Starting UML PATH/start.sh spawn PATH single Linux version XXXX On node 0 totalpages: 8192 Kernel command line: Calibrating delay loop... XXXX bogomips Dentry-cache hash table entries: NUMBERS Inode-cache hash table entries: NUMBERS Mount-cache hash table entries: NUMBERS Buffer-cache hash table entries: NUMBERS Page-cache hash table entries: NUMEBRS POSIX conformance testing by UNIFIX Linux NET4.0 for Linux 2.4 Based upon Swansea University Computer Society NET3.039 Initializing RT netlink socket Starting kswapd VFS: Diskquotas version dquot_6.4.0 initialized devfs: VERSION Richard Gooch (rgooch@atnf.csiro.au) devfs: boot_options Q pty: 256 Unix98 ptys configured SLIP: version 0.8.4-NET3.019-NEWTTY (dynamic channels, max=256). loop: loaded (max 8 devices) PPP generic driver version VERSION Universal TUN/TAP device driver VERSION NET4: Linux TCP/IP 1.0 for NET4.0 IP Protocols: ICMP, UDP, TCP IP: routing cache hash table of 512 buckets, 4Kbytes TCP: Hash tables configured (established 2048 bind 2048) IPv4 over IPv4 tunneling driver GRE over IPv4 tunneling driver NET4: Unix domain sockets 1.0/SMP for Linux NET4.0. Mounted devfs on /dev INIT: version 2.78 booting Activating swap... Calculating module dependancies done. Loading modules: LIST Checking all file systems... Parallelizing fsck version 1.18 (11-Nov-1999) Setting kernel variables. Mounting local filesystems... /dev/shm on /tmp type tmpfs (rw) /dev/shm on /var/run type tmpfs (rw) devpts on /dev/pts type devpts (rw,mode=0622) none on /usr/share type hostfs (ro) Enabling packet forwarding: done. Configuring network interfaces: done. Cleaning: /tmp /var/lock /var/run. Initializing random number generator... done. Recovering nvi editor sessions... done. Give root password for maintenance (or type Control-D for normal startup): west:~# klogd -c 4 -x -f /tmp/klog.log west:~# ping -n -c 4 192.0.2.254 PING 192.0.2.254 (192.0.2.254): 56 data bytes 64 bytes from 192.0.2.254: icmp_seq=0 ttl=257 time=999 ms 64 bytes from 192.0.2.254: icmp_seq=1 ttl=257 time=999 ms 64 bytes from 192.0.2.254: icmp_seq=2 ttl=257 time=999 ms 64 bytes from 192.0.2.254: icmp_seq=3 ttl=257 time=999 ms --- 192.0.2.254 ping statistics --- 4 packets transmitted, 4 packets received, 0% packet loss round-trip min/avg/max = 3.1/4.5/9.26 ms west:~# iptables -A INPUT -i eth1 -s 192.0.2.0/24 -j DROP west:~# ping -n -c 4 192.0.2.254 PING 192.0.2.254 (192.0.2.254): 56 data bytes --- 192.0.2.254 ping statistics --- 4 packets transmitted, 0 packets received, 100% packet loss west:~# ipsec setup start ipsec_setup: Starting Libreswan IPsec VERSION west:~# ipsec auto --add westnet-eastnet west:~# /testing/pluto/basic-pluto-01/eroutewait.sh trap west:~# ipsec auto --up westnet-eastnet 104 "westnet-eastnet" #1: STATE_MAIN_I1: initiate 106 "westnet-eastnet" #1: STATE_MAIN_I2: sent MI2, expecting MR2 108 "westnet-eastnet" #1: STATE_MAIN_I3: sent MI3, expecting MR3 004 "westnet-eastnet" #1: STATE_MAIN_I4: ISAKMP SA established 112 "westnet-eastnet" #2: STATE_QUICK_I1: initiate 004 "westnet-eastnet" #2: STATE_QUICK_I2: sent QI2, IPsec SA established west:~# echo done done west:~# ipsec look west NOW 0.0.0.0/0 -> 0.0.0.0/0 => %trap 192.0.1.0/24 -> 192.0.2.0/24 => tun0xIPIP@192.1.2.23 esp0xESPSPI@192.1.2.23 ipsec0->eth1 mtu=16260(9999)->1500 tun0xTUN#@192.1.2.23 IPIP: dir=out src=192.1.2.45 esp0xKLIPSPIK@192.1.2.23 ESP_3DES_HMAC_MD5: dir=out src=192.1.2.45 iv_bits=64bits iv=0xIVISFORRANDOM000 ooowin=64 alen=128 aklen=128 eklen=192 esp0xKLIPSPIK@192.1.2.45 ESP_3DES_HMAC_MD5: dir=in src=192.1.2.23 iv_bits=64bits iv=0xIVISFORRANDOM000 ooowin=64 alen=128 aklen=128 eklen=192 tun0xTUN#@192.1.2.45 IPIP: dir=in src=192.1.2.23 policy=192.0.2.0/24->192.0.1.0/24 flags=0x8<> Destination Gateway Genmask Flags MSS Window irtt Iface 0.0.0.0 192.1.2.254 0.0.0.0 UG 99 0 0 eth1 0.0.0.0 192.1.2.254 128.0.0.0 UG 99 0 0 ipsec0 128.0.0.0 192.1.2.254 128.0.0.0 UG 99 0 0 ipsec0 192.0.2.0 192.1.2.23 255.255.255.0 UG 99 0 0 ipsec0 192.1.2.0 0.0.0.0 255.255.255.0 U 99 0 0 eth1 192.1.2.0 0.0.0.0 255.255.255.0 U 99 0 0 ipsec0 west:~# echo done done west:~# west:~# west:~# ipsec setup stop IPSEC EVENT: KLIPS device ipsec0 shut down. ipsec_setup: Stopping Libreswan IPsec... west:~# kill `cat /var/run/klogd.pid`; cat /tmp/klog.log klogd 1.3-3#33.1, log source = /proc/kmsg started. west:~# halt -p -f Power down.