On 2012-06-06, Henning Brauer <lists-open...@bsws.de> wrote:
> * Hendrik Meyburgh <hendri...@gmail.com> [2012-06-06 14:17]:
>> Hi Misc,
>> 
>> I am having issues troubleshooting an issue where the error is:
>> 
>> Jun  6 13:47:53 openbsd5132 bgpd[15919]: neighbor x.x.x.x (AS 65002 peer 1):
>> parse_capabilities: AFI 1, safi 4 unknown
>
> hmm, afi 1 is IPv4, safi 4 is MPLS (not MPLSVPN!), and we don't handle
> that indeed. but that's not fatal.
>
>> Jun  6 13:47:54 openbsd5132 bgpd[15940]: neighbor x.x.x.x (AS 65002 peer 1):
>> bad VPNv4 withdraw prefix
>
> and that is fatal as in the session is dropped by sending a
> notification, as the next line also sez. that in turn means either
> prefixlen is > 32 or rde_update_get_vpn4 failed. Which in turn means
> either one of the validity checks or rde_update_extract_prefix failed,
> and rde_update_extract_prefix again only fails on a validty check.
>
> guess we need to see that update.

tcpdump is probably the best option. the decoder isn't too bad but it's
probably worth grabbing hex dumps (-X) as well.

tcpdump -nXvvs1500 -i <interface> host x.x.x.x and port 179

Reply via email to