Packet from agent in MTU exceeded case has GW IP reversed
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Juniper Openstack |
Fix Committed
|
High
|
Praveen | ||
R2.1 |
Fix Committed
|
High
|
Praveen |
Bug Description
R2.1 Build 6 ubuntu 12.04.3 Multi node setup
Packet from agent in MTU exceeded case has GW IP reversed
I was running this script on regression testbed
python -m testtools.run scripts.
When public vm was trying to do a ssh to fip of private VM , below tcpdump was seen on tap intf of private vm.
The agent is responding with Source ip 89.219.204.10 (gateway IP 10.204.219.88 is reversed).
Also the ICMP IP is shown as 0.0.0.0
>>>> 23:29:49.846741 IP 89.219.204.10 > 10.204.219.91: ICMP 0.0.0.0 unreachable - need to frag (mtu 1454), length 156
root@nodec55:~# tcpdump -ni tapb3bc7243-37 host 10.204.219.91
tcpdump: WARNING: tapb3bc7243-37: no IPv4 address assigned
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on tapb3bc7243-37, link-type EN10MB (Ethernet), capture size 65535 bytes
23:29:49.836673 IP 10.204.219.93.34184 > 10.204.219.91.22: Flags [S], seq 31896228, win 29200, options [mss 1420,sackOK,TS val 877859 ecr 0,nop,wscale 7], length 0
23:29:49.837018 IP 10.204.219.91.22 > 10.204.
23:29:49.837290 IP 10.204.219.93.34184 > 10.204.219.91.22: Flags [.], ack 1, win 229, options [nop,nop,TS val 877860 ecr 869563], length 0
23:29:49.837740 IP 10.204.219.93.34184 > 10.204.219.91.22: Flags [P.], seq 1:42, ack 1, win 229, options [nop,nop,TS val 877860 ecr 869563], length 41
23:29:49.837860 IP 10.204.219.91.22 > 10.204.
23:29:49.846034 IP 10.204.219.91.22 > 10.204.
23:29:49.846456 IP 10.204.219.93.34184 > 10.204.219.91.22: Flags [.], ack 42, win 229, options [nop,nop,TS val 877862 ecr 869565], length 0
23:29:49.846566 IP 10.204.219.91.22 > 10.204.
23:29:49.846591 IP 10.204.219.91.22 > 10.204.
23:29:49.846726 IP 10.204.219.93.34184 > 10.204.219.91.22: Flags [.], seq 42:1428, ack 42, win 229, options [nop,nop,TS val 877862 ecr 869565], length 1386
23:29:49.846741 IP 89.219.204.10 > 10.204.219.91: ICMP 0.0.0.0 unreachable - need to frag (mtu 1454), length 156
23:29:49.846745 IP 10.204.219.93.34184 > 10.204.219.91.22: Flags [P.], seq 1428:2010, ack 42, win 229, options [nop,nop,TS val 877862 ecr 869565], length 582
23:29:49.846840 IP 10.204.219.93.34184 > 10.204.219.91.22: Flags [.], ack 42, win 237, options [nop,nop,TS val 877862 ecr 869565,nop,nop,sack 1 {1450:1674}], length 0
23:29:49.846849 IP 10.204.219.91.22 > 10.204.
23:29:49.848183 IP 10.204.219.91.22 > 10.204.
23:29:49.848332 IP 89.219.204.10 > 10.204.219.91: ICMP 0.0.0.0 unreachable - need to frag (mtu 1454), length 156
23:29:50.052233 IP 10.204.219.91.22 > 10.204.
23:29:50.052378 IP 89.219.204.10 > 10.204.219.91: ICMP 0.0.0.0 unreachable - need to frag (mtu 1454), length 156
23:29:50.460224 IP 10.204.219.91.22 > 10.204.
23:29:50.460415 IP 89.219.204.10 > 10.204.219.91: ICMP 0.0.0.0 unreachable - need to frag (mtu 1454), length 156
23:29:51.276238 IP 10.204.219.91.22 > 10.204.
23:29:51.276403 IP 89.219.204.10 > 10.204.219.91: ICMP 0.0.0.0 unreachable - need to frag (mtu 1454), length 156
23:29:52.912237 IP 10.204.219.91.22 > 10.204.
R2.1 : https:/ /github. com/Juniper/ contrail- controller/ commit/ c49c8ff609b9635 b323bdc53f5ed80 b03209c9fa