/testing/guestbin/swan-prep
road #
 ipsec start
Redirecting to: systemctl start ipsec.service
road #
 /testing/pluto/bin/wait-until-pluto-started
road #
 ipsec whack --debug-all --impair-retransmits
road #
 ipsec auto --add road-east-psk
002 added connection description "road-east-psk"
road #
 echo "initdone"
initdone
road #
 ipsec whack --name road-east-psk --initiate
003 "road-east-psk": IKEv1 Aggressive Mode with PSK is vulnerable to dictionary attacks and is cracked on large scale by TLA's
002 "road-east-psk" #1: initiating Aggressive Mode
112 "road-east-psk" #1: STATE_AGGR_I1: initiate
002 "road-east-psk" #1: suppressing retransmit because IMPAIR_RETRANSMITS is set
031 "road-east-psk" #1: max number of retransmissions (0) reached STATE_AGGR_I1.  No response (or no acceptable response) to our first IKEv1 message
002 "road-east-psk" #1: deleting state (STATE_AGGR_I1)
road #
 echo done
done
road #
 ipsec look
road NOW
XFRM state:
XFRM policy:
src 0.0.0.0/0 dst 0.0.0.0/0 
	socket out priority 0 ptype main 
src 0.0.0.0/0 dst 0.0.0.0/0 
	socket in priority 0 ptype main 
src 0.0.0.0/0 dst 0.0.0.0/0 
	socket out priority 0 ptype main 
src 0.0.0.0/0 dst 0.0.0.0/0 
	socket in priority 0 ptype main 
src 0.0.0.0/0 dst 0.0.0.0/0 
	socket out priority 0 ptype main 
src 0.0.0.0/0 dst 0.0.0.0/0 
	socket in priority 0 ptype main 
src 0.0.0.0/0 dst 0.0.0.0/0 
	socket out priority 0 ptype main 
src 0.0.0.0/0 dst 0.0.0.0/0 
	socket in priority 0 ptype main 
XFRM done
IPSEC mangle TABLES
NEW_IPSEC_CONN mangle TABLES
ROUTING TABLES
default via 192.1.3.254 dev eth0 
192.1.3.0/24 dev eth0  proto kernel  scope link  src 192.1.3.209 
NSS_CERTIFICATES
Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
road #
road #
 if [ -n "`ls /tmp/core* 2>/dev/null`" ]; then echo CORE FOUND; mv /tmp/core* OUTPUT/; fi
road #
 if [ -f /sbin/ausearch ]; then ausearch -r -m avc -ts recent ; fi

