Date: Fri, 21 Nov 2025 20:24:38 +0000 From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 290768] if_wg(4): handshake response has src and dst reverse Message-ID: <bug-290768-7501-rcHZdVMyfn@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-290768-7501@https.bugs.freebsd.org/bugzilla/> References: <bug-290768-7501@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=290768 --- Comment #19 from Kyle Evans <kevans@freebsd.org> --- (In reply to relvy from comment #17) I don't really see how that's possible at the moment; we get that addrerss one of a few different ways: 1.) wg(8) set it via the ioctl interface, but it only does that for AF_INET / AF_INET6 2.) When we receive a valid handshake initiation 3.) When we receive a valid handshake response 4.) When we receive a valid packet over the tunnel For #2 - 4, those are pulled from the `pkt->p_endpoint`, which is populated in wg_input(). If we didn't get an AF_INET / AF_INET6 address *there*, the packet is dropped. You say that IPv6 is disabled, but I don't think opnsense produces any kernel configs with it completely ripped out, so EAFNOSUPPORT from it being an AF_INET6 is likely not what's happened -- something presumably went wrong in the sosend() path instead. -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-290768-7501-rcHZdVMyfn>
