Date: Thu, 02 Aug 2001 22:35:58 +0900 From: itojun@iijlab.net To: "Chris" <mlnn4@oaks.com.au> Cc: "freebsd-net@freebsd.org" <freebsd-net@freebsd.org> Subject: Re: kernel upgrade causes truncated IPSEC packets Message-ID: <16101.996759358@itojun.org> In-Reply-To: mlnn4's message of Thu, 02 Aug 2001 22:36:06 %2B1000. <200108021237.f72CbKQ00596@aussie.org>
next in thread | previous in thread | raw e-mail | index | archive | help
>>packet. But the PPP process only sees the first 36 bytes or so of it (for >>example, a packet which arrives as 263 bytes becomes 320 bytes after >>encapsulation. This is what is shown by both tcpdump and the packet header, >>as read from the ppp async stream), but only 36 bytes of it make it through >>to the modem (plus the PPP overhead of about 5 bytes). > >I re-posted this to -stable, and thanks to Bill Fenner it is now fixed. > >It seems that the IPSEC code for some reason will sometimes insert a zero- >length mbuf into the mbuf chain. if_tun.c will cease following the linked >list of mbufs if it sees a zero-length one, thus causing the truncated output >packets. Dunno how long it's been like that (probably 7 weeks) but it would >have affected anyone who used IPSEC over a /dev/tunN device. was the fix committed to sys/net/if_tun.c? i guess other *BSDs have the same issue. itojun To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-net" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?16101.996759358>