear-or-private":   newest ISAKMP SA: #0; newest IPsec SA: #0;
000 "private": 192.1.3.209[ID_NULL,+MC+CAT+S=C]---192.1.3.254...%opportunisticgroup[ID_NULL,MS+S=C]; unrouted; eroute owner: #0
000 "private":     oriented; my_ip=unset; their_ip=unset; my_updown=ipsec _updown;
000 "private":   xauth us:none, xauth them:none,  my_username=[any]; their_username=[any]
000 "private":   our auth:null, their auth:null
000 "private":   modecfg info: us:client, them:server, modecfg policy:push, dns:unset, domains:unset, banner:unset, cat:set;
000 "private":   labeled_ipsec:no;
000 "private":   policy_label:unset;
000 "private":   ike_life: 3600s; ipsec_life: 28800s; replay_window: 32; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0;
000 "private":   retransmit-interval: 9999ms; retransmit-timeout: 99s;
000 "private":   initial-contact:no; cisco-unity:no; fake-strongswan:no; send-vendorid:no; send-no-esp-tfc:no;
000 "private":   policy: AUTHNULL+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC+GROUP+GROUTED+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failureDROP;
000 "private":   conn_prio: 32,0; interface: eth0; metric: 0; mtu: unset; sa_prio:auto; sa_tfc:none;
000 "private":   nflog-group: unset; mark: unset; vti-iface:unset; vti-routing:no; vti-shared:no; nic-offload:auto;
000 "private":   our idtype: ID_NULL; our id=ID_NULL; their idtype: ID_NULL; their id=ID_NULL
000 "private":   dpd: action:hold; delay:0; timeout:0; nat-t: encaps:auto; nat_keepalive:yes; ikev1_natt:both
000 "private":   newest ISAKMP SA: #0; newest IPsec SA: #0;
000 "private-or-clear": 192.1.3.209[ID_NULL,+MC+CAT+S=C]---192.1.3.254...%opportunisticgroup[ID_NULL,MS+S=C]; unrouted; eroute owner: #0
000 "private-or-clear":     oriented; my_ip=unset; their_ip=unset; my_updown=ipsec _updown;
000 "private-or-clear":   xauth us:none, xauth them:none,  my_username=[any]; their_username=[any]
000 "private-or-clear":   our auth:null, their auth:null
000 "private-or-clear":   modecfg info: us:client, them:server, modecfg policy:push, dns:unset, domains:unset, banner:unset, cat:set;
000 "private-or-clear":   labeled_ipsec:no;
000 "private-or-clear":   policy_label:unset;
000 "private-or-clear":   ike_life: 3600s; ipsec_life: 28800s; replay_window: 32; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0;
000 "private-or-clear":   retransmit-interval: 9999ms; retransmit-timeout: 99s;
000 "private-or-clear":   initial-contact:no; cisco-unity:no; fake-strongswan:no; send-vendorid:no; send-no-esp-tfc:no;
000 "private-or-clear":   policy: AUTHNULL+ENCRYPT+TUNNEL+PFS+NEGO_PASS+OPPORTUNISTIC+GROUP+GROUTED+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS;
000 "private-or-clear":   conn_prio: 32,0; interface: eth0; metric: 0; mtu: unset; sa_prio:auto; sa_tfc:none;
000 "private-or-clear":   nflog-group: unset; mark: unset; vti-iface:unset; vti-routing:no; vti-shared:no; nic-offload:auto;
000 "private-or-clear":   our idtype: ID_NULL; our id=ID_NULL; their idtype: ID_NULL; their id=ID_NULL
000 "private-or-clear":   dpd: action:hold; delay:0; timeout:0; nat-t: encaps:auto; nat_keepalive:yes; ikev1_natt:both
000 "private-or-clear":   newest ISAKMP SA: #0; newest IPsec SA: #0;
000 "private-or-clear#192.1.2.0/24": 192.1.3.209[ID_NULL,+MC+CAT+S=C]---192.1.3.254...%opportunistic[ID_NULL,MS+S=C]===192.1.2.0/24; prospective erouted; eroute owner: #0
000 "private-or-clear#192.1.2.0/24":     oriented; my_ip=unset; their_ip=unset; my_updown=ipsec _updown;
000 "private-or-clear#192.1.2.0/24":   xauth us:none, xauth them:none,  my_username=[any]; their_username=[any]
000 "private-or-clear#192.1.2.0/24":   our auth:null, their auth:null
000 "private-or-clear#192.1.2.0/24":   modecfg info: us:client, them:server, modecfg policy:push, dns:unset, domains:unset, banner:unset, cat:set;
000 "private-or-clear#192.1.2.0/24":   labeled_ipsec:no;
000 "private-or-clear#192.1.2.0/24":   policy_label:unset;
000 "private-or-clear#192.1.2.0/24":   ike_life: 3600s; ipsec_life: 28800s; replay_window: 32; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0;
000 "private-or-clear#192.1.2.0/24":   retransmit-interval: 9999ms; retransmit-timeout: 99s;
000 "private-or-clear#192.1.2.0/24":   initial-contact:no; cisco-unity:no; fake-strongswan:no; send-vendorid:no; send-no-esp-tfc:no;
000 "private-or-clear#192.1.2.0/24":   policy: AUTHNULL+ENCRYPT+TUNNEL+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS;
000 "private-or-clear#192.1.2.0/24":   conn_prio: 32,0; interface: eth0; metric: 0; mtu: unset; sa_prio:auto; sa_tfc:none;
000 "private-or-clear#192.1.2.0/24":   nflog-group: unset; mark: unset; vti-iface:unset; vti-routing:no; vti-shared:no; nic-offload:auto;
000 "private-or-clear#192.1.2.0/24":   our idtype: ID_NULL; our id=ID_NULL; their idtype: ID_NULL; their id=ID_NULL
000 "private-or-clear#192.1.2.0/24":   dpd: action:hold; delay:0; timeout:0; nat-t: encaps:auto; nat_keepalive:yes; ikev1_natt:both
000 "private-or-clear#192.1.2.0/24":   newest ISAKMP SA: #0; newest IPsec SA: #0;
000  
000 Total IPsec connections: loaded 9, active 0
000  
000 State Information: DDoS cookies not required, Accepting new IKE connections
000 IKE SAs: total(0), half-open(0), open(0), authenticated(0), anonymous(0)
000 IPsec SAs: total(0), authenticated(0), anonymous(0)
000  
000 Bare Shunt list:
000  
road #
 echo "initdone"
initdone
road #
 sleep 5
road #
 ipsec whack --trafficstatus
whack: is Pluto running?  connect() for "/run/pluto/pluto.ctl" failed (111 Connection refused)
road #
 ipsec whack --shuntstatus
whack: is Pluto running?  connect() for "/run/pluto/pluto.ctl" failed (111 Connection refused)
road #
 ../../pluto/bin/ipsec-look.sh
road NOW
XFRM state:
XFRM policy:
src 192.1.2.253/32 dst 192.1.3.209/32
	dir fwd priority 1564639 ptype main
src 192.1.2.253/32 dst 192.1.3.209/32
	dir in priority 1564639 ptype main
src 192.1.3.209/32 dst 192.1.2.253/32
	dir out priority 1564639 ptype main
src 192.1.3.209/32 dst 192.1.3.253/32
	dir out priority 1564639 ptype main
src 192.1.3.209/32 dst 192.1.3.254/32
	dir out priority 1564639 ptype main
src 192.1.3.253/32 dst 192.1.3.209/32
	dir fwd priority 1564639 ptype main
src 192.1.3.253/32 dst 192.1.3.209/32
	dir in priority 1564639 ptype main
src 192.1.3.254/32 dst 192.1.3.209/32
	dir fwd priority 1564639 ptype main
src 192.1.3.254/32 dst 192.1.3.209/32
	dir in priority 1564639 ptype main
src 192.1.3.209/32 dst 192.1.2.0/24
	dir out priority 2088935 ptype main
	tmpl src 0.0.0.0 dst 0.0.0.0
		proto esp reqid REQID mode transport
XFRM done
IPSEC mangle TABLES
NEW_IPSEC_CONN mangle TABLES
ROUTING TABLES
default via 192.1.3.254 dev eth0
192.1.3.0/24 dev eth0 proto kernel scope link src 192.1.3.209
NSS_CERTIFICATES
Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
road #
 killall ip > /dev/null 2> /dev/null
road #
 cp /tmp/xfrm-monitor.out OUTPUT/road.xfrm-monitor.txt
road #
 # ping should succeed through tunnel
road #
 ping -n -c 4 -I 192.1.3.209 192.1.2.23
PING 192.1.2.23 (192.1.2.23) from 192.1.3.209 : 56(84) bytes of data.
