whackwest --name ipsec-oppo-halfbroad --delete --rsa --pfs --host 127.95.7.1 --ikeport 8500 --nexthop 127.95.7.254 --updown silly --to --updown sally --host %opportunistic --ikeport 8500 --client 127.95.7.20/31 --encrypt --rekeymargin 350 --ikelifetime 900 --ipseclifetime 800 --keyingtries 2
002 added connection description "ipsec-oppo-halfbroad"
whackwest --name ipsec-oppo --delete --rsa --pfs --host 127.95.7.1 --ikeport 8500 --nexthop 127.95.7.254 --updown silly --to --updown sally --host %opportunistic --ikeport 8500 --client 127.95.7.21/32 --encrypt --rekeymargin 350 --ikelifetime 900 --ipseclifetime 800 --keyingtries 2
002 added connection description "ipsec-oppo"
whackwest --name ipsec-oppo-broad --delete --rsa --pfs --host 127.95.7.1 --ikeport 8500 --nexthop 127.95.7.254 --updown silly --to --updown sally --host %opportunistic --ikeport 8500 --client 127.95.7.20/30 --encrypt --rekeymargin 350 --ikelifetime 900 --ipseclifetime 800 --keyingtries 2
002 added connection description "ipsec-oppo-broad"
whackeast --name ipsec-oppo-broad --delete --rsa --pfs --host %opportunistic --ikeport 8500 --client 127.95.7.1/32 --updown silly --to --updown sally --host 127.95.7.2 --ikeport 8500 --client 127.95.7.20/30 --nexthop 127.95.7.254 --encrypt --rekeymargin 350 --ikelifetime 900 --ipseclifetime 800 --keyingtries 2
002 added connection description "ipsec-oppo-broad"
whackeast --name ipsec-oppo --delete --rsa --pfs --host %opportunistic --ikeport 8500 --client 127.95.7.1/32 --updown silly --to --updown sally --host 127.95.7.2 --ikeport 8500 --client 127.95.7.21/32 --nexthop 127.95.7.254 --encrypt --rekeymargin 350 --ikelifetime 900 --ipseclifetime 800 --keyingtries 2
002 added connection description "ipsec-oppo"
whackeast --name ipsec-oppo-halfbroad --delete --rsa --pfs --host %opportunistic --ikeport 8500 --client 127.95.7.1/32 --updown silly --to --updown sally --host 127.95.7.2 --ikeport 8500 --client 127.95.7.20/31 --nexthop 127.95.7.254 --encrypt --rekeymargin 350 --ikelifetime 900 --ipseclifetime 800 --keyingtries 2
002 added connection description "ipsec-oppo-halfbroad"
whackwest --listen
002 listening for IKE messages
002 adding interface virtual127.95.7.1/lo:w 127.95.7.1
002 loading secrets from "/tmp/ipsec.secrets/west"
whackeast --listen
002 listening for IKE messages
002 adding interface virtual127.95.7.2/lo:e 127.95.7.2
002 loading secrets from "/tmp/ipsec.secrets/east"
whackwest --route --name ipsec-oppo-broad
whackeast --route --name ipsec-oppo-broad
whackwest --route --name ipsec-oppo
whackeast --route --name ipsec-oppo
whackwest --route --name ipsec-oppo-halfbroad
whackeast --route --name ipsec-oppo-halfbroad
whackwest --status
000 interface virtual127.95.7.1/lo:w 127.95.7.1
000 %myid = (none)
000 debug raw+crypt+parsing+emitting+control+lifecycle+klips+dns+oppo+controlmore+pfkey+nattraversal+x509+private
000  
000  
000 algorithm IKE encrypt: id=7, name=OAKLEY_AES_CBC, blocksize=16, keydeflen=128
000 algorithm IKE encrypt: id=5, name=OAKLEY_3DES_CBC, blocksize=8, keydeflen=192
000 algorithm IKE hash: id=2, name=OAKLEY_SHA, hashsize=20
