west:~#
 TESTNAME=tpm-accept-05
west:~#
 source /testing/pluto/bin/westlocal.sh
west:~#
 ipsec setup start
ipsec_setup: Starting Openswan IPsec VERSION
west:~#
 ipsec auto --add west--east-psk
west:~#
 /testing/pluto/bin/wait-until-pluto-started
west:~#
 ipsec auto --replace west--east-psk
west:~#
 ipsec auto --up west--east-psk
104 "west--east-psk" #1: STATE_MAIN_I1: initiate
003 "west--east-psk" #1: received Vendor ID payload [Openswan 
003 "west--east-psk" #1: received Vendor ID payload [Dead Peer Detection]
106 "west--east-psk" #1: STATE_MAIN_I2: sent MI2, expecting MR2
108 "west--east-psk" #1: STATE_MAIN_I3: sent MI3, expecting MR3
004 "west--east-psk" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}
117 "west--east-psk" #2: STATE_QUICK_I1: initiate
004 "west--east-psk" #2: STATE_QUICK_I2: sent QI2, IPsec SA established
west:~#
west:~#
 

west:~#
west:~#
 cat /tmp/pluto.log
Plutorun started on DATE
Starting Pluto (Openswan Version 2.5.0cl8 X.509-1.5.4 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR; Vendor ID OEQAUNTmsT]Y)
WARNING: 1DES is enabled
Setting NAT-Traversal port-4500 floating to off
   port floating activation criteria nat_t=0/port_float=1
   including NAT-Traversal patch (Version 0.6c) [disabled]
WARNING: open of /dev/hw_random failed: No such file or directory
using /dev/random as source of random entropy
ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC_SSH: Ok (ret=0)
ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC: Ok (ret=0)
ike_alg_register_enc(): Activating OAKLEY_SERPENT_CBC: Ok (ret=0)
ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
ike_alg_register_enc(): Activating OAKLEY_BLOWFISH_CBC: Ok (ret=0)
ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0)
ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0)
starting up 1 cryptographic helpers
started helper pid=999 (fd:9)
No file '/tmp/tpm-accept-05/ipsec.d/tpm.tcl' found, TPM disabled 
Changing to directory '/tmp/tpm-accept-05/ipsec.d/cacerts'
  loaded CA cert file 'caCert.pem' (4854 bytes)
Changing to directory '/tmp/tpm-accept-05/ipsec.d/aacerts'
Changing to directory '/tmp/tpm-accept-05/ipsec.d/ocspcerts'
Changing to directory '/tmp/tpm-accept-05/ipsec.d/crls'
  loaded crl file 'nic.crl' (642 bytes)
  loaded crl file 'crashcrl-3.pem' (690 bytes)
crl issuer cacert not found for (file:///tmp/tpm-accept-05/ipsec.d/crls/crashcrl-3.pem)
  loaded crl file 'crashcrl-2.pem' (528 bytes)
crl issuer cacert not found for (file:///tmp/tpm-accept-05/ipsec.d/crls/crashcrl-2.pem)
WARNING: open of /dev/hw_random failed: No such file or directory
using /dev/random as source of random entropy
  loaded crl file 'crashcrl-1.pem' (1053 bytes)
crl issuer cacert not found for (file:///tmp/tpm-accept-05/ipsec.d/crls/crashcrl-1.pem)
added connection description "west--east-psk"
listening for IKE messages
adding interface ipsec0/eth1 192.1.2.45:500
loading secrets from "/tmp/tpm-accept-05/ipsec.secrets"
  loaded private key file '/etc/ipsec.d/private/west.pem' (963 bytes)
listening for IKE messages
forgetting secrets
loading secrets from "/tmp/tpm-accept-05/ipsec.secrets"
  loaded private key file '/etc/ipsec.d/private/west.pem' (963 bytes)
"west--east-psk": deleting connection
added connection description "west--east-psk"
"west--east-psk" #1: initiating Main Mode
"west--east-psk" #1: received Vendor ID payload [Openswan (this version) 2.5.0cl8  X.509-1.5.4 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR]
"west--east-psk" #1: received Vendor ID payload [Dead Peer Detection]
"west--east-psk" #1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
"west--east-psk" #1: STATE_MAIN_I2: sent MI2, expecting MR2
"west--east-psk" #1: I did not send a certificate because digital signatures are not being used. (PSK)
"west--east-psk" #1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
"west--east-psk" #1: STATE_MAIN_I3: sent MI3, expecting MR3
"west--east-psk" #1: Main mode peer ID is ID_IPV4_ADDR: '192.1.2.23'
"west--east-psk" #1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
"west--east-psk" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}
"west--east-psk" #2: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+UP
"west--east-psk" #2: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
"west--east-psk" #2: STATE_QUICK_I2: sent QI2, IPsec SA established
"west--east-psk" #3: responding to Quick Mode 
"west--east-psk" #3: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
"west--east-psk" #3: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
"west--east-psk" #3: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
"west--east-psk" #3: STATE_QUICK_R2: IPsec SA established
"west--east-psk" #1: received Delete SA payload: replace IPSEC State #3 in 10 seconds
"west--east-psk" #1: received and ignored informational message
"west--east-psk" #1: received Delete SA(0xSPI1SPI1) payload: deleting IPSEC State #NUM
"west--east-psk" #1: received and ignored informational message
"west--east-psk" #1: received Delete SA payload: deleting ISAKMP State #1
packet from 192.1.2.23:500: received and ignored informational message
west:~#
 if [ -f /tmp/core ]; then echo CORE FOUND; mv /tmp/core /var/tmp; fi
west:~#

