⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 spi1-console.txt

📁 FREESWAN VPN源代码包
💻 TXT
字号:
Program invoked with PATH/start.sh spi1.shStarting UML PATH/start.shspawn PATH singletracing thread pid = XXXXXLinux version XXXXOn node 0 totalpages: 8192zone(0): 0 pages.zone(1): 8192 pages.zone(2): 0 pages.Kernel command line:Calibrating delay loop... XXXX bogomipsMemory: 32244k availableDentry-cache hash table entries: 4096 (order: 3, 32768 bytes)Inode-cache hash table entries: 2048 (order: 2, 16384 bytes)Mount-cache hash table entries: 512 (order: 0, 4096 bytes)Buffer-cache hash table entries: 1024 (order: 0, 4096 bytes)Page-cache hash table entries: 8192 (order: 3, 32768 bytes)POSIX conformance testing by UNIFIXLinux NET4.0 for Linux 2.4Based upon Swansea University Computer Society NET3.039Initializing RT netlink socketStarting kswapdVFS: Diskquotas version dquot_6.4.0 initializeddevfs: VERSION Richard Gooch (rgooch@atnf.csiro.au)devfs: boot_options Qpty: 256 Unix98 ptys configuredblock: slots and queuesRAMDISK driver initialized: 16 RAM disks of 4096K size 1024 blocksizeNetdevice 0 : daemon backend- ethernet address = 10:0:0:dc:bc:ffNetdevice 1 : daemon backend- ethernet address = 10:0:0:64:64:23SLIP: version 0.8.4-NET3.019-NEWTTY (dynamic channels, max=256).loop: loaded (max 8 devices)PPP generic driver version 2.4.1Universal TUN/TAP device driver 1.4 (C)1999-2001 Maxim KrasnyanskyNET4: Linux TCP/IP 1.0 for NET4.0IP Protocols: ICMP, UDP, TCPIP: routing cache hash table of 512 buckets, 4KbytesTCP: Hash tables configured (established 2048 bind 2048)IPv4 over IPv4 tunneling driverGRE over IPv4 tunneling driverklips_info:ipsec_init: KLIPS startup, FreeS/WAN IPSec version: XXXXNET4: Unix domain sockets 1.0/SMP for Linux NET4.0.Initializing stdio console driverInitializing software serial port version 1mconsole initialized on PATHMounted devfs on /devINIT: version 2.78 bootingActivating swap...Calculating module dependanciesdone.Loading modules: LISTChecking all file systems...Parallelizing fsck version 1.18 (11-Nov-1999)Setting kernel variables.Mounting local filesystems.../dev/ubd/1 on /usr/share type hostfs (ro,/usr/share)/dev/shm on /tmp type tmpfs (rw)/dev/shm on /var/run type tmpfs (rw)devpts on /dev/pts type devpts (rw,mode=0622)Enabling packet forwarding: done.Configuring network interfaces: done.Cleaning: /tmp /var/lock /var/run.Initializing random number generator... done.Recovering nvi editor sessions... done.Give root password for maintenance(or type Control-D for normal startup): east:~# TZ=GMT export TZeast:~# ipsec spi --cleareast:~# ipsec eroute --cleareast:~# ipsec klipsdebug --set pfkeyklips_debug:pfkey_x_debug_process: setklips_debug:pfkey_msg_interp: parsing message type 16 with msg_parser ABCDABCDklips_debug:pfkey_x_msg_debug_parse: .klips_debug:pfkey_release: sock=ABCDABCD sk=ABCDABCDklips_debug:pfkey_destroy_socket: STUFFklips_debug:pfkey_remove_socket: .klips_debug:pfkey_remove_socket: succeeded.klips_debug:pfkey_destroy_socket: STUFFklips_debug:pfkey_destroy_socket: STUFFklips_debug:pfkey_destroy_socket: STUFFklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_release: succeeded.east:~# ipsec klipsdebug --set verboseklips_debug:pfkey_create: sock=ABCDABCD type:3 state:1 flags:0 protocol:2klips_debug:pfkey_create: sock->fasync_list=00000000 sk->sleep=ABCDABCDklips_debug:pfkey_insert_socket: sk=ABCDABCDklips_debug:pfkey_list_insert_socket: socketp=ABCDABCDklips_debug:pfkey_create: Socket sock=ABCDABCD sk=ABCDABCD initialised.klips_debug:pfkey_sendmsg: .klips_debug:pfkey_sendmsg: msg sent for parsing.klips_debug:pfkey_msg_interp: parsing message ver=2, type=16, errno=0, satype=0(UNKNOWN), len=9, res=0, seq=1, pid=987.klips_debug:pfkey_alloc_ipsec_sa: allocated tdb struct=ABDCABCDklips_debug:pfkey_msg_interp: allocated extr->tdb=ABCDABCDklips_debug:pfkey_msg_interp: processing ext 25 ABCDABCD with processor ABCDABCDklips_debug:pfkey_x_debug_process: .klips_debug:pfkey_x_debug_process: setklips_debug:pfkey_msg_interp: parsing message type 16 with msg_parser ABCDABCDklips_debug:pfkey_x_msg_debug_parse: .klips_debug:pfkey_release: sock=ABCDABCD sk=ABCDABCDklips_debug:pfkey_destroy_socket: STUFFklips_debug:pfkey_remove_socket: .klips_debug:pfkey_remove_socket: succeeded.klips_debug:pfkey_destroy_socket: STUFFklips_debug:pfkey_destroy_socket: STUFFklips_debug:pfkey_destroy_socket: STUFFklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_release: succeeded.east:~# ipsec tncfg --attach --virtual ipsec0 --physical eth1east:~# ifconfig ipsec0 inet 192.1.2.23 netmask 0xffffff00 broadcast 192.1.2.255  upeast:~# arp -s 192.1.2.45 10:00:00:64:64:45east:~# arp -s 192.1.2.254 10:00:00:64:64:45east:~# ipsec lookeast NOWipsec0->eth1 mtu=16260(1500)->1500Destination     Gateway         Genmask         Flags   MSS Window  irtt Ifaceeast:~# route add -host 192.0.1.1 gw 192.1.2.45 dev ipsec0east:~# ipsec ikeping --verbose --wait 2 --inet 192.0.1.1 192.0.1.1 192.0.1.1 19 2.0.1.1Sending packet to 192.0.1.1/500Sending packet to 192.0.1.1/500Sending packet to 192.0.1.1/500Sending packet to 192.0.1.1/500east:~# nbd: module cleaned up.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -