whackwest --name opportunity --delete --rsa --pfs --host 128.95.7.1 --ikeport 8500 --nexthop 128.95.7.254 --updown silly --to --updown sally --host %opportunisticgroup --ikeport 8500 --encrypt --rekeymargin 350 --ikelifetime 900 --ipseclifetime 800 --keyingtries 2
002 added connection description "opportunity"
whackwest --name opportunity-mine --delete --rsa --pfs --host 128.95.7.1 --ikeport 8500 --client 128.95.7.8/30 --nexthop 128.95.7.254 --updown silly --to --updown sally --host %opportunisticgroup --ikeport 8500 --encrypt --rekeymargin 350 --ikelifetime 900 --ipseclifetime 800 --keyingtries 2
002 added connection description "opportunity-mine"
whackeast --name opportunity --delete --rsa --pfs --host %opportunisticgroup --ikeport 8500 --updown silly --to --updown sally --host 128.95.7.2 --ikeport 8500 --nexthop 128.95.7.254 --encrypt --rekeymargin 350 --ikelifetime 900 --ipseclifetime 800 --keyingtries 2
002 added connection description "opportunity"
whackeast --name opportunity-mine --delete --rsa --pfs --host %opportunisticgroup --ikeport 8500 --updown silly --to --updown sally --host 128.95.7.2 --ikeport 8500 --client 128.95.7.20/30 --nexthop 128.95.7.254 --encrypt --rekeymargin 350 --ikelifetime 900 --ipseclifetime 800 --keyingtries 2
002 added connection description "opportunity-mine"
whackwest --listen
002 listening for IKE messages
002 adding interface virtual128.95.7.1/lo:w 128.95.7.1:8500
002 loading secrets from "/tmp/ipsec.secrets/west"
002 loading group "/tmp/west/policies/opportunity-mine"
002 loading group "/tmp/west/policies/opportunity"
whackeast --listen
002 listening for IKE messages
002 adding interface virtual128.95.7.2/lo:e 128.95.7.2:8500
002 loading secrets from "/tmp/ipsec.secrets/east"
002 loading group "/tmp/east/policies/opportunity-mine"
002 loading group "/tmp/east/policies/opportunity"
whackwest --name opportunity --route
whackeast --name opportunity --route
whackwest --name opportunity-mine --route
whackeast --name opportunity-mine --route
whackwest --status
000 interface virtual128.95.7.1/lo:w 128.95.7.1
000 %myid = (none)
000 debug raw+crypt+parsing+emitting+control+lifecycle+klips+dns+oppo+controlmore+pfkey+nattraversal+x509+private
000  
000  
000 algorithm IKE encrypt: id=5, name=OAKLEY_3DES_CBC, blocksize=8, keydeflen=192
000 algorithm IKE encrypt: id=7, name=OAKLEY_AES_CBC, blocksize=16, keydeflen=128
000 algorithm IKE hash: id=1, name=OAKLEY_MD5, hashsize=16
000 algorithm IKE hash: id=2, name=OAKLEY_SHA1, hashsize=20
000 algorithm IKE dh group: id=2, name=OAKLEY_GROUP_MODP1024, bits=1024
000 algorithm IKE dh group: id=5, name=OAKLEY_GROUP_MODP1536, bits=1536
000 algorithm IKE dh group: id=14, name=OAKLEY_GROUP_MODP2048, bits=2048
000 algorithm IKE dh group: id=15, name=OAKLEY_GROUP_MODP3072, bits=3072
000 algorithm IKE dh group: id=16, name=OAKLEY_GROUP_MODP4096, bits=4096
000 algorithm IKE dh group: id=17, name=OAKLEY_GROUP_MODP6144, bits=6144
000 algorithm IKE dh group: id=18, name=OAKLEY_GROUP_MODP8192, bits=8192
000  
000 stats db_ops: {curr_cnt, total_cnt, maxsz} :context={0,0,0} trans={0,0,0} attrs={0,0,0} 
000  
000 "opportunity": 128.95.7.1:8500[S?C]---128.95.7.254...%opportunisticgroup:8500[S?C]; unrouted; eroute owner: #0
000 "opportunity":     srcip=unset; dstip=unset; srcup=silly; dstup=sally;
000 "opportunity":   ike_life: 900s; ipsec_life: 800s; rekey_margin: 350s; rekey_fuzz: 100%; keyingtries: 2
000 "opportunity":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC+GROUP+GROUTED+rKOD; prio: 32,0; interface: lo:w; 
000 "opportunity":   newest ISAKMP SA: #0; newest IPsec SA: #0; 
000 "opportunity#127.0.0.0/8": 128.95.7.1:8500[S?C]---128.95.7.254...%opportunistic:8500[S?C]===127.0.0.0/8; prospective erouted; eroute owner: #0
