The tests were run on my machine. It gets a lot of retransmissions etc.
that count as errors, but I've ignored them.
PLEASE: everyone look at each of these to see if you are responsible
and can fix them. Most look easy.
(I hope your MUA does not make these harder to read by damaging the
formatting.)
testing/pluto/ikev2-ddns-02 failed west:output-different
script changed, reference output did not.
testing/pluto/newoe-15-portpass failed road:output-different
extra src policy
testing/pluto/newoe-18-private-clear failed road:output-different
extra src policy
testing/pluto/newoe-18-poc-blockall failed road:output-different
extra src policy
testing/pluto/newoe-18-private-clearall failed road:output-different
extra src policy
testing/pluto/newoe-19-poc-poc-clear failed road:output-different
extra src policy
testing/pluto/newoe-20-ipv6 failed east:output-different road:output-different
--- MASTER/testing/pluto/newoe-20-ipv6/road.console.txt
+++ OUTPUT/testing/pluto/newoe-20-ipv6/road.console.txt
@@ -11,8 +11,11 @@
echo "fe80::/10" >> /etc/ipsec.d/policies/clear
road #
cp /source/programs/configs/v6neighbor-hole.conf /etc/ipsec.d/
+cp: cannot stat ‘/source/programs/configs/v6neighbor-hole.conf’: No
such file or directory
road #
ipsec start
+warning: could not open include filename:
'/etc/ipsec.d/v6neighbor-hole.conf'
+warning: could not open include filename:
'/etc/ipsec.d/v6neighbor-hole.conf'
Redirecting to: systemctl start ipsec.service
road #
# ensure for tests acquires expire before our failureshunt=2m
testing/pluto/newoe-21-liveness-clear failed east:output-different
road:output-different
road's script changed but reference log did not
testing/pluto/certoe-07-nat-2-clients failed road:output-different
extra src policy
testing/pluto/rawrsaoe-asymetric-nat failed east:output-different
road:output-different
some kind of real failure
testing/pluto/dnsoe-01 failed east:output-different road:output-different
some kind of real failure
testing/pluto/dnsoe-02 failed east:output-different road:output-different
some kind of real failure
testing/pluto/dpd-01 failed west:output-different
not sure.
testing/pluto/ikev2-liveness-05 failed west:output-different
script changed but not reference output
testing/pluto/delete-sa-01 failed east:output-different west:output-different
+whack error: SAwest-east unexpected argument "leftrsasigkey"
etc.
testing/pluto/nat-pluto-02-klips-klips failed road:output-different
-006 #2: "road-eastnet-nat", type=ESP, add_time=1234567890, id='@east'
+006 #2: "road-eastnet-nat", type=ESP, add_time=1234567890,
inBytes=336, outBytes=336, id='@east'
testing/pluto/xauth-pluto-17 failed road:output-different
Worth examination, I think.
--- MASTER/testing/pluto/xauth-pluto-17/road.console.txt
+++ OUTPUT/testing/pluto/xauth-pluto-17/road.console.txt
@@ -31,7 +31,8 @@
002 "xauth-road-eastnet-psk" #1: XAUTH: Answering XAUTH challenge with
user='use2'
004 "xauth-road-eastnet-psk" #1: STATE_XAUTH_I1: XAUTH client -
possibly awaiting CFG_set {auth=PRESHARED_KEY cipher=3des_cbc_192 integ=sha
group=MODP1536}
002 "xauth-road-eastnet-psk" #1: XAUTH: Successfully Authenticated
-004 "xauth-road-eastnet-psk" #1: STATE_XAUTH_I1: XAUTH client -
possibly awaiting CFG_set {auth=PRESHARED_KEY cipher=3des_cbc_192 integ=sha
group=MODP1536}
+002 "xauth-road-eastnet-psk" #1: XAUTH completed; ModeCFG skipped as
per configuration
+004 "xauth-road-eastnet-psk" #1: STATE_AGGR_I2: sent AI2, ISAKMP SA
established {auth=PRESHARED_KEY cipher=3des_cbc_192 integ=sha group=MODP1536}
002 "xauth-road-eastnet-psk" #2: initiating Quick Mode
