That seems to have fixed it, thanks!

--Paul


On Feb 2, 2011, at 5:12 AM, Otto Moerbeek wrote:

> On Wed, Feb 02, 2011 at 03:05:49AM -0500, Paul Suh wrote:
>
>> Folks,
>>
>> I'm running 4.8-stable on one end and 4.5-stable at the other of a
>> site-to-site IPSec VPN tunnel. (I'm trying to make sure that things are
>> working before upgrading the 4.5-stable end.) The tunnel is configured
using
>> ipsec.conf and ipsecctl, and the relevant portions of the configs are:
>
> http://www.openbsd.org/faq/upgrade47.html#hmac-sha2
>
>       -Otto
>
>>
>> 4.8 side
>> ----------
>> ike esp from $internal_subnet \
>>        to $outpost_subnet \
>>        local $fios_tunnel_host \
>>        peer $outpost_tunnel_host
>>
>> 4.5 side
>> ----------
>> ike passive esp from $local_network to $remote_network peer
>> $remote_gateway_ip
>>
>> The flows and SAs that come up are:
>>
>> 4.8 side
>> ----------
>> FLOWS:
>> flow esp in from 192.168.140.0/24 to 192.168.137.0/24 peer 64.237.99.79
srcid
>> 71.163.154.173/32 dstid 64.237.99.79/32 type use
>> flow esp out from 192.168.137.0/24 to 192.168.140.0/24 peer 64.237.99.79
srcid
>> 71.163.154.173/32 dstid 64.237.99.79/32 type require
>>
>> SAD:
>> esp tunnel from 71.163.154.173 to 64.237.99.79 spi 0x0b2168ad auth
>> hmac-sha2-256 enc aes
>> esp tunnel from 64.237.99.79 to 71.163.154.173 spi 0xffff2d0b auth
>> hmac-sha2-256 enc aes
>>
>> 4.5 side
>> ----------
>> FLOWS:
>> flow esp in from 192.168.137.0/24 to 192.168.140.0/24 peer 71.163.154.173
>> srcid 64.237.99.79/32 dstid 71.163.154.173/32 type use
>> flow esp out from 192.168.140.0/24 to 192.168.137.0/24 peer 71.163.154.173
>> srcid 64.237.99.79/32 dstid 71.163.154.173/32 type require
>>
>> SAD:
>> esp tunnel from 71.163.154.173 to 64.237.99.79 spi 0x0b2168ad auth
>> hmac-sha2-256 enc aes
>> esp tunnel from 64.237.99.79 to 71.163.154.173 spi 0xffff2d0b auth
>> hmac-sha2-256 enc aes
>>
>> Relevant pf rules are:
>>
>> 4.8 side
>> ----------
>> pass in quick on sis1 inet proto udp from 64.237.99.79 to 71.163.154.173
port
>> = isakmp keep state
>> pass in quick on sis1 inet proto esp from 64.237.99.79 to 71.163.154.173
keep
>> state
>> pass out quick on sis1 inet proto udp from 71.163.154.173 to 64.237.99.79
port
>> = isakmp keep state
>> pass out quick on sis1 inet proto esp from 71.163.154.173 to 64.237.99.79
keep
>> state
>>
>> 4.5 side
>> ----------
>> pass log quick on enc0
>> pass in quick on $ext_if proto udp from 71.163.154.173 to 64.237.99.79
port
>> 500
>> pass out quick on $ext_if proto udp from 64.237.99.79 to 71.163.154.173
port
>> 500
>> pass in quick on $ext_if proto udp from 71.163.154.173 to 64.237.99.79
port
>> 4500
>> pass out quick on $ext_if proto udp from 64.237.99.79 to 71.163.154.173
port
>> 4500
>> pass in quick on $ext_if proto esp from 71.163.154.173 to 64.237.99.79
>> pass out quick on $ext_if proto esp from 64.237.99.79 to 71.163.154.173
>>
>>
>> The security associations come up just fine, and I can see packets going
into
>> the tunnel at the 4.8 end on enc0, and I can see the packets going out
over
>> ESP to the destination, but they never show up on enc0 at the 4.5 end.
What's
>> really frustrating is that
>>
>>      a) other tunnels to Sonicwall devices work just fine from the 4.8 side
>>
>>      b) I am upgrading the device that is now 4.8 from a 4.5 installation, 
>> and
the
>> tunnel worked just fine before.
>>
>> Any ideas on what might be happening or how to further troubleshoot this?
>>
>>
>>
>> --Paul
>>
>> [demime 1.01d removed an attachment of type application/pkcs7-signature
which had a name of smime.p7s]

[demime 1.01d removed an attachment of type application/pkcs7-signature which 
had a name of smime.p7s]

Reply via email to