/testing/guestbin/swan-prep --nokeys
Creating empty NSS database
west #
 # we can't test the packetflow as we are going to redirect
west #
 ../../guestbin/ip.sh route del 192.0.2.0/24
west #
 ipsec start
Redirecting to: [initsystem]
west #
 ../../guestbin/wait-until-pluto-started
west #
 ipsec auto --add westnet-eastnet-ipv4-psk-ikev2
"westnet-eastnet-ipv4-psk-ikev2": added IKEv2 connection
west #
 ipsec whack --impair suppress_retransmits
west #
 echo "initdone"
initdone
west #
 ipsec whack --impair suppress_retransmits
west #
 ipsec whack --impair revival
west #
 ipsec auto --up westnet-eastnet-ipv4-psk-ikev2
"westnet-eastnet-ipv4-psk-ikev2" #1: initiating IKEv2 connection to 192.1.2.23 using UDP
"westnet-eastnet-ipv4-psk-ikev2" #1: sent IKE_SA_INIT request to 192.1.2.23:UDP/500
"westnet-eastnet-ipv4-psk-ikev2" #1: processed IKE_SA_INIT response from 192.1.2.23:UDP/500 {cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=DH19}, initiating IKE_AUTH
"westnet-eastnet-ipv4-psk-ikev2" #1: sent IKE_AUTH request to 192.1.2.23:UDP/500 with shared-key-mac and FQDN '@west'; Child SA #2 {ESP <0xESPESP}
"westnet-eastnet-ipv4-psk-ikev2" #1: initiator established IKE SA; authenticated peer using authby=secret and FQDN '@east'
"westnet-eastnet-ipv4-psk-ikev2" #1: IKE_AUTH response redirects to new gateway 192.1.3.33
"westnet-eastnet-ipv4-psk-ikev2" #2: scheduling redirect 1 to 192.1.3.33
"westnet-eastnet-ipv4-psk-ikev2" #2: IMPAIR: redirect: skip scheduling redirect event
"westnet-eastnet-ipv4-psk-ikev2" #1: deleting IKE SA (established IKE SA)
west #
 ipsec whack --impair trigger_revival:1
"westnet-eastnet-ipv4-psk-ikev2": IMPAIR: dispatch REVIVAL; redirect attempt 1 from 192.1.2.23 to 192.1.3.33; delete Child SA
"westnet-eastnet-ipv4-psk-ikev2" #3: initiating IKEv2 connection to 192.1.3.33 using UDP
"westnet-eastnet-ipv4-psk-ikev2" #3: sent IKE_SA_INIT request to 192.1.3.33:UDP/500
"westnet-eastnet-ipv4-psk-ikev2" #3: IKE_SA_INIT_I: 10 second timeout exceeded after 0 retransmits.  No response (or no acceptable response) to our first IKEv2 message
"westnet-eastnet-ipv4-psk-ikev2" #3: connection is supposed to remain up; revival attempt 1 scheduled in 0 seconds
"westnet-eastnet-ipv4-psk-ikev2" #3: IMPAIR: revival: skip scheduling revival event
"westnet-eastnet-ipv4-psk-ikev2" #3: deleting IKE SA (sent IKE_SA_INIT request)
west #
 ipsec whack --impair trigger_revival:1
"westnet-eastnet-ipv4-psk-ikev2": IMPAIR: dispatch REVIVAL; attempt 1 next in 5s; timeout IKE SA
"westnet-eastnet-ipv4-psk-ikev2": reviving connection which timeout IKE SA but must remain up per local policy (serial $1)
"westnet-eastnet-ipv4-psk-ikev2" #4: initiating IKEv2 connection to 192.1.2.23 using UDP
"westnet-eastnet-ipv4-psk-ikev2" #4: sent IKE_SA_INIT request to 192.1.2.23:UDP/500
"westnet-eastnet-ipv4-psk-ikev2" #4: processed IKE_SA_INIT response from 192.1.2.23:UDP/500 {cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=DH19}, initiating IKE_AUTH
"westnet-eastnet-ipv4-psk-ikev2" #4: sent IKE_AUTH request to 192.1.2.23:UDP/500 with shared-key-mac and FQDN '@west'; Child SA #5 {ESP <0xESPESP}
"westnet-eastnet-ipv4-psk-ikev2" #4: initiator established IKE SA; authenticated peer using authby=secret and FQDN '@east'
"westnet-eastnet-ipv4-psk-ikev2" #4: IKE_AUTH response redirects to new gateway 192.1.3.33
"westnet-eastnet-ipv4-psk-ikev2" #5: scheduling redirect 1 to 192.1.3.33
"westnet-eastnet-ipv4-psk-ikev2" #5: IMPAIR: redirect: skip scheduling redirect event
"westnet-eastnet-ipv4-psk-ikev2" #4: deleting IKE SA (established IKE SA)
west #
