lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAEwTi7Qo8=X=v51_1y3JMQnbG3xBQYRb9YRePFh6KfYmb_Y0-g@mail.gmail.com>
Date:	Thu, 12 Sep 2013 11:20:38 +0100
From:	James Chapman <jchapman@...alix.com>
To:	Jeff Loughridge <jeffl@...mni.duke.edu>
Cc:	netdev@...r.kernel.org
Subject: Re: ip l2tp - suspected defect using IPv6 local/remote addresses

On 11 September 2013 19:52, Jeff Loughridge <jeffl@...mni.duke.edu> wrote:
>
> Using IPv6 address as L2TPv3 endpoints doesn't seem to work in
> iproute2 3.11. I see a cosmetic defect in the output of 'ip l2tp show
> tunnel'. In addition, I can't get tunnels to function with UDP or IP
> encapsulation.
>
> root@...ian:~# ip l2tp add tunnel tunnel_id 3000 peer_tunnel_id 4000
> encap udp local a::1 remote a::2 udp_sport 5000 udp_dport 6000
> root@...ian:~# ip l2tp add session tunnel_id 3000 session_id 1000
> peer_session_id 2000
> root@...ian:~# ip l2tp show tunnel
> Tunnel 3000, encap UDP
>   From 127.0.0.1 to 127.0.0.1
>   Peer tunnel 4000
>   UDP source / dest ports: 5000/6000
> root@...ian:~#

You'll need a 3.5 or later kernel for L2TP over IPv6. I see you are
using 3.2. Are you using a version of iproute2 which is not matched to
your kernel?

> See below for more details about my set-up. I have no problems using
> IPv4 endpoints.
>
> root@...ian:~# ip addr show eth0
> 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast
> state UNKNOWN group default qlen 1000
>     link/ether 00:0c:29:91:cb:3c brd ff:ff:ff:ff:ff:ff
>     inet 5.1.0.100/24 scope global eth0
>     inet6 a::1/64 scope global
>        valid_lft forever preferred_lft forever
>     inet6 fe80::20c:29ff:fe91:cb3c/64 scope link
>        valid_lft forever preferred_lft forever
> root@...ian:~#
> root@...ian:~# ip -V
> ip utility, iproute2-ss130903
> root@...ian:~# uname -a
> Linux debian 3.2.0-4-686-pae #1 SMP Debian 3.2.41-2 i686 GNU/Linux
> root@...ian:~#
> root@...ian:~# modprobe l2tp_eth
> root@...ian:~# lsmod | grep l2tp
> l2tp_eth               12738  0
> l2tp_netlink           17263  1 l2tp_eth
> l2tp_core              17486  2 l2tp_netlink,l2tp_eth
>
> Jeff L.
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