SixXS::Sunset 2017-06-06

Problem with FreeBSD 4.10 and AICCU
[de] Shadow Hawkins on Tuesday, 05 April 2005 22:31:47
Hi, I have AICCU installed from the ports. Well I have filled in the missed informations (username/password) in the aiccu.conf. AICCU seems to work, but I can't ping any IPv6 address. I'm using the IPFW, here's my config: #!/bin/sh # Also die Regeln auf "Null" stellen /sbin/ipfw -q -f flush # IPFW-Kommando "Quiet" fwcmd="/sbin/ipfw -q add" # Das setzen unserer eigenen Variabeln int_interface="rl1" # ${int_interface} Internes Interface natd_interface="tun0" # ${natd_interface} Externes Interface dns_server1="217.237.150.33" # ${dns_server1} 1. DNS-Server des ISP dns_server2="217.237.151.161" # ${dns_server2} 2. DNS-Server des ISP #open_tcpports="21,22,25,80,443,465,993,49152-65535" # ${open_tcpports} Offene Ports #open_udpports="7777,7778,7787,28902" # ${open_udpports} Offene Ports int_open_tcpports="22,80" # Offene Ports für das interne Interface # Erlaubt Loopbackverbindungen ${fwcmd} 00100 allow ip from any to any via lo0 # Hiermit dürfen alle ins Internet ${fwcmd} 00150 divert natd all from any to any via ${natd_interface} # Stateful Packet Inspection ${fwcmd} 00200 check-state # Erlaubt internen Verkehr ${fwcmd} 00210 allow tcp from any to me ${int_open_tcpports} via ${int_interface} setup keep-state ${fwcmd} 00215 deny log all from any to me via ${int_interface} ${fwcmd} 00217 allow ip from any to any via ${int_interface} keep-state # Anti-Spoofing ${fwcmd} 00220 deny log ip from 10.0.0.0/8 to any in via ${natd_interface} ${fwcmd} 00230 deny log ip from 172.16.0.0/12 to any in via ${natd_interface} ${fwcmd} 00240 deny log ip from 192.168.0.0/16 to any in via ${natd_interface} # Fragmentiert Packete werden verworfen ${fwcmd} 00250 deny all from any to any frag in via ${natd_interface} # Ack Packete ohne vorheriges Req werden geblockt ${fwcmd} 00260 deny tcp from any to any established in via ${natd_interface} # Erlaubt alle Verbindungen welche von hier initiiert wurden ${fwcmd} 00300 allow tcp from any to any out via ${natd_interface} setup keep-state ${fwcmd} 00310 allow udp from any to any out via ${natd_interface} keep-state # Wenn die Verbindung einmal hergestellt wurde, erlaube dieser offen zu stehen ${fwcmd} 00320 allow tcp from any to any via ${natd_interface} established ${fwcmd} 00330 allow udp from any to any via ${natd_interface} established # Erlaubte Dienste die ausm Internet erreicht werden dürfen #${fwcmd} 00400 allow tcp from any to any ${open_tcpports} setup keep-state #${fwcmd} 00410 allow udp from any to any ${open_udpports} keep-state # This sends a RESET to all ident packets. ${fwcmd} 00500 reset log tcp from any to me 113 in via ${natd_interface} # Erlaubt ausgehende DNS queries NUR auf angegebenem DNS-Server ${fwcmd} 00600 allow udp from any to ${dns_server1} 53 out via ${natd_interface} keep-state ${fwcmd} 00610 allow tcp from any to ${dns_server1} 53 out via ${natd_interface} setup keep-state ${fwcmd} 00620 allow udp from any to ${dns_server2} 53 out via ${natd_interface} keep-state ${fwcmd} 00630 allow tcp from any to ${dns_server2} 53 out via ${natd_interface} setup keep-state # Loggt ICMP Anfragen (echo und dest. unreachable) == script kiddies ${fwcmd} 00700 allow log icmp from any to any in recv ${natd_interface} icmptype 3 ${fwcmd} 00710 allow log icmp from any to any in recv ${natd_interface} icmptype 8 # ICMP erlauben ${fwcmd} 00750 allow icmp from any to any ${fwcmd} 00800 allow 41 from me to 212.224.0.188 out keep-state ${fwcmd} 00810 allow 41 from 212.224.0.188 to me in keep-state # Alles andere verbieten (Wird nicht geloggt) ${fwcmd} deny ip from any to any # END ----------------------------- Here's the autotest log from AICCU: sock_getline() : "200 SixXS TIC Service on noc.sixxs.net ready (http://www.sixxs.net)" sock_printf() : "client TIC/draft-00 AICCU/2005.01.31-console-freebsd4 FreeBSD/4.10-RELEASE-p5" sock_getline() : "200 Client Identity accepted" sock_printf() : "get unixtime" sock_getline() : "200 1112731209" sock_printf() : "username XXXXXXX" sock_getline() : "200 Choose your authentication challenge please" sock_printf() : "challenge md5" sock_getline() : "200 XXXXXXX" sock_printf() : "authenticate md5 XXXXXXXXX" sock_getline() : "200 Succesfully logged in using md5 as XXXXXXX from 84.178.52.220" sock_printf() : "tunnel show T6809" sock_getline() : "201 Showing tunnel information for T6809" sock_getline() : "TunnelId: T6809" sock_getline() : "Type: 6in4-heartbeat" sock_getline() : "IPv6 Endpoint: 2001:6f8:900:4d1::2" sock_getline() : "IPv6 POP: 2001:6f8:900:4d1::1" sock_getline() : "IPv6 PrefixLength: 64" sock_getline() : "Tunnel MTU: 1280" sock_getline() : "POP Id: deham01" sock_getline() : "IPv4 Endpoint: heartbeat" sock_getline() : "IPv4 POP: 212.224.0.188" sock_getline() : "UserState: enabled" sock_getline() : "AdminState: enabled" sock_getline() : "Password: XXXXXXXXX" sock_getline() : "Heartbeat_Interval: 60" sock_getline() : "202 Done" Succesfully retrieved tunnel information for T6809 sock_printf() : "QUIT Better Off Dead" Tunnel Information for T6809: POP Id : deham01 IPv6 Local : 2001:6f8:900:4d1::2/64 IPv6 Remote : 2001:6f8:900:4d1::1/64 Tunnel Type : 6in4-heartbeat Adminstate : enabled Userstate : enabled heartbeat_socket() - IPv4 : 84.178.52.220 ####### ####### AICCU Quick Connectivity Test ####### ####### [1/8] Ping the IPv4 Local/Your Outer Endpoint (84.178.52.220) ### This should return so called 'echo replies' ### If it doesn't then check your firewall settings ### Your local endpoint should always be pingable ### It could also indicate problems with your IPv4 stack PING 84.178.52.220 (84.178.52.220): 56 data bytes 64 bytes from 84.178.52.220: icmp_seq=0 ttl=64 time=0.551 ms 64 bytes from 84.178.52.220: icmp_seq=1 ttl=64 time=0.585 ms 64 bytes from 84.178.52.220: icmp_seq=2 ttl=64 time=3.915 ms --- 84.178.52.220 ping statistics --- 3 packets transmitted, 3 packets received, 0% packet loss round-trip min/avg/max/stddev = 0.551/1.684/3.915/1.578 ms ###### ####### [2/8] Ping the IPv4 Remote/POP Outer Endpoint (212.224.0.188) ### These pings should reach the POP and come back to you ### In case there are problems along the route between your ### host and the POP this could not return replies ### Check your firewall settings if problems occur PING 212.224.0.188 (212.224.0.188): 56 data bytes 64 bytes from 212.224.0.188: icmp_seq=0 ttl=58 time=52.861 ms 64 bytes from 212.224.0.188: icmp_seq=1 ttl=58 time=53.731 ms 64 bytes from 212.224.0.188: icmp_seq=2 ttl=58 time=56.489 ms --- 212.224.0.188 ping statistics --- 3 packets transmitted, 3 packets received, 0% packet loss round-trip min/avg/max/stddev = 52.861/54.360/56.489/1.547 ms ###### ####### [3/8] Traceroute to the POP (212.224.0.188) over IPv4 ### This traceroute should reach the POP ### In case this traceroute fails then you have no connectivity ### to the POP and this is most probably the problem traceroute to 212.224.0.188 (212.224.0.188), 