Ask Your Question

Revision history [back]

click to hide/show revision 1
initial version

Hi Boris, please find below the requested information

LOGS AT Client machine from where ssh is being tried:

$ ssh -v -i demo-kp-new.pem ubuntu@172.16.104.53 OpenSSH_5.8p1, OpenSSL 0.9.8r 8 Feb 2011 debug1: Connecting to 172.16.104.53 [172.16.104.53] port 22. debug1: Connection established. debug1: identity file demo-kp-new.pem type -1 debug1: identity file demo-kp-new.pem-cert type -1

tcpdump at VM running on 20.0.0.103, having floating IP 172.16.104.53

ubuntu@demo-new:~$ sudo tcpdump -vv -ln -i eth0|grep 10.203.147.172 sudo: unable to resolve host demo-new tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes 10.203.147.172.64188 > 20.0.0.103.22: Flags [S], cksum 0x645c (correct), seq 2389692059, win 65535, options [mss 1460,nop,wscale 0,nop,nop,sackOK], length 0 20.0.0.103.22 > 10.203.147.172.64188: Flags [S.], cksum 0xb304 (incorrect -> 0x0ebe), seq 3914464745, ack 2389692060, win 28280, options [mss 1414,nop,nop,sackOK,nop,wscale 7], length 0 10.203.147.172.64188 > 20.0.0.103.22: Flags [.], cksum 0xbdda (correct), seq 1, ack 1, win 65535, length 0 20.0.0.103.22 > 10.203.147.172.64188: Flags [P.], cksum 0xb321 (incorrect -> 0x97a6), seq 1:42, ack 1, win 221, length 41 10.203.147.172.64188 > 20.0.0.103.22: Flags [R], cksum 0x4817 (correct), seq 2389692060, win 0, length 0 ^C26 packets captured 28 packets received by filter 0 packets dropped by kernel

ubuntu@demo-new:~$

tcpdump at neutron node, 172.16.104.26 being the IP allocated to br-ex and gateway to external network.

root@controller-neutron:~# tcpdump -vv -ln -i br-ex|grep 172.16.104.53 tcpdump: listening on br-ex, link-type EN10MB (Ethernet), capture size 65535 bytes 172.16.104.53.22 > 10.203.147.172.64188: Flags [S.], cksum 0x0edf (correct), seq 3914464745, ack 2389692060, win 28280, options [mss 1 414,nop,nop,sackOK,nop,wscale 7], length 0 172.16.104.26 > 172.16.104.53: ICMP redirect 10.203.147.172 to host 172.16.104.1, length 60 172.16.104.53.22 > 10.203.147.172.64188: Flags [S.], cksum 0x0edf (correct), seq 3914464745, ack 2389692060, win 28280, options [mss 1 414,nop,nop,sackOK,nop,wscale 7], length 0 172.16.104.53.22 > 10.203.147.172.64188: Flags [S.], cksum 0x0edf (correct), seq 3914464745, ack 2389692060, win 28280, options [mss 1 414,nop,nop,sackOK,nop,wscale 7], length 0 172.16.104.53.22 > 10.203.147.172.64188: Flags [P.], cksum 0x97c7 (correct), seq 1:42, ack 1, win 221, length 41 10.203.147.172.64188 > 172.16.104.53.22: Flags [R], cksum 0x4838 (correct), seq 2389692060, win 0, length 0 172.16.104.53.22 > 172.16.104.26.43110: Flags [P.], cksum 0xddb0 (correct), seq 2157221855:2157222691, ack 2371199779, win 307, option s [nop,nop,TS val 336465 ecr 516159842], length 836 172.16.104.26.43110 > 172.16.104.53.22: Flags [.], cksum 0xe789 (correct), seq 1, ack 836, win 1444, options [nop,nop,TS val 516172631 ecr 336465], length 0 13:17:53.392175 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.16.104.53 tell 172.16.104.26, length 28 13:17:53.392436 ARP, Ethernet (len 6), IPv4 (len 4), Reply 172.16.104.53 is-at fa:16:3e:7a:f7:a4, length 28

Hi Boris, please find below the requested information

LOGS AT Client machine from where ssh is being tried:

$ ssh -v -i demo-kp-new.pem ubuntu@172.16.104.53 OpenSSH_5.8p1, OpenSSL 0.9.8r 8 Feb 2011 2011

debug1: Connecting to 172.16.104.53 [172.16.104.53] port 22. 22.

debug1: Connection established. established.

debug1: identity file demo-kp-new.pem type -1 -1

debug1: identity file demo-kp-new.pem-cert type -1

tcpdump at VM running on 20.0.0.103, having floating IP 172.16.104.53

ubuntu@demo-new:~$ sudo tcpdump -vv -ln -i eth0|grep 10.203.147.172 10.203.147.172

sudo: unable to resolve host demo-new demo-new

tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes bytes

10.203.147.172.64188 > 20.0.0.103.22: Flags [S], cksum 0x645c (correct), seq 2389692059, win 65535, options [mss 1460,nop,wscale 0,nop,nop,sackOK], length 0
  20.0.0.103.22 > 10.203.147.172.64188: Flags [S.], cksum 0xb304 (incorrect -> 0x0ebe), seq 3914464745, ack 2389692060, win 28280, options [mss 1414,nop,nop,sackOK,nop,wscale 7], length 0
  10.203.147.172.64188 > 20.0.0.103.22: Flags [.], cksum 0xbdda (correct), seq 1, ack 1, win 65535, length 0
  20.0.0.103.22 > 10.203.147.172.64188: Flags [P.], cksum 0xb321 (incorrect -> 0x97a6), seq 1:42, ack 1, win 221, length 41
  10.203.147.172.64188 > 20.0.0.103.22: Flags [R], cksum 0x4817 (correct), seq 2389692060, win 0, length 0

^C26 packets captured captured

28 packets received by filter filter

0 packets dropped by kernel

ubuntu@demo-new:~$

tcpdump at neutron node, 172.16.104.26 being the IP allocated to br-ex and gateway to external network.

root@controller-neutron:~# tcpdump -vv -ln -i br-ex|grep 172.16.104.53 172.16.104.53

tcpdump: listening on br-ex, link-type EN10MB (Ethernet), capture size 65535 bytes bytes

172.16.104.53.22 > 10.203.147.172.64188: Flags [S.], cksum 0x0edf (correct), seq 3914464745, ack 2389692060, win 28280, options [mss 1                              414,nop,nop,sackOK,nop,wscale 7], length 0
  172.16.104.26 > 172.16.104.53: ICMP redirect 10.203.147.172 to host 172.16.104.1, length 60
  172.16.104.53.22 > 10.203.147.172.64188: Flags [S.], cksum 0x0edf (correct), seq 3914464745, ack 2389692060, win 28280, options [mss 1                              414,nop,nop,sackOK,nop,wscale 7], length 0
  172.16.104.53.22 > 10.203.147.172.64188: Flags [S.], cksum 0x0edf (correct), seq 3914464745, ack 2389692060, win 28280, options [mss 1                              414,nop,nop,sackOK,nop,wscale 7], length 0
  172.16.104.53.22 > 10.203.147.172.64188: Flags [P.], cksum 0x97c7 (correct), seq 1:42, ack 1, win 221, length 41
  10.203.147.172.64188 > 172.16.104.53.22: Flags [R], cksum 0x4838 (correct), seq 2389692060, win 0, length 0
  172.16.104.53.22 > 172.16.104.26.43110: Flags [P.], cksum 0xddb0 (correct), seq 2157221855:2157222691, ack 2371199779, win 307, option                              s [nop,nop,TS val 336465 ecr 516159842], length 836
  172.16.104.26.43110 > 172.16.104.53.22: Flags [.], cksum 0xe789 (correct), seq 1, ack 836, win 1444, options [nop,nop,TS val 516172631                               ecr 336465], length 0

13:17:53.392175 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.16.104.53 tell 172.16.104.26, length 28 28

13:17:53.392436 ARP, Ethernet (len 6), IPv4 (len 4), Reply 172.16.104.53 is-at fa:16:3e:7a:f7:a4, length 28