From owner-freebsd-bugs@FreeBSD.ORG Fri Feb 28 22:36:46 2014 Return-Path: Delivered-To: freebsd-bugs@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id A6CFA5D4; Fri, 28 Feb 2014 22:36:46 +0000 (UTC) Received: from smtp.novso.com (smtp1.novso.com [IPv6:2a00:14e8:28:3::5]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 6942910B4; Fri, 28 Feb 2014 22:36:46 +0000 (UTC) Message-ID: <1393627004.8727.3.camel@fr-wks3.corp.novso.com> Subject: Re: kern/185876: ipfw not matching incoming packets decapsulating ipsec. example l2tp/ipsec From: Nicolas DEFFAYET To: Georgios Amanakis Date: Fri, 28 Feb 2014 23:36:44 +0100 In-Reply-To: <1393369044.21345.1.camel@fr-wks3.corp.novso.com> References: <1393369044.21345.1.camel@fr-wks3.corp.novso.com> Organization: DEFFAYET.COM Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.4.4-3 Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Cc: andre@freebsd.org, melifaro@freebsd.org, =?UTF-8?Q?=D0=90=D0=BB=D0=B5=D0=BA=D1=81=D0=B0=D0=BD=D0=B4=D1=80_?= =?UTF-8?Q?=D0=92=D0=BE=D0=BB=D0=BE=D0=B1=D1=83=D0=B5=D0=B2?= , freebsd-bugs@freebsd.org, bug-followup@freebsd.org X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 28 Feb 2014 22:36:46 -0000 The following patch seem to be the only working workaround for IPsec transport mode and tunnel mode. Please note the use of M_PROTO7 instead of M_PROTO5 as that is not used in netinet & netinet6. M_PROTO5 is used for another purpose and so using it may create a conflict like M_PROTO3. --- Index: netinet/ip_var.h =================================================================== --- netinet/ip_var.h (revision 262470) +++ netinet/ip_var.h (working copy) @@ -167,7 +167,7 @@ */ #define M_FASTFWD_OURS M_PROTO1 /* changed dst to local */ #define M_IP_NEXTHOP M_PROTO2 /* explicit ip nexthop */ -#define M_SKIP_FIREWALL M_PROTO3 /* skip firewall processing, +#define M_SKIP_FIREWALL M_PROTO7 /* skip firewall processing, keep in sync with IP6 */ #define M_IP_FRAG M_PROTO4 /* fragment reassembly */ Index: netinet6/ip6_var.h =================================================================== --- netinet6/ip6_var.h (revision 262470) +++ netinet6/ip6_var.h (working copy) @@ -297,7 +297,7 @@ * IPv6 protocol layer specific mbuf flags. */ #define M_IP6_NEXTHOP M_PROTO2 /* explicit ip nexthop */ -#define M_SKIP_FIREWALL M_PROTO3 /* skip firewall processing, +#define M_SKIP_FIREWALL M_PROTO7 /* skip firewall processing, keep in sync with IPv4 */ #ifdef __NO_STRICT_ALIGNMENT --- -- Nicolas DEFFAYET