I can confirm this. Spent way too much time in my VMWare lab on this
until I thought to add a default route to the host-only interfaces I
was running the tunnel on. All you need is default route and it will
work. I have found that "fleshed out" config for networking on OpenBSD
is a sure way to clear up some of the more strange things that can
happen.

On Thu, Feb 23, 2012 at 10:43 AM, Aner Perez <a...@ncstech.com> wrote:
> See the thread titled "ipsec tunnel traffic getting icmp host unreachable"
> on this same list.
>
> In short, the answer is that you need a standard route (in addition to the
> encap route) to the destination networks.
>
> Any route that covers your destination network will do.  In my case,
instead
> of adding routes for each of my ipsec tunnels, I just added a default route
> and that fixed the problem.  It won't actually use the gateway listed on
> this route, for that it uses the encap route.
>
>        - Aner
>
>
> On 02/22/2012 05:22 PM, Morten Christensen wrote:
>>
>> Dear fellow OpenBSD friends.
>>
>> I'm setting up 2 FW's that should form a VPN tunnel securing the net
>> behind each FW - simple
>>
>> NET x ->  FW x ->  WAN ->  FW y ->  NET y
>>
>> I'm using ipsec.conf / ipsecctl. OpenBSD 5, pf is disabled.
>>
>> On FW x
>> # cat /etc/ipsec.conf
>> ike esp from 10.21.35.0/24 to 10.20.0.0/16 peer 212.37.141.59 psk
>> "lotsofFishs4meAndyou"
>>
>> netstat -rn
>> Encap:
>> Source             Port  Destination        Port  Proto
>> SA(Address/Proto/Type/Direction)
>> 10.20/16           0     10.21.35/24        0     0
>> 212.37.141.59/esp/use/in
>> 10.21.35/24        0     10.20/16           0     0
>> 212.37.141.59/esp/require/out
>>
>> # ipsecctl -sa
>> FLOWS:
>> flow esp in from 10.20.0.0/16 to 10.21.35.0/24 peer 212.37.141.59 srcid
>> 212.37.141.60/32 dstid 212.37.141.59/32 type use
>> flow esp out from 10.21.35.0/24 to 10.20.0.0/16 peer 212.37.141.59 srcid
>> 212.37.141.60/32 dstid 212.37.141.59/32 type require
>>
>> SAD:
>> esp tunnel from 212.37.141.59 to 212.37.141.60 spi 0xc2e3c650 auth
>> hmac-sha2-256 enc aes
>> esp tunnel from 212.37.141.60 to 212.37.141.59 spi 0xc5853584 auth
>> hmac-sha2-256 enc aes
>>
>>
>>
>> On FW y
>> # cat /etc/ipsec.conf
>> ike esp from 10.20.0.0/16 to 10.21.35.0/24 peer 212.37.141.60 psk
>> "lotsofFishs4meAndyou"
>>
>> netstat -rn
>> Encap:
>> Source             Port  Destination        Port  Proto
>> SA(Address/Proto/Type/Direction)
>> 10.21.35/24        0     10.20/16           0     0
>> 212.37.141.60/esp/use/in
>> 10.20/16           0     10.21.35/24        0     0
>> 212.37.141.60/esp/require/out
>>
>> # ipsecctl -sa
>> FLOWS:
>> flow esp in from 10.21.35.0/24 to 10.20.0.0/16 peer 212.37.141.60 srcid
>> 212.37.141.59/32 dstid 212.37.141.60/32 type use
>> flow esp out from 10.20.0.0/16 to 10.21.35.0/24 peer 212.37.141.60 srcid
>> 212.37.141.59/32 dstid 212.37.141.60/32 type require
>>
>> SAD:
>> esp tunnel from 212.37.141.59 to 212.37.141.60 spi 0xc2e3c650 auth
>> hmac-sha2-256 enc aes
>> esp tunnel from 212.37.141.60 to 212.37.141.59 spi 0xc5853584 auth
>> hmac-sha2-256 enc aes
>>
>> Offcourse on both machines
>> net.inet.ip.forwarding=1
>>
>> Pinging from a host on NET x
>> Request timeout for icmp_seq 1402
>> 36 bytes from 10.21.35.1: Destination Host Unreachable
>> Vr HL TOS  Len   ID Flg  off TTL Pro  cks      Src      Dst
>>  4  5  00 5400 736e   0 0000  40  01 cfa4 10.21.35.100  10.20.0.10
>>
>> The gateway clearly answers that it can't route the packet!?
>>
>> Pinging directly from FWx to FWy WORKS !!! ???
>>
>> # ping -I 10.21.35.1 10.20.0.1
>> PING 10.20.0.1 (10.20.0.1): 56 data bytes
>> 64 bytes from 10.20.0.1: icmp_seq=0 ttl=255 time=1.185 ms
>> 64 bytes from 10.20.0.1: icmp_seq=1 ttl=255 time=0.829 ms
>> Dump while ping
>> # tcpdump -i enc0 -n
>> tcpdump: listening on enc0, link-type ENC
>> 13:52:24.297384 (authentic,confidential): SPI 0xc5853584: 10.21.35.1>
>>  10.20.0.1: icmp: echo request (encap)
>> 13:52:24.297508 (authentic,confidential): SPI 0xc2e3c650: 10.20.0.1>
>>  10.21.35.1: icmp: echo reply (encap)
>> 13:52:25.299664 (authentic,confidential): SPI 0xc5853584: 10.21.35.1>
>>  10.20.0.1: icmp: echo request (encap)
>> 13:52:25.299760 (authentic,confidential): SPI 0xc2e3c650: 10.20.0.1>
>>  10.21.35.1: icmp: echo reply (encap)
>>
>>
>> Routing is the problem ? what is the cause ? It looks like each FW doesn't
>> permit routing packets from LAN hosts.
>>
>> Thanks for you help
>>
>> Regards
>>
>> Morten Bech Christensen

Reply via email to