[Swan-dev] new test failures

D. Hugh Redelmeier hugh at mimosa.com
Wed Feb 13 06:29:17 UTC 2019


I ran the tests last evening.  The new failures look simple to fix.

I include a diff of the summary from the previous run
(summary produced by "testing/utils/kvmresults.py testing/pluto/").

- enumcheck seems to fail.

- lots of tests fail with the following or something similar (which
  looks like a failure to update logs);

-000 "westnet-eastnet-ipv4-psk-ikev2":   IKE algorithms: AES_CBC-AES_XCBC-MODP2048
+000 "westnet-eastnet-ipv4-psk-ikev2":   IKE algorithms: AES_CBC-AES_XCBC-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31

- testing/pluto/ikev2-liveness-09 failed in its mysterious way:
-| xfrm acquire rtattribute type 5
-| xfrm acquire rtattribute type 16

- testing/pluto/nat-pluto-04 failed in another mysterious way
+? (192.139.70.77) at fe:00:00:dc:bc:ff [ether] on eth0

================
1c1
< testing/pluto/enumcheck-01 passed
---
> testing/pluto/enumcheck-01 failed west:output-different
testing/pluto/enumcheck-01/OUTPUT/west.console.diff
+../../enumcheck/OUTPUT.enumcheck.txt - differ: byte 47616, line 1485
+Does the file OUTPUT.enumcheck.txt need updating?

14,15c14,15
< testing/pluto/algparse-01 failed west:output-different
< testing/pluto/algparse-02-fips failed west:output-different
---
> testing/pluto/algparse-01 passed
> testing/pluto/algparse-02-fips passed
86c86
< testing/pluto/ikev2-algo-06-aes-aes_xcbc passed
---
> testing/pluto/ikev2-algo-06-aes-aes_xcbc failed east:output-different west:output-different
testing/pluto/ikev2-algo-06-aes-aes_xcbc/OUTPUT/east.console.diff
-000 "westnet-eastnet-ipv4-psk-ikev2":   IKE algorithms: AES_CBC-AES_XCBC-MODP2048
+000 "westnet-eastnet-ipv4-psk-ikev2":   IKE algorithms: AES_CBC-AES_XCBC-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31
testing/pluto/ikev2-algo-06-aes-aes_xcbc/OUTPUT/west.console.diff
-000 "westnet-eastnet-ipv4-psk-ikev2":   IKE algorithms: AES_CBC-AES_XCBC-MODP2048
+000 "westnet-eastnet-ipv4-psk-ikev2":   IKE algorithms: AES_CBC-AES_XCBC-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31

111,113c111,113
< testing/pluto/ikev2-algo-ike-sha2-01 passed
< testing/pluto/ikev2-algo-ike-sha2-02 passed
< testing/pluto/ikev2-algo-ike-sha2-03 passed
---
> testing/pluto/ikev2-algo-ike-sha2-01 failed east:output-different west:output-different
testing/pluto/ikev2-algo-ike-sha2-01/OUTPUT/east.console.diff
-000 "westnet-eastnet-ipv4-psk-ikev2":   IKE algorithms: 3DES_CBC-HMAC_SHA2_256-MODP2048
+000 "westnet-eastnet-ipv4-psk-ikev2":   IKE algorithms: 3DES_CBC-HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31
testing/pluto/ikev2-algo-ike-sha2-01/OUTPUT/west.console.diff
-000 "westnet-eastnet-ipv4-psk-ikev2":   IKE algorithms: 3DES_CBC-HMAC_SHA2_256-MODP2048
+000 "westnet-eastnet-ipv4-psk-ikev2":   IKE algorithms: 3DES_CBC-HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31

> testing/pluto/ikev2-algo-ike-sha2-02 failed east:output-different west:output-different
testing/pluto/ikev2-algo-ike-sha2-02/OUTPUT/east.console.diff
-000 "westnet-eastnet-ipv4-psk-ikev2":   IKE algorithms: AES_CBC_128-HMAC_SHA2_256-MODP2048
+000 "westnet-eastnet-ipv4-psk-ikev2":   IKE algorithms: AES_CBC_128-HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31
testing/pluto/ikev2-algo-ike-sha2-02/OUTPUT/west.console.diff
-000 "westnet-eastnet-ipv4-psk-ikev2":   IKE algorithms: AES_CBC_128-HMAC_SHA2_256-MODP2048
+000 "westnet-eastnet-ipv4-psk-ikev2":   IKE algorithms: AES_CBC_128-HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31

> testing/pluto/ikev2-algo-ike-sha2-03 failed east:output-different west:output-different
testing/pluto/ikev2-algo-ike-sha2-03/OUTPUT/east.console.diff
-000 "westnet-eastnet-ipv4-psk-ikev2":   IKE algorithms: AES_CBC-HMAC_SHA2_256-MODP2048
+000 "westnet-eastnet-ipv4-psk-ikev2":   IKE algorithms: AES_CBC-HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31
testing/pluto/ikev2-algo-ike-sha2-03/OUTPUT/west.console.diff
-000 "westnet-eastnet-ipv4-psk-ikev2":   IKE algorithms: AES_CBC-HMAC_SHA2_256-MODP2048
+000 "westnet-eastnet-ipv4-psk-ikev2":   IKE algorithms: AES_CBC-HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31

129c129
< testing/pluto/ikev2-mobike-03 passed
---
> testing/pluto/ikev2-mobike-03 failed road:output-different
testing/pluto/ikev2-mobike-03/OUTPUT/road.console.diff
+010 "road-eastnet"[1] 192.1.2.23 #2: STATE_PARENT_I2: retransmission; will wait 0.5 seconds for response

366c366
< testing/pluto/ikev2-liveness-09 passed
---
> testing/pluto/ikev2-liveness-09 failed west:output-different
testing/pluto/ikev2-liveness-09/OUTPUT/west.console.diff
-| xfrm acquire rtattribute type 5
-| xfrm acquire rtattribute type 16

370,371c370,371
< testing/pluto/ikev2-child-03-dh-none-pfs-no passed
< testing/pluto/ikev2-child-04-dh-none-pfs-yes passed
---
> testing/pluto/ikev2-child-03-dh-none-pfs-no failed west:output-different
testing/pluto/ikev2-child-03-dh-none-pfs-no/OUTPUT/west.console.diff
-004 "westnet-eastnet-ikev2" #2: STATE_V2_IPSEC_I: IPsec SA established tunnel mode {ESP=>0xESPESP <0xESPESP xfrm=AES_CBC_128-HMAC_SHA1_96 NATOA=none NATD=none DPD=passive}
+004 "westnet-eastnet-ikev2" #2: STATE_V2_IPSEC_I: IPsec SA established tunnel mode {ESP=>0xESPESP <0xESPESP xfrm=AES_CBC_256-HMAC_SHA2_512_256 NATOA=none NATD=none DPD=passive}

-004 "westnet-eastnet-ikev2-00" #3: STATE_V2_IPSEC_I: IPsec SA established tunnel mode {ESP=>0xESPESP <0xESPESP xfrm=AES_CBC_128-HMAC_SHA1_96 NATOA=none NATD=none DPD=passive}
+004 "westnet-eastnet-ikev2-00" #3: STATE_V2_IPSEC_I: IPsec SA established tunnel mode {ESP=>0xESPESP <0xESPESP xfrm=AES_CBC_128-HMAC_SHA2_512_256 NATOA=none NATD=none DPD=passive}

-004 "westnet-eastnet-ikev2-01" #4: STATE_V2_IPSEC_I: IPsec SA established tunnel mode {ESP=>0xESPESP <0xESPESP xfrm=AES_CBC_128-HMAC_SHA1_96 NATOA=none NATD=none DPD=passive}
+004 "westnet-eastnet-ikev2-01" #4: STATE_V2_IPSEC_I: IPsec SA established tunnel mode {ESP=>0xESPESP <0xESPESP xfrm=AES_CBC_128-HMAC_SHA2_512_256 NATOA=none NATD=none DPD=passive}

-004 "westnet-eastnet-ikev2-11" #5: STATE_V2_IPSEC_I: IPsec SA established tunnel mode {ESP=>0xESPESP <0xESPESP xfrm=AES_CBC_128-HMAC_SHA1_96 NATOA=none NATD=none DPD=passive}
+004 "westnet-eastnet-ikev2-11" #5: STATE_V2_IPSEC_I: IPsec SA established tunnel mode {ESP=>0xESPESP <0xESPESP xfrm=AES_CBC_128-HMAC_SHA2_512_256 NATOA=none NATD=none DPD=passive}

> testing/pluto/ikev2-child-04-dh-none-pfs-yes failed west:output-different
testing/pluto/ikev2-child-04-dh-none-pfs-yes/OUTPUT/west.console.diff
-004 "westnet-eastnet-ikev2" #2: STATE_V2_IPSEC_I: IPsec SA established tunnel mode {ESP=>0xESPESP <0xESPESP xfrm=AES_CBC_128-HMAC_SHA1_96 NATOA=none NATD=none DPD=passive}
+004 "westnet-eastnet-ikev2" #2: STATE_V2_IPSEC_I: IPsec SA established tunnel mode {ESP=>0xESPESP <0xESPESP xfrm=AES_CBC_256-HMAC_SHA2_512_256 NATOA=none NATD=none DPD=passive}
etc

409c409
< testing/pluto/nat-pluto-04 passed
---
> testing/pluto/nat-pluto-04 failed east:output-different
testing/pluto/nat-pluto-04/OUTPUT/east.console.diff
+? (192.139.70.77) at fe:00:00:dc:bc:ff [ether] on eth0

670c670
< testing/pluto/ikev2-redirect-03-auth-loop failed west:output-different
---
> testing/pluto/ikev2-redirect-03-auth-loop passed


More information about the Swan-dev mailing list