[Openswan Users] compression on gre-traffic fails

Jordan Paschalidis paschalidis at salt.xgroup.de
Wed Sep 19 11:29:22 EDT 2007


Hello all,

i tried to find something out about the 'non'-compression wit GRE-Traffic.

Maybe somebody can tell what is going wrong....


thanks
jordan



Here is an output with klipsdebug:

klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=123 
of SA:tun.298c at 10.63.20.6 requested.
klips_debug:ipsec_xmit_encap_bundle: found ipsec_sa -- SA:<IPIP> 
tun.298c at 10.63.20.6
klips_debug:ipsec_xmit_encap_bundle: calling room for <IPIP>, 
SA:tun.298c at 10.63.20.6
klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 20,0
klips_debug:ipsec_xmit_encap_bundle: calling room for <COMP_DEFLATE>, 
SA:comp.23e7 at 10.63.20.6
klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 0,0
klips_debug:ipsec_xmit_encap_bundle: calling room for <ESP_3DES_HMAC_SHA1>, 
SA:esp.c7fb3ec3 at 10.63.20.6
klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 16,16
klips_debug:ipsec_xmit_encap_bundle: existing head,tailroom: 18,148 before 
applying xforms with head,tailroom: 36,16 .
klips_debug:ipsec_xmit_encap_bundle: mtu:1500 physmtu:1500 tothr:36 
tottr:16 mtudiff:52 ippkttotlen:1484
klips_info:ipsec_xmit_encap_bundle: dev ipsec0 mtu of 1500 decreased by 57 
to 1443
klips_debug:ipsec_xmit_encap_bundle: allocating 14 bytes for hardheader.
klips_debug:ipsec_xmit_encap_bundle: head,tailroom: 32,148 after 
hard_header stripped.
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:1484 id:49051 frag_off:0 ttl:253 
proto:47 chk:27437 saddr:10.10.204.48 daddr:10.63.120.1
klips_debug:ipsec_xmit_encap_bundle: head,tailroom: 68,112 after allocation
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:1484 id:49051 frag_off:0 ttl:253 
proto:47 chk:27437 saddr:10.10.204.48 daddr:10.63.120.1
klips_debug:ipsec_xmit_encap_once: calling output for <IPIP>, 
SA:tun.298c at 10.63.20.6
klips_debug:ipsec_xmit_encap_once: pushing 20 bytes, putting 0, proto 4.
klips_debug:ipsec_xmit_encap_once: head,tailroom: 48,112 before xform.
klips_debug:ipsec_xmit_encap_once: after <IPIP>, SA:tun.298c at 10.63.20.6:
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:1504 id:64876 frag_off:0 ttl:64 
proto:4 chk:19987 saddr:10.10.204.149 daddr:10.63.20.6
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:1504 id:64876 frag_off:0 ttl:64 
proto:4 chk:19987 saddr:10.10.204.149 daddr:10.63.20.6
klips_debug:ipsec_xmit_encap_once: calling output for <COMP_DEFLATE>, 
SA:comp.23e7 at 10.63.20.6
klips_debug:ipsec_xmit_encap_once: pushing 0 bytes, putting 0, proto 108.
klips_debug:ipsec_xmit_encap_once: head,tailroom: 48,112 before xform.
klips_debug:skb_compress: .
klips_debug:skb_compress: skipping compression: ips_comp_adapt_skip=2.
klips_debug:ipsec_xmit_encap_once: packet did not compress (flags = 1).
klips_debug:ipsec_xmit_encap_once: after <COMP_DEFLATE>, 
SA:comp.23e7 at 10.63.20.6:
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:1504 id:64876 frag_off:0 ttl:64 
proto:4 chk:19987 saddr:10.10.204.149 daddr:10.63.20.6
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:1504 id:64876 frag_off:0 ttl:64 
proto:4 chk:19987 saddr:10.10.204.149 daddr:10.63.20.6
klips_debug:ipsec_xmit_encap_once: calling output for <ESP_3DES_HMAC_SHA1>, 
SA:esp.c7fb3ec3 at 10.63.20.6
klips_debug:ipsec_xmit_encap_once: pushing 16 bytes, putting 16, proto 50.
klips_debug:ipsec_xmit_encap_once: head,tailroom: 32,96 before xform.
klips_dmp: at pre-encrypt, len=1536:
klips_debug:   @000: 45 00 06 00 fd 6c 00 00 40 32 4e 13 3e c0 cc 95





klips_debug:rj_match: * See if we match exactly as a host destination
klips_debug:rj_match: ** try to match a leaf, t=0pf71ec3c0
klips_debug:ipsec_xmit_SAlookup: checking for local udp/500 IKE packet 
saddr=0a0acc30, er=0pf71ec3c0, daddr=a3f780a, er_dst=a3f1406,
klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=123 
of SA:tun.298c at 10.63.20.6 requested.
klips_debug:ipsec_xmit_encap_bundle: found ipsec_sa -- SA:<IPIP> 
tun.298c at 10.63.20.6
klips_debug:ipsec_xmit_encap_bundle: calling room for <IPIP>, 
SA:tun.298c at 10.63.20.6
klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 20,0
klips_debug:ipsec_xmit_encap_bundle: calling room for <COMP_DEFLATE>, 
SA:comp.23e7 at 10.63.20.6
klips_debug:ipsec_xmit_SAlookup: checking for local udp/500 IKE packet 
saddr=0a0acc30, er=0pf71ec3c0, daddr=a3f780a, er_dst=a3f1406,
klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=123 
of SA:tun.298c at 10.63.20.6 requested.
klips_debug:rj_match: * See if we match exactly as a host destination
klips_debug:rj_match: ** try to match a leaf, t=0pf71ec3c0
klips_debug:ipsec_xmit_SAlookup: checking for local udp/500 IKE packet 
saddr=0a0acc30, er=0pf71ec3c0, daddr=a3f780a, er_dst=a3f1406,
klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=123 
of SA:tun.298c at 10.63.20.6 requested.
klips_debug:ipsec_xmit_encap_bundle: found ipsec_sa -- SA:<IPIP> 
tun.298c at 10.63.20.6
klips_debug:ipsec_xmit_encap_bundle: calling room for <IPIP>, 
SA:tun.298c at 10.63.20.6
klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 20,0
klips_debug:ipsec_xmit_encap_bundle: calling room for <COMP_DEFLATE>, 
SA:comp.23e7 at 10.63.20.6
klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 0,0
klips_debug:ipsec_xmit_encap_bundle: calling room for <ESP_3DES_HMAC_SHA1>, 
SA:esp.c7fb3ec3 at 10.63.20.6
klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 16,15
klips_debug:ipsec_xmit_encap_bundle: existing head,tailroom: 18,83 before 
applying xforms with head,tailroom: 36,15 .
klips_debug:ipsec_xmit_encap_bundle: mtu:1500 physmtu:1500 tothr:36 
tottr:15 mtudiff:51 ippkttotlen:141
klips_info:ipsec_xmit_encap_bundle: dev ipsec0 mtu of 1500 decreased by 57 
to 1443
klips_debug:ipsec_xmit_encap_bundle: allocating 14 bytes for hardheader.
klips_debug:ipsec_xmit_encap_bundle: head,tailroom: 32,83 after hard_header 
stripped.
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:141 id:51112 frag_off:0 ttl:253 
proto:47 chk:26719 saddr:10.10.204.48 daddr:10.63.120.10
klips_debug:ipsec_xmit_encap_bundle: head,tailroom: 68,47 after allocation
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:141 id:51112 frag_off:0 ttl:253 
proto:47 chk:26719 saddr:10.10.204.48 daddr:10.63.120.10
klips_debug:ipsec_xmit_encap_once: calling output for <IPIP>, 
SA:tun.298c at 10.63.20.6
klips_debug:ipsec_xmit_encap_once: pushing 20 bytes, putting 0, proto 4.
klips_debug:ipsec_xmit_encap_once: head,tailroom: 48,47 before xform.
klips_debug:ipsec_xmit_encap_once: after <IPIP>, SA:tun.298c at 10.63.20.6:
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:161 id:1393 frag_off:0 ttl:64 
proto:4 chk:19278 saddr:10.10.204.149 daddr:10.63.20.6
klips_debug:   ps_debug:   @530: c3 b4 46 ae 19 ea c6 d3 7a 4b 63 d7 7e 16 
cd 27
klips_debug:   @540: 49 f8 b6 03 4a 63 6e fc 9d f3 f5 0f 84 d8 d1 4b
klips_debug:   @550: fb f3 9b 18 b8 74 5b 24 a1 2f b7 d0 ac e3 c5 96
klips_debug:   @560: b5 3f b3 8e 14 4e 83 74 cf 8b 64 c5 93 93 6e fe
klips_debug:   @570: f3 d0 62 b9 ea 67 e7 df 99 a3 bc 6b 54 42 75 fb
klips_debug:   @580: bb 19 39 37 3b 1d 6a ef 7e 08 ce 25 33 de bb 0c
klips_debug:   @590: 72 d1 70 95 9f 8d bc c0 79 b6 75 85 09 9d 1f ce
klips_debug:   @5a0: 08 f1 ff 51 37 5b c1 85 a0 61 e0 a5 31 09 9a ef
klips_debug:   @5b0: 91 4e 67 98 b7 00 c8 67 72 02 18 27 49 f8 b6 33
klips_debug:   @5c0: 4a 6f 68 65 19 f3 2e 59 8c f5 7c e8 3f 01 52 a4
klips_debug:   @5d0: f2 1a a9 b9 8c b5 48 ba 49 42 21 eb 2b 70 19 0d
klips_debug:   @5e0: c2 b9 82 c2 5f fa ad 92 a2 74 5c 99 95 5e d8 4d
klips_debug:   @5f0: 01 02 02 04 8b d3 96 de ac 7b 74 d7 46 6b 10 2b
klips_debug:ipsec_alg_esp_encrypt: entering with encalg=3, ixt_e=f8f17520
klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=3 
ips_key_e=ed295000 idat=ec1f9044 ilen=1488 iv=ec1f903c, encrypt=1
klips_debug:ipsec_alg_esp_encrypt: returned ret=1
klips_debug:ipsec_xmit_encap_once: after <ESP_3DES_HMAC_SHA1>, 
SA:esp.c7fb3ec3 at 10.63.20.6:
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:1536 id:1746 frag_off:0 ttl:64 
proto:50 (ESP) chk:17504 saddr:10.10.204.149 daddr:10.63.
klips_debug:   IP: ihl:20 ver:4 tos:0 tlen:1536 id:1746 frag_off:0 ttl:64 
proto:50 (ESP) chk:17504 saddr:10.10.204.149 daddr:10.63.
klips_error:ipsec_sa_put: null pointer passed in!
klips_debug:ipsec_findroute: 10.10.204.149:0->10.63.20.6:0 50





More information about the Users mailing list