>On Fri, Jan 28, 2005 at 06:26:04PM -0200, Paulo Ricardo Bruck wrote: >> Hi guys > > >>I've been testing debian sarge kernel 2.6.8-1 + iptables 1.2.11-8 + >>openswan 2.2.0-4 >> >> I can ping from desktop1 to desktop2 , but if I try to see a http page >> at desktop1 from desktop 2 I see a connection time out. >> >> desktop1-- iptables/openswan1--internet--iptables/openswan2--desktop2 >> >> ping 192.168.1.7 ( desktop 2) >> tcpdump from iptables2 wan >> IP 200.207.125.76 > 200.168.52.239: ESP(spi=0x78987d47,seq=0x22) >> IP 192.168.0.11 > 192.168.1.7: icmp 64: echo request seq 1 >> IP 200.168.52.239 > 200.207.125.76: ESP(spi=0x1e76f500,seq=0x29) >> IP 200.207.125.76 > 200.168.52.239: ESP(spi=0x78987d47,seq=0x23) >> ok works >> >> >> lynx 192.168.1.7 (desktop2) >> tcpdump from iptables2 wan >> IP 200.207.125.76 > 200.168.52.239: ESP(spi=0x78987d47,seq=0x2c) >> IP 192.168.0.11.33654 > 192.168.1.7.80: S 3132491911:3132491911(0) w>in >> 5840 <mss 1460,sackOK,timestamp 33947617 0,nop,wscale 0> >> IP 200.168.52.239 > 200.207.125.76: ESP(spi=0x1e76f500,seq=0x39) >> IP 200.168.52.239 > 200.207.125.76: ESP(spi=0x1e76f500,seq=0x3a) >> IP 200.207.125.76 > 200.168.52.239: ESP(spi=0x78987d47,seq=0x2d) >> IP 192.168.0.11.33655 > 192.168.1.7.80: S 3148629414:3148629414(0) >win >> 5840 <mss 1460,sackOK,timestamp 33950275 0,nop,wscale 0> >> IP 200.168.52.239 > 200.207.125.76: ESP(spi=0x1e76f500,seq=0x3b) >> IP 200.207.125.76 > 200.168.52.239: ESP(spi=0x78987d47,seq=0x2e) >> IP 192.168.0.11.33655 > 192.168.1.7.80: S 3148629414:3148629414(0) win >> 5840 <mss 1460,sackOK,timestamp 33953275 0,nop,wscale 0> >> >> important rules iptables/ipsec1 >> iptables -A INPUT -p 50 -j ACCEPT >> iptables -A FORWARD -p 50 -j ACCEPT >> iptables -A INPUT -p 51 -j ACCEPT >> iptables -A FORWARD -p 51 -j ACCEPT >> iptables -A INPUT -p udp --sport 500 --dport 500 -j ACCEPT >< iptables -A INPUT -p udp --sport 4500 --dport 4500 -j ACCEPT >> #iptables -A FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS ->-set-mss >> 1440 >> iptables -A FORWARD -s 192.168.0.0/24 -d 192.168.1.0/24 -j ACCEPT >> iptables -A FORWARD -s 192.168.1.0/24 -d 192.168.0.0/24 -j ACCEPT >> iptables -t nat -A POSTROUTING -o $WAN1 -d ! 192.168.1.0/24 -j SNAT >>--to-source $IPWAN1 >> >> I ve already tried using TCPMSS, but not solved. > >try it again, and use a lower value than 1440--i'd recommend starting >at 1400, actually--and work you're way down until it works. i *would* >say tcpdump your external interface and filter for ICMP Type 3 Code 4 >packets to verify that it's an MTU/MSS problem, but to quote a >statement >some wizard just made in #iptables: > > "perhaps there is icmp filtering at the border router for anything >not > an echo reply. which makes sense cause you normally dont need icmp > messages across the internet" > >depending on the combination of encapsulations in your specific >scenario >(WiFi, PPP, etc), i've had to ratchet it down as low as 1330 to get a >functional tunnel. > >-j > Hi guys finally I discover the "error" at my nat rule.. Instead of : iptables -t nat -A POSTROUTING -o $WAN1 -j SNAT --to-source $IPWAN1 I insert my local net at the above rule iptables -t nat -A POSTROUTING -s $LOCALNET -o $WAN1 -j SNAT --to-source $IPWAN1 But thereis something that still bothering me. Why was everything working fine without this last rule and when I Install openswan I had to insert $LOCALNET? Thanks very much for your help Jason and list. -- Paulo Ricardo Bruck - consultor Contato Global Solutions tel 011 5031-4932 fone/fax 011 5034-1732 cel 011 9235-4327