/testing/guestbin/swan-prep --x509
Preparing X.509 files
road #
 ipsec start
Redirecting to: systemctl start ipsec.service
road #
 /testing/pluto/bin/wait-until-pluto-started
road #
 ipsec auto --add road-east-x509-ipv4
002 added connection description "road-east-x509-ipv4"
road #
 echo "initdone"
initdone
road #
 #!/bin/sh
road #
 ipsec auto --up road-east-x509-ipv4
002 "road-east-x509-ipv4"[1] 192.1.2.23 #1: initiating v2 parent SA
133 "road-east-x509-ipv4"[1] 192.1.2.23 #1: STATE_PARENT_I1: initiate
133 "road-east-x509-ipv4"[1] 192.1.2.23 #1: STATE_PARENT_I1: sent v2I1, expected v2R1
134 "road-east-x509-ipv4"[1] 192.1.2.23 #2: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=aes_gcm_16_256 integ=n/a prf=sha2_512 group=MODP2048}
002 "road-east-x509-ipv4"[1] 192.1.2.23 #2: certificate E=testing@libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA OK
002 "road-east-x509-ipv4"[1] 192.1.2.23 #2: IKEv2 mode peer ID is ID_DER_ASN1_DN: 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=testing@libreswan.org'
002 "road-east-x509-ipv4"[1] 192.1.2.23 #2: received INTERNAL_IP4_ADDRESS 192.0.2.100
002 "road-east-x509-ipv4"[1] 192.1.2.23 #2: negotiated connection [192.0.2.100,192.0.2.100:0-65535 0] -> [0.0.0.0,255.255.255.255:0-65535 0]
004 "road-east-x509-ipv4"[1] 192.1.2.23 #2: STATE_V2_IPSEC_I: IPsec SA established tunnel mode {ESP=>0xESPESP <0xESPESP xfrm=AES_GCM_C_256-NONE NATOA=none NATD=none DPD=active}
road #
 ping -n -c4 -I 192.0.2.100 192.1.2.23
PING 192.1.2.23 (192.1.2.23) from 192.0.2.100 : 56(84) bytes of data.
64 bytes from 192.1.2.23: icmp_seq=1 ttl=64 time=0.XXX ms
64 bytes from 192.1.2.23: icmp_seq=2 ttl=64 time=0.XXX ms
64 bytes from 192.1.2.23: icmp_seq=3 ttl=64 time=0.XXX ms
64 bytes from 192.1.2.23: icmp_seq=4 ttl=64 time=0.XXX ms
--- 192.1.2.23 ping statistics ---
4 packets transmitted, 4 received, 0% packet loss, time XXXX
rtt min/avg/max/mdev = 0.XXX/0.XXX/0.XXX/0.XXX ms
road #
 # Tunnel should be up
road #
 ipsec whack --trafficstatus
006 #2: "road-east-x509-ipv4"[1] 192.1.2.23, type=ESP, add_time=1234567890, inBytes=336, outBytes=336, id='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=testing@libreswan.org', lease=192.0.2.100/32
road #
 # Let R_U_THERE packets flow
road #
 sleep 15
road #
 # Setting up block via iptables
road #
 iptables -I INPUT -s 192.1.2.23/32 -d 0/0 -j DROP
road #
 iptables -I OUTPUT -d 192.1.2.23/32 -s 0/0 -j DROP
road #
 sleep 30
road #
 # Tunnel should be down (%trap/%hold)
road #
 ipsec whack --trafficstatus
road #
 iptables -D INPUT -s 192.1.2.23/32 -d 0/0 -j DROP
road #
 iptables -D OUTPUT -d 192.1.2.23/32 -s 0/0 -j DROP
road #
 sleep 30
road #
 # Tunnel should be back up now even without triggering traffic
road #
 ipsec whack --trafficstatus
006 #4: "road-east-x509-ipv4"[2] 192.1.2.23, type=ESP, add_time=1234567890, inBytes=0, outBytes=0, id='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=testing@libreswan.org', lease=192.0.2.100/32
road #
 ping -q -n -c 4 -I 192.0.2.100 192.1.2.23
PING 192.1.2.23 (192.1.2.23) from 192.0.2.100 : 56(84) bytes of data.
--- 192.1.2.23 ping statistics ---
4 packets transmitted, 4 received, 0% packet loss, time XXXX
rtt min/avg/max/mdev = 0.XXX/0.XXX/0.XXX/0.XXX ms
road #
 echo done
done
road #
road #
 if [ -n "`ls /tmp/core* 2>/dev/null`" ]; then echo CORE FOUND; core=`ls /tmp/core* 2>/dev/null`; gdb --batch PATH/libexec/ipsec/pluto $core; mv /tmp/core* OUTPUT/; fi
road #
 if [ -f /sbin/ausearch ]; then ausearch -r -m avc -ts recent ; fi

