📄 spi1-console.txt
字号:
Starting UML PATH/start.shspawn PATH singleLinux version XXXXOn node 0 totalpages: 8192Kernel command line:Calibrating delay loop... XXXX bogomipsDentry-cache hash table entries: NUMBERSInode-cache hash table entries: NUMBERSMount-cache hash table entries: NUMBERSBuffer-cache hash table entries: NUMBERSPage-cache hash table entries: NUMEBRSPOSIX conformance testing by UNIFIXLinux NET4.0 for Linux 2.4Based upon Swansea University Computer Society NET3.039Initializing RT netlink socketStarting kswapdVFS: Diskquotas version dquot_6.4.0 initializeddevfs: VERSION Richard Gooch (rgooch@atnf.csiro.au)devfs: boot_options Qpty: 256 Unix98 ptys configuredSLIP: version 0.8.4-NET3.019-NEWTTY (dynamic channels, max=256).loop: loaded (max 8 devices)PPP generic driver version VERSIONUniversal TUN/TAP device driver VERSIONNET4: Linux TCP/IP 1.0 for NET4.0IP Protocols: ICMP, UDP, TCPIP: routing cache hash table of 512 buckets, 4KbytesTCP: Hash tables configured (established 2048 bind 2048)IPv4 over IPv4 tunneling driverGRE over IPv4 tunneling driverNET4: Unix domain sockets 1.0/SMP for Linux NET4.0.Mounted devfs on /devINIT: version 2.78 bootingActivating swap...Calculating module dependanciesdone.Loading modules: LISTChecking all file systems...Parallelizing fsck version 1.18 (11-Nov-1999)Setting kernel variables.Mounting local filesystems.../dev/shm on /tmp type tmpfs (rw)/dev/shm on /var/run type tmpfs (rw)devpts on /dev/pts type devpts (rw,mode=0622)none on /usr/share type hostfs (ro)Enabling packet forwarding: done.Configuring network interfaces: done.Cleaning: /tmp /var/lock /var/run.Initializing random number generator... done.Recovering nvi editor sessions... done.Give root password for maintenance(or type Control-D for normal startup): east:~# klogd -c 4 -x -f /tmp/klog.logeast:~# TZ=GMT export TZeast:~# ipsec spi --cleareast:~# ipsec eroute --cleareast:~# ipsec eroute --add --eraf inet --src 192.0.2.0/24 --dst 192.0.1.0/24 --said %trapeast:~# ipsec tncfg --attach --virtual ipsec0 --physical eth1east:~# ifconfig ipsec0 inet 192.1.2.23 netmask 0xffffff00 broadcast 192.1.2.255 upeast:~# arp -s 192.1.2.45 10:00:00:64:64:45east:~# arp -s 192.1.2.254 10:00:00:64:64:45east:~# ipsec lookeast NOW192.0.2.0/24 -> 192.0.1.0/24 => %trap (0)ipsec0->eth1 mtu=16260(1500)->1500Destination Gateway Genmask Flags MSS Window irtt Ifaceeast:~# route add -host 192.0.1.1 gw 192.1.2.45 dev ipsec0east:~# ipsec pf_key --daemon /var/run/pf_key.pid >/tmp/pfkey.txteast:~# echo start nowstart noweast:~# kill `cat /var/run/pf_key.pid`east:~# cat /tmp/pfkey.txt; echo ===pfkey v2 msg. type=7(register) seq=1 len=5 pid=987 errno=0 satype=2(AH)version=2 type=7 errno=0 satype=2 len=5 seq=1 pid=987 {ext=14 len=3 bytes=0x000000000300a000a00000000200800080000000 } pfkey v2 msg. type=7(register) seq=2 len=9 pid=987 errno=0 satype=3(ESP)version=2 type=7 errno=0 satype=3 len=9 seq=2 pid=987 {ext=14 len=4 bytes=0x0000000009008000800000000300a000a00000000200800080000000 } {ext=15 len=3 bytes=0x000000000c808000000100000340a800a8000000 } pfkey v2 msg. type=7(register) seq=3 len=4 pid=987 errno=0 satype=9(IPIP)version=2 type=7 errno=0 satype=9 len=4 seq=3 pid=987 {ext=15 len=2 bytes=0x000000000100200020000000 } pfkey v2 msg. type=7(register) seq=4 len=4 pid=987 errno=0 satype=10(COMP)version=2 type=7 errno=0 satype=10 len=4 seq=4 pid=987 {ext=15 len=2 bytes=0x000000000200010001000000 } pfkey v2 msg. type=6(acquire) seq=1 len=29 pid=987 errno=0 satype=3(ESP)version=2 type=6 errno=0 satype=3 len=29 seq=1 pid=987 {ext=5 len=3 proto=0 prefixlen=0 addr=0x02000000c00002010000000000000000 } {ext=6 len=3 proto=0 prefixlen=0 addr=0x02000000c00001010000000000000000 } {ext=13 len=21 bytes=0x400000000203010080008000a800a8000000000000000000000000000000000000000000000000000000000000e1000000000000805101000000000000e10000000000008051010000000000000000000000000003030100a000a000a800a8000000000000000000000000000000000000000000000000000000000000e1000000000000805101000000000000e100000000000080510100000000000000000000000000 } pf_key: Exiting on signal 15===east:~# ipsec eroute1 192.0.2.0/24 -> 192.0.1.0/24 => %trap7 192.0.2.1/32 -> 192.0.1.1/32 => %holdeast:~# ipsec setup stopIPSEC EVENT: KLIPS device ipsec0 shut down.ipsec_setup: Stopping Openswan IPsec...ipsec_setup: stop ordered, but IPsec does not appear to be running!ipsec_setup: doing cleanup anyway...east:~# kill `cat /var/run/klogd.pid`; cat /tmp/klog.logklogd 1.3-3#33.1, log source = /proc/kmsg started.east:~# halt -p -fPower down.
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -