📄 west-console26.txt
字号:
Starting UML PATH/start.shspawn PATH singleChecking PROT_EXEC mmap in /tmp...OKLinux version XXXXBuilt 1 zonelistsKernel command line:PID hash table entries: 256 (order: 8, 4096 bytes)Dentry-cache hash table entries: NUMBERSInode-cache hash table entries: NUMBERSMount-cache hash table entries: NUMBERSChecking syscall emulation patch for ptrace...missingNET: Registered protocol family 16VFS: Diskquotas version dquot_6.4.0 initializedDquot-cache hash table entries: 1024 (order 0, 4096 bytes)devfs: 2004-01-31 Richard Gooch (rgooch@atnf.csiro.au)devfs: boot_options QInitializing Cryptographic APIio scheduler noop registeredio scheduler anticipatory registeredio scheduler deadline registeredio scheduler cfq registeredloop: loaded (max 8 devices)nbd: registered device at major 43PPP generic driver version VERSIONSLIP: version 0.8.4-NET3.019-NEWTTY (dynamic channels, max=256).tun: Universal TUN/TAP device driver VERSIONtun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>NET: Registered protocol family 2IP: routing cache hash table of 512 buckets, 4KbytesTCP established hash table entries: 2048 (order: 2, 16384 bytes)TCP bind hash table entries: 2048 (order: 1, 8192 bytes)TCP: Hash tables configured (established 2048 bind 2048)NET: Registered protocol family 15ipsec_3des_init(alg_type=15 alg_id=3 name=3des): ret=0IPv4 over IPv4 tunneling driverGRE over IPv4 tunneling driverNET: Registered protocol family 1NET: Registered protocol family 17Initialized stdio console driverConsole initialized on /dev/tty0Mounted devfs on /devline_ioctl: tty0: ioctl KDSIGACCEPT calledINIT: version 2.78 bootingActivating swap...Checking all file systems...Parallelizing fsck version 1.18 (11-Nov-1999)Setting kernel variables.Mounting local filesystems.../dev/shm on /tmp type tmpfs (rw)/dev/shm on /var/run type tmpfs (rw)devpts on /dev/pts type devpts (rw,mode=0622)none on /usr/share type hostfs (ro)Enabling packet forwarding: done.Configuring network interfaces: done.Cleaning: /tmp /var/lock /var/run.Initializing random number generator... done.Recovering nvi editor sessions... done.Give root password for maintenance(or type Control-D for normal startup): west:~# klogd -c 4 -x -f /tmp/klog.logwest:~# TESTNAME=basic-pluto-01west:~# source /testing/pluto/bin/westlocal.shwest:~# ping -n -c 4 192.0.2.254PING 192.0.2.254 (192.0.2.254): 56 data bytes64 bytes from 192.0.2.254: icmp_seq=0 ttl=257 time=999 ms64 bytes from 192.0.2.254: icmp_seq=1 ttl=257 time=999 ms64 bytes from 192.0.2.254: icmp_seq=2 ttl=257 time=999 ms64 bytes from 192.0.2.254: icmp_seq=3 ttl=257 time=999 ms--- 192.0.2.254 ping statistics ---4 packets transmitted, 4 packets received, 0% packet lossround-trip min/avg/max = 3.1/4.5/9.26 mswest:~# iptables -A INPUT -i eth1 -s 192.0.2.0/24 -j DROPwest:~# ping -n -c 4 192.0.2.254PING 192.0.2.254 (192.0.2.254): 56 data bytes--- 192.0.2.254 ping statistics ---4 packets transmitted, 0 packets received, 100% packet losswest:~# ipsec setup startipsec_setup: Starting Openswan IPsec VERSIONwest:~# ipsec auto --add westnet-eastnetwest:~# ipsec whack --debug-control --debug-controlmore --debug-parsing --debug-cryptwest:~# /testing/pluto/basic-pluto-01/eroutewait.sh trapwest:~# echo donedonewest:~# ipsec auto --up westnet-eastnet104 "westnet-eastnet" #1: STATE_MAIN_I1: initiate003 "westnet-eastnet" #1: received Vendor ID payload [Openswan 003 "westnet-eastnet" #1: received Vendor ID payload [Dead Peer Detection]106 "westnet-eastnet" #1: STATE_MAIN_I2: sent MI2, expecting MR2108 "westnet-eastnet" #1: STATE_MAIN_I3: sent MI3, expecting MR3004 "westnet-eastnet" #1: STATE_MAIN_I4: ISAKMP SA established{ auth=OAKLEY_RSA_SIG cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536 }117 "westnet-eastnet" #2: STATE_QUICK_I1: initiate004 "westnet-eastnet" #2: STATE_QUICK_I2: sent QI2, IPsec SA establishedwest:~# ipsec lookwest NOW0.0.0.0/0 -> 0.0.0.0/0 => %trap192.0.1.0/24 -> 192.0.2.0/24 => tun0xIPIP@192.1.2.23 esp0xESPSPI@192.1.2.23ipsec0->eth1 mtu=16260(9999)->1500tun0xTUN#@192.1.2.23 IPIP: dir=out src=192.1.2.45 natencap=none natsport=0 natdport=0 esp0xKLIPSPIK@192.1.2.23 ESP_3DES_HMAC_MD5: dir=out src=192.1.2.45 iv_bits=64bits iv=0xIVISFORRANDOM000 ooowin=64 alen=128 aklen=128 eklen=192 natencap=none natsport=0 natdport=0 esp0xKLIPSPIK@192.1.2.45 ESP_3DES_HMAC_MD5: dir=in src=192.1.2.23 iv_bits=64bits iv=0xIVISFORRANDOM000 ooowin=64 alen=128 aklen=128 eklen=192 natencap=none natsport=0 natdport=0 tun0xTUN#@192.1.2.45 IPIP: dir=in src=192.1.2.23 policy=192.0.2.0/24->192.0.1.0/24 flags=0x8<> natencap=none natsport=0 natdport=0 Destination Gateway Genmask Flags MSS Window irtt Iface0.0.0.0 192.1.2.254 0.0.0.0 UG 99 0 0 eth10.0.0.0 192.1.2.254 128.0.0.0 UG 99 0 0 ipsec0128.0.0.0 192.1.2.254 128.0.0.0 UG 99 0 0 ipsec0192.0.2.0 0.0.0.0 255.255.255.0 U 99 0 0 ipsec0192.1.2.0 0.0.0.0 255.255.255.0 U 99 0 0 eth1192.1.2.0 0.0.0.0 255.255.255.0 U 99 0 0 ipsec0west:~# echo donedonewest:~# west:~#west:~# if [ -f /tmp/core ]; then echo CORE FOUND; mv /tmp/core /var/tmp; fiwest:~# ipsec setup stopIPSEC EVENT: KLIPS device ipsec0 shut down.ipsec_setup: Stopping Openswan IPsec...west:~# kill `cat /var/run/klogd.pid`; cat /tmp/klog.logklogd 1.3-3#33.1, log source = /proc/kmsg started.west:~# halt -p -fPower down.
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -