Hello Justin, I just spent a good amount of time figuring out what the issue is here. Yes, you are correct. ODL refuses connection on port 6633 when OvS(OF) sends packets to it. That is because in the packet the OF version seems to be 22, which is very odd since there is no version 22 for the same.
This is the output at ODL: 2015-08-05 13:36:58,642 | WARN | ntLoopGroup-11-2 | OFVersionDetector | 243 - org.opendaylight.openflowja va.openflow-protocol-impl - 0.6.0.SNAPSHOT | detected version: 22 - currently not supported 2015-08-05 13:36:58,642 | WARN | ntLoopGroup-11-2 | SessionManagerOFImpl | 246 - org.opendaylight.openflowpl ugin - 0.1.0.SNAPSHOT | context for invalidation not found How do I check the version of OF that is sent in a OvS packet from my OvS VM to ODL VM. Is there anything like tcpdump? I did a tcpdump as well, I got this: sanket@sanket-ubuntu-ovs:~$ sudo tcpdump -n -i eth1 -v tcpdump: listening on eth1, link-type EN10MB (Ethernet), capture size 262144 bytes 08:39:46.032145 IP (tos 0xc0, ttl 64, id 32128, offset 0, flags [DF], proto TCP (6), length 60) 172.31.1.1.39899 > 172.31.1.2.6633: Flags [S], cksum 0xfe2a (correct), seq 1145388004, win 29200, options [mss 1460,sackOK,TS val 20006500 ecr 0,nop,wscale 7], length 0 08:39:46.032558 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) 172.31.1.2.6633 > 172.31.1.1.39899: Flags [S.], cksum 0x29fd (correct), seq 1674324326, ack 1145388005, win 28960, options [mss 1460,sackOK,TS val 20006569 ecr 20006500,nop,wscale 7], length 0 08:39:46.032655 IP (tos 0xc0, ttl 64, id 32129, offset 0, flags [DF], proto TCP (6), length 52) 172.31.1.1.39899 > 172.31.1.2.6633: Flags [.], cksum 0x5a68 (incorrect -> 0xc904), ack 1, win 229, options [nop,nop,TS val 20006500 ecr 20006569], length 0 08:39:46.032821 IP (tos 0xc0, ttl 64, id 32130, offset 0, flags [DF], proto TCP (6), length 347) 172.31.1.1.39899 > 172.31.1.2.6633: Flags [P.], cksum 0x5b8f (incorrect -> 0x6269), seq 1:296, ack 1, win 229, options [nop,nop,TS val 20006500 ecr 20006569], length 295: OpenFlow version unknown (0x16), type 0x03, length 257, xid 0x22010001 version unknown (0x20), type 0x00, length 7686, xid 0x01060206 [|openflow] 08:39:46.033039 IP (tos 0x0, ttl 64, id 28622, offset 0, flags [DF], proto TCP (6), length 52) 172.31.1.2.6633 > 172.31.1.1.39899: Flags [.], cksum 0xc7d7 (correct), ack 296, win 235, options [nop,nop,TS val 20006569 ecr 20006500], length 0 08:39:46.039616 IP (tos 0x0, ttl 64, id 28623, offset 0, flags [DF], proto TCP (6), length 68) 172.31.1.2.6633 > 172.31.1.1.39899: Flags [P.], cksum 0xc37d (correct), seq 1:17, ack 296, win 235, options [nop,nop,TS val 20006571 ecr 20006500], length 16: OpenFlow version unknown (0x04), type 0x00, length 16, xid 0x00000015 08:39:46.039630 IP (tos 0xc0, ttl 64, id 32131, offset 0, flags [DF], proto TCP (6), length 52) 172.31.1.1.39899 > 172.31.1.2.6633: Flags [.], cksum 0x5a68 (incorrect -> 0xc7c9), ack 17, win 229, options [nop,nop,TS val 20006502 ecr 20006571], length 0 08:39:46.039754 IP (tos 0xc0, ttl 64, id 32132, offset 0, flags [DF], proto TCP (6), length 52) 172.31.1.1.39899 > 172.31.1.2.6633: Flags [F.], cksum 0x5a68 (incorrect -> 0xc7c8), seq 296, ack 17, win 229, options [nop,nop,TS val 20006502 ecr 20006571], length 0 08:39:46.039783 IP (tos 0xc0, ttl 64, id 32133, offset 0, flags [DF], proto TCP (6), length 52) 172.31.1.1.39899 > 172.31.1.2.6633: Flags [R.], cksum 0x5a68 (incorrect -> 0xc7c4), seq 297, ack 17, win 229, options [nop,nop,TS val 20006502 ecr 20006571], length 0 08:39:54.032267 IP (tos 0xc0, ttl 64, id 20097, offset 0, flags [DF], proto