Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 24 Sep 2015 23:44:49 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   [Bug 203308] wildcard patch in ipsec-tools breaks aggressive tunnels
Message-ID:  <bug-203308-13-343eqmMxa0@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-203308-13@https.bugs.freebsd.org/bugzilla/>
References:  <bug-203308-13@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=203308

andywhite@gmail.com changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |andywhite@gmail.com

--- Comment #1 from andywhite@gmail.com ---
Created attachment 161355
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=161355&action=edit
patch to fix aggressive mode tunnels with PSK

wilcard patch exposures existing bug where agressive tunnels using ip addresses
for identification were not matching the entry in the PSK file, due to the
identifier not being cast to a 'xxx.xxx.xxx.xxx' notation.

This patch checks if the identity type is and ADDR and if it is, uses a
sockaddr struct to call the getpskbyaddr function instead of getpskbyname.

-- 
You are receiving this mail because:
You are the assignee for the bug.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-203308-13-343eqmMxa0>