--- 192.1.2.23 ping statistics ---
4 packets transmitted, 0 received, 100% packet loss, time XXXX
road #
 ping -n -c 4 -I 192.1.3.209 192.1.2.45
PING 192.1.2.45 (192.1.2.45) from 192.1.3.209 : 56(84) bytes of data.
--- 192.1.2.45 ping statistics ---
4 packets transmitted, 0 received, 100% packet loss, time XXXX
road #
 echo done
done
road #
 ping -n -c 4 10.0.10.1
PING 10.0.10.1 (10.0.10.1) 56(84) bytes of data.
From 192.1.3.254 icmp_seq=1 Destination Net Unreachable
From 192.1.3.254 icmp_seq=2 Destination Net Unreachable
From 192.1.3.254 icmp_seq=3 Destination Net Unreachable
From 192.1.3.254 icmp_seq=4 Destination Net Unreachable
--- 10.0.10.1 ping statistics ---
4 packets transmitted, 0 received, +4 errors, 100% packet loss, time XXXX
road #
 ipsec whack --trafficstatus
whack: is Pluto running?  connect() for "/run/pluto/pluto.ctl" failed (111 Connection refused)
road #
 iptables -t nat -L -n
Chain PREROUTING (policy ACCEPT)
target     prot opt source               destination         
Chain INPUT (policy ACCEPT)
target     prot opt source               destination         
Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination         
Chain POSTROUTING (policy ACCEPT)
target     prot opt source               destination         
road #
 ../../pluto/bin/ipsec-look.sh
road NOW
XFRM state:
XFRM policy:
src 192.1.2.253/32 dst 192.1.3.209/32
	dir fwd priority 1564639 ptype main
src 192.1.2.253/32 dst 192.1.3.209/32
	dir in priority 1564639 ptype main
src 192.1.3.209/32 dst 192.1.2.253/32
	dir out priority 1564639 ptype main
src 192.1.3.209/32 dst 192.1.3.253/32
	dir out priority 1564639 ptype main
src 192.1.3.209/32 dst 192.1.3.254/32
	dir out priority 1564639 ptype main
src 192.1.3.253/32 dst 192.1.3.209/32
	dir fwd priority 1564639 ptype main
src 192.1.3.253/32 dst 192.1.3.209/32
	dir in priority 1564639 ptype main
src 192.1.3.254/32 dst 192.1.3.209/32
	dir fwd priority 1564639 ptype main
src 192.1.3.254/32 dst 192.1.3.209/32
	dir in priority 1564639 ptype main
src 192.1.3.209/32 dst 192.1.2.0/24
	dir out priority 2088935 ptype main
	tmpl src 0.0.0.0 dst 0.0.0.0
		proto esp reqid REQID mode transport
XFRM done
IPSEC mangle TABLES
NEW_IPSEC_CONN mangle TABLES
ROUTING TABLES
default via 192.1.3.254 dev eth0
192.1.3.0/24 dev eth0 proto kernel scope link src 192.1.3.209
NSS_CERTIFICATES
Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
road #
road #
 ../bin/check-for-core.sh
road #
 if [ -f /sbin/ausearch ]; then ausearch -r -m avc -ts recent ; fi