/testing/guestbin/swan-prep
road #
 cp policies/* /etc/ipsec.d/policies/
road #
 cp ikev2-oe.conf /etc/ipsec.d/ikev2-oe.conf
road #
 echo "192.1.2.0/24"  >> /etc/ipsec.d/policies/private-or-clear
road #
 echo "192.1.3.33/32"  >> /etc/ipsec.d/policies/private-or-clear
road #
 ipsec start
Redirecting to: [initsystem]
road #
 ../../guestbin/wait-until-pluto-started
road #
 ipsec whack --impair suppress-retransmits
road #
 # give OE policies time to load
road #
 ../../guestbin/wait-for.sh --match 'loaded 10,' -- ipsec auto --status
000 Total IPsec connections: loaded 10, active 0
road #
 echo "initdone"
initdone
road #
 ipsec whack --trafficstatus
road #
 ipsec whack --shuntstatus
000 Bare Shunt list:
000  
road #
 ../../guestbin/ipsec-look.sh
road NOW
XFRM state:
XFRM policy:
src 192.1.2.253/32 dst 192.1.3.209/32
	dir fwd priority 3129279 ptype main
src 192.1.2.253/32 dst 192.1.3.209/32
	dir in priority 3129279 ptype main
src 192.1.3.209/32 dst 192.1.2.253/32
	dir out priority 3129279 ptype main
src 192.1.3.209/32 dst 192.1.3.253/32
	dir out priority 3129279 ptype main
src 192.1.3.209/32 dst 192.1.3.254/32
	dir out priority 3129279 ptype main
src 192.1.3.253/32 dst 192.1.3.209/32
	dir fwd priority 3129279 ptype main
src 192.1.3.253/32 dst 192.1.3.209/32
	dir in priority 3129279 ptype main
src 192.1.3.254/32 dst 192.1.3.209/32
	dir fwd priority 3129279 ptype main
src 192.1.3.254/32 dst 192.1.3.209/32
	dir in priority 3129279 ptype main
src 192.1.3.209/32 dst 192.1.3.33/32
	dir out priority 4177854 ptype main
	tmpl src 0.0.0.0 dst 0.0.0.0
		proto esp reqid 0 mode transport
src 192.1.3.209/32 dst 192.1.2.0/24
	dir out priority 4177870 ptype main
	tmpl src 0.0.0.0 dst 0.0.0.0
		proto esp reqid 0 mode transport
XFRM done
IPSEC mangle TABLES
NEW_IPSEC_CONN mangle TABLES
ROUTING TABLES
default via 192.1.3.254 dev eth0
192.1.3.0/24 dev eth0 proto kernel scope link src 192.1.3.209
NSS_CERTIFICATES
Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
road #
 # ping should succeed through tunnel
road #
 ../../guestbin/ping-once.sh --forget -I 192.1.3.209 192.1.2.23
fired and forgotten
road #
 ../../guestbin/wait-for.sh --match 192.1.2.23 -- ipsec whack --trafficstatus
006 #2: "private-or-clear#192.1.2.0/24"[1] 10.0.10.1/32=== ...192.1.2.23, type=ESP, add_time=1234567890, inBytes=0, outBytes=0, id='ID_NULL', lease=10.0.10.1/32
road #
 ../../guestbin/ping-once.sh --up -I 192.1.3.209 192.1.2.23
up
road #
 # ping should succeed through tunnel
road #
 ../../guestbin/ping-once.sh --forget -I 192.1.3.209 192.1.2.45
fired and forgotten
road #
 ../../guestbin/wait-for.sh --match 192.1.2.45 -- ipsec whack --trafficstatus
006 #4: "private-or-clear#192.1.2.0/24"[2] 10.0.10.1/32=== ...192.1.2.45, type=ESP, add_time=1234567890, inBytes=0, outBytes=0, id='ID_NULL', lease=10.0.10.1/32
road #
 ../../guestbin/ping-once.sh --up -I 192.1.3.209 192.1.2.45
up
road #
 ../../guestbin/ping-once.sh --up -I 192.1.3.209 192.1.2.45
up
road #
 # ping should succeed through tunnel
road #
 ../../guestbin/ping-once.sh --forget -I 192.1.3.209 192.1.3.33
fired and forgotten
road #
 ../../guestbin/wait-for.sh --match 192.1.3.33 -- ipsec whack --trafficstatus
006 #6: "private-or-clear#192.1.3.33/32"[1] ...192.1.3.33, type=ESP, add_time=1234567890, inBytes=0, outBytes=0, id='ID_NULL'
road #
 ../../guestbin/ping-once.sh --up -I 192.1.3.209 192.1.3.33
up
road #
 ../../guestbin/ping-once.sh --up -I 192.1.3.209 192.1.3.33
up
road #
 ../../guestbin/ping-once.sh --up -I 192.1.3.209 192.1.3.33
up
road #
 ipsec whack --trafficstatus
006 #2: "private-or-clear#192.1.2.0/24"[1] 10.0.10.1/32=== ...192.1.2.23, type=ESP, add_time=1234567890, inBytes=84, outBytes=84, id='ID_NULL', lease=10.0.10.1/32
006 #4: "private-or-clear#192.1.2.0/24"[2] 10.0.10.1/32=== ...192.1.2.45, type=ESP, add_time=1234567890, inBytes=168, outBytes=168, id='ID_NULL', lease=10.0.10.1/32
006 #6: "private-or-clear#192.1.3.33/32"[1] ...192.1.3.33, type=ESP, add_time=1234567890, inBytes=252, outBytes=252, id='ID_NULL'
road #
 echo done
done
road #
 ipsec whack --trafficstatus
006 #2: "private-or-clear#192.1.2.0/24"[1] 10.0.10.1/32=== ...192.1.2.23, type=ESP, add_time=1234567890, inBytes=84, outBytes=84, id='ID_NULL', lease=10.0.10.1/32
006 #4: "private-or-clear#192.1.2.0/24"[2] 10.0.10.1/32=== ...192.1.2.45, type=ESP, add_time=1234567890, inBytes=168, outBytes=168, id='ID_NULL', lease=10.0.10.1/32
006 #6: "private-or-clear#192.1.3.33/32"[1] ...192.1.3.33, type=ESP, add_time=1234567890, inBytes=252, outBytes=252, id='ID_NULL'
road #
 iptables -t nat -L -n
Chain PREROUTING (policy ACCEPT)
target     prot opt source               destination         
DNAT       all  --  192.1.2.45           10.0.10.1            policy match dir in pol ipsec to:192.1.3.209
DNAT       all  --  192.1.2.23           10.0.10.1            policy match dir in pol ipsec to:192.1.3.209
Chain INPUT (policy ACCEPT)
target     prot opt source               destination         
Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination         
Chain POSTROUTING (policy ACCEPT)
target     prot opt source               destination         
SNAT       all  --  0.0.0.0/0            192.1.2.45           policy match dir out pol ipsec to:10.0.10.1
SNAT       all  --  0.0.0.0/0            192.1.2.23           policy match dir out pol ipsec to:10.0.10.1
road #
 ../../guestbin/ipsec-look.sh
road NOW
XFRM state:
src 192.1.3.33 dst 192.1.3.209
	proto esp spi 0xSPISPI reqid REQID mode tunnel
	replay-window 32 flag af-unspec
	aead rfc4106(gcm(aes)) 0xENCAUTHKEY 128
src 192.1.3.209 dst 192.1.3.33
	proto esp spi 0xSPISPI reqid REQID mode tunnel
	replay-window 32 flag af-unspec
	aead rfc4106(gcm(aes)) 0xENCAUTHKEY 128
src 192.1.3.209 dst 192.1.3.33
	proto esp spi 0x00000000 reqid 0 mode transport
	replay-window 0 
	sel src 192.1.3.209/32 dst 192.1.3.33/32 proto icmp type 8 code 0 dev eth0 
src 192.1.2.45 dst 192.1.3.209
	proto esp spi 0xSPISPI reqid REQID mode tunnel
	replay-window 32 flag af-unspec
	aead rfc4106(gcm(aes)) 0xENCAUTHKEY 128
	encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
src 192.1.3.209 dst 192.1.2.45
	proto esp spi 0xSPISPI reqid REQID mode tunnel
	replay-window 32 flag af-unspec
	aead rfc4106(gcm(aes)) 0xENCAUTHKEY 128
	encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
src 192.1.3.209 dst 192.1.2.45
	proto esp spi 0x00000000 reqid 0 mode transport
	replay-window 0 
	sel src 192.1.3.209/32 dst 192.1.2.45/32 proto icmp type 8 code 0 dev eth0 
src 192.1.2.23 dst 192.1.3.209
	proto esp spi 0xSPISPI reqid REQID mode tunnel
	replay-window 32 flag af-unspec
	aead rfc4106(gcm(aes)) 0xENCAUTHKEY 128
	encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
src 192.1.3.209 dst 192.1.2.23
	proto esp spi 0xSPISPI reqid REQID mode tunnel
	replay-window 32 flag af-unspec
	aead rfc4106(gcm(aes)) 0xENCAUTHKEY 128
	encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
src 192.1.3.209 dst 192.1.2.23
	proto esp spi 0x00000000 reqid 0 mode transport
	replay-window 0 
	sel src 192.1.3.209/32 dst 192.1.2.23/32 proto icmp type 8 code 0 dev eth0 
XFRM policy:
src 192.1.2.253/32 dst 192.1.3.209/32
	dir fwd priority 3129279 ptype main
src 192.1.2.253/32 dst 192.1.3.209/32
	dir in priority 3129279 ptype main
src 192.1.3.209/32 dst 192.1.2.253/32
	dir out priority 3129279 ptype main
src 192.1.3.209/32 dst 192.1.3.253/32
	dir out priority 3129279 ptype main
src 192.1.3.209/32 dst 192.1.3.254/32
	dir out priority 3129279 ptype main
src 192.1.3.253/32 dst 192.1.3.209/32
	dir fwd priority 3129279 ptype main
src 192.1.3.253/32 dst 192.1.3.209/32
	dir in priority 3129279 ptype main
src 192.1.3.254/32 dst 192.1.3.209/32
	dir fwd priority 3129279 ptype main
src 192.1.3.254/32 dst 192.1.3.209/32
	dir in priority 3129279 ptype main
src 10.0.10.1/32 dst 192.1.2.23/32
	dir out priority 4177855 ptype main
	tmpl src 192.1.3.209 dst 192.1.2.23
		proto esp reqid REQID mode tunnel
src 10.0.10.1/32 dst 192.1.2.45/32
	dir out priority 4177855 ptype main
	tmpl src 192.1.3.209 dst 192.1.2.45
		proto esp reqid REQID mode tunnel
src 192.1.2.23/32 dst 10.0.10.1/32
	dir fwd priority 4177855 ptype main
	tmpl src 192.1.2.23 dst 192.1.3.209
		proto esp reqid REQID mode tunnel
src 192.1.2.23/32 dst 10.0.10.1/32
	dir in priority 4177855 ptype main
	tmpl src 192.1.2.23 dst 192.1.3.209
		proto esp reqid REQID mode tunnel
src 192.1.2.45/32 dst 10.0.10.1/32
	dir fwd priority 4177855 ptype main
	tmpl src 192.1.2.45 dst 192.1.3.209
		proto esp reqid REQID mode tunnel
src 192.1.2.45/32 dst 10.0.10.1/32
	dir in priority 4177855 ptype main
	tmpl src 192.1.2.45 dst 192.1.3.209
		proto esp reqid REQID mode tunnel
src 192.1.3.209/32 dst 192.1.2.23/32
	dir out priority 4177855 ptype main
	tmpl src 192.1.3.209 dst 192.1.2.23
		proto esp reqid REQID mode tunnel
src 192.1.3.209/32 dst 192.1.2.45/32
	dir out priority 4177855 ptype main
	tmpl src 192.1.3.209 dst 192.1.2.45
		proto esp reqid REQID mode tunnel
src 192.1.3.209/32 dst 192.1.3.33/32
	dir out priority 4177855 ptype main
	tmpl src 192.1.3.209 dst 192.1.3.33
		proto esp reqid REQID mode tunnel
src 192.1.3.33/32 dst 192.1.3.209/32
	dir fwd priority 4177855 ptype main
	tmpl src 192.1.3.33 dst 192.1.3.209
		proto esp reqid REQID mode tunnel
src 192.1.3.33/32 dst 192.1.3.209/32
	dir in priority 4177855 ptype main
	tmpl src 192.1.3.33 dst 192.1.3.209
		proto esp reqid REQID mode tunnel
src 192.1.3.209/32 dst 192.1.2.0/24
	dir out priority 4177870 ptype main
	tmpl src 0.0.0.0 dst 0.0.0.0
		proto esp reqid 0 mode transport
XFRM done
IPSEC mangle TABLES
NEW_IPSEC_CONN mangle TABLES
ROUTING TABLES
default via 192.1.3.254 dev eth0
192.1.3.0/24 dev eth0 proto kernel scope link src 192.1.3.209
NSS_CERTIFICATES
Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
road #
 
