Hello,

I have a vpn from a Windows machine to a network behind an OpenBSD router. It 
was working fine until I upgraded the router to 6.9 (amd64).
The VPN is still coming up fine, but the traffic is blocked somehow. Using 
tcpdump on the interface protected by the router (vlan0 in my case), I see the 
ping requests from the remote vpn address, and the ping replies, but on enc0 I 
only see the requests. I confirmed that pf is not blocking packets.

My setup :

Remote Windows machine : fixed IP address 192.168.1.109

OpenBSD router :
bge0 192.168.8.2
vlan0 192.168.9.2
also arp -s 192.168.9.208 12:34:56:ab:cd:ef permanent pub

iked.conf :
set nomobike
ikev2 "windows" passive esp \
        from 192.168.8.2 to 192.168.1.109 \
        from 192.168.9.0/24 to 192.168.9.208 \
        local 192.168.8.2 peer 192.168.1.109 \
        srcid 192.168.8.2 \
        rsa \
        config address 192.168.9.208 \
        config netmask 255.255.255.0 \
        config name-server 192.168.1.222 \
        config netbios-server 192.168.1.222

netstat -rn -inet (removing unrelated interfaces) :
Name    Mtu   Network     Address              Ipkts Ierrs    Opkts Oerrs Colls 
Time
lo0     32768 <Link>                               0     0        0     0     0 
   0
lo0     32768 ::1/128     ::1                      0     0        0     0     0 
   0
lo0     32768 fe80::%lo0/ fe80::1%lo0              0     0        0     0     0 
   0
lo0     32768 127/8       127.0.0.1                0     0        0     0     0 
   0
bge0    1500  <Link>      12:34:56:ab:cd:ef 167154089     0 36267061     0     
0    0
bge0    1500  192.168.8/2 192.168.8.2       167154089     0 36267061     0     
0    0
enc0*   0     <Link>                             140     0        0     0     0 
   0
vlan0   1500  <Link>      12:34:56:ab:cd:ef 126698124     0      360     0     
0    0
vlan0   1500  192.168.9/2 192.168.9.2       126698124     0      360     0     
0    0
pflog0  33136 <Link>                               0     0  1642609     0     0 
   0

Log extract :
May 27 08:10:20 mymachine iked[14895]: spi=0x41f8d1c369853156: recv IKE_SA_INIT 
req 0 peer 192.168.1.109:500 local 192.168.8.2:500, 528 bytes, policy 'windows'
May 27 08:10:20 mymachine iked[14895]: spi=0x41f8d1c369853156: send IKE_SA_INIT 
res 0 peer 192.168.1.109:500 local 192.168.8.2:500, 278 bytes
May 27 08:10:20 mymachine iked[14895]: spi=0x41f8d1c369853156: recv IKE_AUTH 
req 1 peer 192.168.1.109:500 local 192.168.8.2:500, 7440 bytes, policy 'windows'
May 27 08:10:20 mymachine iked[14895]: spi=0x41f8d1c369853156: send IKE_AUTH 
res 1 peer 192.168.1.109:500 local 192.168.8.2:500, 1600 bytes
May 27 08:10:20 mymachine iked[14895]: spi=0x41f8d1c369853156: 
ikev2_childsa_enable: loaded SPIs: 0x6487e520, 0x36d4127b (enc aes-256 auth 
hmac-sha1)
May 27 08:10:20 mymachine iked[14895]: spi=0x41f8d1c369853156: established peer 
192.168.1.109:500[ASN1_DN//C=CA/ST=Quebec/L=Somewhere/O=Org/OU=Department/CN=192.168.1.109/emailAddress=xyz@domain.local]
 local 192.168.8.2:500[IPV4/192.168.8.2] policy 'windows' as responder (enc 
aes-256 auth hmac-sha2-256 group modp1024 prf hmac-sha2-256)

doas tcpdump -nni enc0
tcpdump: listening on enc0, link-type ENC
08:48:05.289341 (authentic,confidential): SPI 0x11aad700: 192.168.9.208 > 
192.168.9.101: icmp: echo request (encap)
08:48:09.914843 (authentic,confidential): SPI 0x11aad700: 192.168.9.208 > 
192.168.9.101: icmp: echo request (encap)
08:48:14.914988 (authentic,confidential): SPI 0x11aad700: 192.168.9.208 > 
192.168.9.101: icmp: echo request (encap)
08:48:19.915348 (authentic,confidential): SPI 0x11aad700: 192.168.9.208 > 
192.168.9.101: icmp: echo request (encap)
^C
4 packets received by filter
0 packets dropped by kernel

tcpdump -nni vlan0 host 192.168.9.208
tcpdump: listening on vlan0, link-type EN10MB
09:12:21.467671 192.168.9.208 > 192.168.9.101: icmp: echo request
09:12:21.468371 arp who-has 192.168.9.208 tell 192.168.9.101
09:12:21.468386 arp reply 192.168.9.208 is-at ec:eb:b8:5d:94:a0
09:12:21.468937 192.168.9.101 > 192.168.9.208: icmp: echo reply
09:12:21.468961 192.168.9.101 > 192.168.9.208: icmp: echo reply
09:12:26.410587 192.168.9.208 > 192.168.9.101: icmp: echo request
09:12:26.411144 192.168.9.101 > 192.168.9.208: icmp: echo reply
09:12:26.411168 192.168.9.101 > 192.168.9.208: icmp: echo reply
09:12:31.414257 192.168.9.208 > 192.168.9.101: icmp: echo request
09:12:31.415117 192.168.9.101 > 192.168.9.208: icmp: echo reply
09:12:31.415141 192.168.9.101 > 192.168.9.208: icmp: echo reply
09:12:36.409094 192.168.9.208 > 192.168.9.101: icmp: echo request
09:12:36.409680 192.168.9.101 > 192.168.9.208: icmp: echo reply
09:12:36.409705 192.168.9.101 > 192.168.9.208: icmp: echo reply
^C
3134 packets received by filter
0 packets dropped by kernel

Thanks!

Sebastien Leclerc

Reply via email to