../../guestbin/prep.sh
ipsec.conf -> PATH/etc/ipsec.conf
ipsec.secrets -> PATH/etc/ipsec.secrets
rise #
 ifconfig sec1 create
rise #
 ifconfig sec1 inet 198.18.12.12/24 198.18.15.15
rise #
 ifconfig sec1 up
rise #
 ifconfig sec1
sec1: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1280
	index 7 priority 0 llprio 3
	groups: sec
	inet 198.18.12.12 --> 198.18.15.15 netmask 0xffffff00
rise #
 ../../guestbin/ipsec-kernel-state.sh
rise #
 ../../guestbin/ipsec-kernel-policy.sh
rise #
 ipsec start
Redirecting to: [initsystem]
pluto(ok)
rise #
 ../../guestbin/wait-until-pluto-started
rise #
 ipsec add rise-set
"rise-set": command: 'ifconfig' 'sec1'
"rise-set": output: sec1: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1280\n\tindex 7 priority 0 llprio 3\n\tgroups: se
"rise-set": output: c\n\tinet 198.18.12.12 --> 198.18.15.15 netmask 0xffffff00\n
"rise-set": eof: 0; exited yes(0); signaled: no(0); stopped: no(0); core: no
"rise-set": added IKEv2 connection
rise #
 ipsec up rise-set
"rise-set" #1: initiating IKEv2 connection to 198.18.1.15 using UDP
"rise-set" #1: sent IKE_SA_INIT request to 198.18.1.15:UDP/500
"rise-set" #1: processed IKE_SA_INIT response from 198.18.1.15:UDP/500 {cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=DH19}, initiating IKE_AUTH
"rise-set" #1: sent IKE_AUTH request to 198.18.1.15:UDP/500
"rise-set" #1: initiator established IKE SA; authenticated peer using authby=secret and ID_FQDN '@east'
"rise-set" #2: BSD doesn't add kernel-policy to an ipsec-interface (sec1@vio2)
"rise-set" #2: command: 'ifconfig' 'sec1' 'up'
"rise-set" #2: eof: 0; exited yes(0); signaled: no(0); stopped: no(0); core: no
"rise-set" #2: BSD doesn't add kernel-policy to an ipsec-interface (sec1@vio2)
"rise-set" #2: initiator established Child SA using #1; IPsec tunnel [198.18.15.0/24===192.19.12.0/24] {ESP/ESN=>0xESPESP <0xESPESP xfrm=AES_CBC_128-HMAC_SHA1_96 DPD=passive}
rise #
 ../../guestbin/ping-once.sh --up -I 198.18.12.12 198.18.15.15
up
rise #
 ../../guestbin/ipsec-kernel-state.sh
@0 esp tunnel from 198.18.1.12 to 198.18.1.15 spi 0xSPISPI auth hmac-sha1 enc aes \
	authkey 0xHASHKEY \
	enckey 0xENCKEY
	sa: spi 0xSPISPI auth hmac-sha1 enc aes
		state mature replay 16 flags 0x404<tunnel,esn>
	lifetime_cur: alloc 0 bytes 168 add N first N
	lifetime_hard: alloc 0 bytes 0 add N first 0
	lifetime_soft: alloc 0 bytes 0 add N first 0
	address_src: 198.18.1.12
	address_dst: 198.18.1.15
	key_auth: bits 160: HASHKEY
	key_encrypt: bits 128: ENCKEY
	lifetime_lastuse: alloc 0 bytes 0 add 0 first N
	counter:
		0 input packets
		2 output packets
		0 input bytes
		304 output bytes
		0 input bytes, decompressed
		208 output bytes, uncompressed
		0 packets dropped on input
		0 packets dropped on output
	replay: rpl 3
	interface: sec1 direction out
@0 esp tunnel from 198.18.1.15 to 198.18.1.12 spi 0xSPISPI auth hmac-sha1 enc aes \
	authkey 0xHASHKEY \
	enckey 0xENCKEY
	sa: spi 0xSPISPI auth hmac-sha1 enc aes
		state mature replay 16 flags 0x404<tunnel,esn>
	lifetime_cur: alloc 0 bytes 192 add N first N
	lifetime_hard: alloc 0 bytes 0 add N first 0
	lifetime_soft: alloc 0 bytes 0 add N first 0
	address_src: 198.18.1.15
	address_dst: 198.18.1.12
	key_auth: bits 160: HASHKEY
	key_encrypt: bits 128: ENCKEY
	lifetime_lastuse: alloc 0 bytes 0 add 0 first N
	counter:
		2 input packets
		0 output packets
		496 input bytes
		0 output bytes
		208 input bytes, decompressed
		0 output bytes, uncompressed
		2 packets dropped on input
		0 packets dropped on output
	replay: rpl 2
	interface: sec1 direction in
rise #
 ../../guestbin/ipsec-kernel-policy.sh
rise #
 ifconfig sec1 destroy
rise #
 
