Date: Sat, 21 Dec 2019 23:24:28 +0000 From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 242744] IPSec in transport mode between FreeBSD hosts blackholes TCP traffic Message-ID: <bug-242744-7501-QOY5J13Yu4@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-242744-7501@https.bugs.freebsd.org/bugzilla/> References: <bug-242744-7501@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=242744 --- Comment #15 from Eugene Grosbein <eugen@freebsd.org> --- (In reply to Victor Sudakov from comment #14) Routing lookup can be performed within shell script, too: gw=$(route -n get "$REMOTE_ADDR" | awk '/gateway: / {print $2}') As for ipfw. First, ipfw never requied matching on some interface name, this is optional. Second, every outgoing locally generated packet has its outgoing interface anyway including targeted to same host, these go out via lo0. -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-242744-7501-QOY5J13Yu4>
