⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 east-console.txt

📁 This a good VPN source
💻 TXT
字号:
Starting UML PATH/start.shspawn PATH singleLinux version XXXXOn node 0 totalpages: 8192Kernel command line:Calibrating delay loop... XXXX bogomipsDentry-cache hash table entries: NUMBERSInode-cache hash table entries: NUMBERSMount-cache hash table entries: NUMBERSBuffer-cache hash table entries: NUMBERSPage-cache hash table entries: NUMEBRSPOSIX conformance testing by UNIFIXLinux NET4.0 for Linux 2.4Based upon Swansea University Computer Society NET3.039Initializing RT netlink socketStarting kswapdVFS: Diskquotas version dquot_6.4.0 initializeddevfs: VERSION Richard Gooch (rgooch@atnf.csiro.au)devfs: boot_options Qpty: 256 Unix98 ptys configuredSLIP: version 0.8.4-NET3.019-NEWTTY (dynamic channels, max=256).loop: loaded (max 8 devices)PPP generic driver version VERSIONUniversal TUN/TAP device driver VERSIONNET4: Linux TCP/IP 1.0 for NET4.0IP Protocols: ICMP, UDP, TCPIP: routing cache hash table of 512 buckets, 4KbytesTCP: Hash tables configured (established 2048 bind 2048)IPv4 over IPv4 tunneling driverGRE over IPv4 tunneling driverNET4: Unix domain sockets 1.0/SMP for Linux NET4.0.Mounted devfs on /devINIT: version 2.78 bootingActivating swap...Calculating module dependanciesdone.Loading modules: LISTChecking all file systems...Parallelizing fsck version 1.18 (11-Nov-1999)Setting kernel variables.Mounting local filesystems.../dev/shm on /tmp type tmpfs (rw)/dev/shm on /var/run type tmpfs (rw)devpts on /dev/pts type devpts (rw,mode=0622)none on /usr/share type hostfs (ro)Enabling packet forwarding: done.Configuring network interfaces: done.Cleaning: /tmp /var/lock /var/run.Initializing random number generator... done.Recovering nvi editor sessions... done.Give root password for maintenance(or type Control-D for normal startup): east:~# klogd -c 4 -x -f /tmp/klog.logeast:~# route delete -net 192.0.1.0 netmask 255.255.255.0east:~# route delete -net defaulteast:~# route add -net default gw 192.1.2.45east:~# namedeast:~# dig sunrise-oe.uml.freeswan.org a; <<>> DiG VERSION<<>> sunrise-oe.uml.freeswan.org a;; global options:  printcmd;; Got answer:;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12345;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0;; QUESTION SECTION:;sunrise-oe.uml.freeswan.org.	IN	A;; ANSWER SECTION:sunrise-oe.uml.freeswan.org. 604800 IN	A	192.0.2.2;; Query time: 25 msec;; SERVER: 127.0.0.1#53(127.0.0.1);; WHEN: DATE;; MSG SIZE  rcvd: SIZEeast:~# netstat -rneKernel IP routing tableDestination     Gateway         Genmask         Flags Metric Ref    Use Iface192.9.2.0       0.0.0.0         255.255.255.0   U     0      0        0 eth2192.1.2.0       0.0.0.0         255.255.255.0   U     0      0        0 eth1192.0.2.0       0.0.0.0         255.255.255.0   U     0      0        0 eth00.0.0.0         192.1.2.45      0.0.0.0         UG    0      0        0 eth1east:~# ipsec setup startipsec_setup: Starting Openswan IPsec VERSIONeast:~# /testing/pluto/bin/wait-until-pluto-startedeast:~# ipsec auto --add privateeast:~# ipsec whack --listen002 listening for IKE messages002 forgetting secrets002 loading secrets from "/etc/ipsec.secrets"002 loading group "/etc/ipsec.d/policies/private"east:~# ipsec auto --route privateeast:~#east:~# dig 3.1.0.192.in-addr.arpa. txt; <<>> DiG VERSION<<>> 3.1.0.192.in-addr.arpa. txt;; global options:  printcmd;; Got answer:;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12345;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0;; QUESTION SECTION:;3.1.0.192.in-addr.arpa.		IN	TXT;; ANSWER SECTION:3.1.0.192.in-addr.arpa.	604800	IN	TXT	"X-IPsec-Server(10)=192.1.2.45" " AQNzGEFs18VKT00sA+4p+GUKn9C55PYuPQca6C+9Qhj0jfMdQnTRTDLeI+lp9TnidHH7fVpq+PkfiF2LHlZtDwMurLlwzbNOghlEYKfQ080WlOTTUAmOLhAzH28MF70q3hzq0m5fCaVZWtxcV+LfHWdxceCkjBUSaTFtR2W12urFCBz+SB3+OM33aeIbfHxmck2yzhJ8xyMods5kF3ek/RZlFvgN8VqBdcFVrZwTh0mXDCGN12HNFixL6FzQ1j" "QKerKBbjb0m/IPqugvpVPWVIUajUpLMEmi1FAXc1mFZE9x1SFuSr0NzYIu2ZaHfvsAZY5oN+I+R2oC67fUCjgxY+t7";; Query time: 25 msec;; SERVER: 127.0.0.1#53(127.0.0.1);; WHEN: DATE;; MSG SIZE  rcvd: SIZEeast:~# : we expect that east can ping westeast:~# ping -c 1 -n 192.1.2.45PING 192.1.2.45 (192.1.2.45): 56 data bytes64 bytes from 192.1.2.45: icmp_seq=0 ttl=257 time=999 ms--- 192.1.2.45 ping statistics ---1 packets transmitted, 1 packets received, 0% packet lossround-trip min/avg/max = 3.1/4.5/9.26 mseast:~# : we expect that this will result in a %drop, as 1.1 is not OE enabled.east:~# ping -c 8 -n 192.0.1.1PING 192.0.1.1 (192.0.1.1): 56 data bytes--- 192.0.1.1 ping statistics ---8 packets transmitted, 0 packets received, 100% packet losseast:~# ipsec eroute0          0.0.0.0/0          -> 0.0.0.0/0          => %trap1          192.1.2.23/32      -> 192.0.1.0/24       => %trap8          192.1.2.23/32      -> 192.0.1.1/32       => %dropeast:~# : we expect that this will result in a tunnel, as 1.3 is OE enabled.east:~# ping -c 8 -n 192.0.1.3PING 192.0.1.3 (192.0.1.3): 56 data bytes64 bytes from 192.0.1.3: icmp_seq=0 ttl=257 time=999 ms64 bytes from 192.0.1.3: icmp_seq=1 ttl=257 time=999 ms64 bytes from 192.0.1.3: icmp_seq=2 ttl=257 time=999 ms64 bytes from 192.0.1.3: icmp_seq=3 ttl=257 time=999 ms64 bytes from 192.0.1.3: icmp_seq=4 ttl=257 time=999 ms64 bytes from 192.0.1.3: icmp_seq=5 ttl=257 time=999 ms64 bytes from 192.0.1.3: icmp_seq=6 ttl=257 time=999 ms64 bytes from 192.0.1.3: icmp_seq=7 ttl=257 time=999 ms--- 192.0.1.3 ping statistics ---8 packets transmitted, 8 packets received, 0% packet lossround-trip min/avg/max = 3.1/4.5/9.26 mseast:~# ipsec eroute8          0.0.0.0/0          -> 0.0.0.0/0          => %trap2          192.1.2.23/32      -> 192.0.1.0/24       => %trap8          192.1.2.23/32      -> 192.0.1.1/32       => %drop8          192.1.2.23/32      -> 192.0.1.3/32       => tun0x1002@192.1.2.45east:~# : the nether world according to plutoeast:~#east:~# : we expect that the resulting tunnel will not affect communicationeast:~# : to hosts which are not OE enabled.east:~# ping -c 8 -n 192.0.1.1PING 192.0.1.1 (192.0.1.1): 56 data bytes--- 192.0.1.1 ping statistics ---8 packets transmitted, 0 packets received, 100% packet losseast:~# : we further expect that we can continue to communicate with the outsideeast:~# : interface of west.east:~# ping -c 1 -n 192.1.2.45PING 192.1.2.45 (192.1.2.45): 56 data bytes64 bytes from 192.1.2.45: icmp_seq=0 ttl=257 time=999 ms--- 192.1.2.45 ping statistics ---1 packets transmitted, 1 packets received, 0% packet lossround-trip min/avg/max = 3.1/4.5/9.26 mseast:~# ipsec eroute8          0.0.0.0/0          -> 0.0.0.0/0          => %trap2          192.1.2.23/32      -> 192.0.1.0/24       => %trap16         192.1.2.23/32      -> 192.0.1.1/32       => %drop8          192.1.2.23/32      -> 192.0.1.3/32       => tun0x1002@192.1.2.45east:~# echo endendeast:~# east:~#east:~# ipsec setup stopIPSEC EVENT: KLIPS device ipsec0 shut down.ipsec_setup: Stopping Openswan IPsec...east:~# kill `cat /var/run/klogd.pid`; cat /tmp/klog.logklogd 1.3-3#33.1, log source = /proc/kmsg started.east:~# halt -p -fPower down.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -