[Openswan Users] OpenSwan tunnel established but traffic not routing over tunnel
Steve MacDougall
smacdougall at bluepay.ca
Wed Aug 3 10:14:45 EDT 2016
I have a tunnel to a remote Cisco router that was working fine up until
last weekend. On Openswan I can see that the tunnel is established:
000 "***************":
xxx.xxx.82.30/32===xxx.xxx.82.4<xxx.xxx.82.4>---xxx.xxx.82.1...xxx.xxx.219.57<xxx.xxx.219.57>===xxx.xxx.221.0/24;
erouted; eroute owner: #124963
000 "***************": myip=unset; hisip=unset;
000 "***************": ike_life: 3600s; ipsec_life: 28800s; rekey_margin:
540s; rekey_fuzz: 100%; keyingtries: 0
000 "***************": policy:
PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW+SAREFTRACK+lKOD+rKOD; prio: 24,32;
interface: eth0:1;
000 "***************": newest ISAKMP SA: #124962; newest IPsec SA:
#124963;
000 "***************": IKE algorithm newest: 3DES_CBC_192-SHA1-MODP1024
000 "***************": ESP algorithms wanted: 3DES(3)_000-SHA1(2)_000;
flags=-strict
000 "***************": ESP algorithms loaded: 3DES(3)_192-SHA1(2)_160
000 "***************": ESP algorithm newest: 3DES_000-HMAC_SHA1;
pfsgroup=<N/A>
000 #124963: "***************":500 STATE_QUICK_I2 (sent QI2, IPsec SA
established); EVENT_SA_REPLACE in 27926s; newest IPSEC; eroute owner;
isakmp#124962; idle; import:admin initiate
000 #124963: "***************" esp.bad46993 at xxx.xxx.219.57
esp.70a6776f at xxx.xxx.82.4 tun.0 at xxx.xxx.219.57 tun.0 at xxx.xxx.82.4 ref=0
refhim=4294901761
000 #124962: "***************":500 STATE_MAIN_I4 (ISAKMP SA established);
EVENT_SA_REPLACE in 2925s; newest ISAKMP; lastdpd=-1s(seq in:0 out:0);
idle; import:admin initiate
Here's some output from 'ip xfrm policy list' One item stands out, the
traffic to dport 11350 is the traffic I'm trying to send over the tunnel.
src xxx.xxx.82.30/32 dst xxx.xxx.221.0/24
dir out priority 2088
tmpl src xxx.xxx.82.4 dst xxx.xxx.219.57
proto esp reqid 38417 mode tunnel
src xxx.xxx.221.0/24 dst xxx.xxx.82.30/32
dir fwd priority 2088
tmpl src dst xxx.xxx.82.4
proto esp reqid 38417 mode tunnel
src xxx.xxx.221.0/24 dst xxx.xxx.82.30/32
dir in priority 2088
tmpl src xxx.xxx.219.57 dst xxx.xxx.82.4
proto esp reqid 38417 mode tunnel
src xxx.xxx.82.30/32 dst xxx.xxx.221.253/32 proto tcp
dir out priority 2080
src xxx.xxx.82.30/32 dst xxx.xxx.221.253/32 proto tcp sport 42416
*dport 11350 dir out action block priority 2080*
I've been able to confirm that the traffic destined for xxx.xxx.221.253/32
is hitting the default gateway of the VPN server, rather than going through
the tunnel.
I'm guessing this block policy might be the source of my troubles, but
where would it be getting this from? I checked /etc/ipsec.d/policies/block
and this file is blank.
--
Steve MacDougall
Sr. Systems/Network Administrator
647.258.3704 Direct
289.924.1086 Mobile
smacdougall at bluepay.ca
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openswan.org/pipermail/users/attachments/20160803/ec3b1424/attachment.html>
More information about the Users
mailing list