On 2012-06-06, Henning Brauer <lists-open...@bsws.de> wrote: > * Hendrik Meyburgh <hendri...@gmail.com> [2012-06-06 14:17]: >> Hi Misc, >> >> I am having issues troubleshooting an issue where the error is: >> >> Jun 6 13:47:53 openbsd5132 bgpd[15919]: neighbor x.x.x.x (AS 65002 peer 1): >> parse_capabilities: AFI 1, safi 4 unknown > > hmm, afi 1 is IPv4, safi 4 is MPLS (not MPLSVPN!), and we don't handle > that indeed. but that's not fatal. > >> Jun 6 13:47:54 openbsd5132 bgpd[15940]: neighbor x.x.x.x (AS 65002 peer 1): >> bad VPNv4 withdraw prefix > > and that is fatal as in the session is dropped by sending a > notification, as the next line also sez. that in turn means either > prefixlen is > 32 or rde_update_get_vpn4 failed. Which in turn means > either one of the validity checks or rde_update_extract_prefix failed, > and rde_update_extract_prefix again only fails on a validty check. > > guess we need to see that update.
tcpdump is probably the best option. the decoder isn't too bad but it's probably worth grabbing hex dumps (-X) as well. tcpdump -nXvvs1500 -i <interface> host x.x.x.x and port 179