On Mon, Mar 01, 2010 at 11:57:41AM +0100, Tony Sarendal wrote:

> Good morning misc,
> 
> I upgraded two devices from i386-4.6 to i386-snapshot-feb28.
> After the upgrade snapshot boxes are unable to communicate with the 4.6
> devices
> when going through ipsec. snapshot-snapshot works fine.
> 
> Everything looks ok except that nothing shows up on enc0 when doing
> 4.6<-->snapshot.
> Deleting the SA's restores connectiviy, unencrypted of course.
> Is this a known issue ?

Yes: http://www.openbsd.org/faq/current.html#20100110

        -Otto

> 
> /T
> 
> bmr1.jfa: 212.112.186.174 (4.6)
> bmr1.brh: 212.188.183.71 (snapshot)
> 
> ---
> bmr1.jfa# ipsecctl -sa | grep 212.188.183.71
> flow esp in from 212.188.183.71 to 212.112.186.174 peer 212.188.183.71 srcid
> 212.112.186.174/32 dstid 212.188.183.71/32 type use
> flow esp out from 212.112.186.174 to 212.188.183.71 peer 212.188.183.71
> srcid 212.112.186.174/32 dstid 212.188.183.71/32 type require
> esp transport from 212.188.183.71 to 212.112.186.174 spi 0x3f91b3c2 auth
> hmac-sha2-256 enc aes
> esp transport from 212.112.186.174 to 212.188.183.71 spi 0xa797ec1e auth
> hmac-sha2-256 enc aes
> bmr1.jfa#
> 
> bmr1.brh# ipsecctl -sa | grep 212.112.186.174
> flow esp in from 212.112.186.174 to 212.188.183.71 peer 212.112.186.174
> srcid 212.188.183.71/32 dstid 212.112.186.174/32 type use
> flow esp out from 212.188.183.71 to 212.112.186.174 peer 212.112.186.174
> srcid 212.188.183.71/32 dstid 212.112.186.174/32 type require
> esp transport from 212.188.183.71 to 212.112.186.174 spi 0x3f91b3c2 auth
> hmac-sha2-256 enc aes
> esp transport from 212.112.186.174 to 212.188.183.71 spi 0xa797ec1e auth
> hmac-sha2-256 enc aes
> bmr1.brh#
> 
> bmr1.brh# pfctl -d
> pf disabled
> bmr1.brh# tcpdump -n -p -i vlan301 host 212.112.186.174 &
> [1] 2099
> bmr1.brh# tcpdump: listening on vlan301, link-type EN10MB
> bmr1.brh# tcpdump -n -p -i enc0 &
> [2] 23922
> bmr1.brh# tcpdump: listening on enc0, link-type ENC
> bmr1.brh#
> 
> bmr1.jfa# tcpdump -n -p -i bge0 host 212.188.183.71 &
> [1] 443
> bmr1.jfa# tcpdump: listening on bge0, link-type EN10MB
> bmr1.jfa# tcpdump -n -p -i enc0 &
> [2] 16714
> bmr1.jfa# tcpdump: listening on enc0, link-type ENC
> bmr1.jfa#
> 
> 
> bmr1.jfa# ping 212.188.183.71
> PING 212.188.183.71 (212.188.183.71): 56 data bytes
> 11:21:48.081933 (authentic,confidential): SPI 0x007e7833: 212.112.186.174 >
> 212.188.183.71: icmp: echo request
> 11:21:48.081969 esp 212.112.186.174 > 212.188.183.71 spi 0x007e7833 seq 15
> len 116
> 11:21:49.085937 (authentic,confidential): SPI 0x007e7833: 212.112.186.174 >
> 212.188.183.71: icmp: echo request
> 11:21:49.085974 esp 212.112.186.174 > 212.188.183.71 spi 0x007e7833 seq 16
> len 116
> 11:21:50.095970 (authentic,confidential): SPI 0x007e7833: 212.112.186.174 >
> 212.188.183.71: icmp: echo request
> 11:21:50.096006 esp 212.112.186.174 > 212.188.183.71 spi 0x007e7833 seq 17
> len 116
> 11:21:51.106010 (authentic,confidential): SPI 0x007e7833: 212.112.186.174 >
> 212.188.183.71: icmp: echo request
> 11:21:51.106045 esp 212.112.186.174 > 212.188.183.71 spi 0x007e7833 seq 18
> len 116
> 
> bmr1.brh# 10:21:48.102134 esp 212.112.186.174 > 212.188.183.71 spi
> 0x007e7833 seq 15 len 116
> 10:21:49.106079 esp 212.112.186.174 > 212.188.183.71 spi 0x007e7833 seq 16
> len 116
> 10:21:50.116146 esp 212.112.186.174 > 212.188.183.71 spi 0x007e7833 seq 17
> len 116
> 10:21:51.126213 esp 212.112.186.174 > 212.188.183.71 spi 0x007e7833 seq 18
> len 116
> 
> ----
> 
> bmr1.jfa# grep 212.188.183.71 /etc/ipsec.conf
> ike esp transport from 212.112.186.174 to 212.188.183.71
> 
> bmr1.brh# grep 212.112.186.174 /etc/ipsec.conf
> ike esp transport from 212.188.183.71 to 212.112.186.174

Reply via email to