Starting UML PATH/start.sh
spawn PATH single
Linux version XXXX
On node 0 totalpages: 8192
Kernel command line:
Calibrating delay loop... XXXX bogomips
Dentry-cache hash table entries: NUMBERS
Inode-cache hash table entries: NUMBERS
Mount-cache hash table entries: NUMBERS
Buffer-cache hash table entries: NUMBERS
Page-cache hash table entries: NUMEBRS
POSIX conformance testing by UNIFIX
Linux NET4.0 for Linux 2.4
Based upon Swansea University Computer Society NET3.039
Initializing RT netlink socket
Starting kswapd
VFS: Diskquotas version dquot_6.4.0 initialized
devfs: VERSION Richard Gooch (rgooch@atnf.csiro.au)
devfs: boot_options Q
pty: 256 Unix98 ptys configured
SLIP: version 0.8.4-NET3.019-NEWTTY (dynamic channels, max=256).
loop: loaded (max 8 devices)
PPP generic driver version VERSION
Universal TUN/TAP device driver VERSION
NET4: Linux TCP/IP 1.0 for NET4.0
IP Protocols: ICMP, UDP, TCP
IP: routing cache hash table of 512 buckets, 4Kbytes
TCP: Hash tables configured (established 2048 bind 2048)
IPv4 over IPv4 tunneling driver
GRE over IPv4 tunneling driver
NET4: Unix domain sockets 1.0/SMP for Linux NET4.0.
Mounted devfs on /dev
INIT: version 2.78 booting
Activating swap...
Calculating module dependancies
done.
Loading modules: LIST

Checking all file systems...
Parallelizing fsck version 1.18 (11-Nov-1999)
Setting kernel variables.
Mounting local filesystems...
/dev/shm on /tmp type tmpfs (rw)
/dev/shm on /var/run type tmpfs (rw)
devpts on /dev/pts type devpts (rw,mode=0622)
none on /usr/share type hostfs (ro)
Enabling packet forwarding: done.
Configuring network interfaces: done.
Cleaning: /tmp /var/lock /var/run.
Initializing random number generator... done.
Recovering nvi editor sessions... done.
Give root password for maintenance
(or type Control-D for normal startup): 
west:~#
 klogd -c 4 -x -f /tmp/klog.log
west:~#
 export PLUTO_CRYPTO_HELPER_DEBUG=true 
west:~#
 TESTNAME=helper-queue-01
west:~#
 source /testing/pluto/bin/westlocal.sh
west:~#
 ipsec setup start
ipsec_setup: Starting Libreswan IPsec VERSION
west:~#
 ipsec auto --add westnet-eastnet-aggr
west:~#
 ipsec auto --add westnet-bogus01
west:~#
 ipsec auto --add westnet-bogus02
west:~#
 ipsec auto --add westnet-bogus03
west:~#
 ipsec auto --add westnet-bogus04
west:~#
 ipsec auto --add westnet-bogus05
west:~#
 ipsec auto --add westnet-bogus06
west:~#
 ipsec auto --add westnet-bogus07
west:~#
 ipsec auto --add westnet-bogus08
west:~#
 ipsec auto --add westnet-bogus09
west:~#
 ipsec auto --add westnet-bogus10
west:~#
 /testing/pluto/bin/wait-until-pluto-started
west:~#
 ipsec whack --name westnet-bogus01 --initiate >/dev/null &
[1] 409
west:~#
 ipsec whack --name westnet-bogus02 --initiate >/dev/null &
[2] 410
west:~#
 ipsec whack --name westnet-bogus03 --initiate >/dev/null &
[3] 411
west:~#
 ipsec whack --name westnet-bogus04 --initiate >/dev/null &
[4] 412
west:~#
 ipsec whack --name westnet-bogus05 --initiate >/dev/null &
[5] 413
west:~#
 ipsec whack --name westnet-bogus06 --initiate >/dev/null &
[6] 414
west:~#
 ipsec whack --name westnet-bogus07 --initiate >/dev/null &
[7] 415
west:~#
 ipsec whack --name westnet-bogus08 --initiate >/dev/null &
[8] 416
west:~#
 ipsec whack --name westnet-bogus09 --initiate >/dev/null &
[9] 417
west:~#
 ipsec whack --name westnet-bogus10 --initiate >/dev/null &
[10] 418
west:~#
 ipsec whack --name westnet-eastnet-aggr --initiate 
002 "westnet-eastnet-aggr" #11: initiating Aggressive Mode #11, connection "westnet-eastnet-aggr"
112 "westnet-eastnet-aggr" #11: STATE_AGGR_I1: initiate
002 "westnet-eastnet-aggr" #11: Aggressive mode peer ID is ID_FQDN: '@east'
002 "westnet-eastnet-aggr" #11: Aggressive mode peer ID is ID_FQDN: '@east'
002 "westnet-eastnet-aggr" #11: transition from state STATE_AGGR_I1 to state STATE_AGGR_I2
002 "westnet-eastnet-aggr" #11: sent AI2, ISAKMP SA established
004 "westnet-eastnet-aggr" #11: STATE_AGGR_I2: sent AI2, ISAKMP SA established
002 "westnet-eastnet-aggr" #12: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP+AGGRESSIVE
west:~#
 echo done westinit.sh 
done westinit.sh
west:~#
 

west:~#
 ipsec look
west NOW
ipsec0->eth1 mtu=16260(9999)->1500
Destination     Gateway         Genmask         Flags   MSS Window  irtt Iface
0.0.0.0         192.1.2.254     0.0.0.0         UG       99 0          0 eth1
192.0.2.0       192.1.2.23      255.255.255.0   UG       99 0          0 eth1
192.1.2.0       0.0.0.0         255.255.255.0   U        99 0          0 eth1
192.1.2.0       0.0.0.0         255.255.255.0   U        99 0          0 ipsec0
west:~#
west:~#
 ipsec setup stop
IPSEC EVENT: KLIPS device ipsec0 shut down.
ipsec_setup: Stopping Libreswan IPsec...
[1]   Exit 10                 ipsec whack --name westnet-bogus01 --initiate >/dev/null
[2]   Exit 10                 ipsec whack --name westnet-bogus02 --initiate >/dev/null
[3]   Exit 10                 ipsec whack --name westnet-bogus03 --initiate >/dev/null
[4]   Exit 10                 ipsec whack --name westnet-bogus04 --initiate >/dev/null
[5]   Exit 10                 ipsec whack --name westnet-bogus05 --initiate >/dev/null
[6]   Exit 10                 ipsec whack --name westnet-bogus06 --initiate >/dev/null
[7]   Exit 10                 ipsec whack --name westnet-bogus07 --initiate >/dev/null
[8]   Exit 10                 ipsec whack --name westnet-bogus08 --initiate >/dev/null
[9]-  Exit 10                 ipsec whack --name westnet-bogus09 --initiate >/dev/null
[10]+  Exit 10                 ipsec whack --name westnet-bogus10 --initiate >/dev/null
west:~#
 kill `cat /var/run/klogd.pid`; cat /tmp/klog.log
klogd 1.3-3#33.1, log source = /proc/kmsg started.
west:~#
 halt -p -f
Power down.

