<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=UTF-8">
</head>
<body text="#000000" bgcolor="#FFFFFF">
<p>Hello dev,</p>
I've been struggling getting multicasts to work so I decided to
setup the test suite environment and run the ikev2/forecast test. <br>
<a class="moz-txt-link-freetext" href="https://www.strongswan.org/testing/testresults/ikev2/forecast/index.html">https://www.strongswan.org/testing/testresults/ikev2/forecast/index.html</a><br>
<p>I duplicated my problems in this environment so I thought I'd
report the issues:</p>
<p>Setup the environment as for the ikev2/forecast test, run the
test to ensure environment is good, then:<br>
</p>
<p><b>Issue #1 forecast breaks normal network connectvity</b></p>
<p>On carol, ping dave. Notice ping never reaches dave.<br>
</p>
<p><b><tt>carol:~# ping -W 1 -c 1 -t 5 10.1.0.130</tt></b><tt><br>
</tt><tt>PING 10.1.0.130 (10.1.0.130) 56(84) bytes of data.</tt><tt><br>
</tt><tt><br>
</tt><tt>--- 10.1.0.130 ping statistics ---</tt><tt><br>
</tt><tt>1 packets transmitted, 0 received, 100% packet loss, time
0ms</tt></p>
<p><tt>Monitor on moon:</tt></p>
<p><tt><b>moon:~# tcpdump -n -i any -f 'esp or icmp'</b><br>
tcpdump: verbose output suppressed, use -v or -vv for full
protocol decode<br>
listening on any, link-type LINUX_SLL (Linux cooked), capture
size 262144 bytes<br>
<br>
<br>
07:20:47.683930 IP 192.168.0.100 > 192.168.0.1:
ESP(spi=0xce42c224,seq=0x71), length 136<br>
07:20:47.684084 IP 10.1.0.129 > 10.1.0.130: ICMP echo
request, id 2768, seq 1, length 64<br>
</tt><br>
Monitor on dave:</p>
<p>dave:~# tcpdump -i any -f 'host 10.1.0.129'<br>
tcpdump: verbose output suppressed, use -v or -vv for full
protocol decode<br>
listening on any, link-type LINUX_SLL (Linux cooked), capture size
262144 bytes<br>
</p>
<p><b>Isuue #2 forecast injects multiple copies of broadcast message
it receives.</b></p>
<p>On carol send a broadcast ping with TTL set to 5:</p>
<p><tt><b>carol:~# ping -W 1 -c 1 -t 5 -b 10.1.255.255</b><br>
PING 10.1.255.255 (10.1.255.255) 56(84) bytes of data.<br>
<br>
--- 10.1.255.255 ping statistics ---<br>
1 packets transmitted, 0 received, 100% packet loss, time 0ms<br>
</tt><tt></tt><br>
</p>
<p>Dave receives multiple pings:</p>
<p><b><tt>dave:~# tcpdump -i any -f 'host 10.1.0.129'</tt></b><tt><br>
</tt><tt>tcpdump: verbose output suppressed, use -v or -vv for
full protocol decode</tt><tt><br>
</tt><tt>listening on any, link-type LINUX_SLL (Linux cooked),
capture size 262144 bytes</tt><tt><br>
</tt><tt>07:11:28.269132 IP 10.1.0.129 > 10.1.255.255: ICMP
echo request, id 2750, seq 1, length 64</tt><tt><br>
</tt><tt>07:11:28.270247 IP 10.1.0.129 > 10.1.255.255: ICMP
echo request, id 2750, seq 1, length 64</tt><tt><br>
</tt><tt>07:11:28.270322 IP 10.1.0.129 > 10.1.255.255: ICMP
echo request, id 2750, seq 1, length 64</tt><tt><br>
</tt><tt>07:11:28.271475 IP 10.1.0.129 > 10.1.255.255: ICMP
echo request, id 2750, seq 1, length 64</tt><tt><br>
</tt><tt>07:11:28.271504 IP 10.1.0.129 > 10.1.255.255: ICMP
echo request, id 2750, seq 1, length 64</tt><tt><br>
</tt><tt>07:11:28.272482 IP 10.1.0.129 > 10.1.255.255: ICMP
echo request, id 2750, seq 1, length 64</tt><tt><br>
</tt><tt>07:11:28.272509 IP 10.1.0.129 > 10.1.255.255: ICMP
echo request, id 2750, seq 1, length 64</tt><tt><br>
</tt><tt>07:11:28.272996 IP 10.1.0.129 > 10.1.255.255: ICMP
