evaltest.dat 1.5 KB

12345678910111213141516171819
  1. moon:: cat /var/log/daemon.log::whitelist functionality was already enabled::YES
  2. moon:: cat /var/log/daemon.log::authentication of 'carol@strongswan.org' with RSA.* successful::YES
  3. moon:: cat /var/log/daemon.log::authentication of 'dave@strongswan.org' with RSA.* successful::YES
  4. moon:: cat /var/log/daemon.log::peer identity 'dave@strongswan.org' not whitelisted::YES
  5. carol::ipsec status 2> /dev/null::home.*INSTALLED, TUNNEL::YES
  6. carol::ping -c 1 PH_IP_ALICE::64 bytes from PH_IP_ALICE: icmp_.eq=1::YES
  7. dave:: cat /var/log/daemon.log:: received AUTHENTICATION_FAILED notify error::YES
  8. dave:: ipsec status 2> /dev/null::home.*INSTALLED::NO
  9. dave:: ping -c 1 -W 1 PH_IP_ALICE::64 bytes from PH_IP_ALICE: icmp_.eq=1::NO
  10. moon:: ipsec status 2> /dev/null::rw.*ESTABLISHED.*moon.strongswan.org.*carol@strongswan.org::YES
  11. moon:: ipsec status 2> /dev/null::rw.*ESTABLISHED.*moon.strongswan.org.*dave@strongswan.org::NO
  12. moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP::YES
  13. moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP::YES
  14. moon::tcpdump::IP dave.strongswan.org > moon.strongswan.org: ESP::NO
  15. moon::tcpdump::IP moon.strongswan.org > dave.strongswan.org: ESP::NO
  16. alice::tcpdump::IP carol1.strongswan.org > alice.strongswan.org: ICMP echo request::YES
  17. alice::tcpdump::IP alice.strongswan.org > carol1.strongswan.org: ICMP echo reply::YES
  18. alice::tcpdump::IP dave1.strongswan.org > alice.strongswan.org: ICMP echo request::NO
  19. alice::tcpdump::IP alice.strongswan.org > dave1.strongswan.org: ICMP echo reply::NO