Current problem reports assigned to you

2006-05-08 Thread FreeBSD bugmaster
Current FreeBSD problem reports
Critical problems
Serious problems

S  Submitted   Tracker Resp.   Description
---
o [2006/01/30] kern/92552  net A serious bug in most network drivers fro
f [2006/02/12] kern/93220  net [inet6] nd6_lookup: failed to add route f

2 problems total.

Non-critical problems

S  Submitted   Tracker Resp.   Description
---
o [2003/07/11] kern/54383  net [nfs] [patch] NFS root configurations wit
o [2006/04/03] kern/95267  net packet drops periodically appear

2 problems total.

___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


IPSEC Interop problem with Cisco using multiple SA's

2006-05-08 Thread David DeSimone
I am having a problem establishing peering between my FreeBSD 6.0
gateway and a Cisco device, using IPSEC.  The peering works fine if
there is only one subnet behind the remote gateway, but it fails when
there is more than one subnet.  I believe the FreeBSD side is failing
to be as strict with the Security Associations being negotiated.

More details below:



Basic info:

Gateway 1:  Cisco 7200VXR

IP: 1.2.3.4

Subnets:10.11.11.0/24
10.22.22.0/24

Gateway 2:  FreeBSD 6.0-RELEASE

IP: 4.3.2.1

Subnet: 10.99.99.0/24



Cisco config:

interface GigabitEthernet0/1
 ip address 1.2.3.4 255.255.255.0
 crypto map IPSEC

crypto map IPSEC local-address GigabitEthernet0/1

crypto isakmp policy 1
 encr 3des
 hash md5
 authentication pre-share
 group 2
 lifetime 86000

crypto isakmp key  address 4.3.2.1

crypto ipsec transform-set 3DES-MD5 esp-3des esp-md5-hmac 

crypto map IPSEC 1 ipsec-isakmp 
 set peer 4.3.2.1
 set transform-set 3DES-MD5 
 match address remote-lan

ip access-list extended remote-lan
 permit ip 10.11.11.0 0.0.0.255 10.99.99.0 0.0.0.255
 permit ip 10.22.22.0 0.0.0.255 10.99.99.0 0.0.0.255



ipsec.conf:

spdadd  10.11.11.0/24  10.99.99.0/24  any  -P in ipsec \
esp/tunnel/1.2.3.4-4.3.2.1/require;
spdadd  10.22.22.0/24  10.99.99.0/24  any  -P in ipsec \
esp/tunnel/1.2.3.4-4.3.2.1/require;

spdadd  10.99.99.0/24  10.11.11.0/24  any  -P out ipsec \
esp/tunnel/4.3.2.1-1.2.3.4/require;
spdadd  10.99.99.0/24  10.22.22.0/24  any  -P out ipsec \
esp/tunnel/4.3.2.1-1.2.3.4/require;



racoon.conf:

path  pre_shared_key  "/usr/local/etc/ipsec.keys";

listen
{
isakmp  4.3.2.1;
}

remote  1.2.3.4
{
exchange_mode  aggressive,main,base;
my_identifier address  4.3.2.1;
peers_identifier  address  1.2.3.4;
verify_identifier  off;
proposal_check  claim;

proposal
{
encryption_algorithm3des;
hash_algorithm  md5;
authentication_method   pre_shared_key;
dh_group2;
lifetimetime24 hours;
}
}

sainfo  address  10.11.11.0/24 any   address  10.99.99.0/24 any
{
lifetimetime1 hour;
encryption_algorithm3des;
authentication_algorithmhmac_md5;
compression_algorithm   deflate;
}

sainfo  address  10.22.22.0/24 any   address  10.99.99.0/24 any
{
lifetimetime1 hour;
encryption_algorithm3des;
authentication_algorithmhmac_md5;
compression_algorithm   deflate;
}

sainfo  address  10.99.99.0/24 any   address  10.11.11.0/24 any
{
lifetimetime1 hour;
encryption_algorithm3des;
authentication_algorithmhmac_md5;
compression_algorithm   deflate;
}

sainfo  address  10.99.99.0/24 any   address  10.22.22.0/24 any
{
lifetimetime1 hour;
encryption_algorithm3des;
authentication_algorithmhmac_md5;
compression_algorithm   deflate;
}



ipsec.keys:

1.2.3.4  



I believe my configuration is sound, even though it may not match some
of the recipes found on the net.


First test:  Inbound traffic

A remote system (10.11.11.88) pings a system (10.99.99.11) behind my
gateway.  The result is success.  Here is the resulting SA on the Cisco
side:

# show crypto ipsec sa peer 4.3.2.1

interface: GigabitEthernet0/1
Crypto map tag: IPSEC, local addr. 1.2.3.4

   protected vrf: 
   local  ident (addr/mask/prot/port): (10.11.11.0/255.255.255.0/0/0)
   remote ident (addr/mask/prot/port): (10.99.99.0/255.255.255.0/0/0)
   current_peer: 4.3.2.1:500
 PERMIT, flags={origin_is_acl,}
#pkts encaps: 173, #pkts encrypt: 173, #pkts digest 173
#pkts decaps: 839, #pkts decrypt: 839, #pkts verify 839
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts compr. failed: 0
#pkts not decompressed: 0, #pkts decompress failed: 0
#send errors 101, #recv errors 636

 local crypto endpt.: 1.2.3.4, remote crypto endpt.: 4.3.2.1
 path mtu 1500, media mtu 1500
 current outbound spi: EA6BAC9

 inbound esp sas:
  spi: 0x307C7433(813462579)
transform: esp-3des esp-md5-hmac ,
in use settings ={Tunnel, }
slot: 0, conn id: 8531, flow_id: 8169, crypto map: IPSEC
sa timing: remaining key lifetime (k/sec): (4445960/3275)
IV size: 8 bytes
replay detection support: Y

 inbound ah sas:

 inbound pcp sas:

 outbound esp sas:
  spi: 0xEA6BAC9(245807817)
transform: esp-3des esp-md5-hmac ,
in use settings ={Tunnel, }
slot: 0, conn id: 8532, flow_id: 8170, crypto map: IPSEC
sa timing: remaining

Re: Packet loss with traffic shaper and routing

2006-05-08 Thread tpeixoto

Interesting.
I'll try to take a look when I have some free time and then post some 
comments.


Thanks.


John-Mark Gurney wrote:

[EMAIL PROTECTED] wrote this message on Wed, May 03, 2006 at 22:40 -0300:
Anyway, I am very curious about the result of test 2. Why do the pipes 
have influence on system performance if there is nothing passing through 
them?


It looks like each tick all the pipes are scanned...  In dummynet:
/* Sweep pipes trying to expire idle flow_queues. */
for (i = 0; i < HASHSIZE; i++)
SLIST_FOREACH(pipe, &pipehash[i], next)

That bit of code should probably be run less often...


___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: Packet loss with traffic shaper and routing

2006-05-08 Thread tpeixoto

I guess traffic stops if you have pipe rules.
In test 1, I did:

${fwcmd} pipe 1 config bw 512Kbit/s
${fwcmd} pipe 2 config bw 512Kbit/s
${fwcmd} add _allow_ all from any to any MAC any 00:11:22:33:44:55 in
${fwcmd} add _allow_ all from any to any MAC 00:11:22:33:44:55 any out

x 1600 times.
That caused lots of interrupts. Traffic was flowing although no shaping 
was done.

Then, in test 2, with the same rules above, I just flushed the pipes:
ipfw pipe flush
The traffic was there, and the result is what I said in last post...


"."@babolo.ru wrote:

[ Charset ISO-8859-1 unsupported, converting... ]

Very good. You're right!
I inserted a rule to match all non-layer2 packets on the top of the 
ruleset and interrupts dropped 10~20% immediately.
Given that, I went to apply Julian's idea of grouping 'in' and 'out' 
pipe rules to reduce the searching on the firewall and that gave me a 
little bit more of performance.

As interrupts were still hitting 60% mark, I did some more experiences:

Test 1: I changed all 'pipe' rules to 'allow' rules, so all packets were 
allowed and no shaping was done. The pipes were still there, but there 
were no rules pointing packets to them.

Result: No difference. Interrupts are the same as before.
Conclusion: It's not the shaping itself that slows the system.

Test 2: With the same ruleset of test 1, I just removed all pipes (ipfw 
pipe flush).

As far as I understand traffic stops after pipe flush,
and this is reason for CPU goes down


Result: Interrupts were only 20%!
Conclusion: Lots of pipes bother the system. I didn't figure out why, 
but it's not a coincidence. I tested several times to make sure.



[...]
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: IPSEC Interop problem with Cisco using multiple SA's

2006-05-08 Thread Eugene M. Kim
I haven't tried this myself, but you may want to try using 
"unique:" instead of "require" as the policy level, with 
 set to a unique policy identifier, which is an integer you 
can pick between 1 and 32767 inclusive, for each security policy. This 
makes the security policy "claim" the security associations whose 
generation it triggers, by marking the SAs with its integer identifier 
so that they are not used for any other security policy.  I guess Cisco 
does this automatically; FreeBSD/KAME does not.


Cheers,
Eugene

David DeSimone wrote:

I am having a problem establishing peering between my FreeBSD 6.0
gateway and a Cisco device, using IPSEC.  The peering works fine if
there is only one subnet behind the remote gateway, but it fails when
there is more than one subnet.  I believe the FreeBSD side is failing
to be as strict with the Security Associations being negotiated.

More details below:



Basic info:

Gateway 1:  Cisco 7200VXR

IP: 1.2.3.4

Subnets:10.11.11.0/24
10.22.22.0/24

Gateway 2:  FreeBSD 6.0-RELEASE

IP: 4.3.2.1

Subnet: 10.99.99.0/24



Cisco config:

interface GigabitEthernet0/1
 ip address 1.2.3.4 255.255.255.0
 crypto map IPSEC

crypto map IPSEC local-address GigabitEthernet0/1

crypto isakmp policy 1
 encr 3des
 hash md5
 authentication pre-share
 group 2
 lifetime 86000

crypto isakmp key  address 4.3.2.1

crypto ipsec transform-set 3DES-MD5 esp-3des esp-md5-hmac 

crypto map IPSEC 1 ipsec-isakmp 
 set peer 4.3.2.1
 set transform-set 3DES-MD5 
 match address remote-lan


ip access-list extended remote-lan
 permit ip 10.11.11.0 0.0.0.255 10.99.99.0 0.0.0.255
 permit ip 10.22.22.0 0.0.0.255 10.99.99.0 0.0.0.255



ipsec.conf:

spdadd  10.11.11.0/24  10.99.99.0/24  any  -P in ipsec \
esp/tunnel/1.2.3.4-4.3.2.1/require;
spdadd  10.22.22.0/24  10.99.99.0/24  any  -P in ipsec \
esp/tunnel/1.2.3.4-4.3.2.1/require;

spdadd  10.99.99.0/24  10.11.11.0/24  any  -P out ipsec \
esp/tunnel/4.3.2.1-1.2.3.4/require;
spdadd  10.99.99.0/24  10.22.22.0/24  any  -P out ipsec \
esp/tunnel/4.3.2.1-1.2.3.4/require;



racoon.conf:

path  pre_shared_key  "/usr/local/etc/ipsec.keys";

listen
{
isakmp  4.3.2.1;
}

remote  1.2.3.4
{
exchange_mode  aggressive,main,base;
my_identifier address  4.3.2.1;
peers_identifier  address  1.2.3.4;
verify_identifier  off;
proposal_check  claim;

proposal
{
encryption_algorithm3des;
hash_algorithm  md5;
authentication_method   pre_shared_key;
dh_group2;
lifetimetime24 hours;
}
}

sainfo  address  10.11.11.0/24 any   address  10.99.99.0/24 any
{
lifetimetime1 hour;
encryption_algorithm3des;
authentication_algorithmhmac_md5;
compression_algorithm   deflate;
}

sainfo  address  10.22.22.0/24 any   address  10.99.99.0/24 any
{
lifetimetime1 hour;
encryption_algorithm3des;
authentication_algorithmhmac_md5;
compression_algorithm   deflate;
}

sainfo  address  10.99.99.0/24 any   address  10.11.11.0/24 any
{
lifetimetime1 hour;
encryption_algorithm3des;
authentication_algorithmhmac_md5;
compression_algorithm   deflate;
}

sainfo  address  10.99.99.0/24 any   address  10.22.22.0/24 any
{
lifetimetime1 hour;
encryption_algorithm3des;
authentication_algorithmhmac_md5;
compression_algorithm   deflate;
}



ipsec.keys:

1.2.3.4  



I believe my configuration is sound, even though it may not match some
of the recipes found on the net.


First test:  Inbound traffic

A remote system (10.11.11.88) pings a system (10.99.99.11) behind my
gateway.  The result is success.  Here is the resulting SA on the Cisco
side:

