Status of IKE charon daemon (strongSwan 5.9.8, Linux 6.1.141-1-generic, x86_64):
uptime: 6 minutes, since Sep 25 08:47:09 2025
malloc: sbrk 3805184, mmap 405504, used 2036464, free 1768720
worker threads: 10 of 16 idle, 6/0/0/0 working, job queue: 0/0/0/0, scheduled: 2
loaded plugins: charon test-vectors ldap pkcs11 aes rc2 sha2 sha1 md5 mgf1 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs12 pgp dnskey sshkey pem openssl gcrypt pkcs8 af-alg fips-prf gmp curve25519 agent chapoly xcbc cmac hmac kdf ctr ccm gcm drbg curl attr kernel-netlink resolve socket-default connmark forecast farp stroke updown eap-identity eap-aka eap-md5 eap-gtc eap-mschapv2 eap-radius eap-tls eap-ttls eap-tnc xauth-generic xauth-eap xauth-pam tnc-tnccs dhcp lookip error-notify certexpire led addrblock unity counters
Listening IP addresses:
10.192.6.110
Connections:
client: %any...10.192.6.108 IKEv2
client: local: [CN=10.192.6.110] uses public key authentication
client: cert: "CN=10.192.6.110"
client: remote: [10.192.6.108] uses public key authentication
client: child: dynamic === 10.1.1.0/24 TUNNEL
Routed Connections:
client{1}: ROUTED, TUNNEL, reqid 1
client{1}: 10.192.6.110/32 === 10.1.1.0/24
Security Associations (1 up, 0 connecting):
client[1]: ESTABLISHED 5 minutes ago, 10.192.6.110[CN=10.192.6.110]...10.192.6.108[10.192.6.108]
client[1]: IKEv2 SPIs: d770b3aced125439_i* 20eee7bd8ad5d3a6_r, public key reauthentication in 2 hours
client[1]: IKE proposal: AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
client{2}: INSTALLED, TUNNEL, reqid 1, ESP in UDP SPIs: cd036fde_i c829d2f1_o
client{2}: AES_CBC_256/HMAC_SHA1_96, 0 bytes_i, 1092 bytes_o (13 pkts, 313s ago), rekeying in 37 minutes
client{2}: 10.1.1.1/32 === 10.1.1.0/24
|