/testing/guestbin/swan-prep --46 --x509 --x509name key4096
Preparing X.509 files
west #
 ipsec start
Redirecting to: [initsystem]
west #
 ../../guestbin/wait-until-pluto-started
west #
 ipsec auto --add v6-tunnel
"v6-tunnel": added IKEv2 connection
west #
 ipsec whack --impair suppress_retransmits
west #
 echo "initdone"
initdone
west #
 ipsec auto --up v6-tunnel
"v6-tunnel" #1: initiating IKEv2 connection to 2001:db8:1:2::23 using UDP
"v6-tunnel" #1: sent IKE_SA_INIT request to [2001:db8:1:2::23]:UDP/500
"v6-tunnel" #1: processed IKE_SA_INIT response from [2001:db8:1:2::23]:UDP/500 {cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_256 group=MODP2048}, initiating IKE_AUTH
"v6-tunnel" #1: sent IKE_AUTH request to [2001:db8:1:2::23]:UDP/500
"v6-tunnel" #1: initiator established IKE SA; authenticated peer certificate 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' and 3nnn-bit RSASSA-PSS with SHA2_512 digital signature issued by 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
"v6-tunnel" #2: initiator established Child SA using #1; IPsec tunnel [2001:111:1111::/48===2001:2222:222:2200::/56] {ESP/ESN=>0xESPESP <0xESPESP xfrm=AES_GCM_16_256-NONE DPD=passive}
west #
 grep "fragment number" /tmp/pluto.log
|    fragment number: 1 (00 01)
|    fragment number: 2 (00 02)
|    fragment number: 3 (00 03)
|    fragment number: 1 (00 01)
| received IKE encrypted fragment number '1', total number '2', next payload '36'
|    fragment number: 2 (00 02)
| received IKE encrypted fragment number '2', total number '2', next payload '0'
west #
 echo done
done
west #
 ../../guestbin/ipsec-kernel-state.sh
src 2001:db8:1:2::45 dst 2001:db8:1:2::23
	proto esp spi 0xSPISPI reqid REQID mode tunnel
	replay-window 0 flag af-unspec esn
	aead rfc4106(gcm(aes)) 0xENCAUTHKEY 128
	anti-replay esn context:
	 seq-hi 0x0, seq 0xXX, oseq-hi 0x0, oseq 0xXX
	 replay_window 0, bitmap-length 0
src 2001:db8:1:2::23 dst 2001:db8:1:2::45
	proto esp spi 0xSPISPI reqid REQID mode tunnel
	replay-window 0 flag af-unspec esn
	aead rfc4106(gcm(aes)) 0xENCAUTHKEY 128
	anti-replay esn context:
	 seq-hi 0x0, seq 0xXX, oseq-hi 0x0, oseq 0xXX
	 replay_window 128, bitmap-length 4
	 00000000 00000000 00000000 XXXXXXXX 
west #
 ../../guestbin/ipsec-kernel-policy.sh
src ::/0 dst ::/0 proto ipv6-icmp type 135
	dir fwd priority PRIORITY ptype main
src ::/0 dst ::/0 proto ipv6-icmp type 135
	dir in priority PRIORITY ptype main
src ::/0 dst ::/0 proto ipv6-icmp type 135
	dir out priority PRIORITY ptype main
src ::/0 dst ::/0 proto ipv6-icmp type 136
	dir fwd priority PRIORITY ptype main
src ::/0 dst ::/0 proto ipv6-icmp type 136
	dir in priority PRIORITY ptype main
src ::/0 dst ::/0 proto ipv6-icmp type 136
	dir out priority PRIORITY ptype main
src 2001:111:1111::/48 dst 2001:2222:222:2200::/56
	dir out priority PRIORITY ptype main
	tmpl src 2001:db8:1:2::45 dst 2001:db8:1:2::23
		proto esp reqid REQID mode tunnel
src 2001:2222:222:2200::/56 dst 2001:111:1111::/48
	dir fwd priority PRIORITY ptype main
	tmpl src 2001:db8:1:2::23 dst 2001:db8:1:2::45
		proto esp reqid REQID mode tunnel
src 2001:2222:222:2200::/56 dst 2001:111:1111::/48
	dir in priority PRIORITY ptype main
	tmpl src 2001:db8:1:2::23 dst 2001:db8:1:2::45
		proto esp reqid REQID mode tunnel
west #
 
