TCPDUMP sun# tcpdump -i eth0 not port ssh and not port domain > /tmp/tcpdump.log 2>&1 & PRE-TEST moon# /etc/init.d/iptables start 2> /dev/null * Caching service dependencies ... [ ok ] * Starting firewall ... [ ok ] sun# /etc/init.d/iptables start 2> /dev/null * Caching service dependencies ... [ ok ] * Starting firewall ... [ ok ] moon# rm /etc/ipsec.d/cacerts/* sun# rm /etc/ipsec.d/cacerts/* moon# ipsec start Starting strongSwan 4.6.4 IPsec [starter]... No leaks detected, 5 suppressed by whitelist sun# ipsec start Starting strongSwan 4.6.4 IPsec [starter]... No leaks detected, 5 suppressed by whitelist moon# sleep 2 moon# ipsec up net-net initiating IKE_SA net-net[1] to 192.168.0.2 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) ] sending packet: from 192.168.0.1[500] to 192.168.0.2[500] received packet: from 192.168.0.2[500] to 192.168.0.1[500] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(MULT_AUTH) ] authentication of 'moon.strongswan.org' (myself) with RSA signature successful establishing CHILD_SA net-net generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_6_ADDR) N(ADD_6_ADDR) N(MULT_AUTH) N(EAP_ONLY) ] sending packet: from 192.168.0.1[4500] to 192.168.0.2[4500] received packet: from 192.168.0.2[4500] to 192.168.0.1[4500] parsed IKE_AUTH response 1 [ IDr AUTH SA TSi TSr N(AUTH_LFT) N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_6_ADDR) N(ADD_6_ADDR) ] no issuer certificate found for "sun.strongswan.org" using trusted certificate "sun.strongswan.org" authentication of 'b4:2f:31:fe:c8:0a:e3:26:4a:10:1c:85:97:7a:04:ac:8d:16:38:d3' with RSA signature successful IKE_SA net-net[1] established between 192.168.0.1[moon.strongswan.org]...192.168.0.2[b4:2f:31:fe:c8:0a:e3:26:4a:10:1c:85:97:7a:04:ac:8d:16:38:d3] scheduling reauthentication in 3362s maximum IKE_SA lifetime 3542s No leaks detected, 1 suppressed by whitelist TEST moon# ipsec status | grep 'net-net.*INSTALLED' [YES] No leaks detected, 1 suppressed by whitelist net-net{1}: INSTALLED, TUNNEL, ESP SPIs: ca099ec6_i cdf22329_o sun# ipsec status | grep 'net-net.*INSTALLED' [YES] No leaks detected, 1 suppressed by whitelist net-net{1}: INSTALLED, TUNNEL, ESP SPIs: cdf22329_i ca099ec6_o alice# ping -c 1 10.2.0.10 | grep '64 bytes from 10.2.0.10: icmp_seq=1' [YES] 64 bytes from 10.2.0.10: icmp_seq=1 ttl=62 time=1.28 ms sun# killall tcpdump sun# cat /tmp/tcpdump.log | grep 'IP moon.strongswan.org > sun.strongswan.org: ESP' [YES] 21:44:40.015740 IP moon.strongswan.org > sun.strongswan.org: ESP(spi=0xcdf22329,seq=0x1), length 132 sun# cat /tmp/tcpdump.log | grep 'IP sun.strongswan.org > moon.strongswan.org: ESP' [YES] 21:44:40.016283 IP sun.strongswan.org > moon.strongswan.org: ESP(spi=0xca099ec6,seq=0x1), length 132 POST-TEST moon# ipsec stop Stopping strongSwan IPsec... sun# ipsec stop Stopping strongSwan IPsec... moon# /etc/init.d/iptables stop 2> /dev/null * Stopping firewall ... [ ok ] sun# /etc/init.d/iptables stop 2> /dev/null * Stopping firewall ... [ ok ] moon# rm /etc/ipsec.d/certs/* moon# rm /etc/ipsec.d/private/* sun# rm /etc/ipsec.d/certs/* sun# rm /etc/ipsec.d/private/*