echo request, id 2750, seq 1, length 64</tt><tt><br>
</tt><tt>^C</tt><tt><br>
</tt><tt>8 packets captured</tt><tt><br>
</tt><tt>9 packets received by filter</tt><tt><br>
</tt><tt>0 packets dropped by kernel</tt><tt><br>
</tt><tt>dave:~#</tt><br>
<br>
syslog on moon shows forecast intercepting the packet muttiple
times, I assume its the packet that it injected is getting
intercepted.<br>
</p>
<br>
<tt>Feb 3 07:13:18 moon charon: 11[NET] forecast intercepted
packet: 10.1.0.129 to 10.1.255.255</tt><tt><br>
</tt><tt>Feb 3 07:13:18 moon charon: 11[NET] forwarding a
10.1.255.255 broadcast from 10.1.0.129 to peer 10.1.255.255/32 (2)</tt><tt><br>
</tt><tt>Feb 3 07:13:18 moon charon: 11[NET] forwarding a
10.1.255.255 broadcast from peer 10.1.0.129 to internal network</tt><tt><br>
</tt><tt>Feb 3 07:13:18 moon charon: 12[NET] forecast intercepted
packet: 10.1.0.129 to 10.1.255.255</tt><tt><br>
</tt><tt>Feb 3 07:13:18 moon charon: 12[NET] forwarding a
10.1.255.255 broadcast from 10.1.0.129 to peer 10.1.255.255/32 (2)</tt><tt><br>
</tt><tt>Feb 3 07:13:18 moon charon: 12[NET] forwarding a
10.1.255.255 broadcast from peer 10.1.0.129 to internal network</tt><tt><br>
</tt><tt>Feb 3 07:13:18 moon charon: 08[NET] forecast intercepted
packet: 10.1.0.129 to 10.1.255.255</tt><tt><br>
</tt><tt>Feb 3 07:13:18 moon charon: 08[NET] forwarding a
10.1.255.255 broadcast from 10.1.0.129 to peer 10.1.255.255/32 (2)</tt><tt><br>
</tt><tt>Feb 3 07:13:18 moon charon: 08[NET] forwarding a
10.1.255.255 broadcast from peer 10.1.0.129 to internal network</tt><tt><br>
</tt><tt>Feb 3 07:13:18 moon charon: 14[NET] forecast intercepted
packet: 10.1.0.129 to 10.1.255.255</tt><tt><br>
</tt><tt>Feb 3 07:13:18 moon charon: 14[NET] forwarding a
10.1.255.255 broadcast from 10.1.0.129 to peer 10.1.255.255/32 (2)</tt><tt><br>
</tt><tt>Feb 3 07:13:18 moon charon: 14[NET] forwarding a
10.1.255.255 broadcast from peer 10.1.0.129 to internal network</tt><tt><br>
</tt><tt>Feb 3 07:13:18 moon charon: 13[NET] forecast intercepted
packet: 10.1.0.129 to 10.1.255.255</tt><tt><br>
</tt><tt>Feb 3 07:13:18 moon charon: 13[NET] forwarding a
10.1.255.255 broadcast from 10.1.0.129 to peer 10.1.255.255/32 (2)</tt><tt><br>
</tt><tt>Feb 3 07:13:18 moon charon: 13[NET] forwarding a
10.1.255.255 broadcast from peer 10.1.0.129 to internal network</tt><br>
<p><br>
</p>
<p>Let me know if you need any more information, it seems very easy
to recreate.</p>
<p>Thanks</p>
<p>Alan<br>
</p>
<p><br>
<b></b></p>
<div id="DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2"><br />
<table style="border-top: 1px solid #D3D4DE;">
<tr>
<td style="width: 55px; padding-top: 13px;"><a href="https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient" target="_blank"><img src="https://ipmcdn.avast.com/images/icons/icon-envelope-tick-round-orange-animated-no-repeat-v1.gif" alt="" width="46" height="29" style="width: 46px; height: 29px;" /></a></td>
<td style="width: 470px; padding-top: 12px; color: #41424e; font-size: 13px; font-family: Arial, Helvetica, sans-serif; line-height: 18px;">Virus-free. <a href="https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient" target="_blank" style="color: #4453ea;">www.avast.com</a>
</td>
</tr>
</table><a href="#DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2" width="1" height="1"> </a></div></body>
</html>