Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 21 Dec 2019 08:56:25 +0000
From:      bugzilla-noreply@freebsd.org
To:        net@FreeBSD.org
Subject:   [Bug 242744] IPSec in transport mode between FreeBSD hosts blackholes TCP traffic
Message-ID:  <bug-242744-7501-6bCXCCPTm0@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-242744-7501@https.bugs.freebsd.org/bugzilla/>
References:  <bug-242744-7501@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=242744

--- Comment #7 from Eugene Grosbein <eugen@freebsd.org> ---
(In reply to Victor Sudakov from comment #5)

> I don't think I can if the packet in question is not received or transmitted
> via any interface (like locally generated ssh-client traffic intercepted
> by IPSec policies).

Any outgoing packet has its destination IP address and it is not changed by
IPSec transport mode. It's possible to perform routing lookup for any reachable
destination IP address to discover transmit MTU and deduce right MSS.

-- 
You are receiving this mail because:
You are the assignee for the bug.


Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-242744-7501-6bCXCCPTm0>