From owner-freebsd-stable@freebsd.org Thu Jun 9 13:08:38 2016 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 4C704B6F07E for ; Thu, 9 Jun 2016 13:08:38 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: from mailman.ysv.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 3C72F1DCB for ; Thu, 9 Jun 2016 13:08:38 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: by mailman.ysv.freebsd.org (Postfix) id 3BC4AB6F07D; Thu, 9 Jun 2016 13:08:38 +0000 (UTC) Delivered-To: stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 3B4D4B6F07B; Thu, 9 Jun 2016 13:08:38 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: from venus.codepro.be (venus.codepro.be [IPv6:2a01:4f8:162:1127::2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "*.codepro.be", Issuer "Gandi Standard SSL CA 2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 08AEB1DCA; Thu, 9 Jun 2016 13:08:38 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: from [10.65.209.127] (unknown [137.122.64.8]) (Authenticated sender: kp) by venus.codepro.be (Postfix) with ESMTPSA id D8E661E513; Thu, 9 Jun 2016 15:08:35 +0200 (CEST) From: "Kristof Provost" To: "Slawa Olhovchenkov" Cc: stable@freebsd.org, freebsd-net@freebsd.org Subject: Re: ipfw fwd to closed port Date: Thu, 09 Jun 2016 09:08:33 -0400 Message-ID: In-Reply-To: <20160609130601.GS75630@zxy.spb.ru> References: <20160608230240.GA51364@zxy.spb.ru> <20160609130017.GA4071@vega.codepro.be> <20160609130601.GS75630@zxy.spb.ru> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Mailer: MailMate Trial (1.9.4r5234) X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Jun 2016 13:08:38 -0000 On 9 Jun 2016, at 9:06, Slawa Olhovchenkov wrote: > On Thu, Jun 09, 2016 at 03:00:17PM +0200, Kristof Provost wrote: > >> On 2016-06-09 02:02:40 (+0300), Slawa Olhovchenkov wrote: >>> Forwarding by ipfw to closed local port generating RST packet with >>> incorrect checksun. Is this know ussuse? Need open PR? >> >> Where did you capture the packet? If you've captured the packet on the >> machine that generated it tcpdump may indeed claim that the checksum is >> wrong, because it's computed by the hardware (so after tcpdump captured >> it). > > On the tun0 (destination of RST packet routed to tun0). > tun0: flags=8051 metric 0 mtu 1500 > options=80000 > inet 192.168.4.1 --> 192.168.4.1 netmask 0xffffff00 > inet6 fe80::240:63ff:fedc:ac9e%tun0 prefixlen 64 scopeid 0x9 > nd6 options=21 > Opened by PID 1345 > > tun0 don't computed checksum. I’m not sure I understand what you’re trying to say. In any case: either capture the packet outside the machine, or confirm that the checksum is wrong by watching the relevant netstat counters. Regards, Kristof