On Tue, 30 Dec 2008, Gabe wrote:

One more thing; if you are comparing SPIs from the log with setkey,
you can also run
tcpdump -s 0 -vv -ln proto 50
and it will show you something like
    ... ESP(spi=0x12345678,seq=0x..),
so you could as well compare what you receive on the wire with what
you get in the log. This would help to eliminiate the case of a
promblematic patch.

However I still get the ipsec_common message albeit not as often, it
appears to only be when I restart racoon now. I also tried matching the
SPIs but the SPIs given by setkey -Da did not match the ones on the log.

Ok, can you try running the following script and see if the output
times match your racoon restarts or the log entries?

You need to set your interface and the tunnel endpoint IPs (as in box/box2).

/bz

--
Bjoern A. Zeeb                      The greatest risk is not taking one.
#!/bin/sh

INT=XXX
REMOTETUNNELENDPOINT=aaa.bbb.ccc.ddd
MYTUNNELENDPOINT=www.xxx.yyy.zzz

tcpdump -ln -i ${INT} -s0 src ${REMOTETUNNELENDPOINT} and dst 
${MYTUNNELENDPOINT} and proto 50 | \
        awk 'BEGIN { debug=1; spi="uninitialized"; }
                {
                        if (!/ESP.spi=/) { next; }
                        sub("ESP.spi=", "", $6);
                        sub(",.*", "", $6);
                        if ($6 == "") { if (debug) { printf "DEBUG: %s\n", $0; 
} next; }
                        if (spi != $6) {
                                printf "%s SPI changed %s -> %s\n", $1, spi, $6;
                                spi=$6;
                        }
                }'

# end
_______________________________________________
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"

Reply via email to