PSK+ENCRYPT+TUNNEL+PFS+UP+XAUTH+AGGRESSIVE+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
117 "xauth-road-eastnet-psk" #2: STATE_QUICK_I1: initiate
004 "xauth-road-eastnet-psk" #2: STATE_QUICK_I2: sent QI2, IPsec SA
established tunnel mode {ESP=>0xESPESP <0xESPESP xfrm=AES_CBC_128-HMAC_SHA1_96
NATOA=none NATD=none DPD=active username=use2}
@@ -86,6 +87,18 @@
dir out priority 2088 ptype main
tmpl src 192.1.3.209 dst 192.1.2.23
proto esp reqid REQID mode tunnel
+src ::/0 dst ::/0 proto ipv6-icmp type 135
+ dir fwd priority 1 ptype main
+src ::/0 dst ::/0 proto ipv6-icmp type 135
+ dir in priority 1 ptype main
+src ::/0 dst ::/0 proto ipv6-icmp type 135
+ dir out priority 1 ptype main
+src ::/0 dst ::/0 proto ipv6-icmp type 136
+ dir fwd priority 1 ptype main
+src ::/0 dst ::/0 proto ipv6-icmp type 136
+ dir in priority 1 ptype main
+src ::/0 dst ::/0 proto ipv6-icmp type 136
+ dir out priority 1 ptype main
XFRM done
IPSEC mangle TABLES
NEW_IPSEC_CONN mangle TABLES
testing/pluto/xauth-pluto-25-mixed-addresspool failed north:output-different
road:output-different
looks bad:
ipsec whack --trafficstatus
-006 #2: "north-east", username=xnorth, type=ESP, add_time=1234567890,
inBytes=0, outBytes=0
testing/pluto/xauth-pluto-25-lsw299 failed north:output-different
road:output-different
looks bad:
ipsec whack --trafficstatus
-006 #2: "road-east", username=xroad, type=ESP, add_time=1234567890,
inBytes=336, outBytes=336
testing/pluto/netkey-klips-pluto-03 failed west:output-different
lots of differences in xfrm policy
testing/pluto/klips-netkey-pluto-06 failed west:output-different
lots of differences in xfrm policy
testing/pluto/interop-ikev2-strongswan-13-ah-initiator failed
west:output-different
---
MASTER/testing/pluto/interop-ikev2-strongswan-13-ah-initiator/west.console.txt
+++
OUTPUT/testing/pluto/interop-ikev2-strongswan-13-ah-initiator/west.console.txt
@@ -39,10 +39,9 @@
sending packet: from 192.1.2.45[500] to 192.1.2.23[500] (XXX bytes)
received packet: from 192.1.2.23[500] to 192.1.2.45[500] (XXX bytes)
parsed IKE_SA_INIT response 0 [ SA KE No N(FRAG_SUP) N(NATD_S_IP)
N(NATD_D_IP) ]
-sending cert request for "C=CA, ST=Ontario, L=Toronto, O=Libreswan,
OU=Test Department, CN=Libreswan test CA for mainca, [email protected]"
authentication of 'west' (myself) with pre-shared key
establishing CHILD_SA westnet-eastnet-ikev2{1}
-generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) CERTREQ IDr AUTH
SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_4_ADDR) N(EAP_ONLY)
N(MSG_ID_SYN_SUP) ]
+generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi
TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_4_ADDR) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
sending packet: from 192.1.2.45[4500] to 192.1.2.23[4500] (XXX bytes)
received packet: from 192.1.2.23[4500] to 192.1.2.45[4500] (XXX bytes)
parsed IKE_AUTH response 1 [ IDr AUTH SA TSi TSr ]
testing/pluto/interop-ikev2-strongswan-17-delete-sa-responder failed
west:output-different
---
MASTER/testing/pluto/interop-ikev2-strongswan-17-delete-sa-responder/west.console.txt
+++
OUTPUT/testing/pluto/interop-ikev2-strongswan-17-delete-sa-responder/west.console.txt
@@ -39,10 +39,9 @@
sending packet: from 192.1.2.45[500] to 192.1.2.23[500] (XXX bytes)
received packet: from 192.1.2.23[500] to 192.1.2.45[500] (XXX bytes)
parsed IKE_SA_INIT response 0 [ SA KE No N(FRAG_SUP) N(NATD_S_IP)
N(NATD_D_IP) ]
-sending cert request for "C=CA, ST=Ontario, L=Toronto, O=Libreswan,
OU=Test Department, CN=Libreswan test CA for mainca, [email protected]"
authentication of 'west' (myself) with pre-shared key
