west:~#
 TESTNAME=tpm-accept-04
west:~#
 source /testing/pluto/bin/westlocal.sh
west:~#
 ipsec setup start
ipsec_setup: Starting Openswan IPsec VERSION
west:~#
 /testing/pluto/bin/wait-until-pluto-started
west:~#
 ipsec auto --add west--east-psk
west:~#
 ipsec auto --replace west--east-psk
west:~#
 ipsec auto --up west--east-psk
104 "west--east-psk" #1: STATE_MAIN_I1: initiate
003 "west--east-psk" #1: received Vendor ID payload [Openswan 
003 "west--east-psk" #1: received Vendor ID payload [Dead Peer Detection]
106 "west--east-psk" #1: STATE_MAIN_I2: sent MI2, expecting MR2
108 "west--east-psk" #1: STATE_MAIN_I3: sent MI3, expecting MR3
004 "west--east-psk" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}
117 "west--east-psk" #2: STATE_QUICK_I1: initiate
004 "west--east-psk" #2: STATE_QUICK_I2: sent QI2, IPsec SA established
west:~#
 ipsec auto --replace west--east-psk
west:~#
 ipsec auto --up west--east-psk
104 "west--east-psk" #3: STATE_MAIN_I1: initiate
003 "west--east-psk" #3: received Vendor ID payload [Openswan 
003 "west--east-psk" #3: received Vendor ID payload [Dead Peer Detection]
106 "west--east-psk" #3: STATE_MAIN_I2: sent MI2, expecting MR2
108 "west--east-psk" #3: STATE_MAIN_I3: sent MI3, expecting MR3
003 "west--east-psk" #3: next payload type of ISAKMP Identification Payload has an unknown value: VALUE
003 "west--east-psk" #3: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
003 "west--east-psk" #3: next payload type of ISAKMP Identification Payload has an unknown value: VALUE
003 "west--east-psk" #3: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
003 "west--east-psk" #3: next payload type of ISAKMP Identification Payload has an unknown value: VALUE
003 "west--east-psk" #3: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
031 "west--east-psk" #3: max number of retransmissions (2) reached STATE_MAIN_I3.  Possible authentication failure: no acceptable response to our first encrypted message
000 "west--east-psk" #3: starting keying attempt 2 of an unlimited number, but releasing whack
west:~#
 echo done
done
west:~#
 ipsec auto --replace west--east-psk
west:~#
 ipsec auto --up west--east-psk
104 "west--east-psk" #6: STATE_MAIN_I1: initiate
003 "west--east-psk" #6: received Vendor ID payload [Openswan 
003 "west--east-psk" #6: received Vendor ID payload [Dead Peer Detection]
106 "west--east-psk" #6: STATE_MAIN_I2: sent MI2, expecting MR2
108 "west--east-psk" #6: STATE_MAIN_I3: sent MI3, expecting MR3
004 "west--east-psk" #6: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}
117 "west--east-psk" #7: STATE_QUICK_I1: initiate
003 "west--east-psk" #7: malformed payload in packet
003 "west--east-psk" #7: malformed payload in packet
003 "west--east-psk" #7: malformed payload in packet
003 "west--east-psk" #7: malformed payload in packet
031 "west--east-psk" #7: max number of retransmissions (2) reached STATE_QUICK_I1.  No acceptable response to our first Quick Mode message: perhaps peer likes no proposal
000 "west--east-psk" #7: starting keying attempt 2 of an unlimited number, but releasing whack
west:~#
 ipsec auto --delete west--east-psk
west:~#
 echo done
done
west:~#
 

west:~#
west:~#
 cat /tmp/pluto.log
Plutorun started on DATE
Starting Pluto (Openswan Version 2.5.0cl8 X.509-1.5.4 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR; Vendor ID OEQAUNTmsT]Y)
WARNING: 1DES is enabled
Setting NAT-Traversal port-4500 floating to off
   port floating activation criteria nat_t=0/port_float=1
   including NAT-Traversal patch (Version 0.6c) [disabled]
WARNING: open of /dev/hw_random failed: No such file or directory
using /dev/random as source of random entropy
ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC_SSH: Ok (ret=0)
ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC: Ok (ret=0)
ike_alg_register_enc(): Activating OAKLEY_SERPENT_CBC: Ok (ret=0)
ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
ike_alg_register_enc(): Activating OAKLEY_BLOWFISH_CBC: Ok (ret=0)
ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0)
ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0)
starting up 1 cryptographic helpers
WARNING: open of /dev/hw_random failed: No such file or directory
using /dev/random as source of random entropy
started helper pid=999 (fd:9)
No file '/tmp/tpm-accept-04/ipsec.d/tpm.tcl' found, TPM disabled 
Changing to directory '/tmp/tpm-accept-04/ipsec.d/cacerts'
  loaded CA cert file 'caCert.pem' (4854 bytes)
Changing to directory '/tmp/tpm-accept-04/ipsec.d/aacerts'
Changing to directory '/tmp/tpm-accept-04/ipsec.d/ocspcerts'
Changing to directory '/tmp/tpm-accept-04/ipsec.d/crls'
  loaded crl file 'nic.crl' (642 bytes)
  loaded crl file 'crashcrl-3.pem' (690 bytes)
crl issuer cacert not found for (file:///tmp/tpm-accept-04/ipsec.d/crls/crashcrl-3.pem)
  loaded crl file 'crashcrl-2.pem' (528 bytes)
crl issuer cacert not found for (file:///tmp/tpm-accept-04/ipsec.d/crls/crashcrl-2.pem)
  loaded crl file 'crashcrl-1.pem' (1053 bytes)
crl issuer cacert not found for (file:///tmp/tpm-accept-04/ipsec.d/crls/crashcrl-1.pem)
listening for IKE messages
adding interface ipsec0/eth1 192.1.2.45:500
loading secrets from "/tmp/tpm-accept-04/ipsec.secrets"
  loaded private key file '/etc/ipsec.d/private/west.pem' (963 bytes)
listening for IKE messages
forgetting secrets
loading secrets from "/tmp/tpm-accept-04/ipsec.secrets"
  loaded private key file '/etc/ipsec.d/private/west.pem' (963 bytes)
added connection description "west--east-psk"
"west--east-psk": deleting connection
added connection description "west--east-psk"
"west--east-psk" #1: initiating Main Mode
"west--east-psk" #1: received Vendor ID payload [Openswan (this version) 2.5.0cl8  X.509-1.5.4 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR]
"west--east-psk" #1: received Vendor ID payload [Dead Peer Detection]
"west--east-psk" #1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
"west--east-psk" #1: STATE_MAIN_I2: sent MI2, expecting MR2
"west--east-psk" #1: I did not send a certificate because digital signatures are not being used. (PSK)
"west--east-psk" #1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
"west--east-psk" #1: STATE_MAIN_I3: sent MI3, expecting MR3
"west--east-psk" #1: Main mode peer ID is ID_IPV4_ADDR: '192.1.2.23'
"west--east-psk" #1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
"west--east-psk" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}
"west--east-psk" #2: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+UP
"west--east-psk" #2: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
"west--east-psk" #2: STATE_QUICK_I2: sent QI2, IPsec SA established
"west--east-psk": deleting connection
"west--east-psk" #2: deleting state (STATE_QUICK_I2)
"west--east-psk" #1: deleting state (STATE_MAIN_I4)
added connection description "west--east-psk"
"west--east-psk" #3: initiating Main Mode
"west--east-psk" #3: received Vendor ID payload [Openswan (this version) 2.5.0cl8  X.509-1.5.4 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR]
"west--east-psk" #3: received Vendor ID payload [Dead Peer Detection]
"west--east-psk" #3: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
"west--east-psk" #3: STATE_MAIN_I2: sent MI2, expecting MR2
"west--east-psk" #3: I did not send a certificate because digital signatures are not being used. (PSK)
"west--east-psk" #3: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
"west--east-psk" #3: STATE_MAIN_I3: sent MI3, expecting MR3
"west--east-psk" #3: next payload type of ISAKMP Identification Payload has an unknown value: VALUE
"west--east-psk" #3: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
"west--east-psk" #3: sending notification PAYLOAD_MALFORMED to 192.1.2.23:500
"west--east-psk" #3: next payload type of ISAKMP Identification Payload has an unknown value: VALUE
"west--east-psk" #3: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
"west--east-psk" #3: sending notification PAYLOAD_MALFORMED to 192.1.2.23:500
"west--east-psk" #3: next payload type of ISAKMP Identification Payload has an unknown value: VALUE
"west--east-psk" #3: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
"west--east-psk" #3: sending notification PAYLOAD_MALFORMED to 192.1.2.23:500
"west--east-psk" #3: max number of retransmissions (2) reached STATE_MAIN_I3.  Possible authentication failure: no acceptable response to our first encrypted message
"west--east-psk" #3: starting keying attempt 2 of an unlimited number, but releasing whack
"west--east-psk" #4: initiating Main Mode to replace #3
"west--east-psk" #4: received Vendor ID payload [Openswan (this version) 2.5.0cl8  X.509-1.5.4 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR]
"west--east-psk" #4: received Vendor ID payload [Dead Peer Detection]
"west--east-psk" #4: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
"west--east-psk" #4: STATE_MAIN_I2: sent MI2, expecting MR2
"west--east-psk" #4: I did not send a certificate because digital signatures are not being used. (PSK)
"west--east-psk" #4: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
"west--east-psk" #4: STATE_MAIN_I3: sent MI3, expecting MR3
"west--east-psk" #4: Main mode peer ID is ID_IPV4_ADDR: '192.1.2.23'
"west--east-psk" #4: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
"west--east-psk" #4: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}
"west--east-psk" #5: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+UP
"west--east-psk" #5: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
"west--east-psk" #5: STATE_QUICK_I2: sent QI2, IPsec SA established
"west--east-psk": deleting connection
"west--east-psk" #5: deleting state (STATE_QUICK_I2)
"west--east-psk" #4: deleting state (STATE_MAIN_I4)
added connection description "west--east-psk"
"west--east-psk" #6: initiating Main Mode
"west--east-psk" #6: received Vendor ID payload [Openswan (this version) 2.5.0cl8  X.509-1.5.4 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR]
"west--east-psk" #6: received Vendor ID payload [Dead Peer Detection]
"west--east-psk" #6: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
"west--east-psk" #6: STATE_MAIN_I2: sent MI2, expecting MR2
"west--east-psk" #6: I did not send a certificate because digital signatures are not being used. (PSK)
"west--east-psk" #6: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
"west--east-psk" #6: STATE_MAIN_I3: sent MI3, expecting MR3
"west--east-psk" #6: Main mode peer ID is ID_IPV4_ADDR: '192.1.2.23'
"west--east-psk" #6: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
"west--east-psk" #6: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}
"west--east-psk" #7: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+UP
"west--east-psk" #7: malformed payload in packet
"west--east-psk" #7: sending notification PAYLOAD_MALFORMED to 192.1.2.23:500
"west--east-psk" #7: malformed payload in packet
"west--east-psk" #7: sending notification PAYLOAD_MALFORMED to 192.1.2.23:500
"west--east-psk" #7: malformed payload in packet
"west--east-psk" #7: sending notification PAYLOAD_MALFORMED to 192.1.2.23:500
"west--east-psk" #7: malformed payload in packet
"west--east-psk" #7: sending notification PAYLOAD_MALFORMED to 192.1.2.23:500
"west--east-psk" #7: max number of retransmissions (2) reached STATE_QUICK_I1.  No acceptable response to our first Quick Mode message: perhaps peer likes no proposal
"west--east-psk" #7: starting keying attempt 2 of an unlimited number, but releasing whack
"west--east-psk" #8: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+UP to replace #7
"west--east-psk" #8: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
"west--east-psk" #8: STATE_QUICK_I2: sent QI2, IPsec SA established
"west--east-psk": deleting connection
"west--east-psk" #8: deleting state (STATE_QUICK_I2)
"west--east-psk" #6: deleting state (STATE_MAIN_I4)
west:~#
 if [ -f /tmp/core ]; then echo CORE FOUND; mv /tmp/core /var/tmp; fi
west:~#

