From owner-freebsd-net@FreeBSD.ORG Tue Oct 21 16:35:28 2014 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id C297A1A2 for ; Tue, 21 Oct 2014 16:35:28 +0000 (UTC) Received: from mx1.shrew.net (mx1.shrew.net [38.97.5.131]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 918FB654 for ; Tue, 21 Oct 2014 16:35:27 +0000 (UTC) Received: from mail.shrew.net (mail.shrew.prv [10.24.10.20]) by mx1.shrew.net (8.14.7/8.14.7) with ESMTP id s9LGYG1W043768 for ; Tue, 21 Oct 2014 11:34:16 -0500 (CDT) (envelope-from mgrooms@shrew.net) Received: from [10.16.32.30] (72-48-144-84.static.grandenetworks.net [72.48.144.84]) by mail.shrew.net (Postfix) with ESMTPSA id 3395718B1E2 for ; Tue, 21 Oct 2014 11:34:11 -0500 (CDT) Message-ID: <54468B43.40602@shrew.net> Date: Tue, 21 Oct 2014 11:35:15 -0500 From: Matthew Grooms User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.6.0 MIME-Version: 1.0 To: freebsd-net@freebsd.org Subject: Re: Broken IPsec + enc +pf/ipfw References: <544535C2.9020301@shrew.net> <544566D2.40303@FreeBSD.org> <544569CF.2060905@shrew.net> <54457599.4060102@yandex.ru> <54458001.6000507@shrew.net> <544611F8.9070403@yandex.ru> <20141021160643.GB2787@1970jan1-epo.ch> In-Reply-To: <20141021160643.GB2787@1970jan1-epo.ch> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.4.3 (mx1.shrew.net [10.24.10.10]); Tue, 21 Oct 2014 11:34:16 -0500 (CDT) X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 21 Oct 2014 16:35:28 -0000 On 10/21/2014 11:06 AM, Kyle Williams wrote: > Hello, > > I'm currently using 10.0, IPSEC, racoon, enc, and pf between two remote > hosts without NATT. The gif tunnel is ipv4 only, host A is ipv4 only, > host B is ipv4/ipv6. I use IPSEC to route traffic between jails on both > hosts, with the jails using cloned lo1 and 10.0.0.0/8 addresses. > > I'm testing the posted patches on host A with the following pf.conf: > block all > pass all > > I'm using the recommended sysctl's: > net.enc.in.ipsec_bpf_mask=2 > net.enc.in.ipsec_filter_mask=2 > net.enc.out.ipsec_bpf_mask=1 > net.enc.out.ipsec_filter_mask=1 > [...] > > I'm willing to test more kernel patches, but I can't install head. > Hey Kyle, Thanks for lending a hand. I tested a few myself last night but had no luck. This morning I received an email off list that pointed to a patch that was merged to 10 stable. It sounds promising ... Log: Merge r263091: fix mbuf flags clash that lead to failure of operation of IPSEC and packet filters. https://lists.freebsd.org/pipermail/svn-src-stable-10/2014-March/001111.html I won't have a chance to try it until after business hours tonight, but will report back to the list with my results. Alternately, I assume you also could upgrade to 10.1-RC2 as the MFC for this patch happened back in March. I may go this route myself and then bump up to RELEASE in a few weeks when it happens. Thanks, -Matthew