west:~#
 TESTNAME=tpm-accept-01
west:~#
 source /testing/pluto/bin/westlocal.sh
west:~#
 ipsec setup start
ipsec_setup: Starting Openswan IPsec VERSION
west:~#
 ipsec auto --add west--east-psk
west:~#
 echo done
done
west:~#
 

west:~#
 cat /tmp/pluto.log
Plutorun started on DATE
Starting Pluto (Openswan Version 2.5.0cl8 X.509-1.5.4 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR; Vendor ID OEQAUNTmsT]Y)
WARNING: 1DES is enabled
Setting NAT-Traversal port-4500 floating to off
   port floating activation criteria nat_t=0/port_float=1
   including NAT-Traversal patch (Version 0.6c) [disabled]
WARNING: open of /dev/hw_random failed: No such file or directory
using /dev/random as source of random entropy
ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC_SSH: Ok (ret=0)
ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC: Ok (ret=0)
ike_alg_register_enc(): Activating OAKLEY_SERPENT_CBC: Ok (ret=0)
ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
ike_alg_register_enc(): Activating OAKLEY_BLOWFISH_CBC: Ok (ret=0)
ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0)
ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0)
starting up 1 cryptographic helpers
WARNING: open of /dev/hw_random failed: No such file or directory
using /dev/random as source of random entropy
started helper pid=999 (fd:9)
No file '/tmp/tpm-accept-01/ipsec.d/tpm.tcl' found, TPM disabled 
Changing to directory '/tmp/tpm-accept-01/ipsec.d/cacerts'
  loaded CA cert file 'caCert.pem' (4854 bytes)
Changing to directory '/tmp/tpm-accept-01/ipsec.d/aacerts'
Changing to directory '/tmp/tpm-accept-01/ipsec.d/ocspcerts'
Changing to directory '/tmp/tpm-accept-01/ipsec.d/crls'
  loaded crl file 'nic.crl' (642 bytes)
  loaded crl file 'crashcrl-3.pem' (690 bytes)
crl issuer cacert not found for (file:///tmp/tpm-accept-01/ipsec.d/crls/crashcrl-3.pem)
  loaded crl file 'crashcrl-2.pem' (528 bytes)
crl issuer cacert not found for (file:///tmp/tpm-accept-01/ipsec.d/crls/crashcrl-2.pem)
  loaded crl file 'crashcrl-1.pem' (1053 bytes)
crl issuer cacert not found for (file:///tmp/tpm-accept-01/ipsec.d/crls/crashcrl-1.pem)
added connection description "west--east-psk"
listening for IKE messages
adding interface ipsec0/eth1 192.1.2.45:500
loading secrets from "/tmp/tpm-accept-01/ipsec.secrets"
  loaded private key file '/etc/ipsec.d/private/west.pem' (963 bytes)
packet from 192.1.2.23:500: received Vendor ID payload [Openswan (this version) 2.5.0cl8  X.509-1.5.4 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR]
packet from 192.1.2.23:500: received Vendor ID payload [Dead Peer Detection]
"west--east-psk" #1: responding to Main Mode
"west--east-psk" #1: Oakley Transform [OAKLEY_DES_CBC (64), OAKLEY_MD5, OAKLEY_GROUP_MODP1536] refused due to insecure key_len and enc. alg. not listed in "ike" string
"west--east-psk" #1: Oakley Transform [OAKLEY_DES_CBC (64), OAKLEY_SHA1, OAKLEY_GROUP_MODP1536] refused due to insecure key_len and enc. alg. not listed in "ike" string
"west--east-psk" #1: Oakley Transform [OAKLEY_DES_CBC (64), OAKLEY_MD5, OAKLEY_GROUP_MODP1024] refused due to insecure key_len and enc. alg. not listed in "ike" string
"west--east-psk" #1: Oakley Transform [OAKLEY_DES_CBC (64), OAKLEY_SHA1, OAKLEY_GROUP_MODP1024] refused due to insecure key_len and enc. alg. not listed in "ike" string
"west--east-psk" #1: no acceptable Oakley Transform
"west--east-psk" #1: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.23:500
packet from 192.1.2.23:500: received Vendor ID payload [Openswan (this version) 2.5.0cl8  X.509-1.5.4 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR]
packet from 192.1.2.23:500: received Vendor ID payload [Dead Peer Detection]
"west--east-psk" #2: responding to Main Mode
"west--east-psk" #2: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
"west--east-psk" #2: STATE_MAIN_R1: sent MR1, expecting MI2
"west--east-psk" #2: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
"west--east-psk" #2: STATE_MAIN_R2: sent MR2, expecting MI3
"west--east-psk" #2: Main mode peer ID is ID_IPV4_ADDR: '192.1.2.23'
"west--east-psk" #2: I did not send a certificate because digital signatures are not being used. (PSK)
"west--east-psk" #2: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
"west--east-psk" #2: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}
"west--east-psk" #3: responding to Quick Mode 
"west--east-psk" #3: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
"west--east-psk" #3: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
"west--east-psk" #3: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
"west--east-psk" #3: STATE_QUICK_R2: IPsec SA established
"west--east-psk" #2: received Delete SA(0xSPI1SPI1) payload: deleting IPSEC State #NUM
"west--east-psk" #2: received and ignored informational message
"west--east-psk" #2: received Delete SA payload: deleting ISAKMP State #2
packet from 192.1.2.23:500: received and ignored informational message
west:~#
 if [ -f /tmp/core ]; then echo CORE FOUND; mv /tmp/core /var/tmp; fi
west:~#

