From owner-freebsd-net@freebsd.org Mon Sep 3 10:12:38 2018 Return-Path: Delivered-To: freebsd-net@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 4B141FE49C6 for ; Mon, 3 Sep 2018 10:12:38 +0000 (UTC) (envelope-from eugen@grosbein.net) Received: from hz.grosbein.net (hz.grosbein.net [IPv6:2a01:4f8:d12:604::2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hz.grosbein.net", Issuer "hz.grosbein.net" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id CD0B47DEBF for ; Mon, 3 Sep 2018 10:12:37 +0000 (UTC) (envelope-from eugen@grosbein.net) Received: from eg.sd.rdtc.ru (eg.sd.rdtc.ru [IPv6:2a03:3100:c:13:0:0:0:5]) by hz.grosbein.net (8.15.2/8.15.2) with ESMTPS id w83ACToV067522 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 3 Sep 2018 12:12:30 +0200 (CEST) (envelope-from eugen@grosbein.net) X-Envelope-From: eugen@grosbein.net X-Envelope-To: run00er@gmail.com Received: from [10.58.0.4] ([10.58.0.4]) by eg.sd.rdtc.ru (8.15.2/8.15.2) with ESMTPS id w83ACLgQ065391 (version=TLSv1.2 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Mon, 3 Sep 2018 17:12:21 +0700 (+07) (envelope-from eugen@grosbein.net) Subject: Re: Ipfw fwd with route(8) RTF_BLACKHOLE and fast forwarding on FreeBSD 11 To: Runer , freebsd-net@freebsd.org References: <99f99bf0-59ef-11e7-d1a4-c34a40492308@gmail.com> From: Eugene Grosbein Message-ID: <10c4591a-3d82-bddb-093d-a73da1d9b2b8@grosbein.net> Date: Mon, 3 Sep 2018 17:12:17 +0700 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0 MIME-Version: 1.0 In-Reply-To: <99f99bf0-59ef-11e7-d1a4-c34a40492308@gmail.com> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=0.3 required=5.0 tests=BAYES_00,LOCAL_FROM,SPF_PASS autolearn=no autolearn_force=no version=3.4.1 X-Spam-Report: * -0.0 SPF_PASS SPF: sender matches SPF record * -2.3 BAYES_00 BODY: Bayes spam probability is 0 to 1% * [score: 0.0000] * 2.6 LOCAL_FROM From my domains X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on hz.grosbein.net X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Sep 2018 10:12:38 -0000 03.09.2018 14:02, Runer wrote: > *Hello Community! > > A situation has arisen in which ipfw fwd stops working when > RTF_BLACKHOLE or RTF_REJECT, ROUTE (8), is enabled on Freebsd 11 release. > ** > > FreeBSD 11.2-RELEASE-p1 route add default 127.0.0.1 -blackhole –iface ipfw show00100 30 4056 fwd 10.0.0.5 ip from table(1) to not 10.0.0.0/8 in via em0 The packet counter changes, but forwarding does not work.On FreeBSD 10 everything works fine. I suppose this is due to changes to forwarding -> fast forwarding by default in FreeBSD 11 and man ROUTE (8), “BUGS - unless IP fast forwarding is enabled, in which case the meaning of the flag will always be honored.” > I want to know if it's possible to implement the work ipfw fwd together with RTF_BLACKHOLE on FreeBSD 11 as before in FreeBSD 10? Thank you in advance! > > *** As temporary workaround, you still can disable fast forwarding path: - make sure you use GENERIC kernel or your custom kernel has "options IPSEC_SUPPORT" like GENERIC has; - load ipsec kernel module by means of /boot/loader.conf or /etc/rc.conf; - add dummy security policy: printf "flush;\nspdflush;\n\nspdadd 100.64.0.1/32 100.64.0.2/32 esp -P out none;\n" > /etc/ipsec.conf It does nothing but prevents a kernel from using fast forwarding path for 11.2