Anybody an ipsec guru?  I've setup an ipsec transport between two
    hosts, A and B on an unsecure network, the setkey configuration file is
    included below.

    It works fine until I reboot one host (A).  After it has rebooted
    any packets I send from A to B causes B to report 'replay packet' errors
    and for no packets to get through.  I have to re-run setkey on B in 
    order for things to work again.

    The question is:  What am I forgetting to do?  Or is this a bug in our
    IPSEC implementation?

May 10 18:15:05 air /kernel: replay packet in IPv4 ESP input: packet(SPI=65537 s
rc=192.168.254.28 dst=192.168.254.29) SA(SPI=65537 src=192.168.254.28 dst=192.16
8.254.29)
May 10 18:15:41 air /kernel: replay packet in IPv4 ESP input: packet(SPI=65537 s
rc=192.168.254.28 dst=192.168.254.29) SA(SPI=65537 src=192.168.254.28 dst=192.16
8.254.29)

                                        -Matt
                                        Matthew Dillon 
                                        <[EMAIL PROTECTED]>


spdflush ;
flush ;

add 192.168.254.28 192.168.254.29
        esp 0x10001
        -E des-cbc "password"
        -A hmac-md5 "passwordpasswo!!" ;

add 192.168.254.29 192.168.254.28
        esp 0x10001
        -E des-cbc "password"
        -A hmac-md5 "passwordpasswo!!" ;

spdadd 192.168.254.28/32[any] 192.168.254.29/32[any] any
        -P out ipsec esp/tunnel/192.168.254.28-192.168.254.29/require ;




To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message

Reply via email to