establishing CHILD_SA westnet-eastnet-ikev2{1}
-generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) CERTREQ IDr AUTH
SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_4_ADDR) N(EAP_ONLY)
N(MSG_ID_SYN_SUP) ]
+generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi
TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_4_ADDR) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
sending packet: from 192.1.2.45[4500] to 192.1.2.23[4500] (XXX bytes)
received packet: from 192.1.2.23[4500] to 192.1.2.45[4500] (XXX bytes)
parsed IKE_AUTH response 1 [ IDr AUTH SA TSi TSr ]
testing/pluto/interop-ikev2-strongswan-35-ipsec-rekey failed
west:output-different
---
MASTER/testing/pluto/interop-ikev2-strongswan-35-ipsec-rekey/west.console.txt
+++
OUTPUT/testing/pluto/interop-ikev2-strongswan-35-ipsec-rekey/west.console.txt
@@ -87,8 +87,10 @@
strongswan status
Security Associations (1 up, 0 connecting):
westnet-eastnet-ikev2[1]: ESTABLISHED XXX second ago,
192.1.2.45[west]...192.1.2.23[east]
-westnet-eastnet-ikev2{6}: INSTALLED, TUNNEL, reqid 1, ESP SPIs:
SPISPI_i SPISPI_o
+westnet-eastnet-ikev2{6}: DELETING, TUNNEL, reqid 1
westnet-eastnet-ikev2{6}: 192.0.1.0/24 === 192.0.2.0/24
+westnet-eastnet-ikev2{7}: INSTALLED, TUNNEL, reqid 1, ESP SPIs:
SPISPI_i SPISPI_o
+westnet-eastnet-ikev2{7}: 192.0.1.0/24 === 192.0.2.0/24
west #
echo done
done
testing/pluto/interop-ikev2-strongswan-35-rekey-reauth failed
east:output-different west:output-different
reqid changed
testing/pluto/interop-ikev2-strongswan-35-responder-rekey-pfs failed
west:output-different
---
MASTER/testing/pluto/interop-ikev2-strongswan-35-responder-rekey-pfs/west.console.txt
+++
OUTPUT/testing/pluto/interop-ikev2-strongswan-35-responder-rekey-pfs/west.console.txt
@@ -36,10 +36,8 @@
westnet-eastnet-ikev2[1]: ESTABLISHED XXX second ago,
192.1.2.45[west]...192.1.2.23[east]
westnet-eastnet-ikev2{1}: DELETING, TUNNEL, reqid 1
westnet-eastnet-ikev2{1}: 192.0.1.0/24 === 192.0.2.0/24
-westnet-eastnet-ikev2{2}: DELETING, TUNNEL, reqid 1
+westnet-eastnet-ikev2{2}: REKEYING, TUNNEL, reqid 1, expires in 59
minutes
westnet-eastnet-ikev2{2}: 192.0.1.0/24 === 192.0.2.0/24
-westnet-eastnet-ikev2{3}: INSTALLED, TUNNEL, reqid 1, ESP SPIs:
SPISPI_i SPISPI_o
-westnet-eastnet-ikev2{3}: 192.0.1.0/24 === 192.0.2.0/24
west #
echo done
done
testing/pluto/dnssec-pluto-01 failed west:output-different
--- MASTER/testing/pluto/dnssec-pluto-01/west.console.txt
+++ OUTPUT/testing/pluto/dnssec-pluto-01/west.console.txt
@@ -39,8 +39,6 @@
ipsec auto --status | egrep "oriented|east-from-hosts"
000 "westnet-eastnet-etc-hosts":
192.0.1.0/24===192.1.2.45<192.1.2.45>[@west]...192.1.2.23<east-from-hosts-file>[@east]===192.0.2.0/24;
unrouted; eroute owner: #0
000 "westnet-eastnet-etc-hosts": oriented; my_ip=unset;
their_ip=unset; my_updown=ipsec _updown;
-000 "westnet-eastnet-etc-hosts-auto-add":
192.0.1.0/24===192.1.2.45<192.1.2.45>[@west]...192.1.2.23<east-from-hosts-file>[@east]===192.0.2.0/24;
unrouted; eroute owner: #0
-000 "westnet-eastnet-etc-hosts-auto-add": oriented; my_ip=unset;
their_ip=unset; my_updown=ipsec _updown;
west #
echo "initdone"
initdone
testing/pluto/ikev2-55-ipseckey-01 passed
testing/pluto/ikev2-55-ipseckey-02 failed road:output-different
--- MASTER/testing/pluto/ikev2-55-ipseckey-02/road.console.txt
+++ OUTPUT/testing/pluto/ikev2-55-ipseckey-02/road.console.txt
@@ -83,9 +83,9 @@
133 "road-east-2" #1: STATE_PARENT_I1: initiate
133 "road-east-2" #1: STATE_PARENT_I1: sent v2I1, expected v2R1
002 "road-east-2" #1: suppressing retransmit because
IMPAIR_RETRANSMITS is set.
