[Openswan Users]

Joern Bredereck jb at bw-networx.net
Sun Jan 22 02:28:25 CET 2006


On Fri, 20 Jan 2006, Paul Wouters wrote:

>> firegate is the central frees/wan router:
>> kah is the ipsec-router of the 192.168.200.0/24 net
>> leo is the ipsec-router of the 192.168.27.0/24 net
>>
>>
>>
>> 			"firegate"
>> 			/	\
>> 		ipsec1		ipsec1
>> 		|		|
>> 		eth1		eth1
>> 		|		|
>> ----------------------------------------------------------------
>> 		INTERNET	INTERNET
>> ----------------------------------------------------------------
>> 		|		|
>> 		eth2		eth0
>> 		|		|
>> 		ipsec0		ipsec0
>> 		|		|
>> 		"kah"		"leo"
>> 		|		|
>>  eth1 (192.168.200.0/24)	eth1 (192.168.27.0/24)
>>
>>
>> Hosts of the 192.168.200.0/24-network cannot reach ony hosts on the
>> 192.168.27.0/24-network and vice versa.
>>
>> The same problem with other tunnels which are connected via ipsec1.
>
> And you do have:
> a) an ipsec tunnel on "kah" to "firegate" for 192.168.200.0/24 <===> 192.168.0.0/16 (or 192.168.27.0/24)
> b) an ipsec tunnel on "leo" to "firegate" for 192.168.27.0/24 <===> 192.168.0.0/16 (or 192.168.200.0/24)

yes, otherwise I couldn't ping from 192.168.200.0 to all subnets on ipsec0 of 
firegate.

> c) ip_forwarding enabled and no firewalling and rp_filter disabled on firegate?

yes. (You read my first mail?)

> d) if firegate is a 2.6 kernel, that it is NOT sending/soliciting icmp redirect packets since it
>   is receiveing / sending the packets over the same interface

it's a 2.4 kernel. What would be the neccessary /proc-entry?

> You should verify:
>
> a) kah is sending encrypted packet to firegate for the leo network (tcpdump on eth2)

it is.

> b) firegate is decrypting these packets (tcpdump on ipsec1)

it is.

> c) firegate is re-encrypting these packets (tcpdump on ipsec1)

it is not.

> d) firegate is sending encrypted packets (tcpdump on eth1)

it is not because of c

> e) leo is receiving encrypted packets (tcpdump on eth0)

it is not because of c+d

> f) leo is decrypting these packets (tcpdump on ipsec0)

it is not because of c+d+e

> g) leo is forwarding these packets (tcpdump on eth1)

it is not because of c+d+e+f

I mentioned in my very first mail to this list, that packets are being 
received on firegate but that they are not being forwarded to the other tunnel 
on ipsec1. But because I don't know how to find out WHY I was posting my mail 
to this list.

So, the question is: How can I find out, why FreeS/Wan does not encrypt 
packets which arrived through ipsec1 for a tunnel going out on ipsec1? How to 
debug this behavior?

>> 4. ICMP-echo-requests come in via ipsec1 but are not being forwarded to the
>> destination network via ipsec1.
>
> This could be rp_filter or 2.6's bogus redirect packets.

rp_filter ist turned off for all interfaces and this is a 2.4 kernel.

firegate:~# for i in `ls /proc/sys/net/ipv4/conf`; do echo "$i: `cat
/proc/sys/net/ipv4/conf/$i/rp_filter`"; done
all: 0
default: 0
eth0: 0
eth1: 0
ipsec0: 0
ipsec1: 0
lo: 0

firegate:~# uname -a
Linux firegate 2.4.28 #4 Thu Mar 31 13:38:53 CEST 2005 i686 unknown




Joern




More information about the Users mailing list