Starting UML PATH/start.sh
spawn PATH single
Linux version XXXX
On node 0 totalpages: 8192
Kernel command line:
Calibrating delay loop... XXXX bogomips
Dentry-cache hash table entries: NUMBERS
Inode-cache hash table entries: NUMBERS
Mount-cache hash table entries: NUMBERS
Buffer-cache hash table entries: NUMBERS
Page-cache hash table entries: NUMEBRS
POSIX conformance testing by UNIFIX
Linux NET4.0 for Linux 2.4
Based upon Swansea University Computer Society NET3.039
Initializing RT netlink socket
Starting kswapd
VFS: Diskquotas version dquot_6.4.0 initialized
devfs: VERSION Richard Gooch (rgooch@atnf.csiro.au)
devfs: boot_options Q
pty: 256 Unix98 ptys configured
SLIP: version 0.8.4-NET3.019-NEWTTY (dynamic channels, max=256).
loop: loaded (max 8 devices)
PPP generic driver version VERSION
Universal TUN/TAP device driver VERSION
NET4: Linux TCP/IP 1.0 for NET4.0
IP Protocols: ICMP, UDP, TCP
IP: routing cache hash table of 512 buckets, 4Kbytes
TCP: Hash tables configured (established 2048 bind 2048)
IPv4 over IPv4 tunneling driver
GRE over IPv4 tunneling driver
NET4: Unix domain sockets 1.0/SMP for Linux NET4.0.
Mounted devfs on /dev
INIT: version 2.78 booting
Activating swap...
Calculating module dependancies
done.
Loading modules: LIST

Checking all file systems...
Parallelizing fsck version 1.18 (11-Nov-1999)
Setting kernel variables.
Mounting local filesystems...
/dev/shm on /tmp type tmpfs (rw)
/dev/shm on /var/run type tmpfs (rw)
devpts on /dev/pts type devpts (rw,mode=0622)
none on /usr/share type hostfs (ro)
Enabling packet forwarding: done.
Configuring network interfaces: done.
Cleaning: /tmp /var/lock /var/run.
Initializing random number generator... done.
Recovering nvi editor sessions... done.
Give root password for maintenance
(or type Control-D for normal startup): 
east:~#
 klogd -c 4 -x -f /tmp/klog.log
east:~#
 TZ=GMT export TZ
east:~#
 ipsec spi --clear
east:~#
 ipsec eroute --clear
east:~#
 enckey=0x4043434545464649494a4a4c4c4f4f515152525454575758
east:~#
 authkey=0x87658765876587658765876587658765
east:~#
 lifetime="--life soft-bytes=384"
east:~#
 ipsec spi --af inet --edst 192.1.2.45 --spi 0x12345678 --proto esp --src 192.1.2.23 --esp 3des-md5-96 $lifetime --enckey $enckey --authkey $authkey
east:~#
 ipsec spi --af inet --edst 192.1.2.45 --spi 0x12345678 --proto tun --src 192.1.2.23 --dst 192.1.2.45 --ip4
east:~#
 ipsec spigrp inet 192.1.2.45 0x12345678 tun inet 192.1.2.45 0x12345678 esp 
east:~#
 ipsec eroute --add --eraf inet --src 192.0.2.0/24 --dst 192.0.1.0/24 --said tun0x12345678@192.1.2.45
east:~#
 ipsec tncfg --attach --virtual ipsec0 --physical eth1
east:~#
 ifconfig ipsec0 inet 192.1.2.23 netmask 0xffffff00 broadcast 192.1.2.255 up
east:~#
 arp -s 192.1.2.45 10:00:00:64:64:45
east:~#
 arp -s 192.1.2.254 10:00:00:64:64:45
east:~#
 ipsec look
east NOW
192.0.2.0/24       -> 192.0.1.0/24       => tun0x12345678@192.1.2.45 esp0x12345678@192.1.2.45  (0)
ipsec0->eth1 mtu=16260(1500)->1500
esp0x12345678@192.1.2.45 ESP_3DES_HMAC_MD5: dir=out src=192.1.2.23 iv_bits=64bits iv=0xDEADF00DDEADF00D alen=128 aklen=128 eklen=192 life(c,s,h)=bytes(0,384,0) refcount=4 ref=2
tun0x12345678@192.1.2.45 IPIP: dir=out src=192.1.2.23 life(c,s,h)= refcount=4 ref=3
Destination     Gateway         Genmask         Flags   MSS Window  irtt Iface
east:~#
 route add -host 192.0.1.1 gw 192.1.2.45 dev ipsec0
east:~#
 ipsec pf_key --daemon /var/run/pf_key.pid >/tmp/pfkey.txt
east:~#
 echo send packets
send packets
east:~#
 kill `cat /var/run/pf_key.pid`
east:~#
 cat /tmp/pfkey.txt; echo

pfkey v2 msg. type=7(register) seq=1 len=5 pid=987 errno=0 satype=2(AH)
pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=7(register), errno=0, satype=2(AH), len=5, res=0, seq=1, pid=987.
pfkey_lib_debug:pfkey_msg_parse: remain=3 ext_type=14(supported-auth) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_supported_parse.
pfkey_lib_debug:pfkey_msg_parse: extensions permitted=0000c001, seen=00004001, required=00000001.
pf_key: parseable PF_KEY message.