-003 "road-east-2" #1: Can't find the private key from the NSS CKA_ID
-003 "road-east-2" #1: Failed to find our RSA key
-000 "road-east-2" #1: realse whack for IKE SA, but releasing whack for
pending IPSEC SA
+003 "road-east-2" #1: Can't find the certificate or private key from
the NSS CKA_ID
+003 "road-east-2" #1: DigSig: failed to find our RSA key
+000 "road-east-2" #1: release whack for IKE SA, but releasing whack
for pending IPSEC SA
road #
ping -n -c 4 -I 192.1.3.209 192.1.2.23
PING 192.1.2.23 (192.1.2.23) from 192.1.3.209 : 56(84) bytes of data.
testing/pluto/nss-cert-crl-03-strict failed west:output-different
--- MASTER/testing/pluto/nss-cert-crl-03-strict/west.console.txt
+++ OUTPUT/testing/pluto/nss-cert-crl-03-strict/west.console.txt
@@ -40,6 +40,10 @@
002 "nss-cert-crl" #1: I am sending my cert
002 "nss-cert-crl" #1: I am sending a certificate request
108 "nss-cert-crl" #1: STATE_MAIN_I3: sent MI3, expecting MR3
+003 "nss-cert-crl" #1: ignoring informational payload
INVALID_ID_INFORMATION, msgid=00000000, length=12
+003 "nss-cert-crl" #1: received and ignored informational message
+003 "nss-cert-crl" #1: discarding duplicate packet; already
STATE_MAIN_I3
+010 "nss-cert-crl" #1: STATE_MAIN_I3: retransmission; will wait 500ms
for response
002 "nss-cert-crl" #1: Peer ID is ID_DER_ASN1_DN: 'C=CA, ST=Ontario,
L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org,
[email protected]'
002 "nss-cert-crl" #1: certificate verified OK:
[email protected],CN=east.testing.libreswan.org,OU=Test
Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA
004 "nss-cert-crl" #1: STATE_MAIN_I4: ISAKMP SA established
{auth=RSA_SIG cipher=aes_256 integ=sha2_256 group=MODP2048}
testing/pluto/nss-cert-nosecret failed west:output-different
--- MASTER/testing/pluto/nss-cert-nosecret/west.console.txt
+++ OUTPUT/testing/pluto/nss-cert-nosecret/west.console.txt
@@ -159,25 +159,24 @@
000 TIMESTAMP, 1024 RSA Key AwXXXXXXX (no private key), until
TIMESTAMP ok
000 ID_IPV4_ADDR '192.1.2.23'
000 Issuer 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test
Department, CN=Libreswan test CA for mainca, [email protected]'
-000 TIMESTAMP, 1024 RSA Key AwXXXXXXX (has private key), until
TIMESTAMP ok
+000 TIMESTAMP, 1024 RSA Key AwXXXXXXX (no private key), until
TIMESTAMP ok
000 ID_DER_ASN1_DN 'C=CA, ST=Ontario, L=Toronto, O=Libreswan,
OU=Test Department, CN=west.testing.libreswan.org,
[email protected]'
000 Issuer 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test
Department, CN=Libreswan test CA for mainca, [email protected]'
-000 TIMESTAMP, 1024 RSA Key AwXXXXXXX (has private key), until
TIMESTAMP ok
+000 TIMESTAMP, 1024 RSA Key AwXXXXXXX (no private key), until
TIMESTAMP ok
000 ID_USER_FQDN '[email protected]'
000 Issuer 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test
Department, CN=Libreswan test CA for mainca, [email protected]'
-000 TIMESTAMP, 1024 RSA Key AwXXXXXXX (has private key), until
TIMESTAMP ok
+000 TIMESTAMP, 1024 RSA Key AwXXXXXXX (no private key), until
TIMESTAMP ok
000 ID_FQDN '@west.testing.libreswan.org'
000 Issuer 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test
Department, CN=Libreswan test CA for mainca, [email protected]'
-000 TIMESTAMP, 1024 RSA Key AwXXXXXXX (has private key), until
TIMESTAMP ok
+000 TIMESTAMP, 1024 RSA Key AwXXXXXXX (no private key), until
TIMESTAMP ok
000 ID_USER_FQDN '[email protected]'
000 Issuer 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test
Department, CN=Libreswan test CA for mainca, [email protected]'
-000 TIMESTAMP, 1024 RSA Key AwXXXXXXX (has private key), until
TIMESTAMP ok
+000 TIMESTAMP, 1024 RSA Key AwXXXXXXX (no private key), until
TIMESTAMP ok
000 ID_IPV4_ADDR '192.1.2.45'
000 Issuer 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test
Department, CN=Libreswan test CA for mainca, [email protected]'
000
000 List of Pre-shared secrets (from /etc/ipsec.secrets)
000
-000 0: RSA (none) (none)
000
000 List of X.509 End Certificates:
000
testing/pluto/nss-cert-09-notyetvalid-initiator failed east:output-different
west:output-different
---
MASTER/testing/pluto/nss-cert-09-notyetvalid-initiator/east.console.txt
+++
OUTPUT/testing/pluto/nss-cert-09-notyetvalid-initiator/east.console.txt
@@ -17,7 +17,6 @@
# will only show up on east - note "expired" is wrong and should be
"not yet valid"
east #
grep "ERROR" /tmp/pluto.log
-"nss-cert" #1: ERROR: Peer's Certificate has expired.
east #
east #
../bin/check-for-core.sh
---
MASTER/testing/pluto/nss-cert-09-notyetvalid-initiator/west.console.txt
+++
OUTPUT/testing/pluto/nss-cert-09-notyetvalid-initiator/west.console.txt
@@ -1,4 +1,4 @@
-/testing/guestbin/swan-prep --x509 --x509name notyetvalid
+/testing/guestbin/swan-prep --x509
Preparing X.509 files
west #
certutil -d sql:/etc/ipsec.d -D -n east
@@ -30,12 +30,18 @@
002 "nss-cert" #1: I am sending my cert
002 "nss-cert" #1: I am sending a certificate request
108 "nss-cert" #1: STATE_MAIN_I3: sent MI3, expecting MR3
-003 "nss-cert" #1: ignoring informational payload
INVALID_KEY_INFORMATION, msgid=00000000, length=12
-003 "nss-cert" #1: received and ignored informational message
-003 "nss-cert" #1: discarding duplicate packet; already STATE_MAIN_I3
-002 "nss-cert" #1: suppressing retransmit because IMPAIR_RETRANSMITS
is set
-031 "nss-cert" #1: max number of retransmissions (0) reached
STATE_MAIN_I3. Possible authentication failure: no acceptable response to our
first encrypted message
-002 "nss-cert" #1: deleting state (STATE_MAIN_I3)
+002 "nss-cert" #1: Peer ID is ID_DER_ASN1_DN: 'C=CA, ST=Ontario,
L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org,
[email protected]'
+002 "nss-cert" #1: certificate verified OK:
[email protected],CN=east.testing.libreswan.org,OU=Test
Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA
+004 "nss-cert" #1: STATE_MAIN_I4: ISAKMP SA established {auth=RSA_SIG
cipher=aes_256 integ=sha2_256 group=MODP2048}
+002 "nss-cert" #2: initiating Quick Mode
RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
+117 "nss-cert" #2: STATE_QUICK_I1: initiate
+003 "nss-cert" #2: up-client command exited with status 1
+032 "nss-cert" #2: STATE_QUICK_I1: internal error
+003 "nss-cert" #2: discarding duplicate packet; already STATE_QUICK_I1
+003 "nss-cert" #2: discarding duplicate packet; already STATE_QUICK_I1
+002 "nss-cert" #2: deleting state (STATE_QUICK_I1)
+003 "nss-cert" #2: ERROR: netlink response for Del SA
[email protected] included errno 3: No such process
+003 "nss-cert" #2: ERROR: netlink response for Del SA
[email protected] included errno 3: No such process
west #
echo done
done
@@ -43,6 +49,9 @@
# will only show up on east - note "expired" is wrong and should be
"not yet valid"
west #
grep "ERROR" /tmp/pluto.log
+| complete v1 state transition with STF_INTERNAL_ERROR
+"nss-cert" #2: ERROR: netlink response for Del SA
