-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

(another meaning of "auto-reply"?)

Markus Wernig wrote:
|
| problem 2) is a bit strange. I'll start with the network layout:
| [...]
|
| - unplug cable on OBSD 1 (.49) : carp&ipsec fails over to OBSD 2
| - plug cable back in : carp fails back over to OBSD 1, but ipsec does so
| only on carp0 - i.e.: packets from Client A to B go through carp0 on
| OBSD 1, replies go through carp 1 on OBSD 2. This lasts for exactly 30
| seconds, but Client B will not decrypt the packets. tcpdump on Client B
| shows the replies (esp) coming from OBSD 2's MAC address. Then ipsec
| also goes back to OBSD 1, and pings resume. The ssh session established
| before the failover doesn't work anymore (replies are no longer passed
| on to ssh client on Client B). New sessions can be established though.
|

OK, got a bit further on that one. After plugging the cable back in, it
takes 30 seconds before OBSD 2 to receives the first carp advertisments
from OBSD 1, so it remains master on that interface while immediately
going into backup on the other one. This might be a setting on the
switch blocking outgoing packets on the freshly plugged back-in cable.
I'll try it with a hub.

/m
-----BEGIN PGP SIGNATURE-----

iD8DBQFDJg3f8BX/d8pVi/cRAm35AJ0cz5+DIC568LIoN2WjCjjnMUSRpQCdFAZo
hsYjrgJKrnhMCI0O3c18stc=
=HjcG
-----END PGP SIGNATURE-----

Reply via email to