> > greetings
> >
> > i have a working bering 2.4.18 FreeS/WAN 1.98b tunnel working nicely
> > between a hub and a few remotes working
> >
> > now i am tring to replace the hub, becouse we want to use openvpn for some
> > roaming clients.
> >
> > so i  replace the 1 Ghz 128MB machine at the hub with a 2.4Ghz 256MB one
> > with bering uclibc 2.4.32 and openswan 2.4.4, much more powerfull
> > hardware.
> >
> > all the tunnels comes back as expected and traffic flows. problem is that
> > the speed drops by ~half, and the previous usable link becomes almost
> > unusable for the applications.
> >
> > is there any workaround for this ? is it becouse of the uclibc and it's
> > size before performance ? or may it be the kernels fault ?
> >
> > basicaly what im asking is should i use bering instead of bering uclibc,
> > or would a custom kernel solve my issues ?
> >
> >
> >
> > --
> > Ronny Aasen <[EMAIL PROTECTED]>
> >


> Hello Ronny,
> 
> This has nothing todo with "uclibc and it's size before performance" but
> it's probably a configuration issue either in shorewall or openswan.
> 
> Do you see any strange messages in your logs or in the output of
> "shorewall hits"?
> 
> Eric

thank you for the switft reply. 

freeswan is the old bering 2.4.18 box, openswan is the new bering uclibc
2.4.32 box

i am testing with iperf: 
freeswan to freeswan see 7-8 Mbits/sec that's close to max available
across the remote wireless link.
freeswan to openswan i see 3-4 Mbits/sec about half of what i expected.

i see nothing out of the ordinary in var/logs/*. shorewall hits shows
nothing that's from any of the internal networks or my public ip's. only
hits i see are from the background noise of the net. 

my auth.log on the new openswan contains

Jun 27 06:14:55 ServNetgw pluto[305]: "PgptoServ" #26: STATE_MAIN_R2:
sent MR2, expecting MI3
Jun 27 06:14:55 ServNetgw pluto[305]: "PgptoServ" #26: Main mode peer ID
is ID_IPV4_ADDR: '217.17.211.148'
Jun 27 06:14:55 ServNetgw pluto[305]: "PgptoServ" #26: I did not send a
certificate because I do not have one.
Jun 27 06:14:55 ServNetgw pluto[305]: "PgptoServ" #26: transition from
state STATE_MAIN_R2 to state STATE_MAIN_R3
Jun 27 06:14:55 ServNetgw pluto[305]: "PgptoServ" #26: STATE_MAIN_R3:
sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY
cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}
Jun 27 06:14:55 ServNetgw pluto[305]: "PgptoServ" #27: responding to
Quick Mode {msgid:1387871e}
Jun 27 06:14:55 ServNetgw pluto[305]: "PgptoServ" #27: transition from
state STATE_QUICK_R0 to state STATE_QUICK_R1
Jun 27 06:14:55 ServNetgw pluto[305]: "PgptoServ" #27: STATE_QUICK_R1:
sent QR1, inbound IPsec SA installed, expecting QI2
Jun 27 06:14:56 ServNetgw pluto[305]: "PgptoServ" #27: transition from
state STATE_QUICK_R1 to state STATE_QUICK_R2
Jun 27 06:14:56 ServNetgw pluto[305]: "PgptoServ" #27: STATE_QUICK_R2:
IPsec SA established {ESP=>0xd9a690e6 <0x85deba70 xfrm=3DES_0-HMAC_MD5
NATD=none DPD=none}


the freeswan box:
Jun 26 18:04:28 pgpGw pluto[20193]: "pgp-to-test" #3: initiating Main
Mode
Jun 26 18:04:28 pgpGw pluto[20193]: "pgp-to-test" #3: ignoring Vendor ID
payload
Jun 26 18:04:28 pgpGw pluto[20193]: "pgp-to-test" #3: ignoring Vendor ID
payload
Jun 26 18:04:28 pgpGw pluto[20193]: "pgp-to-test" #3: Peer ID is
ID_IPV4_ADDR: '217.17.211.4'
Jun 26 18:04:28 pgpGw pluto[20193]: "pgp-to-test" #3: ISAKMP SA
established
Jun 26 18:04:28 pgpGw pluto[20193]: "pgp-to-test" #4: initiating Quick
Mode PSK+ENCRYPT+TUNNEL+PFS+DISABLEARRIVALCHECK
Jun 26 18:04:28 pgpGw pluto[20193]: "pgp-to-test" #4: sent QI2, IPsec SA
established

i read this as "works as expected", 

in shorewall zones i did 
ipsec ipv4  
i did _NOT_ do 
ipsec ipsec

Since that gave me a error about policy match support in the kernel.
could this couse the slowdown ? 

i configured the ipsec endpoints in tunnels as normal.
ipsec           net     217.17.211.144



here is my freeswan config

config setup
        interfaces=%defaultroute
        klipsdebug=none
        plutodebug=none
        plutoload=%search
        plutostart=%search
        uniqueids=yes

conn pgp-to-test
        left=217.17.211.148
        leftsubnet=10.0.1.0/24
        leftnexthop=217.17.211.129
        right=217.17.211.4
        rightsubnet=10.0.10.0/24
        rightnexthop=217.17.211.1
        auto=start
        authby=secret

and my openswan config

version 2.0

config setup
        plutodebug=none
        klipsdebug=none

conn Pgp-to-test
        left=217.17.211.148
        leftsubnet=10.0.1.0/24         
        leftnexthop=217.17.211.129
        right=217.17.211.4
        rightsubnet=10.0.10.0/24         
        rightnexthop=217.17.211.1
        auto=start
        authby=secret

same config (- version 2.0) works fine in a freeswan to freeswan setup.


hope someone have a clue to what's cousing this.
thanks

-- 
Ronny Aasen <[EMAIL PROTECTED]>


Using Tomcat but need to do more? Need to support web services, security?
Get stuff done quickly with pre-integrated technology to make your job easier
Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
------------------------------------------------------------------------
leaf-user mailing list: leaf-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/leaf-user
Support Request -- http://leaf-project.org/

Reply via email to