Date: Tue, 1 Apr 2003 11:03:05 -0800 From: "Sam Leffler" <sam@errno.com> To: "Mailing List FreeBSD Network" <freebsd-net@freebsd.org>, "Eric Masson" <e-masson@kisoft-services.com> Subject: Re: options FAST_IPSEC & tunnels Message-ID: <05b901c2f881$67e907f0$52557f42@errno.com> References: <86pto6mbxj.fsf@notbsdems.interne.kisoft-services.com>
next in thread | previous in thread | raw e-mail | index | archive | help
> I'm using IPSEC tunnels to join different gateways over the Internet.
>
> I've made some trials with FAST_IPSEC today (I've received a Soekris
> VPN1201) and i'm facing a problem with incoming packets.
>
> The following code snippet from /sys/netinet/ip_input.c permits
> detunneled packets to flow without being filtered by ipf/ipfw :
>
> #if defined(IPSEC) && !defined(IPSEC_FILTERGIF)
> /*
> * Bypass packet filtering for packets from a tunnel (gif).
> */
> if (ipsec_gethist(m, NULL))
> goto pass;
> #endif
>
> Is there any counterpart for FAST_IPSEC (I've dug thru the code, but no
> luck atm) ?
Wow, someone besides me actually using fast ipsec! :)
Packets are tagged once they've been processed on input. I think you can do
a similar check with something like:
if (m_tag_find(PACKET_TAG_IPSEC_IN_DONE) != NULL)
goto pass;
Long term, I intend is to associate packets with an enc device so there's a
way to identify these packets when writing firewall rules.
Sam
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?05b901c2f881$67e907f0$52557f42>
