⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 west-console.txt

📁 This a good VPN source
💻 TXT
字号:
Starting UML PATH/start.shspawn PATH singleLinux version XXXXOn node 0 totalpages: 8192Kernel command line:Calibrating delay loop... XXXX bogomipsDentry-cache hash table entries: NUMBERSInode-cache hash table entries: NUMBERSMount-cache hash table entries: NUMBERSBuffer-cache hash table entries: NUMBERSPage-cache hash table entries: NUMEBRSPOSIX conformance testing by UNIFIXLinux NET4.0 for Linux 2.4Based upon Swansea University Computer Society NET3.039Initializing RT netlink socketStarting kswapdVFS: Diskquotas version dquot_6.4.0 initializeddevfs: VERSION Richard Gooch (rgooch@atnf.csiro.au)devfs: boot_options Qpty: 256 Unix98 ptys configuredSLIP: version 0.8.4-NET3.019-NEWTTY (dynamic channels, max=256).loop: loaded (max 8 devices)PPP generic driver version VERSIONUniversal TUN/TAP device driver VERSIONNET4: Linux TCP/IP 1.0 for NET4.0IP Protocols: ICMP, UDP, TCPIP: routing cache hash table of 512 buckets, 4KbytesTCP: Hash tables configured (established 2048 bind 2048)IPv4 over IPv4 tunneling driverGRE over IPv4 tunneling driverNET4: Unix domain sockets 1.0/SMP for Linux NET4.0.Mounted devfs on /devINIT: version 2.78 bootingActivating swap...Calculating module dependanciesdone.Loading modules: LISTChecking all file systems...Parallelizing fsck version 1.18 (11-Nov-1999)Setting kernel variables.Mounting local filesystems.../dev/shm on /tmp type tmpfs (rw)/dev/shm on /var/run type tmpfs (rw)devpts on /dev/pts type devpts (rw,mode=0622)none on /usr/share type hostfs (ro)Enabling packet forwarding: done.Configuring network interfaces: done.Cleaning: /tmp /var/lock /var/run.Initializing random number generator... done.Recovering nvi editor sessions... done.Give root password for maintenance(or type Control-D for normal startup): west:~# klogd -c 4 -x -f /tmp/klog.logwest:~# export PLUTO_CRYPTO_HELPER_DEBUG=true west:~# TESTNAME=helper-queue-01west:~# source /testing/pluto/bin/westlocal.shwest:~# ipsec setup startipsec_setup: Starting Openswan IPsec VERSIONwest:~# ipsec auto --add westnet-eastnet-aggrwest:~# ipsec auto --add westnet-bogus01west:~# ipsec auto --add westnet-bogus02west:~# ipsec auto --add westnet-bogus03west:~# ipsec auto --add westnet-bogus04west:~# ipsec auto --add westnet-bogus05west:~# ipsec auto --add westnet-bogus06west:~# ipsec auto --add westnet-bogus07west:~# ipsec auto --add westnet-bogus08west:~# ipsec auto --add westnet-bogus09west:~# ipsec auto --add westnet-bogus10west:~# /testing/pluto/bin/wait-until-pluto-startedwest:~# ipsec whack --name westnet-bogus01 --initiate >/dev/null &[1] 409west:~# ipsec whack --name westnet-bogus02 --initiate >/dev/null &[2] 410west:~# ipsec whack --name westnet-bogus03 --initiate >/dev/null &[3] 411west:~# ipsec whack --name westnet-bogus04 --initiate >/dev/null &[4] 412west:~# ipsec whack --name westnet-bogus05 --initiate >/dev/null &[5] 413west:~# ipsec whack --name westnet-bogus06 --initiate >/dev/null &[6] 414west:~# ipsec whack --name westnet-bogus07 --initiate >/dev/null &[7] 415west:~# ipsec whack --name westnet-bogus08 --initiate >/dev/null &[8] 416west:~# ipsec whack --name westnet-bogus09 --initiate >/dev/null &[9] 417west:~# ipsec whack --name westnet-bogus10 --initiate >/dev/null &[10] 418west:~# ipsec whack --name westnet-eastnet-aggr --initiate 002 "westnet-eastnet-aggr" #11: initiating Aggressive Mode #11, connection "westnet-eastnet-aggr"112 "westnet-eastnet-aggr" #11: STATE_AGGR_I1: initiate002 "westnet-eastnet-aggr" #11: Aggressive mode peer ID is ID_FQDN: '@east'002 "westnet-eastnet-aggr" #11: Aggressive mode peer ID is ID_FQDN: '@east'002 "westnet-eastnet-aggr" #11: transition from state STATE_AGGR_I1 to state STATE_AGGR_I2002 "westnet-eastnet-aggr" #11: sent AI2, ISAKMP SA established004 "westnet-eastnet-aggr" #11: STATE_AGGR_I2: sent AI2, ISAKMP SA established002 "westnet-eastnet-aggr" #12: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP+AGGRESSIVEwest:~# echo done westinit.sh done westinit.shwest:~# west:~# ipsec lookwest NOWipsec0->eth1 mtu=16260(9999)->1500Destination     Gateway         Genmask         Flags   MSS Window  irtt Iface0.0.0.0         192.1.2.254     0.0.0.0         UG       99 0          0 eth1192.0.2.0       192.1.2.23      255.255.255.0   UG       99 0          0 eth1192.1.2.0       0.0.0.0         255.255.255.0   U        99 0          0 eth1192.1.2.0       0.0.0.0         255.255.255.0   U        99 0          0 ipsec0west:~#west:~# ipsec setup stopIPSEC EVENT: KLIPS device ipsec0 shut down.ipsec_setup: Stopping Openswan IPsec...[1]   Exit 10                 ipsec whack --name westnet-bogus01 --initiate >/dev/null[2]   Exit 10                 ipsec whack --name westnet-bogus02 --initiate >/dev/null[3]   Exit 10                 ipsec whack --name westnet-bogus03 --initiate >/dev/null[4]   Exit 10                 ipsec whack --name westnet-bogus04 --initiate >/dev/null[5]   Exit 10                 ipsec whack --name westnet-bogus05 --initiate >/dev/null[6]   Exit 10                 ipsec whack --name westnet-bogus06 --initiate >/dev/null[7]   Exit 10                 ipsec whack --name westnet-bogus07 --initiate >/dev/null[8]   Exit 10                 ipsec whack --name westnet-bogus08 --initiate >/dev/null[9]-  Exit 10                 ipsec whack --name westnet-bogus09 --initiate >/dev/null[10]+  Exit 10                 ipsec whack --name westnet-bogus10 --initiate >/dev/nullwest:~# kill `cat /var/run/klogd.pid`; cat /tmp/klog.logklogd 1.3-3#33.1, log source = /proc/kmsg started.west:~# halt -p -fPower down.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -