using /dev/urandom as source of random entropy
using /dev/urandom as source of random entropy
using /dev/urandom as source of random entropy
adding connection: "test"
listening for IKE messages
adding interface ipsec0/eth0.2 192.168.20.193:500
adding interface ipsec0/eth0.2 192.168.20.193:4500
adding interface ipsec0/eth0.2 fd7d:1ae2:819c:0:12ea:daff:fe11:2a32:500
adding interface ipsec0/eth0.2 fd7d:1ae2:819c::8c6:500
loading secrets from "/etc/ipsec.secrets"
[ 6507.895264] do_page_fault(): sending SIGSEGV to pluto for invalid read access from 000001b8
[ 6507.911912] epc = 55659933 in pluto[555ef000+bb000]
[ 6507.921665] ra = 55631057 in pluto[555ef000+bb000]
packet from 192.168.20.221:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
packet from 192.168.20.221:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] method set to=106
packet from 192.168.20.221:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] method set to=108
packet from 192.168.20.221:500: received Vendor ID payload [RFC 3947] method set to=115
packet from 192.168.20.221:500: received Vendor ID payload [Dead Peer Detection]
"test" #1: responding to Main Mode
"test" #1: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
"test" #1: STATE_MAIN_R1: sent MR1, expecting MI2
"test" #1: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): no NAT detected
"test" #1: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
"test" #1: STATE_MAIN_R2: sent MR2, expecting MI3
| WARNING: openswan-2.6.51.5/programs/pluto/crypt_start_dh.c:160: encryptor '3des' expects keylen 24/192, SA #1 INITIATOR keylen is 20
| WARNING: openswan-2.6.51.5/programs/pluto/crypt_start_dh.c:160: encryptor '3des' expects keylen 24/192, SA #1 RESPONDER keylen is 0
| WARNING: openswan-2.6.51.5/programs/pluto/ikev1_main.c:1206: encryptor '3des' expects keylen 24/192, SA #1 INITIATOR keylen is 20
| WARNING: openswan-2.6.51.5/programs/pluto/ikev1_main.c:1206: encryptor '3des' expects keylen 24/192, SA #1 RESPONDER keylen is 0
"test" #1: Main mode peer ID is ID_IPV4_ADDR: '192.168.20.221'
"test" #1: switched from "test" to "test"
"test"[1] 192.168.20.221 #1: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
"test"[1] 192.168.20.221 #1: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY oursig= theirsig= cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1024}
"test"[1] 192.168.20.221 #1: the peer proposed: 192.168.1.0/24:0/0 -> 192.168.20.221/32:0/0
"test"[1] 192.168.20.221 #2: responding to Quick Mode proposal {msgid:06ccbd3e}
"test"[1] 192.168.20.221 #2: us: 192.168.1.0/24===192.168.20.193
"test"[1] 192.168.20.221 #2: them: 192.168.20.221
"test"[1] 192.168.20.221 #2: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
"test"[1] 192.168.20.221 #2: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
pluto_crypto_helper: helper (2) is normal exiting
pluto_crypto_helper: helper (0) is normal exiting
pluto_crypto_helper: helper (1) is normal exiting
### Segmentation fault
using /dev/urandom as source of random entropy using /dev/urandom as source of random entropy using /dev/urandom as source of random entropy adding connection: "test" listening for IKE messages adding interface ipsec0/eth0.2 192.168.20.193:500 adding interface ipsec0/eth0.2 192.168.20.193:4500 adding interface ipsec0/eth0.2 fd7d:1ae2:819c:0:12ea:daff:fe11:2a32:500 adding interface ipsec0/eth0.2 fd7d:1ae2:819c::8c6:500 loading secrets from "/etc/ipsec.secrets" [ 6507.895264] do_page_fault(): sending SIGSEGV to pluto for invalid read access from 000001b8 [ 6507.911912] epc = 55659933 in pluto[555ef000+bb000] [ 6507.921665] ra = 55631057 in pluto[555ef000+bb000] packet from 192.168.20.221:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00] packet from 192.168.20.221:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] method set to=106 packet from 192.168.20.221:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] method set to=108 packet from 192.168.20.221:500: received Vendor ID payload [RFC 3947] method set to=115 packet from 192.168.20.221:500: received Vendor ID payload [Dead Peer Detection] "test" #1: responding to Main Mode "test" #1: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1 "test" #1: STATE_MAIN_R1: sent MR1, expecting MI2 "test" #1: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): no NAT detected "test" #1: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2 "test" #1: STATE_MAIN_R2: sent MR2, expecting MI3 | WARNING: openswan-2.6.51.5/programs/pluto/crypt_start_dh.c:160: encryptor '3des' expects keylen 24/192, SA #1 INITIATOR keylen is 20 | WARNING: openswan-2.6.51.5/programs/pluto/crypt_start_dh.c:160: encryptor '3des' expects keylen 24/192, SA #1 RESPONDER keylen is 0 | WARNING: openswan-2.6.51.5/programs/pluto/ikev1_main.c:1206: encryptor '3des' expects keylen 24/192, SA #1 INITIATOR keylen is 20 | WARNING: openswan-2.6.51.5/programs/pluto/ikev1_main.c:1206: encryptor '3des' expects keylen 24/192, SA #1 RESPONDER keylen is 0 "test" #1: Main mode peer ID is ID_IPV4_ADDR: '192.168.20.221' "test" #1: switched from "test" to "test" "test"[1] 192.168.20.221 #1: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3 "test"[1] 192.168.20.221 #1: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY oursig= theirsig= cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1024} "test"[1] 192.168.20.221 #1: the peer proposed: 192.168.1.0/24:0/0 -> 192.168.20.221/32:0/0 "test"[1] 192.168.20.221 #2: responding to Quick Mode proposal {msgid:06ccbd3e} "test"[1] 192.168.20.221 #2: us: 192.168.1.0/24===192.168.20.193 "test"[1] 192.168.20.221 #2: them: 192.168.20.221 "test"[1] 192.168.20.221 #2: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 "test"[1] 192.168.20.221 #2: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 pluto_crypto_helper: helper (2) is normal exiting pluto_crypto_helper: helper (0) is normal exiting pluto_crypto_helper: helper (1) is normal exiting ### Segmentation fault
It's been a long time coming,I hope it works out