whackwest --name ipsec-psk --delete --psk --host 128.95.7.2 --ikeport 8500 --client 128.95.7.20/30 --updown silly --to --updown sally --host 128.95.7.1 --ikeport 8500 --client 128.95.7.8/30 --authenticate --encrypt --pfs --rekeymargin 350 --ikelifetime 900 --ipseclifetime 800 --keyingtries 2 002 added connection description "ipsec-psk" whackeast --name ipsec-psk --delete --psk --host 128.95.7.2 --ikeport 8500 --client 128.95.7.20/30 --updown silly --to --updown sally --host 128.95.7.1 --ikeport 8500 --client 128.95.7.8/30 --authenticate --encrypt --pfs --rekeymargin 350 --ikelifetime 900 --ipseclifetime 800 --keyingtries 2 002 added connection description "ipsec-psk" whackwest --listen 002 listening for IKE messages 002 adding interface virtual128.95.7.1/lo:w 128.95.7.1:8500 002 loading secrets from "/tmp/ipsec.secrets/west" whackeast --listen 002 listening for IKE messages 002 adding interface virtual128.95.7.2/lo:e 128.95.7.2:8500 002 loading secrets from "/tmp/ipsec.secrets/east" whackwest --name ipsec-psk --initiate 002 "ipsec-psk" #1: initiating Main Mode 104 "ipsec-psk" #1: STATE_MAIN_I1: initiate 003 "ipsec-psk" #1: received Vendor ID payload [Libreswan (this version) VERSION 003 "ipsec-psk" #1: received Vendor ID payload [Dead Peer Detection] 106 "ipsec-psk" #1: STATE_MAIN_I2: sent MI2, expecting MR2 002 "ipsec-psk" #1: I did not send a certificate because digital signatures are not being used. (PSK) 108 "ipsec-psk" #1: STATE_MAIN_I3: sent MI3, expecting MR3 004 "ipsec-psk" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536} 002 "ipsec-psk" #2: initiating Quick Mode PSK+ENCRYPT+AUTHENTICATE+TUNNEL+PFS+UP 117 "ipsec-psk" #2: STATE_QUICK_I1: initiate 004 "ipsec-psk" #2: STATE_QUICK_I2: sent QI2, IPsec SA established whackwest --shutdown 002 shutting down whackeast --shutdown 002 shutting down