⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 west-console.txt

📁 This a good VPN source
💻 TXT
字号:
Starting UML PATH/start.shspawn PATH singleLinux version XXXXOn node 0 totalpages: 8192Kernel command line:Calibrating delay loop... XXXX bogomipsDentry-cache hash table entries: NUMBERSInode-cache hash table entries: NUMBERSMount-cache hash table entries: NUMBERSBuffer-cache hash table entries: NUMBERSPage-cache hash table entries: NUMEBRSPOSIX conformance testing by UNIFIXLinux NET4.0 for Linux 2.4Based upon Swansea University Computer Society NET3.039Initializing RT netlink socketStarting kswapdVFS: Diskquotas version dquot_6.4.0 initializeddevfs: VERSION Richard Gooch (rgooch@atnf.csiro.au)devfs: boot_options Qpty: 256 Unix98 ptys configuredSLIP: version 0.8.4-NET3.019-NEWTTY (dynamic channels, max=256).loop: loaded (max 8 devices)PPP generic driver version VERSIONUniversal TUN/TAP device driver VERSIONNET4: Linux TCP/IP 1.0 for NET4.0IP Protocols: ICMP, UDP, TCPIP: routing cache hash table of 512 buckets, 4KbytesTCP: Hash tables configured (established 2048 bind 2048)IPv4 over IPv4 tunneling driverGRE over IPv4 tunneling driverNET4: Unix domain sockets 1.0/SMP for Linux NET4.0.Mounted devfs on /devINIT: version 2.78 bootingActivating swap...Calculating module dependanciesdone.Loading modules: LISTChecking all file systems...Parallelizing fsck version 1.18 (11-Nov-1999)Setting kernel variables.Mounting local filesystems.../dev/shm on /tmp type tmpfs (rw)/dev/shm on /var/run type tmpfs (rw)devpts on /dev/pts type devpts (rw,mode=0622)none on /usr/share type hostfs (ro)Enabling packet forwarding: done.Configuring network interfaces: done.Cleaning: /tmp /var/lock /var/run.Initializing random number generator... done.Recovering nvi editor sessions... done.Give root password for maintenance(or type Control-D for normal startup): west:~# klogd -c 4 -x -f /tmp/klog.logwest:~# ipsec setup startipsec_setup: Starting Openswan IPsec VERSIONwest:~# /testing/pluto/bin/wait-until-policy-loadedwest:~# ipsec whack --label "\"west-east\" leftrsasigkey"  --keyid "@west" --pubkeyrsa "0sAQNzGEFs18VKT00sA+4p+GUKn9C55PYuPQca6C+9Qhj0jfMdQnTRTDLeI+lp9TnidHH7fVpq+PkfiF2LHlZtDwMurLlwzbNOghlEYKfQ080WlOTTUAmOLhAzH28MF70q3hzq0m5fCaVZWtxcV+LfHWdxceCkjBUSaTFtR2W12urFCBz+SB3+OM33aeIbfHxmck2yzhJ8xyMods5kF3ek/RZlFvgN8VqBdcFVrZwTh0mXDCGN12HNFixL6FzQ1jQKerKBbjb0m/IPqugvpVPWVIUajUpLMEmi1FAXc1mFZE9x1SFuSr0NzYIu2ZaHfvsAZY5oN+I+R2oC67fUCjgxY+t7"west:~# ipsec whack --label "\"west-east\" rightrsasigkey"  --keyid "@east" --pubkeyrsa "0sAQN3cn11FrBVbZhWGwRnFDAf8O9FHBmBIyIvmvt0kfkI2UGDDq8k+vYgRkwBZDviLd1p3SkL30LzuV0rqG3vBriqaAUUGoCQ0UMgsuX+k01bROLsqGB1QNXYvYiPLsnoDhKd2Gx9MUMHEjwwEZeyskMT5k91jvoAZvdEkg+9h7urbJ+kRQ4e+IHkMUrreDGwGVptV/hYQVCD54RZep6xp5ymaKRCDgMpzWvlzO80fP7JDjSZf9LI/MMu6c+qwXIKnWoNha75IhFyLWniVczxK2RdhmMhLsi0kC0CoOwWDSIEOb+5zbECDjjud+SF5tT8qRCWnSomX8jtbCdZ50WraQlL"west:~# ipsec whack --name west-east --encrypt --tunnel --pfs --authenticate --rsasig --host "192.1.2.45"  --nexthop "192.1.2.23" --updown "ipsec _updown" --id "@west" --to --host "192.1.2.23"  --nexthop "192.1.2.45" --updown "ipsec _updown" --id "@east" --ipseclifetime "28800" --keyingtries "3"002 added connection description "west-east"west:~# echo end westinit.shend westinit.shwest:~# ping -q -c 8 -n 192.1.2.23PING 192.1.2.23 (192.1.2.23): 56 data bytes--- 192.1.2.23 ping statistics ---8 packets transmitted, 8 packets received, 0% packet lossround-trip min/avg/max = 3.1/4.5/9.26 mswest:~# ipsec auto --up west-east104 "west-east" #1: STATE_MAIN_I1: initiate106 "west-east" #1: STATE_MAIN_I2: sent MI2, expecting MR2108 "west-east" #1: STATE_MAIN_I3: sent MI3, expecting MR3004 "west-east" #1: STATE_MAIN_I4: ISAKMP SA established117 "west-east" #2: STATE_QUICK_I1: initiate004 "west-east" #2: STATE_QUICK_I2: sent QI2, IPsec SA establishedwest:~# ping -c 8 -n 192.1.2.23PING 192.1.2.23 (192.1.2.23): 56 data bytes64 bytes from 192.1.2.23: icmp_seq=0 ttl=257 time=999 ms64 bytes from 192.1.2.23: icmp_seq=1 ttl=257 time=999 ms64 bytes from 192.1.2.23: icmp_seq=2 ttl=257 time=999 ms64 bytes from 192.1.2.23: icmp_seq=3 ttl=257 time=999 ms64 bytes from 192.1.2.23: icmp_seq=4 ttl=257 time=999 ms64 bytes from 192.1.2.23: icmp_seq=5 ttl=257 time=999 ms64 bytes from 192.1.2.23: icmp_seq=6 ttl=257 time=999 ms64 bytes from 192.1.2.23: icmp_seq=7 ttl=257 time=999 ms--- 192.1.2.23 ping statistics ---8 packets transmitted, 8 packets received, 0% packet lossround-trip min/avg/max = 3.1/4.5/9.26 mswest:~# echo donedonewest:~# echo end westrun.shend westrun.shwest:~# west:~# echo end westfinal.shend westfinal.shwest:~# ipsec setup stopIPSEC EVENT: KLIPS device ipsec0 shut down.ipsec_setup: Stopping Openswan IPsec...west:~# kill `cat /var/run/klogd.pid`; cat /tmp/klog.logklogd 1.3-3#33.1, log source = /proc/kmsg started.west:~# halt -p -fPower down.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -