Dekuji za odpoved,bud dal patrat. 88.200.30.145 je opravdu stroj, na který funguje druhy tunel,overeno. I když by to mozna bylo do nejake Linux konference, dumpnul jsem si konfiguraci z IpCopa,88.200.30.145 a tady je:
IPCOP ___________________________________________________________________ + ifconfig -a eth0 Link encap:Ethernet HWaddr 00:30:05:1A:76:33 inet addr:192.168.0.1 Bcast:192.168.0.255 Mask:255.255.255.0 UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:3041436 errors:0 dropped:0 overruns:0 frame:0 TX packets:4867075 errors:0 dropped:0 overruns:1 carrier:0 collisions:0 txqueuelen:1000 RX bytes:680987864 (649.4 MB) TX bytes:2941204034 (2804.9 MB) Interrupt:11 Base address:0x4400 Memory:e8104000-e8104038 eth1 Link encap:Ethernet HWaddr 00:04:E2:B8:AB:4E inet addr:88.200.30.2 Bcast:88.200.30.3 Mask:255.255.255.252 UP BROADCAST RUNNING MTU:1500 Metric:1 RX packets:4958841 errors:0 dropped:0 overruns:0 frame:0 TX packets:3075114 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:3117555571 (2973.1 MB) TX bytes:795956129 (759.0 MB) Interrupt:5 Memory:e8100000-0 ipsec0 Link encap:Ethernet HWaddr 00:04:E2:B8:AB:4E inet addr:88.200.30.2 Mask:255.255.255.252 UP RUNNING NOARP MTU:16260 Metric:1 RX packets:88454 errors:0 dropped:3218 overruns:0 frame:0 TX packets:85567 errors:0 dropped:76 overruns:0 carrier:0 collisions:0 txqueuelen:10 RX bytes:50346631 (48.0 MB) TX bytes:46008002 (43.8 MB) Tue Oct 2 14:11:59 CEST 2007 + _________________________ version + ipsec --version Linux Openswan 1.0.10rc2 See `ipsec --copyright' for copyright information. + _________________________ proc/version + cat /proc/version Linux version 2.4.31 ([EMAIL PROTECTED]) (gcc version 3.3.3) #1 Fri Aug 26 01:32:48 GMT 2005 + _________________________ proc/net/ipsec_eroute + sort +3 /proc/net/ipsec_eroute 175 192.168.0.0/24:0 -> 192.168.1.0/24:0 => [EMAIL PROTECTED]:0 108 192.168.0.0/24:0 -> 192.168.2.0/24:0 => [EMAIL PROTECTED]:0 + _________________________ netstart-rn + netstat -nr Kernel IP routing table Destination Gateway Genmask Flags MSS Window irtt Iface 10.124.183.2 0.0.0.0 255.255.255.255 UH 0 0 0 tun0 88.200.30.0 0.0.0.0 255.255.255.252 U 0 0 0 eth1 88.200.30.0 0.0.0.0 255.255.255.252 U 0 0 0 ipsec0 192.168.2.0 88.200.30.1 255.255.255.0 UG 0 0 0 ipsec0 192.168.1.0 88.200.30.1 255.255.255.0 UG 0 0 0 ipsec0 192.168.0.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0 10.124.183.0 10.124.183.2 255.255.255.0 UG 0 0 0 tun0 0.0.0.0 88.200.30.1 0.0.0.0 UG 0 0 0 eth1 + _________________________ proc/net/ipsec_spi + cat /proc/net/ipsec_spi [EMAIL PROTECTED] ESP_3DES_HMAC_MD5: dir=in src=92.168.77.35 iv_bits=64bits iv=0x3d1088946b7d77a3 ooowin=64 ooo_errs=3 seq=92 bit=0xffffffffffffffff alen=128 aklen=128 eklen=192 life(c,s,h)=bytes(16088,0,0)addtime(1437,0,0)usetime(498,0,0)packets(92,0,0) idle=109 [EMAIL PROTECTED] IPIP: dir=out src=88.200.30.2 life(c,s,h)=bytes(18266,0,0)addtime(564,0,0)usetime(563,0,0)packets(175,0,0) idle=41 [EMAIL PROTECTED] ESP_3DES_HMAC_MD5: dir=out src=88.200.30.2 iv_bits=64bits iv=0x34b81bdd1e9fe9be ooowin=64 seq=175 alen=128 aklen=128 eklen=192 life (c,s,h)=bytes(23872,0,0)addtime(564,0,0)usetime(563,0,0)packets(175,0,0) idle=41 [EMAIL PROTECTED] ESP_3DES_HMAC_MD5: dir=out src=88.200.30.2 iv_bits=64bits iv=0x2d72df71f26d104c ooowin=64 seq=108 alen=128 aklen=128 eklen=192 life( c,s,h)=bytes(110752,0,0)addtime(1437,0,0)usetime(498,0,0)packets(108,0,0) idle=110 [EMAIL PROTECTED] IPIP: dir=out src=88.200.30.2 life(c,s,h)=bytes(107135,0,0)addtime(1437,0,0)usetime(498,0,0)packets(108,0, 0) idle=110 [EMAIL PROTECTED] IPIP: dir=in src=147.20.148.94 policy=192.168.1.0/24->192.168.0.0/24 flags=0x8<> life(c,s,h)=addtime(564,0,0) [EMAIL PROTECTED] IPIP: dir=in src=92.168.77.35 policy=192.168.2.0/24->192.168.0.0/24 flags=0x8<> life(c,s,h)=bytes(16088,0,0)addtime(1437,0,0)usetime(49 8,0,0)packets(92,0,0) idle=109 [EMAIL PROTECTED] ESP_3DES_HMAC_MD5: dir=in src=147.20.148.94 iv_bits=64bits iv=0xdb89e79efd60436f ooowin=64 alen=128 aklen=128 eklen=192 life(c,s,h) =addtime(564,0,0) + _________________________ proc/net/ipsec_spigrp + cat /proc/net/ipsec_spigrp [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] + _________________________ proc/net/ipsec_tncfg + cat /proc/net/ipsec_tncfg ipsec0 -> eth1 mtu=16260(1443) -> 1500 ipsec1 -> NULL mtu=0(0) -> 0 ipsec2 -> NULL mtu=0(0) -> 0 ipsec3 -> NULL mtu=0(0) -> 0 Linux ipcop.des 2.4.31 #1 Fri Aug 26 01:32:48 GMT 2005 i686 GenuineIntel unknown GNU/Linux + _________________________ redhat-release + test -r /etc/redhat-release + _________________________ proc/net/ipsec_version + cat /proc/net/ipsec_version Openswan 1.0.10rc2 + _________________________ iptables/list + iptables -L -v -n Chain INPUT (policy DROP 66677 packets, 6084K bytes) pkts bytes target prot opt in out source destination 4446K 2254M ipac~o all -- * * 0.0.0.0/0 0.0.0.0/0 4446K 2254M BADTCP all -- * * 0.0.0.0/0 0.0.0.0/0 67051 3414K tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x16/0x02 limit: avg 10/sec burst 5 4444K 2254M CUSTOMINPUT all -- * * 0.0.0.0/0 0.0.0.0/0 83585 7045K GUIINPUT all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 566 29048 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0 state NEW 0 0 DROP all -- * * 127.0.0.0/8 0.0.0.0/0 state NEW 0 0 DROP all -- * * 0.0.0.0/0 127.0.0.0/8 state NEW 0 0 ACCEPT !icmp -- eth0 * 0.0.0.0/0 0.0.0.0/0 state NEW 842 40416 ACCEPT all -- ipsec+ * 0.0.0.0/0 0.0.0.0/0 80079 6808K DHCPBLUEINPUT all -- * * 0.0.0.0/0 0.0.0.0/0 80079 6808K IPSECRED all -- * * 0.0.0.0/0 0.0.0.0/0 80041 6802K OVPNINPUT all -- * * 0.0.0.0/0 0.0.0.0/0 76728 6598K IPSECBLUE all -- * * 0.0.0.0/0 0.0.0.0/0 76582 6590K WIRELESSINPUT all -- * * 0.0.0.0/0 0.0.0.0/0 state NEW 76728 6598K REDINPUT all -- * * 0.0.0.0/0 0.0.0.0/0 76582 6590K XTACCESS all -- * * 0.0.0.0/0 0.0.0.0/0 state NEW 35693 3374K LOG all -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 10/min burst 5 LOG flags 0 level 4 prefix `INPUT ' Chain FORWARD (policy DROP 59 packets, 3456 bytes) pkts bytes target prot opt in out source destination 2566K 1352M ipac~fi all -- * * 0.0.0.0/0 0.0.0.0/0 2566K 1352M ipac~fo all -- * * 0.0.0.0/0 0.0.0.0/0 2566K 1352M BADTCP all -- * * 0.0.0.0/0 0.0.0.0/0 48259 2472K TCPMSS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU 2565K 1352M CUSTOMFORWARD all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0 state NEW 0 0 DROP all -- * * 127.0.0.0/8 0.0.0.0/0 state NEW 0 0 DROP all -- * * 0.0.0.0/0 127.0.0.0/8 state NEW 0 0 ACCEPT all -- eth0 * 0.0.0.0/0 0.0.0.0/0 state NEW 422 39029 ACCEPT all -- ipsec+ * 0.0.0.0/0 0.0.0.0/0 8702 912K OVPNFORWARD all -- * * 0.0.0.0/0 0.0.0.0/0 627 30720 WIRELESSFORWARD all -- * * 0.0.0.0/0 0.0.0.0/0 state NEW 627 30720 REDFORWARD all -- * * 0.0.0.0/0 0.0.0.0/0 627 30720 PORTFWACCESS all -- * * 0.0.0.0/0 0.0.0.0/0 state NEW 59 3456 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 10/min burst 5 LOG flags 0 level 4 prefix `OUTPUT ' Chain OUTPUT (policy ACCEPT 6224K packets, 2580M bytes) pkts bytes target prot opt in out source destination 6224K 2580M ipac~i all -- * * 0.0.0.0/0 0.0.0.0/0 6224K 2580M CUSTOMOUTPUT all -- * * 0.0.0.0/0 0.0.0.0/0 Chain BADTCP (2 references) pkts bytes target prot opt in out source destination 0 0 PSCAN tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x3F/0x29 0 0 PSCAN tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x3F/0x00 0 0 PSCAN tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x3F/0x01 0 0 PSCAN tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x06 0 0 PSCAN tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x03/0x03 3115 212K NEWNOTSYN tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:!0x16/0x02 state NEW Chain BOT_FORWARD (1 references) pkts bytes target prot opt in out source destination 2149 102K ACCEPT icmp -- eth0 * 0.0.0.0/0 0.0.0.0/0 icmp type 0 0 0 ACCEPT icmp -- eth0 * 0.0.0.0/0 0.0.0.0/0 icmp type 11 0 0 ACCEPT icmp -- eth0 * 0.0.0.0/0 0.0.0.0/0 icmp type 3 0 0 ACCEPT icmp -- eth0 * 0.0.0.0/0 0.0.0.0/0 icmp type 3 code 1 0 0 ACCEPT icmp -- eth0 * 0.0.0.0/0 0.0.0.0/0 icmp type 5 code 0 8174 514K ACCEPT icmp -- eth0 * 0.0.0.0/0 0.0.0.0/0 icmp type 8 670K 390M ACCEPT all -- eth0 * 192.168.0.20 0.0.0.0/0 1979 90318 ACCEPT tcp -- eth0 * 192.168.0.0/24 0.0.0.0/0 tcp dpt:110 0 0 ACCEPT tcp -- eth0 * 192.168.0.0/24 0.0.0.0/0 tcp dpt:995 0 0 ACCEPT tcp -- eth0 * 192.168.0.0/24 0.0.0.0/0 tcp dpt:22 0 0 ACCEPT udp -- eth0 * 192.168.0.0/24 0.0.0.0/0 udp dpt:22 0 0 ACCEPT tcp -- eth0 * 192.168.0.0/24 0.0.0.0/0 tcp dpt:993 8810 501K ACCEPT tcp -- eth0 * 192.168.0.0/24 0.0.0.0/0 tcp dpt:3389 85846 65M ACCEPT all -- eth0 * 192.168.0.0/24 10.124.183.0/24 41408 16M ACCEPT all -- eth0 * 192.168.0.62 0.0.0.0/0 228K 12M ACCEPT all -- eth0 * 192.168.0.106 0.0.0.0/0 3034 628K ACCEPT all -- eth0 * 192.168.0.152 0.0.0.0/0 11352 1491K ACCEPT all -- eth0 * 192.168.0.154 0.0.0.0/0 2682 501K ACCEPT all -- eth0 * 192.168.0.113 0.0.0.0/0 7 384 ACCEPT all -- eth0 * 192.168.0.0/24 192.168.1.0/24 0 0 ACCEPT all -- eth0 * 192.168.0.124 217.75.212.143 0 0 ACCEPT all -- eth0 * 192.168.0.150 0.0.0.0/0 41351 2556K ACCEPT all -- eth0 * 192.168.0.197 0.0.0.0/0 0 0 ACCEPT all -- eth0 * 192.168.0.124 194.149.116.62 1845 391K ACCEPT all -- eth0 * 192.168.0.128 0.0.0.0/0 0 0 ACCEPT all -- eth0 * 192.168.0.0/24 192.168.2.0/24 1345K 857M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 104K 4527K LOG all -- eth0 * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 prefix `GREEN-REJECT ' 104K 4527K REJECT all -- eth0 * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable Chain BOT_INPUT (1 references) pkts bytes target prot opt in out source destination 2418 130K ACCEPT tcp -- eth0 * 0.0.0.0/0 0.0.0.0/0 MAC 00:0A:E4:E7:85:C7 tcp dpt:445 0 0 ACCEPT tcp -- eth0 * 192.168.0.0/24 0.0.0.0/0 tcp dpt:445 0 0 ACCEPT udp -- eth0 * 192.168.0.0/24 0.0.0.0/0 udp dpt:445 739K 30M ACCEPT tcp -- eth0 * 192.168.0.0/24 0.0.0.0/0 tcp dpt:222 24 1188 ACCEPT tcp -- eth0 * 192.168.0.0/24 0.0.0.0/0 tcp dpt:53 27529 1841K ACCEPT udp -- eth0 * 192.168.0.0/24 0.0.0.0/0 udp dpt:53 999K 96M ACCEPT tcp -- eth0 * 192.168.0.0/24 0.0.0.0/0 tcp dpt:3128 2570K 2116M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 22383 3046K LOG all -- eth0 * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 prefix `GREEN-REJECT ' 22383 3046K REJECT all -- eth0 * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable Chain CUSTOMFORWARD (1 references) pkts bytes target prot opt in out source destination 2565K 1352M BOT_FORWARD all -- * * 0.0.0.0/0 0.0.0.0/0 Chain CUSTOMINPUT (1 references) pkts bytes target prot opt in out source destination 4444K 2254M BOT_INPUT all -- * * 0.0.0.0/0 0.0.0.0/0 Chain CUSTOMOUTPUT (1 references) pkts bytes target prot opt in out source destination Chain DHCPBLUEINPUT (1 references) pkts bytes target prot opt in out source destination Chain DMZHOLES (0 references) pkts bytes target prot opt in out source destination Chain GUIINPUT (1 references) pkts bytes target prot opt in out source destination 2098 168K ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8 Chain IPSECBLUE (1 references) pkts bytes target prot opt in out source destination Chain IPSECRED (1 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT 47 -- eth1 * 0.0.0.0/0 0.0.0.0/0 1 104 ACCEPT esp -- eth1 * 0.0.0.0/0 0.0.0.0/0 0 0 ACCEPT ah -- eth1 * 0.0.0.0/0 0.0.0.0/0 0 0 ACCEPT udp -- eth1 * 0.0.0.0/0 0.0.0.0/0 udp spt:500 dpt:500 0 0 ACCEPT udp -- eth1 * 0.0.0.0/0 0.0.0.0/0 udp dpt:4500 Chain LOG_DROP (0 references) pkts bytes target prot opt in out source destination 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 10/min burst 5 LOG flags 0 level 4 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 Chain LOG_REJECT (0 references) pkts bytes target prot opt in out source destination 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 10/min burst 5 LOG flags 0 level 4 0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable Chain NEWNOTSYN (1 references) pkts bytes target prot opt in out source destination 2693 194K LOG all -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 10/min burst 5 LOG flags 0 level 4 prefix `NEW not SYN? ' 3115 212K DROP all -- * * 0.0.0.0/0 0.0.0.0/0 Chain OVPNFORWARD (1 references) pkts bytes target prot opt in out source destination 8075 882K ACCEPT all -- tun+ * 0.0.0.0/0 0.0.0.0/0 Chain OVPNINPUT (1 references) pkts bytes target prot opt in out source destination 482 56236 ACCEPT udp -- eth1 * 0.0.0.0/0 0.0.0.0/0 udp dpt:1194 2831 147K ACCEPT all -- tun+ * 0.0.0.0/0 0.0.0.0/0 Chain PORTFWACCESS (1 references) pkts bytes target prot opt in out source destination 14 672 ACCEPT tcp -- eth1 * 0.0.0.0/0 192.168.0.20 tcp dpt:25 444 21312 ACCEPT tcp -- eth1 * 0.0.0.0/0 192.168.0.20 tcp dpt:993 110 5280 ACCEPT tcp -- eth1 * 0.0.0.0/0 192.168.0.20 tcp dpt:443 0 0 ACCEPT tcp -- eth1 * 0.0.0.0/0 192.168.0.80 tcp dpt:10001 0 0 ACCEPT tcp -- eth1 * 147.32.160.156 192.168.0.20 tcp dpt:22 Chain PSCAN (5 references) pkts bytes target prot opt in out source destination 0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 10/min burst 5 LOG flags 0 level 4 prefix `TCP Scan? ' 0 0 LOG udp -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 10/min burst 5 LOG flags 0 level 4 prefix `UDP Scan? ' 0 0 LOG icmp -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 10/min burst 5 LOG flags 0 level 4 prefix `ICMP Scan? ' 0 0 LOG all -f * * 0.0.0.0/0 0.0.0.0/0 limit: avg 10/min burst 5 LOG flags 0 level 4 prefix `FRAG Scan? ' 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 Chain REDFORWARD (1 references) pkts bytes target prot opt in out source destination Chain REDINPUT (1 references) pkts bytes target prot opt in out source destination Chain WIRELESSFORWARD (1 references) pkts bytes target prot opt in out source destination Chain WIRELESSINPUT (1 references) pkts bytes target prot opt in out source destination Chain XTACCESS (1 references) pkts bytes target prot opt in out source destination 1 52 ACCEPT tcp -- eth1 * 0.0.0.0/0 88.200.30.2 tcp dpt:222 10050 514K ACCEPT tcp -- eth1 * 0.0.0.0/0 88.200.30.2 tcp dpt:445 Chain ipac~fi (1 references) pkts bytes target prot opt in out source destination 427 64747 all -- eth0 * 0.0.0.0/0 0.0.0.0/0 44 10474 all -- eth1 * 0.0.0.0/0 0.0.0.0/0 Chain ipac~fo (1 references) pkts bytes target prot opt in out source destination 141 26975 all -- * eth0 0.0.0.0/0 0.0.0.0/0 325 17354 all -- * eth1 0.0.0.0/0 0.0.0.0/0 Chain ipac~i (1 references) pkts bytes target prot opt in out source destination 3222 3576K all -- * eth0 0.0.0.0/0 0.0.0.0/0 5459 1266K all -- * eth1 0.0.0.0/0 0.0.0.0/0 Chain ipac~o (1 references) pkts bytes target prot opt in out source destination 1701 117K all -- eth0 * 0.0.0.0/0 0.0.0.0/0 5443 4381K all -- eth1 * 0.0.0.0/0 0.0.0.0/0 + _________________________ ipchains/list + ipchains -L -v -n /usr/lib/ipsec/barf: line 197: ipchains: command not found + _________________________ ipfwadm/forward + ipfwadm -F -l -n -e /usr/lib/ipsec/barf: line 199: ipfwadm: command not found + _________________________ ipfwadm/input + ipfwadm -I -l -n -e /usr/lib/ipsec/barf: line 201: ipfwadm: command not found + _________________________ ipfwadm/output + ipfwadm -O -l -n -e /usr/lib/ipsec/barf: line 203: ipfwadm: command not found + _________________________ iptables/nat + iptables -t nat -L -v -n Chain PREROUTING (policy ACCEPT 380K packets, 29M bytes) pkts bytes target prot opt in out source destination 380K 29M CUSTOMPREROUTING all -- * * 0.0.0.0/0 0.0.0.0/0 380K 29M SQUID all -- * * 0.0.0.0/0 0.0.0.0/0 380K 29M PORTFW all -- * * 0.0.0.0/0 0.0.0.0/0 Chain POSTROUTING (policy ACCEPT 12948 packets, 1510K bytes) pkts bytes target prot opt in out source destination 76673 4668K CUSTOMPOSTROUTING all -- * * 0.0.0.0/0 0.0.0.0/0 76673 4668K REDNAT all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 SNAT all -- * * 0.0.0.0/0 0.0.0.0/0 MARK match 0x1 to:192.168.0.1 Chain OUTPUT (policy ACCEPT 49438 packets, 2578K bytes) pkts bytes target prot opt in out source destination Chain CUSTOMPOSTROUTING (1 references) pkts bytes target prot opt in out source destination Chain CUSTOMPREROUTING (1 references) pkts bytes target prot opt in out source destination Chain PORTFW (1 references) pkts bytes target prot opt in out source destination 14 672 DNAT tcp -- * * 0.0.0.0/0 88.200.30.2 tcp dpt:25 to:192.168.0.20:25 444 21312 DNAT tcp -- * * 0.0.0.0/0 88.200.30.2 tcp dpt:993 to:192.168.0.20:993 110 5280 DNAT tcp -- * * 0.0.0.0/0 88.200.30.2 tcp dpt:443 to:192.168.0.20:443 0 0 DNAT tcp -- * * 0.0.0.0/0 88.200.30.2 tcp dpt:10001 to:192.168.0.80:10001 59 3456 DNAT tcp -- * * 0.0.0.0/0 88.200.30.2 tcp dpt:22 to:192.168.0.20:22 Chain REDNAT (1 references) pkts bytes target prot opt in out source destination 63725 3158K MASQUERADE all -- * eth1 0.0.0.0/0 0.0.0.0/0 Chain SQUID (1 references) pkts bytes target prot opt in out source destination + _________________________ ipchains/masq + ipchains -M -L -v -n /usr/lib/ipsec/barf: line 207: ipchains: command not found + _________________________ ipfwadm/masq + ipfwadm -M -l -n -e /usr/lib/ipsec/barf: line 209: ipfwadm: command not found + _________________________ iptables/mangle + iptables -t mangle -L -v -n Chain PREROUTING (policy ACCEPT 7156K packets, 3718M bytes) pkts bytes target prot opt in out source destination 7156K 3718M PORTFWMANGLE all -- * * 0.0.0.0/0 0.0.0.0/0 Chain INPUT (policy ACCEPT 4446K packets, 2254M bytes) pkts bytes target prot opt in out source destination Chain FORWARD (policy ACCEPT 2566K packets, 1352M bytes) pkts bytes target prot opt in out source destination Chain OUTPUT (policy ACCEPT 6224K packets, 2580M bytes) pkts bytes target prot opt in out source destination Chain POSTROUTING (policy ACCEPT 8685K packets, 3927M bytes) pkts bytes target prot opt in out source destination Chain PORTFWMANGLE (1 references) pkts bytes target prot opt in out source destination 0 0 MARK tcp -- * * 192.168.0.0/24 88.200.30.2 tcp dpt:25 MARK set 0x1 0 0 MARK tcp -- * * 192.168.0.0/24 88.200.30.2 tcp dpt:993 MARK set 0x1 0 0 MARK tcp -- * * 192.168.0.0/24 88.200.30.2 tcp dpt:443 MARK set 0x1 0 0 MARK tcp -- * * 192.168.0.0/24 88.200.30.2 tcp dpt:10001 MARK set 0x1 0 0 MARK tcp -- * * 192.168.0.0/24 88.200.30.2 tcp dpt:22 MARK set 0x1 + _________________________ proc/modules + cat /proc/modules tun 3264 3 (autoclean) ipsec_twofish 35332 0 (unused) ipsec_sha2 7800 0 (unused) ipsec_sha1 18488 0 (unused) ipsec_serpent 11076 0 (unused) ipsec_md5 4440 4 ipsec_blowfish 8420 0 (unused) ipsec_aes 31624 0 (unused) ipsec_3des 17052 4 ipsec 255268 2 [ipsec_twofish ipsec_sha2 ipsec_sha1 ipsec_serpent ipsec_md5 ipsec_blowfish ipsec_aes ipsec_3des] ipt_MARK 696 5 (autoclean) sch_ingress 1380 1 (autoclean) cls_u32 4380 5 (autoclean) sch_sfq 3008 3 (autoclean) sch_htb 18688 1 (autoclean) ipt_MASQUERADE 1272 1 (autoclean) ipt_mac 568 1 (autoclean) ipt_mark 440 1 (autoclean) ipt_TCPMSS 2168 1 (autoclean) ipt_state 504 17 (autoclean) ipt_REJECT 2968 3 (autoclean) ipt_LOG 3616 11 (autoclean) ipt_limit 792 10 (autoclean) iptable_mangle 2008 1 (autoclean) iptable_filter 1612 1 (autoclean) sk98lin 133096 1 e100 44436 1 ip_nat_quake3 1864 0 (unused) ip_conntrack_quake3 1992 1 ip_nat_proto_gre 1316 0 (unused) ip_nat_pptp 2156 0 (unused) ip_conntrack_pptp 2641 1 ip_conntrack_proto_gre 2069 0 [ip_nat_pptp ip_conntrack_pptp] ip_nat_mms 2736 0 (unused) ip_conntrack_mms 2928 1 ip_nat_irc 2032 0 (unused) ip_conntrack_irc 2864 1 ip_nat_h323 2380 0 (unused) ip_conntrack_h323 2161 1 ip_nat_ftp 2512 0 (unused) ip_conntrack_ftp 3664 1 iptable_nat 16142 8 [ipt_MASQUERADE ip_nat_quake3 ip_nat_proto_gre ip_nat_pptp ip_nat_mms ip_nat_irc ip_nat_h323 ip_nat_ftp] ip_conntrack 19480 7 [ipt_MASQUERADE ipt_state ip_nat_quake3 ip_conntrack_quake3 ip_nat_pptp ip_conntrack_pptp ip_conntrack_proto_gre ip_nat_mms ip_conntrack_mms ip_nat_irc ip_conntrack_irc ip_nat_h323 ip_conntrack_h323 ip_nat_ftp ip_conntrack_ftp iptable_nat] ip_tables 10944 14 [ipt_MARK ipt_MASQUERADE ipt_mac ipt_mark ipt_TCPMSS ipt_state ipt_REJECT ipt_LOG ipt_limit iptable_mangle iptable_filter iptable_nat] thermal 6340 0 (unused) processor 8408 0 [thermal] fan 1504 0 (unused) button 2572 0 (unused) battery 5696 0 (unused) ac 1696 0 + _________________________ proc/meminfo + cat /proc/meminfo total: used: free: shared: buffers: cached: Mem: 528252928 388173824 140079104 0 26718208 242171904 Swap: 71299072 1847296 69451776 MemTotal: 515872 kB MemFree: 136796 kB MemShared: 0 kB Buffers: 26092 kB Cached: 235884 kB SwapCached: 612 kB Active: 163548 kB Inactive: 99096 kB HighTotal: 0 kB HighFree: 0 kB LowTotal: 515872 kB LowFree: 136796 kB SwapTotal: 69628 kB SwapFree: 67824 kB -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Dan Lukes Sent: Wednesday, October 03, 2007 11:10 AM To: FreeBSD mailing list Subject: Re: Ipsec with SA established, but NO traffic Jan Koukal napsal/wrote, On 10/03/07 10:43: > I try tcpdump on both endpoints.On IpCop is see that my ICMP packets > go through ipsec0 interface,but on Pfsence I see in tcpdump on > external interface "Destination host unreachable 50" > Tcpdump on external interface on command, ping -S 192.168.1.1 > 192.168.0.1 > > 10:13:21.140393 IP 147.20.148.94 > 88.200.30.145: > ESP(spi=0x0e9927b4,seq=0x98), length 116 > 10:13:21.151791 IP 88.200.30.145 > 147.20.148.94: ICMP 88.200.30.145 > protocol 50 unreachable, length 144 protocol 50 (= ESP) unreachable by tedy znamenalo, ze neco na tom stroji driv ESP umelo a ted neumi. Nejsem si uplne jisty - ten 88.200.30.145 je ten, na ktery je i ten druhy, funkcni, tunel ? Pokud ano, bylo by to opravdu divny - snad jen nejaky lokalni firewall (ten by ale mel vracet spis administratively prohibited, pokud je administrator slusnak) nebo hruba chyba konfigurace. Tu tam ale na prvni pohled nevidim. Pokud ne a jde o jediny IPSEC na tomto stroji, pak je nejsnazsi mozna vysvetleni ze doslo ke zmene v instalovanych komponentach ci pouzivanych knihovnach nebo optionech KERNELu. Dan -- Dan Lukes SISAL MFF UK AKA: dan at obluda.cz, dan at freebsd.cz, dan at (kolej.)mff.cuni.cz -- FreeBSD mailing list (users-l@freebsd.cz) http://www.freebsd.cz/listserv/listinfo/users-l -- FreeBSD mailing list (users-l@freebsd.cz) http://www.freebsd.cz/listserv/listinfo/users-l