64 hops max, 44 byte packets 1 217.0.116.28 (217.0.116.28) 43.610 ms 42.909 ms 42.512 ms 2 217.0.66.18 (217.0.66.18) 41.199 ms 41.582 ms 41.888 ms 3 f-eb5.F.DE.net.DTAG.DE (62.154.17.62) 42.840 ms 42.677 ms 42.084 ms 4 62.156.139.226 (62.156.139.226) 43.010 ms 40.877 ms 51.580 ms 5 ge1-1-0-0.br0.ixfra.de.easynet.net (194.64.253.113) 41.012 ms 41.274 ms 42.490 ms 6 so0-2-0-0.br1.isham.de.easynet.net (194.64.4.146) 50.720 ms 50.963 ms 49.995 ms 7 vl40.as0-r0.isham.de.easynet.net (212.224.4.225) 50.028 ms 49.853 ms 50.900 ms 8 deham01.sixxs.net (212.224.0.188) 50.291 ms 49.947 ms 50.416 ms ###### ###### [4/8] Checking if we can ping IPv6 localhost (::1) ### This confirms if your IPv6 is working ### If ::1 doesn't reply then something is wrong with your IPv6 stack PING6(56=40+8+8 bytes) ::1 --> ::1 16 bytes from ::1: Echo Request 16 bytes from ::1, icmp_seq=0 hlim=64 dst=::1%5 time=0.292 ms 16 bytes from ::1: Echo Request 16 bytes from ::1, icmp_seq=1 hlim=64 dst=::1%5 time=0.277 ms 16 bytes from ::1: Echo Request 16 bytes from ::1, icmp_seq=2 hlim=64 dst=::1%5 time=0.276 ms --- ::1 ping6 statistics --- 3 packets transmitted, 3 packets received, 0% packet loss round-trip min/avg/max/std-dev = 0.276/0.282/0.292/0.007 ms ###### ###### [5/8] Ping the IPv6 Local/Your Inner Tunnel Endpoint (2001:6f8:900:4d1::2) ### This confirms that your tunnel is configured ### If it doesn't reply then check your interface and routing tables PING6(56=40+8+8 bytes) 2001:6f8:900:4d1::2 --> 2001:6f8:900:4d1::2 16 bytes from 2001:6f8:900:4d1::2: Echo Request 16 bytes from 2001:6f8:900:4d1::2, icmp_seq=0 hlim=64 dst=2001:6f8:900:4d1::2%5 time=0.292 ms 16 bytes from 2001:6f8:900:4d1::2: Echo Request 16 bytes from 2001:6f8:900:4d1::2, icmp_seq=1 hlim=64 dst=2001:6f8:900:4d1::2%5 time=0.298 ms 16 bytes from 2001:6f8:900:4d1::2: Echo Request 16 bytes from 2001:6f8:900:4d1::2, icmp_seq=2 hlim=64 dst=2001:6f8:900:4d1::2%5 time=0.284 ms --- 2001:6f8:900:4d1::2 ping6 statistics --- 3 packets transmitted, 3 packets received, 0% packet loss round-trip min/avg/max/std-dev = 0.284/0.291/0.298/0.006 ms ###### ###### [6/8] Ping the IPv6 Remote/POP Inner Tunnel Endpoint (2001:6f8:900:4d1::1) ### This confirms the reachability of the other side of the tunnel ### If it doesn't reply then check your interface and routing tables ### Don't forget to check your firewall of course ### If the previous test was succesful then this could be both ### a firewalling and a routing/interface problem PING6(56=40+8+8 bytes) 2001:6f8:900:4d1::2 --> 2001:6f8:900:4d1::1 --- 2001:6f8:900:4d1::1 ping6 statistics --- 3 packets transmitted, 0 packets received, 100% packet loss ###### ###### [7/8] Traceroute6 to the central SixXS machine (noc.sixxs.net) ### This confirms that you can reach the central machine of SixXS ### If that one is reachable you should be able to reach most IPv6 destinations ### Also check http://www.sixxs.net/ipv6calc/ which should show an IPv6 connection ### If your browser supports IPv6 and uses it of course. traceroute6 to noc.sixxs.net (2001:838:1:1:210:dcff:fe20:7c7c) from 2001:6f8:900:4d1::2, 30 hops max, 12 byte packets 1 * * * 2 * * * 3 * * * 4 * * * 5 * * * 6 * * * 7 * * * 8 * * * 9 * * * 10 * * * 11 * * * 12 * * * 13 * * * 14 * * * 15 * * * 16 * * * 17 * * * 18 * * * 19 * * * 20 * * * 21 * * * 22 * * * 23 * * * 24 * * * 25 * * * 26 * * * 27 * * * 28 * * * 29 * * * 30 * * * ###### ###### [8/8] Traceroute6 to (www.kame.net) ### This confirms that you can reach a Japanese IPv6 destination ### If that one is reachable you should be able to reach most IPv6 destinations ### You should also check http://www.kame.net which should display ### a animated kame (turtle), of course only when your browser supports and uses IPv6 traceroute6 to www.kame.net (2001:200:0:8002:203:47ff:fea5:3085) from 2001:6f8:900:4d1::2, 30 hops max, 12 byte packets 1 * * * 2 * * * 3 * * * 4 * * * 5 * * * 6 * * * 7 * * * 8 * * * 9 * * * 10 * * * 11 * * * 12 * * * 13 * * * 14 * * * 15 * * * 16 * * * 17 * * * 18 * * * 19 * * * 20 * * * 21 * * * 22 * * * 23 * * * 24 * * * 25 * * * 26 * * * 27 * * * 28 * * * 29 * * * 30 * * * ###### ###### ACCU Quick Connectivity Test (done) The relevant interfaces via ifconfig: tun0: flags=8151<UP,POINTOPOINT,RUNNING,PROMISC,MULTICAST> mtu 1492 inet 84.178.52.220 --> 217.0.116.28 netmask 0xffffffff Opened by PID 278 gif0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1280 tunnel inet 84.178.52.220 --> 212.224.0.188 inet6 fe80::230:84ff:fe0c:53a5%gif0 prefixlen 64 scopeid 0x9 inet6 2001:6f8:900:4d1::2 prefixlen 128 Does anybody know what's wrong?! Thanks, Miguel
Problem with FreeBSD 4.10 and AICCU
[nl] Shadow Hawkins on Wednesday, 06 April 2005 15:02:59
Hmm, wrote a lenghty reply but got logged out :( Send this problem to the staff and point them at the file common/aiccu_freebsd4.c This part
46 aiccu_exec( 47 "ifconfig %s inet6 %s prefixlen 128 alias", 48 g_aiccu->ipv6_interface, 49 hTunnel->sIPv6_Local); 50
should probably be
aiccu_exec( "ifconfig %s inet6 %s %s prefixlen 128 alias", g_aiccu->ipv6_interface, hTunnel->sIPv6_Local, hTunnel->sIPv6_POP);
Problem with FreeBSD 4.10 and AICCU
[ch] Jeroen Massar SixXS Staff on Wednesday, 06 April 2005 15:23:58
Which is not needed as the remote hop gets configured a couple of lines lower...
Problem with FreeBSD 4.10 and AICCU
[nl] Shadow Hawkins on Wednesday, 06 April 2005 16:03:47
Oh ok, but isnt
gif0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1280 tunnel inet 84.178.52.220 --> 212.224.0.188 inet6 fe80::230:84ff:fe0c:53a5%gif0 prefixlen 64 scopeid 0x9 inet6 2001:6f8:900:4d1::2 prefixlen 128
supposed to be
gif0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1280 tunnel inet 84.178.52.220 --> 212.224.0.188 inet6 fe80::230:84ff:fe0c:53a5%gif0 prefixlen 64 scopeid 0x9 inet6 2001:6f8:900:4d1::2 --> 2001:6f8:900:4d1::1 prefixlen 128
?
Problem with FreeBSD 4.10 and AICCU
[ch] Jeroen Massar SixXS Staff on Wednesday, 06 April 2005 16:09:39
It can also be done that way, but it is't done that way...
Problem with FreeBSD 4.10 and AICCU
[nl] Shadow Hawkins on Wednesday, 06 April 2005 16:46:29
You mean
51 aiccu_exec( 52 "route add -inet6 %s -prefixlen 128 %s", 53 hTunnel->sIPv6_POP, 54 hTunnel->sIPv6_Local); 55
That caused a routing loop in NetBSD without the previous change :{ Just out of curiousity: Why did you choose not the specify the ipv6 tunnel endpoint when you're initialising the tunnel?
Problem with FreeBSD 4.10 and AICCU
[ch] Jeroen Massar SixXS Staff on Wednesday, 06 April 2005 15:25:45
As you didn't actually dump the firewall list I can't easily tell, but let me guess IPv4 UDP port 3740 is blocked? Read: Heartbeat
Problem with FreeBSD 4.10 and AICCU
[de] Shadow Hawkins on Wednesday, 06 April 2005 18:00:18
I'm so stupid, Jeroen. That was the problem. Now it's working perfectly. Many thanks :) Miguel

Please note Posting is only allowed when you are logged in.

Static Sunset Edition of SixXS
©2001-2017 SixXS - IPv6 Deployment & Tunnel Broker