# show crypto ipsec sa peer 4.3.2.1

interface: GigabitEthernet0/1
Crypto map tag: IPSEC, local addr. 1.2.3.4

   protected vrf: 
   local  ident (addr/mask/prot/port): (10.11.11.0/255.255.255.0/0/0)

   remote ident (addr/mask/prot/port): (10.99.99.0/255.255.255.0/0/0)
   current_peer: 4.3.2.1:500
 PERMIT, flags={origin_is_acl,}
#pkts encaps: 173, #pkts encrypt: 173, #pkts digest 173
#pkts decaps: 839, #pkts decrypt: 839, #pkts verify 839
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts compr. failed: 0
#pkts not decompressed: 0, #pkts decompress failed: 0
#send errors 101, #recv errors 636

 local crypto endpt.: 1.2.3.4, remote crypto endpt.: 4.3.2.1
 path mtu 1500, media mtu 1500
 current outbound spi: EA6BAC9

 inbound esp sas:
  spi: 0x307C7433(8

Re: IPSEC Interop problem with Cisco using multiple SA's

2006-05-08 Thread David DeSimone
Eugene M. Kim <[EMAIL PROTECTED]> wrote:
>
> I haven't tried this myself, but you may want to try using
> "unique:" instead of "require" as the policy level

After reading up on this behavior, I gave it a try, replacing all
"require" policies with "unique".  I found that there was no need to
set a policy identifier, as the system apparently chooses a random
identifier if none is specified, and so all SPD's create unique SAD's as
a result.

The result leads to exactly the behavior that I (and Cisco) expect to
see, and my mutiple tunnels are now fully operational.

Thank you for the help with this!

-- 
David DeSimone == Network Admin == [EMAIL PROTECTED]
  "It took me fifteen years to discover that I had no
   talent for writing, but I couldn't give it up because
   by that time I was too famous.  -- Robert Benchley
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


vrf support in FreeBSD

2006-05-08 Thread Pramod Srinivasan
Hi Folks,

I am curious to know if there is any plans to support multiple routing
tables in FreeBSD's official release? 

There was some discussion on this topic last year, if there is any vrf
patch for a latest release of FreeBSD, I would love to give it a try.

Any help greatly appreciated.

Thanks,
Pramod
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: vrf support in FreeBSD

2006-05-08 Thread Julian Elischer

Pramod Srinivasan wrote:


Hi Folks,

I am curious to know if there is any plans to support multiple routing
tables in FreeBSD's official release? 


There was some discussion on this topic last year, if there is any vrf
patch for a latest release of FreeBSD, I would love to give it a try.
 



I am doing some small bits of work on this..

how do you want to select which table should be used?
(This is more of a 'survey' as I am trying to work out what I should 
support)



Any help greatly appreciated.

Thanks,
Pramod
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"
 


___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: vrf support in FreeBSD

2006-05-08 Thread Edward B. DREGER
JE> Date: Mon, 08 May 2006 21:54:18 -0700
JE> From: Julian Elischer

JE> how do you want to select which table should be used?

Ingress interface.

Consider: 802.3ad, ECMP, FIB, multi RIBs (e.g., OSPF vs BGP weight), VRF

I started working on all of the above late in 2003 on 4.x; the project
was shelved due to lack of interest and [other parts of] $job taking
priority.  I haven't looked at 5.x or 6.x code, but 4.x certainly would
have benefited from an architectural overhaul.


Eddy
--
Everquick Internet - http://www.everquick.net/
A division of Brotsman & Dreger, Inc. - http://www.brotsman.com/
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 785 865 5885 Lawrence and [inter]national
Phone: +1 316 794 8922 Wichita

DO NOT send mail to the following addresses:
[EMAIL PROTECTED] -*- [EMAIL PROTECTED] -*- [EMAIL PROTECTED]
Sending mail to spambait addresses is a great way to get blocked.
Ditto for broken OOO autoresponders and foolish AV software backscatter.
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: vrf support in FreeBSD

2006-05-08 Thread Milan Obuch
On Tuesday 09 May 2006 06:54, Julian Elischer wrote:
> Pramod Srinivasan wrote:
> >Hi Folks,
> >
> >I am curious to know if there is any plans to support multiple routing
> >tables in FreeBSD's official release?
> >
> >There was some discussion on this topic last year, if there is any vrf
> >patch for a latest release of FreeBSD, I would love to give it a try.
>
> I am doing some small bits of work on this..
>

Do you have anything to show/test? I am really interested in this and would 
like to help, however, I have no real kernel knowledge in this area, sorry.

> how do you want to select which table should be used?
> (This is more of a 'survey' as I am trying to work out what I should
> support)
>

I saw two approaches on this issue - older one (discovered by me sooner - 
spring 2003) was some MPLS patches made by Luigi Iannone uses per-socket 
option, somewhat similar to Cisco's method (specifying vrf on command line, 
however, I have no internal knowledge of IOS). Somewhat later I discovered 
Marco Zec's vimage patch, which enhances jails for this. This makes routing 
tables management and understanding simpler - at least for me. I would like 
to use second one or something similar.

Regards,
Milan
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"