[email protected] included errno 3: No such process
+"nss-cert" #2: ERROR: netlink response for Del SA
[email protected] included errno 3: No such process
west #
west #
../bin/check-for-core.sh
testing/pluto/nss-cert-10-notyetvalid-responder-ikev2 failed
east:output-different west:output-different
---
MASTER/testing/pluto/nss-cert-10-notyetvalid-responder-ikev2/east.console.txt
+++
OUTPUT/testing/pluto/nss-cert-10-notyetvalid-responder-ikev2/east.console.txt
@@ -24,6 +24,8 @@
# only expected to show failure on west
east #
grep "ERROR" /tmp/pluto.log
+"nss-cert" #2: ERROR: netlink response for Del SA
[email protected] included errno 3: No such process
+"nss-cert" #2: ERROR: netlink response for Del SA
[email protected] included errno 3: No such process
east #
east #
../bin/check-for-core.sh
---
MASTER/testing/pluto/nss-cert-10-notyetvalid-responder-ikev2/west.console.txt
+++
OUTPUT/testing/pluto/nss-cert-10-notyetvalid-responder-ikev2/west.console.txt
@@ -27,13 +27,6 @@
002 "nss-cert" #1: suppressing retransmit because IMPAIR_RETRANSMITS
is set.
134 "nss-cert" #2: STATE_PARENT_I2: sent v2I2, expected v2R2
{auth=IKEv2 cipher=aes_gcm_16_256 integ=n/a prf=sha2_512 group=MODP2048}
002 "nss-cert" #2: suppressing retransmit because IMPAIR_RETRANSMITS
is set.
-003 "nss-cert" #2: Certificate
[email protected],CN=notyetvalid.testing.libreswan.org,OU=Test
Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA failed verification
-003 "nss-cert" #2: ERROR: Peer's Certificate has expired.
-002 "nss-cert" #2: IKEv2 mode peer ID is ID_DER_ASN1_DN: 'C=CA,
ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department,
CN=notyetvalid.testing.libreswan.org, [email protected]'
-003 "nss-cert" #2: no RSA public key known for 'C=CA, ST=Ontario,
L=Toronto, O=Libreswan, OU=Test Department,
CN=notyetvalid.testing.libreswan.org, [email protected]'
-002 "nss-cert" #2: RSA authentication failed
-224 "nss-cert" #2: STATE_PARENT_I2: v2N_AUTHENTICATION_FAILED
-003 "nss-cert" #2: EXPECTATION FAILED: st != NULL && st->st_event !=
NULL && st->st_event->ev_type == EVENT_v2_RETRANSMIT (in
complete_v2_state_transition at /source/programs/pluto/ikev2.c:1827)
west #
echo done
done
@@ -41,7 +34,6 @@
# only expected to show failure on west
west #
grep "ERROR" /tmp/pluto.log
-"nss-cert" #2: ERROR: Peer's Certificate has expired.
west #
west #
../bin/check-for-core.sh
testing/pluto/ipsec-hostkey-ckaid-02-fips failed west:output-different
--- MASTER/testing/pluto/ipsec-hostkey-ckaid-02-fips/west.console.txt
+++ OUTPUT/testing/pluto/ipsec-hostkey-ckaid-02-fips/west.console.txt
@@ -4,14 +4,18 @@
FIPS mode enabled.
west #
ipsec newhostkey
-Generated RSA key pair with CKAID <<CKAID#1>> was stored in the NSS
database
+FIPS HMAC integrity verification test failed.
west #
ipsec showhostkey --list
-< 1> RSA keyid: <<KEYID#1>> ckaid: <<CKAID#1>>
west #
ckaid=$(ipsec showhostkey --list | sed -e 's/.*ckaid: //')
west #
ipsec showhostkey --left --ckaid $ckaid
- # rsakey <<KEYID#1>>
- leftrsasigkey=<<RSASIGKEY#1>>
+PATH/libexec/ipsec/showhostkey: option '--ckaid' requires an argument
+Usage: showhostkey [ --verbose ]
+ { --version | --dump | --list | --left | --right |
+ --ipseckey [ --precedence <precedence> ]
+ [ --gateway <gateway> ] }
+ [ --rsaid <rsaid> | --ckaid <ckaid> ]
+ [ --nssdir <nssdir> ] [ --password <password> ]_______________________________________________
Swan-dev mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan-dev