000 "opportunity#127.0.0.0/8":     srcip=unset; dstip=unset; srcup=silly; dstup=sally;
000 "opportunity#127.0.0.0/8":   ike_life: 900s; ipsec_life: 800s; rekey_margin: 350s; rekey_fuzz: 100%; keyingtries: 2
000 "opportunity#127.0.0.0/8":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC+rKOD; prio: 32,0; interface: lo:w; 
000 "opportunity#127.0.0.0/8":   newest ISAKMP SA: #0; newest IPsec SA: #0; 
000 "opportunity-mine": 128.95.7.8/30===128.95.7.1:8500[S?C]---128.95.7.254...%opportunisticgroup:8500[S?C]; unrouted; eroute owner: #0
000 "opportunity-mine":     srcip=unset; dstip=unset; srcup=silly; dstup=sally;
000 "opportunity-mine":   ike_life: 900s; ipsec_life: 800s; rekey_margin: 350s; rekey_fuzz: 100%; keyingtries: 2
000 "opportunity-mine":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC+GROUP+GROUTED+rKOD; prio: 30,0; interface: lo:w; 
000 "opportunity-mine":   newest ISAKMP SA: #0; newest IPsec SA: #0; 
000 "opportunity-mine#127.0.0.0/8": 128.95.7.8/30===128.95.7.1:8500[S?C]---128.95.7.254...%opportunistic:8500[S?C]===127.0.0.0/8; prospective erouted; eroute owner: #0
000 "opportunity-mine#127.0.0.0/8":     srcip=unset; dstip=unset; srcup=silly; dstup=sally;
000 "opportunity-mine#127.0.0.0/8":   ike_life: 900s; ipsec_life: 800s; rekey_margin: 350s; rekey_fuzz: 100%; keyingtries: 2
000 "opportunity-mine#127.0.0.0/8":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC+rKOD; prio: 30,0; interface: lo:w; 
000 "opportunity-mine#127.0.0.0/8":   newest ISAKMP SA: #0; newest IPsec SA: #0; 
000  
000  
whackeast --status
000 interface virtual128.95.7.2/lo:e 128.95.7.2
000 %myid = (none)
000 debug raw+crypt+parsing+emitting+control+lifecycle+klips+dns+oppo+controlmore+pfkey+nattraversal+x509+private
000  
000  
000 algorithm IKE encrypt: id=5, name=OAKLEY_3DES_CBC, blocksize=8, keydeflen=192
000 algorithm IKE encrypt: id=7, name=OAKLEY_AES_CBC, blocksize=16, keydeflen=128
000 algorithm IKE hash: id=1, name=OAKLEY_MD5, hashsize=16
000 algorithm IKE hash: id=2, name=OAKLEY_SHA1, hashsize=20
000 algorithm IKE dh group: id=2, name=OAKLEY_GROUP_MODP1024, bits=1024
000 algorithm IKE dh group: id=5, name=OAKLEY_GROUP_MODP1536, bits=1536
000 algorithm IKE dh group: id=14, name=OAKLEY_GROUP_MODP2048, bits=2048
000 algorithm IKE dh group: id=15, name=OAKLEY_GROUP_MODP3072, bits=3072
000 algorithm IKE dh group: id=16, name=OAKLEY_GROUP_MODP4096, bits=4096
000 algorithm IKE dh group: id=17, name=OAKLEY_GROUP_MODP6144, bits=6144
000 algorithm IKE dh group: id=18, name=OAKLEY_GROUP_MODP8192, bits=8192
000  
000 stats db_ops: {curr_cnt, total_cnt, maxsz} :context={0,0,0} trans={0,0,0} attrs={0,0,0} 
000  
000 "opportunity": 128.95.7.2:8500[S?C]---128.95.7.254...%opportunisticgroup:8500[S?C]; unrouted; eroute owner: #0
000 "opportunity":     srcip=unset; dstip=unset; srcup=sally; dstup=silly;
000 "opportunity":   ike_life: 900s; ipsec_life: 800s; rekey_margin: 350s; rekey_fuzz: 100%; keyingtries: 2
000 "opportunity":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC+GROUP+GROUTED+rKOD; prio: 32,0; interface: lo:e; 
000 "opportunity":   newest ISAKMP SA: #0; newest IPsec SA: #0; 
000 "opportunity#127.0.0.0/8": 128.95.7.2:8500[S?C]---128.95.7.254...%opportunistic:8500[S?C]===127.0.0.0/8; prospective erouted; eroute owner: #0
000 "opportunity#127.0.0.0/8":     srcip=unset; dstip=unset; srcup=sally; dstup=silly;
000 "opportunity#127.0.0.0/8":   ike_life: 900s; ipsec_life: 800s; rekey_margin: 350s; rekey_fuzz: 100%; keyingtries: 2
000 "opportunity#127.0.0.0/8":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC+rKOD; prio: 32,0; interface: lo:e; 
000 "opportunity#127.0.0.0/8":   newest ISAKMP SA: #0; newest IPsec SA: #0; 
000 "opportunity-mine": 128.95.7.20/30===128.95.7.2:8500[S?C]---128.95.7.254...%opportunisticgroup:8500[S?C]; unrouted; eroute owner: #0
000 "opportunity-mine":     srcip=unset; dstip=unset; srcup=sally; dstup=silly;
000 "opportunity-mine":   ike_life: 900s; ipsec_life: 800s; rekey_margin: 350s; rekey_fuzz: 100%; keyingtries: 2
000 "opportunity-mine":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC+GROUP+GROUTED+rKOD; prio: 30,0; interface: lo:e; 
000 "opportunity-mine":   newest ISAKMP SA: #0; newest IPsec SA: #0; 
000 "opportunity-mine#127.0.0.0/8": 128.95.7.20/30===128.95.7.2:8500[S?C]---128.95.7.254...%opportunistic:8500[S?C]===127.0.0.0/8; prospective erouted; eroute owner: #0
000 "opportunity-mine#127.0.0.0/8":     srcip=unset; dstip=unset; srcup=sally; dstup=silly;
000 "opportunity-mine#127.0.0.0/8":   ike_life: 900s; ipsec_life: 800s; rekey_margin: 350s; rekey_fuzz: 100%; keyingtries: 2
000 "opportunity-mine#127.0.0.0/8":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC+rKOD; prio: 30,0; interface: lo:e; 
000 "opportunity-mine#127.0.0.0/8":   newest ISAKMP SA: #0; newest IPsec SA: #0; 
000  
000  
whackwest --oppohere 128.95.7.1 --oppothere 128.95.7.2
002 "opportunity#127.0.0.0/8"[1] ...128.95.7.2 #1: initiating Main Mode
104 "opportunity#127.0.0.0/8"[1] ...128.95.7.2 #1: STATE_MAIN_I1: initiate
003 "opportunity#127.0.0.0/8"[1] ...128.95.7.2 #1: received Vendor ID payload [Libreswan (this version)  VERSION
003 "opportunity#127.0.0.0/8"[1] ...128.95.7.2 #1: received Vendor ID payload [Dead Peer Detection]
106 "opportunity#127.0.0.0/8"[1] ...128.95.7.2 #1: STATE_MAIN_I2: sent MI2, expecting MR2
002 "opportunity#127.0.0.0/8"[1] ...128.95.7.2 #1: I did not send a certificate because I do not have one.
108 "opportunity#127.0.0.0/8"[1] ...128.95.7.2 #1: STATE_MAIN_I3: sent MI3, expecting MR3
004 "opportunity#127.0.0.0/8"[1] ...128.95.7.2 #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}
002 "opportunity#127.0.0.0/8"[1] ...128.95.7.2 #2: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC
117 "opportunity#127.0.0.0/8"[1] ...128.95.7.2 #2: STATE_QUICK_I1: initiate
004 "opportunity#127.0.0.0/8"[1] ...128.95.7.2 #2: STATE_QUICK_I2: sent QI2, IPsec SA established
whackwest --oppohere 128.95.7.1 --oppothere 128.95.7.21
002 "opportunity#127.0.0.0/8"[2] ...128.95.7.2===128.95.7.21/32 #3: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC
117 "opportunity#127.0.0.0/8"[2] ...128.95.7.2===128.95.7.21/32 #3: STATE_QUICK_I1: initiate
004 "opportunity#127.0.0.0/8"[2] ...128.95.7.2===128.95.7.21/32 #3: STATE_QUICK_I2: sent QI2, IPsec SA established
whackwest --oppohere 128.95.7.11 --oppothere 128.95.7.2
002 "opportunity-mine#127.0.0.0/8"[1] 128.95.7.11/32=== ...128.95.7.2 #4: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC
117 "opportunity-mine#127.0.0.0/8"[1] 128.95.7.11/32=== ...128.95.7.2 #4: STATE_QUICK_I1: initiate
004 "opportunity-mine#127.0.0.0/8"[1] 128.95.7.11/32=== ...128.95.7.2 #4: STATE_QUICK_I2: sent QI2, IPsec SA established
whackwest --oppohere 128.95.7.10 --oppothere 128.95.7.22
002 "opportunity-mine#127.0.0.0/8"[2] 128.95.7.10/32=== ...128.95.7.2===128.95.7.22/32 #5: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+OPPORTUNISTIC
117 "opportunity-mine#127.0.0.0/8"[2] 128.95.7.10/32=== ...128.95.7.2===128.95.7.22/32 #5: STATE_QUICK_I1: initiate
004 "opportunity-mine#127.0.0.0/8"[2] 128.95.7.10/32=== ...128.95.7.2===128.95.7.22/32 #5: STATE_QUICK_I2: sent QI2, IPsec SA established
whackwest --oppohere 128.95.7.22 --oppothere 128.95.7.10
033 Can't Opportunistically initiate for 128.95.7.22 to 128.95.7.10: no routed template covers this pair
RC: 33
whackwest --oppohere 128.95.7.10 --oppothere 128.95.7.23
033 Can't Opportunistically initiate for 128.95.7.10 to 128.95.7.23: target's TXT record: no host 23.7.95.127.in-addr.arpa. for TXT record
RC: 33
whackwest --shutdown
002 shutting down
whackeast --shutdown
002 shutting down