Ticket ID: SIXXS #2596313 Ticket Status: Resolved PoP: gblon02 - Goscomb Technologies (London)
T39369 - tunnel down since pop failure incident
Shadow Hawkins on Saturday, 11 September 2010 00:25:57
Tag [/quote] is not closed
T39369 - tunnel down since pop failure incident
Shadow Hawkins on Saturday, 11 September 2010 01:28:47
Additional information
NAT is handled by userland ppp on tun0
uname -a
FreeBSD cerberus.castro.aus.net 7.1-RELEASE FreeBSD 7.1-RELEASE #5: Mon Sep 6 13:48:05 EST 2010 root@cerberus.castro.aus.net:/usr/src/sys/i386/compile/CERBERUS i386
ifconfig -a
pcn0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
ether 00:60:b0:b5:a5:3a
inet6 fe80::260:b0ff:feb5:a53a%pcn0 prefixlen 64 scopeid 0x1
inet 10.0.0.1 netmask 0xffffff00 broadcast 10.0.0.255
inet 192.168.0.1 netmask 0xffffff00 broadcast 192.168.0.255
inet6 2a01:348:245::1 prefixlen 64
media: Ethernet autoselect (100baseTX <full-duplex>)
status: active
rl0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
options=8<VLAN_MTU>
ether 00:18:4d:eb:92:07
inet6 fe80::218:4dff:feeb:9207%rl0 prefixlen 64 scopeid 0x2
media: Ethernet autoselect (100baseTX <full-duplex>)
status: active
plip0: flags=108851<UP,POINTOPOINT,RUNNING,SIMPLEX,MULTICAST,NEEDSGIANT> metric 0 mtu 1500
lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> metric 0 mtu 16384
inet6 ::1 prefixlen 128
inet6 fe80::1%lo0 prefixlen 64 scopeid 0x4
inet 127.0.0.1 netmask 0xff000000
gre0: flags=9011<UP,POINTOPOINT,LINK0,MULTICAST> metric 0 mtu 1476
tunnel inet 203.30.68.103 --> 118.107.51.240
inet6 fe80::260:b0ff:feb5:a53a%gre0 prefixlen 64 scopeid 0x5
inet 10.0.0.2 --> 10.100.0.1 netmask 0xffffff00
tun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> metric 0 mtu 1492
inet 203.30.68.103 --> 203.27.231.26 netmask 0xffffffff
Opened by PID 441
gif0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> metric 0 mtu 1280
tunnel inet 203.30.68.103 --> 77.75.104.126
inet6 fe80::260:b0ff:feb5:a53a%gif0 prefixlen 64 scopeid 0x7
inet6 2a01:348:6:39f::2 --> 2a01:348:6:39f::1 prefixlen 128
firewall rules
00090 divert 1234 tcp from 10.100.0.0/24 to any out via pcn0 setup
00100 allow ip from any to any via lo0
00200 deny ip from any to 127.0.0.0/8
00300 deny ip from 127.0.0.0/8 to any
00400 allow esp from any to any
00500 allow ah from any to any
00600 allow ipencap from any to any
00700 allow udp from any 500 to any
00800 allow ip from any to any dst-port 500
00900 allow ip from 10.100.0.0/24 to any
01000 allow ip from any to 10.100.0.0/24
01100 allow ip4 from 77.75.104.126 to me
01200 allow ip4 from me to 77.75.104.126
01300 deny ip from any to any not ip6 via gif0
01400 allow ip from any to any via lo0
01500 deny ip from any to 127.0.0.0/8
01600 deny ip from 172.16.0.0/12 to any via tun0
01700 deny ip from any to 172.16.0.0/12 via tun0
01800 deny ip from 10.0.0.0/8 to any in via tun0
01900 deny ip from any to 10.0.0.0/8 out via tun0
02000 deny ip from 192.168.0.0/16 to any via tun0
02100 deny ip from any to 192.168.0.0/16 via tun0
02200 fwd 127.0.0.1,25 tcp from 10.0.0.0/24 to any dst-port 25 in
02300 allow ip from any to any via pcn0
02400 allow ip from 10.0.0.0/24 to any
02500 allow ip from 192.168.0.0/24 to any
02600 allow ip from me to any
02700 allow ip from 203.30.68.103 to any
02800 allow ip from 2a01:348:6:39f::2 to any
02900 allow ip from 2a01:348:245::/48 to any
03000 allow ip from 2a01:348:1fa::/48 to any
03100 allow ip6 from :: to ff02::/16 proto ipv6-icmp
03200 allow ip6 from fe80::/10 to fe80::/10 proto ipv6-icmp
03300 allow ip6 from fe80::/10 to ff02::/16 proto ipv6-icmp
03400 allow ip6 from any to any proto ipv6-icmp dst-ip6 me6 in
03500 allow gre from any to any
03600 allow tcp from any 1723 to any
03700 allow tcp from any to any dst-port 1723
03800 allow tcp from 118.107.51.240 to any
03900 allow udp from 118.107.51.240 to any
04000 allow tcp from any to any established
04100 allow tcp from any to any dst-port 22 setup
04200 allow tcp from any to any dst-port 80 setup
04300 allow tcp from any to me dst-port 80 setup
04400 allow tcp from any to me dst-port 81 setup
04500 allow tcp from any to me dst-port 443 setup
04600 allow tcp from any 20 to any dst-port 1023-65535 setup
04700 allow tcp from 118.107.51.240 to any dst-port 8088 setup
04800 allow tcp from any to any dst-port 1022 setup
04900 allow tcp from any to any dst-port 1021 setup
05000 allow tcp from any to any dst-port 1020 setup
05100 allow tcp from any to any dst-port 1019 setup
05200 deny log logamount 200 tcp from any to any in via tun0 setup
05300 allow udp from me to any
05400 allow udp from any to any dst-port 53
05500 allow udp from any 53 to any
05600 allow udp from any to any dst-port 9
05700 allow udp from any to any dst-port 3130
05800 allow udp from any to any dst-port 123
05900 allow udp from any to any dst-port 3478
06000 allow udp from any to any dst-port 4569
06100 allow udp from any to any dst-port 5060-5061
06200 allow udp from any to any dst-port 8000-8012
06300 allow udp from any to any dst-port 16384-16482
06400 allow udp from any to any dst-port 10000-20000
06500 allow icmp from any to any
06600 allow ipv6-icmp from any to any
06700 allow udp from me to any dst-port 33433-65535
06800 allow udp from any 33433-65535 to me
06900 allow udp from any to any dst-port 33434-33499
07000 deny log logamount 200 ip from any to any
65535 deny ip from any to any
T39369 - tunnel down since pop failure incident
Shadow Hawkins on Saturday, 11 September 2010 13:53:57
I am seeing the same symptoms for my tunnel to gblon02
NIC handle: DMB8-SIXXS
Tunnel: T24604
POP Id: gblon02
"aiccu test" fails at Step [6/8] Ping the IPv6 Remote/PoP Inner Tunnel Endpoint (2a01:348:6:2b2::1)
dMb
T39369 - tunnel down since pop failure incident
Shadow Hawkins on Saturday, 11 September 2010 20:22:49
Tunnel T39369 has reconnected; services appear to have been restored.
Many thanks to all those involved.
Maurice
State change: resolved
Jeroen Massar on Monday, 13 September 2010 18:55:03
The state of this ticket has been changed to resolved
Posting is only allowed when you are logged in. |