[strongSwan] net2net can not work well on ubuntu14.04

zhuyj mounter625 at 163.com
Fri May 8 12:18:15 CEST 2015


On moon:

I found the icmp does not pass vpn tunnel instead these icmp packets 
pass eth1 directly.
I created a vpn tunnel through eth1.

tcpdump -ni eth1 icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1, link-type EN10MB (Ethernet), capture size 65535 bytes
18:13:50.095301 IP 10.1.0.10 > 10.2.0.1: ICMP echo request, id 1757, seq 
37, length 64
18:13:50.095465 IP 10.2.0.1 > 10.1.0.10: ICMP echo reply, id 1757, seq 
37, length 64
18:13:51.103324 IP 10.1.0.10 > 10.2.0.1: ICMP echo request, id 1757, seq 
38, length 64
18:13:51.103478 IP 10.2.0.1 > 10.1.0.10: ICMP echo reply, id 1757, seq 
38, length 64

Does anyone has idea?

Any reply is appreciated.

Zhu Yanjun

On 05/08/2015 06:14 PM, yzhu1 wrote:
> On moon:
> Iptables rules:
>
> # Generated by iptables-save v1.4.21 on Fri May  8 18:10:58 2015
> *filter
> :INPUT ACCEPT [4274:596163]
> :FORWARD ACCEPT [0:0]
> :OUTPUT ACCEPT [190:20743]
> -A INPUT -s 10.2.0.0/16 -d 10.4.0.1/32 -i eth1 -m policy --dir in 
> --pol ipsec --reqid 1 --proto esp -j ACCEPT
> -A FORWARD -s 10.2.0.0/16 -d 10.4.0.1/32 -i eth1 -m policy --dir in 
> --pol ipsec --reqid 1 --proto esp -j ACCEPT
> -A FORWARD -s 10.4.0.1/32 -d 10.2.0.0/16 -o eth1 -m policy --dir out 
> --pol ipsec --reqid 1 --proto esp -j ACCEPT
> -A OUTPUT -s 10.4.0.1/32 -d 10.2.0.0/16 -o eth1 -m policy --dir out 
> --pol ipsec --reqid 1 --proto esp -j ACCEPT
> COMMIT
> # Completed on Fri May  8 18:10:58 2015
>
>  ip -4 r s table all
> 10.2.0.0/16 via 192.168.0.2 dev eth1  table 220  proto static  src 
> 10.4.0.1
> default via 128.224.162.1 dev eth0  proto static
> 10.1.0.0/16 dev eth2  proto kernel  scope link  src 10.1.0.1
> 128.224.162.0/23 dev eth0  proto kernel  scope link  src 
> 128.224.163.143  metric 1
> 192.168.0.0/24 dev eth1  proto kernel  scope link  src 192.168.0.1
> broadcast 10.1.0.0 dev eth2  table local  proto kernel  scope link  
> src 10.1.0.1
> local 10.1.0.1 dev eth2  table local  proto kernel  scope host src 
> 10.1.0.1
> broadcast 10.1.255.255 dev eth2  table local  proto kernel  scope 
> link  src 10.1.0.1
> local 10.4.0.1 dev eth1  table local  proto kernel  scope host src 
> 10.4.0.1
> broadcast 127.0.0.0 dev lo  table local  proto kernel  scope link src 
> 127.0.0.1
> local 127.0.0.0/8 dev lo  table local  proto kernel  scope host src 
> 127.0.0.1
> local 127.0.0.1 dev lo  table local  proto kernel  scope host  src 
> 127.0.0.1
> broadcast 127.255.255.255 dev lo  table local  proto kernel  scope 
> link  src 127.0.0.1
> broadcast 128.224.162.0 dev eth0  table local  proto kernel  scope 
> link  src 128.224.163.143
> local 128.224.163.143 dev eth0  table local  proto kernel  scope host  
> src 128.224.163.143
> broadcast 128.224.163.255 dev eth0  table local  proto kernel scope 
> link  src 128.224.163.143
> broadcast 192.168.0.0 dev eth1  table local  proto kernel  scope link  
> src 192.168.0.1
> local 192.168.0.1 dev eth1  table local  proto kernel  scope host src 
> 192.168.0.1
> broadcast 192.168.0.255 dev eth1  table local  proto kernel  scope 
> link  src 192.168.0.1
>
> cat /proc/sys/net/ipv4/ip_forward
> 1
>
>
> On 05/08/2015 06:01 PM, zhuyj wrote:
>> Hi, all
>>
>> I configured 4 vmare hosts. The hosts are ubuntu14.04. The gateway 
>> moon does not forward icmp packets.
>>
>> The network topology is as below.
>>
>> 10.1.0.10 <---->10.1.0.1 (moon) 192.168.0.1<----->192.168.0.2 (sun) 
>> 10.2.0.1<---->10.2.0.10
>>
>> strongswan is 5.3.0.
>>
>> On moon
>> /usr/local/etc/ipsec.conf is as below:
>>
>> config setup
>>
>> conn %default
>>     ikelifetime=60m
>>     keylife=20m
>>     rekeymargin=3m
>>     keyingtries=1
>>     authby=secret
>>     keyexchange=ikev2
>>     mobike=no
>>
>> conn net-net
>>     left=%defaultroute
>>     leftsourceip=%config
>>     leftfirewall=yes
>>     leftid=@moon.strongswan.org
>>     right=192.168.0.2
>>     rightsubnet=10.2.0.0/16
>>     rightid=@sun.strongswan.org
>>     auto=add
>> /usr/local/etc/ipsec.secrets is as below:
>>
>> : PSK 0sFpZAZqEN6Ti9sqt4ZP5EWcqx
>>
>> On Sun
>> /usr/local/etc/ipsec.conf is as below:
>> config setup
>>
>> conn %default
>>     ikelifetime=60m
>>     keylife=20m
>>     rekeymargin=3m
>>     keyingtries=1
>>     authby=secret
>>     keyexchange=ikev2
>>     mobike=no
>>
>> conn net-net
>>     left=192.168.0.2
>>     leftsubnet=10.2.0.0/16
>>     leftid=@sun.strongswan.org
>>     leftfirewall=yes
>>     right=192.168.0.1
>>     rightid=@moon.strongswan.org
>>     auto=add
>>     rightsourceip=10.4.0.0/24
>>
>> /usr/local/etc/ipsec.secrets is as below:
>>
>> : PSK 0sFpZAZqEN6Ti9sqt4ZP5EWcqx
>>
>> Others remain unchanged.
>>
>> I ran "ping 10.2.0.10" on clinet 10.1.0.10. But I can not get any 
>> reply from 10.2.0.10.
>>
>> I can find the icmp packets into moon. But moon will not forward 
>> these icmp packets.
>>
>> After an iptables rule (iptables -t nat -A POSTROUTING -s 10.4.0.0/16 
>> -j MASQUERADE) is run in
>> sun, I can ping 10.2.0.10 on moon.
>>
>> But I can not ping 10.2.0.1 on client 10.1.0.10.
>>
>> That is, moon can reach client 10.2.0.10.But client 10.10.10 can not 
>> reach sun.
>>
>> 10.1.0.10 <---->10.1.0.1 (moon) 192.168.0.1<----->192.168.0.2 (sun) 
>> 10.2.0.1<---->10.2.0.10
>> icmp------------------------------------------------------------------>here 
>>
>> icmp----------->
>>
>> In a word, moon can not forward icmp packets.
>>
>> Does any one have the similar experience?
>>
>> Any reply is appreciated.
>>
>> Thanks a lot.
>> Zhu Yanjun
>>
>>
>> _______________________________________________
>> Users mailing list
>> Users at lists.strongswan.org
>> https://lists.strongswan.org/mailman/listinfo/users
>>
>
> _______________________________________________
> Users mailing list
> Users at lists.strongswan.org
> https://lists.strongswan.org/mailman/listinfo/users
>




More information about the Users mailing list