1
Starting UML PATH/start.sh
4
On node 0 totalpages: 8192
6
Calibrating delay loop... XXXX bogomips
7
Dentry-cache hash table entries: NUMBERS
8
Inode-cache hash table entries: NUMBERS
9
Mount-cache hash table entries: NUMBERS
10
Buffer-cache hash table entries: NUMBERS
11
Page-cache hash table entries: NUMEBRS
12
POSIX conformance testing by UNIFIX
13
Linux NET4.0 for Linux 2.4
14
Based upon Swansea University Computer Society NET3.039
15
Initializing RT netlink socket
17
VFS: Diskquotas version dquot_6.4.0 initialized
18
devfs: VERSION Richard Gooch (rgooch@atnf.csiro.au)
20
pty: 256 Unix98 ptys configured
21
SLIP: version 0.8.4-NET3.019-NEWTTY (dynamic channels, max=256).
22
loop: loaded (max 8 devices)
23
PPP generic driver version VERSION
24
Universal TUN/TAP device driver VERSION
25
NET4: Linux TCP/IP 1.0 for NET4.0
26
IP Protocols: ICMP, UDP, TCP
27
IP: routing cache hash table of 512 buckets, 4Kbytes
28
TCP: Hash tables configured (established 2048 bind 2048)
29
IPv4 over IPv4 tunneling driver
30
GRE over IPv4 tunneling driver
31
NET4: Unix domain sockets 1.0/SMP for Linux NET4.0.
33
INIT: version 2.78 booting
35
Calculating module dependancies
39
Checking all file systems...
40
Parallelizing fsck version 1.18 (11-Nov-1999)
41
Setting kernel variables.
42
Mounting local filesystems...
43
/dev/shm on /tmp type tmpfs (rw)
44
/dev/shm on /var/run type tmpfs (rw)
45
devpts on /dev/pts type devpts (rw,mode=0622)
46
none on /usr/share type hostfs (ro)
47
Enabling packet forwarding: done.
48
Configuring network interfaces: done.
49
Cleaning: /tmp /var/lock /var/run.
50
Initializing random number generator... done.
51
Recovering nvi editor sessions... done.
52
Give root password for maintenance
53
(or type Control-D for normal startup):
55
klogd -c 4 -x -f /tmp/klog.log
63
enckey=0xaaaabbbbccccdddd4043434545464649494a4a4c4c4f4f515152525454575758
65
authkey=0x8765876587658765876587658765876587658765
67
ipsec spi --af inet --edst 192.1.2.45 --spi 0xD1234567 --proto esp --src 192.1.2.23 --esp aes-sha1-96 --enckey $enckey --authkey $authkey
69
ipsec spi --af inet --edst 192.1.2.45 --spi 0xD1234567 --proto tun --src 192.1.2.23 --dst 192.1.2.45 --ip4
71
ipsec spigrp inet 192.1.2.45 0xD1234567 tun inet 192.1.2.45 0xD1234567 esp
73
ipsec eroute --add --eraf inet --src 192.0.2.0/24 --dst 192.0.1.0/24 --said tun0xD1234567@192.1.2.45
75
ipsec tncfg --attach --virtual ipsec0 --physical eth1
77
ifconfig ipsec0 inet 192.1.2.23 netmask 0xffffff00 broadcast 192.1.2.255 up
79
arp -s 192.1.2.45 10:00:00:64:64:45
81
arp -s 192.1.2.254 10:00:00:64:64:45
85
192.0.2.0/24 -> 192.0.1.0/24 => tun0xd1234567@192.1.2.45 esp0xd1234567@192.1.2.45 (0)
86
ipsec0->eth1 mtu=16260(1500)->1500
87
esp0xd1234567@192.1.2.45 ESP_AES_HMAC_SHA1: dir=out src=192.1.2.23 iv_bits=128bits iv=0xDEADF00DDEADF00DDEADF00DDEADF00D alen=160 aklen=160 eklen=256 life(c,s,h)= refcount=4 ref=2
88
tun0xd1234567@192.1.2.45 IPIP: dir=out src=192.1.2.23 life(c,s,h)= refcount=4 ref=3
89
Destination Gateway Genmask Flags MSS Window irtt Iface
91
route add -host 192.0.1.1 gw 192.1.2.45 dev ipsec0
94
IPSEC EVENT: KLIPS device ipsec0 shut down.
95
ipsec_setup: Stopping Openswan IPsec...
96
ipsec_setup: stop ordered, but IPsec does not appear to be running!
97
ipsec_setup: doing cleanup anyway...
99
kill `cat /var/run/klogd.pid`; cat /tmp/klog.log
100
klogd 1.3-3#33.1, log source = /proc/kmsg started.