[strongSwan-dev] Problems with forecast plugin

Gmail alanrevans at gmail.com
Sun Feb 3 08:40:38 CET 2019


Hello dev,

I've been struggling getting multicasts to work so I decided to setup 
the test suite environment and run the ikev2/forecast test.
https://www.strongswan.org/testing/testresults/ikev2/forecast/index.html

I duplicated my problems in this environment so I thought I'd report the 
issues:

Setup the environment as for the ikev2/forecast test, run the test to 
ensure environment is good, then:

*Issue #1 forecast breaks normal network connectvity*

On carol, ping dave. Notice ping never reaches dave.

*carol:~# ping -W 1 -c 1 -t 5  10.1.0.130*
PING 10.1.0.130 (10.1.0.130) 56(84) bytes of data.

--- 10.1.0.130 ping statistics ---
1 packets transmitted, 0 received, 100% packet loss, time 0ms

Monitor on moon:

*moon:~# tcpdump -n -i any -f 'esp or icmp'*
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on any, link-type LINUX_SLL (Linux cooked), capture size 
262144 bytes


07:20:47.683930 IP 192.168.0.100 > 192.168.0.1: 
ESP(spi=0xce42c224,seq=0x71), length 136
07:20:47.684084 IP 10.1.0.129 > 10.1.0.130: ICMP echo request, id 2768, 
seq 1, length 64

Monitor on dave:

dave:~# tcpdump -i any -f 'host 10.1.0.129'
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on any, link-type LINUX_SLL (Linux cooked), capture size 
262144 bytes

*Isuue #2 forecast injects multiple copies of broadcast message it 
receives.*

On carol send a broadcast ping with TTL set to 5:

*carol:~# ping -W 1 -c 1 -t 5 -b 10.1.255.255*
PING 10.1.255.255 (10.1.255.255) 56(84) bytes of data.

--- 10.1.255.255 ping statistics ---
1 packets transmitted, 0 received, 100% packet loss, time 0ms

Dave receives multiple pings:

*dave:~# tcpdump -i any -f 'host 10.1.0.129'*
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on any, link-type LINUX_SLL (Linux cooked), capture size 
262144 bytes
07:11:28.269132 IP 10.1.0.129 > 10.1.255.255: ICMP echo request, id 
2750, seq 1, length 64
07:11:28.270247 IP 10.1.0.129 > 10.1.255.255: ICMP echo request, id 
2750, seq 1, length 64
07:11:28.270322 IP 10.1.0.129 > 10.1.255.255: ICMP echo request, id 
2750, seq 1, length 64
07:11:28.271475 IP 10.1.0.129 > 10.1.255.255: ICMP echo request, id 
2750, seq 1, length 64
07:11:28.271504 IP 10.1.0.129 > 10.1.255.255: ICMP echo request, id 
2750, seq 1, length 64
07:11:28.272482 IP 10.1.0.129 > 10.1.255.255: ICMP echo request, id 
2750, seq 1, length 64
07:11:28.272509 IP 10.1.0.129 > 10.1.255.255: ICMP echo request, id 
2750, seq 1, length 64
07:11:28.272996 IP 10.1.0.129 > 10.1.255.255: ICMP echo request, id 
2750, seq 1, length 64
^C
8 packets captured
9 packets received by filter
0 packets dropped by kernel
dave:~#

syslog on moon shows forecast intercepting the packet muttiple times, I 
assume its the packet that it injected is getting intercepted.


Feb  3 07:13:18 moon charon: 11[NET] forecast intercepted packet: 
10.1.0.129 to 10.1.255.255
Feb  3 07:13:18 moon charon: 11[NET] forwarding a 10.1.255.255 broadcast 
from 10.1.0.129 to peer 10.1.255.255/32 (2)
Feb  3 07:13:18 moon charon: 11[NET] forwarding a 10.1.255.255 broadcast 
from peer 10.1.0.129 to internal network
Feb  3 07:13:18 moon charon: 12[NET] forecast intercepted packet: 
10.1.0.129 to 10.1.255.255
Feb  3 07:13:18 moon charon: 12[NET] forwarding a 10.1.255.255 broadcast 
from 10.1.0.129 to peer 10.1.255.255/32 (2)
Feb  3 07:13:18 moon charon: 12[NET] forwarding a 10.1.255.255 broadcast 
from peer 10.1.0.129 to internal network
Feb  3 07:13:18 moon charon: 08[NET] forecast intercepted packet: 
10.1.0.129 to 10.1.255.255
Feb  3 07:13:18 moon charon: 08[NET] forwarding a 10.1.255.255 broadcast 
from 10.1.0.129 to peer 10.1.255.255/32 (2)
Feb  3 07:13:18 moon charon: 08[NET] forwarding a 10.1.255.255 broadcast 
from peer 10.1.0.129 to internal network
Feb  3 07:13:18 moon charon: 14[NET] forecast intercepted packet: 
10.1.0.129 to 10.1.255.255
Feb  3 07:13:18 moon charon: 14[NET] forwarding a 10.1.255.255 broadcast 
from 10.1.0.129 to peer 10.1.255.255/32 (2)
Feb  3 07:13:18 moon charon: 14[NET] forwarding a 10.1.255.255 broadcast 
from peer 10.1.0.129 to internal network
Feb  3 07:13:18 moon charon: 13[NET] forecast intercepted packet: 
10.1.0.129 to 10.1.255.255
Feb  3 07:13:18 moon charon: 13[NET] forwarding a 10.1.255.255 broadcast 
from 10.1.0.129 to peer 10.1.255.255/32 (2)
Feb  3 07:13:18 moon charon: 13[NET] forwarding a 10.1.255.255 broadcast 
from peer 10.1.0.129 to internal network


Let me know if you need any more information, it seems very easy to 
recreate.

Thanks

Alan


**



---
This email has been checked for viruses by Avast antivirus software.
https://www.avast.com/antivirus
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/dev/attachments/20190203/17342b25/attachment.html>


More information about the Dev mailing list