From owner-freebsd-net@freebsd.org Mon Jan 18 16:27:45 2016 Return-Path: Delivered-To: freebsd-net@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 94855A8705F for ; Mon, 18 Jan 2016 16:27:45 +0000 (UTC) (envelope-from bzeeb-lists@lists.zabbadoz.net) Received: from mx1.sbone.de (bird.sbone.de [46.4.1.90]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "mx1.sbone.de", Issuer "SBone.DE" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 574471E96 for ; Mon, 18 Jan 2016 16:27:44 +0000 (UTC) (envelope-from bzeeb-lists@lists.zabbadoz.net) Received: from mail.sbone.de (mail.sbone.de [IPv6:fde9:577b:c1a9:31::2013:587]) (using TLSv1 with cipher ADH-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by mx1.sbone.de (Postfix) with ESMTPS id CAC6325D38A4; Mon, 18 Jan 2016 16:27:35 +0000 (UTC) Received: from content-filter.sbone.de (content-filter.sbone.de [IPv6:fde9:577b:c1a9:31::2013:2742]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.sbone.de (Postfix) with ESMTPS id 16773C76FF6; Mon, 18 Jan 2016 16:27:35 +0000 (UTC) X-Virus-Scanned: amavisd-new at sbone.de Received: from mail.sbone.de ([IPv6:fde9:577b:c1a9:31::2013:587]) by content-filter.sbone.de (content-filter.sbone.de [fde9:577b:c1a9:31::2013:2742]) (amavisd-new, port 10024) with ESMTP id ij0_nFnB_CLs; Mon, 18 Jan 2016 16:27:33 +0000 (UTC) Received: from [IPv6:fde9:577b:c1a9:4420:cabc:c8ff:fe8b:4fe6] (orange-tun0-ula.sbone.de [IPv6:fde9:577b:c1a9:4420:cabc:c8ff:fe8b:4fe6]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.sbone.de (Postfix) with ESMTPSA id 63C9BC76FEC; Mon, 18 Jan 2016 16:27:33 +0000 (UTC) Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2104\)) Subject: Re: pf not seeing inbound packets coming from IPSec on epair interface From: "Bjoern A. Zeeb" In-Reply-To: <569D0F2F.8060508@incore.de> Date: Mon, 18 Jan 2016 16:27:31 +0000 Cc: freebsd-net@freebsd.org Content-Transfer-Encoding: quoted-printable Message-Id: <5ADF2343-7643-41ED-B2AE-8A94A3478B95@lists.zabbadoz.net> References: <569D0F2F.8060508@incore.de> To: Andreas Longwitz X-Mailer: Apple Mail (2.2104) X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 18 Jan 2016 16:27:45 -0000 > On 18 Jan 2016, at 16:13 , Andreas Longwitz = wrote: >=20 > in the situation > IPSec --> epair0a --> epair0b > pf does not see inbound packets on the interface epair0b, because the > epair driver does not clear the flag PACKET_TAG_IPSEC_IN_DONE when he > transfers a packet from epair0a to epair0b. The following patch for > FreeBSD 10 works for me and is adapted from > lists.freebsd.org/pipermail/freebsd-net/2012-January/031161.html: Where does epair get the packet from? A physical interface bridged to = epair? If anything should clear that; I guess it=E2=80=99s the bridge = interface? Hmm, but then if you are using epairs to cross between network stacks, = you are changing boundries, indeed, so if you=E2=80=99d run ipsec on a = single epair between two VNETs, that might be interesting as well? I guess we=E2=80=99ll need to find a couple of these places (epair, = bridge, netgraph, =E2=80=A6) and make sure we strip all of the tags IFF = we change the VNET? /bz