/testing/guestbin/swan-prep --46 --nokey
Creating empty NSS database
west #
 ipsec start
Redirecting to: [initsystem]
west #
 ../../guestbin/wait-until-pluto-started
west #
 ipsec add west # alias; includes west-base, oops!
"west-base": added IKEv1 connection
"west-cuckold": added IKEv1 connection
"west-cuckoo": added IKEv1 connection
west #
 ipsec delete west-base
west #
 echo "initdone"
initdone
west #
 ipsec up west
initiating all connections with alias "west"
"west-cuckold" #1: initiating IKEv1 Main Mode connection
"west-cuckold" #1: sent Main Mode request
"west-cuckoo": queue IPsec SA; waiting on ISAKMP SA "west-cuckold" #1 negotiating with 192.1.2.23
initiating 2 connections
"west-cuckold" #1: sent Main Mode I2
"west-cuckold" #1: sent Main Mode I3
"west-cuckold" #1: Peer ID is FQDN: '@east'
"west-cuckold" #1: ISAKMP SA established {auth=PRESHARED_KEY cipher=AES_CBC_256 integ=HMAC_SHA2_256 group=MODP2048}
"west-cuckold" #2: initiating Quick Mode IKEv1+PSK+ENCRYPT+TUNNEL+PFS+UP+IKE_FRAG_ALLOW+ESN_NO+ESN_YES {using isakmp#1 msgid:MSGID proposal=AES_CBC-HMAC_SHA1_96, AES_CBC-HMAC_SHA2_512_256, AES_CBC-HMAC_SHA2_256_128, AES_GCM_16_128-NONE, AES_GCM_16_256-NONE, 3DES_CBC-HMAC_SHA1_96, 3DES_CBC-HMAC_SHA2_512_256, 3DES_CBC-HMAC_SHA2_256_128 pfsgroup=MODP2048 192.0.3.0/24===192.0.2.0/24}
"west-cuckoo" #3: initiating Quick Mode IKEv1+PSK+ENCRYPT+TUNNEL+PFS+UP+IKE_FRAG_ALLOW+ESN_NO+ESN_YES {using isakmp#1 msgid:MSGID proposal=AES_CBC-HMAC_SHA1_96, AES_CBC-HMAC_SHA2_512_256, AES_CBC-HMAC_SHA2_256_128, AES_GCM_16_128-NONE, AES_GCM_16_256-NONE, 3DES_CBC-HMAC_SHA1_96, 3DES_CBC-HMAC_SHA2_512_256, 3DES_CBC-HMAC_SHA2_256_128 pfsgroup=MODP2048 192.0.3.0/24===192.0.20.0/24}
"west-cuckold" #2: sent Quick Mode request
"west-cuckoo" #3: sent Quick Mode request
"west-cuckold" #2: IPsec SA established tunnel mode {ESP=>0xESPESP <0xESPESP xfrm=AES_CBC_128-HMAC_SHA1_96 DPD=passive}
"west-cuckoo" #3: IPsec SA established tunnel mode {ESP=>0xESPESP <0xESPESP xfrm=AES_CBC_128-HMAC_SHA1_96 DPD=passive}
west #
 ipsec down west
terminating all connections with alias "west"
"west-cuckoo": initiating delete of connection's IPsec SA #3 using ISAKMP SA "west-cuckold" #1
"west-cuckoo": note: ISAKMP SA "west-cuckold" #1 will remain up: required by UP policy; in-use by "west-cuckold" #2
"west-cuckoo" #3: deleting IPsec SA (QUICK_I2) and sending notification using ISAKMP SA "west-cuckold" #1
"west-cuckoo" #3: ESP traffic information: in=0B out=0B
"west-cuckold": initiating delete of connection's IPsec SA #2 and ISAKMP SA #1
"west-cuckold" #2: deleting IPsec SA (QUICK_I2) and sending notification using ISAKMP SA #1
"west-cuckold" #2: ESP traffic information: in=0B out=0B
"west-cuckold" #1: deleting ISAKMP SA (MAIN_I4) and sending notification
terminated 2 connections
west #
 ipsec up cuckold
initiating all connections with alias "cuckold"
"west-cuckold" #4: initiating IKEv1 Main Mode connection
"west-cuckold" #4: sent Main Mode request
initiating 1 connection
"west-cuckold" #4: sent Main Mode I2
"west-cuckold" #4: sent Main Mode I3
"west-cuckold" #4: Peer ID is FQDN: '@east'
"west-cuckold" #4: ISAKMP SA established {auth=PRESHARED_KEY cipher=AES_CBC_256 integ=HMAC_SHA2_256 group=MODP2048}
"west-cuckold" #5: initiating Quick Mode IKEv1+PSK+ENCRYPT+TUNNEL+PFS+UP+IKE_FRAG_ALLOW+ESN_NO+ESN_YES {using isakmp#4 msgid:MSGID proposal=AES_CBC-HMAC_SHA1_96, AES_CBC-HMAC_SHA2_512_256, AES_CBC-HMAC_SHA2_256_128, AES_GCM_16_128-NONE, AES_GCM_16_256-NONE, 3DES_CBC-HMAC_SHA1_96, 3DES_CBC-HMAC_SHA2_512_256, 3DES_CBC-HMAC_SHA2_256_128 pfsgroup=MODP2048 192.0.3.0/24===192.0.2.0/24}
"west-cuckold" #5: sent Quick Mode request
"west-cuckold" #5: IPsec SA established tunnel mode {ESP=>0xESPESP <0xESPESP xfrm=AES_CBC_128-HMAC_SHA1_96 DPD=passive}
west #
 ipsec up cuckoo
initiating all connections with alias "cuckoo"
"west-cuckoo" #6: initiating Quick Mode IKEv1+PSK+ENCRYPT+TUNNEL+PFS+UP+IKE_FRAG_ALLOW+ESN_NO+ESN_YES {using isakmp#4 msgid:MSGID proposal=AES_CBC-HMAC_SHA1_96, AES_CBC-HMAC_SHA2_512_256, AES_CBC-HMAC_SHA2_256_128, AES_GCM_16_128-NONE, AES_GCM_16_256-NONE, 3DES_CBC-HMAC_SHA1_96, 3DES_CBC-HMAC_SHA2_512_256, 3DES_CBC-HMAC_SHA2_256_128 pfsgroup=MODP2048 192.0.3.0/24===192.0.20.0/24}
initiating 1 connection
"west-cuckoo" #6: sent Quick Mode request
"west-cuckoo" #6: IPsec SA established tunnel mode {ESP=>0xESPESP <0xESPESP xfrm=AES_CBC_128-HMAC_SHA1_96 DPD=passive}
west #
 ipsec down west
terminating all connections with alias "west"
"west-cuckoo": initiating delete of connection's IPsec SA #6 using ISAKMP SA "west-cuckold" #4
"west-cuckoo": note: ISAKMP SA "west-cuckold" #4 will remain up: required by UP policy; in-use by "west-cuckold" #5
"west-cuckoo" #6: deleting IPsec SA (QUICK_I2) and sending notification using ISAKMP SA "west-cuckold" #4
"west-cuckoo" #6: ESP traffic information: in=0B out=0B
"west-cuckold": initiating delete of connection's IPsec SA #5 and ISAKMP SA #4
"west-cuckold" #5: deleting IPsec SA (QUICK_I2) and sending notification using ISAKMP SA #4
"west-cuckold" #5: ESP traffic information: in=0B out=0B
"west-cuckold" #4: deleting ISAKMP SA (MAIN_I4) and sending notification
terminated 2 connections
west #
 ipsec delete cuckold
west #
 ipsec delete cuckoo
west #
 # non-zero counts confirm encrypted traffic flowing
west #
 ipsec trafficstatus
west #
