From owner-freebsd-questions@FreeBSD.ORG Wed Apr 16 09:23:28 2008 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 82738106564A for ; Wed, 16 Apr 2008 09:23:28 +0000 (UTC) (envelope-from romzes@upstar.com.ua) Received: from mail.upstar.com.ua (mail.upstar.com.ua [217.20.174.35]) by mx1.freebsd.org (Postfix) with ESMTP id E3EB48FC15 for ; Wed, 16 Apr 2008 09:23:27 +0000 (UTC) (envelope-from romzes@upstar.com.ua) Received: from romzes.office (romzes.office [10.31.0.42]) (authenticated bits=0) by mail.upstar.com.ua (8.13.8/8.13.8) with ESMTP id m3G93M52012918 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Wed, 16 Apr 2008 12:03:22 +0300 (EEST) (envelope-from romzes@upstar.com.ua) Message-ID: <4805C08A.1060308@upstar.com.ua> Date: Wed, 16 Apr 2008 12:02:02 +0300 From: Roman Otsaljuk User-Agent: Thunderbird 2.0.0.6 (X11/20070924) MIME-Version: 1.0 To: freebsd-questions@freebsd.org X-Enigmail-Version: 0.95.1 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-104.4 required=5.0 tests=ALL_TRUSTED,BAYES_00, USER_IN_WHITELIST autolearn=ham version=3.2.1 X-Spam-Checker-Version: SpamAssassin 3.2.1 (2007-05-02) on mail.upstar.com.ua X-Virus-Scanned: ClamAV 0.92.1/6793/Wed Apr 16 06:57:30 2008 on mail.upstar.com.ua X-Virus-Status: Clean Subject: FreeBSD7 + pf + ipsec X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 16 Apr 2008 09:23:28 -0000 hi all. i have two localnets linked over ipsec: http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/ipsec.html network schema: 192.168.0.0/24 <---> [192.168.0.12=freebsd=2.2.2.2] <--inet--> [1.1.1.1=freebsd1=10.31.0.5] <---->10.31.0.5/26 on both points was 6.2, firewall - pf. after updating to 7.0 vpn doesn't work: 0) pings go normal 0) tcp packets go too, but third packet with R flag: from 192.168.0.12 try: ssh 10.31.0.42, on second console: mail# tcpdump -ni gif0 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on gif0, link-type NULL (BSD loopback), capture size 68 bytes 10:49:43.912469 IP 192.168.0.12.63996 > 10.31.0.42.22: S 1756351354:1756351354(0) win 65535 10:49:43.936245 IP 217.20.174.35 > 195.43.43.238: IP 10.31.0.42.22 > 192.168.0.12.63996: S 4244314344:4244314344(0) ack 1756351355 win 65535 (ipip-proto-4) 10:49:43.936360 IP 192.168.0.12.63996 > 10.31.0.42.22: R 1318200353:1318200353(0) win 0 0) adding the first rule (pass quick all) on both - without changes; 0) downing pf: in localnet, in wich pf downed - all good. any ideas? p.s. the same if IPsec replaced by vpnd-------- sorry my bad English