/testing/guestbin/swan-prep ]0;root@swantest:/home/build/libreswan/testing/pluto/ikev2-24-cryptoload[root@west ikev2-24-cryptoload]# ipsec start Redirecting to: namespaces direct start via ipsec pluto ]0;root@swantest:/home/build/libreswan/testing/pluto/ikev2-24-cryptoload[root@west ikev2-24-cryptoload]# /testing/pluto/bin/wait-until-pluto-started ]0;root@swantest:/home/build/libreswan/testing/pluto/ikev2-24-cryptoload[root@west ikev2-24-cryptoload]# ipsec auto --add multi 002 added IKEv2 connection "multi/1x1" 002 added IKEv2 connection "multi/1x2" 002 added IKEv2 connection "multi/1x3" 002 added IKEv2 connection "multi/1x4" 002 added IKEv2 connection "multi/2x1" 002 added IKEv2 connection "multi/2x2" 002 added IKEv2 connection "multi/2x3" 002 added IKEv2 connection "multi/2x4" 002 added IKEv2 connection "multi/3x1" 002 added IKEv2 connection "multi/3x2" 002 added IKEv2 connection "multi/3x3" 002 added IKEv2 connection "multi/3x4" 002 added IKEv2 connection "multi/4x1" 002 added IKEv2 connection "multi/4x2" 002 added IKEv2 connection "multi/4x3" 002 added IKEv2 connection "multi/4x4" ]0;root@swantest:/home/build/libreswan/testing/pluto/ikev2-24-cryptoload[root@west ikev2-24-cryptoload]# #ipsec whack --impair suppress-retransmits ]0;root@swantest:/home/build/libreswan/testing/pluto/ikev2-24-cryptoload[root@west ikev2-24-cryptoload]# echo "initdone" initdone ]0;root@swantest:/home/build/libreswan/testing/pluto/ikev2-24-cryptoload[root@west ikev2-24-cryptoload]# # probably best to attach pluto on east to gdb ]0;root@swantest:/home/build/libreswan/testing/pluto/ikev2-24-cryptoload[root@west ikev2-24-cryptoload]# ipsec auto --up multi 000 initiating all conns with alias='multi' 181 "multi/4x4" #1: initiating IKEv2 connection 000 "multi/4x3": queuing pending IPsec SA negotiating with 192.1.2.23 IKE SA #1 "multi/4x4" 000 "multi/4x2": queuing pending IPsec SA negotiating with 192.1.2.23 IKE SA #1 "multi/4x4" 000 "multi/4x1": queuing pending IPsec SA negotiating with 192.1.2.23 IKE SA #1 "multi/4x4" 000 "multi/3x4": queuing pending IPsec SA negotiating with 192.1.2.23 IKE SA #1 "multi/4x4" 000 "multi/3x3": queuing pending IPsec SA negotiating with 192.1.2.23 IKE SA #1 "multi/4x4" 000 "multi/3x2": queuing pending IPsec SA negotiating with 192.1.2.23 IKE SA #1 "multi/4x4" 000 "multi/3x1": queuing pending IPsec SA negotiating with 192.1.2.23 IKE SA #1 "multi/4x4" 000 "multi/2x4": queuing pending IPsec SA negotiating with 192.1.2.23 IKE SA #1 "multi/4x4" 000 "multi/2x3": queuing pending IPsec SA negotiating with 192.1.2.23 IKE SA #1 "multi/4x4" 000 "multi/2x2": queuing pending IPsec SA negotiating with 192.1.2.23 IKE SA #1 "multi/4x4" 000 "multi/2x1": queuing pending IPsec SA negotiating with 192.1.2.23 IKE SA #1 "multi/4x4" 000 "multi/1x4": queuing pending IPsec SA negotiating with 192.1.2.23 IKE SA #1 "multi/4x4" 000 "multi/1x3": queuing pending IPsec SA negotiating with 192.1.2.23 IKE SA #1 "multi/4x4" 000 "multi/1x2": queuing pending IPsec SA negotiating with 192.1.2.23 IKE SA #1 "multi/4x4" 000 "multi/1x1": queuing pending IPsec SA negotiating with 192.1.2.23 IKE SA #1 "multi/4x4" 181 "multi/4x4" #1: sent IKE_SA_INIT request 010 "multi/4x4" #1: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response 010 "multi/4x4" #1: STATE_PARENT_I1: retransmission; will wait 1 seconds for response 010 "multi/4x4" #1: STATE_PARENT_I1: retransmission; will wait 2 seconds for response 010 "multi/4x4" #1: STATE_PARENT_I1: retransmission; will wait 4 seconds for response ]0;root@swantest:/home/build/libreswan/testing/pluto/ikev2-24-cryptoload[root@west ikev2-24-cryptoload]# echo done done ]0;root@swantest:/home/build/libreswan/testing/pluto/ikev2-24-cryptoload[root@west ikev2-24-cryptoload]# ../../pluto/bin/ipsec-look.sh ==== cut ==== start raw xfrm state: end raw xfrm state: ==== tuc ==== west Sat Oct 31 15:25:21 UTC 2020 XFRM state: XFRM policy: XFRM done IPSEC mangle TABLES NEW_IPSEC_CONN mangle TABLES ROUTING TABLES default via 192.1.2.254 dev eth1 192.0.1.0/24 dev eth0 proto kernel scope link src 192.0.1.254 192.0.2.0/24 via 192.1.2.23 dev eth1 192.1.2.0/24 dev eth1 proto kernel scope link src 192.1.2.45 NSS_CERTIFICATES Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI ]0;root@swantest:/home/build/libreswan/testing/pluto/ikev2-24-cryptoload[root@west ikev2-24-cryptoload]# ipsec stop Redirecting to: namespaces direct stop via ipsec whack --shutdown whack: is Pluto running? connect() for "/run/pluto/pluto.ctl" failed (111 Connection refused) ]0;root@swantest:/home/build/libreswan/testing/pluto/ikev2-24-cryptoload[root@west ikev2-24-cryptoload]# grep -e leak /tmp/pluto.log | grep -v -e '|' leak-detective enabled ]0;root@swantest:/home/build/libreswan/testing/pluto/ikev2-24-cryptoload[root@west ikev2-24-cryptoload]# : ==== cut ==== ]0;root@swantest:/home/build/libreswan/testing/pluto/ikev2-24-cryptoload[root@west ikev2-24-cryptoload]# ipsec auto --status whack: is Pluto running? connect() for "/run/pluto/pluto.ctl" failed (111 Connection refused) ]0;root@swantest:/home/build/libreswan/testing/pluto/ikev2-24-cryptoload[root@west ikev2-24-cryptoload 33]# >>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 final.sh 'ipsec auto --status' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 final.sh 'if [ -f /sbin/ausearch ]; then ausearch -r -m avc -ts recent ; fi' <<<<<<<<<>>>>>>>>>cut>>>>>>>>>> done <<<<<<<<<