📄 spi1-console.txt
字号:
Program invoked with PATH/start.sh spi1-in.shStarting UML PATH/start.shspawn PATH singletracing thread pid = XXXXXLinux version XXXXOn node 0 totalpages: 8192zone(0): 0 pages.zone(1): 8192 pages.zone(2): 0 pages.Kernel command line:Calibrating delay loop... XXXX bogomipsMemory: 32244k availableDentry-cache hash table entries: 4096 (order: 3, 32768 bytes)Inode-cache hash table entries: 2048 (order: 2, 16384 bytes)Mount-cache hash table entries: 512 (order: 0, 4096 bytes)Buffer-cache hash table entries: 1024 (order: 0, 4096 bytes)Page-cache hash table entries: 8192 (order: 3, 32768 bytes)POSIX conformance testing by UNIFIXLinux NET4.0 for Linux 2.4Based upon Swansea University Computer Society NET3.039Initializing RT netlink socketStarting kswapdVFS: Diskquotas version dquot_6.4.0 initializeddevfs: VERSION Richard Gooch (rgooch@atnf.csiro.au)devfs: boot_options Qpty: 256 Unix98 ptys configuredblock: slots and queuesRAMDISK driver initialized: 16 RAM disks of 4096K size 1024 blocksizeNetdevice 0 : daemon backend- ethernet address = 10:0:0:ab:cd:ffNetdevice 1 : daemon backend- ethernet address = 10:0:0:64:64:45SLIP: version 0.8.4-NET3.019-NEWTTY (dynamic channels, max=256).loop: loaded (max 8 devices)PPP generic driver version 2.4.1Universal TUN/TAP device driver 1.4 (C)1999-2001 Maxim KrasnyanskyNET4: Linux TCP/IP 1.0 for NET4.0IP Protocols: ICMP, UDP, TCPIP: routing cache hash table of 512 buckets, 4KbytesTCP: Hash tables configured (established 2048 bind 2048)IPv4 over IPv4 tunneling driverGRE over IPv4 tunneling driverklips_info:ipsec_init: KLIPS startup, FreeS/WAN IPSec version: XXXXNET4: Unix domain sockets 1.0/SMP for Linux NET4.0.Initializing stdio console driverInitializing software serial port version 1mconsole initialized on PATHMounted devfs on /devINIT: version 2.78 bootingActivating swap...Calculating module dependanciesdone.Loading modules: LISTChecking all file systems...Parallelizing fsck version 1.18 (11-Nov-1999)Setting kernel variables.Mounting local filesystems.../dev/ubd/1 on /usr/share type hostfs (ro,/usr/share)/dev/shm on /tmp type tmpfs (rw)/dev/shm on /var/run type tmpfs (rw)devpts on /dev/pts type devpts (rw,mode=0622)Enabling packet forwarding: done.Configuring network interfaces: done.Cleaning: /tmp /var/lock /var/run.Initializing random number generator... done.Recovering nvi editor sessions... done.Give root password for maintenance(or type Control-D for normal startup): west:~# TZ=GMT export TZwest:~# ipsec spi --clearwest:~# ipsec eroute --clearwest:~# enckey=0x4043434545464649494a4a4c4c4f4f515152525454575758west:~# ipsec klipsdebug --set pfkeyklips_debug:pfkey_x_debug_process: setklips_debug:pfkey_msg_interp: parsing message type 16 with msg_parser ABCDABCDklips_debug:pfkey_x_msg_debug_parse: .klips_debug:pfkey_release: sock=ABCDABCD sk=ABCDABCDklips_debug:pfkey_destroy_socket: STUFFklips_debug:pfkey_remove_socket: .klips_debug:pfkey_remove_socket: succeeded.klips_debug:pfkey_destroy_socket: STUFFklips_debug:pfkey_destroy_socket: STUFFklips_debug:pfkey_destroy_socket: STUFFklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_release: succeeded.west:~# ipsec klipsdebug --set verboseklips_debug:pfkey_create: sock=ABCDABCD type:3 state:1 flags:0 protocol:2klips_debug:pfkey_create: sock->fasync_list=00000000 sk->sleep=ABCDABCDklips_debug:pfkey_insert_socket: sk=ABCDABCDklips_debug:pfkey_list_insert_socket: socketp=ABCDABCDklips_debug:pfkey_create: Socket sock=ABCDABCD sk=ABCDABCD initialised.klips_debug:pfkey_sendmsg: .klips_debug:pfkey_sendmsg: msg sent for parsing.klips_debug:pfkey_msg_interp: parsing message ver=2, type=16, errno=0, satype=0(UNKNOWN), len=9, res=0, seq=1, pid=987.klips_debug:pfkey_alloc_ipsec_sa: allocated tdb struct=ABDCABCDklips_debug:pfkey_msg_interp: allocated extr->tdb=ABCDABCDklips_debug:pfkey_msg_interp: processing ext 25 ABCDABCD with processor ABCDABCDklips_debug:pfkey_x_debug_process: .klips_debug:pfkey_x_debug_process: setklips_debug:pfkey_msg_interp: parsing message type 16 with msg_parser ABCDABCDklips_debug:pfkey_x_msg_debug_parse: .klips_debug:pfkey_release: sock=ABCDABCD sk=ABCDABCDklips_debug:pfkey_destroy_socket: STUFFklips_debug:pfkey_remove_socket: .klips_debug:pfkey_remove_socket: succeeded.klips_debug:pfkey_destroy_socket: STUFFklips_debug:pfkey_destroy_socket: STUFFklips_debug:pfkey_destroy_socket: STUFFklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_list_remove_socket: removing sock=ABCDABCDklips_debug:pfkey_release: succeeded.west:~# ipsec spi --af inet --edst 192.1.2.45 --spi 0x12345678 --proto esp --src 192.1.2.23 --esp 3des-md5-96 --enckey $enckey --authkey 0x876587658765876587658 76587658765klips_debug:pfkey_create: sock=ABCDABCD type:3 state:1 flags:0 protocol:2klips_debug:pfkey_create: sock->fasync_list=00000000 sk->sleep=ABCDABCDklips_debug:pfkey_insert_socket: sk=ABCDABCDklips_debug:pfkey_list_insert_socket: socketp=ABCDABCDklips_debug:pfkey_create: Socket sock=ABCDABCD sk=ABCDABCD initialised.klips_debug:pfkey_sendmsg: .klips_debug:pfkey_sendmsg: msg sent for parsing.klips_debug:pfkey_msg_interp: parsing message ver=2, type=3, errno=0, satype=3(ESP), len=17, res=0, seq=1, pid=987.klips_debug:pfkey_alloc_ipsec_sa: allocated tdb struct=ABDCABCDklips_debug:pfkey_msg_interp: allocated extr->tdb=ABCDABCDklips_debug:pfkey_msg_interp: satype 3 lookups to proto=50.klips_debug:pfkey_msg_interp: processing ext 1 ABCDABCD with processor ABCDABCDklips_debug:pfkey_sa_process: .klips_debug:pfkey_msg_interp: processing ext 5 ABCDABCD with processor ABCDABCDklips_debug:pfkey_address_process:klips_debug:pfkey_address_process: found address family=2, AF_INET, 192.1.2.23.klips_debug:pfkey_address_process: found src address.klips_debug:pfkey_address_process: successful.klips_debug:pfkey_msg_interp: processing ext 6 ABCDABCD with processor ABCDABCDklips_debug:pfkey_address_process:klips_debug:pfkey_address_process: found address family=2, AF_INET, 192.1.2.45.klips_debug:pfkey_address_process: found dst address.klips_debug:pfkey_address_process: tdb_said.dst set to 192.1.2.45.klips_debug:pfkey_address_process: successful.klips_debug:pfkey_msg_interp: processing ext 8 ABCDABCD with processor ABCDABCDklips_debug:pfkey_key_process: .klips_debug:pfkey_key_process: success.klips_debug:pfkey_msg_interp: processing ext 9 ABCDABCD with processor ABCDABCDklips_debug:pfkey_key_process: .klips_debug:pfkey_key_process: success.klips_debug:pfkey_msg_interp: parsing message type 3 with msg_parser ABCDABCDklips_debug:pfkey_add_parse: .klips_debug:pfkey_add_parse: existing Tunnel Descriptor Block not found (this is good) for SAesp0x12345678@192.1.2.45, in-bound, allocating.klips_debug:pfkey_ipsec_sa_init: (pfkey defined) called for SA:esp0x12345678@192.1.2.45klips_debug:pfkey_ipsec_sa_init: calling init routine of ESP_3DES_HMAC_MD5klips_debug:pfkey_msg_hdr_build:klips_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=ABCDABCD pfkey_ext=ABCDABCD *pfkey_ext=ABCDABCDklips_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=ABCDABCD pfkey_ext=ABCDABCD *pfkey_ext=ABCDABCDklips_debug:pfkey_safe_build: error=0klips_debug:pfkey_safe_build:success.klips_debug:pfkey_sa_build: spi=12345678 replay=0 sa_state=1 auth=2 encrypt=3 flags=1klips_debug:pfkey_safe_build: error=0klips_debug:pfkey_safe_build:success.klips_debug:pfkey_address_build: exttype=5 proto=0 prefixlen=0klips_debug:pfkey_address_build: found address family AF_INET.klips_debug:pfkey_address_build: found address=192.1.2.23:0.klips_debug:pfkey_address_build: successful.klips_debug:pfkey_safe_build: error=0klips_debug:pfkey_safe_build:success.
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -