ip addr add 192.1.3.34/24 dev eth1 2>/dev/null
north #
 ip addr add 192.1.3.35/24 dev eth1 2>/dev/null
north #
 ip addr add 192.1.3.36/24 dev eth1 2>/dev/null
north #
 /testing/guestbin/swan-prep
north #
 ipsec start
Redirecting to: [initsystem]
north #
 /testing/pluto/bin/wait-until-pluto-started
north #
 ipsec auto --add north-east-21
002 "north-east-21": added IKEv2 connection
north #
 ipsec auto --add north-east-22
002 "north-east-22": added IKEv2 connection
north #
 ipsec auto --add north-east-23
002 "north-east-23": added IKEv2 connection
north #
 ipsec auto --add north-east-24
002 "north-east-24": added IKEv2 connection
north #
 echo "initdone"
initdone
north #
 ipsec auto --up north-east-21
1v2 "north-east-21" #1: initiating IKEv2 connection
1v2 "north-east-21" #1: sent IKE_SA_INIT request
1v2 "north-east-21" #1: sent IKE_AUTH request {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048}
002 "north-east-21" #1: IKEv2 mode peer ID is ID_FQDN: '@east'
003 "north-east-21" #1: authenticated using authby=secret
002 "north-east-21" #2: negotiated connection [192.0.31.0-192.0.31.255:0-65535 0] -> [192.0.21.0-192.0.21.255:0-65535 0]
004 "north-east-21" #2: IPsec SA established tunnel mode {ESP=>0xESPESP <0xESPESP xfrm=AES_GCM_16_256-NONE NATOA=none NATD=none DPD=passive}
north #
 ipsec auto --up north-east-22
1v2 "north-east-22" #3: initiating IKEv2 connection
1v2 "north-east-22" #3: sent IKE_SA_INIT request
1v2 "north-east-22" #3: sent IKE_AUTH request {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048}
002 "north-east-22" #3: IKEv2 mode peer ID is ID_FQDN: '@east'
003 "north-east-22" #3: authenticated using authby=secret
002 "north-east-22" #4: negotiated connection [192.0.32.0-192.0.32.255:0-65535 0] -> [192.0.22.0-192.0.22.255:0-65535 0]
004 "north-east-22" #4: IPsec SA established tunnel mode {ESP=>0xESPESP <0xESPESP xfrm=AES_GCM_16_256-NONE NATOA=none NATD=none DPD=passive}
north #
 ipsec auto --up north-east-23
1v2 "north-east-23" #5: initiating IKEv2 connection
1v2 "north-east-23" #5: sent IKE_SA_INIT request
1v2 "north-east-23" #5: sent IKE_AUTH request {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048}
002 "north-east-23" #5: IKEv2 mode peer ID is ID_FQDN: '@east'
003 "north-east-23" #5: authenticated using authby=secret
002 "north-east-23" #6: negotiated connection [192.0.33.0-192.0.33.255:0-65535 0] -> [192.0.23.0-192.0.23.255:0-65535 0]
004 "north-east-23" #6: IPsec SA established tunnel mode {ESP=>0xESPESP <0xESPESP xfrm=AES_GCM_16_256-NONE NATOA=none NATD=none DPD=passive}
north #
 ipsec auto --up north-east-24
1v2 "north-east-24" #7: initiating IKEv2 connection
1v2 "north-east-24" #7: sent IKE_SA_INIT request
1v2 "north-east-24" #7: sent IKE_AUTH request {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048}
002 "north-east-24" #7: IKEv2 mode peer ID is ID_FQDN: '@east'
003 "north-east-24" #7: authenticated using authby=secret
002 "north-east-24" #8: negotiated connection [192.0.34.0-192.0.34.255:0-65535 0] -> [192.0.24.0-192.0.24.255:0-65535 0]
004 "north-east-24" #8: IPsec SA established tunnel mode {ESP=>0xESPESP <0xESPESP xfrm=AES_GCM_16_256-NONE NATOA=none NATD=none DPD=passive}
north #
 ip link show type xfrm
X: ipsec21@eth1: <NOARP,UP,LOWER_UP> mtu 1500 state UNKNOWN
X: ipsec22@eth1: <NOARP,UP,LOWER_UP> mtu 1500 state UNKNOWN
X: ipsec23@eth1: <NOARP,UP,LOWER_UP> mtu 1500 state UNKNOWN
X: ipsec24@eth1: <NOARP,UP,LOWER_UP> mtu 1500 state UNKNOWN
north #
 ip addr add 192.0.31.254/24 dev ipsec21 2>/dev/null
north #
 ip addr add 192.0.32.254/24 dev ipsec22 2>/dev/null
north #
 ip addr add 192.0.33.254/24 dev ipsec23 2>/dev/null
north #
 ip addr add 192.0.34.254/24 dev ipsec24 2>/dev/null
north #
 ping -w 4 -c 2 -I 192.0.31.254 192.0.21.254
PING 192.0.21.254 (192.0.21.254) from 192.0.31.254 : 56(84) bytes of data.
