2.6 IPSec tunnel mode problems

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi all
I'm running IPSec tunnel mode between host 'A' running 2.6.12.5
and host 'B' running 2.6.11.10. 'A' is behind a NAT. I have one
problem but the stuff that's working correctly is the following :
1. racoon sets up the IPSec SA on demand. IKE messages are all
   NAT-T encapsulated and I used tcpdump on both ends to verify
   that KeepAlive messages go out and are NAT-T encapsulated
2. ESP encrypt/decrypt seems to be fine. From 'A' I ping 'B' and
   I see the encrypted Echo response come back to 'A'. It gets
   decrypted and tcpdump shows that the plaintext pkt is re-injected
   back into the stack.
PROBLEM:
  The plaintext echo response does not make it to the ICMP layer
  or to the ping program.
DIAGNOSIS:
0. /proc/sys/net/ipv4/ip_forward is 1 on both hosts
1. I did 'iptables --flush' ; 'iptables --list' shows no rules
2. setkey.conf has a 'require' rule for in and out. No 'fwd' rule
   racoon.conf has 'generate_policy on'
QUESTION:
1. If I have no netfilter rules, this can't be a firewall issue right ?
   I saw some mail about marking the ESP pkt in the mangle table but
   none of that should apply since I have disabled my firewall right ?
2. The stack accepts and decrypts the ESP pkt. but the 'require' rule
   should force it to throw away all cleartext pkts correct ? If this
   is true, how can IPSec ever work ?

What am I missing ???
Thanks
-gopal
-
: send the line "unsubscribe linux-net" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Netdev]     [Ethernet Bridging]     [Linux 802.1Q VLAN]     [Linux Wireless]     [Kernel Newbies]     [Security]     [Linux for Hams]     [Netfilter]     [Git]     [Bugtraq]     [Yosemite News and Information]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux PCI]     [Linux Admin]     [Samba]

  Powered by Linux