000 algorithm IKE hash: id=1, name=OAKLEY_MD5, hashsize=16
000 algorithm IKE dh group: id=2, name=OAKLEY_GROUP_MODP1024, bits=1024
000 algorithm IKE dh group: id=5, name=OAKLEY_GROUP_MODP1536, bits=1536
000 algorithm IKE dh group: id=14, name=OAKLEY_GROUP_MODP2048, bits=2048
000 algorithm IKE dh group: id=15, name=OAKLEY_GROUP_MODP3072, bits=3072
000 algorithm IKE dh group: id=16, name=OAKLEY_GROUP_MODP4096, bits=4096
000 algorithm IKE dh group: id=17, name=OAKLEY_GROUP_MODP6144, bits=6144
000 algorithm IKE dh group: id=18, name=OAKLEY_GROUP_MODP8192, bits=8192
000  
000  
000 "ipsec-oppo": 127.95.7.1:8500[S?C]---127.95.7.254...%opportunistic:8500[S?C]===127.95.7.21/32; prospective erouted; eroute owner: #0
000 "ipsec-oppo":   ike_life: 900s; ipsec_life: 800s; rekey_margin: 350s; rekey_fuzz: 100%; keyingtries: 2
000 "ipsec-oppo":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC+rKOD; prio: 32,32; interface: lo:w; 
000 "ipsec-oppo":   newest ISAKMP SA: #0; newest IPsec SA: #0; 
000 "ipsec-oppo-broad": 127.95.7.1:8500[S?C]---127.95.7.254...%opportunistic:8500[S?C]===127.95.7.20/30; prospective erouted; eroute owner: #0
000 "ipsec-oppo-broad":   ike_life: 900s; ipsec_life: 800s; rekey_margin: 350s; rekey_fuzz: 100%; keyingtries: 2
000 "ipsec-oppo-broad":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC+rKOD; prio: 32,30; interface: lo:w; 
000 "ipsec-oppo-broad":   newest ISAKMP SA: #0; newest IPsec SA: #0; 
000 "ipsec-oppo-halfbroad": 127.95.7.1:8500[S?C]---127.95.7.254...%opportunistic:8500[S?C]===127.95.7.20/31; prospective erouted; eroute owner: #0
000 "ipsec-oppo-halfbroad":   ike_life: 900s; ipsec_life: 800s; rekey_margin: 350s; rekey_fuzz: 100%; keyingtries: 2
000 "ipsec-oppo-halfbroad":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC+rKOD; prio: 32,31; interface: lo:w; 
000 "ipsec-oppo-halfbroad":   newest ISAKMP SA: #0; newest IPsec SA: #0; 
000  
000  
whackeast --status
000 interface virtual127.95.7.2/lo:e 127.95.7.2
000 %myid = (none)
000 debug raw+crypt+parsing+emitting+control+lifecycle+klips+dns+oppo+controlmore+pfkey+nattraversal+x509+private
000  
000  
000 algorithm IKE encrypt: id=7, name=OAKLEY_AES_CBC, blocksize=16, keydeflen=128
000 algorithm IKE encrypt: id=5, name=OAKLEY_3DES_CBC, blocksize=8, keydeflen=192
000 algorithm IKE hash: id=2, name=OAKLEY_SHA, hashsize=20
000 algorithm IKE hash: id=1, name=OAKLEY_MD5, hashsize=16
000 algorithm IKE dh group: id=2, name=OAKLEY_GROUP_MODP1024, bits=1024
000 algorithm IKE dh group: id=5, name=OAKLEY_GROUP_MODP1536, bits=1536
000 algorithm IKE dh group: id=14, name=OAKLEY_GROUP_MODP2048, bits=2048
000 algorithm IKE dh group: id=15, name=OAKLEY_GROUP_MODP3072, bits=3072
000 algorithm IKE dh group: id=16, name=OAKLEY_GROUP_MODP4096, bits=4096
000 algorithm IKE dh group: id=17, name=OAKLEY_GROUP_MODP6144, bits=6144
000 algorithm IKE dh group: id=18, name=OAKLEY_GROUP_MODP8192, bits=8192
000  
000  
000 "ipsec-oppo": 127.95.7.21/32===127.95.7.2:8500[S?C]---127.95.7.254...%opportunistic:8500[S?C]===127.95.7.1/32; prospective erouted; eroute owner: #0
000 "ipsec-oppo":   ike_life: 900s; ipsec_life: 800s; rekey_margin: 350s; rekey_fuzz: 100%; keyingtries: 2
