whackwest --name ipsec-psk-id-rw --delete --psk --host 127.95.7.1 --ikeport 8500 --client 127.95.7.8/30 --id=@west.example.com --updown silly --to --updown sally --host 127.95.7.2 --ikeport 8500 --client 127.95.7.20/30 --encrypt --rekeymargin 350 --ikelifetime 900 --ipseclifetime 800 --keyingtries 2
002 added connection description "ipsec-psk-id-rw"
whackeast --name ipsec-psk-id-rw --delete --psk --host %any --ikeport 8500 --id=@west.example.com --client 127.95.7.8/30 --updown silly --to --updown sally --host 127.95.7.2 --ikeport 8500 --client 127.95.7.20/30 --nexthop %direct --encrypt --rekeymargin 350 --ikelifetime 900 --ipseclifetime 800 --keyingtries 2
002 added connection description "ipsec-psk-id-rw"
whackwest --listen
002 listening for IKE messages
002 adding interface virtual127.95.7.1/lo:w 127.95.7.1:8500
002 loading secrets from "/tmp/ipsec.secrets/west"
whackeast --listen
002 listening for IKE messages
002 adding interface virtual127.95.7.2/lo:e 127.95.7.2:8500
002 loading secrets from "/tmp/ipsec.secrets/east"
whackwest --name ipsec-psk-id-rw --initiate
002 "ipsec-psk-id-rw" #1: initiating Main Mode
104 "ipsec-psk-id-rw" #1: STATE_MAIN_I1: initiate
003 "ipsec-psk-id-rw" #1: received Vendor ID payload [Openswan (this version) cvs2005Jun22_21:45:38  X.509-1.5.4 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR]
003 "ipsec-psk-id-rw" #1: received Vendor ID payload [Dead Peer Detection]
106 "ipsec-psk-id-rw" #1: STATE_MAIN_I2: sent MI2, expecting MR2
002 "ipsec-psk-id-rw" #1: I did not send a certificate because I do not have one.
108 "ipsec-psk-id-rw" #1: STATE_MAIN_I3: sent MI3, expecting MR3
004 "ipsec-psk-id-rw" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}
002 "ipsec-psk-id-rw" #2: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP
117 "ipsec-psk-id-rw" #2: STATE_QUICK_I1: initiate
004 "ipsec-psk-id-rw" #2: STATE_QUICK_I2: sent QI2, IPsec SA established
whackwest --shutdown
002 shutting down
whackeast --shutdown
002 shutting down
