[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-users] Xen IP stack fails handoff to pluto in openswan
This one has me stumped. I have openswan 2.3.0 installed on a xen 2.0.7 virtual machine running fedora core 3. I've tried establishing tunnels with a CyberGuard SG575 (FreeS/WAN), an old Super-FreeS/WAN gatway and a Windows IPSec only client (lsipsectool - http://sf.net/projects/lsipsectool). I see the same symptom in all cases so I suspect the problem is between openswan and xen. Pluto never see packets destined for it. I've looked at this several ways. I'll refer to the Xen openswan gateway as XenOSW. tcpdump on XenOSW sees that packets on eth0. If I log the packets on the INPUT chain of iptables on XenOSW, I see them there, too. I set plutodebug=all in ipsec.conf but I still do not see any replies or initiations from the partner even though I see them on the OUTPUT and INPUT chains and the eth0 interface. In /var/log/secure I get plenty of: Sep 17 13:31:14 NiagaraRASGW pluto[604]: | emitting length of ISAKMP Vendor ID Payload: 20 Sep 17 13:31:14 NiagaraRASGW pluto[604]: | emitting length of ISAKMP Message: 292 Sep 17 13:31:14 NiagaraRASGW pluto[604]: | sending 292 bytes for main_outI1 through eth0:500 to x.x.x.188:500: but never a reply and I never see any packet received messages from any of the partners even though we see the packets on the interface. Here are the INPUT chain iptables rules (which work perfectly on non Xen openswan gateways): Chain INPUT (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 8 560 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 state NEW 0 0 ACCEPT tcp -- lo * 0.0.0.0/0 0.0.0.0/0 0 0 ACCEPT esp -- * * 0.0.0.0/0 0.0.0.0/0 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:500 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:4500 0 0 VPN_ALLOW all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 ACCESS_GROUPS_DENY all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 ACCESS_GROUPS all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 prefix `No Match: ' Here is OUTPUT: Chain OUTPUT (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 30 5888 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53 state NEW 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:123 state NEW 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 state NEW 0 0 ACCEPT tcp -- * lo 0.0.0.0/0 0.0.0.0/0 0 0 ACCEPT esp -- * * 0.0.0.0/0 0.0.0.0/0 3 960 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:500 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:4500 0 0 VPN_ALLOW all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 ACCESS_GROUPS_DENY all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 ACCESS_GROUPS all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 prefix `No Match: ' The Xen host has two NICs. All guests except the XenOSW use eth1 on bridge xen-br0. The XenOSW domU uses eth0 through bridge xen-br1 and has a manually defined MAC address of 02:00:00:00:00:02. There is no IP address bound to eth0 or xen-br1 in dom0 (the host). The IP address is bound in XenOSW. We do this because we do not want to expose the dom0 to the Internet in any way. However, we have tried it with a legitimate address bound to the host eth0 and to bridge xen-br1. The XenOSW domU does not start automatically as it is still a test device. Instead, after the dom0 boots, we do: brctl addbr xen-br1 brctl addif xen-br1 eth0 ifconfig xen-br1 up We then boot the XenOSW domU and all other traffic seems fine, e.g., the iptables list was taken from an SSH session between my laptop and the XenOSW. Just Pluto is broken. I have no idea what is wrong or even how to troubleshoot it. The packets just seem to fail on the handoff from the IP stack to the Pluto application. Any suggestions about either what is wrong or how to troubleshoot it further? Many thanks to anyone willing to dive in this deep! - John -- John A. Sullivan III Open Source Development Corporation +1 207-985-7880 jsullivan@xxxxxxxxxxxxxxxxxxx If you would like to participate in the development of an open source enterprise class network security management system, please visit http://iscs.sourceforge.net -- John A. Sullivan III Open Source Development Corporation +1 207-985-7880 jsullivan@xxxxxxxxxxxxxxxxxxx Financially sustainable open source development http://www.opensourcedevel.com _______________________________________________ Xen-users mailing list Xen-users@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-users
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |