On Tue, May 05, 2020 at 09:07:34AM +0100, Richard Chivers wrote:
> After some more work this morning we have managed to extract the
> information from tcpdump of the full LS-Update packet, we couldn't see it
> on bsd, but running:
>
> tcpdump -v -r ~/Downloads/ospf.pcap on osx did the trick.
>
> What we are seeing is that a pair of firewalls are both sending updates
> like this:
>
> 07:16:09.346525 IP (tos 0xc0, ttl 1, id 47473, offset 0, flags [+], proto
> OSPF (89), length 1500)
> x.x.x.x > ospf-dsig.mcast.net: OSPFv2, LS-Update, length 1480 [len 1672]
> Router-ID x.x.x.x, Backbone Area, Authentication Type: simple (1)
> Simple text password: dslkfjld, 1 LSA
> LSA #1
> Advertising Router x.x.x.x, seq 0x8000006e, age 0s, length 1624
> Router LSA (1), LSA-ID: x.x.x.x
> Options: [External]
> Router LSA Options: [ASBR]
> Stub Network: 10.128.32.128, Mask: 255.255.255.128
> topology default (0), metric 10
> Stub Network: 10.128.9.0, Mask: 255.255.255.128
> *{ another 50 or so networks here}*
>
> Each time we get one of these updates the DR logs the lsa_check: bad age.
>
> Another 5 or so seconds later the same LS-Update comes in with the same seq
> number. This appears to continue indefinitely. Our only fix appears to be
> restarting ospfd on the routers.
>
> Does anyone have an idea what is going wrong here?
>
> Something we have considered being a problem is that we do have many
> interfaces, we have 90 or so, so the LS-Update packets are quite large and
> do get fragmented, as we are using a 1500mtu.
>
> The fact that ospfd sees the age and complains though makes us think this
> is not a problem.
>
Looking at the tcpdump output there is something strange with the various
reported length fields. Is it possible to get the raw packet dumps?
--
:wq Claudio