On Wed, Feb 02, 2011 at 03:05:49AM -0500, Paul Suh wrote: > Folks, > > I'm running 4.8-stable on one end and 4.5-stable at the other of a > site-to-site IPSec VPN tunnel. (I'm trying to make sure that things are > working before upgrading the 4.5-stable end.) The tunnel is configured using > ipsec.conf and ipsecctl, and the relevant portions of the configs are:
http://www.openbsd.org/faq/upgrade47.html#hmac-sha2 -Otto > > 4.8 side > ---------- > ike esp from $internal_subnet \ > to $outpost_subnet \ > local $fios_tunnel_host \ > peer $outpost_tunnel_host > > 4.5 side > ---------- > ike passive esp from $local_network to $remote_network peer > $remote_gateway_ip > > The flows and SAs that come up are: > > 4.8 side > ---------- > FLOWS: > flow esp in from 192.168.140.0/24 to 192.168.137.0/24 peer 64.237.99.79 srcid > 71.163.154.173/32 dstid 64.237.99.79/32 type use > flow esp out from 192.168.137.0/24 to 192.168.140.0/24 peer 64.237.99.79 srcid > 71.163.154.173/32 dstid 64.237.99.79/32 type require > > SAD: > esp tunnel from 71.163.154.173 to 64.237.99.79 spi 0x0b2168ad auth > hmac-sha2-256 enc aes > esp tunnel from 64.237.99.79 to 71.163.154.173 spi 0xffff2d0b auth > hmac-sha2-256 enc aes > > 4.5 side > ---------- > FLOWS: > flow esp in from 192.168.137.0/24 to 192.168.140.0/24 peer 71.163.154.173 > srcid 64.237.99.79/32 dstid 71.163.154.173/32 type use > flow esp out from 192.168.140.0/24 to 192.168.137.0/24 peer 71.163.154.173 > srcid 64.237.99.79/32 dstid 71.163.154.173/32 type require > > SAD: > esp tunnel from 71.163.154.173 to 64.237.99.79 spi 0x0b2168ad auth > hmac-sha2-256 enc aes > esp tunnel from 64.237.99.79 to 71.163.154.173 spi 0xffff2d0b auth > hmac-sha2-256 enc aes > > Relevant pf rules are: > > 4.8 side > ---------- > pass in quick on sis1 inet proto udp from 64.237.99.79 to 71.163.154.173 port > = isakmp keep state > pass in quick on sis1 inet proto esp from 64.237.99.79 to 71.163.154.173 keep > state > pass out quick on sis1 inet proto udp from 71.163.154.173 to 64.237.99.79 port > = isakmp keep state > pass out quick on sis1 inet proto esp from 71.163.154.173 to 64.237.99.79 keep > state > > 4.5 side > ---------- > pass log quick on enc0 > pass in quick on $ext_if proto udp from 71.163.154.173 to 64.237.99.79 port > 500 > pass out quick on $ext_if proto udp from 64.237.99.79 to 71.163.154.173 port > 500 > pass in quick on $ext_if proto udp from 71.163.154.173 to 64.237.99.79 port > 4500 > pass out quick on $ext_if proto udp from 64.237.99.79 to 71.163.154.173 port > 4500 > pass in quick on $ext_if proto esp from 71.163.154.173 to 64.237.99.79 > pass out quick on $ext_if proto esp from 64.237.99.79 to 71.163.154.173 > > > The security associations come up just fine, and I can see packets going into > the tunnel at the 4.8 end on enc0, and I can see the packets going out over > ESP to the destination, but they never show up on enc0 at the 4.5 end. What's > really frustrating is that > > a) other tunnels to Sonicwall devices work just fine from the 4.8 side > > b) I am upgrading the device that is now 4.8 from a 4.5 installation, > and the > tunnel worked just fine before. > > Any ideas on what might be happening or how to further troubleshoot this? > > > > --Paul > > [demime 1.01d removed an attachment of type application/pkcs7-signature which > had a name of smime.p7s]