Hi All,

The problem I experienced was indeed in a testbed between an Alix and Soekris 
(not part of the problem:-)
And the reason was that none of the VPN endpoints had a default gw (they share 
a common wan subnet while I should trial an ipsec solution)

I gave both of the a default GW IP that pointed to the other box WAN address 
and sure thing - EVERYTHING WORKS


Thanks guys for prompt and competent help, I sincerely respect you're 
expertise!!!







Den 23/02/2012 kl. 17.40 skrev Russell Garrison:

> I can confirm this. Spent way too much time in my VMWare lab on this
> until I thought to add a default route to the host-only interfaces I
> was running the tunnel on. All you need is default route and it will
> work. I have found that "fleshed out" config for networking on OpenBSD
> is a sure way to clear up some of the more strange things that can
> happen.
> 
> On Thu, Feb 23, 2012 at 10:43 AM, Aner Perez <a...@ncstech.com> wrote:
>> See the thread titled "ipsec tunnel traffic getting icmp host unreachable"
>> on this same list.
>> 
>> In short, the answer is that you need a standard route (in addition to the
>> encap route) to the destination networks.
>> 
>> Any route that covers your destination network will do.  In my case,
> instead
>> of adding routes for each of my ipsec tunnels, I just added a default route
>> and that fixed the problem.  It won't actually use the gateway listed on
>> this route, for that it uses the encap route.
>> 
>>      - Aner
>> 
>> 
>> On 02/22/2012 05:22 PM, Morten Christensen wrote:
>>> 
>>> Dear fellow OpenBSD friends.
>>> 
>>> I'm setting up 2 FW's that should form a VPN tunnel securing the net
>>> behind each FW - simple
>>> 
>>> NET x ->  FW x ->  WAN ->  FW y ->  NET y
>>> 
>>> I'm using ipsec.conf / ipsecctl. OpenBSD 5, pf is disabled.
>>> 
>>> On FW x
>>> # cat /etc/ipsec.conf
>>> ike esp from 10.21.35.0/24 to 10.20.0.0/16 peer 212.37.141.59 psk
>>> "lotsofFishs4meAndyou"
>>> 
>>> netstat -rn
>>> Encap:
>>> Source             Port  Destination        Port  Proto
>>> SA(Address/Proto/Type/Direction)
>>> 10.20/16           0     10.21.35/24        0     0
>>> 212.37.141.59/esp/use/in
>>> 10.21.35/24        0     10.20/16           0     0
>>> 212.37.141.59/esp/require/out
>>> 
>>> # ipsecctl -sa
>>> FLOWS:
>>> flow esp in from 10.20.0.0/16 to 10.21.35.0/24 peer 212.37.141.59 srcid
>>> 212.37.141.60/32 dstid 212.37.141.59/32 type use
>>> flow esp out from 10.21.35.0/24 to 10.20.0.0/16 peer 212.37.141.59 srcid
>>> 212.37.141.60/32 dstid 212.37.141.59/32 type require
>>> 
>>> SAD:
>>> esp tunnel from 212.37.141.59 to 212.37.141.60 spi 0xc2e3c650 auth
>>> hmac-sha2-256 enc aes
>>> esp tunnel from 212.37.141.60 to 212.37.141.59 spi 0xc5853584 auth
>>> hmac-sha2-256 enc aes
>>> 
>>> 
>>> 
>>> On FW y
>>> # cat /etc/ipsec.conf
>>> ike esp from 10.20.0.0/16 to 10.21.35.0/24 peer 212.37.141.60 psk
>>> "lotsofFishs4meAndyou"
>>> 
>>> netstat -rn
>>> Encap:
>>> Source             Port  Destination        Port  Proto
>>> SA(Address/Proto/Type/Direction)
>>> 10.21.35/24        0     10.20/16           0     0
>>> 212.37.141.60/esp/use/in
>>> 10.20/16           0     10.21.35/24        0     0
>>> 212.37.141.60/esp/require/out
>>> 
>>> # ipsecctl -sa
>>> FLOWS:
>>> flow esp in from 10.21.35.0/24 to 10.20.0.0/16 peer 212.37.141.60 srcid
>>> 212.37.141.59/32 dstid 212.37.141.60/32 type use
>>> flow esp out from 10.20.0.0/16 to 10.21.35.0/24 peer 212.37.141.60 srcid
>>> 212.37.141.59/32 dstid 212.37.141.60/32 type require
>>> 
>>> SAD:
>>> esp tunnel from 212.37.141.59 to 212.37.141.60 spi 0xc2e3c650 auth
>>> hmac-sha2-256 enc aes
>>> esp tunnel from 212.37.141.60 to 212.37.141.59 spi 0xc5853584 auth
>>> hmac-sha2-256 enc aes
>>> 
>>> Offcourse on both machines
>>> net.inet.ip.forwarding=1
>>> 
>>> Pinging from a host on NET x
>>> Request timeout for icmp_seq 1402
>>> 36 bytes from 10.21.35.1: Destination Host Unreachable
>>> Vr HL TOS  Len   ID Flg  off TTL Pro  cks      Src      Dst
>>> 4  5  00 5400 736e   0 0000  40  01 cfa4 10.21.35.100  10.20.0.10
>>> 
>>> The gateway clearly answers that it can't route the packet!?
>>> 
>>> Pinging directly from FWx to FWy WORKS !!! ???
>>> 
>>> # ping -I 10.21.35.1 10.20.0.1
>>> PING 10.20.0.1 (10.20.0.1): 56 data bytes
>>> 64 bytes from 10.20.0.1: icmp_seq=0 ttl=255 time=1.185 ms
>>> 64 bytes from 10.20.0.1: icmp_seq=1 ttl=255 time=0.829 ms
>>> Dump while ping
>>> # tcpdump -i enc0 -n
>>> tcpdump: listening on enc0, link-type ENC
>>> 13:52:24.297384 (authentic,confidential): SPI 0xc5853584: 10.21.35.1>
>>> 10.20.0.1: icmp: echo request (encap)
>>> 13:52:24.297508 (authentic,confidential): SPI 0xc2e3c650: 10.20.0.1>
>>> 10.21.35.1: icmp: echo reply (encap)
>>> 13:52:25.299664 (authentic,confidential): SPI 0xc5853584: 10.21.35.1>
>>> 10.20.0.1: icmp: echo request (encap)
>>> 13:52:25.299760 (authentic,confidential): SPI 0xc2e3c650: 10.20.0.1>
>>> 10.21.35.1: icmp: echo reply (encap)
>>> 
>>> 
>>> Routing is the problem ? what is the cause ? It looks like each FW doesn't
>>> permit routing packets from LAN hosts.
>>> 
>>> Thanks for you help
>>> 
>>> Regards
>>> 
>>> Morten Bech Christensen

Reply via email to