../../guestbin/algo.sh
/etc/ipsec.conf ...
config setup
	# put the logs in /tmp for the UMLs, so that we can operate
	# without syslogd, which seems to break on UMLs
	logfile=/tmp/pluto.log
	logtime=no
	logappend=no
	dumpdir=/tmp
	plutodebug=all
conn algo
	# IKE
	ikev2=no
	ike=aes128-sha1-ecp384
	left=192.1.2.45
	right=192.1.2.23
	authby=secret
	leftid=@west
	rightid=@east
	# CHILD
	leftsubnet=192.0.1.0/24
	rightsubnet=192.0.2.0/24
	#phase2=
	#phase2alg=
	#type=
	#compress=
/etc/ipsec.d/ipsec.secrets ...
@west @east : PSK "ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890"
starting pluto ...
Redirecting to: [initsystem]
002 "algo": added IKEv1 connection
west #
 ipsec auto --up algo
002 "algo" #1: initiating IKEv1 Main Mode connection
1v1 "algo" #1: sent Main Mode request
1v1 "algo" #1: sent Main Mode I2
1v1 "algo" #1: sent Main Mode I3
002 "algo" #1: Peer ID is ID_FQDN: '@east'
004 "algo" #1: IKE SA established {auth=PRESHARED_KEY cipher=AES_CBC_128 integ=HMAC_SHA1 group=DH20}
002 "algo" #2: initiating Quick Mode IKEv1+PSK+ENCRYPT+TUNNEL+PFS+UP+IKE_FRAG_ALLOW+ESN_NO+ESN_YES
1v1 "algo" #2: sent Quick Mode request
004 "algo" #2: IPsec SA established tunnel mode {ESP=>0xESPESP <0xESPESP xfrm=AES_CBC_128-HMAC_SHA1_96 DPD=passive}
west #
 ../../guestbin/ping-once.sh --up -I 192.0.1.254 192.0.2.254
up
west #
 ipsec whack --trafficstatus
006 #2: "algo", type=ESP, add_time=1234567890, inBytes=84, outBytes=84, maxBytes=2^63B, id='@east'
west #
 
