Starting UML PATH/start.sh
spawn PATH single
Linux version XXXX
On node 0 totalpages: 8192
Kernel command line:
Calibrating delay loop... XXXX bogomips
Dentry-cache hash table entries: NUMBERS
Inode-cache hash table entries: NUMBERS
Mount-cache hash table entries: NUMBERS
Buffer-cache hash table entries: NUMBERS
Page-cache hash table entries: NUMEBRS
POSIX conformance testing by UNIFIX
Linux NET4.0 for Linux 2.4
Based upon Swansea University Computer Society NET3.039
Initializing RT netlink socket
Starting kswapd
VFS: Diskquotas version dquot_6.4.0 initialized
devfs: VERSION Richard Gooch (rgooch@atnf.csiro.au)
devfs: boot_options Q
pty: 256 Unix98 ptys configured
SLIP: version 0.8.4-NET3.019-NEWTTY (dynamic channels, max=256).
loop: loaded (max 8 devices)
PPP generic driver version VERSION
Universal TUN/TAP device driver VERSION
NET4: Linux TCP/IP 1.0 for NET4.0
IP Protocols: ICMP, UDP, TCP
IP: routing cache hash table of 512 buckets, 4Kbytes
TCP: Hash tables configured (established 2048 bind 2048)
IPv4 over IPv4 tunneling driver
GRE over IPv4 tunneling driver
NET4: Unix domain sockets 1.0/SMP for Linux NET4.0.
Mounted devfs on /dev
INIT: version 2.78 booting
Activating swap...
Calculating module dependancies
done.
Loading modules: LIST

Checking all file systems...
Parallelizing fsck version 1.18 (11-Nov-1999)
Setting kernel variables.
Mounting local filesystems...
/dev/shm on /tmp type tmpfs (rw)
/dev/shm on /var/run type tmpfs (rw)
devpts on /dev/pts type devpts (rw,mode=0622)
none on /usr/share type hostfs (ro)
Enabling packet forwarding: done.
Configuring network interfaces: done.
Cleaning: /tmp /var/lock /var/run.
Initializing random number generator... done.
Recovering nvi editor sessions... done.
Give root password for maintenance
(or type Control-D for normal startup): 
west:~#
 klogd -c 4 -x -f /tmp/klog.log
west:~#
 TESTNAME=dpd-03
west:~#
 source /testing/pluto/bin/westlocal.sh
west:~#
 ipsec setup start
ipsec_setup: Starting Openswan IPsec VERSION
west:~#
 /testing/pluto/bin/wait-until-policy-loaded
west:~#
 ipsec auto --add west-east
west:~#
 ping -q -c 8 -n 192.1.2.23
PING 192.1.2.23 (192.1.2.23): 56 data bytes

--- 192.1.2.23 ping statistics ---
8 packets transmitted, 8 packets received, 0% packet loss
round-trip min/avg/max = 3.1/4.5/9.26 ms
west:~#
 ipsec auto --up west-east
104 "west-east" #1: STATE_MAIN_I1: initiate
003 "west-east" #1: received Vendor ID payload [Dead Peer Detection]
106 "west-east" #1: STATE_MAIN_I2: sent MI2, expecting MR2
108 "west-east" #1: STATE_MAIN_I3: sent MI3, expecting MR3
004 "west-east" #1: STATE_MAIN_I4: ISAKMP SA established
112 "west-east" #2: STATE_QUICK_I1: initiate
004 "west-east" #2: STATE_QUICK_I2: sent QI2, IPsec SA established
west:~#
 ping -q -c 8 -n 192.1.2.23
PING 192.1.2.23 (192.1.2.23): 56 data bytes

--- 192.1.2.23 ping statistics ---
8 packets transmitted, 8 packets received, 0% packet loss
round-trip min/avg/max = 3.1/4.5/9.26 ms
west:~#
 ipsec eroute
0          0.0.0.0/0          -> 0.0.0.0/0          => %trap
12         192.1.2.45/32      -> 192.1.2.23/32      => tun0x1002@192.1.2.23
west:~#
 : Let R_U_THERE packets flow
west:~#
 sleep 20
west:~#
 : Create the block
west:~#
 iptables -I INPUT -s 192.1.2.23/32 -d 0/0 -j DROP
west:~#
 sleep 20
west:~#
 : DPD should have triggered now
west:~#
 ipsec eroute
0          0.0.0.0/0          -> 0.0.0.0/0          => %trap
0          192.1.2.45/32      -> 192.1.2.23/32      => %trap
west:~#
 iptables -D INPUT -s 192.1.2.23/32 -d 0/0 -j DROP
west:~#
 ping -q -c 8 -n 192.1.2.23
PING 192.1.2.23 (192.1.2.23): 56 data bytes

--- 192.1.2.23 ping statistics ---
8 packets transmitted, 8 packets received, 0% packet loss
round-trip min/avg/max = 3.1/4.5/9.26 ms
west:~#
 ipsec eroute
0          0.0.0.0/0          -> 0.0.0.0/0          => %trap
14         192.1.2.45/32      -> 192.1.2.23/32      => tun0x1006@192.1.2.23
west:~#
 echo done
done
west:~#
 

west:~#
 ipsec setup stop
IPSEC EVENT: KLIPS device ipsec0 shut down.
ipsec_setup: Stopping Openswan IPsec...
west:~#
 echo end
end
west:~#
 ipsec setup stop
ipsec_setup: Stopping Openswan IPsec...
ipsec_setup: stop ordered, but IPsec does not appear to be running!
ipsec_setup: doing cleanup anyway...
west:~#
 kill `cat /var/run/klogd.pid`; cat /tmp/klog.log
klogd 1.3-3#33.1, log source = /proc/kmsg started.
west:~#
 halt -p -f
Power down.

