⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 west-console.txt

📁 This a good VPN source
💻 TXT
字号:
Starting UML PATH/start.shspawn PATH singletracing thread pid = XXXXXLinux version XXXXOn node 0 totalpages: 8192Kernel command line:Calibrating delay loop... XXXX bogomipsDentry-cache hash table entries: NUMBERSInode-cache hash table entries: NUMBERSMount-cache hash table entries: NUMBERSBuffer-cache hash table entries: NUMBERSPage-cache hash table entries: NUMEBRSPOSIX conformance testing by UNIFIXLinux NET4.0 for Linux 2.4Based upon Swansea University Computer Society NET3.039Initializing RT netlink socketStarting kswapdVFS: Diskquotas version dquot_6.4.0 initializeddevfs: VERSION Richard Gooch (rgooch@atnf.csiro.au)devfs: boot_options Qpty: 256 Unix98 ptys configuredSLIP: version 0.8.4-NET3.019-NEWTTY (dynamic channels, max=256).loop: loaded (max 8 devices)PPP generic driver version VERSIONUniversal TUN/TAP device driver VERSIONNET4: Linux TCP/IP 1.0 for NET4.0IP Protocols: ICMP, UDP, TCPIP: routing cache hash table of 512 buckets, 4KbytesTCP: Hash tables configured (established 2048 bind 2048)IPv4 over IPv4 tunneling driverGRE over IPv4 tunneling driverNET4: Unix domain sockets 1.0/SMP for Linux NET4.0.Mounted devfs on /devINIT: version 2.78 bootingActivating swap...Calculating module dependanciesdone.Loading modules: LISTChecking all file systems...Parallelizing fsck version 1.18 (11-Nov-1999)Setting kernel variables.Mounting local filesystems.../dev/shm on /tmp type tmpfs (rw)/dev/shm on /var/run type tmpfs (rw)devpts on /dev/pts type devpts (rw,mode=0622)none on /usr/share type hostfs (ro)Enabling packet forwarding: done.Configuring network interfaces: done.Cleaning: /tmp /var/lock /var/run.Initializing random number generator... done.Recovering nvi editor sessions... done.Give root password for maintenance(or type Control-D for normal startup): west:~# klogd -c 4 -x -f /tmp/klog.logwest:~# ifdown eth1west:~# ifconfig eth1 inet 192.1.2.45 netmask 255.255.255.224 upwest:~# route add -net default gw 192.1.2.62west:~# : try default routewest:~# ping -c 1 -n 192.1.2.62PING 192.1.2.62 (192.1.2.62): 56 data bytes64 bytes from 192.1.2.62: icmp_seq=0 ttl=257 time=999 ms--- 192.1.2.62 ping statistics ---1 packets transmitted, 1 packets received, 0% packet lossround-trip min/avg/max = 3.1/4.5/9.26 mswest:~# : try hitting east before doing IPsecwest:~# ping -c 1 -n 192.1.2.23PING 192.1.2.23 (192.1.2.23): 56 data bytes64 bytes from 192.1.2.23: icmp_seq=0 ttl=257 time=999 ms--- 192.1.2.23 ping statistics ---1 packets transmitted, 1 packets received, 0% packet lossround-trip min/avg/max = 3.1/4.5/9.26 mswest:~# ipsec setup startipsec_setup: Starting Openswan IPsec VERSIONwest:~# : check out if .23 has proper TXT record.west:~# dig 23.2.1.192.in-addr.arpa. txt; <<>> DiG VERSION <<>> 23.2.1.192.in-addr.arpa. txt;; global options:  printcmd;; Got answer:;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12345;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 1;; QUESTION SECTION:;23.2.1.192.in-addr.arpa.	IN	TXT;; ANSWER SECTION:23.2.1.192.in-addr.arpa. 604800	IN	TXT	"X-IPsec-Server(10)=192.1.2.23 " "AQN3cn11FrBVbZhWGwRnFDAf8O9FHBmBIyIvmvt0kfkI2UGDDq8k+vYgRkwBZDviLd1p3SkL30LzuV0rqG3vBriqaAUUGoCQ0UMgsuX+k01bROLsqGB1QNXYvYiPLsnoDhKd2Gx9MUMHEjwwEZeyskMT5k91jvoAZvdEkg+9h7urbJ+kRQ4e+IHkMUrreDGwGVptV/hYQVCD54RZep6xp5ymaKRCDgMpzWvlzO80fP7JDjSZf9LI/MMu6c+qwXI" "KnWoNha75IhFyLWniVczxK2RdhmMhLsi0kC0CoOwWDSIEOb+5zbECDjjud+SF5tT8qRCWnSomX8jtbCdZ50WraQlL";; AUTHORITY SECTION:2.1.192.in-addr.arpa.	604800	IN	NS	NSSERVER.uml.freeswan.org.2.1.192.in-addr.arpa.	604800	IN	NS	NSSERVER.uml.freeswan.org.;; ADDITIONAL SECTION:nic.uml.freeswan.org.	604800	IN	A	192.1.2.254;; Query time: 25 msec;; SERVER: 192.1.2.254#53(192.1.2.254);; WHEN: DATE;; MSG SIZE  rcvd: 499west:~# /testing/pluto/basic-pluto-01/whackwait.shwest:~# ipsec auto --add us-to-anyonewest:~# ipsec auto --route us-to-anyonewest:~# ipsec lookwest NOW192.0.1.0/24       -> 0.0.0.0/0          => %trap (0)ipsec0->eth1 mtu=16260(1500)->1500Destination     Gateway         Genmask         Flags   MSS Window  irtt Iface0.0.0.0         192.1.2.62      0.0.0.0         UG       40 0          0 eth10.0.0.0         192.1.2.62      128.0.0.0       U        40 0          0 ipsec0128.0.0.0       192.1.2.62      128.0.0.0       U        40 0          0 ipsec0192.1.2.32      0.0.0.0         255.255.255.224 U        40 0          0 eth1192.1.2.32      0.0.0.0         255.255.255.224 U        40 0          0 ipsec0west:~# ipsec auto --status000 interface ipsec0/eth1 192.1.2.45000  000 "us-to-anyone": 192.0.1.0/24===192.1.2.45---192.1.2.62...%opportunistic000 "us-to-anyone":   ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0000 "us-to-anyone":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC+lKOD+rKOD; interface: eth1; trap erouted000 "us-to-anyone":   newest ISAKMP SA: #0; newest IPsec SA: #0; eroute owner: #0000  000  west:~# echo endendwest:~# west:~#west:~# haltINIT: Switching to runlevel: 0INIT: Sending processes the TERM signalwest:~# kill `cat /var/run/klogd.pid`; cat /tmp/klog.logklogd 1.3-3#33.1, log source = /proc/kmsg started.west:~# haltwest:~# INIT: Sending processes the KILL signalStopping domain name service: named.Stopping internet superserver: inetd.Stopping portmap daemon: portmap.ipsec_setup: Stopping Openswan IPsec...IPSEC EVENT: KLIPS device ipsec0 shut down.Stopping system log daemon: klogd syslogd.Sending all processes the TERM signal... done.Sending all processes the KILL signal... done.Unmounting remote filesystems... done.Deactivating swap... done.Unmounting local filesystems... done.Power down.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -