From owner-freebsd-net@FreeBSD.ORG Wed Oct 22 19:29:10 2014 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id BD219356 for ; Wed, 22 Oct 2014 19:29:10 +0000 (UTC) Received: from mx2.shrew.net (mx2.shrew.net [38.97.5.132]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 8B50A822 for ; Wed, 22 Oct 2014 19:29:10 +0000 (UTC) Received: from mail.shrew.net (mail.shrew.prv [10.24.10.20]) by mx2.shrew.net (8.14.7/8.14.7) with ESMTP id s9MJS3IW081803 for ; Wed, 22 Oct 2014 14:28:03 -0500 (CDT) (envelope-from mgrooms@shrew.net) Received: from [10.16.32.30] (72-48-144-84.static.grandenetworks.net [72.48.144.84]) by mail.shrew.net (Postfix) with ESMTPSA id C311418A811 for ; Wed, 22 Oct 2014 14:27:52 -0500 (CDT) Message-ID: <54480578.6020106@shrew.net> Date: Wed, 22 Oct 2014 14:28:56 -0500 From: Matthew Grooms User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.6.0 MIME-Version: 1.0 To: freebsd-net@freebsd.org Subject: Re: Broken IPsec + enc +pf/ipfw References: <544535C2.9020301@shrew.net> <544566D2.40303@FreeBSD.org> <544569CF.2060905@shrew.net> <54457599.4060102@yandex.ru> <54458001.6000507@shrew.net> <544611F8.9070403@yandex.ru> <20141021160643.GB2787@1970jan1-epo.ch> <54468B43.40602@shrew.net> <20141021183919.GD2787@1970jan1-epo.ch> In-Reply-To: <20141021183919.GD2787@1970jan1-epo.ch> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.4.3 (mx2.shrew.net [10.24.10.11]); Wed, 22 Oct 2014 14:28:03 -0500 (CDT) X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 22 Oct 2014 19:29:10 -0000 On 10/21/2014 1:39 PM, Kyle Williams wrote: > On Tue Oct 21 11:35:15 2014, Matthew Grooms wrote: >> Hey Kyle, >> >> Thanks for lending a hand. I tested a few myself last night but had no >> luck. This morning I received an email off list that pointed to a patch >> that was merged to 10 stable. It sounds promising ... >> >> Log: >> Merge r263091: fix mbuf flags clash that lead to failure of operation >> of IPSEC and packet filters. >> >> https://lists.freebsd.org/pipermail/svn-src-stable-10/2014-March/001111.html >> >> I won't have a chance to try it until after business hours tonight, but >> will report back to the list with my results. Alternately, I assume you >> also could upgrade to 10.1-RC2 as the MFC for this patch happened back >> in March. I may go this route myself and then bump up to RELEASE in a >> few weeks when it happens. > > r263091, r266800, and r272695 together on 10.0-RELENG works for me. > > I didn't test r263091 by itself. > I couldn't get a kernel to boot without crashing with the single patch, (r263091) applied. With all three patches, I can also confirm that the problem is resolved. And some additional info: I also experimented with using gif + IPsec transport mode instead of enc + IPsec tunnel mode. I was hoping that changing the configuration would work around the issue. Unfortunately, gif + IPsec transport mode was exhibiting the same type of problems that enc + IPsec tunnel mode was, even with a patched kernel ( pf doesn't see the traffic on the gif interface so return traffic gets blocked for lack of a state entry ). Thanks, -Matthew