/testing/guestbin/swan-prep --x509
Preparing X.509 files
road #
 ipsec start
Redirecting to: [initsystem]
road #
 ../../guestbin/wait-until-pluto-started
road #
 ipsec auto --add road
"road/1x1": added IKEv2 connection
"road/1x2": added IKEv2 connection
"road/2x1": added IKEv2 connection
"road/2x2": added IKEv2 connection
road #
 echo "initdone"
initdone
road #
 ipsec auto --up road
initiating all connections with alias "road"
"road/1x1" #1: initiating IKEv2 connection to 192.1.2.23 using UDP
"road/1x2": queue Child SA; waiting on IKE SA "road/1x1" #1 negotiating with 192.1.2.23
"road/2x1": queue Child SA; waiting on IKE SA "road/1x1" #1 negotiating with 192.1.2.23
"road/2x2": queue Child SA; waiting on IKE SA "road/1x1" #1 negotiating with 192.1.2.23
initiating 4 connections
"road/1x1" #1: sent IKE_SA_INIT request to 192.1.2.23:UDP/500
"road/1x1" #1: processed IKE_SA_INIT response from 192.1.2.23:UDP/4500 {cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=DH19}, initiating IKE_AUTH
"road/1x1" #1: sent IKE_AUTH request to 192.1.2.23:UDP/4500 with digital-signature and DER_ASN1_DN 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org'; Child SA #2 {ESPinUDP <0xESPESP}
"road/1x1" #1: initiator established IKE SA; authenticated peer certificate 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' and 3nnn-bit RSASSA-PSS with SHA2_512 digital signature issued by 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
"road/1x1" #2: initiator established Child SA using #1; IPsec tunnel [192.0.3.0/24===192.0.2.0/24] {ESPinUDP/ESN=>0xESPESP <0xESPESP xfrm=AES_GCM_16_256-NONE NATD=192.1.2.23:4500 DPD=passive}
"road/1x2" #3: initiating Child SA using IKE SA #1
"road/2x1" #4: initiating Child SA using IKE SA #1
"road/2x2" #5: initiating Child SA using IKE SA #1
"road/1x2" #3: sent CREATE_CHILD_SA request to create Child SA using IKE SA #1 {ESPinUDP <0xESPESP}
"road/1x2" #3: initiator established Child SA using #1; IPsec tunnel [192.0.3.0/24===192.0.20.0/24] {ESPinUDP/ESN=>0xESPESP <0xESPESP xfrm=AES_GCM_16_256-NONE-DH19 NATD=192.1.2.23:4500 DPD=passive}
"road/2x1" #4: sent CREATE_CHILD_SA request to create Child SA using IKE SA #1 {ESPinUDP <0xESPESP}
"road/2x1" #4: initiator established Child SA using #1; IPsec tunnel [192.0.30.0/24===192.0.2.0/24] {ESPinUDP/ESN=>0xESPESP <0xESPESP xfrm=AES_GCM_16_256-NONE-DH19 NATD=192.1.2.23:4500 DPD=passive}
"road/2x2" #5: sent CREATE_CHILD_SA request to create Child SA using IKE SA #1 {ESPinUDP <0xESPESP}
"road/2x2" #5: initiator established Child SA using #1; IPsec tunnel [192.0.30.0/24===192.0.20.0/24] {ESPinUDP/ESN=>0xESPESP <0xESPESP xfrm=AES_GCM_16_256-NONE-DH19 NATD=192.1.2.23:4500 DPD=passive}
road #
 echo done
done
road #
 # two remote subnets should have route with sourceip
road #
 ../../guestbin/ip.sh route list
default via 192.1.3.254 dev eth0 proto static
192.0.2.0/24 via 192.1.3.254 dev eth0 src 192.0.3.254
192.0.20.0/24 via 192.1.3.254 dev eth0 src 192.0.3.254
192.1.3.0/24 dev eth0 proto kernel scope link src 192.1.3.209
road #
