Starting UML PATH/start.sh
spawn PATH single
tracing thread pid = XXXXX
Linux version XXXX
On node 0 totalpages: 8192
Kernel command line:
Calibrating delay loop... XXXX bogomips
Dentry-cache hash table entries: NUMBERS
Inode-cache hash table entries: NUMBERS
Mount-cache hash table entries: NUMBERS
Buffer-cache hash table entries: NUMBERS
Page-cache hash table entries: NUMEBRS
POSIX conformance testing by UNIFIX
Linux NET4.0 for Linux 2.4
Based upon Swansea University Computer Society NET3.039
Initializing RT netlink socket
Starting kswapd
VFS: Diskquotas version dquot_6.4.0 initialized
devfs: VERSION Richard Gooch (rgooch@atnf.csiro.au)
devfs: boot_options Q
pty: 256 Unix98 ptys configured
SLIP: version 0.8.4-NET3.019-NEWTTY (dynamic channels, max=256).
loop: loaded (max 8 devices)
PPP generic driver version VERSION
Universal TUN/TAP device driver VERSION
NET4: Linux TCP/IP 1.0 for NET4.0
IP Protocols: ICMP, UDP, TCP
IP: routing cache hash table of 512 buckets, 4Kbytes
TCP: Hash tables configured (established 2048 bind 2048)
IPv4 over IPv4 tunneling driver
GRE over IPv4 tunneling driver
NET4: Unix domain sockets 1.0/SMP for Linux NET4.0.
Mounted devfs on /dev
INIT: version 2.78 booting
Activating swap...
Calculating module dependancies
done.
Loading modules: LIST

Checking all file systems...
Parallelizing fsck version 1.18 (11-Nov-1999)
Setting kernel variables.
Mounting local filesystems...
/dev/shm on /tmp type tmpfs (rw)
/dev/shm on /var/run type tmpfs (rw)
devpts on /dev/pts type devpts (rw,mode=0622)
none on /usr/share type hostfs (ro)
Enabling packet forwarding: done.
Configuring network interfaces: done.
Cleaning: /tmp /var/lock /var/run.
Initializing random number generator... done.
Recovering nvi editor sessions... done.
Give root password for maintenance
(or type Control-D for normal startup): 
west:~#
 klogd -c 4 -x -f /tmp/klog.log
west:~#
 ifdown eth1
west:~#
 ifconfig eth1 inet 192.1.2.45 netmask 255.255.255.224 up
west:~#
 route add -net default gw 192.1.2.62
west:~#
 : try default route
west:~#
 ping -c 1 -n 192.1.2.62
PING 192.1.2.62 (192.1.2.62): 56 data bytes
64 bytes from 192.1.2.62: icmp_seq=0 ttl=257 time=999 ms

--- 192.1.2.62 ping statistics ---
1 packets transmitted, 1 packets received, 0% packet loss
round-trip min/avg/max = 3.1/4.5/9.26 ms
west:~#
 : try hitting east before doing IPsec
west:~#
 ping -c 1 -n 192.1.2.23
PING 192.1.2.23 (192.1.2.23): 56 data bytes
64 bytes from 192.1.2.23: icmp_seq=0 ttl=257 time=999 ms

--- 192.1.2.23 ping statistics ---
1 packets transmitted, 1 packets received, 0% packet loss
round-trip min/avg/max = 3.1/4.5/9.26 ms
west:~#
 ipsec setup start
ipsec_setup: Starting FreeS/WAN IPsec VERSION
west:~#
 : check out if .23 has proper TXT record.
west:~#
 dig 23.2.1.192.in-addr.arpa. txt

; <<>> DiG VERSION <<>> 23.2.1.192.in-addr.arpa. txt
;; global options:  printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12345
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 1

;; QUESTION SECTION:
;23.2.1.192.in-addr.arpa.	IN	TXT

;; ANSWER SECTION:
23.2.1.192.in-addr.arpa. 604800	IN	TXT	"X-IPsec-Server(10)=192.1.2.23 " "AQN3cn11FrBVbZhWGwRnFDAf8O9FHBmBIyIvmvt0kfkI2UGDDq8k+vYgRkwBZDviLd1p3SkL30LzuV0rqG3vBriqaAUUGoCQ0UMgsuX+k01bROLsqGB1QNXYvYiPLsnoDhKd2Gx9MUMHEjwwEZeyskMT5k91jvoAZvdEkg+9h7urbJ+kRQ4e+IHkMUrreDGwGVptV/hYQVCD54RZep6xp5ymaKRCDgMpzWvlzO80fP7JDjSZf9LI/MMu6c+qwXI" "KnWoNha75IhFyLWniVczxK2RdhmMhLsi0kC0CoOwWDSIEOb+5zbECDjjud+SF5tT8qRCWnSomX8jtbCdZ50WraQlL"

;; AUTHORITY SECTION:
2.1.192.in-addr.arpa.	604800	IN	NS	NSSERVER.uml.freeswan.org.
2.1.192.in-addr.arpa.	604800	IN	NS	NSSERVER.uml.freeswan.org.

;; ADDITIONAL SECTION:
nic.uml.freeswan.org.	604800	IN	A	192.1.2.254

;; Query time: 25 msec
;; SERVER: 192.1.2.254#53(192.1.2.254)
;; WHEN: DATE
;; MSG SIZE  rcvd: 499

west:~#
 /testing/pluto/basic-pluto-01/whackwait.sh
west:~#
 ipsec auto --add us-to-anyone
west:~#
 ipsec auto --route us-to-anyone
west:~#
 ipsec look
west NOW
192.0.1.0/24       -> 0.0.0.0/0          => %trap (0)
ipsec0->eth1 mtu=16260(1500)->1500
Destination     Gateway         Genmask         Flags   MSS Window  irtt Iface
0.0.0.0         192.1.2.62      0.0.0.0         UG       40 0          0 eth1
0.0.0.0         192.1.2.62      128.0.0.0       UG       40 0          0 ipsec0
128.0.0.0       192.1.2.62      128.0.0.0       UG       40 0          0 ipsec0
192.1.2.32      0.0.0.0         255.255.255.224 U        40 0          0 eth1
192.1.2.32      0.0.0.0         255.255.255.224 U        40 0          0 ipsec0
west:~#
 ipsec auto --status
000 interface ipsec0/eth1 192.1.2.45
000  
000 "us-to-anyone": 192.0.1.0/24===192.1.2.45---192.1.2.62...%opportunistic
000 "us-to-anyone":   ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0
000 "us-to-anyone":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC+lKOD+rKOD; interface: eth1; trap erouted
000 "us-to-anyone":   newest ISAKMP SA: #0; newest IPsec SA: #0; eroute owner: #0
000  
000  
west:~#
 echo end
end
west:~#
 

west:~#
west:~#
 halt
INIT: Switching to runlevel: 0
INIT: Sending processes the TERM signal
west:~#
 kill `cat /var/run/klogd.pid`; cat /tmp/klog.log
klogd 1.3-3#33.1, log source = /proc/kmsg started.
west:~#
 halt
west:~#
 INIT: Sending processes the KILL signal
Stopping domain name service: named.
Stopping internet superserver: inetd.
Stopping portmap daemon: portmap.
ipsec_setup: Stopping FreeS/WAN IPsec...
IPSEC EVENT: KLIPS device ipsec0 shut down.

Stopping system log daemon: klogd syslogd.
Sending all processes the TERM signal... done.
Sending all processes the KILL signal... done.
Unmounting remote filesystems... done.
Deactivating swap... done.
Unmounting local filesystems... done.
Power down.

