Status of IKE charon daemon (weakSwan 5.2.1, Linux 4.1.27, aarch64):
uptime: 22 minutes, since Mar 26 11:34:02 2018
malloc: sbrk 1462272, mmap 0, used 331120, free 1131152
worker threads: 3 of 8 idle, 5/0/0/0 working, job queue: 0/0/0/0, scheduled: 7
loaded plugins: charon aes des rc2 sha1 sha2 md4 md5 random nonce x509 revocation constraints acert pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl fips-prf agent xcbc cmac hmac attr kernel-netlink resolve socket-default stroke updown eap-identity eap-md5 eap-mschapv2 eap-tls eap-peap xauth-generic
Virtual IP pools (size/online/offline):
10.10.10.0/24: 254/1/0
Listening IP addresses:
<REDACTED>
192.168.1.1
192.168.1.2
10.8.0.1
Connections:
Host-to-Net: <REDACTED>...%any IKEv1, dpddelay=10s
Host-to-Net: local: [<REDACTED>] uses pre-shared key authentication
Host-to-Net: remote: uses pre-shared key authentication
Host-to-Net: remote: uses XAuth authentication: any
Host-to-Net: child: 0.0.0.0/0 === dynamic TUNNEL, dpdaction=clear
Security Associations (1 up, 0 connecting):
Host-to-Net[1]: ESTABLISHED 4 seconds ago, <REDACTED>[<REDACTED>]...<REDACTED-2>[<REDACTED-3>]
Host-to-Net[1]: Remote XAuth identity: <REDACTED-6>
Host-to-Net[1]: IKEv1 SPIs: <REDACTED-4> <REDACTED-5>, pre-shared key reauthentication in 2 hours
Host-to-Net[1]: IKE proposal: AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Host-to-Net{1}: INSTALLED, TUNNEL, ESP in UDP SPIs: <REDACTED-7> <REDACTED-8>
Host-to-Net{1}: AES_CBC_128/HMAC_SHA1_96, 1497 bytes_i, 0 bytes_o, rekeying in 48 minutes
Host-to-Net{1}: 0.0.0.0/0 === 10.10.10.1/32