Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 7 Dec 2004 10:43:00 +0200
From:      "Ari Suutari" <ari@suutari.iki.fi>
To:        "Jeremie Le Hen" <jeremie@le-hen.org>
Cc:        freebsd-net@freebsd.org
Subject:   Re: (review request) ipfw and ipsec processing order foroutgoingpackets
Message-ID:  <01a801c4dc38$c59b8700$2508473e@sad.syncrontech.com>
References:  <20041129100949.GA19560@bps.jodocus.org><41AAF696.6ED81FBF@freebsd.org> <20041129103031.GA19828@bps.jodocus.org><41AB3A74.8C05601D@freebsd.org> <20041129174954.GA26532@bps.jodocus.org><41AB65B2.A18534BF@freebsd.org> <20041206134315.GF79919@obiwan.tataz.chchile.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Hi,

> But I may be
> missing something because I can see no way in firewall rules to
> distinguish between the before IPSec processing hook and the after IPSec
> processing one.  Could you clarify this for me please ?

    There is a keyword "ipsec" in ipfw2, which matches if packet has emerged
    from ipsec tunnel. To match packet before ipsec stack, use protocol 
esp/ah
    in ipfw rule. To match packet after ipsec stack, use tcp/udp/ip as 
protocol
    and "ipsec" keyword.

    The problem is that this doesn't work for outgoing packets, which breaks
    at least statefull rules.

        Ari S.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?01a801c4dc38$c59b8700$2508473e>