whackwest --name ipsec-psk --delete --psk --host 127.95.7.2 --ikeport 8500 --client 127.95.7.20/30 --updown silly --to --updown sally --host 127.95.7.1 --ikeport 8500 --client 127.95.7.8/30 --authenticate --encrypt --pfs --rekeymargin 350 --ikelifetime 900 --ipseclifetime 800 --keyingtries 2
002 added connection description "ipsec-psk"
whackeast --name ipsec-psk --delete --psk --host 127.95.7.2 --ikeport 8500 --client 127.95.7.20/30 --updown silly --to --updown sally --host 127.95.7.1 --ikeport 8500 --client 127.95.7.8/30 --authenticate --encrypt --pfs --rekeymargin 350 --ikelifetime 900 --ipseclifetime 800 --keyingtries 2
002 added connection description "ipsec-psk"
whackwest --listen
002 listening for IKE messages
002 adding interface virtual127.95.7.1/lo:w 127.95.7.1
002 loading secrets from "/tmp/ipsec.secrets/west"
whackeast --listen
002 listening for IKE messages
002 adding interface virtual127.95.7.2/lo:e 127.95.7.2
002 loading secrets from "/tmp/ipsec.secrets/east"
whackwest --name ipsec-psk --initiate
002 "ipsec-psk" #1: initiating Main Mode
104 "ipsec-psk" #1: STATE_MAIN_I1: initiate
106 "ipsec-psk" #1: STATE_MAIN_I2: sent MI2, expecting MR2
002 "ipsec-psk" #1: I did not send a certificate because I do not have one.
108 "ipsec-psk" #1: STATE_MAIN_I3: sent MI3, expecting MR3
002 "ipsec-psk" #1: ISAKMP SA established
004 "ipsec-psk" #1: STATE_MAIN_I4: ISAKMP SA established
002 "ipsec-psk" #2: initiating Quick Mode PSK+ENCRYPT+AUTHENTICATE+TUNNEL+PFS+UP
112 "ipsec-psk" #2: STATE_QUICK_I1: initiate
002 "ipsec-psk" #2: sent QI2, IPsec SA established
004 "ipsec-psk" #2: STATE_QUICK_I2: sent QI2, IPsec SA established
whackwest --shutdown
002 shutting down
whackeast --shutdown
002 shutting down