64 bytes from 192.0.21.254: icmp_seq=1 ttl=64 time=0.XXX ms
64 bytes from 192.0.21.254: icmp_seq=2 ttl=64 time=0.XXX ms
--- 192.0.21.254 ping statistics ---
2 packets transmitted, 2 received, 0% packet loss, time XXXX
rtt min/avg/max/mdev = 0.XXX/0.XXX/0.XXX/0.XXX ms
north #
 ping -w 4 -c 2 -I 192.0.32.254 192.0.22.254
PING 192.0.22.254 (192.0.22.254) from 192.0.32.254 : 56(84) bytes of data.
64 bytes from 192.0.22.254: icmp_seq=1 ttl=64 time=0.XXX ms
64 bytes from 192.0.22.254: icmp_seq=2 ttl=64 time=0.XXX ms
--- 192.0.22.254 ping statistics ---
2 packets transmitted, 2 received, 0% packet loss, time XXXX
rtt min/avg/max/mdev = 0.XXX/0.XXX/0.XXX/0.XXX ms
north #
 ping -w 4 -c 2 -I 192.0.33.254 192.0.23.254
PING 192.0.23.254 (192.0.23.254) from 192.0.33.254 : 56(84) bytes of data.
64 bytes from 192.0.23.254: icmp_seq=1 ttl=64 time=0.XXX ms
64 bytes from 192.0.23.254: icmp_seq=2 ttl=64 time=0.XXX ms
--- 192.0.23.254 ping statistics ---
2 packets transmitted, 2 received, 0% packet loss, time XXXX
rtt min/avg/max/mdev = 0.XXX/0.XXX/0.XXX/0.XXX ms
north #
 ping -w 4 -c 2 -I 192.0.34.254 192.0.24.254
PING 192.0.24.254 (192.0.24.254) from 192.0.34.254 : 56(84) bytes of data.
64 bytes from 192.0.24.254: icmp_seq=1 ttl=64 time=0.XXX ms
64 bytes from 192.0.24.254: icmp_seq=2 ttl=64 time=0.XXX ms
--- 192.0.24.254 ping statistics ---
2 packets transmitted, 2 received, 0% packet loss, time XXXX
rtt min/avg/max/mdev = 0.XXX/0.XXX/0.XXX/0.XXX ms
north #
 echo done
done
north #
 ipsec whack --trafficstatus
006 #2: "north-east-21", type=ESP, add_time=1234567890, inBytes=168, outBytes=168, id='@east'
006 #4: "north-east-22", type=ESP, add_time=1234567890, inBytes=168, outBytes=168, id='@east'
006 #6: "north-east-23", type=ESP, add_time=1234567890, inBytes=168, outBytes=168, id='@east'
006 #8: "north-east-24", type=ESP, add_time=1234567890, inBytes=168, outBytes=168, id='@east'
north #
 ip -s link show ipsec1
Device "ipsec1" does not exist.
north #
 ip rule show
0:	from all lookup local
32766:	from all lookup main
32767:	from all lookup default
north #
 ip route show table 50
Error: ipv4: FIB table does not exist.
Dump terminated
north #
 ip route
default via 192.1.3.254 dev eth1
192.0.3.0/24 dev eth0 proto kernel scope link src 192.0.3.254
192.0.21.0/24 dev ipsec21 scope link
192.0.22.0/24 dev ipsec22 scope link
192.0.23.0/24 dev ipsec23 scope link
192.0.24.0/24 dev ipsec24 scope link
192.0.31.0/24 dev ipsec21 proto kernel scope link src 192.0.31.254
192.0.32.0/24 dev ipsec22 proto kernel scope link src 192.0.32.254
192.0.33.0/24 dev ipsec23 proto kernel scope link src 192.0.33.254
192.0.34.0/24 dev ipsec24 proto kernel scope link src 192.0.34.254
192.1.3.0/24 dev eth1 proto kernel scope link src 192.1.3.33
north #
 ip -d link show type xfrm
X: ipsec21@eth1: <NOARP,UP,LOWER_UP> mtu 1500 state UNKNOWN
    xfrm if_id 0x15 addrgenmode eui64 numtxqueues 1 numrxqueues 1 gso_max_size 65536 gso_max_segs 65535 
X: ipsec22@eth1: <NOARP,UP,LOWER_UP> mtu 1500 state UNKNOWN
    xfrm if_id 0x16 addrgenmode eui64 numtxqueues 1 numrxqueues 1 gso_max_size 65536 gso_max_segs 65535 
X: ipsec23@eth1: <NOARP,UP,LOWER_UP> mtu 1500 state UNKNOWN
    xfrm if_id 0x17 addrgenmode eui64 numtxqueues 1 numrxqueues 1 gso_max_size 65536 gso_max_segs 65535 
X: ipsec24@eth1: <NOARP,UP,LOWER_UP> mtu 1500 state UNKNOWN
    xfrm if_id 0x18 addrgenmode eui64 numtxqueues 1 numrxqueues 1 gso_max_size 65536 gso_max_segs 65535 
north #
 ../bin/check-for-core.sh
north #
 if [ -f /sbin/ausearch ]; then ausearch -r -m avc -ts recent ; fi
north #
 
