ip addr add 192.1.3.34/24 dev eth1 2>/dev/null
north #
 ip addr add 192.1.3.35/24 dev eth1 2>/dev/null
north #
 ip addr add 192.1.3.36/24 dev eth1 2>/dev/null
north #
 /testing/guestbin/swan-prep
north #
 ipsec start
Redirecting to: [initsystem]
north #
 ../../guestbin/wait-until-pluto-started
north #
 ipsec auto --add north-east-21
002 "north-east-21": added IKEv2 connection
north #
 ipsec auto --add north-east-22
002 "north-east-22": added IKEv2 connection
north #
 ipsec auto --add north-east-23
002 "north-east-23": added IKEv2 connection
north #
 ipsec auto --add north-east-24
002 "north-east-24": added IKEv2 connection
north #
 echo "initdone"
initdone
north #
 ipsec auto --up north-east-21
1v2 "north-east-21" #1: initiating IKEv2 connection
1v2 "north-east-21" #1: sent IKE_SA_INIT request to 192.1.2.23:500
1v2 "north-east-21" #1: sent IKE_AUTH request {cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048}
003 "north-east-21" #1: initiator established IKE SA; authenticated peer using authby=secret and ID_FQDN '@east'
004 "north-east-21" #2: initiator established Child SA using #1; IPsec tunnel [192.0.31.0-192.0.31.255:0-65535 0] -> [192.0.21.0-192.0.21.255:0-65535 0] {ESP/ESN=>0xESPESP <0xESPESP xfrm=AES_GCM_16_256-NONE DPD=passive}
north #
 ipsec auto --up north-east-22
1v2 "north-east-22" #3: initiating IKEv2 connection
1v2 "north-east-22" #3: sent IKE_SA_INIT request to 192.1.2.23:500
1v2 "north-east-22" #3: sent IKE_AUTH request {cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048}
003 "north-east-22" #3: initiator established IKE SA; authenticated peer using authby=secret and ID_FQDN '@east'
004 "north-east-22" #4: initiator established Child SA using #3; IPsec tunnel [192.0.32.0-192.0.32.255:0-65535 0] -> [192.0.22.0-192.0.22.255:0-65535 0] {ESP/ESN=>0xESPESP <0xESPESP xfrm=AES_GCM_16_256-NONE DPD=passive}
north #
 ipsec auto --up north-east-23
1v2 "north-east-23" #5: initiating IKEv2 connection
1v2 "north-east-23" #5: sent IKE_SA_INIT request to 192.1.2.23:500
1v2 "north-east-23" #5: sent IKE_AUTH request {cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048}
003 "north-east-23" #5: initiator established IKE SA; authenticated peer using authby=secret and ID_FQDN '@east'
004 "north-east-23" #6: initiator established Child SA using #5; IPsec tunnel [192.0.33.0-192.0.33.255:0-65535 0] -> [192.0.23.0-192.0.23.255:0-65535 0] {ESP/ESN=>0xESPESP <0xESPESP xfrm=AES_GCM_16_256-NONE DPD=passive}
north #
 ipsec auto --up north-east-24
1v2 "north-east-24" #7: initiating IKEv2 connection
1v2 "north-east-24" #7: sent IKE_SA_INIT request to 192.1.2.23:500
1v2 "north-east-24" #7: sent IKE_AUTH request {cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048}
003 "north-east-24" #7: initiator established IKE SA; authenticated peer using authby=secret and ID_FQDN '@east'
004 "north-east-24" #8: initiator established Child SA using #7; IPsec tunnel [192.0.34.0-192.0.34.255:0-65535 0] -> [192.0.24.0-192.0.24.255:0-65535 0] {ESP/ESN=>0xESPESP <0xESPESP xfrm=AES_GCM_16_256-NONE DPD=passive}
north #
 ip link show type xfrm
X: ipsec21@eth1: <NOARP,UP,LOWER_UP> mtu 1500 state UNKNOWN
X: ipsec22@eth1: <NOARP,UP,LOWER_UP> mtu 1500 state UNKNOWN
X: ipsec23@eth1: <NOARP,UP,LOWER_UP> mtu 1500 state UNKNOWN
X: ipsec24@eth1: <NOARP,UP,LOWER_UP> mtu 1500 state UNKNOWN
north #
 ip addr add 192.0.31.254/24 dev ipsec21 2>/dev/null
north #
 ip addr add 192.0.32.254/24 dev ipsec22 2>/dev/null
north #
 ip addr add 192.0.33.254/24 dev ipsec23 2>/dev/null
north #
 ip addr add 192.0.34.254/24 dev ipsec24 2>/dev/null
north #
 ../../guestbin/ping-once.sh --up -I 192.0.31.254 192.0.21.254
up
north #
 ../../guestbin/ping-once.sh --up -I 192.0.32.254 192.0.22.254
up
north #
 ../../guestbin/ping-once.sh --up -I 192.0.33.254 192.0.23.254
up
north #
 ../../guestbin/ping-once.sh --up -I 192.0.34.254 192.0.24.254
up
north #
 echo done
done
north #
 ipsec whack --trafficstatus
006 #2: "north-east-21", type=ESP, add_time=1234567890, inBytes=84, outBytes=84, maxBytes=2^63B, id='@east'
006 #4: "north-east-22", type=ESP, add_time=1234567890, inBytes=84, outBytes=84, maxBytes=2^63B, id='@east'
006 #6: "north-east-23", type=ESP, add_time=1234567890, inBytes=84, outBytes=84, maxBytes=2^63B, id='@east'
006 #8: "north-east-24", type=ESP, add_time=1234567890, inBytes=84, outBytes=84, maxBytes=2^63B, id='@east'
north #
 ip -s link show ipsec1
Device "ipsec1" does not exist.
north #
 ip rule show
0:	from all lookup local
32766:	from all lookup main
32767:	from all lookup default
north #
 ip route show table 50
Error: ipv4: FIB table does not exist.
Dump terminated
north #
 ip route
default via 192.1.3.254 dev eth1
192.0.3.0/24 dev eth0 proto kernel scope link src 192.0.3.254
192.0.21.0/24 dev ipsec21 scope link
192.0.22.0/24 dev ipsec22 scope link
192.0.23.0/24 dev ipsec23 scope link
192.0.24.0/24 dev ipsec24 scope link
192.0.31.0/24 dev ipsec21 proto kernel scope link src 192.0.31.254
192.0.32.0/24 dev ipsec22 proto kernel scope link src 192.0.32.254
192.0.33.0/24 dev ipsec23 proto kernel scope link src 192.0.33.254
192.0.34.0/24 dev ipsec24 proto kernel scope link src 192.0.34.254
192.1.3.0/24 dev eth1 proto kernel scope link src 192.1.3.33
north #
 ip -d link show type xfrm
X: ipsec21@eth1: <NOARP,UP,LOWER_UP> mtu 1500 state UNKNOWN
    xfrm if_id 0x15 addrgenmode eui64 numtxqueues 1 numrxqueues 1 gso_max_size 65536 gso_max_segs 65535
X: ipsec22@eth1: <NOARP,UP,LOWER_UP> mtu 1500 state UNKNOWN
    xfrm if_id 0x16 addrgenmode eui64 numtxqueues 1 numrxqueues 1 gso_max_size 65536 gso_max_segs 65535
X: ipsec23@eth1: <NOARP,UP,LOWER_UP> mtu 1500 state UNKNOWN
    xfrm if_id 0x17 addrgenmode eui64 numtxqueues 1 numrxqueues 1 gso_max_size 65536 gso_max_segs 65535
X: ipsec24@eth1: <NOARP,UP,LOWER_UP> mtu 1500 state UNKNOWN
    xfrm if_id 0x18 addrgenmode eui64 numtxqueues 1 numrxqueues 1 gso_max_size 65536 gso_max_segs 65535
north #
 
