On Oct 14, 2011, at 5:27 AM, Maxim Bourmistrov wrote: > Hi all, > problem is still there. > > Both sides are -current now (Oct 6 build). > > Any ideas what is wrong? > > //maxim >
Have you looked at your pf ruleset on both sides of the tunnel? Are you using blanket allow rules for ipsec traffic? E.G. "pass on enc0 from any to any"? or are you making more explicit rules to match your flows? Almost sounds like a state is not being created until a packet comes in from the other side, which can easily be tied to pf rules regarding your VPN tunnels. If you have explicit rulesets allowing traffic for VPN's my first guess is one side is missing the new rules that match the flows, or the network was not added to a macro or table being used in your pf ruleset. If you allow 'any to any' traffic via enc0 the next step I usually take is to tcpdump traffic on the local firewall for the enc0 and egress interfaces. have seen in the past pf rules not implemented properly for NAT & IPSec relabel a packet that should go over a VPN tunnel which may cause the other side to deny it, or to return traffic to the wrong IP, or to not match the remote firewall ESP ruleset and be accepted and decrypted. This causes what looks like a failure in traffic between endpoints, however it is a failure in rulesets causing problems with functional endpoints. Sending traffic from the reverse side could create a state that allows traffic to pass until the state is cleared. Much of this is from historic troubleshooting around OpenBSD 3.7-4.3, so changes in routing and handling encrypted traffic could make some of what I said currently inaccurate. Using tcpdump however on the egress, enc0 and possibly the ingress interfaces should give you a much better understanding of what is happening to the packets, and why the far side appears to deny the traffic. Trevor

