Date: Tue, 19 Nov 2002 19:48:43 -0800 (PST) From: Archie Cobbs <archie@dellroad.org> To: Guido van Rooij <guido@gvr.org> Cc: Archie Cobbs <archie@dellroad.org>, David Kelly <dkelly@HiWAAY.net>, Scott Ullrich <sullrich@CRE8.COM>, "'greg.panula@dolaninformation.com'" <greg.panula@dolaninformation.com>, FreeBSD-stable@FreeBSD.ORG Subject: Re: IPsec/gif VPN tunnel packets on wrong NIC in ipfw? SOLUTION AND QUESTIONS Message-ID: <200211200348.gAK3mhtT058983@arch20m.dellroad.org> In-Reply-To: <20021119194150.GA43806@gvr.gvr.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Guido van Rooij wrote: > The problem here is that there is a de-tunneled packet that has no > new interface associated. What a mess :-( I'm confused. So, let me try to summarize things: Right now, if you use IPSec tunnel mode with a 'gif' interface, and suppose your Ethernet driver is fxp0, then incoming packets will pass through ipfw twice: first, as encrypted ESP packets and 'in via fxp0', and again, as decrypted whatever packets and 'in via gif0'. Is that correct?? Guido seems to think so... but Scott Ullrich wrote: > Guido, I have the exact scenario that you are recommending. I created the > gif devices just as you suggested and the whole nine yards. So Scott seems to be saying that it is NOT correct. Scott: can you please confirm/deny? ---------- Secondly, is the question of what to do about IPSec tunnel mode. I vote for creating a new pseudo-interface 'ipsec0'. This interface will automatically get created and attached the first time a tunnel mode IPSec packet is de-encapsulated and put back on ipintrq. -Archie __________________________________________________________________________ Archie Cobbs * Packet Design * http://www.packetdesign.com To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200211200348.gAK3mhtT058983>