TCP (6), length 60) 172.31.1.1.39900 > 172.31.1.2.6633: Flags [S], cksum 0x7af1 (correct), seq 4208722101, win 29200, options [mss 1460,sackOK,TS val 20008500 ecr 0,nop,wscale 7], length 0 08:39:54.032661 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) 172.31.1.2.6633 > 172.31.1.1.39900: Flags [S.], cksum 0x5b13 (correct), seq 2936873477, ack 4208722102, win 28960, options [mss 1460,sackOK,TS val 20008569 ecr 20008500,nop,wscale 7], length 0 08:39:54.032741 IP (tos 0xc0, ttl 64, id 20098, offset 0, flags [DF], proto TCP (6), length 52) 172.31.1.1.39900 > 172.31.1.2.6633: Flags [.], cksum 0x5a68 (incorrect -> 0xfa1a), ack 1, win 229, options [nop,nop,TS val 20008500 ecr 20008569], length 0 08:39:54.032832 IP (tos 0xc0, ttl 64, id 20099, offset 0, flags [DF], proto TCP (6), length 347) 172.31.1.1.39900 > 172.31.1.2.6633: Flags [P.], cksum 0x5b8f (incorrect -> 0xcc0c), seq 1:296, ack 1, win 229, options [nop,nop,TS val 20008500 ecr 20008569], length 295: OpenFlow version unknown (0x16), type 0x03, length 257, xid 0x22010001 version unknown (0x20), type 0x00, length 7686, xid 0x01060206 [|openflow] 08:39:54.033210 IP (tos 0x0, ttl 64, id 27775, offset 0, flags [DF], proto TCP (6), length 52) 172.31.1.2.6633 > 172.31.1.1.39900: Flags [.], cksum 0xf8ed (correct), ack 296, win 235, options [nop,nop,TS val 20008569 ecr 20008500], length 0 08:39:54.035768 IP (tos 0x0, ttl 64, id 27776, offset 0, flags [DF], proto TCP (6), length 68) 172.31.1.2.6633 > 172.31.1.1.39900: Flags [P.], cksum 0xf494 (correct), seq 1:17, ack 296, win 235, options [nop,nop,TS val 20008570 ecr 20008500], length 16: OpenFlow version unknown (0x04), type 0x00, length 16, xid 0x00000015 08:39:54.035801 IP (tos 0xc0, ttl 64, id 20100, offset 0, flags [DF], proto TCP (6), length 52) 172.31.1.1.39900 > 172.31.1.2.6633: Flags [.], cksum 0x5a68 (incorrect -> 0xf8e1), ack 17, win 229, options [nop,nop,TS val 20008501 ecr 20008570], length 0 08:39:54.035940 IP (tos 0xc0, ttl 64, id 20101, offset 0, flags [DF], proto TCP (6), length 52) 172.31.1.1.39900 > 172.31.1.2.6633: Flags [F.], cksum 0x5a68 (incorrect -> 0xf8e0), seq 296, ack 17, win 229, options [nop,nop,TS val 20008501 ecr 20008570], length 0 08:39:54.035973 IP (tos 0xc0, ttl 64, id 20102, offset 0, flags [DF], proto TCP (6), length 52) 172.31.1.1.39900 > 172.31.1.2.6633: Flags [R.], cksum 0x5a68 (incorrect -> 0xf8dc), seq 297, ack 17, win 229, options [nop,nop,TS val 20008501 ecr 20008570], length 0 When I do dump-features I get BAD_STAT what is that about? sudo ovs-ofctl dump-table-features br0 -O OpenFlow13 OFPT_ERROR (OF1.3) (xid=0x2): OFPBRC_BAD_STAT OFPST_TABLE_FEATURES request (OF1.3) (xid=0x2): --Sanket -----Original Message----- From: Justin Pettit [mailto:jpet...@nicira.com] Sent: Tuesday, July 28, 2015 12:34 PM To: Tandulwadkar, Sanket Ravindra (Sanket Ravindra) Cc: b...@openvswitch.org Subject: Re: [ovs-discuss] is_connected parameter absent: 2015-07-27T16:59:41Z|00016|poll_loop|DBG|wakeup due to 0-ms timeout at lib/ovsdb-idl.c:1354 > On Jul 28, 2015, at 9:26 AM, Tandulwadkar, Sanket Ravindra (Sanket Ravindra) > <standulwa...@avaya.com> wrote: > > sanket@sanket-ubuntu-ovs:~$ openssl s_client -connect 172.31.1.2:6633 > CONNECTED(00000003) > 140381499594384:error:140770FC:SSL routines:SSL23_GET_SERVER_HELLO:unknown > protocol:s23_clnt.c:795: It looks like it's reporting unknown protocol. My guess is that SSL isn't properly configured on the controller. --Justin _______________________________________________ discuss mailing list discuss@openvswitch.org http://openvswitch.org/mailman/listinfo/discuss