--- MASTER/../interop-ikev2-strongswan-36-initiator-sha1-sha2-rsa_pss-no/east.console.txt +++ OUTPUT/../interop-ikev2-strongswan-36-initiator-sha1-sha2-rsa_pss-no/east.console.txt @@ -15,35 +15,13 @@ if [ -f /var/run/pluto/pluto.pid ]; then ../../pluto/bin/ipsec-look.sh ; fi east NOW XFRM state: -src 192.1.2.45 dst 192.1.2.23 - proto esp spi 0xSPISPI reqid REQID mode tunnel - replay-window 32 flag af-unspec - auth-trunc hmac(sha512) 0xHASHKEY 256 - enc cbc(aes) 0xENCKEY -src 192.1.2.23 dst 192.1.2.45 - proto esp spi 0xSPISPI reqid REQID mode tunnel - replay-window 32 flag af-unspec - auth-trunc hmac(sha512) 0xHASHKEY 256 - enc cbc(aes) 0xENCKEY XFRM policy: -src 192.0.1.0/24 dst 192.0.2.0/24 - dir fwd priority 2084814 ptype main - tmpl src 192.1.2.45 dst 192.1.2.23 - proto esp reqid REQID mode tunnel -src 192.0.1.0/24 dst 192.0.2.0/24 - dir in priority 2084814 ptype main - tmpl src 192.1.2.45 dst 192.1.2.23 - proto esp reqid REQID mode tunnel -src 192.0.2.0/24 dst 192.0.1.0/24 - dir out priority 2084814 ptype main - tmpl src 192.1.2.23 dst 192.1.2.45 - proto esp reqid REQID mode tunnel XFRM done IPSEC mangle TABLES NEW_IPSEC_CONN mangle TABLES ROUTING TABLES default via 192.1.2.254 dev eth1 -192.0.1.0/24 dev eth1 scope link src 192.0.2.254 +192.0.1.0/24 via 192.1.2.45 dev eth1 192.0.2.0/24 dev eth0 proto kernel scope link src 192.0.2.254 192.1.2.0/24 dev eth1 proto kernel scope link src 192.1.2.23 NSS_CERTIFICATES @@ -61,7 +39,6 @@ # expect state #2, state #1 responded with INVALID_KE east # if [ -f /var/run/pluto/pluto.pid ]; then grep "authenticated using RSA" /tmp/pluto.log ; fi -"westnet-eastnet-ikev2" #2: authenticated using RSA with SHA2_256 east # if [ -f /var/run/charon.pid -o -f /var/run/strongswan/charon.pid ]; then strongswan status ; fi east #