From owner-freebsd-net@freebsd.org Wed Jul 19 12:02:26 2017 Return-Path: Delivered-To: freebsd-net@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id EB915C7BA25 for ; Wed, 19 Jul 2017 12:02:26 +0000 (UTC) (envelope-from m.muenz@spam-fetish.org) Received: from mailout-02.maxonline.de (mailout-02.maxonline.de [81.24.66.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id AA53E7C782 for ; Wed, 19 Jul 2017 12:02:26 +0000 (UTC) (envelope-from m.muenz@spam-fetish.org) Received: from web03-01.max-it.de (web03-01.max-it.de [81.24.64.215]) by mailout-02.maxonline.de (Postfix) with ESMTPS id 736444F for ; Wed, 19 Jul 2017 14:02:23 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by web03-01.max-it.de (Postfix) with ESMTP id 6426428B847 for ; Wed, 19 Jul 2017 14:02:23 +0200 (CEST) X-Virus-Scanned: Debian amavisd-new at web03-01.max-it.de Received: from web03-01.max-it.de ([127.0.0.1]) by localhost (web03-01.max-it.de [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id jlS5fru1xgtd for ; Wed, 19 Jul 2017 14:02:23 +0200 (CEST) Received: from [81.24.66.132] (unknown [81.24.66.132]) (Authenticated sender: m.muenz@spam-fetish.org) by web03-01.max-it.de (Postfix) with ESMTPA id 2E6A228AB1C for ; Wed, 19 Jul 2017 14:02:23 +0200 (CEST) Subject: Re: NAT before IPSEC - reply packets stuck at enc0 To: freebsd-net@freebsd.org References: <459d59f7-2895-8aed-d547-be46a0fbb918@spam-fetish.org> <1c0de616-91ff-a6f9-d946-f098bc1a709f@spam-fetish.org> <911903d1-f353-d5d6-d400-d86150f88136@yandex.ru> From: "Muenz, Michael" Message-ID: <2d607e1a-a2c0-0f85-1530-c478962a76cd@spam-fetish.org> Date: Wed, 19 Jul 2017 14:02:38 +0200 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.2.1 MIME-Version: 1.0 In-Reply-To: <911903d1-f353-d5d6-d400-d86150f88136@yandex.ru> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 19 Jul 2017 12:02:27 -0000 Am 19.07.2017 um 12:12 schrieb Andrey V. Elsukov: > > Try to add the following rule: > > ipfw add 179 nat 1 log all from 10.24.66.0/24 to 10.26.1.1 in recv enc0 > > This rule will pass a decrypted packet to the NAT instance, that will > check in the states table should a packet be translated back or not. > > You need to have enc0 interface in UP state and sysctl variable > net.enc.in.ipsec_filter_mask should be set to 1 or 2. > > After translation on the enc0 a packet will be returned to the IPsec > subsystem, that will queue it for further processing in the netisr. > Since destination address become foreign, it will be forwarded by IP stack. > Hi, I tried this but still no luck. Packets get seen by ipfw -ta list: 00179 139 3892 Wed Jul 19 14:00:21 2017 nat 1 log ip from 10.26.2.0/24 to 10.24.66.0/24 00179 143 4228 Wed Jul 19 14:00:21 2017 nat 2 log ip from 10.24.66.0/24 to 10.26.1.1 in recv enc0 65535 5891 1716730 Wed Jul 19 14:00:21 2017 allow ip from any to any But there's nothing on the internal IF. Also played around with filter_mask and also one_pass. Also tried (as you see above) with a second nat instance where reverse is disabled. Do you have any other clue? Really appreciate your help, thanks! Michael