--- MASTER/../interop-ikev2-strongswan-36-initiator-sha1-sha2-rsa_pss-no/west.console.txt +++ OUTPUT/../interop-ikev2-strongswan-36-initiator-sha1-sha2-rsa_pss-no/west.console.txt @@ -35,54 +35,19 @@ parsed IKE_SA_INIT response 0 [ SA KE No N(FRAG_SUP) N(HASH_ALG) N(NATD_S_IP) N(NATD_D_IP) CERTREQ ] selected proposal: IKE:AES_GCM_16_256/PRF_HMAC_SHA2_512/MODP_2048 received cert request for "C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org" -authentication of 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=west.testing.libreswan.org, E=user-west@testing.libreswan.org' (myself) with RSA_EMSA_PSS_SHA2_256_SALT_32 successful +authentication of 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=west.testing.libreswan.org, E=user-west@testing.libreswan.org' (myself) with RSA_EMSA_PKCS1_SHA2_256 successful establishing CHILD_SA westnet-eastnet-ikev2{1} generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ] sending packet: from 192.1.2.45[4500] to 192.1.2.23[4500] (XXX bytes) received packet: from 192.1.2.23[4500] to 192.1.2.45[4500] (XXX bytes) -parsed IKE_AUTH response 1 [ EF(1/5) ] -received fragment #1 of 5, waiting for complete IKE message -received packet: from 192.1.2.23[4500] to 192.1.2.45[4500] (XXX bytes) -parsed IKE_AUTH response 1 [ EF(2/5) ] -received fragment #2 of 5, waiting for complete IKE message -received packet: from 192.1.2.23[4500] to 192.1.2.45[4500] (XXX bytes) -parsed IKE_AUTH response 1 [ EF(3/5) ] -received fragment #3 of 5, waiting for complete IKE message -received packet: from 192.1.2.23[4500] to 192.1.2.45[4500] (XXX bytes) -parsed IKE_AUTH response 1 [ EF(4/5) ] -received fragment #4 of 5, waiting for complete IKE message -received packet: from 192.1.2.23[4500] to 192.1.2.45[4500] (XXX bytes) -parsed IKE_AUTH response 1 [ EF(5/5) ] -received fragment #5 of 5, reassembled fragmented IKE message (XXX bytes) -parsed IKE_AUTH response 1 [ IDr CERT AUTH SA TSi TSr ] -received end entity cert "C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org" - using trusted ca certificate "C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org" -checking certificate status of "C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org" - requesting ocsp status from 'http://nic.testing.libreswan.org:2560' ... -ocsp request to http://nic.testing.libreswan.org:2560 failed -ocsp check failed, fallback to crl - fetching crl from 'http://nic.testing.libreswan.org/revoked.crl' ... -crl fetching failed -certificate status is not available - reached self-signed root ca with a path length of 0 - using trusted certificate "C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org" -authentication of 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' with RSA_EMSA_PSS_SHA2_512_SALT_64 successful -IKE_SA westnet-eastnet-ikev2[1] established between 192.1.2.45[C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=west.testing.libreswan.org, E=user-west@testing.libreswan.org]...192.1.2.23[C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org] -scheduling reauthentication in XXXs -maximum IKE_SA lifetime XXXs -selected proposal: ESP:AES_CBC_256/HMAC_SHA2_512_256/NO_EXT_SEQ -CHILD_SA westnet-eastnet-ikev2{1} established with SPIs SPISPI_i SPISPI_o and TS 192.0.1.0/24 === 192.0.2.0/24 -connection 'westnet-eastnet-ikev2' established successfully +parsed IKE_AUTH response 1 [ N(AUTH_FAILED) ] +received AUTHENTICATION_FAILED notify error +establishing connection 'westnet-eastnet-ikev2' failed west # ping -n -c4 -I 192.0.1.254 192.0.2.254 PING 192.0.2.254 (192.0.2.254) from 192.0.1.254 : 56(84) bytes of data. -64 bytes from 192.0.2.254: icmp_seq=1 ttl=64 time=0.XXX ms -64 bytes from 192.0.2.254: icmp_seq=2 ttl=64 time=0.XXX ms -64 bytes from 192.0.2.254: icmp_seq=3 ttl=64 time=0.XXX ms -64 bytes from 192.0.2.254: icmp_seq=4 ttl=64 time=0.XXX ms --- 192.0.2.254 ping statistics --- -4 packets transmitted, 4 received, 0% packet loss, time XXXX -rtt min/avg/max/mdev = 0.XXX/0.XXX/0.XXX/0.XXX ms +4 packets transmitted, 0 received, 100% packet loss, time XXXX west # # hash algorithm notication should NOT be received west # @@ -102,10 +67,8 @@ Shunted Connections: Bypass LAN 192.0.1.0/24: 192.0.1.0/24 === 192.0.1.0/24 PASS Bypass LAN 192.1.2.0/24: 192.1.2.0/24 === 192.1.2.0/24 PASS -Security Associations (1 up, 0 connecting): -westnet-eastnet-ikev2[1]: ESTABLISHED XXX second ago, 192.1.2.45[C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=west.testing.libreswan.org, E=user-west@testing.libreswan.org]...192.1.2.23[C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org] -westnet-eastnet-ikev2{1}: INSTALLED, TUNNEL, reqid 1, ESP SPIs: SPISPI_i SPISPI_o -westnet-eastnet-ikev2{1}: 192.0.1.0/24 === 192.0.2.0/24 +Security Associations (0 up, 0 connecting): + none west # ../bin/check-for-core.sh west #