see https://testing.libreswan.org/v3.28-839-g49ccf4dde-master/ikev2-32-nat-rw-rekey/OUTPUT/east.console.verbose.txt nic# iptables -t nat -A POSTROUTING -s 192.1.3.0/24 -p udp --sport 4500 -j SNAT --to-source 192.1.2.254:3500-3700 I'm guessing that, in the past, the first port - 3500 - was assigned but now a random port - in the above 3633 - is being assigned
Andrew PS: I need to tweak a sanitizer so that 3500 isn't sanitized but that's not the problem here. PPS: I wish we used 3-digit port numbers in these tests, usermode is dead and we're running as root _______________________________________________ Swan-dev mailing list [email protected] https://lists.libreswan.org/mailman/listinfo/swan-dev
