/testing/guestbin/swan-prep
east #
 ipsec _stackmanager start
east #
 # Start only one, so it is easier to spot a crash
east #
 ipsec pluto --config /etc/ipsec.conf
east #
 /testing/pluto/bin/wait-until-pluto-started
east #
 ipsec auto --add test
002 "test": added IKEv1 connection
east #
 echo "initdone"
initdone
east #
 # if east was already down, we crashed it
east #
 hostname |grep east > /dev/null && ipsec whack --shutdown
east #
 hostname |grep east > /dev/null && grep "packet from" /tmp/pluto.log | sed "s/^.*packet from//"
 192.1.2.45:EPHEM: message ignored because it contains a payload type (ISAKMP_NEXT_SA) unexpected by state STATE_INFO
 192.1.2.45:EPHEM: sending notification INVALID_PAYLOAD_TYPE to 192.1.2.45:EPHEM
 192.1.2.45:EPHEM: message ignored because it contains a payload type (ISAKMP_NEXT_SIG) unexpected by state STATE_MAIN_R0
 192.1.2.45:EPHEM: sending notification INVALID_PAYLOAD_TYPE to 192.1.2.45:EPHEM
east #
 ../bin/check-for-core.sh
east #
 if [ -f /sbin/ausearch ]; then ausearch -r -m avc -ts recent ; fi
east #
 
