Good morning misc,

I upgraded two devices from i386-4.6 to i386-snapshot-feb28.
After the upgrade snapshot boxes are unable to communicate with the 4.6
devices
when going through ipsec. snapshot-snapshot works fine.

Everything looks ok except that nothing shows up on enc0 when doing
4.6<-->snapshot.
Deleting the SA's restores connectiviy, unencrypted of course.
Is this a known issue ?

/T

bmr1.jfa: 212.112.186.174 (4.6)
bmr1.brh: 212.188.183.71 (snapshot)

---
bmr1.jfa# ipsecctl -sa | grep 212.188.183.71
flow esp in from 212.188.183.71 to 212.112.186.174 peer 212.188.183.71 srcid
212.112.186.174/32 dstid 212.188.183.71/32 type use
flow esp out from 212.112.186.174 to 212.188.183.71 peer 212.188.183.71
srcid 212.112.186.174/32 dstid 212.188.183.71/32 type require
esp transport from 212.188.183.71 to 212.112.186.174 spi 0x3f91b3c2 auth
hmac-sha2-256 enc aes
esp transport from 212.112.186.174 to 212.188.183.71 spi 0xa797ec1e auth
hmac-sha2-256 enc aes
bmr1.jfa#

bmr1.brh# ipsecctl -sa | grep 212.112.186.174
flow esp in from 212.112.186.174 to 212.188.183.71 peer 212.112.186.174
srcid 212.188.183.71/32 dstid 212.112.186.174/32 type use
flow esp out from 212.188.183.71 to 212.112.186.174 peer 212.112.186.174
srcid 212.188.183.71/32 dstid 212.112.186.174/32 type require
esp transport from 212.188.183.71 to 212.112.186.174 spi 0x3f91b3c2 auth
hmac-sha2-256 enc aes
esp transport from 212.112.186.174 to 212.188.183.71 spi 0xa797ec1e auth
hmac-sha2-256 enc aes
bmr1.brh#

bmr1.brh# pfctl -d
pf disabled
bmr1.brh# tcpdump -n -p -i vlan301 host 212.112.186.174 &
[1] 2099
bmr1.brh# tcpdump: listening on vlan301, link-type EN10MB
bmr1.brh# tcpdump -n -p -i enc0 &
[2] 23922
bmr1.brh# tcpdump: listening on enc0, link-type ENC
bmr1.brh#

bmr1.jfa# tcpdump -n -p -i bge0 host 212.188.183.71 &
[1] 443
bmr1.jfa# tcpdump: listening on bge0, link-type EN10MB
bmr1.jfa# tcpdump -n -p -i enc0 &
[2] 16714
bmr1.jfa# tcpdump: listening on enc0, link-type ENC
bmr1.jfa#


bmr1.jfa# ping 212.188.183.71
PING 212.188.183.71 (212.188.183.71): 56 data bytes
11:21:48.081933 (authentic,confidential): SPI 0x007e7833: 212.112.186.174 >
212.188.183.71: icmp: echo request
11:21:48.081969 esp 212.112.186.174 > 212.188.183.71 spi 0x007e7833 seq 15
len 116
11:21:49.085937 (authentic,confidential): SPI 0x007e7833: 212.112.186.174 >
212.188.183.71: icmp: echo request
11:21:49.085974 esp 212.112.186.174 > 212.188.183.71 spi 0x007e7833 seq 16
len 116
11:21:50.095970 (authentic,confidential): SPI 0x007e7833: 212.112.186.174 >
212.188.183.71: icmp: echo request
11:21:50.096006 esp 212.112.186.174 > 212.188.183.71 spi 0x007e7833 seq 17
len 116
11:21:51.106010 (authentic,confidential): SPI 0x007e7833: 212.112.186.174 >
212.188.183.71: icmp: echo request
11:21:51.106045 esp 212.112.186.174 > 212.188.183.71 spi 0x007e7833 seq 18
len 116

bmr1.brh# 10:21:48.102134 esp 212.112.186.174 > 212.188.183.71 spi
0x007e7833 seq 15 len 116
10:21:49.106079 esp 212.112.186.174 > 212.188.183.71 spi 0x007e7833 seq 16
len 116
10:21:50.116146 esp 212.112.186.174 > 212.188.183.71 spi 0x007e7833 seq 17
len 116
10:21:51.126213 esp 212.112.186.174 > 212.188.183.71 spi 0x007e7833 seq 18
len 116

----

bmr1.jfa# grep 212.188.183.71 /etc/ipsec.conf
ike esp transport from 212.112.186.174 to 212.188.183.71

bmr1.brh# grep 212.112.186.174 /etc/ipsec.conf
ike esp transport from 212.188.183.71 to 212.112.186.174

Reply via email to