please apply all patches for 3.7. I've lately added a patch for this issue to the 3.7 errata page.
HJ. On Mon, Nov 21, 2005 at 05:01:28PM -0800, Dag Richards wrote: > Using the sample config straight from the vpn man page, my tunnel fails > to come up between GENERIC 3.8 or 3.7 on a sunfire v100 ( dmesg below ) > and GENERIC on an x86 machine. If I run the same config on another x86 > machine it works. > > When running `isakmpd -L` I see checksum errors on the sunfire ( see > dump below). > > > Is this a problem with the dc driver? I have tried both of the > interfaces but to no avail, there are no pci slots for add on cards > > debug output and config files below. > > ============= tcpdump -nvr /var/run/isakmpd.pcap================== > 16:37:33.685897 192.168.1.13.500 > 192.168.1.15.500: [bad udp cksum > 1c8e!] isakmp v1.0 exchange ID_PROT > cookie: 30e6fc2ae5d3ef74->0000000000000000 msgid: 00000000 len: 196 > payload: SA len: 88 DOI: 1(IPSEC) situation: IDENTITY_ONLY > payload: PROPOSAL len: 76 proposal: 1 proto: ISAKMP spisz: > 0 xforms: 2 > payload: TRANSFORM len: 32 > transform: 0 ID: ISAKMP > attribute ENCRYPTION_ALGORITHM = 3DES_CBC > attribute HASH_ALGORITHM = SHA > attribute AUTHENTICATION_METHOD = PRE_SHARED > attribute NONE = > attribute NONE = > attribute NONE = > payload: TRANSFORM len: 0 [|isakmp] > payload: VENDOR len: 0 [|isakmp] [ttl 0] (id 1, len 224) > 16:37:40.693965 192.168.1.15.500 > 192.168.1.13.500: [bad udp cksum > 8c9d!] isakmp v1.0 exchange ID_PROT > cookie: 30e6fc2ae5d3ef74->8cb97ec972120f6e msgid: 00000000 len: 160 > payload: SA len: 52 DOI: 1(IPSEC) situation: IDENTITY_ONLY > payload: PROPOSAL len: 40 proposal: 1 proto: ISAKMP spisz: > 0 xforms: 1 > payload: TRANSFORM len: 32 > transform: 0 ID: ISAKMP > attribute ENCRYPTION_ALGORITHM = 3DES_CBC > attribute HASH_ALGORITHM = SHA > attribute AUTHENTICATION_METHOD = PRE_SHARED > attribute NONE = > attribute NONE = > attribute NONE = > payload: VENDOR len: 0 [|isakmp] [ttl 0] (id 1, len 188) > 16:37:40.772058 192.168.1.13.500 > 192.168.1.15.500: [bad udp cksum > c4e6!] isakmp v1.0 exchange ID_PROT > cookie: 30e6fc2ae5d3ef74->8cb97ec972120f6e msgid: 00000000 len: 228 > payload: KEY_EXCH len: 132 > payload: NONCE len: 0 [|isakmp] [ttl 0] (id 1, len 256) > 16:37:40.784674 192.168.1.15.500 > 192.168.1.13.500: [bad udp cksum > bb54!] isakmp v1.0 exchange ID_PROT > cookie: 30e6fc2ae5d3ef74->8cb97ec972120f6e msgid: 00000000 len: 228 > payload: KEY_EXCH len: 132 > payload: NONCE len: 0 [|isakmp] [ttl 0] (id 1, len 256) > 16:37:40.786483 192.168.1.13.500 > 192.168.1.15.500: [udp sum ok] > isakmp v1.0 exchange INFO > cookie: d5feed659a4246cc->0000000000000000 msgid: 00000000 len: 40 > payload: NOTIFICATION len: 12 > notification: INVALID PAYLOAD TYPE [ttl 0] (id 1, len 68) > > > ============= tcpdump -nvr /var/run/isakmpd.pcap================== > > > > > > > > > > > > ============isakmpd -DA=50 ================ > 163740.784428 Timr 10 timer_remove_event: removing event > message_send_expire(0x88cc00) > 163740.784712 Default message_parse_payloads: invalid next payload type > RESERVED_MIN in payload of type 10 > 163740.785137 Default dropped message from 192.168.1.15 port 500 due to > notification type INVALID_PAYLOAD_TYPE > 163740.785434 Timr 10 timer_add_event: event exchange_free_aux(0x892e00) > added last, expiration in 120s > 163740.785729 Exch 10 exchange_establish_p1: 0x892e00 <unnamed> <no > policy> policy initiator phase 1 doi 1 exchange 5 step 0 > 163740.785990 Exch 10 exchange_establish_p1: icookie d5feed659a4246cc > rcookie 0000000000000000 > 163740.786237 Exch 10 exchange_establish_p1: msgid 00000000 > 163740.786599 Exch 40 exchange_run: exchange 0x892e00 finished step 0, > advancing... > 163740.786834 Mesg 20 message_free: freeing 0x88d000 > 163740.787149 Exch 10 exchange_finalize: 0x892e00 <unnamed> <no policy> > policy initiator phase 1 doi 1 exchange 5 step 1 > 163740.787413 Exch 10 exchange_finalize: icookie d5feed659a4246cc > rcookie 0000000000000000 > 163740.787647 Exch 10 exchange_finalize: msgid 00000000 > 163740.787879 Timr 10 timer_remove_event: removing event > exchange_free_aux(0x892e00) > ============isakmpd -DA=50 ================ > > > ====================dmesg=========== > console is /[EMAIL PROTECTED],0/[EMAIL PROTECTED]/[EMAIL PROTECTED],3f8 > Copyright (c) 1982, 1986, 1989, 1991, 1993 > The Regents of the University of California. All rights reserved. > Copyright (c) 1995-2005 OpenBSD. All rights reserved. > http://www.OpenBSD.org > > OpenBSD 3.7 (GENERIC) #431: Sun Mar 20 14:10:02 MST 2005 > [EMAIL PROTECTED]:/usr/src/sys/arch/sparc64/compile/GENERIC > total memory = 536870912 > avail memory = 479256576 > using 3276 buffers containing 26836992 bytes of memory > bootpath: /[EMAIL PROTECTED],0/[EMAIL PROTECTED],0/[EMAIL PROTECTED],0 > mainbus0 (root): Sun Fire V100 (UltraSPARC-IIe 548MHz) > cpu0 at mainbus0: SUNW,UltraSPARC-IIe @ 548 MHz, version 0 FPU > cpu0: physical 32K instruction (32 b/l), 16K data (32 b/l), 512K > external (64 b/l) > psycho0 at mainbus0 > SUNW,sabre: impl 0, version 0: ign 7c0 bus range 0 to 0; PCI bus 0 > DVMA map: 60000000 to 80000000 > IOTDB: 826a6000 to 82726000 > pci0 at psycho0 > ebus0 at pci0 dev 7 function 0 "Acer Labs M1533 ISA" rev 0x00 > dma at ebus0 addr 0-ffff ipl 42 not configured > rtc0 at ebus0 addr 70-71: m5819 > power at ebus0 addr 2000-2007 ipl 35 not configured > SUNW,lomh at ebus0 addr 8010-8011 ipl 42 not configured > com0 at ebus0 addr 3f8-3ff ipl 43: ns16550a, 16 byte fifo > com0: console > com1 at ebus0 addr 2e8-2ef ipl 43: ns16550a, 16 byte fifo > flashprom at ebus0 addr 0-7ffff not configured > "Acer Labs M7101 Power Mgmt" rev 0x00 at pci0 dev 3 function 0 not > configured > "Acer Labs M7101 Power Mgmt" rev 0x00 at pci0 dev 3 function 0 not > configured > dc0 at pci0 dev 12 function 0 "Davicom DM9102" rev 0x31: ivec 3006, > address 00:03:ba:ce:d8:6b > amphy0 at dc0 phy 1: DM9102 10/100 PHY, rev. 0 > dc1 at pci0 dev 5 function 0 "Davicom DM9102" rev 0x31: ivec 301c, > address 00:03:ba:ce:d8:6c > amphy1 at dc1 phy 1: DM9102 10/100 PHY, rev. 0 > ohci0 at pci0 dev 10 function 0 "Acer Labs M5237 USB" rev 0x03: ivec 24, > version 1.0, legacy support > usb0 at ohci0: USB revision 1.0 > uhub0 at usb0 > uhub0: Acer Labs OHCI root hub, class 9/0, rev 1.00/1.00, addr 1 > uhub0: 2 ports with 2 removable, self powered > pciide0 at pci0 dev 13 function 0 "Acer Labs M5229 UDMA IDE" rev 0xc3: > DMA, channel 0 configured to native-PCI, channel 1 configured to native-PCI > pciide0: using ivec 180c for native-PCI interrupt > wd0 at pciide0 channel 0 drive 0: <HDS728080PLAT20> > wd0: 16-sector PIO, LBA48, 76319MB, 156301488 sectors > wd0(pciide0:0:0): using PIO mode 4, Ultra-DMA mode 2 > wd1 at pciide0 channel 1 drive 0: <HDS728080PLAT20> > wd1: 16-sector PIO, LBA48, 76319MB, 156301488 sectors > atapiscsi0 at pciide0 channel 1 drive 1 > scsibus0 at atapiscsi0: 2 targets > cd0 at scsibus0 targ 0 lun 0: <TEAC, CD-224E, P.9A> SCSI0 5/cdrom removable > wd1(pciide0:1:0): using PIO mode 4, Ultra-DMA mode 2 > cd0(pciide0:1:1): using PIO mode 4, DMA mode 2 > pcons at mainbus0 not configured > No counter-timer -- using %tick at 548MHz as system clock. > root on wd0a > rootdev=0xc00 rrootdev=0x1a00 rawdev=0x1a02 > dc1: failed to force tx and rx to idle state > dc1: failed to force tx and rx to idle state > dc1: failed to force tx and rx to idle state > dc1: failed to force tx and rx to idle state > dc1: failed to force tx and rx to idle state > dc1: failed to force tx and rx to idle state > dc1: failed to force tx and rx to idle state > dc1: failed to force tx and rx to idle state > ====================dmesg=================================== > > > > > > ============== sunfire config ============= > # cat isakmpd.conf > # Filter incoming phase 1 negotiations so they are only > # valid if negotiating with this local address. > > [General] > Listen-On= 192.168.1.13 > > # Incoming phase 1 negotiations are multiplexed on the > # source IP address. Phase 1 is used to set up a protected > # channel just between the two gateway machines. > # This channel is then used for the phase 2 negotiation > # traffic (i.e. encrypted & authenticated). > > [Phase 1] > 192.168.1.15= peer-machineB > > # 'Phase 2' defines which connections the daemon > # should establish. These connections contain the actual > # "IPsec VPN" information. > > [Phase 2] > Connections= VPN-A-B > > # ISAKMP phase 1 peers (from [Phase 1]) > > [peer-machineB] > Phase= 1 > Transport= udp > Address= 192.168.1.15 > Configuration= Default-main-mode > Authentication= yoursharedsecret > > # IPSEC phase 2 connections (from [Phase 2]) > > [VPN-A-B] > Phase= 2 > ISAKMP-peer= peer-machineB > Configuration= Default-quick-mode > Local-ID= machineA-internal-network > Remote-ID= machineB-internal-network > > # ID sections (as used in [VPN-A-B]) > > [machineA-internal-network] > ID-type= IPV4_ADDR_SUBNET > Network= 10.0.50.0 > Netmask= 255.255.255.0 > > [machineB-internal-network] > ID-type= IPV4_ADDR_SUBNET > Network= 10.0.99.0 > Netmask= 255.255.255.0 > > # Main and Quick Mode descriptions > # (as used by peers and connections). > > [Default-main-mode] > DOI= IPSEC > EXCHANGE_TYPE= ID_PROT > Transforms= 3DES-SHA,BLF-SHA > > [Default-quick-mode] > DOI= IPSEC > EXCHANGE_TYPE= QUICK_MODE > Suites= QM-ESP-3DES-SHA-SUITE > > > ============= sunfire =================== > > > ============== x86 config ================ > > > # cat isakmpd.conf > i# Filter incoming phase 1 negotiations so they are only > # valid if negotiating with this local address. > > [General] > Listen-On= 192.168.1.15 > > # Incoming phase 1 negotiations are multiplexed on the > # source IP address. Phase 1 is used to set up a protected > # channel just between the two gateway machines. > # This channel is then used for the phase 2 negotiation > # traffic (i.e. encrypted & authenticated). > > [Phase 1] > 192.168.1.13= peer-machineA > > # 'Phase 2' defines which connections the daemon > # should establish. These connections contain the actual > # "IPsec VPN" information. > > [Phase 2] > Connections= VPN-B-A > > # ISAKMP phase 1 peers (from [Phase 1]) > > [peer-machineA] > Phase= 1 > Transport= udp > Address= 192.168.1.13 > Configuration= Default-main-mode > Authentication= yoursharedsecret > > # IPSEC phase 2 connections (from [Phase 2]) > > [VPN-B-A] > Phase= 2 > ISAKMP-peer= peer-machineA > Configuration= Default-quick-mode > Local-ID= machineB-internal-network > Remote-ID= machineA-internal-network > > # ID sections (as used in [VPN-A-B]) > > [machineA-internal-network] > ID-type= IPV4_ADDR_SUBNET > Network= 10.0.50.0 > Netmask= 255.255.255.0 > > [machineB-internal-network] > ID-type= IPV4_ADDR_SUBNET > Network= 10.0.99.0 > Netmask= 255.255.255.0 > > # Main and Quick Mode descriptions > # (as used by peers and connections). > > [Default-main-mode] > DOI= IPSEC > EXCHANGE_TYPE= ID_PROT > Transforms= 3DES-SHA,BLF-SHA > > [Default-quick-mode] > DOI= IPSEC > EXCHANGE_TYPE= QUICK_MODE > Suites= QM-ESP-3DES-SHA-SUITE > > > ============= x86 config =============== > > > > =========== policy file ================ > # cat isakmpd.policy > > Keynote-version: 2 > Authorizer: "POLICY" > Conditions: app_domain == "IPsec policy" && > esp_present == "yes" && > esp_enc_alg != "null" -> "true"; > ==========================================

