[Openswan dev] Problems with openswan and bridging

Rene Mayrhofer rene.mayrhofer at gibraltar.at
Fri Jun 8 08:33:57 EDT 2007


Hi Michael and all :)

On Dienstag, 5. Juni 2007 01:44, Michael Richardson wrote:
> >>>>> "Rene" == Rene Mayrhofer <rene.mayrhofer at gibraltar.at> writes:
>
>     Rene> On Montag, 4. Juni 2007 21:37, Michael Richardson wrote:
>     >> KLIPS should be making the packet arrive on the ipsec0 interface.
>
>     Rene> I'd think so too.
>
>     >> Can you enable rcv + verbose debugging in KLIPS?
>     >> I haven't run much code on a 2.4 kernel base lately either.
>
>     Rene> Which plutodebug and klipsdebug options would help? I should
>     Rene> be able to get
>     Rene> traces of that case by tomorrow (the machines are currently
>     Rene> offline).
>
>   klipsdebug="rcv verbose"
>
>   It will produce some significant output, so I wouldn't do it that way.
> Instead do:
> 	dmesg -c >/dev/null
> 	ipsec klipsdebug --set rcv; ipsec klipsdebug --set verbose
> 	sleep 60	 # send traffic
> 	ipsec klipsdebug --clear rcv; ipsec klipsdebug --clear verbose
> 	dmesg >somefile.txt
Attached is a short trace while doing exactly that. Can you see anything 
that's going wrong? 

with best regards,
Rene

-- 
-------------------------------------------------
Gibraltar firewall       http://www.gibraltar.at/
-------------- next part --------------
debug:ipsec_rcv: packet decrypted from x.x.x.x: next_header = 4, padding = 2
klips_dmp: at esp postmove, len=84:
klips_debug:   @000: 45 00 00 50 16 a0 00 00 36 32 00 00 51 0a bc 0e
klips_debug:   @010: 50 78 03 78 45 00 00 3c 28 f4 00 00 3f 01 b9 8c
klips_debug:   @020: c0 a8 0a 82 c0 a8 0d 6e 00 00 fc 5b 03 00 56 00
klips_debug:   @030: 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70
klips_debug:   @040: 71 72 73 74 75 76 77 61 62 63 64 65 66 67 68 69
klips_debug:   @050: 01 02 02 04
klips_dmp: at esp postpull, len=76:
klips_debug:   @000: 45 00 00 3c 28 f4 00 00 3f 01 b9 8c c0 a8 0a 82
klips_debug:   @010: c0 a8 0d 6e 00 00 fc 5b 03 00 56 00 61 62 63 64
klips_debug:   @020: 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74
klips_debug:   @030: 75 76 77 61 62 63 64 65 66 67 68 69 01 02 02 04
klips_debug:   @040: 2d cf b9 50 ef d6 7b ac 41 1f 07 ed
klips_debug:ipsec_rcv: trimming to 60.
klips_debug:ipsec_rcv: after <ESP_AES_HMAC_SHA1>, SA:esp.1791ca5e at y.y.y.y:
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:80 id:5792 frag_off:0 ttl:54 proto:4 chk:3330 saddr:x.x.x.x daddr:y.y.y.y
klips_dmp: at ip_print, len=60:
klips_debug:   @000: 45 00 00 3c 28 f4 00 00 3f 01 b9 8c c0 a8 0a 82
klips_debug:   @010: c0 a8 0d 6e 00 00 fc 5b 03 00 56 00 61 62 63 64
klips_debug:   @020: 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74
klips_debug:   @030: 75 76 77 61 62 63 64 65 66 67 68 69
klips_debug:ipsec_rcv: SA:esp.1791ca5e at y.y.y.y, Another IPSEC header to process.
klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x220000.
klips_debug:ipsec_rcv: IPIP tunnel stripped.
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:60 id:10484 frag_off:0 ttl:63 proto:1 (ICMP) chk:47500 saddr:192.168.10.130 daddr:192.168.13.110 type:code=0:0
klips_dmp: at ip_print, len=40:
klips_debug:   @000: 00 00 fc 5b 03 00 56 00 61 62 63 64 65 66 67 68
klips_debug:   @010: 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74 75 76 77 61
klips_debug:   @020: 62 63 64 65 66 67 68 69
klips_debug:ipsec_rcv: IPIP SA sets skb->nfmark=0x230000.
klips_debug:ipsec_rcv: netif_rx() called.
DROP IN=br_ext OUT=br_int PHYSIN=ext PHYSOUT=int SRC=192.168.10.130 DST=192.168.13.110 LEN=60 TOS=0x00 PREC=0x00 TTL=62 ID=10484 PROTO=ICMP TYPE=0 CODE=0 ID=768 SEQ=22016 
klips_debug:ipsec_rcv: <<< Info -- skb->dev=br_ext dev=br_ext 
klips_debug:ipsec_rcv: assigning packet ownership to virtual device ipsec0 from physical device br_ext.
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:120 id:5793 frag_off:0 ttl:54 proto:50 (ESP) chk:3243 saddr:x.x.x.x daddr:y.y.y.y
klips_dmp: at ip_print, len=100:
klips_debug:   @000: 17 91 ca 5e 00 00 00 2f e6 35 a6 2e 6a 6e 75 dd
klips_debug:   @010: 64 0b 8a c5 16 4a 46 b6 24 40 f2 28 79 d0 54 bd
klips_debug:   @020: 34 84 4f 7a 7b 22 06 be f1 fa 46 da 75 23 bf cf
klips_debug:   @030: 6f 31 26 50 36 3f 1f 01 3f 5b cf cb d7 55 2d 14
klips_debug:   @040: 83 3c 53 3f ad 06 53 2b 43 40 23 46 f8 f6 25 c6
klips_debug:   @050: 12 27 1e d2 28 f2 6b 18 b4 94 a4 1d 44 fd 64 72
klips_debug:   @060: ce 3e 3a 33
klips_debug:ipsec_rcv_decap_once: decap (50) from x.x.x.x -> y.y.y.y
klips_debug:ipsec_rcv: SA:esp.1791ca5e at y.y.y.y, src=x.x.x.x of pkt agrees with expected SA source address policy.
klips_debug:ipsec_rcv: SA:esp.1791ca5e at y.y.y.y First SA in group.
klips_debug:ipsec_rcv: natt_type=0 tdbp->ips_natt_type=0 : ok
klips_debug:ipsec_rcv: packet from x.x.x.x received with seq=47 (iv)=0xe635a62e6a6e75dd iplen=100 esplen=88 sa=esp.1791ca5e at y.y.y.y
klips_debug:ipsec_rcv: encalg = 12, authalg = 3.
klips_debug:ipsec_rcv: authentication successful.
klips_debug:ipsec_rcv: encalg=12 esphlen=24
klips_debug:ipsec_alg_esp_encrypt: entering with encalg=12, ixt_e=e0c12100
klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=12 ips_key_e=d58ff000 idat=dc997bcc ilen=64 iv=dc997bbc, encrypt=0
klips_debug:ipsec_alg_esp_encrypt: returned ret=64
klips_dmp: at postdecrypt, len=64:
klips_debug:   @000: 45 00 00 3c 28 f5 00 00 3f 01 b9 8b c0 a8 0a 82
klips_debug:   @010: c0 a8 0d 6e 00 00 fb 5b 03 00 57 00 61 62 63 64
klips_debug:   @020: 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74
klips_debug:   @030: 75 76 77 61 62 63 64 65 66 67 68 69 01 02 02 04
klips_debug:ipsec_rcv: padlen=2, contents: 0x<offset>: 0x<value> 0x<value> ...
klips_debug:           00: 01 02
klips_debug:ipsec_rcv: packet decrypted from x.x.x.x: next_header = 4, padding = 2
klips_dmp: at esp postmove, len=84:
klips_debug:   @000: 45 00 00 50 16 a1 00 00 36 32 00 00 51 0a bc 0e
klips_debug:   @010: 50 78 03 78 45 00 00 3c 28 f5 00 00 3f 01 b9 8b
klips_debug:   @020: c0 a8 0a 82 c0 a8 0d 6e 00 00 fb 5b 03 00 57 00
klips_debug:   @030: 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70
klips_debug:   @040: 71 72 73 74 75 76 77 61 62 63 64 65 66 67 68 69
klips_debug:   @050: 01 02 02 04
klips_dmp: at esp postpull, len=76:
klips_debug:   @000: 45 00 00 3c 28 f5 00 00 3f 01 b9 8b c0 a8 0a 82
klips_debug:   @010: c0 a8 0d 6e 00 00 fb 5b 03 00 57 00 61 62 63 64
klips_debug:   @020: 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74
klips_debug:   @030: 75 76 77 61 62 63 64 65 66 67 68 69 01 02 02 04
klips_debug:   @040: b4 94 a4 1d 44 fd 64 72 ce 3e 3a 33
klips_debug:ipsec_rcv: trimming to 60.
klips_debug:ipsec_rcv: after <ESP_AES_HMAC_SHA1>, SA:esp.1791ca5e at y.y.y.y:
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:80 id:5793 frag_off:0 ttl:54 proto:4 chk:3329 saddr:x.x.x.x daddr:y.y.y.y
klips_dmp: at ip_print, len=60:
klips_debug:   @000: 45 00 00 3c 28 f5 00 00 3f 01 b9 8b c0 a8 0a 82
klips_debug:   @010: c0 a8 0d 6e 00 00 fb 5b 03 00 57 00 61 62 63 64
klips_debug:   @020: 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74
klips_debug:   @030: 75 76 77 61 62 63 64 65 66 67 68 69
klips_debug:ipsec_rcv: SA:esp.1791ca5e at y.y.y.y, Another IPSEC header to process.
klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x220000.
klips_debug:ipsec_rcv: IPIP tunnel stripped.
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:60 id:10485 frag_off:0 ttl:63 proto:1 (ICMP) chk:47499 saddr:192.168.10.130 daddr:192.168.13.110 type:code=0:0
klips_dmp: at ip_print, len=40:
klips_debug:   @000: 00 00 fb 5b 03 00 57 00 61 62 63 64 65 66 67 68
klips_debug:   @010: 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74 75 76 77 61
klips_debug:   @020: 62 63 64 65 66 67 68 69
klips_debug:ipsec_rcv: IPIP SA sets skb->nfmark=0x230000.
klips_debug:ipsec_rcv: netif_rx() called.
DROP IN=br_ext OUT=br_int PHYSIN=ext PHYSOUT=int SRC=192.168.10.130 DST=192.168.13.110 LEN=60 TOS=0x00 PREC=0x00 TTL=62 ID=10485 PROTO=ICMP TYPE=0 CODE=0 ID=768 SEQ=22272 
klips_debug:ipsec_rcv: <<< Info -- skb->dev=br_ext dev=br_ext 
klips_debug:ipsec_rcv: assigning packet ownership to virtual device ipsec0 from physical device br_ext.
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:120 id:5794 frag_off:0 ttl:54 proto:50 (ESP) chk:3242 saddr:x.x.x.x daddr:y.y.y.y
klips_dmp: at ip_print, len=100:
klips_debug:   @000: 17 91 ca 5e 00 00 00 30 48 cf c8 92 97 97 7a 50
klips_debug:   @010: 81 85 2d 5d 5e 09 da bb 80 a8 5b 43 98 ef 12 2b
klips_debug:   @020: 5a f0 5b f5 41 90 95 a0 cc 97 10 92 2c 5b 99 47
klips_debug:   @030: 9c 3a 51 68 ec b3 bd a5 77 44 fd 22 b1 46 36 7b
klips_debug:   @040: d2 e5 e1 1e bb f7 da 6f 3f c7 12 e8 c1 6a be ae
klips_debug:   @050: 77 3a fc 8a 90 77 b5 e2 8e 9b e0 05 a8 80 0c f2
klips_debug:   @060: ca a3 df 5b
klips_debug:ipsec_rcv_decap_once: decap (50) from x.x.x.x -> y.y.y.y
klips_debug:ipsec_rcv: SA:esp.1791ca5e at y.y.y.y, src=x.x.x.x of pkt agrees with expected SA source address policy.
klips_debug:ipsec_rcv: SA:esp.1791ca5e at y.y.y.y First SA in group.
klips_debug:ipsec_rcv: natt_type=0 tdbp->ips_natt_type=0 : ok
klips_debug:ipsec_rcv: packet from x.x.x.x received with seq=48 (iv)=0x48cfc89297977a50 iplen=100 esplen=88 sa=esp.1791ca5e at y.y.y.y
klips_debug:ipsec_rcv: encalg = 12, authalg = 3.
klips_debug:ipsec_rcv: authentication successful.
klips_debug:ipsec_rcv: encalg=12 esphlen=24
klips_debug:ipsec_alg_esp_encrypt: entering with encalg=12, ixt_e=e0c12100
klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=12 ips_key_e=d58ff000 idat=dc997dcc ilen=64 iv=dc997dbc, encrypt=0
klips_debug:ipsec_alg_esp_encrypt: returned ret=64
klips_dmp: at postdecrypt, len=64:
klips_debug:   @000: 45 00 00 3c 28 f6 00 00 3f 01 b9 8a c0 a8 0a 82
klips_debug:   @010: c0 a8 0d 6e 00 00 fa 5b 03 00 58 00 61 62 63 64
klips_debug:   @020: 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74
klips_debug:   @030: 75 76 77 61 62 63 64 65 66 67 68 69 01 02 02 04
klips_debug:ipsec_rcv: padlen=2, contents: 0x<offset>: 0x<value> 0x<value> ...
klips_debug:           00: 01 02
klips_debug:ipsec_rcv: packet decrypted from x.x.x.x: next_header = 4, padding = 2
klips_dmp: at esp postmove, len=84:
klips_debug:   @000: 45 00 00 50 16 a2 00 00 36 32 00 00 51 0a bc 0e
klips_debug:   @010: 50 78 03 78 45 00 00 3c 28 f6 00 00 3f 01 b9 8a
klips_debug:   @020: c0 a8 0a 82 c0 a8 0d 6e 00 00 fa 5b 03 00 58 00
klips_debug:   @030: 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70
klips_debug:   @040: 71 72 73 74 75 76 77 61 62 63 64 65 66 67 68 69
klips_debug:   @050: 01 02 02 04
klips_dmp: at esp postpull, len=76:
klips_debug:   @000: 45 00 00 3c 28 f6 00 00 3f 01 b9 8a c0 a8 0a 82
klips_debug:   @010: c0 a8 0d 6e 00 00 fa 5b 03 00 58 00 61 62 63 64
klips_debug:   @020: 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74
klips_debug:   @030: 75 76 77 61 62 63 64 65 66 67 68 69 01 02 02 04
klips_debug:   @040: 8e 9b e0 05 a8 80 0c f2 ca a3 df 5b
klips_debug:ipsec_rcv: trimming to 60.
klips_debug:ipsec_rcv: after <ESP_AES_HMAC_SHA1>, SA:esp.1791ca5e at y.y.y.y:
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:80 id:5794 frag_off:0 ttl:54 proto:4 chk:3328 saddr:x.x.x.x daddr:y.y.y.y
klips_dmp: at ip_print, len=60:
klips_debug:   @000: 45 00 00 3c 28 f6 00 00 3f 01 b9 8a c0 a8 0a 82
klips_debug:   @010: c0 a8 0d 6e 00 00 fa 5b 03 00 58 00 61 62 63 64
klips_debug:   @020: 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74
klips_debug:   @030: 75 76 77 61 62 63 64 65 66 67 68 69
klips_debug:ipsec_rcv: SA:esp.1791ca5e at y.y.y.y, Another IPSEC header to process.
klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x220000.
klips_debug:ipsec_rcv: IPIP tunnel stripped.
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:60 id:10486 frag_off:0 ttl:63 proto:1 (ICMP) chk:47498 saddr:192.168.10.130 daddr:192.168.13.110 type:code=0:0
klips_dmp: at ip_print, len=40:
klips_debug:   @000: 00 00 fa 5b 03 00 58 00 61 62 63 64 65 66 67 68
klips_debug:   @010: 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74 75 76 77 61
klips_debug:   @020: 62 63 64 65 66 67 68 69
klips_debug:ipsec_rcv: IPIP SA sets skb->nfmark=0x230000.
klips_debug:ipsec_rcv: netif_rx() called.
DROP IN=br_ext OUT=br_int PHYSIN=ext PHYSOUT=int SRC=192.168.10.130 DST=192.168.13.110 LEN=60 TOS=0x00 PREC=0x00 TTL=62 ID=10486 PROTO=ICMP TYPE=0 CODE=0 ID=768 SEQ=22528 
klips_debug:ipsec_rcv: <<< Info -- skb->dev=br_ext dev=br_ext 
klips_debug:ipsec_rcv: assigning packet ownership to virtual device ipsec0 from physical device br_ext.
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:120 id:5795 frag_off:0 ttl:54 proto:50 (ESP) chk:3241 saddr:x.x.x.x daddr:y.y.y.y
klips_dmp: at ip_print, len=100:
klips_debug:   @000: 17 91 ca 5e 00 00 00 31 6b 80 23 20 af a8 53 8c
klips_debug:   @010: 64 6a 91 93 ce 36 02 fa fe f1 48 3c e3 0c c0 43
klips_debug:   @020: bf 66 7d cd 5a f7 bf 8b cd 95 a1 e3 27 3f 53 e9
klips_debug:   @030: c8 ef dd bf 5c 0e 09 2e c3 e5 f0 2c 7a 76 ed 0e
klips_debug:   @040: 48 16 03 a0 d4 c4 3e 9d be b5 d7 0d 5e 65 ef ce
klips_debug:   @050: 60 67 43 16 bc f1 d2 e8 29 9f 88 1e b1 f2 c0 f6
klips_debug:   @060: 8d 5a c7 77
klips_debug:ipsec_rcv_decap_once: decap (50) from x.x.x.x -> y.y.y.y
klips_debug:ipsec_rcv: SA:esp.1791ca5e at y.y.y.y, src=x.x.x.x of pkt agrees with expected SA source address policy.
klips_debug:ipsec_rcv: SA:esp.1791ca5e at y.y.y.y First SA in group.
klips_debug:ipsec_rcv: natt_type=0 tdbp->ips_natt_type=0 : ok
klips_debug:ipsec_rcv: packet from x.x.x.x received with seq=49 (iv)=0x6b802320afa8538c iplen=100 esplen=88 sa=esp.1791ca5e at y.y.y.y
klips_debug:ipsec_rcv: encalg = 12, authalg = 3.
klips_debug:ipsec_rcv: authentication successful.
klips_debug:ipsec_rcv: encalg=12 esphlen=24
klips_debug:ipsec_alg_esp_encrypt: entering with encalg=12, ixt_e=e0c12100
klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=12 ips_key_e=d58ff000 idat=dc997ecc ilen=64 iv=dc997ebc, encrypt=0
klips_debug:ipsec_alg_esp_encrypt: returned ret=64
klips_dmp: at postdecrypt, len=64:
klips_debug:   @000: 45 00 00 3c 28 f7 00 00 3f 01 b9 89 c0 a8 0a 82
klips_debug:   @010: c0 a8 0d 6e 00 00 f9 5b 03 00 59 00 61 62 63 64
klips_debug:   @020: 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74
klips_debug:   @030: 75 76 77 61 62 63 64 65 66 67 68 69 01 02 02 04
klips_debug:ipsec_rcv: padlen=2, contents: 0x<offset>: 0x<value> 0x<value> ...
klips_debug:           00: 01 02
klips_debug:ipsec_rcv: packet decrypted from x.x.x.x: next_header = 4, padding = 2
klips_dmp: at esp postmove, len=84:
klips_debug:   @000: 45 00 00 50 16 a3 00 00 36 32 00 00 51 0a bc 0e
klips_debug:   @010: 50 78 03 78 45 00 00 3c 28 f7 00 00 3f 01 b9 89
klips_debug:   @020: c0 a8 0a 82 c0 a8 0d 6e 00 00 f9 5b 03 00 59 00
klips_debug:   @030: 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70
klips_debug:   @040: 71 72 73 74 75 76 77 61 62 63 64 65 66 67 68 69
klips_debug:   @050: 01 02 02 04
klips_dmp: at esp postpull, len=76:
klips_debug:   @000: 45 00 00 3c 28 f7 00 00 3f 01 b9 89 c0 a8 0a 82
klips_debug:   @010: c0 a8 0d 6e 00 00 f9 5b 03 00 59 00 61 62 63 64
klips_debug:   @020: 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74
klips_debug:   @030: 75 76 77 61 62 63 64 65 66 67 68 69 01 02 02 04
klips_debug:   @040: 29 9f 88 1e b1 f2 c0 f6 8d 5a c7 77
klips_debug:ipsec_rcv: trimming to 60.
klips_debug:ipsec_rcv: after <ESP_AES_HMAC_SHA1>, SA:esp.1791ca5e at y.y.y.y:
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:80 id:5795 frag_off:0 ttl:54 proto:4 chk:3327 saddr:x.x.x.x daddr:y.y.y.y
klips_dmp: at ip_print, len=60:
klips_debug:   @000: 45 00 00 3c 28 f7 00 00 3f 01 b9 89 c0 a8 0a 82
klips_debug:   @010: c0 a8 0d 6e 00 00 f9 5b 03 00 59 00 61 62 63 64
klips_debug:   @020: 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74
klips_debug:   @030: 75 76 77 61 62 63 64 65 66 67 68 69
klips_debug:ipsec_rcv: SA:esp.1791ca5e at y.y.y.y, Another IPSEC header to process.
klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x220000.
klips_debug:ipsec_rcv: IPIP tunnel stripped.
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:60 id:10487 frag_off:0 ttl:63 proto:1 (ICMP) chk:47497 saddr:192.168.10.130 daddr:192.168.13.110 type:code=0:0
klips_dmp: at ip_print, len=40:
klips_debug:   @000: 00 00 f9 5b 03 00 59 00 61 62 63 64 65 66 67 68
klips_debug:   @010: 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74 75 76 77 61
klips_debug:   @020: 62 63 64 65 66 67 68 69
klips_debug:ipsec_rcv: IPIP SA sets skb->nfmark=0x230000.
klips_debug:ipsec_rcv: netif_rx() called.
DROP IN=br_ext OUT=br_int PHYSIN=ext PHYSOUT=int SRC=192.168.10.130 DST=192.168.13.110 LEN=60 TOS=0x00 PREC=0x00 TTL=62 ID=10487 PROTO=ICMP TYPE=0 CODE=0 ID=768 SEQ=22784 
DROP IN=br_ext OUT=br_int PHYSIN=ext PHYSOUT=int SRC=192.168.10.130 DST=192.168.13.110 LEN=60 TOS=0x00 PREC=0x00 TTL=62 ID=10488 PROTO=ICMP TYPE=0 CODE=0 ID=768 SEQ=23040 
DROP IN=br_ext OUT=br_int PHYSIN=ext PHYSOUT=int SRC=192.168.10.130 DST=192.168.13.110 LEN=60 TOS=0x00 PREC=0x00 TTL=62 ID=10489 PROTO=ICMP TYPE=0 CODE=0 ID=768 SEQ=23296 
DROP IN=br_ext OUT=br_int PHYSIN=ext PHYSOUT=int SRC=192.168.10.130 DST=192.168.13.110 LEN=60 TOS=0x00 PREC=0x00 TTL=62 ID=10490 PROTO=ICMP TYPE=0 CODE=0 ID=768 SEQ=23552 
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.openswan.org/pipermail/dev/attachments/20070608/02dc32ad/attachment.bin 


More information about the Dev mailing list