📄 test-09-console.txt
字号:
Program invoked with PATH/start.sh test01.shStarting UML PATH/start.shspawn PATH singletracing thread pid = XXXXXLinux version XXXXOn node 0 totalpages: 8192Kernel command line:Calibrating delay loop... XXXX bogomipsMemory: 32244k availableDentry-cache hash table entries: 4096 (order: 3, 32768 bytes)Inode-cache hash table entries: 2048 (order: 2, 16384 bytes)Mount-cache hash table entries: 512 (order: 0, 4096 bytes)Buffer-cache hash table entries: 1024 (order: 0, 4096 bytes)Page-cache hash table entries: 8192 (order: 3, 32768 bytes)POSIX conformance testing by UNIFIXLinux NET4.0 for Linux 2.4Based upon Swansea University Computer Society NET3.039Initializing RT netlink socketStarting kswapdVFS: Diskquotas version dquot_6.4.0 initializeddevfs: VERSION Richard Gooch (rgooch@atnf.csiro.au)devfs: boot_options Qpty: 256 Unix98 ptys configuredblock: slots and queuesRAMDISK driver initialized: 16 RAM disks of 4096K size 1024 blocksizeNetdevice 0 : daemon backend- ethernet address = 10:0:0:dc:bc:ffNetdevice 1 : daemon backend- ethernet address = 10:0:0:64:64:23SLIP: version 0.8.4-NET3.019-NEWTTY (dynamic channels, max=256).loop: loaded (max 8 devices)PPP generic driver version 2.4.1Universal TUN/TAP device driver 1.4 (C)1999-2001 Maxim KrasnyanskyNET4: Linux TCP/IP 1.0 for NET4.0IP Protocols: ICMP, UDP, TCPIP: routing cache hash table of 512 buckets, 4KbytesTCP: Hash tables configured (established 2048 bind 2048)IPv4 over IPv4 tunneling driverGRE over IPv4 tunneling driverklips_info:ipsec_init: KLIPS startup, FreeS/WAN IPSec version: XXXXNET4: Unix domain sockets 1.0/SMP for Linux NET4.0.Mounted devfs on /devINIT: version 2.78 bootingActivating swap...Calculating module dependanciesdone.Loading modules: LISTChecking all file systems...Parallelizing fsck version 1.18 (11-Nov-1999)Setting kernel variables.Mounting local filesystems.../dev/ubd/1 on /usr/share type hostfs (ro,/usr/share)/dev/shm on /tmp type tmpfs (rw)/dev/shm on /var/run type tmpfs (rw)devpts on /dev/pts type devpts (rw,mode=0622)Enabling packet forwarding: done.Configuring network interfaces: done.Cleaning: /tmp /var/lock /var/run.Initializing random number generator... done.Recovering nvi editor sessions... done.Give root password for maintenance(or type Control-D for normal startup): east:~# east:~# ipsec spi --cleareast:~# ipsec eroute --cleareast:~# east:~# enckey=0x4043434545464649494a4a4c4c4f4f515152525454575758east:~# authkey=0x87658765876587658765876587658765east:~# lifetime="--life hard-packets=10"east:~# east:~# east:~# ipsec spi --af inet --edst 192.1.2.45 --spi 0x12345678 --proto esp --src 192.1.2.23 --esp 3des-md5-96 $lifetime --enckey $enckey --authkey $authkeyeast:~# east:~# ipsec spi --af inet --edst 192.1.2.45 --spi 0x12345678 --proto tun --src 192.1.2.23 --dst 192.1.2.45 --ip4east:~# east:~# ipsec spigrp inet 192.1.2.45 0x12345678 tun inet 192.1.2.45 0x12345678 e sp east:~# east:~# ipsec eroute --add --eraf inet --src 192.0.2.0/24 --dst 192.0.1.0/24 --s aid tun0x12345678@192.1.2.45east:~# east:~# ipsec tncfg --attach --virtual ipsec0 --physical eth1east:~# ifconfig ipsec0 inet 192.1.2.23 netmask 0xffffff00 broadcast 192.1.2.255 upeast:~# east:~# arp -s 192.1.2.45 10:00:00:64:64:45east:~# arp -s 192.1.2.254 10:00:00:64:64:45east:~# east:~# ipsec lookeast NOW192.0.2.0/24 -> 192.0.1.0/24 => tun0x12345678@192.1.2.45 esp0x12345678@192.1.2.45 (0)ipsec0->eth1 mtu=16260(1500)->1500esp0x12345678@192.1.2.45 ESP_3DES_HMAC_MD5: dir=out src=192.1.2.23 iv_bits=64bits iv=0xABCDABCDABCDABCD alen=128 aklen=128 eklen=192 life(c,s,h)=tun0x12345678@192.1.2.45 IPIP: dir=out src=192.1.2.23 life(c,s,h)=Destination Gateway Genmask Flags MSS Window irtt Ifaceeast:~# east:~# route add -host 192.0.1.1 gw 192.1.2.45 dev ipsec0east:~# east:~# ipsec pf_keypfkey v2 msg. type=7 seq=1 len=5 pid=132 errno=0 satype=2pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=7(register), errno=0, satype=2(AH), len=5, res=0, seq=1, pid=987.pfkey_lib_debug:pfkey_msg_parse: remain=3, ext_type=14(supported-auth), ext_len=3.pfkey_lib_debug:pfkey_msg_parse: extensions permitted=0000c001, required=00000001.pfkey_lib_debug:pfkey_msg_parse: parsing ext type=14 remain=3.pfkey_lib_debug:pfkey_msg_parse: About to parse extension 14 0xABCDABCD with parser pfkey_supported_parse.pfkey_lib_debug:pfkey_msg_parse: Extension 14 parsed.pfkey_lib_debug:pfkey_msg_parse: extensions permitted=0000c001, seen=00004001, required=00000001.pf_key: parseable PF_KEY message.pfkey v2 msg. type=7 seq=2 len=7 pid=132 errno=0 satype=3pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=7(register), errno=0, satype=3(ESP), len=7, res=0, seq=2, pid=987.pfkey_lib_debug:pfkey_msg_parse: remain=5, ext_type=14(supported-auth), ext_len=3.pfkey_lib_debug:pfkey_msg_parse: extensions permitted=0000c001, required=00000001.pfkey_lib_debug:pfkey_msg_parse: parsing ext type=14 remain=5.pfkey_lib_debug:pfkey_msg_parse: About to parse extension 14 0xABCDABCD with parser pfkey_supported_parse.pfkey_lib_debug:pfkey_msg_parse: Extension 14 parsed.pfkey_lib_debug:pfkey_msg_parse: parsing ext type=15 remain=2.pfkey_lib_debug:pfkey_msg_parse: About to parse extension 15 0xABCDABCD with parser pfkey_supported_parse.pfkey_lib_debug:pfkey_msg_parse: Extension 15 parsed.pfkey_lib_debug:pfkey_msg_parse: extensions permitted=0000c001, seen=0000c001, required=00000001.pf_key: parseable PF_KEY message.pfkey v2 msg. type=7 seq=3 len=4 pid=132 errno=0 satype=9pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=7(register), errno=0, satype=9(IPIP), len=4, res=0, seq=3, pid=987.pfkey_lib_debug:pfkey_msg_parse: remain=2, ext_type=15(supported-cipher), ext_len=2.pfkey_lib_debug:pfkey_msg_parse: extensions permitted=0000c001, required=00000001.pfkey_lib_debug:pfkey_msg_parse: parsing ext type=15 remain=2.pfkey_lib_debug:pfkey_msg_parse: About to parse extension 15 0xABCDABCD with parser pfkey_supported_parse.pfkey_lib_debug:pfkey_msg_parse: Extension 15 parsed.pfkey_lib_debug:pfkey_msg_parse: extensions permitted=0000c001, seen=00008001, required=00000001.pf_key: parseable PF_KEY message.pfkey v2 msg. type=7 seq=4 len=4 pid=132 errno=0 satype=10pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=7(register), errno=0, satype=10(COMP), len=4, res=0, seq=4, pid=987.pfkey_lib_debug:pfkey_msg_parse: remain=2, ext_type=15(supported-cipher), ext_len=2.pfkey_lib_debug:pfkey_msg_parse: extensions permitted=0000c001, required=00000001.pfkey_lib_debug:pfkey_msg_parse: parsing ext type=15 remain=2.pfkey_lib_debug:pfkey_msg_parse: About to parse extension 15 0xABCDABCD with parser pfkey_supported_parse.pfkey_lib_debug:pfkey_msg_parse: Extension 15 parsed.pfkey_lib_debug:pfkey_msg_parse: extensions permitted=0000c001, seen=00008001, required=00000001.pf_key: parseable PF_KEY message.nbd: module cleaned up.
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -