[Openswan Users] ipsec__plutorun: !pluto failure!: exited with error status 134 (signal 6)

Chen, Xuli (James) chenja at avaya.com
Mon Oct 3 13:41:21 EDT 2011


The change log says it was fixed in V2.4.0, but I'm getting it from 2.6.21.



v2.4.0 (Sep 12, 2005)
* NAT-T support for KLIPS on 2.6 (Sponsored by Astaro)
* Additional Cipher support with KLIPS on 2.6 (Sponsored by Astaro)
* Fix for NAT-T/PSK rekey (Ulrich @ Astaro)
* Delete _updown.c and _updown.posix versions as they were obsolete
* Fixes for aggressive mode and policy mode
* Various bugfixes as reported on http://bugs.openswan.org/
  #201 pluto not accepting negotiations on port 500 after port floating to 4500
  #249 two default routes confuses scripts
  #261 2 RW's w/DPD behind a NAT kick each other off at rekey time
  #267 pluto crashes on inbound X.509 roadwarrior
  #269 informational crasher in demux.c
  #301 kernel_netkey.c lists invalid ESP algorithm
  #302 pluto assumes it has 3DES
  #305 passert_fail (pred_str=0x80b88e3 "st->st_suspended_md->st == st", file_str=0x80b86a0 "state.c"
  #306 st->st_suspended_md->st == st passert()
  #316 Patch for ALG support from Astaro
  #324 Impossible to disable AGGRESSIVE mode
  #327 pluto nat-t detection on 2.6 without klips nat-t patch fails to
       disable nat-t
  #328 ipsec setup fxies for awk compiled with --enable-switch
  #341 Pluto crashes with: ipsec__plutorun: !pluto failure!: exited with error
       status 134 (signal 6)
  #342 fix for 2.6.12 undocumented API fixes for sk_zapped and sk_alloc()
       (based on fix from Sergeil.
  #350 fix for passert() at connections.c:1353: isanyaddr(&c->spd.that.host_addr)
  #355 dpdaction restart fix from Astaro
  #357 secure_xauth_username_str fix from Astaro
  #360 checkv199install creates bogus "old" files
  #361/#363 fix for passert() demux.c:1204: unknown address family in
       anyaddr/unspecaddr
  #368 Fix for ipsec --setup --status output and eroute counting
  #372 Netkey and device labels (eth#:#)
  #373 _updown_x509 still uses obsolete 'route add' commands
  #377 pluto crashes processing first connection if nhelpers=0
  #380 pluto crashes when sent an IKEPING
  #381 assertion failure in init_demux if AGGRESSIVE not defined
  #383 MODP >= 4096 FIX
  #386 undefined symbols compiling klips as module
  #387 / #420 pfkey_ops undefined error on SMP kernel compiles.
              possibly fixed, but may result in SMP unsafe-ness.
  #342 KLIPS cannot be compiled for 2.6.12+
  #415 RPM packaging errors for 2.4 based kernels
  #416 Need a way to tell if NAT-T is compiled in the IPSec kernel


-----Original Message-----
From: Paul Wouters [mailto:paul at xelerance.com]
Sent: Monday, October 03, 2011 1:11 PM
To: Chen, Xuli (James)
Cc: Users at openswan.org
Subject: Re: [Openswan Users] ipsec__plutorun: !pluto failure!: exited with error status 134 (signal 6)

On Mon, 3 Oct 2011, Chen, Xuli (James) wrote:

> I'm experiencing below pluto failure with openswan-2.6.21-5.el5_5.3 when I was trying to stop ipsec during traffic.
> According to searching result from Google, it looks this kind of issue happened before with older openswan release.
> But I could not understand what's the root cause and solution for that. Anyone knows the root cause and solution?

2.6.21 is very old. You should upgrade...

> /usr/libexec/ipsec/pluto --nofork --secretsfile /etc/ipsec.secrets --ipsecdir /etc/ipsec.d --use-netkey
> --crlcheckinterval 600 --nhelpers 0
> Sep 28 09:18:09 tb1ems1 ipsec__plutorun: !pluto failure!:  exited with error status 134 (signal 6)

These logs are only the /var/log/messages entries. There is also a "secure" or "daemon" or "auth.log"
that captures logging from the pluto binary.

If you have an ASSERTION FAILED in your /var/log/auth.log log, then we can probably tell you
when and where it was fixed (if it is not a new issue). If it just crashes without a message,
we would need to see a gdb trace before knowing more.

but you can also go through ftp://ftp.openswan.org/openswan/CHANGES to get an idea about whether
or not we fixed it.

Paul

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/users/attachments/20111003/505a0b85/attachment.html 


More information about the Users mailing list