Program invoked with PATH/start.sh spi1.sh Starting UML PATH/start.sh spawn PATH single tracing thread pid = XXXXX Linux version XXXX On node 0 totalpages: 8192 zone(0): 0 pages. zone(1): 8192 pages. zone(2): 0 pages. Kernel command line: Calibrating delay loop... XXXX bogomips Memory: 32244k available Dentry-cache hash table entries: 4096 (order: 3, 32768 bytes) Inode-cache hash table entries: 2048 (order: 2, 16384 bytes) Mount-cache hash table entries: 512 (order: 0, 4096 bytes) Buffer-cache hash table entries: 1024 (order: 0, 4096 bytes) Page-cache hash table entries: 8192 (order: 3, 32768 bytes) POSIX conformance testing by UNIFIX Linux NET4.0 for Linux 2.4 Based upon Swansea University Computer Society NET3.039 Initializing RT netlink socket Starting kswapd VFS: Diskquotas version dquot_6.4.0 initialized devfs: VERSION Richard Gooch (rgooch@atnf.csiro.au) devfs: boot_options Q pty: 256 Unix98 ptys configured block: slots and queues RAMDISK driver initialized: 16 RAM disks of 4096K size 1024 blocksize Netdevice 0 : daemon backend- ethernet address = 10:0:0:ab:cd:ff Netdevice 1 : daemon backend- ethernet address = 10:0:0:64:64:45 SLIP: version 0.8.4-NET3.019-NEWTTY (dynamic channels, max=256). loop: loaded (max 8 devices) PPP generic driver version 2.4.1 Universal TUN/TAP device driver 1.4 (C)1999-2001 Maxim Krasnyansky NET4: Linux TCP/IP 1.0 for NET4.0 IP Protocols: ICMP, UDP, TCP IP: routing cache hash table of 512 buckets, 4Kbytes TCP: Hash tables configured (established 2048 bind 2048) IPv4 over IPv4 tunneling driver GRE over IPv4 tunneling driver klips_info:ipsec_init: KLIPS startup, FreeS/WAN IPSec version: XXXX NET4: Unix domain sockets 1.0/SMP for Linux NET4.0. Initializing stdio console driver Initializing software serial port version 1 mconsole initialized on PATH Mounted devfs on /dev INIT: version 2.78 booting Activating swap... Calculating module dependancies done. Loading modules: LIST Checking all file systems... Parallelizing fsck version 1.18 (11-Nov-1999) Setting kernel variables. Mounting local filesystems... /dev/ubd/1 on /usr/share type hostfs (ro,/usr/share) /dev/shm on /tmp type tmpfs (rw) /dev/shm on /var/run type tmpfs (rw) devpts on /dev/pts type devpts (rw,mode=0622) Enabling packet forwarding: done. Configuring network interfaces: done. Cleaning: /tmp /var/lock /var/run. Initializing random number generator... done. Recovering nvi editor sessions... done. Give root password for maintenance (or type Control-D for normal startup): west:~# TZ=GMT export TZ west:~# ipsec spi --clear west:~# ipsec eroute --clear west:~# ipsec klipsdebug --set pfkey klips_debug:pfkey_x_debug_process: set klips_debug:pfkey_msg_interp: parsing message type 16 with msg_parser ABCDABCD klips_debug:pfkey_x_msg_debug_parse: . klips_debug:pfkey_release: sock=ABCDABCD sk=ABCDABCD klips_debug:pfkey_destroy_socket: STUFF klips_debug:pfkey_remove_socket: . klips_debug:pfkey_remove_socket: succeeded. klips_debug:pfkey_destroy_socket: STUFF klips_debug:pfkey_destroy_socket: STUFF klips_debug:pfkey_destroy_socket: STUFF klips_debug:pfkey_list_remove_socket: removing sock=ABCDABCD klips_debug:pfkey_list_remove_socket: removing sock=ABCDABCD klips_debug:pfkey_list_remove_socket: removing sock=ABCDABCD klips_debug:pfkey_list_remove_socket: removing sock=ABCDABCD klips_debug:pfkey_list_remove_socket: removing sock=ABCDABCD klips_debug:pfkey_list_remove_socket: removing sock=ABCDABCD klips_debug:pfkey_list_remove_socket: removing sock=ABCDABCD klips_debug:pfkey_list_remove_socket: removing sock=ABCDABCD klips_debug:pfkey_list_remove_socket: removing sock=ABCDABCD klips_debug:pfkey_list_remove_socket: removing sock=ABCDABCD klips_debug:pfkey_list_remove_socket: removing sock=ABCDABCD klips_debug:pfkey_list_remove_socket: removing sock=ABCDABCD klips_debug:pfkey_list_remove_socket: removing sock=ABCDABCD klips_debug:pfkey_release: succeeded. west:~# ipsec klipsdebug --set verbose klips_debug:pfkey_create: sock=ABCDABCD type:3 state:1 flags:0 protocol:2 klips_debug:pfkey_create: sock->fasync_list=00000000 sk->sleep=ABCDABCD klips_debug:pfkey_insert_socket: sk=ABCDABCD klips_debug:pfkey_list_insert_socket: socketp=ABCDABCD klips_debug:pfkey_create: Socket sock=ABCDABCD sk=ABCDABCD initialised. klips_debug:pfkey_sendmsg: . klips_debug:pfkey_sendmsg: msg sent for parsing. klips_debug:pfkey_msg_interp: parsing message ver=2, type=16, errno=0, satype=0(UNKNOWN), len=9, res=0, seq=1, pid=987. klips_debug:pfkey_alloc_ipsec_sa: allocated tdb struct=ABDCABCD klips_debug:pfkey_msg_interp: allocated extr->tdb=ABCDABCD klips_debug:pfkey_msg_interp: processing ext 25 ABCDABCD with processor ABCDABCD klips_debug:pfkey_x_debug_process: . klips_debug:pfkey_x_debug_process: set klips_debug:pfkey_msg_interp: parsing message type 16 with msg_parser ABCDABCD klips_debug:pfkey_x_msg_debug_parse: . klips_debug:pfkey_release: sock=ABCDABCD sk=ABCDABCD klips_debug:pfkey_destroy_socket: STUFF klips_debug:pfkey_remove_socket: . klips_debug:pfkey_remove_socket: succeeded. klips_debug:pfkey_destroy_socket: STUFF klips_debug:pfkey_destroy_socket: STUFF klips_debug:pfkey_destroy_socket: STUFF klips_debug:pfkey_list_remove_socket: removing sock=ABCDABCD klips_debug:pfkey_list_remove_socket: removing sock=ABCDABCD klips_debug:pfkey_list_remove_socket: removing sock=ABCDABCD klips_debug:pfkey_list_remove_socket: removing sock=ABCDABCD klips_debug:pfkey_list_remove_socket: removing sock=ABCDABCD klips_debug:pfkey_list_remove_socket: removing sock=ABCDABCD klips_debug:pfkey_list_remove_socket: removing sock=ABCDABCD klips_debug:pfkey_list_remove_socket: removing sock=ABCDABCD klips_debug:pfkey_list_remove_socket: removing sock=ABCDABCD klips_debug:pfkey_list_remove_socket: removing sock=ABCDABCD klips_debug:pfkey_list_remove_socket: removing sock=ABCDABCD klips_debug:pfkey_list_remove_socket: removing sock=ABCDABCD klips_debug:pfkey_list_remove_socket: removing sock=ABCDABCD klips_debug:pfkey_release: succeeded. west:~# ipsec tncfg --attach --virtual ipsec0 --physical eth1 west:~# ifconfig ipsec0 inet 192.1.2.45 netmask 0xffffff00 broadcast 192.1.2.255 up west:~# arp -s 192.1.2.23 10:00:00:64:64:45 west:~# arp -s 192.1.2.254 10:00:00:64:64:45 west:~# ipsec look west NOW ipsec0->eth1 mtu=16260(1500)->1500 Destination Gateway Genmask Flags MSS Window irtt Iface west:~# route add -host 192.0.2.1 gw 192.1.2.23 dev ipsec0 west:~# nbd: module cleaned up.