-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
FRR not support configures security associations in the SA/SP database automatically on BSD (FreeBSD) #1479
Comments
|
The problem is solved. Now everything works with the following settings:On interface ix0 or ixl0 or other must be turn ON: rxcsum txcsum; (ifconfig ixl0 rxcsum txcsum) At /etc/rc.conf: At /etc/ipsec.conf: On kernel you must add next: And need set password for neighbor on FRRouting, for example: I think it's necessary to describe all this in wiki. |
|
Maybe it's bug BGP session not established with md5 password via FRRouting |
|
@pautiina - I've quickly skimmed the included link and am a bit confused about what I should be focusing on to understand the bug. Can you help me out here? Why do you think this is a bug still? |
|
I'm not sure if this is a bug. Maybe just for this faket must be mentioned in the documentation. |
|
At first I thought it was a bug of the FRR, so I wrote it here. |
|
@rwestphal to look into understanding this issue better and see if FRR needs to do anything |
|
from http://bird.network.cz/?get_doc&f=bird-6.html |
|
@pguibert6WIND you're right. |
|
Hello. What about enchantment for this issue? |
|
For the benefit of others who find this issue while troubleshooting TCP-MD5 on FreeBSD, if you encounter "% Error while applying TCP-Sig to session(s)", then load the Now, hopefully to elucidate this issue. Per If an SADB entry cannot be found for the destination, the system does not send any outgoing segments and drops any inbound segments." It turns out that, unlike the IPsec protocols that keep credentials in the SAD and policy in the SPD, TCP-MD5 keeps credentials in the SAD and policy on the socket itself. As of FRR 7.3, it does not matter what password is set in I tested with two VNET jails connected by an epair interface. The relevant FRR config on each is: Before installing the SAD entries, neither node emits any TCP traffic per the manpage description. Both nodes use the same SAD config. The SPI does not seem to matter. Both BGP sessions come up and In summary, I think the desired enhancement to FRR would be to implement management of the SAD entries, presumably via the PF_KEY interface. |
Hello.
On BSD systems, keys for TCP MD5 authentication are stored in the global SA/SP database, which can be accessed by external utilities (e.g. setkey(8))
On FreeBSD kernel must add next:
setup ipsec key:
Sutup of the IPSEC keys must be done directly through FRR without change /etc/ipsec.conf file.
The text was updated successfully, but these errors were encountered: