SixXS::Sunset 2017-06-06

Ticket ID: SIXXS #2596313
Ticket Status: Resolved

PoP: gblon02 - Goscomb Technologies (London)

T39369 - tunnel down since pop failure incident
[au] Shadow Hawkins on Saturday, 11 September 2010 00:25:57
Tag [/quote] is not closed
T39369 - tunnel down since pop failure incident
[au] Shadow Hawkins on Saturday, 11 September 2010 01:28:47
Additional information NAT is handled by userland ppp on tun0 uname -a
FreeBSD cerberus.castro.aus.net 7.1-RELEASE FreeBSD 7.1-RELEASE #5: Mon Sep 6 13:48:05 EST 2010 root@cerberus.castro.aus.net:/usr/src/sys/i386/compile/CERBERUS i386
ifconfig -a
pcn0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500 ether 00:60:b0:b5:a5:3a inet6 fe80::260:b0ff:feb5:a53a%pcn0 prefixlen 64 scopeid 0x1 inet 10.0.0.1 netmask 0xffffff00 broadcast 10.0.0.255 inet 192.168.0.1 netmask 0xffffff00 broadcast 192.168.0.255 inet6 2a01:348:245::1 prefixlen 64 media: Ethernet autoselect (100baseTX <full-duplex>) status: active rl0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500 options=8<VLAN_MTU> ether 00:18:4d:eb:92:07 inet6 fe80::218:4dff:feeb:9207%rl0 prefixlen 64 scopeid 0x2 media: Ethernet autoselect (100baseTX <full-duplex>) status: active plip0: flags=108851<UP,POINTOPOINT,RUNNING,SIMPLEX,MULTICAST,NEEDSGIANT> metric 0 mtu 1500 lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> metric 0 mtu 16384 inet6 ::1 prefixlen 128 inet6 fe80::1%lo0 prefixlen 64 scopeid 0x4 inet 127.0.0.1 netmask 0xff000000 gre0: flags=9011<UP,POINTOPOINT,LINK0,MULTICAST> metric 0 mtu 1476 tunnel inet 203.30.68.103 --> 118.107.51.240 inet6 fe80::260:b0ff:feb5:a53a%gre0 prefixlen 64 scopeid 0x5 inet 10.0.0.2 --> 10.100.0.1 netmask 0xffffff00 tun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> metric 0 mtu 1492 inet 203.30.68.103 --> 203.27.231.26 netmask 0xffffffff Opened by PID 441 gif0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> metric 0 mtu 1280 tunnel inet 203.30.68.103 --> 77.75.104.126 inet6 fe80::260:b0ff:feb5:a53a%gif0 prefixlen 64 scopeid 0x7 inet6 2a01:348:6:39f::2 --> 2a01:348:6:39f::1 prefixlen 128
firewall rules
00090 divert 1234 tcp from 10.100.0.0/24 to any out via pcn0 setup 00100 allow ip from any to any via lo0 00200 deny ip from any to 127.0.0.0/8 00300 deny ip from 127.0.0.0/8 to any 00400 allow esp from any to any 00500 allow ah from any to any 00600 allow ipencap from any to any 00700 allow udp from any 500 to any 00800 allow ip from any to any dst-port 500 00900 allow ip from 10.100.0.0/24 to any 01000 allow ip from any to 10.100.0.0/24 01100 allow ip4 from 77.75.104.126 to me 01200 allow ip4 from me to 77.75.104.126 01300 deny ip from any to any not ip6 via gif0 01400 allow ip from any to any via lo0 01500 deny ip from any to 127.0.0.0/8 01600 deny ip from 172.16.0.0/12 to any via tun0 01700 deny ip from any to 172.16.0.0/12 via tun0 01800 deny ip from 10.0.0.0/8 to any in via tun0 01900 deny ip from any to 10.0.0.0/8 out via tun0 02000 deny ip from 192.168.0.0/16 to any via tun0 02100 deny ip from any to 192.168.0.0/16 via tun0 02200 fwd 127.0.0.1,25 tcp from 10.0.0.0/24 to any dst-port 25 in 02300 allow ip from any to any via pcn0 02400 allow ip from 10.0.0.0/24 to any 02500 allow ip from 192.168.0.0/24 to any 02600 allow ip from me to any 02700 allow ip from 203.30.68.103 to any 02800 allow ip from 2a01:348:6:39f::2 to any 02900 allow ip from 2a01:348:245::/48 to any 03000 allow ip from 2a01:348:1fa::/48 to any 03100 allow ip6 from :: to ff02::/16 proto ipv6-icmp 03200 allow ip6 from fe80::/10 to fe80::/10 proto ipv6-icmp 03300 allow ip6 from fe80::/10 to ff02::/16 proto ipv6-icmp 03400 allow ip6 from any to any proto ipv6-icmp dst-ip6 me6 in 03500 allow gre from any to any 03600 allow tcp from any 1723 to any 03700 allow tcp from any to any dst-port 1723 03800 allow tcp from 118.107.51.240 to any 03900 allow udp from 118.107.51.240 to any 04000 allow tcp from any to any established 04100 allow tcp from any to any dst-port 22 setup 04200 allow tcp from any to any dst-port 80 setup 04300 allow tcp from any to me dst-port 80 setup 04400 allow tcp from any to me dst-port 81 setup 04500 allow tcp from any to me dst-port 443 setup 04600 allow tcp from any 20 to any dst-port 1023-65535 setup 04700 allow tcp from 118.107.51.240 to any dst-port 8088 setup 04800 allow tcp from any to any dst-port 1022 setup 04900 allow tcp from any to any dst-port 1021 setup 05000 allow tcp from any to any dst-port 1020 setup 05100 allow tcp from any to any dst-port 1019 setup 05200 deny log logamount 200 tcp from any to any in via tun0 setup 05300 allow udp from me to any 05400 allow udp from any to any dst-port 53 05500 allow udp from any 53 to any 05600 allow udp from any to any dst-port 9 05700 allow udp from any to any dst-port 3130 05800 allow udp from any to any dst-port 123 05900 allow udp from any to any dst-port 3478 06000 allow udp from any to any dst-port 4569 06100 allow udp from any to any dst-port 5060-5061 06200 allow udp from any to any dst-port 8000-8012 06300 allow udp from any to any dst-port 16384-16482 06400 allow udp from any to any dst-port 10000-20000 06500 allow icmp from any to any 06600 allow ipv6-icmp from any to any 06700 allow udp from me to any dst-port 33433-65535 06800 allow udp from any 33433-65535 to me 06900 allow udp from any to any dst-port 33434-33499 07000 deny log logamount 200 ip from any to any 65535 deny ip from any to any
T39369 - tunnel down since pop failure incident
[gb] Shadow Hawkins on Saturday, 11 September 2010 13:53:57
I am seeing the same symptoms for my tunnel to gblon02 NIC handle: DMB8-SIXXS Tunnel: T24604 POP Id: gblon02 "aiccu test" fails at Step [6/8] Ping the IPv6 Remote/PoP Inner Tunnel Endpoint (2a01:348:6:2b2::1) dMb
T39369 - tunnel down since pop failure incident
[au] Shadow Hawkins on Saturday, 11 September 2010 20:22:49
Tunnel T39369 has reconnected; services appear to have been restored. Many thanks to all those involved. Maurice
State change: resolved Locked
[ch] Jeroen Massar SixXS Staff on Monday, 13 September 2010 18:55:03
Message is Locked
The state of this ticket has been changed to resolved

Please note Posting is only allowed when you are logged in.

Static Sunset Edition of SixXS
©2001-2017 SixXS - IPv6 Deployment & Tunnel Broker