You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
using /dev/urandom as source of random entropy
using /dev/urandom as source of random entropy
using /dev/urandom as source of random entropy
adding connection: "test"
listening for IKE messages
adding interface ipsec0/eth0.2 192.168.20.193:500
adding interface ipsec0/eth0.2 192.168.20.193:4500
adding interface ipsec0/eth0.2 fd7d:1ae2:819c:0:12ea:daff:fe11:2a32:500
adding interface ipsec0/eth0.2 fd7d:1ae2:819c::8c6:500
loading secrets from "/etc/ipsec.secrets"
[ 6507.895264] do_page_fault(): sending SIGSEGV to pluto for invalid read access from 000001b8
[ 6507.911912] epc = 55659933 in pluto[555ef000+bb000]
[ 6507.921665] ra = 55631057 in pluto[555ef000+bb000]
packet from 192.168.20.221:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
packet from 192.168.20.221:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] method set to=106
packet from 192.168.20.221:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] method set to=108
packet from 192.168.20.221:500: received Vendor ID payload [RFC 3947] method set to=115
packet from 192.168.20.221:500: received Vendor ID payload [Dead Peer Detection]
"test" #1: responding to Main Mode
"test" #1: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
"test" #1: STATE_MAIN_R1: sent MR1, expecting MI2
"test" #1: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): no NAT detected
"test" #1: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
"test" #1: STATE_MAIN_R2: sent MR2, expecting MI3
| WARNING: openswan-2.6.51.5/programs/pluto/crypt_start_dh.c:160: encryptor '3des' expects keylen 24/192, SA #1 INITIATOR keylen is 20
| WARNING: openswan-2.6.51.5/programs/pluto/crypt_start_dh.c:160: encryptor '3des' expects keylen 24/192, SA #1 RESPONDER keylen is 0
| WARNING: openswan-2.6.51.5/programs/pluto/ikev1_main.c:1206: encryptor '3des' expects keylen 24/192, SA #1 INITIATOR keylen is 20
| WARNING: openswan-2.6.51.5/programs/pluto/ikev1_main.c:1206: encryptor '3des' expects keylen 24/192, SA #1 RESPONDER keylen is 0
"test" #1: Main mode peer ID is ID_IPV4_ADDR: '192.168.20.221'
"test" #1: switched from "test" to "test"
"test"[1] 192.168.20.221 #1: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
"test"[1] 192.168.20.221 #1: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY oursig= theirsig= cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1024}
"test"[1] 192.168.20.221 #1: the peer proposed: 192.168.1.0/24:0/0 -> 192.168.20.221/32:0/0
"test"[1] 192.168.20.221 #2: responding to Quick Mode proposal {msgid:06ccbd3e}
"test"[1] 192.168.20.221 #2: us: 192.168.1.0/24===192.168.20.193
"test"[1] 192.168.20.221 #2: them: 192.168.20.221
"test"[1] 192.168.20.221 #2: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
"test"[1] 192.168.20.221 #2: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
pluto_crypto_helper: helper (2) is normal exiting
pluto_crypto_helper: helper (0) is normal exiting
pluto_crypto_helper: helper (1) is normal exiting ### Segmentation fault
It's been a long time coming,I hope it works out
The text was updated successfully, but these errors were encountered:
using /dev/urandom as source of random entropy
using /dev/urandom as source of random entropy
using /dev/urandom as source of random entropy
adding connection: "test"
listening for IKE messages
adding interface ipsec0/eth0.2 192.168.20.193:500
adding interface ipsec0/eth0.2 192.168.20.193:4500
adding interface ipsec0/eth0.2 fd7d:1ae2:819c:0:12ea:daff:fe11:2a32:500
adding interface ipsec0/eth0.2 fd7d:1ae2:819c::8c6:500
loading secrets from "/etc/ipsec.secrets"
[ 6507.895264] do_page_fault(): sending SIGSEGV to pluto for invalid read access from 000001b8
[ 6507.911912] epc = 55659933 in pluto[555ef000+bb000]
[ 6507.921665] ra = 55631057 in pluto[555ef000+bb000]
packet from 192.168.20.221:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
packet from 192.168.20.221:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] method set to=106
packet from 192.168.20.221:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] method set to=108
packet from 192.168.20.221:500: received Vendor ID payload [RFC 3947] method set to=115
packet from 192.168.20.221:500: received Vendor ID payload [Dead Peer Detection]
"test" #1: responding to Main Mode
"test" #1: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
"test" #1: STATE_MAIN_R1: sent MR1, expecting MI2
"test" #1: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): no NAT detected
"test" #1: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
"test" #1: STATE_MAIN_R2: sent MR2, expecting MI3
| WARNING: openswan-2.6.51.5/programs/pluto/crypt_start_dh.c:160: encryptor '3des' expects keylen 24/192, SA #1 INITIATOR keylen is 20
| WARNING: openswan-2.6.51.5/programs/pluto/crypt_start_dh.c:160: encryptor '3des' expects keylen 24/192, SA #1 RESPONDER keylen is 0
| WARNING: openswan-2.6.51.5/programs/pluto/ikev1_main.c:1206: encryptor '3des' expects keylen 24/192, SA #1 INITIATOR keylen is 20
| WARNING: openswan-2.6.51.5/programs/pluto/ikev1_main.c:1206: encryptor '3des' expects keylen 24/192, SA #1 RESPONDER keylen is 0
"test" #1: Main mode peer ID is ID_IPV4_ADDR: '192.168.20.221'
"test" #1: switched from "test" to "test"
"test"[1] 192.168.20.221 #1: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
"test"[1] 192.168.20.221 #1: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY oursig= theirsig= cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1024}
"test"[1] 192.168.20.221 #1: the peer proposed: 192.168.1.0/24:0/0 -> 192.168.20.221/32:0/0
"test"[1] 192.168.20.221 #2: responding to Quick Mode proposal {msgid:06ccbd3e}
"test"[1] 192.168.20.221 #2: us: 192.168.1.0/24===192.168.20.193
"test"[1] 192.168.20.221 #2: them: 192.168.20.221
"test"[1] 192.168.20.221 #2: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
"test"[1] 192.168.20.221 #2: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
pluto_crypto_helper: helper (2) is normal exiting
pluto_crypto_helper: helper (0) is normal exiting
pluto_crypto_helper: helper (1) is normal exiting
### Segmentation fault
It's been a long time coming,I hope it works out
The text was updated successfully, but these errors were encountered: