We have an IPsec tunnel setup between two OpenBSD firewalls and normally it "just works" (thanks developers!)
Over the past day or so the tunnel "breaks". ipsecctl -sa shows no flows or SADB entries. The log entries at the Sydney end show lines like: Feb 24 05:59:21 pps35001 isakmpd[9204]: rsa_sig_decode_hash: no public key found Feb 24 05:59:21 pps35001 isakmpd[9204]: dropped message from xyz.101.222.1 port 56858 due to notification type INVALID_ID_INFORMATION Feb 24 05:59:32 pps35001 isakmpd[9204]: rsa_sig_decode_hash: no public key found Feb 24 05:59:32 pps35001 isakmpd[9204]: dropped message from xyz.101.222.1 port 56858 due to notification type INVALID_ID_INFORMATION There are batches of such messages, some quite short (1 or 2) but some go on for long periods. The batch including the above sample started at 05:10:57 and is still (06:13) going. The Melbourne end log looks like: Feb 24 06:13:04 PPS35004 isakmpd[23508]: transport_send_messages: giving up on exchange peer-abc.228.107.202, no response from peer abc.228.107.202:500 Feb 24 06:13:32 PPS35004 isakmpd[23508]: transport_send_messages: giving up on exchange peer-abc.228.107.202, no response from peer abc.228.107.202:4500 The pubkey for Melbourne is in place and readable at /etc/isakmpd/pubkeys/ipv4/ Any clues? Any other pertinent info needed? Please reply on list. The sender address is filtered to allow connections only from the list server. The spammers know it well enough. ;( Rod/ >From the land "down under": Australia. Do we look <umop apisdn> from up over?