1
Starting UML PATH/start.sh
4
On node 0 totalpages: 8192
6
Calibrating delay loop... XXXX bogomips
7
Dentry-cache hash table entries: NUMBERS
8
Inode-cache hash table entries: NUMBERS
9
Mount-cache hash table entries: NUMBERS
10
Buffer-cache hash table entries: NUMBERS
11
Page-cache hash table entries: NUMEBRS
12
POSIX conformance testing by UNIFIX
13
Linux NET4.0 for Linux 2.4
14
Based upon Swansea University Computer Society NET3.039
15
Initializing RT netlink socket
17
VFS: Diskquotas version dquot_6.4.0 initialized
18
devfs: VERSION Richard Gooch (rgooch@atnf.csiro.au)
20
pty: 256 Unix98 ptys configured
21
SLIP: version 0.8.4-NET3.019-NEWTTY (dynamic channels, max=256).
22
loop: loaded (max 8 devices)
23
PPP generic driver version VERSION
24
Universal TUN/TAP device driver VERSION
25
NET4: Linux TCP/IP 1.0 for NET4.0
26
IP Protocols: ICMP, UDP, TCP
27
IP: routing cache hash table of 512 buckets, 4Kbytes
28
TCP: Hash tables configured (established 2048 bind 2048)
29
IPv4 over IPv4 tunneling driver
30
GRE over IPv4 tunneling driver
31
NET4: Unix domain sockets 1.0/SMP for Linux NET4.0.
33
INIT: version 2.78 booting
35
Calculating module dependancies
39
Checking all file systems...
40
Parallelizing fsck version 1.18 (11-Nov-1999)
41
Setting kernel variables.
42
Mounting local filesystems...
43
/dev/shm on /tmp type tmpfs (rw)
44
/dev/shm on /var/run type tmpfs (rw)
45
devpts on /dev/pts type devpts (rw,mode=0622)
46
none on /usr/share type hostfs (ro)
47
Enabling packet forwarding: done.
48
Configuring network interfaces: done.
49
Cleaning: /tmp /var/lock /var/run.
50
Initializing random number generator... done.
51
Recovering nvi editor sessions... done.
52
Give root password for maintenance
53
(or type Control-D for normal startup):
55
klogd -c 4 -x -f /tmp/klog.log
57
ping -n -c 4 192.0.2.254
58
PING 192.0.2.254 (192.0.2.254): 56 data bytes
59
64 bytes from 192.0.2.254: icmp_seq=0 ttl=257 time=999 ms
60
64 bytes from 192.0.2.254: icmp_seq=1 ttl=257 time=999 ms
61
64 bytes from 192.0.2.254: icmp_seq=2 ttl=257 time=999 ms
62
64 bytes from 192.0.2.254: icmp_seq=3 ttl=257 time=999 ms
64
--- 192.0.2.254 ping statistics ---
65
4 packets transmitted, 4 packets received, 0% packet loss
66
round-trip min/avg/max = 3.1/4.5/9.26 ms
68
iptables -A INPUT -i eth1 -s 192.0.2.0/24 -j DROP
70
ping -n -c 4 192.0.2.254
71
PING 192.0.2.254 (192.0.2.254): 56 data bytes
73
--- 192.0.2.254 ping statistics ---
74
4 packets transmitted, 0 packets received, 100% packet loss
77
ipsec_setup: Starting Openswan IPsec VERSION
79
ipsec auto --add westnet-eastnet
81
/testing/pluto/basic-pluto-01/eroutewait.sh trap
83
ipsec auto --up westnet-eastnet
84
104 "westnet-eastnet" #1: STATE_MAIN_I1: initiate
85
106 "westnet-eastnet" #1: STATE_MAIN_I2: sent MI2, expecting MR2
86
108 "westnet-eastnet" #1: STATE_MAIN_I3: sent MI3, expecting MR3
87
004 "westnet-eastnet" #1: STATE_MAIN_I4: ISAKMP SA established
88
112 "westnet-eastnet" #2: STATE_QUICK_I1: initiate
89
004 "westnet-eastnet" #2: STATE_QUICK_I2: sent QI2, IPsec SA established
96
0.0.0.0/0 -> 0.0.0.0/0 => %trap
97
192.0.1.0/24 -> 192.0.2.0/24 => tun0xIPIP@192.1.2.23 esp0xESPSPI@192.1.2.23
98
ipsec0->eth1 mtu=16260(9999)->1500
99
tun0xTUN#@192.1.2.23 IPIP: dir=out src=192.1.2.45
100
esp0xKLIPSPIK@192.1.2.23 ESP_3DES_HMAC_MD5: dir=out src=192.1.2.45 iv_bits=64bits iv=0xIVISFORRANDOM000 ooowin=64 alen=128 aklen=128 eklen=192
101
esp0xKLIPSPIK@192.1.2.45 ESP_3DES_HMAC_MD5: dir=in src=192.1.2.23 iv_bits=64bits iv=0xIVISFORRANDOM000 ooowin=64 alen=128 aklen=128 eklen=192
102
tun0xTUN#@192.1.2.45 IPIP: dir=in src=192.1.2.23 policy=192.0.2.0/24->192.0.1.0/24 flags=0x8<>
103
Destination Gateway Genmask Flags MSS Window irtt Iface
104
0.0.0.0 192.1.2.254 0.0.0.0 UG 99 0 0 eth1
105
0.0.0.0 192.1.2.254 128.0.0.0 UG 99 0 0 ipsec0
106
128.0.0.0 192.1.2.254 128.0.0.0 UG 99 0 0 ipsec0
107
192.0.2.0 192.1.2.23 255.255.255.0 UG 99 0 0 ipsec0
108
192.1.2.0 0.0.0.0 255.255.255.0 U 99 0 0 eth1
109
192.1.2.0 0.0.0.0 255.255.255.0 U 99 0 0 ipsec0
119
IPSEC EVENT: KLIPS device ipsec0 shut down.
120
ipsec_setup: Stopping Openswan IPsec...
122
kill `cat /var/run/klogd.pid`; cat /tmp/klog.log
123
klogd 1.3-3#33.1, log source = /proc/kmsg started.