Packet from agent in MTU exceeded case has GW IP reversed

Bug #1413344 reported by Vedamurthy Joshi
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Juniper Openstack
Fix Committed
High
Praveen
R2.1
Fix Committed
High
Praveen

Bug Description

R2.1 Build 6 ubuntu 12.04.3 Multi node setup

Packet from agent in MTU exceeded case has GW IP reversed

I was running this script on regression testbed

python -m testtools.run scripts.neutron.test_routers.TestRouterSNAT.test_basic_snat_behavior_with_fip

When public vm was trying to do a ssh to fip of private VM , below tcpdump was seen on tap intf of private vm.

The agent is responding with Source ip 89.219.204.10 (gateway IP 10.204.219.88 is reversed).
Also the ICMP IP is shown as 0.0.0.0

>>>> 23:29:49.846741 IP 89.219.204.10 > 10.204.219.91: ICMP 0.0.0.0 unreachable - need to frag (mtu 1454), length 156

root@nodec55:~# tcpdump -ni tapb3bc7243-37 host 10.204.219.91
tcpdump: WARNING: tapb3bc7243-37: no IPv4 address assigned
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on tapb3bc7243-37, link-type EN10MB (Ethernet), capture size 65535 bytes
23:29:49.836673 IP 10.204.219.93.34184 > 10.204.219.91.22: Flags [S], seq 31896228, win 29200, options [mss 1420,sackOK,TS val 877859 ecr 0,nop,wscale 7], length 0
23:29:49.837018 IP 10.204.219.91.22 > 10.204.219.93.34184: Flags [S.], seq 1805413430, ack 31896229, win 28960, options [mss 1460,sackOK,TS val 869563 ecr 877859,nop,wscale 7], length 0
23:29:49.837290 IP 10.204.219.93.34184 > 10.204.219.91.22: Flags [.], ack 1, win 229, options [nop,nop,TS val 877860 ecr 869563], length 0
23:29:49.837740 IP 10.204.219.93.34184 > 10.204.219.91.22: Flags [P.], seq 1:42, ack 1, win 229, options [nop,nop,TS val 877860 ecr 869563], length 41
23:29:49.837860 IP 10.204.219.91.22 > 10.204.219.93.34184: Flags [.], ack 42, win 227, options [nop,nop,TS val 869563 ecr 877860], length 0
23:29:49.846034 IP 10.204.219.91.22 > 10.204.219.93.34184: Flags [P.], seq 1:42, ack 42, win 227, options [nop,nop,TS val 869565 ecr 877860], length 41
23:29:49.846456 IP 10.204.219.93.34184 > 10.204.219.91.22: Flags [.], ack 42, win 229, options [nop,nop,TS val 877862 ecr 869565], length 0
23:29:49.846566 IP 10.204.219.91.22 > 10.204.219.93.34184: Flags [.], seq 42:1450, ack 42, win 227, options [nop,nop,TS val 869565 ecr 877862], length 1408
23:29:49.846591 IP 10.204.219.91.22 > 10.204.219.93.34184: Flags [P.], seq 1450:1674, ack 42, win 227, options [nop,nop,TS val 869565 ecr 877862], length 224
23:29:49.846726 IP 10.204.219.93.34184 > 10.204.219.91.22: Flags [.], seq 42:1428, ack 42, win 229, options [nop,nop,TS val 877862 ecr 869565], length 1386
23:29:49.846741 IP 89.219.204.10 > 10.204.219.91: ICMP 0.0.0.0 unreachable - need to frag (mtu 1454), length 156
23:29:49.846745 IP 10.204.219.93.34184 > 10.204.219.91.22: Flags [P.], seq 1428:2010, ack 42, win 229, options [nop,nop,TS val 877862 ecr 869565], length 582
23:29:49.846840 IP 10.204.219.93.34184 > 10.204.219.91.22: Flags [.], ack 42, win 237, options [nop,nop,TS val 877862 ecr 869565,nop,nop,sack 1 {1450:1674}], length 0
23:29:49.846849 IP 10.204.219.91.22 > 10.204.219.93.34184: Flags [.], ack 2010, win 271, options [nop,nop,TS val 869565 ecr 877862], length 0
23:29:49.848183 IP 10.204.219.91.22 > 10.204.219.93.34184: Flags [.], seq 42:1450, ack 2010, win 271, options [nop,nop,TS val 869566 ecr 877862], length 1408
23:29:49.848332 IP 89.219.204.10 > 10.204.219.91: ICMP 0.0.0.0 unreachable - need to frag (mtu 1454), length 156
23:29:50.052233 IP 10.204.219.91.22 > 10.204.219.93.34184: Flags [.], seq 42:1450, ack 2010, win 271, options [nop,nop,TS val 869617 ecr 877862], length 1408
23:29:50.052378 IP 89.219.204.10 > 10.204.219.91: ICMP 0.0.0.0 unreachable - need to frag (mtu 1454), length 156
23:29:50.460224 IP 10.204.219.91.22 > 10.204.219.93.34184: Flags [.], seq 42:1450, ack 2010, win 271, options [nop,nop,TS val 869719 ecr 877862], length 1408
23:29:50.460415 IP 89.219.204.10 > 10.204.219.91: ICMP 0.0.0.0 unreachable - need to frag (mtu 1454), length 156
23:29:51.276238 IP 10.204.219.91.22 > 10.204.219.93.34184: Flags [.], seq 42:1450, ack 2010, win 271, options [nop,nop,TS val 869923 ecr 877862], length 1408
23:29:51.276403 IP 89.219.204.10 > 10.204.219.91: ICMP 0.0.0.0 unreachable - need to frag (mtu 1454), length 156
23:29:52.912237 IP 10.204.219.91.22 > 10.204.219.93.34184: Flags [.], seq 42:1450, ack 2010, win 271, options [nop,nop,TS val 870332 ecr 877862], length 1408

Tags: vrouter
Revision history for this message
Hari Prasad Killi (haripk) wrote :
Revision history for this message
Hari Prasad Killi (haripk) wrote :
Changed in juniperopenstack:
status: New → Fix Committed
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.