Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 21 Dec 2019 23:24:28 +0000
From:      bugzilla-noreply@freebsd.org
To:        net@FreeBSD.org
Subject:   [Bug 242744] IPSec in transport mode between FreeBSD hosts blackholes TCP traffic
Message-ID:  <bug-242744-7501-QOY5J13Yu4@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-242744-7501@https.bugs.freebsd.org/bugzilla/>
References:  <bug-242744-7501@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=242744

--- Comment #15 from Eugene Grosbein <eugen@freebsd.org> ---
(In reply to Victor Sudakov from comment #14)

Routing lookup can be performed within shell script, too:

gw=$(route -n get "$REMOTE_ADDR" | awk '/gateway: / {print $2}')

As for ipfw. First, ipfw never requied matching on some interface name, this is
optional. Second, every outgoing locally generated packet has its outgoing
interface anyway including targeted to same host, these go out via lo0.

-- 
You are receiving this mail because:
You are the assignee for the bug.


Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-242744-7501-QOY5J13Yu4>