000 "ipsec-oppo":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC+rKOD; prio: 32,32; interface: lo:e; 
000 "ipsec-oppo":   newest ISAKMP SA: #0; newest IPsec SA: #0; 
000 "ipsec-oppo-broad": 127.95.7.20/30===127.95.7.2:8500[S?C]---127.95.7.254...%opportunistic:8500[S?C]===127.95.7.1/32; prospective erouted; eroute owner: #0
000 "ipsec-oppo-broad":   ike_life: 900s; ipsec_life: 800s; rekey_margin: 350s; rekey_fuzz: 100%; keyingtries: 2
000 "ipsec-oppo-broad":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC+rKOD; prio: 30,32; interface: lo:e; 
000 "ipsec-oppo-broad":   newest ISAKMP SA: #0; newest IPsec SA: #0; 
000 "ipsec-oppo-halfbroad": 127.95.7.20/31===127.95.7.2:8500[S?C]---127.95.7.254...%opportunistic:8500[S?C]===127.95.7.1/32; prospective erouted; eroute owner: #0
000 "ipsec-oppo-halfbroad":   ike_life: 900s; ipsec_life: 800s; rekey_margin: 350s; rekey_fuzz: 100%; keyingtries: 2
000 "ipsec-oppo-halfbroad":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC+rKOD; prio: 31,32; interface: lo:e; 
000 "ipsec-oppo-halfbroad":   newest ISAKMP SA: #0; newest IPsec SA: #0; 
000  
000  
whackwest --oppohere 127.95.7.1 --oppothere 127.95.7.21
002 "ipsec-oppo"[1] ...127.95.7.2===127.95.7.21/32 #1: initiating Main Mode
104 "ipsec-oppo"[1] ...127.95.7.2===127.95.7.21/32 #1: STATE_MAIN_I1: initiate
106 "ipsec-oppo"[1] ...127.95.7.2===127.95.7.21/32 #1: STATE_MAIN_I2: sent MI2, expecting MR2
002 "ipsec-oppo"[1] ...127.95.7.2===127.95.7.21/32 #1: I did not send a certificate because I do not have one.
108 "ipsec-oppo"[1] ...127.95.7.2===127.95.7.21/32 #1: STATE_MAIN_I3: sent MI3, expecting MR3
002 "ipsec-oppo"[1] ...127.95.7.2===127.95.7.21/32 #1: ISAKMP SA established
004 "ipsec-oppo"[1] ...127.95.7.2===127.95.7.21/32 #1: STATE_MAIN_I4: ISAKMP SA established
002 "ipsec-oppo"[1] ...127.95.7.2===127.95.7.21/32 #2: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC
112 "ipsec-oppo"[1] ...127.95.7.2===127.95.7.21/32 #2: STATE_QUICK_I1: initiate
002 "ipsec-oppo"[1] ...127.95.7.2===127.95.7.21/32 #2: sent QI2, IPsec SA established
004 "ipsec-oppo"[1] ...127.95.7.2===127.95.7.21/32 #2: STATE_QUICK_I2: sent QI2, IPsec SA established
whackwest --status
000 interface virtual127.95.7.1/lo:w 127.95.7.1
000 %myid = (none)
000 debug raw+crypt+parsing+emitting+control+lifecycle+klips+dns+oppo+controlmore+pfkey+nattraversal+x509+private
000  
000  
000 algorithm IKE encrypt: id=7, name=OAKLEY_AES_CBC, blocksize=16, keydeflen=128
000 algorithm IKE encrypt: id=5, name=OAKLEY_3DES_CBC, blocksize=8, keydeflen=192
000 algorithm IKE hash: id=2, name=OAKLEY_SHA, hashsize=20
000 algorithm IKE hash: id=1, name=OAKLEY_MD5, hashsize=16
000 algorithm IKE dh group: id=2, name=OAKLEY_GROUP_MODP1024, bits=1024
000 algorithm IKE dh group: id=5, name=OAKLEY_GROUP_MODP1536, bits=1536
000 algorithm IKE dh group: id=14, name=OAKLEY_GROUP_MODP2048, bits=2048
000 algorithm IKE dh group: id=15, name=OAKLEY_GROUP_MODP3072, bits=3072
000 algorithm IKE dh group: id=16, name=OAKLEY_GROUP_MODP4096, bits=4096
000 algorithm IKE dh group: id=17, name=OAKLEY_GROUP_MODP6144, bits=6144
000 algorithm IKE dh group: id=18, name=OAKLEY_GROUP_MODP8192, bits=8192
000  
000  
000 "ipsec-oppo": 127.95.7.1:8500[S?C]---127.95.7.254...%opportunistic:8500[S?C]===127.95.7.21/32; prospective erouted; eroute owner: #0
000 "ipsec-oppo":   ike_life: 900s; ipsec_life: 800s; rekey_margin: 350s; rekey_fuzz: 100%; keyingtries: 2
000 "ipsec-oppo":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC+rKOD; prio: 32,32; interface: lo:w; 
000 "ipsec-oppo":   newest ISAKMP SA: #0; newest IPsec SA: #0; 
000 "ipsec-oppo"[1]: 127.95.7.1:8500[S?C]---127.95.7.254...127.95.7.2:8500[S?C]===127.95.7.21/32; erouted; eroute owner: #2
000 "ipsec-oppo"[1]:   ike_life: 900s; ipsec_life: 800s; rekey_margin: 350s; rekey_fuzz: 100%; keyingtries: 2
000 "ipsec-oppo"[1]:   policy: RSASIG+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC+rKOD; prio: 32,32; interface: lo:w; 
000 "ipsec-oppo"[1]:   newest ISAKMP SA: #1; newest IPsec SA: #2; 
000 "ipsec-oppo"[1]:   IKE algorithm newest: 3DES_CBC_192-MD5-MODP1536
000 "ipsec-oppo-broad": 127.95.7.1:8500[S?C]---127.95.7.254...%opportunistic:8500[S?C]===127.95.7.20/30; prospective erouted; eroute owner: #0
000 "ipsec-oppo-broad":   ike_life: 900s; ipsec_life: 800s; rekey_margin: 350s; rekey_fuzz: 100%; keyingtries: 2
000 "ipsec-oppo-broad":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC+rKOD; prio: 32,30; interface: lo:w; 
000 "ipsec-oppo-broad":   newest ISAKMP SA: #0; newest IPsec SA: #0; 
000 "ipsec-oppo-halfbroad": 127.95.7.1:8500[S?C]---127.95.7.254...%opportunistic:8500[S?C]===127.95.7.20/31; prospective erouted; eroute owner: #0
000 "ipsec-oppo-halfbroad":   ike_life: 900s; ipsec_life: 800s; rekey_margin: 350s; rekey_fuzz: 100%; keyingtries: 2
000 "ipsec-oppo-halfbroad":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC+rKOD; prio: 32,31; interface: lo:w; 
000 "ipsec-oppo-halfbroad":   newest ISAKMP SA: #0; newest IPsec SA: #0; 
000  
000 #2: "ipsec-oppo"[1] ...127.95.7.2===127.95.7.21/32 STATE_QUICK_I2 (sent QI2, IPsec SA established); EVENT_SA_REPLACE in ???s; newest IPSEC; eroute owner
000 #2: "ipsec-oppo"[1] ...127.95.7.2===127.95.7.21/32 esp.???@127.95.7.2 esp.???@127.95.7.1 tun.1002@127.95.7.2 tun.1001@127.95.7.1
000 #1: "ipsec-oppo"[1] ...127.95.7.2===127.95.7.21/32 STATE_MAIN_I4 (ISAKMP SA established); EVENT_SA_REPLACE in ???s; newest ISAKMP
000  
whackeast --status
000 interface virtual127.95.7.2/lo:e 127.95.7.2
000 %myid = (none)
000 debug raw+crypt+parsing+emitting+control+lifecycle+klips+dns+oppo+controlmore+pfkey+nattraversal+x509+private
000  
000  
000 algorithm IKE encrypt: id=7, name=OAKLEY_AES_CBC, blocksize=16, keydeflen=128
000 algorithm IKE encrypt: id=5, name=OAKLEY_3DES_CBC, blocksize=8, keydeflen=192
000 algorithm IKE hash: id=2, name=OAKLEY_SHA, hashsize=20
000 algorithm IKE hash: id=1, name=OAKLEY_MD5, hashsize=16
000 algorithm IKE dh group: id=2, name=OAKLEY_GROUP_MODP1024, bits=1024
000 algorithm IKE dh group: id=5, name=OAKLEY_GROUP_MODP1536, bits=1536
000 algorithm IKE dh group: id=14, name=OAKLEY_GROUP_MODP2048, bits=2048
000 algorithm IKE dh group: id=15, name=OAKLEY_GROUP_MODP3072, bits=3072
000 algorithm IKE dh group: id=16, name=OAKLEY_GROUP_MODP4096, bits=4096
000 algorithm IKE dh group: id=17, name=OAKLEY_GROUP_MODP6144, bits=6144
000 algorithm IKE dh group: id=18, name=OAKLEY_GROUP_MODP8192, bits=8192
000  
000  
000 "ipsec-oppo": 127.95.7.21/32===127.95.7.2:8500[S?C]---127.95.7.254...%opportunistic:8500[S?C]===127.95.7.1/32; prospective erouted; eroute owner: #0
000 "ipsec-oppo":   ike_life: 900s; ipsec_life: 800s; rekey_margin: 350s; rekey_fuzz: 100%; keyingtries: 2
000 "ipsec-oppo":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC+rKOD; prio: 32,32; interface: lo:e; 
000 "ipsec-oppo":   newest ISAKMP SA: #0; newest IPsec SA: #0; 
000 "ipsec-oppo"[1]: 127.95.7.21/32===127.95.7.2:8500[S?C]---127.95.7.254...127.95.7.1:8500[S?C]; erouted; eroute owner: #2
000 "ipsec-oppo"[1]:   ike_life: 900s; ipsec_life: 800s; rekey_margin: 350s; rekey_fuzz: 100%; keyingtries: 2
000 "ipsec-oppo"[1]:   policy: RSASIG+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC+rKOD; prio: 32,32; interface: lo:e; 
000 "ipsec-oppo"[1]:   newest ISAKMP SA: #0; newest IPsec SA: #2; 
000 "ipsec-oppo-broad": 127.95.7.20/30===127.95.7.2:8500[S?C]---127.95.7.254...%opportunistic:8500[S?C]===127.95.7.1/32; prospective erouted; eroute owner: #0
000 "ipsec-oppo-broad":   ike_life: 900s; ipsec_life: 800s; rekey_margin: 350s; rekey_fuzz: 100%; keyingtries: 2
000 "ipsec-oppo-broad":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC+rKOD; prio: 30,32; interface: lo:e; 
000 "ipsec-oppo-broad":   newest ISAKMP SA: #0; newest IPsec SA: #0; 
000 "ipsec-oppo-broad"[1]: 127.95.7.20/30===127.95.7.2:8500[S?C]---127.95.7.254...127.95.7.1:8500[S?C]===?; unrouted; eroute owner: #0
000 "ipsec-oppo-broad"[1]:   ike_life: 900s; ipsec_life: 800s; rekey_margin: 350s; rekey_fuzz: 100%; keyingtries: 2
000 "ipsec-oppo-broad"[1]:   policy: RSASIG+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC+rKOD; prio: 30,32; interface: lo:e; 
000 "ipsec-oppo-broad"[1]:   newest ISAKMP SA: #1; newest IPsec SA: #0; 
000 "ipsec-oppo-broad"[1]:   IKE algorithm newest: 3DES_CBC_192-MD5-MODP1536
000 "ipsec-oppo-halfbroad": 127.95.7.20/31===127.95.7.2:8500[S?C]---127.95.7.254...%opportunistic:8500[S?C]===127.95.7.1/32; prospective erouted; eroute owner: #0
000 "ipsec-oppo-halfbroad":   ike_life: 900s; ipsec_life: 800s; rekey_margin: 350s; rekey_fuzz: 100%; keyingtries: 2
000 "ipsec-oppo-halfbroad":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC+rKOD; prio: 31,32; interface: lo:e; 
000 "ipsec-oppo-halfbroad":   newest ISAKMP SA: #0; newest IPsec SA: #0; 
000  
000 #2: "ipsec-oppo"[1] 127.95.7.21/32=== ...127.95.7.1 STATE_QUICK_R2 (IPsec SA established); EVENT_SA_REPLACE in ???s; newest IPSEC; eroute owner
000 #2: "ipsec-oppo"[1] 127.95.7.21/32=== ...127.95.7.1 esp.???@127.95.7.1 esp.???@127.95.7.2 tun.1002@127.95.7.1 tun.1001@127.95.7.2
000 #1: "ipsec-oppo-broad"[1] 127.95.7.20/30=== ...127.95.7.1===? STATE_MAIN_R3 (sent MR3, ISAKMP SA established); EVENT_SA_REPLACE in ???s; newest ISAKMP
000  
whackwest --shutdown
002 shutting down
whackeast --shutdown
002 shutting down
