Problem with FreeBSD 4.10 and AICCU
Shadow Hawkins on Tuesday, 05 April 2005 22:31:47
Hi, I have AICCU installed from the ports. Well I have filled in the missed informations (username/password) in the aiccu.conf.
AICCU seems to work, but I can't ping any IPv6 address.
I'm using the IPFW, here's my config:
#!/bin/sh
# Also die Regeln auf "Null" stellen
/sbin/ipfw -q -f flush
# IPFW-Kommando "Quiet"
fwcmd="/sbin/ipfw -q add"
# Das setzen unserer eigenen Variabeln
int_interface="rl1" # ${int_interface} Internes Interface
natd_interface="tun0" # ${natd_interface} Externes Interface
dns_server1="217.237.150.33" # ${dns_server1} 1. DNS-Server des ISP
dns_server2="217.237.151.161" # ${dns_server2} 2. DNS-Server des ISP
#open_tcpports="21,22,25,80,443,465,993,49152-65535" # ${open_tcpports} Offene Ports
#open_udpports="7777,7778,7787,28902" # ${open_udpports} Offene Ports
int_open_tcpports="22,80" # Offene Ports für das interne Interface
# Erlaubt Loopbackverbindungen
${fwcmd} 00100 allow ip from any to any via lo0
# Hiermit dürfen alle ins Internet
${fwcmd} 00150 divert natd all from any to any via ${natd_interface}
# Stateful Packet Inspection
${fwcmd} 00200 check-state
# Erlaubt internen Verkehr
${fwcmd} 00210 allow tcp from any to me ${int_open_tcpports} via ${int_interface} setup keep-state
${fwcmd} 00215 deny log all from any to me via ${int_interface}
${fwcmd} 00217 allow ip from any to any via ${int_interface} keep-state
# Anti-Spoofing
${fwcmd} 00220 deny log ip from 10.0.0.0/8 to any in via ${natd_interface}
${fwcmd} 00230 deny log ip from 172.16.0.0/12 to any in via ${natd_interface}
${fwcmd} 00240 deny log ip from 192.168.0.0/16 to any in via ${natd_interface}
# Fragmentiert Packete werden verworfen
${fwcmd} 00250 deny all from any to any frag in via ${natd_interface}
# Ack Packete ohne vorheriges Req werden geblockt
${fwcmd} 00260 deny tcp from any to any established in via ${natd_interface}
# Erlaubt alle Verbindungen welche von hier initiiert wurden
${fwcmd} 00300 allow tcp from any to any out via ${natd_interface} setup keep-state
${fwcmd} 00310 allow udp from any to any out via ${natd_interface} keep-state
# Wenn die Verbindung einmal hergestellt wurde, erlaube dieser offen zu stehen
${fwcmd} 00320 allow tcp from any to any via ${natd_interface} established
${fwcmd} 00330 allow udp from any to any via ${natd_interface} established
# Erlaubte Dienste die ausm Internet erreicht werden dürfen
#${fwcmd} 00400 allow tcp from any to any ${open_tcpports} setup keep-state
#${fwcmd} 00410 allow udp from any to any ${open_udpports} keep-state
# This sends a RESET to all ident packets.
${fwcmd} 00500 reset log tcp from any to me 113 in via ${natd_interface}
# Erlaubt ausgehende DNS queries NUR auf angegebenem DNS-Server
${fwcmd} 00600 allow udp from any to ${dns_server1} 53 out via ${natd_interface} keep-state
${fwcmd} 00610 allow tcp from any to ${dns_server1} 53 out via ${natd_interface} setup keep-state
${fwcmd} 00620 allow udp from any to ${dns_server2} 53 out via ${natd_interface} keep-state
${fwcmd} 00630 allow tcp from any to ${dns_server2} 53 out via ${natd_interface} setup keep-state
# Loggt ICMP Anfragen (echo und dest. unreachable) == script kiddies
${fwcmd} 00700 allow log icmp from any to any in recv ${natd_interface} icmptype 3
${fwcmd} 00710 allow log icmp from any to any in recv ${natd_interface} icmptype 8
# ICMP erlauben
${fwcmd} 00750 allow icmp from any to any
${fwcmd} 00800 allow 41 from me to 212.224.0.188 out keep-state
${fwcmd} 00810 allow 41 from 212.224.0.188 to me in keep-state
# Alles andere verbieten (Wird nicht geloggt)
${fwcmd} deny ip from any to any
# END -----------------------------
Here's the autotest log from AICCU:
sock_getline() : "200 SixXS TIC Service on noc.sixxs.net ready (http://www.sixxs.net)"
sock_printf() : "client TIC/draft-00 AICCU/2005.01.31-console-freebsd4 FreeBSD/4.10-RELEASE-p5"
sock_getline() : "200 Client Identity accepted"
sock_printf() : "get unixtime"
sock_getline() : "200 1112731209"
sock_printf() : "username XXXXXXX"
sock_getline() : "200 Choose your authentication challenge please"
sock_printf() : "challenge md5"
sock_getline() : "200 XXXXXXX"
sock_printf() : "authenticate md5 XXXXXXXXX"
sock_getline() : "200 Succesfully logged in using md5 as XXXXXXX from 84.178.52.220"
sock_printf() : "tunnel show T6809"
sock_getline() : "201 Showing tunnel information for T6809"
sock_getline() : "TunnelId: T6809"
sock_getline() : "Type: 6in4-heartbeat"
sock_getline() : "IPv6 Endpoint: 2001:6f8:900:4d1::2"
sock_getline() : "IPv6 POP: 2001:6f8:900:4d1::1"
sock_getline() : "IPv6 PrefixLength: 64"
sock_getline() : "Tunnel MTU: 1280"
sock_getline() : "POP Id: deham01"
sock_getline() : "IPv4 Endpoint: heartbeat"
sock_getline() : "IPv4 POP: 212.224.0.188"
sock_getline() : "UserState: enabled"
sock_getline() : "AdminState: enabled"
sock_getline() : "Password: XXXXXXXXX"
sock_getline() : "Heartbeat_Interval: 60"
sock_getline() : "202 Done"
Succesfully retrieved tunnel information for T6809
sock_printf() : "QUIT Better Off Dead"
Tunnel Information for T6809:
POP Id : deham01
IPv6 Local : 2001:6f8:900:4d1::2/64
IPv6 Remote : 2001:6f8:900:4d1::1/64
Tunnel Type : 6in4-heartbeat
Adminstate : enabled
Userstate : enabled
heartbeat_socket() - IPv4 : 84.178.52.220
#######
####### AICCU Quick Connectivity Test
#######
####### [1/8] Ping the IPv4 Local/Your Outer Endpoint (84.178.52.220)
### This should return so called 'echo replies'
### If it doesn't then check your firewall settings
### Your local endpoint should always be pingable
### It could also indicate problems with your IPv4 stack
PING 84.178.52.220 (84.178.52.220): 56 data bytes
64 bytes from 84.178.52.220: icmp_seq=0 ttl=64 time=0.551 ms
64 bytes from 84.178.52.220: icmp_seq=1 ttl=64 time=0.585 ms
64 bytes from 84.178.52.220: icmp_seq=2 ttl=64 time=3.915 ms
--- 84.178.52.220 ping statistics ---
3 packets transmitted, 3 packets received, 0% packet loss
round-trip min/avg/max/stddev = 0.551/1.684/3.915/1.578 ms
######
####### [2/8] Ping the IPv4 Remote/POP Outer Endpoint (212.224.0.188)
### These pings should reach the POP and come back to you
### In case there are problems along the route between your
### host and the POP this could not return replies
### Check your firewall settings if problems occur
PING 212.224.0.188 (212.224.0.188): 56 data bytes
64 bytes from 212.224.0.188: icmp_seq=0 ttl=58 time=52.861 ms
64 bytes from 212.224.0.188: icmp_seq=1 ttl=58 time=53.731 ms
64 bytes from 212.224.0.188: icmp_seq=2 ttl=58 time=56.489 ms
--- 212.224.0.188 ping statistics ---
3 packets transmitted, 3 packets received, 0% packet loss
round-trip min/avg/max/stddev = 52.861/54.360/56.489/1.547 ms
######
####### [3/8] Traceroute to the POP (212.224.0.188) over IPv4
### This traceroute should reach the POP
### In case this traceroute fails then you have no connectivity
### to the POP and this is most probably the problem
traceroute to 212.224.0.188 (212.224.0.188), 64 hops max, 44 byte packets
1 217.0.116.28 (217.0.116.28) 43.610 ms 42.909 ms 42.512 ms
2 217.0.66.18 (217.0.66.18) 41.199 ms 41.582 ms 41.888 ms
3 f-eb5.F.DE.net.DTAG.DE (62.154.17.62) 42.840 ms 42.677 ms 42.084 ms
4 62.156.139.226 (62.156.139.226) 43.010 ms 40.877 ms 51.580 ms
5 ge1-1-0-0.br0.ixfra.de.easynet.net (194.64.253.113) 41.012 ms 41.274 ms 42.490 ms
6 so0-2-0-0.br1.isham.de.easynet.net (194.64.4.146) 50.720 ms 50.963 ms 49.995 ms
7 vl40.as0-r0.isham.de.easynet.net (212.224.4.225) 50.028 ms 49.853 ms 50.900 ms
8 deham01.sixxs.net (212.224.0.188) 50.291 ms 49.947 ms 50.416 ms
######
###### [4/8] Checking if we can ping IPv6 localhost (::1)
### This confirms if your IPv6 is working
### If ::1 doesn't reply then something is wrong with your IPv6 stack
PING6(56=40+8+8 bytes) ::1 --> ::1
16 bytes from ::1: Echo Request
16 bytes from ::1, icmp_seq=0 hlim=64 dst=::1%5 time=0.292 ms
16 bytes from ::1: Echo Request
16 bytes from ::1, icmp_seq=1 hlim=64 dst=::1%5 time=0.277 ms
16 bytes from ::1: Echo Request
16 bytes from ::1, icmp_seq=2 hlim=64 dst=::1%5 time=0.276 ms
--- ::1 ping6 statistics ---
3 packets transmitted, 3 packets received, 0% packet loss
round-trip min/avg/max/std-dev = 0.276/0.282/0.292/0.007 ms
######
###### [5/8] Ping the IPv6 Local/Your Inner Tunnel Endpoint (2001:6f8:900:4d1::2)
### This confirms that your tunnel is configured
### If it doesn't reply then check your interface and routing tables
PING6(56=40+8+8 bytes) 2001:6f8:900:4d1::2 --> 2001:6f8:900:4d1::2
16 bytes from 2001:6f8:900:4d1::2: Echo Request
16 bytes from 2001:6f8:900:4d1::2, icmp_seq=0 hlim=64 dst=2001:6f8:900:4d1::2%5 time=0.292 ms
16 bytes from 2001:6f8:900:4d1::2: Echo Request
16 bytes from 2001:6f8:900:4d1::2, icmp_seq=1 hlim=64 dst=2001:6f8:900:4d1::2%5 time=0.298 ms
16 bytes from 2001:6f8:900:4d1::2: Echo Request
16 bytes from 2001:6f8:900:4d1::2, icmp_seq=2 hlim=64 dst=2001:6f8:900:4d1::2%5 time=0.284 ms
--- 2001:6f8:900:4d1::2 ping6 statistics ---
3 packets transmitted, 3 packets received, 0% packet loss
round-trip min/avg/max/std-dev = 0.284/0.291/0.298/0.006 ms
######
###### [6/8] Ping the IPv6 Remote/POP Inner Tunnel Endpoint (2001:6f8:900:4d1::1)
### This confirms the reachability of the other side of the tunnel
### If it doesn't reply then check your interface and routing tables
### Don't forget to check your firewall of course
### If the previous test was succesful then this could be both
### a firewalling and a routing/interface problem
PING6(56=40+8+8 bytes) 2001:6f8:900:4d1::2 --> 2001:6f8:900:4d1::1
--- 2001:6f8:900:4d1::1 ping6 statistics ---
3 packets transmitted, 0 packets received, 100% packet loss
######
###### [7/8] Traceroute6 to the central SixXS machine (noc.sixxs.net)
### This confirms that you can reach the central machine of SixXS
### If that one is reachable you should be able to reach most IPv6 destinations
### Also check http://www.sixxs.net/ipv6calc/ which should show an IPv6 connection
### If your browser supports IPv6 and uses it of course.
traceroute6 to noc.sixxs.net (2001:838:1:1:210:dcff:fe20:7c7c) from 2001:6f8:900:4d1::2, 30 hops max, 12 byte packets
1 * * *
2 * * *
3 * * *
4 * * *
5 * * *
6 * * *
7 * * *
8 * * *
9 * * *
10 * * *
11 * * *
12 * * *
13 * * *
14 * * *
15 * * *
16 * * *
17 * * *
18 * * *
19 * * *
20 * * *
21 * * *
22 * * *
23 * * *
24 * * *
25 * * *
26 * * *
27 * * *
28 * * *
29 * * *
30 * * *
######
###### [8/8] Traceroute6 to (www.kame.net)
### This confirms that you can reach a Japanese IPv6 destination
### If that one is reachable you should be able to reach most IPv6 destinations
### You should also check http://www.kame.net which should display
### a animated kame (turtle), of course only when your browser supports and uses IPv6
traceroute6 to www.kame.net (2001:200:0:8002:203:47ff:fea5:3085) from 2001:6f8:900:4d1::2, 30 hops max, 12 byte packets
1 * * *
2 * * *
3 * * *
4 * * *
5 * * *
6 * * *
7 * * *
8 * * *
9 * * *
10 * * *
11 * * *
12 * * *
13 * * *
14 * * *
15 * * *
16 * * *
17 * * *
18 * * *
19 * * *
20 * * *
21 * * *
22 * * *
23 * * *
24 * * *
25 * * *
26 * * *
27 * * *
28 * * *
29 * * *
30 * * *
######
###### ACCU Quick Connectivity Test (done)
The relevant interfaces via ifconfig:
tun0: flags=8151<UP,POINTOPOINT,RUNNING,PROMISC,MULTICAST> mtu 1492
inet 84.178.52.220 --> 217.0.116.28 netmask 0xffffffff
Opened by PID 278
gif0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1280
tunnel inet 84.178.52.220 --> 212.224.0.188
inet6 fe80::230:84ff:fe0c:53a5%gif0 prefixlen 64 scopeid 0x9
inet6 2001:6f8:900:4d1::2 prefixlen 128
Does anybody know what's wrong?!
Thanks, Miguel
Problem with FreeBSD 4.10 and AICCU
Shadow Hawkins on Wednesday, 06 April 2005 15:02:59
Hmm, wrote a lenghty reply but got logged out :(
Send this problem to the staff and point them at the file common/aiccu_freebsd4.c
This part
46 aiccu_exec(
47 "ifconfig %s inet6 %s prefixlen 128 alias",
48 g_aiccu->ipv6_interface,
49 hTunnel->sIPv6_Local);
50
should probably be
aiccu_exec(
"ifconfig %s inet6 %s %s prefixlen 128 alias",
g_aiccu->ipv6_interface,
hTunnel->sIPv6_Local,
hTunnel->sIPv6_POP);
Problem with FreeBSD 4.10 and AICCU
Jeroen Massar on Wednesday, 06 April 2005 15:23:58
Which is not needed as the remote hop gets configured a couple of lines lower...
Problem with FreeBSD 4.10 and AICCU
Shadow Hawkins on Wednesday, 06 April 2005 16:03:47
Oh ok, but isnt
gif0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1280
tunnel inet 84.178.52.220 --> 212.224.0.188
inet6 fe80::230:84ff:fe0c:53a5%gif0 prefixlen 64 scopeid 0x9
inet6 2001:6f8:900:4d1::2 prefixlen 128
supposed to be
gif0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1280
tunnel inet 84.178.52.220 --> 212.224.0.188
inet6 fe80::230:84ff:fe0c:53a5%gif0 prefixlen 64 scopeid 0x9
inet6 2001:6f8:900:4d1::2 --> 2001:6f8:900:4d1::1 prefixlen 128
?
Problem with FreeBSD 4.10 and AICCU
Jeroen Massar on Wednesday, 06 April 2005 16:09:39
It can also be done that way, but it is't done that way...
Problem with FreeBSD 4.10 and AICCU
Shadow Hawkins on Wednesday, 06 April 2005 16:46:29
You mean
51 aiccu_exec(
52 "route add -inet6 %s -prefixlen 128 %s",
53 hTunnel->sIPv6_POP,
54 hTunnel->sIPv6_Local);
55
That caused a routing loop in NetBSD without the previous change :{
Just out of curiousity: Why did you choose not the specify the ipv6 tunnel endpoint when you're initialising the tunnel?
Problem with FreeBSD 4.10 and AICCU
Jeroen Massar on Wednesday, 06 April 2005 15:25:45
As you didn't actually dump the firewall list I can't easily tell, but let me guess IPv4 UDP port 3740 is blocked?
Read: Heartbeat
Problem with FreeBSD 4.10 and AICCU
Shadow Hawkins on Wednesday, 06 April 2005 18:00:18
I'm so stupid, Jeroen.
That was the problem. Now it's working perfectly. Many thanks :)
Miguel
Posting is only allowed when you are logged in. |