pfkey v2 msg. type=7(register) seq=2 len=7 pid=987 errno=0 satype=3(ESP)
pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=7(register), errno=0, satype=3(ESP), len=7, res=0, seq=2, pid=987.
pfkey_lib_debug:pfkey_msg_parse: remain=5 ext_type=14(supported-auth) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_supported_parse.
pfkey_lib_debug:pfkey_msg_parse: remain=2 ext_type=15(supported-cipher) ext_len=2 parsing ext 0pDEADF00D with parser pfkey_supported_parse.
pfkey_lib_debug:pfkey_msg_parse: extensions permitted=0000c001, seen=0000c001, required=00000001.
pf_key: parseable PF_KEY message.

pfkey v2 msg. type=7(register) seq=3 len=4 pid=987 errno=0 satype=9(IPIP)
pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=7(register), errno=0, satype=9(IPIP), len=4, res=0, seq=3, pid=987.
pfkey_lib_debug:pfkey_msg_parse: remain=2 ext_type=15(supported-cipher) ext_len=2 parsing ext 0pDEADF00D with parser pfkey_supported_parse.
pfkey_lib_debug:pfkey_msg_parse: extensions permitted=0000c001, seen=00008001, required=00000001.
pf_key: parseable PF_KEY message.

pfkey v2 msg. type=7(register) seq=4 len=4 pid=987 errno=0 satype=10(COMP)
pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=7(register), errno=0, satype=10(COMP), len=4, res=0, seq=4, pid=987.
pfkey_lib_debug:pfkey_msg_parse: remain=2 ext_type=15(supported-cipher) ext_len=2 parsing ext 0pDEADF00D with parser pfkey_supported_parse.
pfkey_lib_debug:pfkey_msg_parse: extensions permitted=0000c001, seen=00008001, required=00000001.
pf_key: parseable PF_KEY message.

pfkey v2 msg. type=8(expire) seq=1 len=21 pid=987 errno=0 satype=3(ESP)
pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=8(expire), errno=0, satype=3(ESP), len=21, res=0, seq=1, pid=987.
pfkey_lib_debug:pfkey_msg_parse: remain=19 ext_type=1(security-association) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_sa_parse.
pfkey_lib_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=12345678 replay=0 state=1 auth=2 encrypt=3 flags=0 ref=2.
pfkey_lib_debug:pfkey_msg_parse: remain=16 ext_type=2(lifetime-current) ext_len=5 parsing ext 0pDEADF00D with parser pfkey_lifetime_parse.
pfkey_lib_debug:pfkey_lifetime_parse: life_type=2(lifetime-current) alloc=1 bytes=408 pkts=3.
pfkey_lib_debug:pfkey_msg_parse: remain=11 ext_type=4(lifetime-soft) ext_len=5 parsing ext 0pDEADF00D with parser pfkey_lifetime_parse.
pfkey_lib_debug:pfkey_lifetime_parse: life_type=4(lifetime-soft) alloc=0 bytes=384 pkts=0.
pfkey_lib_debug:pfkey_msg_parse: remain=6 ext_type=5(source-address) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_address_parse.
pfkey_lib_debug:pfkey_address_parse: found exttype=5(source-address) family=2(AF_INET) address=192.1.2.23 proto=0 port=0.
pfkey_lib_debug:pfkey_msg_parse: remain=3 ext_type=6(destination-address) ext_len=3 parsing ext 0pDEADF00D with parser pfkey_address_parse.
pfkey_lib_debug:pfkey_address_parse: found exttype=6(destination-address) family=2(AF_INET) address=192.1.2.45 proto=0 port=0.
pfkey_lib_debug:pfkey_msg_parse: extensions permitted=0000007f, seen=00000077, required=00000067.
pf_key: parseable PF_KEY message.
pf_key: Exiting on signal 15

east:~#
 kill `cat /var/run/klogd.pid`; cat /tmp/klog.log
klogd 1.3-3#33.1, log source = /proc/kmsg started.
east:~#
 halt
INIT: Switching to runlevel: 0
INIT: Sending processes the TERM signal
east:~#
 INIT: Sending processes the KILL signal
Stopping domain name service: named.
Stopping internet superserver: inetd.
Stopping portmap daemon: portmap.
ipsec_setup: Stopping FreeS/WAN IPsec...
ipsec_setup: stop ordered, but IPsec does not appear to be running!
ipsec_setup: doing cleanup anyway...
IPSEC EVENT: KLIPS device ipsec0 shut down.

Stopping system log daemon: klogd syslogd.
Sending all processes the TERM signal... done.
Sending all processes the KILL signal... done.
Unmounting remote filesystems... done.
Deactivating swap... done.
Unmounting local filesystems... done.
Power down.

